[Bug 1983521] Re: [SRU] Manually blacklist DKMS modules for Ubuntu Studio builds
John Chittum
1983521 at bugs.launchpad.net
Thu Aug 4 20:08:40 UTC 2022
CPC is noticing a regression. when attempting a build, we got
chmod: cannot access 'config/hooks/100-ubuntustudio-dkms.chroot': No
such file or directory
checking out the diff from the commit:
https://git.launchpad.net/livecd-
rootfs/commit/?id=ce9549372aaf041a663673caf45f4dff10158116
It looks like the chmod is outside the if statement. Thus chmod is
getting called on projects other than ubuntustudio-dvd , and the file
has not been created.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to livecd-rootfs in Ubuntu.
https://bugs.launchpad.net/bugs/1983521
Title:
[SRU] Manually blacklist DKMS modules for Ubuntu Studio builds
Status in livecd-rootfs package in Ubuntu:
Invalid
Status in livecd-rootfs source package in Jammy:
Fix Committed
Status in livecd-rootfs source package in Kinetic:
Invalid
Bug description:
[Impact and Rationale]
Ubuntu Studio 22.04 is currently uninstallable on systems with Secure
Boot enabled. This is due to the inclusion of two packages,
v4l2loopback-dkms and v4l2loopback-utils. See Ubuntu bug 1983136 and
https://git.launchpad.net/~ubuntustudio-dev/ubuntu-
seeds/+git/ubuntustudio/commit/?id=dd556f0bc548b17f3126732500a1a3c194c9b3d8
for more detailed information.
In livecd-rootfs, if a package is removed from a seed post-release,
newer ISOs still include that package because it was part of the task
at release-time. For Ubuntu Studio 22.04.1, we need to remove those
packages during the creation of the squashfs so they are not included
by default. This bug does not affect 22.10+.
This is done with an install hook, rather than simply blacklisting the
package from being installed. The change is modeled after this recent
commit by Steve Langasek: https://git.launchpad.net/livecd-
rootfs/commit/?id=941cd3c64aab7b2ada33399d9b08b8a785d3d957
This is being split into a separate bug to fast-track the change. Only
a respin of Ubuntu Studio should be required.
[Test Case]
I have tested these changes locally prior to uploading them, by
running the following commands in the live-build directory:
$ export PROJECT="ubuntustudio-dvd" && export ARCH="amd64" && export SUITE="jammy"
$ env PROJECT=$PROJECT SUBPROJECT=$SUBPROJECT ARCH=$ARCH SUITE=$SUITE lb config
$ sudo env PROJECT=$PROJECT SUBPROJECT=$SUBPROJECT ARCH=$ARCH lb build
$ sudo env PROJECT=$PROJECT SUBPROJECT=$SUBPROJECT ARCH=$ARCH lb binary
$ mkdir -pv ~/ubuntu/iso && sudo mount -t iso9660 -o loop /PATH/TO/STUDIO/JAMMY/DAILY.iso ~/ubuntu/iso
$ mkdir -pv ~/ubuntu/iso_custom && tar cf - ~/ubuntu/iso | (cd ~/ubuntu/iso_custom; tar xfp -)
After the ISO is completely done, you should be able to boot it on a
Secure Boot system once again. Just a basic boot and install smoke
test on that particular hardware type.
[Where problems could occur]
If Bash or apt itself is SRUed, or if the project name for Ubuntu
Studio changes in livecd-rootfs, problems may occur with unexpected
behavior. Otherwise, the package may find another way to sneak itself
onto the ISO in the future.
The code block format can be seen all over that part of the file, so
it's not much of a hack. In fact, this code block is safer, because it
ensures that the hook is marked as executable.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/livecd-rootfs/+bug/1983521/+subscriptions
More information about the foundations-bugs
mailing list