From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4359744CAE6; Tue, 20 Jan 2026 18:39:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768934348; cv=none; b=mLf77RgaGVOFwgTmWlN0C7zA98GhNY6Ca8V3YjA8PfaCnFWVTEwB4zsYvjQDHV8xYJurO8trQApfeCjzL8Rmkb6wlMQTiC5gO5GIEMrmsKwwSY4DzZVLnRn9991UyQFxQeNr6kiQ9BFILifVQiWrhDF4kzBV1JEE32i0d/z5Ljg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768934348; c=relaxed/simple; bh=rTYyl5X5O+XYzpIbFuw0zsstxXaXfzt7BUh3bAWVKvU=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Hj/FbqezCLAEEQASF/Zr/Qtv1bFJ0+iSEkTFN12VwDtzHkjtYviEg4samacHTxRvELvwuzy5+Dw/PmoxiB0lbvysZhmsAaDb8KMqwStU1TYKNp1q9U0xSHS7yqaKSzY5sPQFm+74fGtQMHr4kVJGoJbdwsFufLrKqNzq6sdATSg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ZWzalO5t; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ZWzalO5t" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2E974C16AAE; Tue, 20 Jan 2026 18:39:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1768934345; bh=rTYyl5X5O+XYzpIbFuw0zsstxXaXfzt7BUh3bAWVKvU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ZWzalO5tOPyEn+iDgdeFpMZ0biyzg9chnE+Lqw8cvh/MDQGqxxO5MT9xtyAumUPJk 2YNykJDbz8eDLg9hXlyIX9X9Da/T0WTG7n5O5hRSnOr+IUbOnxOArcYFyqJgOxXV2Y DMkLLcmo4FP9hRCTl4aNFBkJ19peqTiPIGVH/mCP/CskPel8DgoVtG6AjgNBEsMPSM Zpv+llnKyV9+YvxayZBnibEofCoJlyi/FQIUCriaNK0CzpXqGPk4i7oYkVCqivAVhV CGMKcS4XJZrcPlTEaPtj/AfIrnsxJh5kt8Ail57GOqZc6A7vWi3KydiXt+miSkVnXK wX4yfx99oizrA== Date: Tue, 20 Jan 2026 11:39:00 -0700 From: Nathan Chancellor To: Nicolas Schier Cc: Guillaume Tucker , Miguel Ojeda , David Gow , Onur =?iso-8859-1?Q?=D6zkan?= , Arnd Bergmann , linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org, linux-kbuild@vger.kernel.org, automated-testing@lists.yoctoproject.org, workflows@vger.kernel.org, llvm@lists.linux.dev Subject: Re: [PATCH v3 2/2] Documentation: dev-tools: add container.rst page Message-ID: <20260120183900.GE2749368@ax162> References: <20260120183550.GD2749368@ax162> Precedence: bulk X-Mailing-List: workflows@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20260120183550.GD2749368@ax162> Actually sending to Nicolas now :) sorry for the noise! https://lore.kernel.org/linux-kbuild/20260120183550.GD2749368@ax162/ On Tue, Jan 20, 2026 at 11:35:50AM -0700, Nathan Chancellor wrote: > On Tue, Jan 20, 2026 at 02:53:33PM +0100, Nicolas Schier wrote: > > I probably have just read it over: I have to prefix the > > 'tuxmake/korg-clang' by 'docker.io/'. Is that a problem of my system > > configuration (Debian forky, no special podman config)? > > Some distributions ship registries.conf [1] to allow unqualified image > names but I do not think Debian does. Personally, I use the full name > regardless but it should be easy to create it for commands such as these > to work. I use: > > unqualified-search-registries = ['docker.io', 'ghcr.io', 'quay.io'] > > [1]: https://podman.io/docs/installation#registriesconf > > > I tested a tiny bit with podman as runtime backend. If I leave out the > > '-r podman' podman's docker emulation is in effect and fails with: > > > > $ scripts/container -i docker.io/tuxmake/korg-clang -- make LLVM=1 -j8 olddefconfig > > Emulate Docker CLI using podman. Create /etc/containers/nodocker to quiet msg. > > mkdir: cannot create directory '.tmp_15': Permission denied > > mkdir: cannot create directory '.tmp_19': Permission denied > > mkdir: cannot create directory '.tmp_22': Permission denied > > mkdir: cannot create directory '.tmp_25': Permission denied > > mkdir: cannot create directory '.tmp_28': Permission denied > > mkdir: cannot create directory '.tmp_31': Permission denied > > HOSTCC scripts/basic/fixdep > > error: error opening 'scripts/basic/.fixdep.d': Permission denied > > 1 error generated. > > make[2]: *** [scripts/Makefile.host:114: scripts/basic/fixdep] Error 1 > > make[1]: *** [/src/Makefile:655: scripts_basic] Error 2 > > make: *** [Makefile:248: __sub-make] Error 2 > > [exit code 2] > > > > But with '-r podman' it works like a charm. > > > > Would it make sense to switch the default runtime to podman to > > prevent non-functional podman-docker emulation? (Or is this just a > > problem on my machine?) > > Yeah, I think it would be better to prefer podman over docker if both > existed on the system. Something like this should do that? > > diff --git a/scripts/container b/scripts/container > index dbe92630f05b..50c4ae851001 100755 > --- a/scripts/container > +++ b/scripts/container > @@ -105,7 +105,7 @@ class PodmanRuntime(CommonRuntime): > class Runtimes: > """List of all supported runtimes""" > > - runtimes = [DockerRuntime, PodmanRuntime] > + runtimes = [PodmanRuntime, DockerRuntime] > > @classmethod > def get_names(cls): >