All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Richard Purdie" <richard.purdie@linuxfoundation.org>
To: Alex Kiernan <alex.kiernan@gmail.com>,
	 openembedded-core@lists.openembedded.org
Subject: Re: [OE-Core][PATCH v2] rootfs-postcommands: Enable rootfs_check_host_user_contaminated
Date: Mon, 22 Jun 2020 18:34:27 +0100	[thread overview]
Message-ID: <2fd43b04ea22019411e3e01669e879a838781e8f.camel@linuxfoundation.org> (raw)
In-Reply-To: <20200622105717.108062-1-alex.kiernan@gmail.com>

On Mon, 2020-06-22 at 11:57 +0100, Alex Kiernan wrote:
> Generate output for each contaminated path so it's visible in the main
> log file, then enable rootfs_check_host_user_contaminated by default.
> 
> Signed-off-by: Alex Kiernan <alex.kiernan@gmail.com>
> ---
> 
> Changes in v2:
> - expose each contaminated path in the main log
> 
>  meta/classes/rootfs-postcommands.bbclass | 9 ++++-----
>  1 file changed, 4 insertions(+), 5 deletions(-)

Thanks, this is definitely more helpful. Some warnings in the test
build:

https://autobuilder.yoctoproject.org/typhoon/#/builders/50/builds/2046

step1b: WARNING: core-image-sato-sdk-1.0-r0 do_rootfs: Path in the rootfs is owned by the same user or group as the user running bitbake: /var/lib/nfs/statd
step1b: WARNING: core-image-sato-sdk-1.0-r0 do_rootfs: Path in the rootfs is owned by the same user or group as the user running bitbake: /var/lib/nfs/statd/sm.bak
step1b: WARNING: core-image-sato-sdk-1.0-r0 do_rootfs: Path in the rootfs is owned by the same user or group as the user running bitbake: /var/lib/nfs/statd/state
step1b: WARNING: core-image-sato-sdk-1.0-r0 do_rootfs: Path in the rootfs is owned by the same user or group as the user running bitbake: /var/lib/nfs/statd/sm

https://autobuilder.yoctoproject.org/typhoon/#/builders/44/builds/2073

step3b: WARNING: core-image-sato-1.0-r0 do_rootfs: Path in the rootfs is owned by the same user or group as the user running bitbake: /var/cache/fontconfig/CACHEDIR.TAG

which does raise more questions.

Its conceivable its even related to the pseudo issue I just sent a patch for...

Cheers,

Richard


  reply	other threads:[~2020-06-22 17:34 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-06-22 10:57 [OE-Core][PATCH v2] rootfs-postcommands: Enable rootfs_check_host_user_contaminated Alex Kiernan
2020-06-22 17:34 ` Richard Purdie [this message]
2020-06-22 18:53   ` Alex Kiernan
2020-06-22 19:46     ` Richard Purdie
     [not found]     ` <161AF559DCEBF3F0.4124@lists.openembedded.org>
2020-06-23  8:20       ` Richard Purdie
2020-06-23  9:01         ` Alex Kiernan
2020-06-23 10:01           ` Richard Purdie
2020-07-03 13:13             ` Richard Purdie
2020-07-03 14:06               ` Alex Kiernan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2fd43b04ea22019411e3e01669e879a838781e8f.camel@linuxfoundation.org \
    --to=richard.purdie@linuxfoundation.org \
    --cc=alex.kiernan@gmail.com \
    --cc=openembedded-core@lists.openembedded.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.