do_uefiapp_deploy copies files into the /boot directory of the rootfs and thus, like do_rootfs, should run under pseudo so that the files end up being owned by root.
This did not trigger the uid leak check, perhaps because the task runs later. For some (still unknown reason), sometimes the installed files did end up being owned by root, which tripped up a swupd test because the system update randomly included unexpected changes to bootx64.efi or rmc.db. With this change, they are owned by root consistently. Signed-off-by: Patrick Ohly <[email protected]> --- classes/uefi-comboapp.bbclass | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/classes/uefi-comboapp.bbclass b/classes/uefi-comboapp.bbclass index 5c3ca8c..4ecc553 100644 --- a/classes/uefi-comboapp.bbclass +++ b/classes/uefi-comboapp.bbclass @@ -101,14 +101,14 @@ uefiapp_deploy_at() { done } -do_uefiapp_deploy() { +fakeroot do_uefiapp_deploy() { rm -rf ${IMAGE_ROOTFS}/boot/* dest=${IMAGE_ROOTFS}/boot/EFI/BOOT mkdir -p $dest uefiapp_deploy_at $dest } -do_uefiapp_deploy[depends] += "${PN}:do_uefiapp" +do_uefiapp_deploy[depends] += "${PN}:do_uefiapp virtual/fakeroot-native:do_populate_sysroot" # This decides when/how we add our tasks to the image base-commit: 863590f9bc7104fef698ce6b89ec24dfce542df1 -- git-series 0.9.1 -- _______________________________________________ meta-intel mailing list [email protected] https://lists.yoctoproject.org/listinfo/meta-intel
