On 2016-03-08 14:33, Gary Thomas wrote:
I'm getting a lot of messages like this:
   amanda: /amanda/usr/sbin/amtoc is owned by uid 1000, which is the same as 
the user running bitbake. This may be due
to host contamination
   amanda: /amanda/usr/sbin/amcrypt-ossl is owned by uid 1000, which is the 
same as the user running bitbake. This may
be due to host contamination
   amanda: /amanda/usr/sbin/amvault is owned by uid 1000, which is the same as 
the user running bitbake. This may be due
to host contamination

In reality, this is not really a problem.  I'm building a recipe
which adds a user to my system image that just happens to have the
same UID as mine (first user added, go figure).  So the messages in
this case are quite bogus.

How can I avoid them?  When I add my extra user to my image, is
there a way to force the UID/GID to something I know is "safe"?

I solved this by adding '--system' to my USERADD setup.

--
------------------------------------------------------------
Gary Thomas                 |  Consulting for the
MLB Associates              |    Embedded world
------------------------------------------------------------
--
_______________________________________________
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto

Reply via email to