ostree/appfw: change in file labels through OTA update (ostree deploy)

Description

Dec 31 08:52:45 raspberrypi3 HomeScreenAppFrameworkBinderAGL[478]: jsonLaunch {"id":"radio@0.1", "mode":"local"}
Dec 31 08:52:45 raspberrypi3 afm-user-daemon[464]: ERROR: failed to exec master /var/lib/afm/applications/radio/0.1/radio: Inappropriate ioctl for device /usr/src/debug/af-main/1.0-r0/git/src/afm-launch.c:771
Dec 31 08:52:45 raspberrypi3 HomeScreenAppFrameworkBinderAGL[478]: stateString { "runid": 16, "pids": [ 601 ], "state": "running", "id": "radio@0.1" }

Environment

master of 31.12. meta-raspberrypi = "HEAD:a5f9b07a820d50ae5fb62e07306cd4e72d8638a9" meta-netboot = "HEAD:cec31b5ad54ce6b19be303d1dd3e19899087362e" meta-sota = "HEAD:4c812382b0d764c166c98ab9e18a4fddb3b45940" meta-filesystems meta-ruby = "HEAD:55c8a76da5dc099a7bc3838495c672140cedb78e" meta-rust = "HEAD:d0663639a08ed60bb83fd6eb99e3e2045b21b53c" meta-oic = "HEAD:0bdd959e0dee4f63098702c302d1d214ac3d808a" meta-qt5 = "HEAD:9aa870eecf6dc7a87678393bd55b97e21033ab48" meta-agl-demo = "HEAD:9d5cdefb681c34131e5cca9b8be1fb350ac2f2bf" meta-security-smack meta-security-framework = "HEAD:20bbb97f6d5400b126ae96ef446c3e60c7e16285" meta-app-framework = "HEAD:4c812382b0d764c166c98ab9e18a4fddb3b45940" meta-oe meta-multimedia meta-efl meta-networking meta-python = "HEAD:55c8a76da5dc099a7bc3838495c672140cedb78e" meta-ivi-common meta-agl meta-agl-bsp = "HEAD:cec31b5ad54ce6b19be303d1dd3e19899087362e" meta meta-poky meta-yocto-bsp = "HEAD:ae9b341ecfcc60e970f29cfe04306411ad26c0cf"

Activity

Show:

Walt Miner June 13, 2017 at 1:07 PM

Spoke with and determined it is ok to leave unfixed on Chinook branch. 

Walt Miner June 7, 2017 at 9:22 PM

- Since you were the reporter, are you ok with closing for CC without a fix?

Anton Gerasimov June 6, 2017 at 3:19 PM

It is probably nice to have it in CC, but we are usually using AGL master, so it doesn't matter much for us.

Jan-Simon Moeller June 6, 2017 at 2:42 PM

should we target CC 3.0.5 for a fix of this ?

Jose Bollo May 15, 2017 at 12:09 PM

A quick reply to (#comment-12117): Some recipes are putting explicitely the Smack label in post installations (postinst) This is evaluation on the build host and recorded by pseudo so finally it applies to the image. When nothing is set, Smack applies a tunable default strategy: here the files are seen as if tagged with "_". And that is good.

Setting the Smack tags is then possible but by default it works. Nevertheless, a Smack plugin would be usefull inside pseudo to handle transmuting. But it is going to far and should be avoided as far as possible.

Fixed

Details

Assignee

Reporter

Fix versions

Labels

Components

Affects versions

Priority

Created December 31, 2016 at 8:55 AM
Updated June 13, 2017 at 1:07 PM
Resolved June 13, 2017 at 1:06 PM