Bug#890298: lintian: warn about problematic use of udevadm in maintainer scripts
Package: lintian
Version: 2.5.67~bpo9+1
Severity: wishlist
udevadm can be present on the system but non-functional, due to being inside
a chroot for example. It seems that there are two common patterns used in
maintainer scripts that correctly handle that situation:
if udevadm control --reload; then …
udevadm control --reload || true
Could lintian detect the unprotected udevadm call that, with set -e, will
cause the maintainer script to fail?
(Context: https://bugs.debian.org/890224)
Reply to: