Bug#926823: executable-not-elf-or-script should consider PE binaries
tags 926823 + moreinfo
thanks
Hi Michael,
> Am 11.04.19 um 01:22 schrieb Felix Lechner:
> > It's just that the lintian tag is not triggered when
> > the [executable] bit is off.
>
> That much I figured :-)
This begs the question; why cannot the systemd packaging remove the
executable bits from these files?
Indeed, they can't be "executed" in the usual way after all — the
long description of the tag even refers to this although admittedly
it mentions "Windows", not PE:
Tag: executable-not-elf-or-script
Severity: normal
Certainty: certain
Info: This executable file is not an ELF format binary, and does not start
with the #! sequence that marks interpreted scripts. It might be a sh
script that fails to name /bin/sh as its shell, or it may be incorrectly
marked as executable. Sometimes upstream files developed on Windows are
marked unnecessarily as executable on other systems.
.
If you are using debhelper to build your package, running dh_fixperms will
often correct this problem for you.
Ref: policy 10.4
Best wishes,
--
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org 🍥 chris-lamb.co.uk
`-
Reply to: