Lintian Reports

W udevadm-called-without-guard

All reports of udevadm-called-without-guard for the archive. The extended description of this tag is:

The specified maintainer script uses set -e but seems to call udevadm(8) without a conditional guard.

udevadm can exist but be non-functional (such as inside a chroot) and thus can result in package installation or upgrade failure if the call fails.

Please guard the return code of the call via wrapping it in a suitable if construct, appending || true or depending on the udev package.

Refer to https://bugs.debian.org/890224 and the udevadm(8) manual page for details.

Severity: normal, Certainty: possible

Check: scripts, Type: binary

Evolution of the udevadm-called-without-guard Lintian tag over the past 366 days:

The beforementioned graph for the udevadm-called-without-guard tag

Emitted (non-overridden): 34, overridden: 0, total: 34

The package names link to the relevant maintainer page and the corresponding report for the source package. The links go to the full maintainer report page, which includes info and experimental tags and overridden tags, rather than the default page that shows only errors and warnings.

bilibop-rules 0.5.4 (binary)

bilibop-udev 0.5.4 (binary)

ecryptfs-utils 111-4 (binary)

madwimax 0.1.1-1+b2 (binary)