Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

spurious executable permissions? #37

Closed
jmtaylor90 opened this issue Sep 4, 2016 · 3 comments
Closed

spurious executable permissions? #37

jmtaylor90 opened this issue Sep 4, 2016 · 3 comments

Comments

@jmtaylor90
Copy link
Contributor

In working on getting hyperscan packaged for Fedora/EPEL we came across the following rpmlint warnings:

hyperscan-debuginfo.x86_64: W: spurious-executable-perm /usr/src/debug/hyperscan-4.3.1/src/nfa/dfa_build_strat.cpp
hyperscan-debuginfo.x86_64: W: spurious-executable-perm /usr/src/debug/hyperscan-4.3.1/src/nfa/accel_dfa_build_strat.cpp
hyperscan-debuginfo.x86_64: W: spurious-executable-perm /usr/src/debug/hyperscan-4.3.1/src/nfa/accel_dfa_build_strat.h

The files above are indeed marked as executable (0775).

jmtaylor90 added a commit to jmtaylor90/hyperscan that referenced this issue Sep 4, 2016
Resolves issue github issue intel#37
@mdb256 mdb256 changed the title surious executable permissions? spurious executable permissions? Sep 4, 2016
@mdb256
Copy link

mdb256 commented Sep 4, 2016

They are indeed - how strange.

I'll merge your PR soon, and it will be part of the next release. That's probably not quite enough for us to create a 4.3.2 on its own, however.

@jmtaylor90
Copy link
Contributor Author

Yeah, no problem at all. It was just something noted during the package review. Thanks for the quick response!

@mdb256
Copy link

mdb256 commented Jan 20, 2017

Fixed in v4.4.0

@mdb256 mdb256 closed this as completed Jan 20, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants