On Tue, 2021-02-09 at 18:25 -0800, Manoj Gupta wrote: > > > > Root is the owner but often there is also a group that has access to the > files. > After stripping with llvm-strip, new ownership is root:root instead of > root:<group>. > Therefore, the members of the group lose access to the files post stripping. > > We found this issue in Chrome OS when we tried to switch the defaults to > llvm's objcopy/strip.
Thanks, I still agree that some consistent behavior is needed. The only reason I asked is because the fact that you *noticed* the problem is a red flag to me. A suid group is a valid use case, but a few of these examples don't set any special group permissions on the executables whose group they change. For example... > ./net-analyzer/netselect/netselect-9999.ebuild: fowners root:wheel > /usr/bin/netselect This ebuild does, fowners root:wheel /usr/bin/netselect fperms 4711 /usr/bin/netselect which makes you wonder why it changed the group in the first place. The ebuilds for mail-filter/procmail and games-arcade/xboing are also suspect.