diff options
author | Thomas Hebb | 2020-03-01 10:47:53 -0800 |
---|---|---|
committer | Tom Rini | 2020-04-17 12:32:36 -0400 |
commit | ab5a2b0f7927196143d762b2ad9cdc51b84249b3 (patch) | |
tree | 4b318be9efe7c3e7987a113c437feef96b04be46 /tools | |
parent | 04571bec56a53c846f072fb3bc7543586f10ee93 (diff) |
mkimage: fit: don't create image with 0700 permissions
commit 7298e422504e ("mkimage: fit: add support to encrypt image with
aes") added a new copyfile() function as part of the FIT image creation
flow. This function as currently written creates the final image with a
mode of 0700 (before umask), differing from the old behavior of 0666.
Since there doesn't seem to be any reason to make the image executable
or non-group, non-other readable, change the mask to 0666 to preserve
the old behavior.
Fixes: 7298e422504e ("mkimage: fit: add support to encrypt image with aes")
Signed-off-by: Thomas Hebb <tommyhebb@gmail.com>
Diffstat (limited to 'tools')
-rw-r--r-- | tools/fit_image.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/fit_image.c b/tools/fit_image.c index dd61a816c93..4301b5decbb 100644 --- a/tools/fit_image.c +++ b/tools/fit_image.c @@ -642,7 +642,7 @@ static int copyfile(const char *src, const char *dst) goto out; } - fd_dst = open(dst, O_WRONLY | O_CREAT, 0700); + fd_dst = open(dst, O_WRONLY | O_CREAT, 0666); if (fd_dst < 0) { printf("Can't open file %s (%s)\n", dst, strerror(errno)); goto out; |