lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20250828191954.903125-1-visitorckw@gmail.com>
Date: Fri, 29 Aug 2025 03:19:54 +0800
From: Kuan-Wei Chiu <visitorckw@...il.com>
To: bp@...en8.de,
	tony.luck@...el.com
Cc: james.morse@....com,
	mchehab@...nel.org,
	rric@...nel.org,
	shiju.jose@...wei.com,
	jonathan.cameron@...wei.com,
	jserv@...s.ncku.edu.tw,
	linux-edac@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	Kuan-Wei Chiu <visitorckw@...il.com>
Subject: [PATCH] EDAC: Fix wrong executable file modes for C source files

Three EDAC source files were mistakenly marked as executable in
commit 1e14ea901dc8 ("EDAC: Initialize EDAC features sysfs attributes").

These are plain C source files and should not carry the executable bit.
Correcting their modes follows the principle of least privilege and
avoids unnecessary execute permissions in the repository.

Fixes: 1e14ea901dc8 ("EDAC: Initialize EDAC features sysfs attributes")
Signed-off-by: Kuan-Wei Chiu <visitorckw@...il.com>
---
 drivers/edac/ecs.c        | 0
 drivers/edac/mem_repair.c | 0
 drivers/edac/scrub.c      | 0
 3 files changed, 0 insertions(+), 0 deletions(-)
 mode change 100755 => 100644 drivers/edac/ecs.c
 mode change 100755 => 100644 drivers/edac/mem_repair.c
 mode change 100755 => 100644 drivers/edac/scrub.c

diff --git a/drivers/edac/ecs.c b/drivers/edac/ecs.c
old mode 100755
new mode 100644
diff --git a/drivers/edac/mem_repair.c b/drivers/edac/mem_repair.c
old mode 100755
new mode 100644
diff --git a/drivers/edac/scrub.c b/drivers/edac/scrub.c
old mode 100755
new mode 100644
-- 
2.34.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ