summaryrefslogtreecommitdiff
path: root/tools/fit_image.c
diff options
context:
space:
mode:
authorThomas Hebb <tommyhebb@gmail.com>2020-03-01 10:47:53 -0800
committerTom Rini <trini@konsulko.com>2020-04-17 12:32:36 -0400
commitab5a2b0f7927196143d762b2ad9cdc51b84249b3 (patch)
tree4b318be9efe7c3e7987a113c437feef96b04be46 /tools/fit_image.c
parent04571bec56a53c846f072fb3bc7543586f10ee93 (diff)
mkimage: fit: don't create image with 0700 permissions
commit 7298e422504e ("mkimage: fit: add support to encrypt image with aes") added a new copyfile() function as part of the FIT image creation flow. This function as currently written creates the final image with a mode of 0700 (before umask), differing from the old behavior of 0666. Since there doesn't seem to be any reason to make the image executable or non-group, non-other readable, change the mask to 0666 to preserve the old behavior. Fixes: 7298e422504e ("mkimage: fit: add support to encrypt image with aes") Signed-off-by: Thomas Hebb <tommyhebb@gmail.com>
Diffstat (limited to 'tools/fit_image.c')
-rw-r--r--tools/fit_image.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/fit_image.c b/tools/fit_image.c
index dd61a816c9..4301b5decb 100644
--- a/tools/fit_image.c
+++ b/tools/fit_image.c
@@ -642,7 +642,7 @@ static int copyfile(const char *src, const char *dst)
goto out;
}
- fd_dst = open(dst, O_WRONLY | O_CREAT, 0700);
+ fd_dst = open(dst, O_WRONLY | O_CREAT, 0666);
if (fd_dst < 0) {
printf("Can't open file %s (%s)\n", dst, strerror(errno));
goto out;