From patchwork Fri Nov 23 11:53:51 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sean Young X-Patchwork-Id: 10695677 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id A424015A7 for ; Fri, 23 Nov 2018 11:53:54 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 8F8812875C for ; Fri, 23 Nov 2018 11:53:54 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 7D35E287C8; Fri, 23 Nov 2018 11:53:54 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id E85C92875C for ; Fri, 23 Nov 2018 11:53:53 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2503904AbeKWWhs (ORCPT ); Fri, 23 Nov 2018 17:37:48 -0500 Received: from gofer.mess.org ([88.97.38.141]:55649 "EHLO gofer.mess.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387885AbeKWWhs (ORCPT ); Fri, 23 Nov 2018 17:37:48 -0500 Received: by gofer.mess.org (Postfix, from userid 1000) id A1E5360A0A; Fri, 23 Nov 2018 11:53:51 +0000 (GMT) From: Sean Young To: linux-media@vger.kernel.org Subject: [PATCH v4l-utils] keytable: do not install bpf protocols decoders with execute permission Date: Fri, 23 Nov 2018 11:53:51 +0000 Message-Id: <20181123115351.13856-1-sean@mess.org> X-Mailer: git-send-email 2.11.0 Sender: linux-media-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-media@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP The rpm packaging system will try to extract debug information, which fails since there is no build id. This can be avoided by removing the execute permission. BPF relocatable files are executable anyway so this is the right thing to do. See: https://github.com/rpm-software-management/rpm/pull/604 Signed-off-by: Sean Young --- utils/keytable/bpf_protocols/Makefile.am | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/utils/keytable/bpf_protocols/Makefile.am b/utils/keytable/bpf_protocols/Makefile.am index 1b90411b..d1f04cb4 100644 --- a/utils/keytable/bpf_protocols/Makefile.am +++ b/utils/keytable/bpf_protocols/Makefile.am @@ -21,4 +21,4 @@ EXTRA_DIST = $(PROTOCOLS:%.o=%.c) bpf_helpers.h install-data-local: $(install_sh) -d "$(DESTDIR)$(keytableuserdir)/protocols" $(install_sh) -d "$(DESTDIR)$(keytablesystemdir)/protocols" - $(install_sh) $(PROTOCOLS) "$(DESTDIR)$(keytablesystemdir)/protocols" + $(install_sh) -m 0644 $(PROTOCOLS) "$(DESTDIR)$(keytablesystemdir)/protocols"