this post was submitted on 21 Nov 2023
689 points (97.6% liked)

Linux

48008 readers
853 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 38 points 11 months ago* (last edited 11 months ago) (7 children)

sudo chmod -R 777 /

Edit: don't do this, it will allow everyone and everything to read and modify all files of all mounted filesystems, this includes your personal files, system wide passwords, config files, everything and might break the whole system as not all files are meant to have these permissions, e.g. mapped hardware settings or your ssh key store.

sudo comes with immense power, do not, under any circumstances, enter commands you found on the internet without an intense look about what they do and what their implications could be. Never sudo or doas, etc., without a strong and valid reason.

[–] [email protected] 51 points 11 months ago (3 children)

For anyone that didn't recognise this as a joke, do not do this!

[–] [email protected] 8 points 11 months ago (1 children)

Oh. Ok. Should I undo it then?

[–] [email protected] 13 points 11 months ago

Yeah just hit Ctrl + Z and you should be fine

[–] [email protected] 6 points 11 months ago (1 children)

Yup, this will pretty much destroy your system.

[–] [email protected] 2 points 11 months ago (3 children)

Actually curious how though - I mean won't it just let all programs/users access everything? Or do some system stuff rely on permissions for certain behavior?

[–] [email protected] 4 points 11 months ago

SSH will definitely break, I've had this issue before. If your private key in the .ssh dir is too open, ssh won't let you use it.

[–] [email protected] 3 points 11 months ago (1 children)

Theoretically yes, but yes, in that order.

I've worked with Linux for decades at this point and I'm still not 100% sure exactly what breaks; it's a mistake you make once, if at all, and you'll only get a little way into even trying to figure out how to fix things before you throw your hands up in disgust and reinstall / restore the OS (or whatever subdir was affected).

If I was to hazard a guess, it's the kernel itself that balks, but there are other, almost as fundamental things (lib*.so files and the like) that may also be deliberately fussy.

[–] [email protected] 2 points 11 months ago (2 children)

I think it's systemd not the kernel. If only Linux had "repair permissions" like vintage MacOS.

[–] [email protected] 1 points 11 months ago (1 children)

Recursive chmod (or chown) has been breaking things since before systemd was a thing, so even if systemd is now responsible for stopping things from working, it can't have been that previously, especially at the time I might have done something silly.

As for repairing permissions only, I suppose it would be possible, assuming the system still works (or can somehow be encouraged to do so) to copy only the permissions (or at least infer them) from a backup or something rather than the whole files.

[–] [email protected] 1 points 11 months ago

Probably init before that then. I don't think the kernel cares unless explicitly told to care, I've seen some embedded Linux with interesting permissions.

[–] [email protected] 1 points 11 months ago

You don't typically have permissions "become defective" or need them to be "repaired" in a Linux system. Nearly all system files, with their permissions, are included in packages. Everything else should be considered user data.

If you logged in as root and did something dumb, you could attempt to fix the permissions by reinstating packages.

[–] [email protected] 2 points 11 months ago

I actually don't know how many programs do this, but several check that file permissions are correct or refuse to work. Sudo and ash are 2 of them. I could see /etc/shadow being readable and writable by everyone being a problem too, but I don't know.

[–] [email protected] 1 points 11 months ago (1 children)

Edit removed it. What was it?

[–] [email protected] 1 points 11 months ago

The chmod you can still see

[–] [email protected] 24 points 11 months ago (1 children)

the 777 stands for 'lucky jackpot number', as in 'youre lucky if you dont break your entire system'

[–] [email protected] 6 points 11 months ago* (last edited 11 months ago)

well, 666 would '-_-'

[–] [email protected] 20 points 11 months ago (1 children)

This is so useful! Now I can just run:

rm -rf /

Without the sudo!

[–] [email protected] 12 points 11 months ago

--no-preserve-root

[–] [email protected] 10 points 11 months ago (1 children)

That's all true, except when I send you a command. You can totally trust me and just run it.

[–] [email protected] 9 points 11 months ago

remove the French language pack, frees up space

[–] [email protected] 7 points 11 months ago (1 children)

I set 777 to my whole file system on a install of Ubuntu back in the day and it does indeed fuck the install in lovely ways. I didn't bother attempting recovery. Nice learning experience.

[–] [email protected] 3 points 11 months ago

@drdiddlybadger @neonred I've had results with chmod -r +x /

[–] [email protected] 4 points 11 months ago (1 children)
[–] [email protected] 2 points 11 months ago

Challenge time.

[–] [email protected] 4 points 11 months ago

Better than 666, which I did once 20 years ago