Disclaimer: Do not run this command.

  • Hotzilla@sopuli.xyz
    link
    fedilink
    arrow-up
    19
    ·
    edit-2
    15 hours ago

    I did chmod -R 666 / when I started playing with Linux in 1999. It did not end well.

    Sudo didn’t really exist back then, you ran things as root like real men. /s

  • palordrolap@fedia.io
    link
    fedilink
    arrow-up
    123
    arrow-down
    2
    ·
    23 hours ago

    Obligatory DO NOT RUN THIS ON YOUR COMPUTER (or anyone else’s).

    You’d think with fully open permissions, everything would work better, but many programs, including important low level things, interpret it as a sign of system damage and will refuse to operate instead.

    If you do run it, you’d better have a backup or something like Timeshift to bail you out, and even if you do have that, it’s not worth trying it just to see what will happen.

    It’s not quite as bad as deleting everything because you can boot from external media and back up non-system files after the fact, but the system will almost certainly not work properly and need to be repaired.

    You have been warned.

    • toynbee@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      7 hours ago

      One time I introduced someone to Linux then left them to their own devices.

      I returned to them hours later to find out they had gotten annoyed with permissions errors and run chown -R ${THEIRUSER}: /.

      The results were not what they wanted.

    • LastYearsIrritant@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      56
      ·
      22 hours ago

      New guy at work ran this to try to fix permissions on his home folder, accidentally ran it on root (both would have been bad)

      Several highly paid and experienced Linux admins finally just gave up and deleted the server and built a new one from the backups.

        • rtxn@lemmy.worldM
          link
          fedilink
          arrow-up
          16
          ·
          edit-2
          16 hours ago

          One of our servers is a rotting carcass being kept alive by our collective prayers. It runs Windows 7 and custom software whose developer is dead and the source is missing, nothing has been updated for over a decade, and it has its own independent UPS because once it goes down, it has an extremely slim chance of recovering, and we’re afraid to test it. It controls the card entry system into the building, including the server room. Boss doesn’t want to replace it because we’d have to replace all of the terminals and controllers too, and it hasn’t catastrophically failed yet.

          You’re right. It’s not a pet. It’s like one of the Saw movies: if it dies, we’re all fucked.

          • CosmicTurtle0@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            3 hours ago

            The question I often ask clients who think this way is "How much would it cost if it did fail? Let’s say this happened today. What would be the cost to replace it NOW and not only that but make sure people who are working can still do so with the interruption?

            Now how much would it cost to schedule the interruption and manage the fall out in a way that is controllable?

            For some, the catastrophic failure points to “hey I fixed the thing!” And the incentives for that kind of person are different from the person whose job is to mitigate risk.

            It sounds like your boss is the former. In which case it’s going to be fun when it fails.

          • Log in | Sign up@lemmy.world
            link
            fedilink
            arrow-up
            6
            ·
            8 hours ago

            So… the dead server controls who is even able to enter the building? Wow. That is one big juggernaut of a problem heading for you.

        • Cenzorrll@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          19 hours ago

          I learned this relatively quickly running my own server with the intention of my family also using it. Data on a separate drive, backed up regularly and automatically. System on it’s own drive, dd’d when it’s in it’s final state and backed up before I screw around any deeper than trying out a new container. I can bring my server back up in however long it takes to transfer data.

    • Gil Wanderley@lemmy.eco.br
      link
      fedilink
      arrow-up
      7
      ·
      edit-2
      17 hours ago

      Someone actually ran it on a server at my workplace, trying to fix file permissions on a samba share. Broke SSH and the samba daemon. Thankfully I was able to fix by removing the permissions from the config files the error logs pointed to.

      Just saying, I think it was a ChatGPT idea, other people use it every day. I only use it if I’m completely stumped, and only take it as suggestions.

  • neomachino@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    11
    ·
    16 hours ago

    Back in my early days of Linux I ran this exact command, I forget why, but for some reason my WiFi stopped working immediately after and then SELinux started yelling at me for some reason. I tried to fix SELinux and most certainly commited an innumerable amount of cardinal sins.

    I had to reinstall whatever distro I was running at the time

        • TheTechnician27@lemmy.world
          link
          fedilink
          English
          arrow-up
          39
          ·
          edit-2
          21 hours ago
          • sudo is telling the computer to do this with root privileges.
          • chmod sets permissions.
          • Each digit of that three-digit number corresponds to the owner, the group, and other users, respectively. It’s 0–7, where 0 means no access and 7 means access to read, write, and execute. So 077 is the exact inverse of 700, where 077 means “the owner cannot access their own files, but everyone else can read, write, and execute them”. Corresponding 700 to asexuals is joking that nobody but the owner can even so much as touch the files.
          • / is the root directory, i.e. the very top of the filesystem.
          • The -R flag says to do this recursively downward; in this case, that’s starting from /.

          So here, we’re modifying every single file on the entire system to be readable, writable, and executable by everyone but their owner. And yes, this is supposed to be extremely stupid.

            • Cenzorrll@lemmy.world
              link
              fedilink
              arrow-up
              4
              ·
              19 hours ago

              Just wait until you need to figure out what you want when you want something other than all or none for those permissions. 4 is read, 2 is write, 1 is execute. Add them up to get what you want for each owner/group/other portion.

        • Ooops@feddit.org
          link
          fedilink
          arrow-up
          5
          ·
          edit-2
          19 hours ago

          File permissions…

          allowed to execute=1, allowed to write=2, allowed to read=4

          grouped by owner/group/everyone.

          So one of your own files you have full access to while users in your usergroup are only allowed to read it and nobody else has any permissions would have: 740 (read+write+execute / read / none).

        • KickMeElmo@sopuli.xyz
          link
          fedilink
          arrow-up
          9
          ·
          23 hours ago

          7 is read, write, and execute permissions. 700 is owner, but not group or others. 077 means the owner has no permissions, but group and others all have full permissions.

    • dan@upvote.au
      link
      fedilink
      arrow-up
      19
      ·
      21 hours ago

      Windows perms are pretty locked down though. Sometimes I can’t delete my own files because I need permission from “Administrator” :/

      You can actually use Windows-style permissions (ACLs) on Linux via setfacl.

      • edinbruh@feddit.it
        link
        fedilink
        English
        arrow-up
        6
        ·
        17 hours ago

        If only…

        Those are POSIX acls, and they suck

        We could have had NFSv4 ACL, of which windows ACLs are a subset. In fact, every other unix os did… Except for Linux, they decided it didn’t fit well to Linux. And so we are stuck with UGO permissions, and posix ACLs.

        • dan@upvote.au
          link
          fedilink
          arrow-up
          4
          ·
          15 hours ago

          Good catch - I should have said that it’s closer to Windows-style ACLs rather than implying that it’s actually the same.