From mboxrd@z Thu Jan 1 00:00:00 1970 From: alan@lxorguk.ukuu.org.uk (Alan Cox) Date: Fri, 7 Dec 2012 10:36:43 +0000 Subject: [PATCH 0/6 v10] gpio: Add block GPIO In-Reply-To: <1354830456-17590-1-git-send-email-stigge@antcom.de> References: <1354830456-17590-1-git-send-email-stigge@antcom.de> Message-ID: <20121207103643.34ca6dc5@pyramind.ukuu.org.uk> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org > * Device interface for userland access (alternative to sysfs) Currently we can set different permissions on different GPIO lines. Your driver change drives a truck through this facility. I'm not sure there is an elegant way to snoop on the permissions set on the sysfs gpio nodes and the driver also breaks managing GPIO rights via smack/selinux/apparmor and assigning specific gpio lines to specific pieces of user space code. Alan From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933423Ab2LGKcf (ORCPT ); Fri, 7 Dec 2012 05:32:35 -0500 Received: from lxorguk.ukuu.org.uk ([81.2.110.251]:56246 "EHLO lxorguk.ukuu.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932890Ab2LGKcd (ORCPT ); Fri, 7 Dec 2012 05:32:33 -0500 Date: Fri, 7 Dec 2012 10:36:43 +0000 From: Alan Cox To: Roland Stigge Cc: gregkh@linuxfoundation.org, grant.likely@secretlab.ca, linus.walleij@linaro.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, w.sang@pengutronix.de, jbe@pengutronix.de, plagnioj@jcrosoft.com, highguy@gmail.com, broonie@opensource.wolfsonmicro.com, daniel-gl@gmx.net, rmallon@gmail.com, tru@work-microwave.de, sr@denx.de, wg@grandegger.com Subject: Re: [PATCH 0/6 v10] gpio: Add block GPIO Message-ID: <20121207103643.34ca6dc5@pyramind.ukuu.org.uk> In-Reply-To: <1354830456-17590-1-git-send-email-stigge@antcom.de> References: <1354830456-17590-1-git-send-email-stigge@antcom.de> X-Mailer: Claws Mail 3.8.1 (GTK+ 2.24.8; x86_64-redhat-linux-gnu) Face: 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 Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > * Device interface for userland access (alternative to sysfs) Currently we can set different permissions on different GPIO lines. Your driver change drives a truck through this facility. I'm not sure there is an elegant way to snoop on the permissions set on the sysfs gpio nodes and the driver also breaks managing GPIO rights via smack/selinux/apparmor and assigning specific gpio lines to specific pieces of user space code. Alan