* Re: [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files.
[not found] ` <87r44ofw1x.fsf@rustcorp.com.au>
@ 2014-04-23 15:06 ` simon
2014-04-24 3:25 ` Rusty Russell
0 siblings, 1 reply; 2+ messages in thread
From: simon @ 2014-04-23 15:06 UTC (permalink / raw)
To: Rusty Russell; +Cc: "Michal Malý", linux-kernel, HID CORE LAYER
> simon@mungewell.org writes:
>>> In line with practice for module parameters, we're adding a build-time
>>> check that sysfs files aren't world-writable.
>>
>> So this is the equivalent of 'chmod 774 ...' rather than 'chmod
>> 777...'?
>
> Yep. Though not sure why it was 777 rather than 666...
>
>> Yep I'm OK with that, however what it the recommended way to make sure
>> that the end user is able to send changes to this /sys portal? I asked
>> the
>> same question before regarding the led class /sys interface, but never
>> got
>> any suggestions.
>>
>> Signed-off-by: Simon Wood <simon@mungewell.org>
>
> If you need that, we'll need to make an exception. That's one purpose
> of spamming everyone with these changs...
What's the right way of doing it?... I don't need to be 'special'. ;-)
The '/sys/.../range' control allows the user to limit the rotation of the
gaming wheel from a maximum of 900' down to match the 'car' they
sim-driving. Probably not many people use it, but it probably should be
assigned properly.
With gaming controllers the /dev/input/event* seem to get set
appropriately, but I'm not sure how this happens.
The same /should/ also happen for all the LED class controls, I don't want
to have to 'sudo' just to set a LED on/off. This is currently a problem
for (at least) hid-lg, hid-sony and hid-steelseries.
Simon
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files.
2014-04-23 15:06 ` [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files simon
@ 2014-04-24 3:25 ` Rusty Russell
0 siblings, 0 replies; 2+ messages in thread
From: Rusty Russell @ 2014-04-24 3:25 UTC (permalink / raw)
To: simon; +Cc: Michal Malý, linux-kernel, HID CORE LAYER, Greg KH
simon@mungewell.org writes:
>> simon@mungewell.org writes:
>>> Yep I'm OK with that, however what it the recommended way to make sure
>>> that the end user is able to send changes to this /sys portal? I asked
>>> the
>>> same question before regarding the led class /sys interface, but never
>>> got
>>> any suggestions.
>>>
>>> Signed-off-by: Simon Wood <simon@mungewell.org>
>>
>> If you need that, we'll need to make an exception. That's one purpose
>> of spamming everyone with these changs...
>
>
> What's the right way of doing it?... I don't need to be 'special'. ;-)
>
> The '/sys/.../range' control allows the user to limit the rotation of the
> gaming wheel from a maximum of 900' down to match the 'car' they
> sim-driving. Probably not many people use it, but it probably should be
> assigned properly.
>
> With gaming controllers the /dev/input/event* seem to get set
> appropriately, but I'm not sure how this happens.
>
> The same /should/ also happen for all the LED class controls, I don't want
> to have to 'sudo' just to set a LED on/off. This is currently a problem
> for (at least) hid-lg, hid-sony and hid-steelseries.
> Simon
I think this is a udev duty. Someone needs to chmod/chown/chgrp the
files if you want to allow a particular group/user access (I just
checked, that works fot sysfs files).
I have no idea about HID, so I don't know how you'd figure out who that
user/group is...
Cheers,
Rusty.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2014-04-24 3:25 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <1398137612-9714-1-git-send-email-rusty@rustcorp.com.au>
[not found] ` <1398137612-9714-4-git-send-email-rusty@rustcorp.com.au>
[not found] ` <9d9a3af40f8a0da293e52610524674c8.squirrel@mungewell.org>
[not found] ` <87r44ofw1x.fsf@rustcorp.com.au>
2014-04-23 15:06 ` [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files simon
2014-04-24 3:25 ` Rusty Russell
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).