* Re: [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files. [not found] ` <87r44ofw1x.fsf@rustcorp.com.au> @ 2014-04-23 15:06 ` simon 2014-04-24 3:25 ` Rusty Russell 0 siblings, 1 reply; 2+ messages in thread From: simon @ 2014-04-23 15:06 UTC (permalink / raw) To: Rusty Russell; +Cc: "Michal Malý", linux-kernel, HID CORE LAYER > simon@mungewell.org writes: >>> In line with practice for module parameters, we're adding a build-time >>> check that sysfs files aren't world-writable. >> >> So this is the equivalent of 'chmod 774 ...' rather than 'chmod >> 777...'? > > Yep. Though not sure why it was 777 rather than 666... > >> Yep I'm OK with that, however what it the recommended way to make sure >> that the end user is able to send changes to this /sys portal? I asked >> the >> same question before regarding the led class /sys interface, but never >> got >> any suggestions. >> >> Signed-off-by: Simon Wood <simon@mungewell.org> > > If you need that, we'll need to make an exception. That's one purpose > of spamming everyone with these changs... What's the right way of doing it?... I don't need to be 'special'. ;-) The '/sys/.../range' control allows the user to limit the rotation of the gaming wheel from a maximum of 900' down to match the 'car' they sim-driving. Probably not many people use it, but it probably should be assigned properly. With gaming controllers the /dev/input/event* seem to get set appropriately, but I'm not sure how this happens. The same /should/ also happen for all the LED class controls, I don't want to have to 'sudo' just to set a LED on/off. This is currently a problem for (at least) hid-lg, hid-sony and hid-steelseries. Simon ^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files. 2014-04-23 15:06 ` [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files simon @ 2014-04-24 3:25 ` Rusty Russell 0 siblings, 0 replies; 2+ messages in thread From: Rusty Russell @ 2014-04-24 3:25 UTC (permalink / raw) To: simon; +Cc: Michal Malý, linux-kernel, HID CORE LAYER, Greg KH simon@mungewell.org writes: >> simon@mungewell.org writes: >>> Yep I'm OK with that, however what it the recommended way to make sure >>> that the end user is able to send changes to this /sys portal? I asked >>> the >>> same question before regarding the led class /sys interface, but never >>> got >>> any suggestions. >>> >>> Signed-off-by: Simon Wood <simon@mungewell.org> >> >> If you need that, we'll need to make an exception. That's one purpose >> of spamming everyone with these changs... > > > What's the right way of doing it?... I don't need to be 'special'. ;-) > > The '/sys/.../range' control allows the user to limit the rotation of the > gaming wheel from a maximum of 900' down to match the 'car' they > sim-driving. Probably not many people use it, but it probably should be > assigned properly. > > With gaming controllers the /dev/input/event* seem to get set > appropriately, but I'm not sure how this happens. > > The same /should/ also happen for all the LED class controls, I don't want > to have to 'sudo' just to set a LED on/off. This is currently a problem > for (at least) hid-lg, hid-sony and hid-steelseries. > Simon I think this is a udev duty. Someone needs to chmod/chown/chgrp the files if you want to allow a particular group/user access (I just checked, that works fot sysfs files). I have no idea about HID, so I don't know how you'd figure out who that user/group is... Cheers, Rusty. ^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2014-04-24 3:25 UTC | newest] Thread overview: 2+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- [not found] <1398137612-9714-1-git-send-email-rusty@rustcorp.com.au> [not found] ` <1398137612-9714-4-git-send-email-rusty@rustcorp.com.au> [not found] ` <9d9a3af40f8a0da293e52610524674c8.squirrel@mungewell.org> [not found] ` <87r44ofw1x.fsf@rustcorp.com.au> 2014-04-23 15:06 ` [PATCH 3/9] drivers/hid/hid-lg4ff.c: avoid world-writable sysfs files simon 2014-04-24 3:25 ` Rusty Russell
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).