Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3063034yba; Tue, 16 Apr 2019 04:02:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqwlF1dhV2lX5aQXAhwK6pGdd+P81PF1abUJcQIT+pKpQZCd4LVFSmfEne1UkXyfmmLp4PTv X-Received: by 2002:a65:6148:: with SMTP id o8mr76857138pgv.153.1555412564692; Tue, 16 Apr 2019 04:02:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555412564; cv=none; d=google.com; s=arc-20160816; b=nKLsgiLZWS4xryKd2Gi/Iqdj/q5R4kIjYFWR+TnO9h5lvV8jENfPASClqAG+MHA6JZ HbHuXBTAB32iSDje+iu34olspEfUAsYG7UYFZDw9VZthVBKo69ffbt1w0ki0tQhbmUsN 58tdPbh0nsDvtorR+S9teLYP9zLwQ0HbY2+s3EigB/X+0xEG7phmKgF2W1DD+O14cJyU q6Er1SrWgCQv3XdbdXgr7HJqPe/Ry7hKEAVZ1sDo/wwywkfC4M/a3Xpqpmef+9pb1bd6 z1jJlklL6iGxk0nJeX2Ur1Rxb3ws7M4CGcbDuYN41CizAPqElmGA7vTnP0xEzvtnB5fz jwrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=mCrCb2ur7uddHu5KhTg4UOJdkH1TnjEEFovvJuv6SwM=; b=CwTdFFGBmPuOeNWSUMyG/CQqdPopiX1GvEQvjLnQhoBM/CPZ0wHcVyM1DFbTABBFX3 iE01yhEy8FMZSApj+xHSUUvV6pcBEBnT9fY/x6KKRSS8m3pEJm249rdR7gzkbUh+bQhg tZXLLmdYr13GtM8WnvJ/AoAOToIh9CSc9uHcDnkyanr3YXUqW4mzDUSNZ8gG+A9M/mth se/5rGIw8CHUkUu1HM68pqLY3193AkvX+xDLwbpYrXqjXsseZCHVilUYiD6+C8axto/T ndOnO/44FGtbCeqX4y44P9smH3ZBgRCkjRQV3RubWBeTLTdoziKGmJHlZHzF3/I94DzZ Yegw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2si46826734pgl.527.2019.04.16.04.02.26; Tue, 16 Apr 2019 04:02:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727164AbfDPLBt (ORCPT + 99 others); Tue, 16 Apr 2019 07:01:49 -0400 Received: from mga09.intel.com ([134.134.136.24]:12063 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726313AbfDPLBt (ORCPT ); Tue, 16 Apr 2019 07:01:49 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 Apr 2019 04:01:48 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,357,1549958400"; d="scan'208";a="165171621" Received: from lahna.fi.intel.com (HELO lahna) ([10.237.72.157]) by fmsmga001.fm.intel.com with SMTP; 16 Apr 2019 04:01:45 -0700 Received: by lahna (sSMTP sendmail emulation); Tue, 16 Apr 2019 14:01:44 +0300 Date: Tue, 16 Apr 2019 14:01:44 +0300 From: Mika Westerberg To: Srinivas Kandagatla Cc: gregkh@linuxfoundation.org, maxime.ripard@bootlin.com, gkohli@codeaurora.org, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] nvmem: core: add NVMEM_SYSFS Kconfig Message-ID: <20190416110144.GS2654@lahna.fi.intel.com> References: <20190416095924.17428-1-srinivas.kandagatla@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190416095924.17428-1-srinivas.kandagatla@linaro.org> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 16, 2019 at 10:59:24AM +0100, Srinivas Kandagatla wrote: > Many nvmem providers are not very keen on having default sysfs > nvmem entry, as most of the usecases for them are inside kernel > itself. And in some cases read/writes to some areas in nvmem are > restricted and trapped at secure monitor level, so accessing them > from userspace would result in board reboots. > > This patch adds new NVMEM_SYSFS Kconfig to make binary sysfs entry > an optional one. This provision will give more flexibility to users. > This patch also moves existing sysfs code to a new file so that its > not compiled in when its not really required. > > Signed-off-by: Srinivas Kandagatla Reviewed-by: Mika Westerberg