Changeset e77b014 for postlfs


Ignore:
Timestamp:
08/25/2023 12:36:13 PM (10 months ago)
Author:
Xi Ruoyao <xry111@…>
Branches:
12.0, 12.1, ken/TL2024, ken/tuningfonts, lazarus, plabs/newcss, python3.11, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, xry111/llvm18
Children:
eb0031c
Parents:
78d568a
git-author:
Xi Ruoyao <xry111@…> (08/25/2023 12:29:00 PM)
git-committer:
Xi Ruoyao <xry111@…> (08/25/2023 12:36:13 PM)
Message:

Remove outdated text about usbfs

The usbfs psuedo file system has been removed since Linux 3.5.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/config/devices.xml

    r78d568a re77b014  
    7777      successfully, the permissions have to be set correctly. By default, due
    7878      to security concerns, all raw USB devices are owned by user root and
    79       group usb, and have 0664 permissions (the read access is needed, e.g.,
     79      group root, and have 0664 permissions (the read access is needed, e.g.,
    8080      for lsusb to work and for programs to access USB hubs). Packages (such
    8181      as SANE and libgphoto2) containing userspace USB device drivers also
     
    8888
    8989    <para>
    90       There is one situation when such fine-grained access control with
    91       pre-generated udev rules doesn't work. Namely, PC emulators such as KVM,
    92       QEMU and VirtualBox use raw USB device nodes to present arbitrary USB
    93       devices to the guest operating system (note: patches are needed in order
    94       to get this to work without the obsolete /proc/bus/usb mount point
    95       described below). Obviously, maintainers of these packages cannot know
    96       which USB devices are going to be connected to the guest operating
    97       system. You can either write separate udev rules for all needed USB
    98       devices yourself, or use the default catch-all "usb" group, members
    99       of which can send arbitrary commands to all USB devices.
    100     </para>
    101 
    102     <para>
    10390      Before Linux-2.6.15, raw USB device access was performed not with
    10491      /dev/bus/usb/BBB/DDD device nodes, but with /proc/bus/usb/BBB/DDD
    105       pseudofiles. Some applications (e.g., VMware Workstation) still use only
    106       this deprecated technique and can't use the new device nodes. For them to
    107       work, use the "usb" group, but remember that members will have
    108       unrestricted access to all USB devices.  To create the fstab entry for
    109       the obsolete usbfs filesystem:
    110     </para>
    111 
    112 <screen><literal>usbfs  /proc/bus/usb  usbfs  devgid=14,devmode=0660  0  0</literal></screen>
    113 
    114     <note>
    115       <para>
    116         Adding users to the "usb" group is inherently insecure, as they can
    117         bypass access restrictions imposed through the driver-specific USB
    118         device nodes. For instance, they can read sensitive data from USB
    119         hard drives without being in the "disk" group. Avoid adding users
    120         to this group, if you can.
    121     </para>
    122     </note>
     92      pseudofiles. Some applications still use only
     93      this deprecated technique and can't use the new device nodes.  They
     94      cannot work with Linux kernel version 3.5 or newer.  If you need to
     95      run such an application, contact the developer of it for a fix.
     96    </para>
    12397
    12498  </sect2>
Note: See TracChangeset for help on using the changeset viewer.