Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759808Ab2EVDl7 (ORCPT ); Mon, 21 May 2012 23:41:59 -0400 Received: from mga03.intel.com ([143.182.124.21]:50421 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759289Ab2EVDl6 convert rfc822-to-8bit (ORCPT ); Mon, 21 May 2012 23:41:58 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.71,315,1320652800"; d="scan'208";a="102685992" From: "Du, ChangbinX" To: David Rientjes CC: "gregkh@linuxfoundation.org" , Sergei Shtylyov , "mina86@mina86.com" , "Fleming, Matt" , "balbi@ti.com" , "hpa@zytor.com" , "linux-kernel@vger.kernel.org" , "linux-usb@vger.kernel.org" Subject: RE: [Resend PATCH v2] testusb: add path /dev/bus/usb to default search paths of usbfs Thread-Topic: [Resend PATCH v2] testusb: add path /dev/bus/usb to default search paths of usbfs Thread-Index: AQHNN7qyG7Zv5VtpIkaxHOeRBAtVM5bUgnMAgACkjhA= Date: Tue, 22 May 2012 03:41:54 +0000 Message-ID: <0C18FE92A7765D4EB9EE5D38D86A563A063A1A@SHSMSX101.ccr.corp.intel.com> References: <0C18FE92A7765D4EB9EE5D38D86A563A062E6C@SHSMSX101.ccr.corp.intel.com> <0C18FE92A7765D4EB9EE5D38D86A563A06388E@SHSMSX101.ccr.corp.intel.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1900 Lines: 40 On Tue, 22 May 2012, Du, ChangbinX wrote: > As real device-nodes managed by udev whose nodes lived in /dev/bus/usb are mostly used today, let testusb tool use that directory as one default path make tool be more convenient to use. > > Signed-off-by: Du Changbin > --- > tools/usb/testusb.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/tools/usb/testusb.c b/tools/usb/testusb.c index > 6e0f567..82d7c59 100644 > --- a/tools/usb/testusb.c > +++ b/tools/usb/testusb.c > @@ -358,6 +358,7 @@ static const char *usbfs_dir_find(void) { > static char usbfs_path_0[] = "/dev/usb/devices"; > static char usbfs_path_1[] = "/proc/bus/usb/devices"; > + static char udev_usb_path[] = "/dev/bus/usb"; > > static char *const usbfs_paths[] = { > usbfs_path_0, usbfs_path_1 > @@ -376,6 +377,10 @@ static const char *usbfs_dir_find(void) > } > } while (++it != end); > > + /* real device-nodes managed by udev */ > + if (access(udev_usb_path, F_OK) == 0) > + return udev_usb_path; > + > return NULL; > } > Two issues with this: F_OK only guarantees that the path exists, it does not guarantee that it is readable like this function guarantees for usbfs_paths, and access() shouldn't be used because of its security implications, you're better off using open() and testing for fd. Hello, David. I think this function doesn't need check the permission. What this function need do is to find the usbfs mount point. If the path exists but cannot read, we cannot report as it's not exits. And when we read files, open() will return an error and user can check if it's need to upgrade his access right. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/