>> KERNEL!="sd[a-z][0-9]", GOTO="end_usb_key_filter" > > Nope, way too late, you want to catch things _before_ the usb-storage > driver binds to it, right? > > So match on a usb interfaces, and look at the class values to match the > usb storage ones. ÂIf they are a match, then go up a level and disable > the device by writing a 0 to the "authorized" file. > >> SUBSYSTEM=="usb", ATTRS{serial}=="xx1", GOTO="end_usb_key_filter" >> SUBSYSTEM=="usb", ATTRS{serial}=="xx2", GOTO="end_usb_key_filter" >> SUBSYSTEM=="usb", RUN="echo 0 >/sys/xxx" >> >> or just: >> >> SUBSYSTEM=="usb", ATTRS{serial}=="xx1|xx2|xx3", GOTO="end_usb_key_filter" >> SUBSYSTEM=="usb", RUN="echo 0 >/sys/xxx" >> LABEL="end_usb_key_filter" > > That might work, but watch out that you don't deactivate your USB > keyboards :) finally I found this - explaining what this USB authorisation is: http://www.mjmwired.net/kernel/Documentation/usb/authorization.txt tomorrow I will play with the code. Vilius -- To unsubscribe from this list: send the line "unsubscribe linux-hotplug" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html