7bae0432a6
On Chrome OS we want to use USBguard to potentially limit access to USB devices based on policy. We however to do not want to wait for userspace to come up before initializing fixed USB devices to not regress our boot times. This patch adds option to instruct the kernel to only authorize devices connected to the internal ports. Previously we could either authorize all or none (or, by default, we'd only authorize wired devices). The behavior is controlled via usbcore.authorized_default command line option. Signed-off-by: Dmitry Torokhov <dtor@chromium.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> |
||
---|---|---|
.. | ||
CREDITS | ||
WUSB-Design-overview.txt | ||
acm.txt | ||
authorization.txt | ||
chipidea.txt | ||
dwc3.txt | ||
ehci.txt | ||
functionfs.txt | ||
gadget-testing.txt | ||
gadget_configfs.txt | ||
gadget_hid.txt | ||
gadget_multi.txt | ||
gadget_printer.txt | ||
gadget_serial.txt | ||
iuu_phoenix.txt | ||
linux-cdc-acm.inf | ||
linux.inf | ||
mass-storage.txt | ||
misc_usbsevseg.txt | ||
mtouchusb.txt | ||
ohci.txt | ||
rio.txt | ||
usb-help.txt | ||
usb-serial.txt | ||
usbdevfs-drop-permissions.c | ||
usbip_protocol.txt | ||
usbmon.txt | ||
wusb-cbaf |