WSL2-Linux-Kernel/Documentation/usb
Dmitry Torokhov 7bae0432a6 usb: core: add option of only authorizing internal devices
On Chrome OS we want to use USBguard to potentially limit access to USB
devices based on policy. We however to do not want to wait for userspace to
come up before initializing fixed USB devices to not regress our boot
times.

This patch adds option to instruct the kernel to only authorize devices
connected to the internal ports. Previously we could either authorize
all or none (or, by default, we'd only authorize wired devices).

The behavior is controlled via usbcore.authorized_default command line
option.

Signed-off-by: Dmitry Torokhov <dtor@chromium.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2019-02-22 09:27:55 +01:00
..
CREDITS
WUSB-Design-overview.txt
acm.txt
authorization.txt usb: core: add option of only authorizing internal devices 2019-02-22 09:27:55 +01:00
chipidea.txt
dwc3.txt
ehci.txt
functionfs.txt
gadget-testing.txt
gadget_configfs.txt
gadget_hid.txt
gadget_multi.txt
gadget_printer.txt
gadget_serial.txt
iuu_phoenix.txt
linux-cdc-acm.inf
linux.inf
mass-storage.txt
misc_usbsevseg.txt
mtouchusb.txt
ohci.txt
rio.txt
usb-help.txt
usb-serial.txt
usbdevfs-drop-permissions.c
usbip_protocol.txt
usbmon.txt
wusb-cbaf