lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2024020903-october-placidly-20cc@gregkh>
Date: Fri, 9 Feb 2024 10:47:14 +0000
From: Greg KH <gregkh@...uxfoundation.org>
To: niko.mauno@...sala.com
Cc: linux-usb@...r.kernel.org, linux-kernel@...r.kernel.org,
	vesa.jaaskelainen@...sala.com, geert@...ux-m68k.org
Subject: Re: [PATCH v3 1/2] usb: core: Amend initial authorized_default value

On Fri, Feb 09, 2024 at 11:46:50AM +0200, niko.mauno@...sala.com wrote:
> From: Niko Mauno <niko.mauno@...sala.com>
> 
> Since the wireless USB implementation has been removed and since the
> behavior with authorized_default values -1 and 1 is now effectively
> same, change the initial value to latter in order to stop using the
> leftover value. The former value can still be passed as a module
> parameter to retain backwards compatibility.
> 
> Signed-off-by: Niko Mauno <niko.mauno@...sala.com>
> ---
>  drivers/usb/core/hcd.c | 6 ++----
>  1 file changed, 2 insertions(+), 4 deletions(-)

Isn't this series already in my tree?

confused,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ