Comment by regentbowerbird
Comment by regentbowerbird 19 hours ago
You only have to serve those requests if you distribute your changes yourself.
So presumably as a hardware company you'd be offering your hardware with your custom linux installed, and then people wanting to audit or hack the product they bought would request the code from you.
This is GPL2 - there is no requirement that you be able to install/use/hack the software, only that you get the same source.