-
Notifications
You must be signed in to change notification settings - Fork 56
Refresh /etc/modprobe.d/* blacklisting and disabling
#340
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Split and replaced by brcmsmac and brcmfmac in kernel 2.6.39
|
Some things that could use discussion:
Some things that need fixed before or after merge:
|
|
Thank you for the review. Regarding MSRs, I should have updated the description to be more explicitly encompassing of other reasons to disable these modules on top of the ability to write to memory. These includes:
The Intel documentation you provided also gives an excellent reasoning for their blocking.
Hence I will go update the description to also include the importance of blocking even user read access given malicious application can abuse these. Would you agree? Regarding, the Please let me know if you have any further suggestions. |
Yes, that makes good sense to me. |
ArrayBolt3
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Merged into my arraybolt3/trixie branch, thank you!
This pull request updates our list of blacklisted and disabled kernel modules.
The last major updates were done by us around July 2024 in #230, #232, #234, #236, #237, #238, and #245. There were also numerous updates by others not using the GitHub PR system and so harder to link.
This current refresh updates documentation, relocates a few things under better headings, moves some modules from blacklisted to disabled, and adds more disabled modules.
The biggest change is incorporating more disabled file systems form secureblue's config. These have all been used for a lengthy period sometime and so should be considered free of any obvious breakages.
Changes
Primarily disables more uncommon and legacy file systems.
Mandatory Checklist
Terms of Service, Privacy Policy, Cookie Policy, E-Sign Consent, DMCA, Imprint
Optional Checklist
The following items are optional but might be requested in certain cases.