From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932234AbcFNUvk (ORCPT ); Tue, 14 Jun 2016 16:51:40 -0400 Received: from out3-smtp.messagingengine.com ([66.111.4.27]:38751 "EHLO out3-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752184AbcFNUvi (ORCPT ); Tue, 14 Jun 2016 16:51:38 -0400 X-Sasl-enc: E5waP55yDbuXjqkTSKUm+I8R3LVCoWXKnFLkZR00vi21 1465937497 Date: Tue, 14 Jun 2016 17:51:34 -0300 From: Henrique de Moraes Holschuh To: Christoph Hellwig Cc: Prarit Bhargava , linux-kernel@vger.kernel.org, Jonathan Corbet , Rusty Russell , linux-doc@vger.kernel.org Subject: Re: [PATCH] Add kernel parameter to blacklist modules Message-ID: <20160614205134.GA16214@khazad-dum.debian.net> References: <1465821161-13889-1-git-send-email-prarit@redhat.com> <20160614171702.GA20693@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160614171702.GA20693@infradead.org> X-GPG-Fingerprint1: 4096R/39CB4807 C467 A717 507B BAFE D3C1 6092 0BD9 E811 39CB 4807 User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 14 Jun 2016, Christoph Hellwig wrote: > On Mon, Jun 13, 2016 at 08:32:41AM -0400, Prarit Bhargava wrote: > > Blacklisting a module in linux has long been a problem. The process of > > blacklisting a module has changed over time, and it seems that every OS > > does it slightly differently and depends on the age of the init system > > used on that OS. > > And why would we care about blacklisting a module? Because the "Current Best Practice" way to help users blacklist modules that won't drag you to nasty places trying to ensure they did it right (i.e. "mv" the .ko file away then trigger an initramfs update and reboot) just covers situations where the system actually boots/installs mostly fine in the first place. So, yes, such a feature looks like it would be rather useful, to the point that I'd even advocate for it to be backported (once it has been in a released mainline kernel for a while to remove any risk of regressions, of course). And if such a module blacklist feature ends up being invoked by the "nuke_module_from_orbit=" parameter, I will pay the author (and the subsystem maintainer that manages to get that merged) a couple beers should we ever meet in real life :-) -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh