From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter =?utf-8?q?M=C3=BCller?= To: development@lists.ipfire.org Subject: Question regarding legitimate loading of kernel modules during runtime Date: Mon, 05 Oct 2020 16:07:38 +0000 Message-ID: <7e85496c-a7af-eb2d-b9ac-c6a5efcc69a5@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5065011726116527008==" List-Id: --===============5065011726116527008== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello development folks, just to make sure I am not about to submit another breaking patch: Is there a= ny legitimate reason why a non-privileged user shall load kernel modules on an I= PFire machine during its runtime? Personally, I am only aware of some connection tracking stuff, but these requ= ire a reboot, thus being out of scope. Unless I overlooked something else, I woul= d like to file a patch turning dev.tty.ldisc_autoload to 0. :-) (Further information is available at https://lkml.org/lkml/2019/4/15/890) Thanks, and best regards, Peter M=C3=BCller --===============5065011726116527008==--