lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4F1BD5C4.9000006@msgid.tls.msk.ru>
Date:	Sun, 22 Jan 2012 13:24:20 +0400
From:	Michael Tokarev <mjt@....msk.ru>
To:	Linux-kernel <linux-kernel@...r.kernel.org>
Subject: overwriting module params given on kernel command line?

Hello.

I noticed that recent kernels does not allow overwriting
module parameters given on kernel command line anymore.

One particular example of this is ipv6.disable.  I usually
boot kernel with ipv6.disable=1, because all these systems
does not have ipv6 connectivity anyway and v6 isn't needed.
But I remember that in earlier versions it was possible to
specify this parameter in modprobe line:

 rmmod ipv6; modprobe ipv6 disable=0

and v6 were enabled after this reload (rmmod is possible
while it is disabled).  It works in, at least, 2.6.32
kernels.

But now, in 3.0, the modprobe command line parameter appears
to be ignored and the one specified on _kernel_ command
line takes precedence.

To me, it does not look right, I'd expect modprobe command
line to be "stronger" than kernel command line.

So, am I right that kernel command line has more "weight"
here, and if yes, why?

Thanks,

/mjt
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ