Jump to content

Talk:Loadable kernel module

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 93.129.46.186 (talk) at 09:42, 5 May 2013 (Loadable kernel module - Windows: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconLinux Start‑class High‑importance
WikiProject iconThis article is within the scope of WikiProject Linux, a collaborative effort to improve the coverage of Linux on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
HighThis article has been rated as High-importance on the project's importance scale.

This article contains mostly general info about LKM

This article contains mostly general info about LKM and i don't think it needs to be Linux-specific. Linux is OK as an example, though. ~~helix84 15:32, 11 January 2006 (UTC)[reply]

So:

  • add more Technical details on this page
  • use the data inside this article on a generalistic module page

00 tux 01:17, 29 April 2006 (UTC)[reply]

KLM or LKM ?

I have heard of LKMs referred-to as KLMs (Kernel Loadable Modules). Is this common usage? Should the KLM initialism also be captured here? ppblais 13:23, 27 April 2006 (UTC)

explain the "loadable"! how is a module loaded an unloaded


I tagged the article as needing cleanup, for several reasons, including what helix84 already mentioned. 70.224.53.241 00:14, 26 June 2006 (UTC)[reply]

Rebuilding in Windows

Just wondering, about the rebooting, I didn't know that the kernel in Windows has to be rebuilt before rebooting -- is this true? —The preceding unsigned comment was added by 82.39.136.51 (talk) 12:08, 17 April 2007 (UTC). hello sumit — Preceding unsigned comment added by 101.221.130.134 (talk) 12:42, 31 August 2012 (UTC)[reply]

Symbol?

The Linux maintainers tolerate the distribution of proprietary modules, but allow symbols to be marked as only available to GPL modules.

What is a symbol? --Abdull 11:00, 12 November 2007 (UTC)[reply]

Basically, "symbol" means a function (routine) or a variable that has a name and is accessible from other pieces of executable. In other words, "symbols" stand for routines and variables that kernel modules may call/use. Trasz (talk) 15:51, 7 January 2009 (UTC)[reply]

Detail on loading

The current article seems to provide little detail on the actual process of loading and unloading LKMs. Can anyone provide more information on this, even if it has to be OS-specific? « Aaron Rotenberg « Talk « 05:35, 23 January 2008 (UTC)[reply]

Real nature of "tainting"?

Isn't there a category of code that is "open" (in the sense of publicly disclosed) but still "proprietary" (copyrighted or otherwise legally controlled)? Are maintainers put off only by the inability to read the source code, or is there also an issue of tainted "free-ness?" Mrnatural (talk) 19:52, 12 February 2008 (UTC)[reply]

API/ABI stability on FreeBSD

With revert 261265695, the reference to ABI Breakage in RELENG_7 (by a member of the FreeBSD release engineering team) was removed, because "it may not be broken. this was a special case, since it didn't affect anything - no filesystem in ports uses that part of the api." Is there a source for that claim? I do not really question this, because neither UPDATING for RELENG_7 nor the 7.1 release notes contain anything about it and neither the announcement nor the commit message list any real consequences, which I would expect. (Anyhow, I thought rebuilding *-kmod ports would have been necessary.) 85.177.240.32 (talk) 21:14, 3 January 2009 (UTC)[reply]

As far as I know, the only filesystem in the Ports right now is Fuse. And it's not affected, see http://lists.freebsd.org/pipermail/freebsd-stable/2008-July/043974.html. Trasz (talk) 15:57, 7 January 2009 (UTC)[reply]

Section "Security" addendum re: KSplice

Mentioning of a new idea in Linux-Systems to use LKM for hot-patching the kernel might shed a different light on the security of LKM. Or maybe it deserves a entry in See also. 91.37.162.218 (talk) 14:49, 5 July 2009 (UTC)[reply]

Security section is a bit unfounded

I don't think that the security section should exist in this article. Kernels that use loadable modules are no less secure than regular monolithic kernels that do not. This is because, assuming someone has the ability to replace (or add) a root kit module, then that means the attacker can probably replace the kernel image itself. Maybe I'm wrong, but it doesn't seem like a valid section. — Preceding unsigned comment added by 24.23.193.92 (talk) 00:31, 24 August 2011 (UTC)[reply]

The section already says that, but also explains that an LKM can make it easier to hide the attack. I added a source for that. Jeff Song (talk) 20:05, 12 December 2011 (UTC)[reply]

Loadable kernel module - Windows

Windows does NOT use LKM. Its a microkernel OS and hence its modules do not represent LKM. If you think otherwise, please go to Windows article and change its kernel to monolithic type. Until then and until someone also proves its a mono kernel using LKM as extensions, I remove any Windows references from article. 93.129.46.186 (talk) 09:42, 5 May 2013 (UTC)[reply]