aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/modules/security/lock-kernel-modules.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/modules/security/lock-kernel-modules.nix')
-rw-r--r--nixpkgs/nixos/modules/security/lock-kernel-modules.nix48
1 files changed, 48 insertions, 0 deletions
diff --git a/nixpkgs/nixos/modules/security/lock-kernel-modules.nix b/nixpkgs/nixos/modules/security/lock-kernel-modules.nix
new file mode 100644
index 00000000000..fc9e7939d81
--- /dev/null
+++ b/nixpkgs/nixos/modules/security/lock-kernel-modules.nix
@@ -0,0 +1,48 @@
+{ config, lib, ... }:
+
+with lib;
+
+{
+ meta = {
+ maintainers = [ maintainers.joachifm ];
+ };
+
+ options = {
+ security.lockKernelModules = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ Disable kernel module loading once the system is fully initialised.
+ Module loading is disabled until the next reboot. Problems caused
+ by delayed module loading can be fixed by adding the module(s) in
+ question to <option>boot.kernelModules</option>.
+ '';
+ };
+ };
+
+ config = mkIf config.security.lockKernelModules {
+ boot.kernelModules = concatMap (x:
+ if x.device != null
+ then
+ if x.fsType == "vfat"
+ then [ "vfat" "nls-cp437" "nls-iso8859-1" ]
+ else [ x.fsType ]
+ else []) config.system.build.fileSystems;
+
+ systemd.services.disable-kernel-module-loading = rec {
+ description = "Disable kernel module loading";
+
+ wantedBy = [ config.systemd.defaultUnit ];
+
+ after = [ "systemd-udev-settle.service" "firewall.service" "systemd-modules-load.service" ] ++ wantedBy;
+
+ unitConfig.ConditionPathIsReadWrite = "/proc/sys/kernel";
+
+ serviceConfig = {
+ Type = "oneshot";
+ RemainAfterExit = true;
+ ExecStart = "/bin/sh -c 'echo -n 1 >/proc/sys/kernel/modules_disabled'";
+ };
+ };
+ };
+}