Loading and Listing Kernel Modules
Kernel modules are loaded as required, either manually by a system administrator or automatically by the kernel. For instance, to load the PC Speaker module manually, execute the following command as the root user:lsmod command might resemble:
Be aware that an unprivileged process running inside a pod may cause some network protocol-related modules to load automatically—for example, by creating a network socket.
Blacklisting Kernel Modules
To prevent potential security risks, you can blacklist kernel modules so that they are not loaded by the system—even if triggered by certain operations like network socket creation.Example: Blacklisting the SCTP Module
The SCTP module is seldom used in Kubernetes clusters and is a common example to blacklist. Follow these steps to disable its loading:-
Create or edit a configuration file under
/etc/modprobe.d/(e.g.,/etc/modprobe.d/blacklist.conf). -
Add the following entry to the file:
.conf extension as long as it is located in the /etc/modprobe.d/ directory.
Blacklisting Multiple Modules
To also prevent the loading of the dccp module (Datagram Congestion Control Protocol), append its entry into the same file. Once done, reboot your system and confirm that the module is no longer active:After updating the configuration file, reboot your system to ensure changes take effect. Failure to do so might leave the module active, potentially exposing your system to security risks.