Hi Dimitri, is that still a thing? should we involve the core team on that as well?
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1948040 Title: modprobe.d is not honored on uc20 Status in snapd: New Status in linux package in Ubuntu: Incomplete Bug description: Ubuntu kernels by default ship modprobe.d that excludes many modules from loading: # Kernel supplied blacklist for linux 5.4.0-89-generic amd64 # modprobe.d/common.conf # LP:1434842 -- disable OSS drivers by default to allow pulseaudio to emulate blacklist snd-mixer-oss blacklist snd-pcm-oss # Autogenerated watchdog blacklist blacklist acquirewdt blacklist advantechwdt blacklist ahc1ec0-wdt blacklist alim1535_wdt blacklist alim7101_wdt blacklist cadence_wdt blacklist cpu5wdt blacklist da9052_wdt blacklist da9055_wdt blacklist da9062_wdt blacklist da9063_wdt blacklist dw_wdt blacklist ebc-c384_wdt blacklist eurotechwdt blacklist f71808e_wdt blacklist hpwdt blacklist i6300esb blacklist iTCO_vendor_support blacklist iTCO_wdt blacklist ib700wdt blacklist ibmasr blacklist ie6xx_wdt blacklist it8712f_wdt blacklist it87_wdt blacklist kempld_wdt blacklist machzwd blacklist max63xx_wdt blacklist mei_wdt blacklist mena21_wdt blacklist menf21bmc_wdt blacklist menz69_wdt blacklist mlx_wdt blacklist ni903x_wdt blacklist nic7018_wdt blacklist nv_tco blacklist of_xilinx_wdt blacklist pc87413_wdt blacklist pcwd_pci blacklist pcwd_usb blacklist pretimeout_panic blacklist rave-sp-wdt blacklist retu_wdt blacklist sbc60xxwdt blacklist sbc_epx_c3 blacklist sbc_fitpc2_wdt blacklist sc1200wdt blacklist sch311x_wdt blacklist smsc37b787_wdt blacklist softdog blacklist sp5100_tco blacklist tqmx86_wdt blacklist twl4030_wdt blacklist via_wdt blacklist w83627hf_wdt blacklist w83877f_wdt blacklist w83977f_wdt blacklist wafer5823wdt blacklist wdat_wdt blacklist wdt_pci blacklist wm831x_wdt blacklist wm8350_wdt blacklist xen_wdt blacklist ziirave_wdt However kernel snaps do not provide modprobe.d nor they are used by default. Is pc-kernel supposed to skip shipping those? Should there be modprobe.d in the core20 snap that prevents these known modules from loading by default? Also I'm not too sure about the watchdog modules exclusion, given that systemd can operate watchdogs by default, hence it shouldn't be too dangerous to autoenable them? To manage notifications about this bug go to: https://bugs.launchpad.net/snapd/+bug/1948040/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp