Skip to content

Commit 3294d92

Browse files
committed
Do not build Intel content restriction modules
These kernel modules are only usable if the GPU is attached to dom0. However, dom0 never has the userspace programs needed to use these modules, so the modules are unused. Worse, if mei_hdcp *was* used, it would allow external displays (which are not trusted) to communicate with the (closed-source and often out-of-date) CSME firmware, which is even more privileged than dom0.
1 parent 04967f8 commit 3294d92

File tree

1 file changed

+16
-0
lines changed

1 file changed

+16
-0
lines changed

config-qubes

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,22 @@ CONFIG_INTEL_PMC_CORE=m
158158

159159
# CONFIG_XEN_VIRTIO is not set
160160

161+
## INTEL_MEI_HDCP and DRM_AMD_DC_PDCP are for High-bandwidth Digital Content
162+
## Protection, and INTEL_MEI_PXP is for Protected Xe Path. Since the Intel CSME
163+
## and AMD Secure Processor must never be passed through to a VM, these are only
164+
## usable if there is an Intel or AMD GPU attached to dom0. However, dom0 does
165+
## not include any programs that can use these modules, so the modules are
166+
## unused. Worse, if HDCP *was* used, it would, it would allow external
167+
## displays (which are not trusted) to communicate with the (closed-source and
168+
## often out-of-date) CSME or Secure Processor firmware, which is even more
169+
## privileged than dom0.
170+
171+
# CONFIG_DRM_AMD_DC_HDCP is not set
172+
# CONFIG_INTEL_MEI_HDCP is not set
173+
174+
## PXP serves no purpose without userspace tools Qubes OS does not have.
175+
# CONFIG_INTEL_MEI_PXP is not set
176+
161177
################################################################################
162178
## TODO: from diff to old config
163179

0 commit comments

Comments
 (0)