From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B17A3C433F5 for ; Fri, 24 Sep 2021 23:04:45 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 91BB8610FD for ; Fri, 24 Sep 2021 23:04:45 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346032AbhIXXGS (ORCPT ); Fri, 24 Sep 2021 19:06:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:56934 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344410AbhIXXGQ (ORCPT ); Fri, 24 Sep 2021 19:06:16 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B060661039; Fri, 24 Sep 2021 23:04:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632524683; bh=8Gn10cKU7CtsiOEauZx4GtwUoFgLAEPG53mOJzrLlVQ=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=c5LlWTMhpUHgddMSAfJ9CrzhXWk/JnAM0D6mRTT/nPazU9tINDA0upOAoZ12580Je yDyeEBhLNDG47sJDpa7WHSp2oTjp9huYh8GajlG0YfWGug0h6M6T6RxRKJDhs4yKa1 pDewtrQZGTrzQVNsChGQWOvzz/DDS+G6/zJ8N38LImu9Uw+iOLU5uZg9zzWi2zes8q GzhoDpcj00urKgSs2OoJguzzuE+UqqAqPXcz1dFRSar5QmXhBDSV8SKpz+NXAcbXYE MIbc0Qe+NL4cafFPf4ajhreoaYuFzBOPWQEs8OuXnvzytnRTkMHafjh7Tv/CKc5t4s MepQjuEVvT87g== Message-ID: Date: Fri, 24 Sep 2021 16:04:39 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.1.0 Subject: Re: [RFC] Expose request_module via syscall Content-Language: en-US To: Christian Brauner Cc: Luis Chamberlain , =?UTF-8?Q?Thomas_Wei=c3=9fschuh?= , Linux API , Linux Kernel Mailing List , Jessica Yu References: <2ebf1a9d-77d5-472b-a99a-b141654725da@www.fastmail.com> <6eff0e8a-4965-437d-9273-1d9d73892e1a@t-8ch.de> <8cbf0703-5734-4e92-a6cc-12de69094f95@t-8ch.de> <20210922122523.72ypzg4pm2x6nkod@wittgenstein> <59e230b3-0e85-42ff-84a8-6b30ad0719d8@www.fastmail.com> <20210922155253.nj5dorsyv7loduws@wittgenstein> <0f209e1c-3d5c-46be-b5e7-323970112a8e@www.fastmail.com> <20210924131939.4jaou665fodiziml@wittgenstein> From: Andy Lutomirski In-Reply-To: <20210924131939.4jaou665fodiziml@wittgenstein> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/24/21 06:19, Christian Brauner wrote: > On Wed, Sep 22, 2021 at 01:06:49PM -0700, Andy Lutomirski wrote: > I just meant that the programs in the container can see the modules > available on the host. Simplest thing could be bind-mounting in the > host's module folder with suitable protection (locked read-only mount). > But yeah, it can likely be as simple as allowing it to ask for a module > and not bother telling it about what is available. > If the container gets to see host modules, interesting races when containers are migrated CRIU-style will result.