lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 15 Sep 2021 17:49:34 +0200 From: Thomas Weißschuh <thomas@...ch.de> To: linux-api@...r.kernel.org, linux-kernel@...r.kernel.org, Luis Chamberlain <mcgrof@...nel.org>, Jessica Yu <jeyu@...nel.org> Subject: [RFC] Expose request_module via syscall Hi, I would like to propose a new syscall that exposes the functionality of request_module() to userspace. Propsed signature: request_module(char *module_name, char **args, int flags); Where args and flags have to be NULL and 0 for the time being. Rationale: We are using nested, privileged containers which are loading kernel modules. Currently we have to always pass around the contents of /lib/modules from the root namespace which contains the modules. (Also the containers need to have userspace components for moduleloading installed) The syscall would remove the need for this bookkeeping work. If this has a chance of getting accepted I would be happy to provide an implementation. Thanks, Thomas
Powered by blists - more mailing lists