Received: by 10.223.185.111 with SMTP id b44csp646352wrg; Fri, 9 Mar 2018 10:57:09 -0800 (PST) X-Google-Smtp-Source: AG47ELvl7nEMabqiVF3odsrUltnK1BKD2jGTZ1hAK2+A1pCJf4I57pzySw5aPrZ+nLYShFS57wpx X-Received: by 2002:a17:902:8f96:: with SMTP id z22-v6mr29111863plo.169.1520621829882; Fri, 09 Mar 2018 10:57:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520621829; cv=none; d=google.com; s=arc-20160816; b=vS2CCNfC88p2D2EwltFtGz1tu5rZ2MTmORiC5xYe9YFNLQ1rXVwqMBcuZ1OuttsnmA e5y/9x+zZW8Uq4WAB+K1dNRddaHHcSA2oWyXor3xqPfmxiOG+O+ooJSnQALuZaxf7JhS yGZ9GbwshltZRdla6giLNp5C6mtODEXPcD7Qn6LcsLzoO5lR+hwZw8cVBYzpAnICzkX2 m7iwFCyqlVw4ahhawK2itUfiShFD6CgkREvzGTObzVbMNp1moxAPbwHX0+gT/vMf1XCw 3mVTBI55l+08xNU/obBCCAG7ptlcZ+Bt0hq38ZTPPk/UR0QHmwnts5EUqi4WBdYodk5t s4Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date :arc-authentication-results; bh=QB+iPaJ0+1dXum6HJC1wC2BN2p2zsNLbcYaUrw4TvCY=; b=JGXllkPZkGRojqEthxhl0oNNlOBg5GPZOiMVD7YerNY5h5lvvqAbZkUzRB/Fot3s9T iGqCKQ6v889LTmD4jeDm3HZ8inosxRmG5rp2nfvG83LOg0WMrPjJVyi6D166WkTWFT0j 3JgwvVnZFXN8pbHnH8A4RhQTW46Mu6Trt3w81srS32DE2dTc0S98LgfdUSlY+1WQ2gzY 3KzROWXxyj4d4qoxXbgk7x2oxTa/z6lR6/UMrsqOejZsHXCAWulu2myFhlJv4NEYDrWJ Pb/SpoloDjIOiWH83wBiI4ypxnEeBiNQ2ru/FzHx9WZCwuMFOwqRYftasL4nrOh6akF5 HoEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 12si1302295pfi.351.2018.03.09.10.56.55; Fri, 09 Mar 2018 10:57:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932508AbeCISzy (ORCPT + 99 others); Fri, 9 Mar 2018 13:55:54 -0500 Received: from shards.monkeyblade.net ([184.105.139.130]:55228 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932230AbeCISzx (ORCPT ); Fri, 9 Mar 2018 13:55:53 -0500 Received: from localhost (67.110.78.66.ptr.us.xo.net [67.110.78.66]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 768E513D25A45; Fri, 9 Mar 2018 10:55:51 -0800 (PST) Date: Fri, 09 Mar 2018 13:55:50 -0500 (EST) Message-Id: <20180309.135550.385837861865623769.davem@davemloft.net> To: ast@fb.com Cc: luto@amacapital.net, gregkh@linuxfoundation.org, luto@kernel.org, torvalds@linux-foundation.org, keescook@chromium.org, ast@kernel.org, tixxdz@gmail.com, viro@zeniv.linux.org.uk, daniel@iogearbox.net, mcgrof@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@fb.com, linux-api@vger.kernel.org Subject: Re: [PATCH net-next] modules: allow modprobe load regular elf binaries From: David Miller In-Reply-To: <74e26cc0-9e72-f03b-5396-f3480921f234@fb.com> References: <20180309181527.GA15803@kroah.com> <74e26cc0-9e72-f03b-5396-f3480921f234@fb.com> X-Mailer: Mew version 6.7 on Emacs 25.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Fri, 09 Mar 2018 10:55:52 -0800 (PST) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexei Starovoitov Date: Fri, 9 Mar 2018 10:50:49 -0800 > On 3/9/18 10:23 AM, Andy Lutomirski wrote: >> It might not be totally crazy to back it by tmpfs. > > interesting. how do you propose to do it? > Something like: > - create /umh_module_tempxxx dir > - mount tmpfs there > - copy elf into it and exec it? I think the idea is that it's an internal tmpfs mount that only the kernel has access too. And I don't think that even hurts your debuggability concerns. The user can just attach using the foo.ko file in the actual filesystem.