> On Jun 6, 2019, at 3:38 PM, David Howells <[email protected]> wrote:
>
> Andy Lutomirski <[email protected]> wrote:
>
>> I mean: are there cases where some action generates a notification but does
>> not otherwise have an effect visible to the users who can receive the
>> notification. It looks like the answer is probably “no”, which is good.
>
> mount_notify(). You can get a notification that someone altered the mount
> topology (eg. by mounting something). A process receiving a notification
> could then use fsinfo(), say, to reread the mount topology tree, find out
> where the new mount is and wander over there to have a look - assuming they
> have the permissions for pathwalk to succeed.
>
>
They can call fsinfo() anyway, or just read /proc/self/mounts. As far as I’m
concerned, if you have CAP_SYS_ADMIN over a mount namespace and LSM policy lets
you mount things, the of course you can get information to basically anyone who
can use that mount namespace.