[RFC][PATCH 00/10] Mount, FS, Block and Keyrings notifications [ver #3]

Andy Lutomirski luto at amacapital.net
Thu Jun 6 22:42:06 UTC 2019



> On Jun 6, 2019, at 3:38 PM, David Howells <dhowells at redhat.com> wrote:
> 
> Andy Lutomirski <luto at amacapital.net> wrote:
> 
>> I mean: are there cases where some action generates a notification but does
>> not otherwise have an effect visible to the users who can receive the
>> notification. It looks like the answer is probably “no”, which is good.
> 
> mount_notify().  You can get a notification that someone altered the mount
> topology (eg. by mounting something).  A process receiving a notification
> could then use fsinfo(), say, to reread the mount topology tree, find out
> where the new mount is and wander over there to have a look - assuming they
> have the permissions for pathwalk to succeed.
> 
> 

They can call fsinfo() anyway, or just read /proc/self/mounts. As far as I’m concerned, if you have CAP_SYS_ADMIN over a mount namespace and LSM policy lets you mount things, the of course you can get information to basically anyone who can use that mount namespace.



More information about the Linux-security-module-archive mailing list