|Main Archive Page > Month Archives > linux-security-module archives|
In the mm struct you have the struct vm_area_struct (mmap entry)... this struct contains the struct file (vm_file entry) and then you can get the f_path and f_mnt.
Kernel Hacking: If i really know, i can hack
GPG KeyID: 1FCEDEA1
--------- Mensagem Original --------
De: Andrew Blaich <email@example.com>
Assunto: Path of task via LSM
Data: 27/11/07 11:19
> Is there a way to retrieve the full path of the currently running task
> via a task_struct or similar structure from the view of the LSM?
> Currently, the work I am doing with LSM design requires hooking into
> bprm_alloc_security in order to read the linux_binprm structure which
> contains the path of the application as it was run. Is there a
> similar way to access the full path dynamically say if I'm checking a
> socket based LSM hook which does not receive the linux_binprm
> I have been unsuccessful in using dentry and vfsmnt from the current
> task_struct via the d_path() lookup function.
> To unsubscribe from this list: send the line "unsubscribe
> the body of a message to firstname.lastname@example.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
________________________________________________ Message sent using UebiMiau 2.7.2 - To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to email@example.com More majordomo info at http://vger.kernel.org/majordomo-info.html