linux-security-module November 2007 archive
Main Archive Page > Month Archives  > linux-security-module archives
linux-security-module: Re: Path of task via LSM

Re: Path of task via LSM

From: Rodrigo Rubira Branco (BSDaemon) <rodrigo_at_nospam>
Date: Tue Nov 27 2007 - 13:03:50 GMT
To: "Andrew Blaich" <ablaich@gmail.com>, "linux-security-module@vger.kernel.org"@fjaunet.com.br


In the mm struct you have the struct vm_area_struct (mmap entry)... this struct contains the struct file (vm_file entry) and then you can get the f_path and f_mnt.

cya,

Rodrigo (BSDaemon). -- http://www.kernelhacking.com/rodrigo Kernel Hacking: If i really know, i can hack GPG KeyID: 1FCEDEA1 --------- Mensagem Original -------- De: Andrew Blaich <ablaich@gmail.com> Para: linux-security-module@vger.kernel.org <linux-security-module@vger.kernel.org> Assunto: Path of task via LSM Data: 27/11/07 11:19
>
> Is there a way to retrieve the full path of the currently running task
> via a task_struct or similar structure from the view of the LSM?
> Currently, the work I am doing with LSM design requires hooking into
> bprm_alloc_security in order to read the linux_binprm structure which
> contains the path of the application as it was run. Is there a
> similar way to access the full path dynamically say if I'm checking a
> socket based LSM hook which does not receive the linux_binprm
> structure
>
> I have been unsuccessful in using dentry and vfsmnt from the current
> task_struct via the d_path() lookup function.
> -
> To unsubscribe from this list: send the line &quot;unsubscribe
linux-security-module&quot; in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
>
>
>
>
________________________________________________ Message sent using UebiMiau 2.7.2 - To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html