Date: Tue, 22 Aug 2006 16:27:30 +0200 From: Lutz Boehne <lboehne@damogran.de> To: freebsd-hackers@freebsd.org Subject: Re: Aqcuiring full path to running process from outside the kernel Message-ID: <44EB1452.4060004@damogran.de> In-Reply-To: <8664glnfhw.fsf@xps.des.no> References: <017601c6c486$6477c370$0a0aa8c0@rivendell> <17640.52899.432083.511555@bhuda.mired.org> <86sljqnzbz.fsf@xps.des.no> <17642.8303.746281.383448@bhuda.mired.org> <8664glnfhw.fsf@xps.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
> but argv[0] is either an absolute path or a path relative to pwd, > unless your shell is broken. One should also consider users breaking argv[0] intentionally, e.g. pointing it to other files which could lead to undesired/unpredictable behaviour. Even as a fallback it's probably not wise to trust it. Lutz
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44EB1452.4060004>