Cyber InfoCICyber Info
Powered by
broad-emeraldB
Cyber Info•3y ago•
5 replies
broad-emerald

Resolve /app in Flatpak's /proc/<pid/maps

Hello, guys. I really need some help here, I have asked this in so many places and have never gotten a response. Basically, on Linux there's the
/proc/<pid>/maps
/proc/<pid>/maps
file which displays the paths of loaded modules. Something like this
50000000-5100000  rwx-   /usr/lib/libc.so
50000000-5100000  rwx-   /usr/lib/libc.so
. I have a program to parse that file which helps a lot in process injections and stuff. It works fine on most cases. But there is a problem with Flatpaks. They use a virtual path
/app
/app
to refer to the installation path of the Flatpak itself. I need a programmatic way to resolve the
/app
/app
path into a real path. E.g
/app/myapp
/app/myapp
should be like
/home/some_user/.var/org.test.Test/mybin
/home/some_user/.var/org.test.Test/mybin
. Maybe there's a way to disable this virtual path from Flatpak itself, or a way to resolve it using regular Linux APIs?
Cyber Info banner
Cyber InfoJoin
At Cyber Info, we strive to empower every individual with easy access to cybersecurity education
183,284Members
Resources
Recent Announcements

Similar Threads

Was this page helpful?

Similar Threads

spyware app or files?
curiousclownCcuriousclown / ❓︱support-requests
7mo ago
Learner's Workstation
Dream🕸WeaverDDream🕸Weaver / ❓︱support-requests
9mo ago
Thoughts on a Master's in Cybersecurity (especially for gov work)?
PrimePCPPrimePC / ❓︱support-requests
7mo ago
My app keeps duplicating processes.
V4zI_VV4zI_ / ❓︱support-requests
3mo ago