public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Intercepting VFS calls
@ 2005-06-20 10:37 Przemyslaw Sowa
  0 siblings, 0 replies; 3+ messages in thread
From: Przemyslaw Sowa @ 2005-06-20 10:37 UTC (permalink / raw)
  To: linux-kernel

Hello,

I'd like to intercept VFS calls like read() and write() in 2.6 kernels 
but I'm new in kernel development and I don't know how to do it.

Could you help me, please?

Przemyslaw Sowa

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Intercepting VFS calls
@ 2005-06-20 14:37 Przemyslaw Sowa
  2005-06-23 13:35 ` Jan Kara
  0 siblings, 1 reply; 3+ messages in thread
From: Przemyslaw Sowa @ 2005-06-20 14:37 UTC (permalink / raw)
  To: linux-kernel

Frederik Deweerdt wrote:

> Le 20/06/05 12:37 +0200, Przemyslaw Sowa écrivit:
>  
>
>> Hello,
>>
>> I'd like to intercept VFS calls like read() and write() in 2.6
kernels but I'm new in kernel development and I don't know how to do
it.
>>
>> Could you help me, please?
>>
>>   
>
> You could have a look at kprobes.
> Regards,
> Frederik Deweerdt
>
>  
>
Thank you for the answer, but I need some way to execute my own
function (from a module) instead of read(), wrte()... and I don't want
to use any kernel patch. Is it possible?

Best regards,
Przemyslaw Sowa

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Intercepting VFS calls
  2005-06-20 14:37 Przemyslaw Sowa
@ 2005-06-23 13:35 ` Jan Kara
  0 siblings, 0 replies; 3+ messages in thread
From: Jan Kara @ 2005-06-23 13:35 UTC (permalink / raw)
  To: Przemyslaw Sowa; +Cc: linux-kernel

> Frederik Deweerdt wrote:
> 
> > Le 20/06/05 12:37 +0200, Przemyslaw Sowa écrivit:
> >  
> >
> >> Hello,
> >>
> >> I'd like to intercept VFS calls like read() and write() in 2.6
> kernels but I'm new in kernel development and I don't know how to do
> it.
> >>
> >> Could you help me, please?
> >>
> >>   
> >
> > You could have a look at kprobes.
> > Regards,
> > Frederik Deweerdt
> >
> >  
> >
> Thank you for the answer, but I need some way to execute my own
> function (from a module) instead of read(), wrte()... and I don't want
> to use any kernel patch. Is it possible?
  It's impossible without patching the kernel. Why do you want to
intercept the calls? Isn't it enough to intercept the system calls? Then
you can do it from the userspace by tracing the process.

								Honza

-- 
Jan Kara <jack@suse.cz>
SuSE CR Labs

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2005-06-23 13:38 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-06-20 10:37 Intercepting VFS calls Przemyslaw Sowa
  -- strict thread matches above, loose matches on Subject: below --
2005-06-20 14:37 Przemyslaw Sowa
2005-06-23 13:35 ` Jan Kara

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox