Hi Erik, On 5/25/07, Erik Mouw <mouw@xxxxxxxxxxxx> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Fri, May 25, 2007 at 05:53:14PM +0530, pradeep singh wrote: > Can we alter the normal kernel execution path using a kernel module? > > e.g > a()->b()->c()->d()->e()->f()->g() > > Without changing the existing kernel code, using only a loadable > module can i change the path of execution like > > a()->b()->mymethod()->f()->mymethod2()->g() > > Does anybody have idea if this can be done using a loadable module? You can't safely randomly patch code in a running kernel.
What are the safety issues if we can patch a running kernel anyway? Can do this runtime alteration safely and in a more clean way?
Why is it that you want to do this? I.e.: right now you're describing the steps you're trying to take, but what is the final goal?
I was wondering if i can write a custom xmit handler for normal udp or ip protocol as test purpose and process it in my handler which i can run after inserting the module. IMHO, placing hooks for transmit handler in the proto structure is a hack rather than a clean implementation so thought i can declare a custom data strcuture with its own handler, which can be used to branch the execution of a handler with me processing the data and doing the handler's job and passing it on down to the ip layer rcv handler. Is this alteration of path sequence possible at run time without patching the kernel? Any help or link will be appreciated. Thank you Erik. --psr
Erik - -- They're all fools. Don't worry. Darwin may be slow, but he'll eventually get them. -- Matthew Lammers in alt.sysadmin.recovery -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGVuLs/PlVHJtIto0RAkMiAJ9PY0ciBVVC8nKBrYBaGRWrKtyJkQCff0nU EALbwQOHORJtHr5Uo54Cggs= =NjeC -----END PGP SIGNATURE-----
-- play the game -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ