On 5/25/07, Avishay Traeger <atraeger@xxxxxxxxxxxxx> wrote:
On Fri, 2007-05-25 at 15:21 +0200, Erik Mouw wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On Fri, May 25, 2007 at 05:53:14PM +0530, pradeep singh wrote: > > Can we alter the normal kernel execution path using a kernel module? > > > > e.g > > a()->b()->c()->d()->e()->f()->g() > > > > Without changing the existing kernel code, using only a loadable > > module can i change the path of execution like > > > > a()->b()->mymethod()->f()->mymethod2()->g() > > > > Does anybody have idea if this can be done using a loadable module? > > You can't safely randomly patch code in a running kernel. What about using kprobes?
Avishay, i do not need a debugger. I mean using a normal kernel module. Is this possible? Erik's reply suggests it is indeed. Any help? thanks --psr
> Why is it that you want to do this? I.e.: right now you're describing > the steps you're trying to take, but what is the final goal? > > > Erik Avishay
-- play the game -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ