1 |
You can do this by preloading a library that intercepts these calls to |
2 |
the c library. Set LD_PRELOAD to that library name. fakeroot (debian |
3 |
package) does that to generate a virtual root environment. |
4 |
|
5 |
If you want to do this the right way then you need to implement a |
6 |
filesystem in the kernel..;-) There are tools that forward fs requests to |
7 |
userland. Those might help you to get going fast. |
8 |
|
9 |
On Tue, 23 Jul 2002, Ardern, Steve wrote: |
10 |
|
11 |
> I realise that this is very probably the wrong place to send this quick |
12 |
> question, but it's been really bugging me and I am well and truly stuck. |
13 |
> |
14 |
> I want to be able to intercept any kernel level calls to a mounted |
15 |
> filesystem - such that anytime a read/write action occurs my application is |
16 |
> made aware of it. For example, I mount a loopback device on /mnt/loopback - |
17 |
> and I want to be able to examine, modify, restrict all access made to this |
18 |
> as my application sees fit. |