Userspace interception of locally valid memory location

Valdis.Kletnieks at vt.edu Valdis.Kletnieks at vt.edu
Sun Mar 10 11:07:53 EDT 2013


On Sun, 10 Mar 2013 19:27:52 +0530, harish badrinath said:
> Is it possible to intercept (both read and write) a locally valid
> address of a process and replace it with our own values (it is for a
> transparent distributed shared memory project).

Go look at how gdb traces variables.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 865 bytes
Desc: not available
Url : http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20130310/16453474/attachment.bin 


More information about the Kernelnewbies mailing list