Userspace interception of locally valid memory location

2013-03-10 Thread harish badrinath
Hello, Is it possible to intercept (both read and write) a locally valid address of a process and replace it with our own values (it is for a transparent distributed shared memory project). Regards, Harish Badrinath ___ Kernelnewbies mailing list

Re: Userspace interception of locally valid memory location

2013-03-10 Thread Valdis . Kletnieks
On Sun, 10 Mar 2013 19:27:52 +0530, harish badrinath said: Is it possible to intercept (both read and write) a locally valid address of a process and replace it with our own values (it is for a transparent distributed shared memory project). Go look at how gdb traces variables.

Re: Userspace interception of locally valid memory location

2013-03-10 Thread Valdis . Kletnieks
On Sun, 10 Mar 2013 19:27:52 +0530, harish badrinath said: Hello, Is it possible to intercept (both read and write) a locally valid address of a process and replace it with our own values (it is for a transparent distributed shared memory project). (Damn, hit send too soon) Go look at how