Hello,
Is it possible to intercept (both read and write) a locally valid
address of a process and replace it with our own values (it is for a
transparent distributed shared memory project).
Regards,
Harish Badrinath
___
Kernelnewbies mailing list
On Sun, 10 Mar 2013 19:27:52 +0530, harish badrinath said:
Is it possible to intercept (both read and write) a locally valid
address of a process and replace it with our own values (it is for a
transparent distributed shared memory project).
Go look at how gdb traces variables.
On Sun, 10 Mar 2013 19:27:52 +0530, harish badrinath said:
Hello,
Is it possible to intercept (both read and write) a locally valid
address of a process and replace it with our own values (it is for a
transparent distributed shared memory project).
(Damn, hit send too soon)
Go look at how