Re: Userspace interception of locally valid memory location

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 10 Mar 2013 19:27:52 +0530, harish badrinath said:
> Hello,
> Is it possible to intercept (both read and write) a locally valid
> address of a process and replace it with our own values (it is for a
> transparent distributed shared memory project).

(Damn, hit send too soon)

Go look at how gdb traces variables.  Note that method pretty much only
works for writes to a variable, and has some performance implications.

Tracing reads is more difficult, and will probably end up being dependent
on exactly how good the hardware debugging support is - the S/390 architecture
has had the Program Event Recording feature since the 70s, and recent x86
chipsets have had similar features - details such as how many tracepoints
you can have active, how much memory each one can cover, and whether you can
intercept an event before it completes will be dependent on the arch and CPU -
what's true for a old Pentium4 won't be true for an i7, and ARM is a whole
different beast.

Attachment: pgpR__su273sz.pgp
Description: PGP signature

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux