Hehe,I can think of some usage of 'hot-patched': virus or security
daemon,binary code enhancement or some kind of transform,auto parallelize...:)
But all this could be done through /dev/mem,in theory.
在 2001-09-18 09:59:00 you wrote：
>I have just the opposite requirement. I need to allow any running process
>and its threads to be "hot-patched" with executable code. I know you're
>thinking "why?". I can't tell you that. I can only say it's a firm
>requirement, and I could use some helpful ideas.
>-> -----Original Message-----
>-> From: Zhang Fuxin [mailto:firstname.lastname@example.org]
>-> Sent: Tuesday, September 18, 2001 9:53 AM
>-> To: han han
>-> Cc: email@example.com
>-> Subject: Re: How to access kernel memory?
>-> hi,han han，
>-> There are several ways.For example:
>-> 1.You can create a character device , implement its mmap function
>-> to map the memory block you allcated.This can be done in a little
>-> kernel module.There are some sample code before.
>-> 2.via /dev/mem,/dev/kmem etc
>-> 在 2001-09-18 07:35:00 you wrote：
>-> >Hi, All,
>-> >I allocated a block of memory in the kernel space. But
>-> >I don't know how to directly access kernel space from
>-> >user space. Anyone can help me?
>-> >Thanks in advance.
>-> >Terrorist Attacks on U.S. - How can you help?
>-> >Donate cash, emergency relief information
>-> Zhang Fuxin