public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* silly memory question ...
@ 2001-08-27 18:24 Josh Fryman
  0 siblings, 0 replies; 2+ messages in thread
From: Josh Fryman @ 2001-08-27 18:24 UTC (permalink / raw)
  To: linux-kernel


hi all,

i'm looking to do something stupid.  can anyone tell me why it won't
work? (is there some kind of special protection on EXE memory pages?)

i have an application, App1, that has a 64KB function (64KB of NOP)
"void funcX(void)".  App1 opens a socket to another application, App2,
which is going to feed code to App1 to stick in funcX.

that is, i've got some other set of functions i plan on feeding to App1
and they're all going to look like "funcX" to App1.  those functions are
coming from App2, which is chewing on a bunch of var-things to spit out 
just the right code for App1.

now, when i try to do this, i get Random Stuff.  sometimes, i just get
a segfault.  sometimes, it seems to work, but the memory at funcX is
hosed if i do a hex-dump compared to what i received from App2.  either
way, it isn't doing what i want...

is there some trick here to make this work?  or am i SOL?

[is there a better place to ask this question?]

thanks,

josh

^ permalink raw reply	[flat|nested] 2+ messages in thread
[parent not found: <Pine.LNX.3.95.1010828101642.13417A-100000@chaos.analogic.com>]

end of thread, other threads:[~2001-08-28 14:48 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2001-08-27 18:24 silly memory question Josh Fryman
     [not found] <Pine.LNX.3.95.1010828101642.13417A-100000@chaos.analogic.com>
2001-08-28 14:47 ` Josh Fryman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox