issues
search
vikasnkumar
/
hotpatch
Hot patching executables on Linux using .so file injection
http://www.selectiveintellect.com/hotpatch.html
BSD 3-Clause "New" or "Revised" License
360
stars
119
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
fail to run test
#17
fjzzhongyi
closed
4 years ago
16
Trouble attaching to container processes.
#16
DevasiaThomas
closed
4 years ago
7
Dll opened at 0x0, symbol not invoked as dlsym() wasn't found.
#15
DevasiaThomas
closed
6 years ago
8
How can I use this project with ExternalProject_Add
#14
DevasiaThomas
closed
6 years ago
1
Dll was injected at (nil).
#13
jlamur
closed
8 years ago
4
Segmentation fault after injecting library
#12
qwrt747
closed
8 years ago
2
Usage instructions
#11
nipunarora
closed
8 years ago
1
Override some functions not working, such as read()
#10
pfsun
closed
8 years ago
8
Support for arm and ppc
#9
dibacco
closed
9 years ago
1
Fail to load ELF for exe
#8
zhuguoliang
closed
9 years ago
1
print not invoked as dlsym() wasn't found.
#7
zhuguoliang
closed
9 years ago
3
x86-64 redzone
#6
davidyeager
closed
10 years ago
7
small fixes
#5
swick
closed
10 years ago
0
pass data to a symbol; very limited since you can only pass text
#4
swick
closed
10 years ago
0
make hotpatcher and tests optional
#3
swick
closed
11 years ago
0
client_main not invoked as dlsym() wasn't found.
#2
swick
closed
11 years ago
33
Hotpatch for 32-bit Linux applications
#1
vikasnkumar
closed
13 years ago
1