Changes

Jump to navigation Jump to search
5 bytes removed ,  10:25, 21 September 2016
Line 2: Line 2:     
== Parasite code injection ==
 
== Parasite code injection ==
This thing was split into a separate project called [https://github.com/xemul/compel compel].
+
This thing was split into a sub-project called [[compel]].
 
Compel is an utility to execute code in foreign process address space. It is based on the same technology we use in CRIU to obtain some process-private data on dump.
 
Compel is an utility to execute code in foreign process address space. It is based on the same technology we use in CRIU to obtain some process-private data on dump.
 
We don't currently maintain compel and it's quite out-dated, but still functional.
 
We don't currently maintain compel and it's quite out-dated, but still functional.
 +
 +
''See also: [[Code blobs]]''
    
== Managing protocol buffers objects ==
 
== Managing protocol buffers objects ==

Navigation menu