This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
Re: Does this work? "dcprobes" an x86-hack simple djprobes-equivalent?
- From: Karim Yaghmour <karim at opersys dot com>
- To: Richard J Moore <richardj_moore at uk dot ibm dot com>, Masami Hiramatsu <masami dot hiramatsu dot pt at hitachi dot com>
- Cc: Mathieu Desnoyers <mathieu dot desnoyers at polymtl dot ca>, "Frank Ch. Eigler" <fche at redhat dot com>, Ingo Molnar <mingo at elte dot hu>, Ingo Molnar <mingo at redhat dot com>, linux-kernel <linux-kernel at vger dot kernel dot org>, SystemTAP <systemtap at sources dot redhat dot com>, Satoshi Oshima <soshima at redhat dot com>, "Martin J. Bligh" <mbligh at mbligh dot org>, Prasanna S Panchamukhi <prasanna at in dot ibm dot com>, Tom Zanussi <zanussi at us dot ibm dot com>, Michel Dagenais <michel dot dagenais at polymtl dot ca>, William Cohen <wcohen at redhat dot com>, Alan Cox <alan at lxorguk dot ukuu dot org dot uk>, Andrew Morton <akpm at osdl dot org>, Christoph Hellwig <hch at infradead dot org>
- Date: Mon, 25 Sep 2006 00:46:32 -0400
- Subject: Re: Does this work? "dcprobes" an x86-hack simple djprobes-equivalent?
- Organization: Opersys inc.
- References: <45163D3D.4010108@opersys.com>
- Reply-to: karim at opersys dot com
Slight binary typo ...
Karim Yaghmour wrote:
> Of course, this means hardwiring a multiplexing function at
> 0xCCCC,0xCCCCCCCC, if that makes any sense (offset 0xCCCCCCCC
> of code segment entry 7,099 of the LDT with an RPL of 1).
Actually 0xCCCC is code segment entry 6,553 of the LDT with an
RPL of 0.
Karim
--
President / Opersys Inc.
Embedded Linux Training and Expertise
www.opersys.com / 1.866.677.4546