Searched refs:EIP (Results 1 – 19 of 19) sorted by relevance
300 EIP: 0010:XXXXXXXX319 - 在調試像上面這樣的轉儲時,如果您可以查找EIP值的含義,這將非常有幫助。321 您應該做的是從EIP行獲取十六進位值(忽略 ``0010:`` ),然後在內核名字列表325 文件「linux/vmlinux」。要提取名字列表並將其與內核崩潰中的EIP進行匹配,346 普通的gdb命令。查找系統崩潰點的命令是 ``l *0xXXXXXXXX`` (將xxx替換爲EIP
120 在用 ``CONFIG_DEBUG_INFO`` 編譯的內核上,你可以直接從OOPS複製EIP值::122 EIP: 0060:[<c021e50e>] Not tainted VLI131 EIP is at vt_ioctl+0xda8/0x1482203 EIP is at +0x14/0x4c0323 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
68 [EIP] = HOST_IP,87 case EIP: in putreg()158 case EIP: in getreg()
23 DEFINE(HOST_IP, EIP); in foo()
117 在用 ``CONFIG_DEBUG_INFO`` 编译的内核上,你可以直接从OOPS复制EIP值::119 EIP: 0060:[<c021e50e>] Not tainted VLI128 EIP is at vt_ioctl+0xda8/0x1482200 EIP is at +0x14/0x4c0320 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
19 #define EIP 12 macro
18 #define EIP 12 macro
18 COPY(EIP); COPY_SEG_CPL3(CS); COPY(EFL); COPY_SEG_CPL3(SS); in get_regs_from_mc()
120 EIP value from the OOPS::122 EIP: 0060:[<c021e50e>] Not tainted VLI132 EIP is at vt_ioctl+0xda8/0x1482210 EIP is at +0x14/0x4c0358 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
30 15 eip97 EIP 97
101 would then program the EIP register with the IP value as read.
722 This driver interfaces with the SafeXcel EIP-97 and EIP-197 cryptographic
37 - 0 2 EIP
1723 #define REG_EIP EIP
601 eip & uint64 & The EIP register. Real maximum is \texttt{UINT32}, null extended to \texttt{UINT64}.…673 eip & uint64 & The EIP register.\\
363 eip current value of EIP
206 of the BUG call as well as the EIP and oops trace. This aids
3598 /* NOTE: keeping EIP updated is not a problem in case of
665 - printk("EIP=%08x\n\t", M.x86.R_EIP );695 + printk("EIP=%08x\n\t", M.x86.R_EIP);