Home
last modified time | relevance | path

Searched refs:EIP (Results 1 – 13 of 13) sorted by relevance

/linux-6.3-rc2/Documentation/translations/zh_TW/admin-guide/
A DREADME.rst300 EIP: 0010:XXXXXXXX
319 - 在調試像上面這樣的轉儲時,如果您可以查找EIP值的含義,這將非常有幫助。
321 您應該做的是從EIP行獲取十六進位值(忽略 ``0010:`` ),然後在內核名字列表
325 文件「linux/vmlinux」。要提取名字列表並將其與內核崩潰中的EIP進行匹配,
346 普通的gdb命令。查找系統崩潰點的命令是 ``l *0xXXXXXXXX`` (將xxx替換爲EIP
A Dbug-hunting.rst120 在用 ``CONFIG_DEBUG_INFO`` 編譯的內核上,你可以直接從OOPS複製EIP值::
122 EIP: 0060:[<c021e50e>] Not tainted VLI
131 EIP is at vt_ioctl+0xda8/0x1482
203 EIP is at +0x14/0x4c0
323 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux-6.3-rc2/arch/x86/um/
A Dptrace_32.c68 [EIP] = HOST_IP,
87 case EIP: in putreg()
158 case EIP: in getreg()
A Duser-offsets.c23 DEFINE(HOST_IP, EIP); in foo()
/linux-6.3-rc2/Documentation/translations/zh_CN/admin-guide/
A Dbug-hunting.rst117 在用 ``CONFIG_DEBUG_INFO`` 编译的内核上,你可以直接从OOPS复制EIP值::
119 EIP: 0060:[<c021e50e>] Not tainted VLI
128 EIP is at vt_ioctl+0xda8/0x1482
200 EIP is at +0x14/0x4c0
320 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux-6.3-rc2/arch/x86/include/uapi/asm/
A Dptrace-abi.h19 #define EIP 12 macro
/linux-6.3-rc2/arch/x86/um/os-Linux/
A Dmcontext.c18 COPY(EIP); COPY_SEG_CPL3(CS); COPY(EFL); COPY_SEG_CPL3(SS); in get_regs_from_mc()
/linux-6.3-rc2/Documentation/admin-guide/
A Dbug-hunting.rst120 EIP value from the OOPS::
122 EIP: 0060:[<c021e50e>] Not tainted VLI
132 EIP is at vt_ioctl+0xda8/0x1482
210 EIP is at +0x14/0x4c0
358 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux-6.3-rc2/Documentation/devicetree/bindings/clock/
A Darmada3700-periph-clock.txt30 15 eip97 EIP 97
/linux-6.3-rc2/Documentation/devicetree/bindings/arm/marvell/
A Dcp110-system-controller.txt37 - 0 2 EIP
/linux-6.3-rc2/drivers/crypto/
A DKconfig749 This driver interfaces with the SafeXcel EIP-97 and EIP-197 cryptographic
/linux-6.3-rc2/Documentation/filesystems/
A Dproc.rst361 eip current value of EIP
/linux-6.3-rc2/lib/
A DKconfig.debug206 of the BUG call as well as the EIP and oops trace. This aids

Completed in 22 milliseconds