%EIP - Instruction Pointer This holds the address of the next CPU instruction to be executed, and it's saved onto the stack as part of the CALL instruction. As well, any of the "jump" instructions modify the %EIP directly. How to debug I am not sure. -----Original Message----- From: kernelnewbies-bounce@xxxxxxxxxxxx [mailto:kernelnewbies-bounce@xxxxxxxxxxxx] On Behalf Of Lei Yang Sent: Tuesday, August 31, 2004 10:52 AM To: Kernel Newbies Mailing List Subject: What is EIP? Hi there, I am building a very simple kernel module and got it installed with insmod, however, I found the following dmesg, Aug 30 10:33:41 bijar kernel: EIP is at main+0x15a/0x220 [test_lei] Aug 30 10:33:41 bijar kernel: [__crc_blk_stop_queue+2031862/4569723] make_clo_request+0x1be/0x3cd [test_lei] Aug 30 10:33:41 bijar kernel: [<f955d63e>] make_clo_request+0x1be/0x3cd [test_lei] And as expected, it is not working. Could anybody tell me what this "EIP" is? How can I debug? TIA Lei -- Kernelnewbies: Help each other learn about the Linux kernel. Archive: http://mail.nl.linux.org/kernelnewbies/ FAQ: http://kernelnewbies.org/faq/ -- Kernelnewbies: Help each other learn about the Linux kernel. Archive: http://mail.nl.linux.org/kernelnewbies/ FAQ: http://kernelnewbies.org/faq/