[PATCH] LSM: remove BSD secure level security module
[usb.git] / include / asm-i386 / ptrace.h
bloba4a0e5207db58627c4ef02eb1a22eceb54c20a86
1 #ifndef _I386_PTRACE_H
2 #define _I386_PTRACE_H
4 #include <asm/ptrace-abi.h>
6 /* this struct defines the way the registers are stored on the
7 stack during a system call. */
9 struct pt_regs {
10 long ebx;
11 long ecx;
12 long edx;
13 long esi;
14 long edi;
15 long ebp;
16 long eax;
17 int xds;
18 int xes;
19 long orig_eax;
20 long eip;
21 int xcs;
22 long eflags;
23 long esp;
24 int xss;
27 #ifdef __KERNEL__
29 #include <asm/vm86.h>
30 #include <asm/segment.h>
32 struct task_struct;
33 extern void send_sigtrap(struct task_struct *tsk, struct pt_regs *regs, int error_code);
36 * user_mode_vm(regs) determines whether a register set came from user mode.
37 * This is true if V8086 mode was enabled OR if the register set was from
38 * protected mode with RPL-3 CS value. This tricky test checks that with
39 * one comparison. Many places in the kernel can bypass this full check
40 * if they have already ruled out V8086 mode, so user_mode(regs) can be used.
42 static inline int user_mode(struct pt_regs *regs)
44 return (regs->xcs & SEGMENT_RPL_MASK) == USER_RPL;
46 static inline int user_mode_vm(struct pt_regs *regs)
48 return ((regs->xcs & SEGMENT_RPL_MASK) | (regs->eflags & VM_MASK)) >= USER_RPL;
50 #define instruction_pointer(regs) ((regs)->eip)
51 extern unsigned long profile_pc(struct pt_regs *regs);
52 #endif /* __KERNEL__ */
54 #endif