ptrace.h

来自「linux 内核源代码」· C头文件 代码 · 共 143 行

H
143
字号
#ifndef _ASM_X86_PTRACE_H#define _ASM_X86_PTRACE_H#include <linux/compiler.h>	/* For __user */#include <asm/ptrace-abi.h>#ifndef __ASSEMBLY__#ifdef __i386__/* this struct defines the way the registers are stored on the   stack during a system call. */struct pt_regs {	long ebx;	long ecx;	long edx;	long esi;	long edi;	long ebp;	long eax;	int  xds;	int  xes;	int  xfs;	/* int  xgs; */	long orig_eax;	long eip;	int  xcs;	long eflags;	long esp;	int  xss;};#ifdef __KERNEL__#include <asm/vm86.h>#include <asm/segment.h>struct task_struct;extern void send_sigtrap(struct task_struct *tsk, struct pt_regs *regs, int error_code);/* * user_mode_vm(regs) determines whether a register set came from user mode. * This is true if V8086 mode was enabled OR if the register set was from * protected mode with RPL-3 CS value.  This tricky test checks that with * one comparison.  Many places in the kernel can bypass this full check * if they have already ruled out V8086 mode, so user_mode(regs) can be used. */static inline int user_mode(struct pt_regs *regs){	return (regs->xcs & SEGMENT_RPL_MASK) == USER_RPL;}static inline int user_mode_vm(struct pt_regs *regs){	return ((regs->xcs & SEGMENT_RPL_MASK) | (regs->eflags & VM_MASK)) >= USER_RPL;}static inline int v8086_mode(struct pt_regs *regs){	return (regs->eflags & VM_MASK);}#define instruction_pointer(regs) ((regs)->eip)#define frame_pointer(regs) ((regs)->ebp)#define stack_pointer(regs) ((unsigned long)(regs))#define regs_return_value(regs) ((regs)->eax)extern unsigned long profile_pc(struct pt_regs *regs);#endif /* __KERNEL__ */#else /* __i386__ */struct pt_regs {	unsigned long r15;	unsigned long r14;	unsigned long r13;	unsigned long r12;	unsigned long rbp;	unsigned long rbx;/* arguments: non interrupts/non tracing syscalls only save upto here*/	unsigned long r11;	unsigned long r10;	unsigned long r9;	unsigned long r8;	unsigned long rax;	unsigned long rcx;	unsigned long rdx;	unsigned long rsi;	unsigned long rdi;	unsigned long orig_rax;/* end of arguments *//* cpu exception frame or undefined */	unsigned long rip;	unsigned long cs;	unsigned long eflags;	unsigned long rsp;	unsigned long ss;/* top of stack page */};#ifdef __KERNEL__#define user_mode(regs) (!!((regs)->cs & 3))#define user_mode_vm(regs) user_mode(regs)#define instruction_pointer(regs) ((regs)->rip)#define frame_pointer(regs) ((regs)->rbp)#define stack_pointer(regs) ((regs)->rsp)#define regs_return_value(regs) ((regs)->rax)extern unsigned long profile_pc(struct pt_regs *regs);void signal_fault(struct pt_regs *regs, void __user *frame, char *where);struct task_struct;extern unsigned longconvert_rip_to_linear(struct task_struct *child, struct pt_regs *regs);enum {	EF_CF   = 0x00000001,	EF_PF   = 0x00000004,	EF_AF   = 0x00000010,	EF_ZF   = 0x00000040,	EF_SF   = 0x00000080,	EF_TF   = 0x00000100,	EF_IE   = 0x00000200,	EF_DF   = 0x00000400,	EF_OF   = 0x00000800,	EF_IOPL = 0x00003000,	EF_IOPL_RING0 = 0x00000000,	EF_IOPL_RING1 = 0x00001000,	EF_IOPL_RING2 = 0x00002000,	EF_NT   = 0x00004000,   /* nested task */	EF_RF   = 0x00010000,   /* resume */	EF_VM   = 0x00020000,   /* virtual mode */	EF_AC   = 0x00040000,   /* alignment */	EF_VIF  = 0x00080000,   /* virtual interrupt */	EF_VIP  = 0x00100000,   /* virtual interrupt pending */	EF_ID   = 0x00200000,   /* id */};#endif /* __KERNEL__ */#endif /* !__i386__ */#endif /* !__ASSEMBLY__ */#endif

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?