Home
last modified time | relevance | path

Searched refs:vm86 (Results 1 – 12 of 12) sorted by relevance

/arch/x86/kernel/
Dvm86_32.c87 #define VFLAGS (*(unsigned short *)&(current->thread.vm86->veflags))
88 #define VEFLAGS (current->thread.vm86->veflags)
100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local
109 if (!vm86 || !vm86->user_vm86) { in save_v86_state()
113 set_flags(regs->pt.flags, VEFLAGS, X86_EFLAGS_VIF | vm86->veflags_mask); in save_v86_state()
114 user = vm86->user_vm86; in save_v86_state()
116 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ? in save_v86_state()
147 tsk->thread.sp0 = vm86->saved_sp0; in save_v86_state()
151 vm86->saved_sp0 = 0; in save_v86_state()
154 memcpy(&regs->pt, &vm86->regs32, sizeof(struct pt_regs)); in save_v86_state()
[all …]
Dprocess.c88 dst->thread.vm86 = NULL; in arch_dup_task_struct()
/arch/x86/include/asm/
Dvm86.h31 struct vm86 { struct
55 if (__t->vm86 != NULL) { \ argument
56 kfree(__t->vm86); \
57 __t->vm86 = NULL; \
Dprocessor.h11 struct vm86;
509 struct vm86 *vm86; member
/arch/x86/math-emu/
DREADME145 vm86 mode can cause a general protection fault. Address offsets
146 greater than 0xffff appear to be illegal in vm86 mode but are quite
/arch/m68k/kernel/syscalls/
Dsyscall.tbl123 # 113 was vm86
/arch/sh/kernel/syscalls/
Dsyscall.tbl176 # 166 was vm86
/arch/microblaze/kernel/syscalls/
Dsyscall.tbl176 166 common vm86 sys_ni_syscall
/arch/x86/entry/syscalls/
Dsyscall_32.tbl180 166 i386 vm86 sys_vm86 sys_ni_syscall
/arch/mips/kernel/syscalls/
Dsyscall_o32.tbl127 113 o32 vm86 sys_ni_syscall
/arch/powerpc/kernel/syscalls/
Dsyscall.tbl152 113 common vm86 sys_ni_syscall
/arch/x86/
DKconfig1164 a 16-bit DOS program where 16-bit performance matters, vm86