Searched refs:vm86 (Results 1 – 12 of 12) sorted by relevance
87 #define VFLAGS (*(unsigned short *)&(current->thread.vm86->veflags))88 #define VEFLAGS (current->thread.vm86->veflags)100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local109 if (!vm86 || !vm86->user_vm86) { in save_v86_state()113 set_flags(regs->pt.flags, VEFLAGS, X86_EFLAGS_VIF | vm86->veflags_mask); in save_v86_state()114 user = vm86->user_vm86; in save_v86_state()116 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ? in save_v86_state()147 tsk->thread.sp0 = vm86->saved_sp0; in save_v86_state()151 vm86->saved_sp0 = 0; in save_v86_state()154 memcpy(®s->pt, &vm86->regs32, sizeof(struct pt_regs)); in save_v86_state()[all …]
88 dst->thread.vm86 = NULL; in arch_dup_task_struct()
31 struct vm86 { struct55 if (__t->vm86 != NULL) { \ argument56 kfree(__t->vm86); \57 __t->vm86 = NULL; \
11 struct vm86;509 struct vm86 *vm86; member
145 vm86 mode can cause a general protection fault. Address offsets146 greater than 0xffff appear to be illegal in vm86 mode but are quite
123 # 113 was vm86
176 # 166 was vm86
176 166 common vm86 sys_ni_syscall
180 166 i386 vm86 sys_vm86 sys_ni_syscall
127 113 o32 vm86 sys_ni_syscall
152 113 common vm86 sys_ni_syscall
1164 a 16-bit DOS program where 16-bit performance matters, vm86