Searched refs:vm86 (Results 1 – 8 of 8) sorted by relevance
87 #define VFLAGS (*(unsigned short *)&(current->thread.vm86->veflags))88 #define VEFLAGS (current->thread.vm86->veflags)100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local109 BUG_ON(!vm86); in save_v86_state()111 set_flags(regs->pt.flags, VEFLAGS, X86_EFLAGS_VIF | vm86->veflags_mask); in save_v86_state()112 user = vm86->user_vm86; in save_v86_state()114 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ? in save_v86_state()145 tsk->thread.sp0 = vm86->saved_sp0; in save_v86_state()149 vm86->saved_sp0 = 0; in save_v86_state()152 memcpy(®s->pt, &vm86->regs32, sizeof(struct pt_regs)); in save_v86_state()[all …]
31 struct vm86 { struct55 if (__t->vm86 != NULL) { \ argument56 kfree(__t->vm86); \57 __t->vm86 = NULL; \
145 vm86 mode can cause a general protection fault. Address offsets146 greater than 0xffff appear to be illegal in vm86 mode but are quite
176 # 166 was vm86
182 Programs which use vm86 functionality or have some need to map
181 166 i386 vm86 sys_vm86 sys_ni_syscall
152 113 common vm86 sys_ni_syscall
1222 a 16-bit DOS program where 16-bit performance matters, vm86