Searched refs:vm86 (Results 1 – 12 of 12) sorted by relevance
84 #define VFLAGS (*(unsigned short *)&(current->thread.vm86->veflags))85 #define VEFLAGS (current->thread.vm86->veflags)98 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local108 if (!vm86 || !vm86->user_vm86) { in save_v86_state()112 set_flags(regs->pt.flags, VEFLAGS, X86_EFLAGS_VIF | vm86->veflags_mask); in save_v86_state()113 user = vm86->user_vm86; in save_v86_state()115 if (!access_ok(VERIFY_WRITE, user, vm86->vm86plus.is_vm86pus ? in save_v86_state()140 put_user_ex(vm86->screen_bitmap, &user->screen_bitmap); in save_v86_state()148 tsk->thread.sp0 = vm86->saved_sp0; in save_v86_state()151 vm86->saved_sp0 = 0; in save_v86_state()[all …]
88 dst->thread.vm86 = NULL; in arch_dup_task_struct()
30 struct vm86 { struct55 if (__t->vm86 != NULL) { \ argument56 kfree(__t->vm86); \57 __t->vm86 = NULL; \
9 struct vm86;405 struct vm86 *vm86; member
63 header-y += vm86.h
117 ret = vm86(VM86_ENTER, v86); in do_test()
311 if (!v8086_mode(regs) || !tsk->thread.vm86) in check_v8086_mode()316 tsk->thread.vm86->screen_bitmap |= 1 << bit; in check_v8086_mode()
117 Programs which use vm86 functionality or have some need to map
175 166 i386 vm86 sys_vm86 sys_ni_syscall
145 vm86 mode can cause a general protection fault. Address offsets146 greater than 0xffff appear to be illegal in vm86 mode but are quite
338 Programs which use vm86 functionality or have some need to map
1022 a 16-bit DOS program where 16-bit performance matters, vm86