Home
last modified time | relevance | path

Searched refs:vm86 (Results 1 – 25 of 37) sorted by relevance

12

/openbmc/linux/arch/x86/kernel/
H A Dvm86_32.c87 #define VFLAGS (*(unsigned short *)&(current->thread.vm86->veflags))
88 #define VEFLAGS (current->thread.vm86->veflags)
100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local
109 BUG_ON(!vm86); in save_v86_state()
111 set_flags(regs->pt.flags, VEFLAGS, X86_EFLAGS_VIF | vm86->veflags_mask); in save_v86_state()
112 user = vm86->user_vm86; in save_v86_state()
114 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ? in save_v86_state()
145 tsk->thread.sp0 = vm86->saved_sp0; in save_v86_state()
149 vm86->saved_sp0 = 0; in save_v86_state()
152 memcpy(&regs->pt, &vm86->regs32, sizeof(struct pt_regs)); in save_v86_state()
[all …]
H A Dprocess.c97 dst->thread.vm86 = NULL; in arch_dup_task_struct()
/openbmc/linux/arch/x86/include/asm/
H A Dvm86.h31 struct vm86 { struct
55 if (__t->vm86 != NULL) { \ argument
56 kfree(__t->vm86); \
57 __t->vm86 = NULL; \
H A Dprocessor.h11 struct vm86;
470 struct vm86 *vm86; member
/openbmc/linux/tools/testing/selftests/x86/
H A Dentry_from_vm86.c142 ret = vm86(VM86_ENTER, v86); in do_test()
188 void do_umip_tests(struct vm86plus_struct *vm86, unsigned char *test_mem) in do_umip_tests() argument
203 do_test(vm86, vmcode_umip - vmcode, VM86_TRAP, 3, "UMIP tests"); in do_umip_tests()
240 do_test(vm86, vmcode_umip_str - vmcode, VM86_SIGNAL, 0, in do_umip_tests()
245 do_test(vm86, vmcode_umip_sldt - vmcode, VM86_SIGNAL, 0, in do_umip_tests()
/openbmc/qemu/tests/tcg/i386/
H A DREADME13 The Linux system call vm86() is used to test vm86 emulation.
H A DMakefile.target47 test-i386: test-i386.c test-i386-code16.S test-i386-vm86.S test-i386.h test-i386-shift.h test-i386-…
49 $(<D)/test-i386.c $(<D)/test-i386-code16.S $(<D)/test-i386-vm86.S -lm
H A Dtest-i386.c1602 static inline int vm86(int func, struct vm86plus_struct *v86) in vm86() function
1651 ret = vm86(VM86_ENTER, &ctx); in test_vm86()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libx86-1/
H A Dlibx86-1_1.1.bb3 x86 hardware, vm86 mode is used. On other platforms, x86 emulation is \
/openbmc/qemu/linux-user/
H A Dmeson.build28 linux_user_ss.add(when: 'TARGET_I386', if_true: files('vm86.c'))
/openbmc/qemu/linux-user/mips/
H A Dsyscall-args-o32.c.inc114 [ 113] = 5, /* vm86 */
H A Dsyscall_o32.tbl127 113 o32 vm86 sys_ni_syscall
/openbmc/linux/kernel/
H A Dsys_ni.c289 COND_SYSCALL(vm86);
/openbmc/qemu/target/i386/tcg/
H A Dseg_helper.c653 int vm86 = env->eflags & VM_MASK; in do_interrupt_protected() local
786 if (vm86) { in do_interrupt_protected()
800 if (vm86) { in do_interrupt_protected()
816 if (vm86) { in do_interrupt_protected()
833 if (vm86) { in do_interrupt_protected()
857 if (vm86) { in do_interrupt_protected()
/openbmc/linux/arch/x86/math-emu/
H A DREADME145 vm86 mode can cause a general protection fault. Address offsets
146 greater than 0xffff appear to be illegal in vm86 mode but are quite
/openbmc/qemu/linux-user/sh4/
H A Dsyscall.tbl176 # 166 was vm86
/openbmc/linux/arch/microblaze/kernel/syscalls/
H A Dsyscall.tbl176 166 common vm86 sys_ni_syscall
/openbmc/qemu/linux-user/m68k/
H A Dsyscall.tbl123 # 113 was vm86
/openbmc/linux/arch/m68k/kernel/syscalls/
H A Dsyscall.tbl123 # 113 was vm86
/openbmc/qemu/linux-user/microblaze/
H A Dsyscall.tbl176 166 common vm86 sys_ni_syscall
/openbmc/linux/arch/sh/kernel/syscalls/
H A Dsyscall.tbl176 # 166 was vm86
/openbmc/linux/arch/mips/kernel/syscalls/
H A Dsyscall_o32.tbl127 113 o32 vm86 sys_ni_syscall
/openbmc/linux/security/
H A DKconfig158 Programs which use vm86 functionality or have some need to map
/openbmc/linux/arch/x86/entry/syscalls/
H A Dsyscall_32.tbl180 166 i386 vm86 sys_vm86 sys_ni_syscall
/openbmc/qemu/linux-user/i386/
H A Dsyscall_32.tbl181 166 i386 vm86 sys_vm86 sys_ni_syscall

12