/openbmc/linux/arch/x86/kernel/ |
H A D | vm86_32.c | 87 #define VFLAGS (*(unsigned short *)&(current->thread.vm86->veflags)) 88 #define VEFLAGS (current->thread.vm86->veflags) 100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local 109 BUG_ON(!vm86); in save_v86_state() 111 set_flags(regs->pt.flags, VEFLAGS, X86_EFLAGS_VIF | vm86->veflags_mask); in save_v86_state() 112 user = vm86->user_vm86; in save_v86_state() 114 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ? in save_v86_state() 145 tsk->thread.sp0 = vm86->saved_sp0; in save_v86_state() 149 vm86->saved_sp0 = 0; in save_v86_state() 152 memcpy(®s->pt, &vm86->regs32, sizeof(struct pt_regs)); in save_v86_state() [all …]
|
H A D | process.c | 97 dst->thread.vm86 = NULL; in arch_dup_task_struct()
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | vm86.h | 31 struct vm86 { struct 55 if (__t->vm86 != NULL) { \ argument 56 kfree(__t->vm86); \ 57 __t->vm86 = NULL; \
|
H A D | processor.h | 11 struct vm86; 470 struct vm86 *vm86; member
|
/openbmc/linux/tools/testing/selftests/x86/ |
H A D | entry_from_vm86.c | 142 ret = vm86(VM86_ENTER, v86); in do_test() 188 void do_umip_tests(struct vm86plus_struct *vm86, unsigned char *test_mem) in do_umip_tests() argument 203 do_test(vm86, vmcode_umip - vmcode, VM86_TRAP, 3, "UMIP tests"); in do_umip_tests() 240 do_test(vm86, vmcode_umip_str - vmcode, VM86_SIGNAL, 0, in do_umip_tests() 245 do_test(vm86, vmcode_umip_sldt - vmcode, VM86_SIGNAL, 0, in do_umip_tests()
|
/openbmc/qemu/tests/tcg/i386/ |
H A D | README | 13 The Linux system call vm86() is used to test vm86 emulation.
|
H A D | Makefile.target | 47 test-i386: test-i386.c test-i386-code16.S test-i386-vm86.S test-i386.h test-i386-shift.h test-i386-… 49 $(<D)/test-i386.c $(<D)/test-i386-code16.S $(<D)/test-i386-vm86.S -lm
|
H A D | test-i386.c | 1602 static inline int vm86(int func, struct vm86plus_struct *v86) in vm86() function 1651 ret = vm86(VM86_ENTER, &ctx); in test_vm86()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libx86-1/ |
H A D | libx86-1_1.1.bb | 3 x86 hardware, vm86 mode is used. On other platforms, x86 emulation is \
|
/openbmc/qemu/linux-user/ |
H A D | meson.build | 28 linux_user_ss.add(when: 'TARGET_I386', if_true: files('vm86.c'))
|
/openbmc/qemu/linux-user/mips/ |
H A D | syscall-args-o32.c.inc | 114 [ 113] = 5, /* vm86 */
|
H A D | syscall_o32.tbl | 127 113 o32 vm86 sys_ni_syscall
|
/openbmc/linux/kernel/ |
H A D | sys_ni.c | 289 COND_SYSCALL(vm86);
|
/openbmc/qemu/target/i386/tcg/ |
H A D | seg_helper.c | 653 int vm86 = env->eflags & VM_MASK; in do_interrupt_protected() local 786 if (vm86) { in do_interrupt_protected() 800 if (vm86) { in do_interrupt_protected() 816 if (vm86) { in do_interrupt_protected() 833 if (vm86) { in do_interrupt_protected() 857 if (vm86) { in do_interrupt_protected()
|
/openbmc/linux/arch/x86/math-emu/ |
H A D | README | 145 vm86 mode can cause a general protection fault. Address offsets 146 greater than 0xffff appear to be illegal in vm86 mode but are quite
|
/openbmc/qemu/linux-user/sh4/ |
H A D | syscall.tbl | 176 # 166 was vm86
|
/openbmc/linux/arch/microblaze/kernel/syscalls/ |
H A D | syscall.tbl | 176 166 common vm86 sys_ni_syscall
|
/openbmc/qemu/linux-user/m68k/ |
H A D | syscall.tbl | 123 # 113 was vm86
|
/openbmc/linux/arch/m68k/kernel/syscalls/ |
H A D | syscall.tbl | 123 # 113 was vm86
|
/openbmc/qemu/linux-user/microblaze/ |
H A D | syscall.tbl | 176 166 common vm86 sys_ni_syscall
|
/openbmc/linux/arch/sh/kernel/syscalls/ |
H A D | syscall.tbl | 176 # 166 was vm86
|
/openbmc/linux/arch/mips/kernel/syscalls/ |
H A D | syscall_o32.tbl | 127 113 o32 vm86 sys_ni_syscall
|
/openbmc/linux/security/ |
H A D | Kconfig | 158 Programs which use vm86 functionality or have some need to map
|
/openbmc/linux/arch/x86/entry/syscalls/ |
H A D | syscall_32.tbl | 180 166 i386 vm86 sys_vm86 sys_ni_syscall
|
/openbmc/qemu/linux-user/i386/ |
H A D | syscall_32.tbl | 181 166 i386 vm86 sys_vm86 sys_ni_syscall
|