Home
last modified time | relevance | path

Searched refs:vm86 (Results 1 – 12 of 12) sorted by relevance

/arch/x86/kernel/
A Dvm86_32.c100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local
109 BUG_ON(!vm86); in save_v86_state()
112 user = vm86->user_vm86; in save_v86_state()
149 vm86->saved_sp0 = 0; in save_v86_state()
202 struct vm86 *vm86 = tsk->thread.vm86; in do_sys_vm86() local
234 if (!vm86) { in do_sys_vm86()
235 if (!(vm86 = kzalloc(sizeof(*vm86), GFP_KERNEL))) in do_sys_vm86()
237 tsk->thread.vm86 = vm86; in do_sys_vm86()
239 if (vm86->saved_sp0) in do_sys_vm86()
499 struct vm86 *vm86 = current->thread.vm86; in do_int() local
[all …]
A Dprocess.c101 dst->thread.vm86 = NULL; in arch_dup_task_struct()
/arch/x86/include/asm/
A Dvm86.h31 struct vm86 { struct
55 if (__t->vm86 != NULL) { \ argument
56 kfree(__t->vm86); \
57 __t->vm86 = NULL; \
A Dprocessor.h11 struct vm86;
488 struct vm86 *vm86; member
/arch/x86/math-emu/
A DREADME145 vm86 mode can cause a general protection fault. Address offsets
146 greater than 0xffff appear to be illegal in vm86 mode but are quite
/arch/m68k/kernel/syscalls/
A Dsyscall.tbl123 # 113 was vm86
/arch/sh/kernel/syscalls/
A Dsyscall.tbl176 # 166 was vm86
/arch/x86/entry/syscalls/
A Dsyscall_32.tbl181 166 i386 vm86 sys_vm86 sys_ni_syscall
/arch/mips/kernel/syscalls/
A Dsyscall_o32.tbl127 113 o32 vm86 sys_ni_syscall
/arch/microblaze/kernel/syscalls/
A Dsyscall.tbl176 166 common vm86 sys_ni_syscall
/arch/powerpc/kernel/syscalls/
A Dsyscall.tbl152 113 common vm86 sys_ni_syscall
/arch/x86/
A DKconfig1217 a 16-bit DOS program where 16-bit performance matters, vm86

Completed in 34 milliseconds