Searched refs:vm86 (Results 1 – 12 of 12) sorted by relevance
100 struct vm86 *vm86 = current->thread.vm86; in save_v86_state() local109 BUG_ON(!vm86); in save_v86_state()112 user = vm86->user_vm86; in save_v86_state()149 vm86->saved_sp0 = 0; in save_v86_state()202 struct vm86 *vm86 = tsk->thread.vm86; in do_sys_vm86() local234 if (!vm86) { in do_sys_vm86()235 if (!(vm86 = kzalloc(sizeof(*vm86), GFP_KERNEL))) in do_sys_vm86()237 tsk->thread.vm86 = vm86; in do_sys_vm86()239 if (vm86->saved_sp0) in do_sys_vm86()499 struct vm86 *vm86 = current->thread.vm86; in do_int() local[all …]
101 dst->thread.vm86 = NULL; in arch_dup_task_struct()
31 struct vm86 { struct55 if (__t->vm86 != NULL) { \ argument56 kfree(__t->vm86); \57 __t->vm86 = NULL; \
11 struct vm86;488 struct vm86 *vm86; member
145 vm86 mode can cause a general protection fault. Address offsets146 greater than 0xffff appear to be illegal in vm86 mode but are quite
123 # 113 was vm86
176 # 166 was vm86
181 166 i386 vm86 sys_vm86 sys_ni_syscall
127 113 o32 vm86 sys_ni_syscall
176 166 common vm86 sys_ni_syscall
152 113 common vm86 sys_ni_syscall
1217 a 16-bit DOS program where 16-bit performance matters, vm86
Completed in 34 milliseconds