5 * I'm guessing at the VIF/VIP flag usage, but hope that this is how
6 * the Pentium uses them. Linux will return from vm86 mode when both
9 * On a Pentium, we could probably optimize the virtual flags directly
10 * in the eflags register instead of doing it "by hand" in vflags...
15 #define TF_MASK 0x00000100
16 #define IF_MASK 0x00000200
17 #define IOPL_MASK 0x00003000
18 #define NT_MASK 0x00004000
20 #define VM_MASK 0x00020000
22 #define VM_MASK 0 /* ignored */
24 #define AC_MASK 0x00040000
25 #define VIF_MASK 0x00080000 /* virtual interrupt flag */
26 #define VIP_MASK 0x00100000 /* virtual interrupt pending */
27 #define ID_MASK 0x00200000
29 #define BIOSSEG 0x0f000
39 * Return values for the 'vm86()' system call
41 #define VM86_TYPE(retval) ((retval) & 0xff)
42 #define VM86_ARG(retval) ((retval) >> 8)
44 #define VM86_SIGNAL 0 /* return due to signal */
45 #define VM86_UNKNOWN 1 /* unhandled GP fault - IO-instruction or similar */
46 #define VM86_INTx 2 /* int3/int x instruction (ARG = x) */
47 #define VM86_STI 3 /* sti/popf/iret instruction enabled virtual interrupts */
50 * Additional return values when invoking new vm86()
52 #define VM86_PICRETURN 4 /* return due to pending PIC request */
53 #define VM86_TRAP 6 /* return due to DOS-debugger request */
56 * function codes when invoking new vm86()
58 #define VM86_PLUS_INSTALL_CHECK 0
60 #define VM86_ENTER_NO_BYPASS 2
61 #define VM86_REQUEST_IRQ 3
62 #define VM86_FREE_IRQ 4
63 #define VM86_GET_IRQ_BITS 5
64 #define VM86_GET_AND_RESET_IRQ 6
67 * This is the stack-layout seen by the user space program when we have
68 * done a translation of "SAVE_ALL" from vm86 mode. The real kernel layout
69 * is 'kernel_vm86_regs' (see below).
74 * normal regs, with special meaning for the segment descriptors..
89 unsigned short cs, __csh;
92 unsigned short ss, __ssh;
94 * these are specific to v86 mode:
96 unsigned short es, __esh;
97 unsigned short ds, __dsh;
98 unsigned short fs, __fsh;
99 unsigned short gs, __gsh;
102 struct revectored_struct {
103 unsigned long __map[8]; /* 256 bits */
107 struct vm86_regs regs;
109 unsigned long screen_bitmap;
110 unsigned long cpu_type;
111 struct revectored_struct int_revectored;
112 struct revectored_struct int21_revectored;
118 #define VM86_SCREEN_BITMAP 0x0001
120 struct vm86plus_info_struct {
121 unsigned long force_return_for_pic:1;
122 unsigned long vm86dbg_active:1; /* for debugger */
123 unsigned long vm86dbg_TFpendig:1; /* for debugger */
124 unsigned long unused:28;
125 unsigned long is_vm86pus:1; /* for vm86 internal use */
126 unsigned char vm86dbg_intxxtab[32]; /* for debugger */
129 struct vm86plus_struct {
130 struct vm86_regs regs;
132 unsigned long screen_bitmap;
133 unsigned long cpu_type;
134 struct revectored_struct int_revectored;
135 struct revectored_struct int21_revectored;
136 struct vm86plus_info_struct vm86plus;
141 * This is the (kernel) stack-layout when we have done a "SAVE_ALL" from vm86
142 * mode - the main change is that the old segment descriptors aren't
143 * useful any more and are forced to be zero by the kernel (and the
144 * hardware when a trap occurs), and the real segment descriptors are
145 * at the end of the structure. Look at ptrace.h to see the "normal"
146 * setup. For user space layout see 'struct vm86_regs' above.
149 struct kernel_vm86_regs {
151 * normal regs, with special meaning for the segment descriptors..
164 unsigned short cs, __csh;
167 unsigned short ss, __ssh;
169 * these are specific to v86 mode:
171 unsigned short es, __esh;
172 unsigned short ds, __dsh;
173 unsigned short fs, __fsh;
174 unsigned short gs, __gsh;
177 struct kernel_vm86_struct {
178 struct kernel_vm86_regs regs;
180 * the below part remains on the kernel stack while we are in VM86 mode.
181 * 'tss.esp0' then contains the address of VM86_TSS_ESP0 below, and when we
182 * get forced back from VM86, the CPU and "SAVE_ALL" will restore the above
183 * 'struct kernel_vm86_regs' with the then actual values.
184 * Therefore, pt_regs in fact points to a complete 'kernel_vm86_struct'
185 * in kernelspace, hence we need not reget the data from userspace.
187 #define VM86_TSS_ESP0 flags
189 unsigned long screen_bitmap;
190 unsigned long cpu_type;
191 struct revectored_struct int_revectored;
192 struct revectored_struct int21_revectored;
193 struct vm86plus_info_struct vm86plus;
194 struct pt_regs *regs32; /* here we save the pointer to the old regs */
196 * The below is not part of the structure, but the stack layout continues
197 * this way. In front of 'return-eip' may be some data, depending on
198 * compilation, so we don't rely on this and save the pointer to 'oldregs'
200 * However, with GCC-2.7.2 and the current CFLAGS you see exactly this:
202 long return-eip; from call to vm86()
203 struct pt_regs oldregs; user space registers as saved by syscall
209 void handle_vm86_fault(struct kernel_vm86_regs *, long);
210 int handle_vm86_trap(struct kernel_vm86_regs *, long, int);
213 void release_vm86_irqs(struct task_struct *);
217 #define handle_vm86_fault(a, b)
218 #define release_vm86_irqs(a)
220 static inline int handle_vm86_trap(struct kernel_vm86_regs *a, long b, int c) {
224 #endif /* CONFIG_VM86 */
226 #endif /* __KERNEL__ */