Lines Matching refs:guest
19 ; the guest's context properly!!
322 ; Clear PATM_ASMFIX_INHIBITIRQADDR and continue if IF=0 (duplicated function only; never jump back to guest code afterwards!!)
1901 mov eax, dword [esp+16+4] ; guest return address
1932 ; return to caller; it must raise an error, due to patch to guest address translation (remember that there's only one copy of this code block).
1964 ; save the original return address as well (checked by ret to make sure the guest hasn't messed around with the stack)
1966 add edi, dword [ss:edx] ; stack base (guest) + stack position
1967 mov eax, dword [esp+16+4] ; guest return address
1991 push dword [ss:PATM_ASMFIX_CALL_RETURN_ADDR] ; push original guest return address
2066 ; return to caller; it must raise an error, due to patch to guest address translation (remember that there's only one copy of this code block).
2351 ; (can happen when the guest messes with the stack (seen it) or when we didn't call this function ourselves)
2493 ; invalidate the PATM stack as we'll jump back to guest code
2534 ; Jump back to guest if IF=1, else fault