Lines Matching full:guest
159 /* Pointer to the guest code area. */
162 /* The guest address corresponding to guest_code[0]. */
165 /* The guest address for the instruction currently being
172 /* Is our guest binary 32 or 64bit? Set at each call to
187 purely a host issue, not a guest one. */
216 /*--- Offsets of various parts of the ppc32/64 guest state ---*/
373 /*--- Guest-state identifiers ---*/
1337 /* Get contents of VSX guest register */
1621 /* Exit the trace if ADDR (intended to be a guest memory address) is
1703 Indexing from BI to guest state:
1755 /* Note: And32 is redundant paranoia iff guest state only has 0
1815 /* Note: And32 is redundant paranoia iff guest state only has 0
2277 0 or 1 is an invariant of the ppc guest state representation;
2395 0 or 1 is an invariant of the ppc guest state representation;
2570 /*--- Read/write to guest-state --- */
6062 Valgrind can back the guest up to this instruction if it needs
15451 /* declare guest state effects */
15458 /* execute the dirty call, side-effecting guest state */
15485 /* declare guest state effects */
15492 /* execute the dirty call, side-effecting guest state */