From d2d2ba7c6602e73dc2e3dbd0aa4215e4c412a688 Mon Sep 17 00:00:00 2001 From: johannst Date: Wed, 2 Jun 2021 22:38:57 +0000 Subject: deploy: d2e2063cb2b5a82709e9c5188602a9fc0f7dadbd --- kvm_rs/x86_64/constant.CR0_AM.html | 8 +++++ kvm_rs/x86_64/constant.CR0_CD.html | 6 ++++ kvm_rs/x86_64/constant.CR0_EM.html | 8 +++++ kvm_rs/x86_64/constant.CR0_ET.html | 6 ++++ kvm_rs/x86_64/constant.CR0_MP.html | 6 ++++ kvm_rs/x86_64/constant.CR0_NE.html | 6 ++++ kvm_rs/x86_64/constant.CR0_NW.html | 6 ++++ kvm_rs/x86_64/constant.CR0_PE.html | 8 +++++ kvm_rs/x86_64/constant.CR0_PG.html | 7 +++++ kvm_rs/x86_64/constant.CR0_TS.html | 6 ++++ kvm_rs/x86_64/constant.CR0_WP.html | 7 +++++ kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html | 6 ++++ kvm_rs/x86_64/constant.CR3_PCD.html | 6 ++++ kvm_rs/x86_64/constant.CR3_PWT.html | 6 ++++ kvm_rs/x86_64/constant.CR4_LA57.html | 8 +++++ kvm_rs/x86_64/constant.CR4_PAE.html | 8 +++++ kvm_rs/x86_64/constant.EFER_LMA.html | 7 +++++ kvm_rs/x86_64/constant.EFER_LME.html | 7 +++++ kvm_rs/x86_64/constant.MSR_EFER.html | 8 +++++ kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html | 6 ++++ kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html | 7 +++++ kvm_rs/x86_64/constant.RFLAGS_AC.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_AF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_CF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_DF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_IF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_IOPL.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_OF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_PF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_SF.html | 6 ++++ kvm_rs/x86_64/constant.RFLAGS_ZF.html | 6 ++++ kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html | 8 +++++ kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html | 8 +++++ kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html | 10 ++++++ kvm_rs/x86_64/fn.rflags_ac.html | 5 +++ kvm_rs/x86_64/fn.rflags_af.html | 5 +++ kvm_rs/x86_64/fn.rflags_cf.html | 5 +++ kvm_rs/x86_64/fn.rflags_df.html | 5 +++ kvm_rs/x86_64/fn.rflags_if.html | 5 +++ kvm_rs/x86_64/fn.rflags_iopl.html | 5 +++ kvm_rs/x86_64/fn.rflags_of.html | 5 +++ kvm_rs/x86_64/fn.rflags_pf.html | 5 +++ kvm_rs/x86_64/fn.rflags_sf.html | 5 +++ kvm_rs/x86_64/fn.rflags_zf.html | 5 +++ kvm_rs/x86_64/fn.seg_selector_index.html | 5 +++ kvm_rs/x86_64/fn.seg_selector_rpl.html | 5 +++ kvm_rs/x86_64/fn.seg_selector_ti.html | 5 +++ kvm_rs/x86_64/index.html | 42 ++++++++++++++++++++++++++ kvm_rs/x86_64/sidebar-items.js | 1 + 49 files changed, 337 insertions(+) create mode 100644 kvm_rs/x86_64/constant.CR0_AM.html create mode 100644 kvm_rs/x86_64/constant.CR0_CD.html create mode 100644 kvm_rs/x86_64/constant.CR0_EM.html create mode 100644 kvm_rs/x86_64/constant.CR0_ET.html create mode 100644 kvm_rs/x86_64/constant.CR0_MP.html create mode 100644 kvm_rs/x86_64/constant.CR0_NE.html create mode 100644 kvm_rs/x86_64/constant.CR0_NW.html create mode 100644 kvm_rs/x86_64/constant.CR0_PE.html create mode 100644 kvm_rs/x86_64/constant.CR0_PG.html create mode 100644 kvm_rs/x86_64/constant.CR0_TS.html create mode 100644 kvm_rs/x86_64/constant.CR0_WP.html create mode 100644 kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html create mode 100644 kvm_rs/x86_64/constant.CR3_PCD.html create mode 100644 kvm_rs/x86_64/constant.CR3_PWT.html create mode 100644 kvm_rs/x86_64/constant.CR4_LA57.html create mode 100644 kvm_rs/x86_64/constant.CR4_PAE.html create mode 100644 kvm_rs/x86_64/constant.EFER_LMA.html create mode 100644 kvm_rs/x86_64/constant.EFER_LME.html create mode 100644 kvm_rs/x86_64/constant.MSR_EFER.html create mode 100644 kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html create mode 100644 kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_AC.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_AF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_CF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_DF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_IF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_IOPL.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_OF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_PF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_SF.html create mode 100644 kvm_rs/x86_64/constant.RFLAGS_ZF.html create mode 100644 kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html create mode 100644 kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html create mode 100644 kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html create mode 100644 kvm_rs/x86_64/fn.rflags_ac.html create mode 100644 kvm_rs/x86_64/fn.rflags_af.html create mode 100644 kvm_rs/x86_64/fn.rflags_cf.html create mode 100644 kvm_rs/x86_64/fn.rflags_df.html create mode 100644 kvm_rs/x86_64/fn.rflags_if.html create mode 100644 kvm_rs/x86_64/fn.rflags_iopl.html create mode 100644 kvm_rs/x86_64/fn.rflags_of.html create mode 100644 kvm_rs/x86_64/fn.rflags_pf.html create mode 100644 kvm_rs/x86_64/fn.rflags_sf.html create mode 100644 kvm_rs/x86_64/fn.rflags_zf.html create mode 100644 kvm_rs/x86_64/fn.seg_selector_index.html create mode 100644 kvm_rs/x86_64/fn.seg_selector_rpl.html create mode 100644 kvm_rs/x86_64/fn.seg_selector_ti.html create mode 100644 kvm_rs/x86_64/index.html create mode 100644 kvm_rs/x86_64/sidebar-items.js (limited to 'kvm_rs/x86_64') diff --git a/kvm_rs/x86_64/constant.CR0_AM.html b/kvm_rs/x86_64/constant.CR0_AM.html new file mode 100644 index 0000000..7880ede --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_AM.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR0_AM - Rust + +

Constant kvm_rs::x86_64::CR0_AM[][src]

pub const CR0_AM: u64 = 1 << 18; // 0x0_000_000_000_040_000u64

Alignment Mask.

+

Enables alignment check for CPL=3, check is only done if the AC +bit of the rflags register ist set.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_CD.html b/kvm_rs/x86_64/constant.CR0_CD.html new file mode 100644 index 0000000..7d6d08f --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_CD.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_CD - Rust + +

Constant kvm_rs::x86_64::CR0_CD[][src]

pub const CR0_CD: u64 = 1 << 30; // 0x0_000_000_040_000_000u64

Cachine disable.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_EM.html b/kvm_rs/x86_64/constant.CR0_EM.html new file mode 100644 index 0000000..1e6cf28 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_EM.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR0_EM - Rust + +

Constant kvm_rs::x86_64::CR0_EM[][src]

pub const CR0_EM: u64 = 1 << 2; // 0x0_000_000_000_000_004u64

Emulation.

+

When set indicates the process does not have a FPU. FPU instructions will generate an exception +that software can emulate the instruction.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_ET.html b/kvm_rs/x86_64/constant.CR0_ET.html new file mode 100644 index 0000000..20d6386 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_ET.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_ET - Rust + +

Constant kvm_rs::x86_64::CR0_ET[][src]

pub const CR0_ET: u64 = 1 << 4; // 0x0_000_000_000_000_010u64

Extension Type.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_MP.html b/kvm_rs/x86_64/constant.CR0_MP.html new file mode 100644 index 0000000..2fcffd3 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_MP.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_MP - Rust + +

Constant kvm_rs::x86_64::CR0_MP[][src]

pub const CR0_MP: u64 = 1 << 1; // 0x0_000_000_000_000_002u64

Monitor Coprocessor.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_NE.html b/kvm_rs/x86_64/constant.CR0_NE.html new file mode 100644 index 0000000..55c2409 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_NE.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_NE - Rust + +

Constant kvm_rs::x86_64::CR0_NE[][src]

pub const CR0_NE: u64 = 1 << 5; // 0x0_000_000_000_000_020u64

Numeric Error.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_NW.html b/kvm_rs/x86_64/constant.CR0_NW.html new file mode 100644 index 0000000..b561962 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_NW.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_NW - Rust + +

Constant kvm_rs::x86_64::CR0_NW[][src]

pub const CR0_NW: u64 = 1 << 29; // 0x0_000_000_020_000_000u64

Not Write-Torugh.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_PE.html b/kvm_rs/x86_64/constant.CR0_PE.html new file mode 100644 index 0000000..ccb1921 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_PE.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR0_PE - Rust + +

Constant kvm_rs::x86_64::CR0_PE[][src]

pub const CR0_PE: u64 = 1 << 0; // 0x0_000_000_000_000_001u64

Protection Enable.

+

Enables protected mode when set and real-address mode when cleared. This enables +segment-level protection not paging.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_PG.html b/kvm_rs/x86_64/constant.CR0_PG.html new file mode 100644 index 0000000..763f7e0 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_PG.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::CR0_PG - Rust + +

Constant kvm_rs::x86_64::CR0_PG[][src]

pub const CR0_PG: u64 = 1 << 31; // 0x0_000_000_080_000_000u64

Paging.

+

Enables paging when set, requires CR0_PE to be set as well.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_TS.html b/kvm_rs/x86_64/constant.CR0_TS.html new file mode 100644 index 0000000..6bb6377 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_TS.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR0_TS - Rust + +

Constant kvm_rs::x86_64::CR0_TS[][src]

pub const CR0_TS: u64 = 1 << 3; // 0x0_000_000_000_000_008u64

Task Switched.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR0_WP.html b/kvm_rs/x86_64/constant.CR0_WP.html new file mode 100644 index 0000000..8628545 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR0_WP.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::CR0_WP - Rust + +

Constant kvm_rs::x86_64::CR0_WP[][src]

pub const CR0_WP: u64 = 1 << 16; // 0x0_000_000_000_010_000u64

Write Protect.

+

When set supervisor-level procedures can’t write to read-only pages.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html b/kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html new file mode 100644 index 0000000..986f1ed --- /dev/null +++ b/kvm_rs/x86_64/constant.CR3_PAGE_BASE_MASK.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR3_PAGE_BASE_MASK - Rust + +

Constant kvm_rs::x86_64::CR3_PAGE_BASE_MASK[][src]

pub const CR3_PAGE_BASE_MASK: u64 = 0xffff_ffff_ffff_0000;

Mask for physical base address of paging structure.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR3_PCD.html b/kvm_rs/x86_64/constant.CR3_PCD.html new file mode 100644 index 0000000..cf704b0 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR3_PCD.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR3_PCD - Rust + +

Constant kvm_rs::x86_64::CR3_PCD[][src]

pub const CR3_PCD: u64 = 1 << 4; // 0x0_000_000_000_000_010u64

Page-level Cache Disable.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR3_PWT.html b/kvm_rs/x86_64/constant.CR3_PWT.html new file mode 100644 index 0000000..d20bd52 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR3_PWT.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::CR3_PWT - Rust + +

Constant kvm_rs::x86_64::CR3_PWT[][src]

pub const CR3_PWT: u64 = 1 << 3; // 0x0_000_000_000_000_008u64

Page-level Write-Through.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR4_LA57.html b/kvm_rs/x86_64/constant.CR4_LA57.html new file mode 100644 index 0000000..d66d363 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR4_LA57.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR4_LA57 - Rust + +

Constant kvm_rs::x86_64::CR4_LA57[][src]

pub const CR4_LA57: u64 = 1 << 5; // 0x0_000_000_000_000_020u64

57-bit Linear Addresses.

+

When set in long mode enables 5-level paging to translate 57-bit linear addresses. When +cleared use 4-level paging to translate 48-bit linear addresses.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.CR4_PAE.html b/kvm_rs/x86_64/constant.CR4_PAE.html new file mode 100644 index 0000000..efd56b4 --- /dev/null +++ b/kvm_rs/x86_64/constant.CR4_PAE.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::CR4_PAE - Rust + +

Constant kvm_rs::x86_64::CR4_PAE[][src]

pub const CR4_PAE: u64 = 1 << 5; // 0x0_000_000_000_000_020u64

Physical Address Extenstion.

+

When set enables paging to produce physicall addresses with more than 32 bits. Required before +entering long mode.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.EFER_LMA.html b/kvm_rs/x86_64/constant.EFER_LMA.html new file mode 100644 index 0000000..e16f93b --- /dev/null +++ b/kvm_rs/x86_64/constant.EFER_LMA.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::EFER_LMA - Rust + +

Constant kvm_rs::x86_64::EFER_LMA[][src]

pub const EFER_LMA: u64 = 1 << 10; // 0x0_000_000_000_000_400u64

Long Mode Active (readonly).

+

When set indicates long mode is active.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.EFER_LME.html b/kvm_rs/x86_64/constant.EFER_LME.html new file mode 100644 index 0000000..ec81586 --- /dev/null +++ b/kvm_rs/x86_64/constant.EFER_LME.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::EFER_LME - Rust + +

Constant kvm_rs::x86_64::EFER_LME[][src]

pub const EFER_LME: u64 = 1 << 8; // 0x0_000_000_000_000_100u64

Long Mode Enable.

+

When set enables long mode operations.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.MSR_EFER.html b/kvm_rs/x86_64/constant.MSR_EFER.html new file mode 100644 index 0000000..91f1128 --- /dev/null +++ b/kvm_rs/x86_64/constant.MSR_EFER.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::MSR_EFER - Rust + +

Constant kvm_rs::x86_64::MSR_EFER[][src]

pub const MSR_EFER: u64 = 0xc000_0080;

Extended Feature Enable Register MSR number.

+

MSR number used with the rdmsr and wrmsr instructions to read/write the +EFER model specific register.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html b/kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html new file mode 100644 index 0000000..6802305 --- /dev/null +++ b/kvm_rs/x86_64/constant.PAGE_ENTRY_PRESENT.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::PAGE_ENTRY_PRESENT - Rust + +

Constant kvm_rs::x86_64::PAGE_ENTRY_PRESENT[][src]

pub const PAGE_ENTRY_PRESENT: u64 = 1 << 0; // 0x0_000_000_000_000_001u64

Page entry present.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html b/kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html new file mode 100644 index 0000000..5719909 --- /dev/null +++ b/kvm_rs/x86_64/constant.PAGE_RENTRY_RW.html @@ -0,0 +1,7 @@ +kvm_rs::x86_64::PAGE_RENTRY_RW - Rust + +

Constant kvm_rs::x86_64::PAGE_RENTRY_RW[][src]

pub const PAGE_RENTRY_RW: u64 = 1 << 1; // 0x0_000_000_000_000_002u64

Page region read/write.

+

If set, region reference by paging entry is writeable.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_AC.html b/kvm_rs/x86_64/constant.RFLAGS_AC.html new file mode 100644 index 0000000..94d81cc --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_AC.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_AC - Rust + +

Constant kvm_rs::x86_64::RFLAGS_AC[][src]

pub const RFLAGS_AC: u64 = 1 << 18; // 0x0_000_000_000_040_000u64

Alignment check.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_AF.html b/kvm_rs/x86_64/constant.RFLAGS_AF.html new file mode 100644 index 0000000..50f8b7f --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_AF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_AF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_AF[][src]

pub const RFLAGS_AF: u64 = 1 << 4; // 0x0_000_000_000_000_010u64

Adjust flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_CF.html b/kvm_rs/x86_64/constant.RFLAGS_CF.html new file mode 100644 index 0000000..cdb9287 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_CF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_CF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_CF[][src]

pub const RFLAGS_CF: u64 = 1 << 0; // 0x0_000_000_000_000_001u64

Carry flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_DF.html b/kvm_rs/x86_64/constant.RFLAGS_DF.html new file mode 100644 index 0000000..59bbb8d --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_DF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_DF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_DF[][src]

pub const RFLAGS_DF: u64 = 1 << 10; // 0x0_000_000_000_000_400u64

Direction flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_IF.html b/kvm_rs/x86_64/constant.RFLAGS_IF.html new file mode 100644 index 0000000..a11e820 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_IF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_IF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_IF[][src]

pub const RFLAGS_IF: u64 = 1 << 9; // 0x0_000_000_000_000_200u64

Sign flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_IOPL.html b/kvm_rs/x86_64/constant.RFLAGS_IOPL.html new file mode 100644 index 0000000..7fafaaa --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_IOPL.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_IOPL - Rust + +

Constant kvm_rs::x86_64::RFLAGS_IOPL[][src]

pub const RFLAGS_IOPL: u64 = 0b11 << 12; // 0x0_000_000_000_003_000u64

I/O privilege level.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_OF.html b/kvm_rs/x86_64/constant.RFLAGS_OF.html new file mode 100644 index 0000000..d74a58a --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_OF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_OF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_OF[][src]

pub const RFLAGS_OF: u64 = 1 << 11; // 0x0_000_000_000_000_800u64

Overflow flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_PF.html b/kvm_rs/x86_64/constant.RFLAGS_PF.html new file mode 100644 index 0000000..1922cf5 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_PF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_PF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_PF[][src]

pub const RFLAGS_PF: u64 = 1 << 2; // 0x0_000_000_000_000_004u64

Parity flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_SF.html b/kvm_rs/x86_64/constant.RFLAGS_SF.html new file mode 100644 index 0000000..2e303ac --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_SF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_SF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_SF[][src]

pub const RFLAGS_SF: u64 = 1 << 7; // 0x0_000_000_000_000_080u64

Sign flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.RFLAGS_ZF.html b/kvm_rs/x86_64/constant.RFLAGS_ZF.html new file mode 100644 index 0000000..3d3ab64 --- /dev/null +++ b/kvm_rs/x86_64/constant.RFLAGS_ZF.html @@ -0,0 +1,6 @@ +kvm_rs::x86_64::RFLAGS_ZF - Rust + +

Constant kvm_rs::x86_64::RFLAGS_ZF[][src]

pub const RFLAGS_ZF: u64 = 1 << 6; // 0x0_000_000_000_000_040u64

Zero flag.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html b/kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html new file mode 100644 index 0000000..281e6bb --- /dev/null +++ b/kvm_rs/x86_64/constant.SEG_SELECTOR_INDEX.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::SEG_SELECTOR_INDEX - Rust + +

Constant kvm_rs::x86_64::SEG_SELECTOR_INDEX[][src]

pub const SEG_SELECTOR_INDEX: u16 = 0x1fff << 3; // 0xf_ff8u16

Table index.

+

Index into the GDT or LDT table to select the segment descriptor. GDT.base + 8 * index +gives the address of the segment descriptor (times 8 because every segment descriptor is 8 byte).

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html b/kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html new file mode 100644 index 0000000..b451997 --- /dev/null +++ b/kvm_rs/x86_64/constant.SEG_SELECTOR_RPL.html @@ -0,0 +1,8 @@ +kvm_rs::x86_64::SEG_SELECTOR_RPL - Rust + +

Constant kvm_rs::x86_64::SEG_SELECTOR_RPL[][src]

pub const SEG_SELECTOR_RPL: u16 = 0b11 << 0; // 0x0_003u16

Requested privilege level.

+

Privilege level of the segment selector, where 0 is the most privileged mode and 3 the +least.

+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html b/kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html new file mode 100644 index 0000000..2f3f0d9 --- /dev/null +++ b/kvm_rs/x86_64/constant.SEG_SELECTOR_TI.html @@ -0,0 +1,10 @@ +kvm_rs::x86_64::SEG_SELECTOR_TI - Rust + +

Constant kvm_rs::x86_64::SEG_SELECTOR_TI[][src]

pub const SEG_SELECTOR_TI: u16 = 1 << 2; // 0x0_004u16

Table indicator.

+ + + +
TITable
0GDT
1LDT
+
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_ac.html b/kvm_rs/x86_64/fn.rflags_ac.html new file mode 100644 index 0000000..06e8c1d --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_ac.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_ac - Rust + +

Function kvm_rs::x86_64::rflags_ac[][src]

pub const fn rflags_ac(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_af.html b/kvm_rs/x86_64/fn.rflags_af.html new file mode 100644 index 0000000..9112902 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_af.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_af - Rust + +

Function kvm_rs::x86_64::rflags_af[][src]

pub const fn rflags_af(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_cf.html b/kvm_rs/x86_64/fn.rflags_cf.html new file mode 100644 index 0000000..cdd63d8 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_cf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_cf - Rust + +

Function kvm_rs::x86_64::rflags_cf[][src]

pub const fn rflags_cf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_df.html b/kvm_rs/x86_64/fn.rflags_df.html new file mode 100644 index 0000000..6b3567f --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_df.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_df - Rust + +

Function kvm_rs::x86_64::rflags_df[][src]

pub const fn rflags_df(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_if.html b/kvm_rs/x86_64/fn.rflags_if.html new file mode 100644 index 0000000..4600467 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_if.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_if - Rust + +

Function kvm_rs::x86_64::rflags_if[][src]

pub const fn rflags_if(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_iopl.html b/kvm_rs/x86_64/fn.rflags_iopl.html new file mode 100644 index 0000000..5ba8e0d --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_iopl.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_iopl - Rust + +

Function kvm_rs::x86_64::rflags_iopl[][src]

pub const fn rflags_iopl(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_of.html b/kvm_rs/x86_64/fn.rflags_of.html new file mode 100644 index 0000000..27be426 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_of.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_of - Rust + +

Function kvm_rs::x86_64::rflags_of[][src]

pub const fn rflags_of(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_pf.html b/kvm_rs/x86_64/fn.rflags_pf.html new file mode 100644 index 0000000..c131a01 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_pf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_pf - Rust + +

Function kvm_rs::x86_64::rflags_pf[][src]

pub const fn rflags_pf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_sf.html b/kvm_rs/x86_64/fn.rflags_sf.html new file mode 100644 index 0000000..1c1f0b0 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_sf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_sf - Rust + +

Function kvm_rs::x86_64::rflags_sf[][src]

pub const fn rflags_sf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.rflags_zf.html b/kvm_rs/x86_64/fn.rflags_zf.html new file mode 100644 index 0000000..f1771d8 --- /dev/null +++ b/kvm_rs/x86_64/fn.rflags_zf.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::rflags_zf - Rust + +

Function kvm_rs::x86_64::rflags_zf[][src]

pub const fn rflags_zf(r: u64) -> u64
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.seg_selector_index.html b/kvm_rs/x86_64/fn.seg_selector_index.html new file mode 100644 index 0000000..8c79a6b --- /dev/null +++ b/kvm_rs/x86_64/fn.seg_selector_index.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::seg_selector_index - Rust + +

Function kvm_rs::x86_64::seg_selector_index[][src]

pub const fn seg_selector_index(s: u16) -> u16
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.seg_selector_rpl.html b/kvm_rs/x86_64/fn.seg_selector_rpl.html new file mode 100644 index 0000000..71e41fe --- /dev/null +++ b/kvm_rs/x86_64/fn.seg_selector_rpl.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::seg_selector_rpl - Rust + +

Function kvm_rs::x86_64::seg_selector_rpl[][src]

pub const fn seg_selector_rpl(s: u16) -> u16
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/fn.seg_selector_ti.html b/kvm_rs/x86_64/fn.seg_selector_ti.html new file mode 100644 index 0000000..edf949b --- /dev/null +++ b/kvm_rs/x86_64/fn.seg_selector_ti.html @@ -0,0 +1,5 @@ +kvm_rs::x86_64::seg_selector_ti - Rust + +

Function kvm_rs::x86_64::seg_selector_ti[][src]

pub const fn seg_selector_ti(s: u16) -> u16
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/index.html b/kvm_rs/x86_64/index.html new file mode 100644 index 0000000..6303749 --- /dev/null +++ b/kvm_rs/x86_64/index.html @@ -0,0 +1,42 @@ +kvm_rs::x86_64 - Rust + +

Module kvm_rs::x86_64[][src]

x86_64 flags and bitfields.

+

Constants

+
CR0_AM

Alignment Mask.

+
CR0_CD

Cachine disable.

+
CR0_EM

Emulation.

+
CR0_ET

Extension Type.

+
CR0_MP

Monitor Coprocessor.

+
CR0_NE

Numeric Error.

+
CR0_NW

Not Write-Torugh.

+
CR0_PE

Protection Enable.

+
CR0_PG

Paging.

+
CR0_TS

Task Switched.

+
CR0_WP

Write Protect.

+
CR3_PAGE_BASE_MASK

Mask for physical base address of paging structure.

+
CR3_PCD

Page-level Cache Disable.

+
CR3_PWT

Page-level Write-Through.

+
CR4_LA57

57-bit Linear Addresses.

+
CR4_PAE

Physical Address Extenstion.

+
EFER_LMA

Long Mode Active (readonly).

+
EFER_LME

Long Mode Enable.

+
MSR_EFER

Extended Feature Enable Register MSR number.

+
PAGE_ENTRY_PRESENT

Page entry present.

+
PAGE_RENTRY_RW

Page region read/write.

+
RFLAGS_AC

Alignment check.

+
RFLAGS_AF

Adjust flag.

+
RFLAGS_CF

Carry flag.

+
RFLAGS_DF

Direction flag.

+
RFLAGS_IF

Sign flag.

+
RFLAGS_IOPL

I/O privilege level.

+
RFLAGS_OF

Overflow flag.

+
RFLAGS_PF

Parity flag.

+
RFLAGS_SF

Sign flag.

+
RFLAGS_ZF

Zero flag.

+
SEG_SELECTOR_INDEX

Table index.

+
SEG_SELECTOR_RPL

Requested privilege level.

+
SEG_SELECTOR_TI

Table indicator.

+

Functions

+
rflags_ac
rflags_af
rflags_cf
rflags_df
rflags_if
rflags_iopl
rflags_of
rflags_pf
rflags_sf
rflags_zf
seg_selector_index
seg_selector_rpl
seg_selector_ti
+ \ No newline at end of file diff --git a/kvm_rs/x86_64/sidebar-items.js b/kvm_rs/x86_64/sidebar-items.js new file mode 100644 index 0000000..e82f7b3 --- /dev/null +++ b/kvm_rs/x86_64/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"constant":[["CR0_AM","Alignment Mask."],["CR0_CD","Cachine disable."],["CR0_EM","Emulation."],["CR0_ET","Extension Type."],["CR0_MP","Monitor Coprocessor."],["CR0_NE","Numeric Error."],["CR0_NW","Not Write-Torugh."],["CR0_PE","Protection Enable."],["CR0_PG","Paging."],["CR0_TS","Task Switched."],["CR0_WP","Write Protect."],["CR3_PAGE_BASE_MASK","Mask for physical base address of paging structure."],["CR3_PCD","Page-level Cache Disable."],["CR3_PWT","Page-level Write-Through."],["CR4_LA57","57-bit Linear Addresses."],["CR4_PAE","Physical Address Extenstion."],["EFER_LMA","Long Mode Active (readonly)."],["EFER_LME","Long Mode Enable."],["MSR_EFER","Extended Feature Enable Register MSR number."],["PAGE_ENTRY_PRESENT","Page entry present."],["PAGE_RENTRY_RW","Page region read/write."],["RFLAGS_AC","Alignment check."],["RFLAGS_AF","Adjust flag."],["RFLAGS_CF","Carry flag."],["RFLAGS_DF","Direction flag."],["RFLAGS_IF","Sign flag."],["RFLAGS_IOPL","I/O privilege level."],["RFLAGS_OF","Overflow flag."],["RFLAGS_PF","Parity flag."],["RFLAGS_SF","Sign flag."],["RFLAGS_ZF","Zero flag."],["SEG_SELECTOR_INDEX","Table index."],["SEG_SELECTOR_RPL","Requested privilege level."],["SEG_SELECTOR_TI","Table indicator."]],"fn":[["rflags_ac",""],["rflags_af",""],["rflags_cf",""],["rflags_df",""],["rflags_if",""],["rflags_iopl",""],["rflags_of",""],["rflags_pf",""],["rflags_sf",""],["rflags_zf",""],["seg_selector_index",""],["seg_selector_rpl",""],["seg_selector_ti",""]]}); \ No newline at end of file -- cgit v1.2.3