浏览代码

UserspaceEmulator: XLAT BX should not check full EBX shadow bits

Thanks to Rick van Schijndel for pointing this out. :^)
Andreas Kling 5 年之前
父节点
当前提交
9fc00d5d12
共有 1 个文件被更改,包括 1 次插入1 次删除
  1. 1 1
      DevTools/UserspaceEmulator/SoftCPU.cpp

+ 1 - 1
DevTools/UserspaceEmulator/SoftCPU.cpp

@@ -2484,7 +2484,7 @@ void SoftCPU::XLAT(const X86::Instruction& insn)
     if (insn.a32())
         warn_if_uninitialized(ebx(), "xlat ebx");
     else
-        warn_if_uninitialized(ebx(), "xlat bx");
+        warn_if_uninitialized(bx(), "xlat bx");
     warn_if_uninitialized(al(), "xlat al");
     u32 offset = (insn.a32() ? ebx().value() : bx().value()) + al().value();
     set_al(read_memory8({ segment(insn.segment_prefix().value_or(X86::SegmentRegister::DS)), offset }));