Bläddra i källkod

UserspaceEmulator: XLAT BX should not check full EBX shadow bits

Thanks to Rick van Schijndel for pointing this out. :^)
Andreas Kling 5 år sedan
förälder
incheckning
9fc00d5d12
1 ändrade filer med 1 tillägg och 1 borttagningar
  1. 1 1
      DevTools/UserspaceEmulator/SoftCPU.cpp

+ 1 - 1
DevTools/UserspaceEmulator/SoftCPU.cpp

@@ -2484,7 +2484,7 @@ void SoftCPU::XLAT(const X86::Instruction& insn)
     if (insn.a32())
     if (insn.a32())
         warn_if_uninitialized(ebx(), "xlat ebx");
         warn_if_uninitialized(ebx(), "xlat ebx");
     else
     else
-        warn_if_uninitialized(ebx(), "xlat bx");
+        warn_if_uninitialized(bx(), "xlat bx");
     warn_if_uninitialized(al(), "xlat al");
     warn_if_uninitialized(al(), "xlat al");
     u32 offset = (insn.a32() ? ebx().value() : bx().value()) + al().value();
     u32 offset = (insn.a32() ? ebx().value() : bx().value()) + al().value();
     set_al(read_memory8({ segment(insn.segment_prefix().value_or(X86::SegmentRegister::DS)), offset }));
     set_al(read_memory8({ segment(insn.segment_prefix().value_or(X86::SegmentRegister::DS)), offset }));