VOGONS

Common searches


Search results

Display options

Re: test386.asm CPU tester

Note that ARPL won't write to memory unless it has to alter the value. If the page were write-protected, it would be a test against always-write (cmpxchg does the same). That would be a good test. I broke QEMU many years ago like that. My emulator reached the arithlogic tests on the first attempt. …

Re: Finding bugs in 8086-80386 emulation core?

That's exactly the difficult part: the method of execution is a cycle-based one, whereas most emulators(except mine and vladstamate's afaik) run on an instruction level at most(like Dosbox). So that would mean I need to rebuild some of the instruction-level hardware synchronization instead of cycle …

Re: Can x86 16-bit offsets overflow past 0xFFFF?

So the 80286 won't always perform a word prefetch? Page 3-31, 2nd to last paragraph: A prefetcher will perform only a byte code fetch operation for control transfers to an instruction beginning on a numerically odd physical address. So it prefetches words when at an even address, but starting to …

Re: x86 Carry and Auxiliary/Adjust flags?

The rotate ROM is acting odd: it expects the RCLW BX,CL instruction to set Overflow flag while CL=8? Since CL<>1, it shouldn't even change the overflow flag? Also, there's still a problem with 80286+ AAA instruction? RCL would require CL=9 to rotate to the original value, otherwise it will shift …

Re: x86 Carry and Auxiliary/Adjust flags?

For carry, it's not bit 7 that matters in an 8-bit add, it's bit 8 after the adc (consider 0xff+0xff+carry set, or 0xff+0x00+carry clear, depending on the test case). If the value after the add is less than the value of the left parameter, or if the result equals the left parameter and the right …

Re: x86 TLB vs protection?

The address has to be matched in the TLB before the protection check can happe nbecause there can be a mixture of supervisor and user addresses in the TLBs. Otherwise you are performing the address lookup that should be avoided by using the TLB in order to find the corresponding protection bits.

Page 4 of 27