diff options
author | Andreas Kling <kling@serenityos.org> | 2020-07-22 00:03:48 +0200 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2020-07-22 00:07:15 +0200 |
commit | 9fc00d5d126a0b5ec1e155675e7a6f309c19b5dc (patch) | |
tree | 0e24f93450e730a87676077b2df98fc0885460be /DevTools | |
parent | 201cc1bfcc24d692ecdcacb45bf344c5839f021b (diff) | |
download | serenity-9fc00d5d126a0b5ec1e155675e7a6f309c19b5dc.zip |
UserspaceEmulator: XLAT BX should not check full EBX shadow bits
Thanks to Rick van Schijndel for pointing this out. :^)
Diffstat (limited to 'DevTools')
-rw-r--r-- | DevTools/UserspaceEmulator/SoftCPU.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/DevTools/UserspaceEmulator/SoftCPU.cpp b/DevTools/UserspaceEmulator/SoftCPU.cpp index e0e666bb1c..5130e6b80f 100644 --- a/DevTools/UserspaceEmulator/SoftCPU.cpp +++ b/DevTools/UserspaceEmulator/SoftCPU.cpp @@ -2484,7 +2484,7 @@ void SoftCPU::XLAT(const X86::Instruction& insn) if (insn.a32()) warn_if_uninitialized(ebx(), "xlat ebx"); else - warn_if_uninitialized(ebx(), "xlat bx"); + warn_if_uninitialized(bx(), "xlat bx"); warn_if_uninitialized(al(), "xlat al"); u32 offset = (insn.a32() ? ebx().value() : bx().value()) + al().value(); set_al(read_memory8({ segment(insn.segment_prefix().value_or(X86::SegmentRegister::DS)), offset })); |