> Date: Wed, 5 Sep 2012 04:01:56 +0400
> From: Alexander Polakov <p...@sdf.org>
> 
> * Alexander Polakov <p...@sdf.org> [120903 21:41]:
> > Now back to "underlying issues": x86emu executes some code which causes
> > parity check NMI (bit 7 set in port 0x61) to be generated, which causes
> > drop to the debugger (I mistook it for a panic).
> 
> Nobody asked me which code exactly. But I'll tell you anyway.
> 
> 000C1867 56                             push    si
> 000C1868 BE 38 02                       mov     si, 0x0238
> 000C186B 8B 34                          mov     si, [si]
> 000C186D 8B 74 10                       mov     si, [si+0x10]
> 000C1870 83 C6 04                       add     si, 0x04
> 000C1873 FC                             cld     
> 000C1874 B9 07 00                       mov     cx, 0x0007
> 000C1877 66 AD                          lods    eax, ds:[esi]
> 000C1879 E8 D5 F9                       call    0x000C1251
> 000C187C 83 C3 04                       add     bx, 0x04
> 000C187F E2 F6                          loop    0x000C1877
> 000C1881 5E                             pop     si
> 000C1882 C3                             ret     
> 
> NMI ... going to debugger
> <...>
> x86emu: SEGMASK: 0x0
> x86emu: R_DS: 0xc000
> x86emu: R_SS: 0x0
> x86emu: R_CS: 0xc000
> x86emu: R_ES: 0xc000
> x86emu: R_FS: 0x0
> x86emu: R_GS: 0x0
> x86emu: R_IP: 0x1877
> x86emu: R_SI: 0xe886
> x86emu: R_ESI: 0xe886
> x86emu: Now at 0xc1877, instruction: 0x66
> 
> Sometimes it's 0xc1878 or even 0xc187f.
> 
> So, if you feel like debugging this video bios/x86 emulation mess,
> feel free to contact me, I can provide you with memory dump or
> disassembled memory dump.

Hmm 0x66 is used as an instruction prefix.  I believe I've seen
prefix-related fixes flying by on the Xorg mailing lists.  Might be
worth investigating whether there are any x86emu fixes that are
missing from our tree.

Reply via email to