[EMAIL PROTECTED] said:
> 
> Well, in that case: How about using something which Virus checkers do:
> 
> - Search for specific pieces of code Trapping is more efficient. It
> will automatically run at maximum possible speed until the MMIO is
> detected.

> - Look them up in a translation library
> - Run the translated code
>  That's not trivial and probably would result in kind of emulation.
> Uhus


I'm not sure I understand much of what's being said here, but if we have a 
device driver that owns a piece of memory representing an emulated device, 
can't it use the debug registers to find when something steps on its registers?

For example, I have this device:
00:04.2 USB Controller: Intel Corporation 82371AB PIIX4 USB (rev 01) (prog-if 
00 [UHCI])
        Flags: bus master, medium devsel, latency 32, IRQ 12
        I/O ports at d400 [size=32]


An emulator for this device would broadcast the address for its I/O registers 
(maybe d4000) and use the debug registers to trap accesses to them.


Software using the USB (or other) controller would run full-speed, even if 
some emulated devices seem a little slow.

-- 
Cheers
John Summerfield
http://www2.ami.com.au/ for OS/2 & linux information.
Configuration, networking, combined IBM ftpsites index.

Note: mail deliveed to me is deemed to be intended for me, for disposition as 
I choose.




Reply via email to