[EMAIL PROTECTED] said:
>
> Well, in that case: How about using something which Virus checkers do:
>
> - Search for specific pieces of code Trapping is more efficient. It
> will automatically run at maximum possible speed until the MMIO is
> detected.
> - Look them up in a translation library
> - Run the translated code
> That's not trivial and probably would result in kind of emulation.
> Uhus
I'm not sure I understand much of what's being said here, but if we have a
device driver that owns a piece of memory representing an emulated device,
can't it use the debug registers to find when something steps on its registers?
For example, I have this device:
00:04.2 USB Controller: Intel Corporation 82371AB PIIX4 USB (rev 01) (prog-if
00 [UHCI])
Flags: bus master, medium devsel, latency 32, IRQ 12
I/O ports at d400 [size=32]
An emulator for this device would broadcast the address for its I/O registers
(maybe d4000) and use the debug registers to trap accesses to them.
Software using the USB (or other) controller would run full-speed, even if
some emulated devices seem a little slow.
--
Cheers
John Summerfield
http://www2.ami.com.au/ for OS/2 & linux information.
Configuration, networking, combined IBM ftpsites index.
Note: mail deliveed to me is deemed to be intended for me, for disposition as
I choose.