Skip to content
This repository has been archived by the owner on Dec 24, 2020. It is now read-only.

Restartability of Stack Instructions

Compare
Choose a tag to compare
@jeffpar jeffpar released this 15 Sep 00:43
· 3770 commits to master since this release

The most recent bug fix for the Windows 95 test machine involved a 32-bit CALL and a stack page that was swapped out: the CALL was decoded, the stack pointer was decremented, and then a page fault was generated when the stack was written. Unfortunately, the stack pointer was saved in its decremented state, so when the CALL was restarted, the stack pointer was no longer where it was supposed to be. Hopefully the CALL instruction, as well as every other stack-based instruction, is now fully restartable after any #GP, #SS, or #PF fault.

The PCjs Debugger also does a better job of mimicking WDEB386 now, and is able to associate DLL exports with the appropriate memory segments.