X-Authentication-Warning: delorie.com: mail set sender to djgpp-bounces using -f From: Rugxulo Newsgroups: comp.os.msdos.djgpp Subject: Re: Please help resurrecting GDB for version 7.0 release Date: Wed, 13 May 2009 21:29:59 -0700 (PDT) Organization: http://groups.google.com Lines: 53 Message-ID: References: <83zldveryw DOT fsf AT gnu DOT org> <684bdd55-b464-4e61-b28e-28774dc6ced8 AT o27g2000vbd DOT googlegroups DOT com> <83y6tfem02 DOT fsf AT gnu DOT org> <_ZKdnV74euw2-2HUnZ2dnUVZ_uednZ2d AT earthlink DOT com> <83ws8zeb05 DOT fsf AT gnu DOT org> <83skjldt35 DOT fsf AT gnu DOT org> <58b10f6a-eba5-4cc2-bef8-cc5fc4251e06 AT q2g2000vbr DOT googlegroups DOT com> <83fxfkdz2n DOT fsf AT gnu DOT org> <000b187c-f14b-4f37-81ca-0d93f4e1b2e1 AT g20g2000vba DOT googlegroups DOT com> <83eiv3e71o DOT fsf AT gnu DOT org> NNTP-Posting-Host: 65.13.115.246 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Trace: posting.google.com 1242275399 7255 127.0.0.1 (14 May 2009 04:29:59 GMT) X-Complaints-To: groups-abuse AT google DOT com NNTP-Posting-Date: Thu, 14 May 2009 04:29:59 +0000 (UTC) Complaints-To: groups-abuse AT google DOT com Injection-Info: r13g2000vbr.googlegroups.com; posting-host=65.13.115.246; posting-account=p5rsXQoAAAB8KPnVlgg9E_vlm2dvVhfO User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729),gzip(gfe),gzip(gfe) To: djgpp AT delorie DOT com DJ-Gateway: from newsgroup comp.os.msdos.djgpp Reply-To: djgpp AT delorie DOT com Hi, On May 13, 10:03=A0pm, "A. Wik" wrote: > On Tue, 5 May 2009, Eli Zaretskii wrote: > > > From: Rugxulo > > > Date: Mon, 4 May 2009 22:08:44 -0700 (PDT) > > > That depends on the method you use for detecting the CPU. =A0If you use > > no privileged instructions, there should be no reason to test under > > different OSes, I think. =A0Otherwise, yes. > > This may not be relevant to a specific situation, but > generally speaking, bugs can occur in any any instruction, > privileged or otherwise. =A0For example, the F00F and FDIV > CPU bugs[1] require no privileges[2] to trigger. =A0 What bothers me is that you can't even *read* a control register. Sure, some smart guys emulate it (JEMM386), but most don't (Vista). How are you supposed to know that SSE is enabled? Either run, crash, recover ... or do something weird and undocumented (fxsave, fxrstor, fxsave, is XMM0 saved? if not, not enabled). Already mailed a snippet of this to Eli and CWS for testing although it works fine for me on various cpus. Not that I honestly think SSE support is easy to implement (or crucial, even), so I'm pessimistic, but hey, worth a try, even if my help is pretty worthless. ;-) > Also, normally unprivileged instructions such as floating point > can be programmed to generate exceptions, although that is > normally only done on CPUs lacking a math co-processor or > FPU [3], such as the 486SX and most 386 (SX, DX, or null > suffix) systems. I wish I was smart enough to make DJGPP (EMU387.DXE, perhaps?) emulate the CMOV.. instructions. At least then we wouldn't have to worry about accidental 686+ only compiles. Plus, God forbid, it may actually run faster on modern machines while still working correctly on older ones. Imagine! > -aw > [1] =A0I think I do have machines, or at least CPUs, affected > =A0 by either of those two bugs. =A0If anyone has a need to > =A0 test code under these conditions I might look into it. wget http://rugxulo.googlepages.com/rugx_src.zip Read, then assemble FPU-BUG.ASM, and tell me what you think. ;-) Note that I did a little research browsing the web a while back, so it should be fairly informative, even if you know a little already. Of course, my P1 is 166 Mhz, so it can't have the bug. Still, worth investigating, IMHO. (I could've posted the whole thing here, it's not too long, but some might consider it off-topic.) ;-)