diff options
author | Kartik Agaram <vc@akkartik.com> | 2020-07-01 16:46:06 -0700 |
---|---|---|
committer | Kartik Agaram <vc@akkartik.com> | 2020-07-01 16:47:20 -0700 |
commit | 996402e8fdb30cc29735d9dd190ff78676d6c907 (patch) | |
tree | 072507f0fe76bd4102230123625477b2a0600e02 /020syscalls.cc | |
parent | 792451d1be576dfd35c2473cb4ede75ccca63782 (diff) | |
download | mu-996402e8fdb30cc29735d9dd190ff78676d6c907.tar.gz |
6604 - new app
https://archive.org/details/akkartik-2min-2020-07-01 In the process I found a bug, added a new syscall, and 'emulated' it.
Diffstat (limited to '020syscalls.cc')
-rw-r--r-- | 020syscalls.cc | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/020syscalls.cc b/020syscalls.cc index be075426..84a6af34 100644 --- a/020syscalls.cc +++ b/020syscalls.cc @@ -79,6 +79,9 @@ void process_int80() { Reg[EAX].u = new_segment(/*length*/read_mem_u32(Reg[EBX].u+0x4)); trace(Callstack_depth+1, "run") << "result: " << Reg[EAX].u << end(); break; + case 0xa2: // nanosleep + cerr << "not sleeping\n"; + break; default: raise << HEXWORD << EIP << ": unimplemented syscall " << Reg[EAX].u << '\n' << end(); } |