On 13.01.2020 20:40, Jason Andryuk wrote:
> On Fri, Dec 27, 2019 at 11:09 AM Andrew Cooper
> <andrew.coop...@citrix.com> wrote:
>>
>> On 20/12/2019 16:23, Jan Beulich wrote:
>>> On 16.09.2019 11:40, Jan Beulich wrote:
>>>> Using memcpy() may result in multiple individual byte accesses
>>>> (dependening how memcpy() is implemented and how the resulting insns,
>>>> e.g. REP MOVSB, get carried out in hardware), which isn't what we
>>>> want/need for carrying out guest insns as correctly as possible. Fall
>>>> back to memcpy() only for accesses not 2, 4, or 8 bytes in size.
>>>>
>>>> Suggested-by: Andrew Cooper <andrew.coop...@citrix.com>
>>>> Signed-off-by: Jan Beulich <jbeul...@suse.com>
>>
>> Acked-by: Andrew Cooper <andrew.coop...@citrix.com>
> 
> Should xen/arch/x86/mm/shadow/hvm.c:hvm_emulate_write() be similarly changed?

Probably. Care to make a patch?

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to