From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Tosatti Subject: Re: [PATCH 0/2] Remove hack from movsx/movzx decoding Date: Tue, 17 Jan 2012 10:03:44 -0200 Message-ID: <20120117120344.GD17420@amt.cnet> References: <1326719325-23184-1-git-send-email-avi@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kvm@vger.kernel.org, namit@cs.technion.ac.il To: Avi Kivity Return-path: Received: from mx1.redhat.com ([209.132.183.28]:61206 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753056Ab2AQMRz (ORCPT ); Tue, 17 Jan 2012 07:17:55 -0500 Content-Disposition: inline In-Reply-To: <1326719325-23184-1-git-send-email-avi@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: On Mon, Jan 16, 2012 at 03:08:43PM +0200, Avi Kivity wrote: > movsx/movzx destination operands currently have a hack for the operand size. > Add OpMem8 and use it to remove the hack. > > I'll wait with this until Nadav's more direct fix is in. > > Avi Kivity (2): > KVM: x86 emulator: add 8-bit memory operands > KVM: x86 emulator: Remove byte-sized MOVSX/MOVZX hack > > arch/x86/kvm/emulate.c | 18 ++++++++++-------- > 1 files changed, 10 insertions(+), 8 deletions(-) Applied, thanks.