Hacker News new | past | comments | ask | show | jobs | submit login

Interesting. I wonder to what extent one could trap vectorization instructions in e.g. KVM. Presumably they are unprivileged instructions on x86?



> Presumably they are unprivileged instructions on x86?

They're all unprivileged; having to go to the kernel would defeat the purpose most of the time.

Also, trapping them wouldn't make a difference. Fixing the CPUID fields on the other hand (so that these code paths are not taken in the first place)...




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: