Il 05/05/2014 17:56, Alexandru Duţu ha scritto:

It seems that re-entering virtualized execution on UD interception
gives the user the flexibility of running binaries with newer
instructions on older hardware, if kvm is able to emulate the newer
instructions. I do not fully understand the details of this scenario,
is there such a scenario or is it likely that ud_interception() will
change?

Yes, you are correct. This emulation capability is used in some cases, including: MOVBE, SYSCALL/SYSENTER on 32-bit guests, VMCALL and VMMCALL.

Paolo
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to