Hacker News new | past | comments | ask | show | jobs | submit login

Interesting. I wonder to what extent one could trap vectorization instructions in e.g. KVM. Presumably they are unprivileged instructions on x86?



> Presumably they are unprivileged instructions on x86?

They're all unprivileged; having to go to the kernel would defeat the purpose most of the time.

Also, trapping them wouldn't make a difference. Fixing the CPUID fields on the other hand (so that these code paths are not taken in the first place)...




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: