Il 05/05/2014 17:56, Alexandru Duţu ha scritto:
It seems that re-entering virtualized execution on UD interception gives the user the flexibility of running binaries with newer instructions on older hardware, if kvm is able to emulate the newer instructions. I do not fully understand the details of this scenario, is there such a scenario or is it likely that ud_interception() will change?
Yes, you are correct. This emulation capability is used in some cases, including: MOVBE, SYSCALL/SYSENTER on 32-bit guests, VMCALL and VMMCALL.
Paolo -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html