On Thursday 19 June 2008, JD wrote:
> For the sake of most of us who do not have the
> time bandwidth, would you be kind enough to state
> the location in the source code where guest
> instructions are run natively on non-VT hardware?
> It would be very helpful.

There is not only one place. But have a look at VMM/VMMSwitcher.
This code switches between host context and guest context. It
reloads the complete hardware state (the most important registers
are CR0, CR3 and CR4). And in the same switcher code the segment
descriptors are reloaded as well to change the privilege level
of the code executed in guest mode (the guest kernel is executed
in Ring1 as opposed to Ring0 where the hypervisor and the host
kernel is executed).

And have a look at VMM/PATM where the patch manager resides. This
code is only necessary for the raw mode to remove dangerous
instructions from the guest, for example cli/sti/popf.

Kind regards,

Frank
-- 
Dr.-Ing. Frank Mehnert    Sun Microsystems    http://www.sun.com/

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
vbox-users mailing list
[email protected]
http://vbox.innotek.de/mailman/listinfo/vbox-users

Reply via email to