On Thursday 19 June 2008, JD wrote: > For the sake of most of us who do not have the > time bandwidth, would you be kind enough to state > the location in the source code where guest > instructions are run natively on non-VT hardware? > It would be very helpful.
There is not only one place. But have a look at VMM/VMMSwitcher. This code switches between host context and guest context. It reloads the complete hardware state (the most important registers are CR0, CR3 and CR4). And in the same switcher code the segment descriptors are reloaded as well to change the privilege level of the code executed in guest mode (the guest kernel is executed in Ring1 as opposed to Ring0 where the hypervisor and the host kernel is executed). And have a look at VMM/PATM where the patch manager resides. This code is only necessary for the raw mode to remove dangerous instructions from the guest, for example cli/sti/popf. Kind regards, Frank -- Dr.-Ing. Frank Mehnert Sun Microsystems http://www.sun.com/
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ vbox-users mailing list [email protected] http://vbox.innotek.de/mailman/listinfo/vbox-users
