VirtualBox

Changeset 80816 in vbox for trunk/src


Ignore:
Timestamp:
Sep 16, 2019 9:23:56 AM (5 years ago)
Author:
vboxsync
Message:

VMM/IEM: "guest hypervisor" -> "nested hypervisor".

Location:
trunk/src/VBox/VMM/VMMAll
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/VMM/VMMAll/IEMAllCImplSvmInstr.cpp.h

    r80281 r80816  
    10611061    {
    10621062        /*
    1063          * This shouldn't happen, but if it does, cause a #VMEXIT and let the "host" (guest hypervisor) deal with it.
     1063         * This shouldn't happen, but if it does, cause a #VMEXIT and let the "host" (nested hypervisor) deal with it.
    10641064         */
    10651065        Log(("iemSvmHandleMsrIntercept: Invalid/out-of-range MSR %#RX32 fWrite=%RTbool -> #VMEXIT\n", idMsr, fWrite));
  • trunk/src/VBox/VMM/VMMAll/IEMAllCImplVmxInstr.cpp.h

    r80809 r80816  
    15921592
    15931593    /*
    1594      * Optimization if the guest hypervisor is using the same guest-physical page for both
     1594     * Optimization if the nested hypervisor is using the same guest-physical page for both
    15951595     * the VM-entry MSR-load area as well as the VM-exit MSR store area.
    15961596     */
     
    16301630            /*
    16311631             * If we're in ring-0, we cannot handle returns to ring-3 at this point and continue VM-exit.
    1632              * If any guest hypervisor loads MSRs that require ring-3 handling, we cause a VMX-abort
     1632             * If any nested hypervisor loads MSRs that require ring-3 handling, we cause a VMX-abort
    16331633             * recording the MSR index in the auxiliary info. field and indicated further by our
    16341634             * own, specific diagnostic code. Later, we can try implement handling of the MSR in ring-0
     
    19901990                /*
    19911991                 * If we're in ring-0, we cannot handle returns to ring-3 at this point and continue VM-exit.
    1992                  * If any guest hypervisor loads MSRs that require ring-3 handling, we cause a VMX-abort
     1992                 * If any nested hypervisor loads MSRs that require ring-3 handling, we cause a VMX-abort
    19931993                 * recording the MSR index in the auxiliary info. field and indicated further by our
    19941994                 * own, specific diagnostic code. Later, we can try implement handling of the MSR in ring-0
     
    64076407        /** @todo r=ramshankar: This is done primarily to simplify recursion scenarios while
    64086408         *        redirecting accesses between the APIC-access page and the virtual-APIC
    6409          *        page. If any guest hypervisor requires this, we can implement it later. */
     6409         *        page. If any nested hypervisor requires this, we can implement it later. */
    64106410        if (pVmcs->u32ProcCtls & VMX_PROC_CTLS_USE_TPR_SHADOW)
    64116411        {
     
    67566756                /*
    67576757                 * If we're in ring-0, we cannot handle returns to ring-3 at this point and continue VM-entry.
    6758                  * If any guest hypervisor loads MSRs that require ring-3 handling, we cause a VM-entry failure
     6758                 * If any nested hypervisor loads MSRs that require ring-3 handling, we cause a VM-entry failure
    67596759                 * recording the MSR index in the Exit qualification (as per the Intel spec.) and indicated
    67606760                 * further by our own, specific diagnostic code. Later, we can try implement handling of the
     
    71717171    /*
    71727172     * Any VMCS field which we do not establish on every VM-exit but may potentially
    7173      * be used on the VM-exit path of a guest hypervisor -and- is not explicitly
     7173     * be used on the VM-exit path of a nested hypervisor -and- is not explicitly
    71747174     * specified to be undefined needs to be initialized here.
    71757175     *
     
    73227322     * We are allowed to cache VMCS related data structures (such as I/O bitmaps, MSR bitmaps)
    73237323     * while entering VMX non-root mode. We do some of this while checking VM-execution
    7324      * controls. The guest hypervisor should not make assumptions and cannot expect
     7324     * controls. The nested hypervisor should not make assumptions and cannot expect
    73257325     * predictable behavior if changes to these structures are made in guest memory while
    73267326     * executing in VMX non-root mode. As far as VirtualBox is concerned, the guest cannot
     
    74267426
    74277427                                /*
    7428                                  * Inject any event that the guest hypervisor wants to inject.
     7428                                 * Inject any event that the nested hypervisor wants to inject.
    74297429                                 * Note! We cannot immediately perform the event injection here as we may have
    74307430                                 *       pending PGM operations to perform due to switching page tables and/or
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette