1
کامپیوتر و شبکه::
قابل خودمجازیسازی
In building the VAX VMM security kernel, four major challenges had to be addressed: (1) virtualizing the protection rings of the VAX processor; (2) identifying the sensitive instructions of the VAX processor; (3) emulating I/O operations generated by the untrusted user VMs; and (4) enabling the VAX VMM system to be self-virtualizable.
The result of making all sensitive processor instructions privileged is that the VAX VMM system is self-virtualizable.
A self-virtualizable VMM can run in one of its own VMMs, permitting recursive construction of VM systems.
Until the introduction of the Intel VT and AMD Pacifica processors, no x86 architectures were self-virtualizable, thus any VMM design for x86 (see Section 11.3) had to address similar problems as in the VAX VMM design.
Ways in which the x86 is not self-virtualizable are described by Robin and Irvine [258].
واژگان شبکه مترجمین ایران