...system 16 16 网络与分布式系统研究室(DisNet Lab of NWU) 2011-4-1 Hardware Features • Privileged instructions(特权指令) – Certain machine level instructions can only be executed by the monitor • Interrupts – Early computer models did no...
基于513个网页-相关网页
In the end, they had a version of the BSD kernel running as a process on top of their microkernel and calling down to Mach instead of executing privileged instructions.
最后,他们使用了某一版本的BSD内核,作为进程运行在他们的微内核上层,调用Mach,而不是运行特权指令。
A similar example is runtime code scanning used by full virtualization solutions to find and redirect privileged instructions (to work around issues in certain processor instruction sets).
类似的一个例子是完全虚拟化解决方案通过运行时代码扫描来查找和重定向特权指令(用来解决特定处理器指令集的一些问题)。
The System/390 architecture allowed complete virtualization of the machine, including even the "privileged" instructions that simply ran inside the sandbox created for them.
System/390 架构支持机器的完全虚拟化,甚至包括只能在为虚拟机创建的沙箱中运行的“特权”指令。
应用推荐