Proceedings of the 25th Symposium on Operating Systems Principles 2015
DOI: 10.1145/2815400.2815420
|View full text |Cite
|
Sign up to set email alerts
|

Virtual CPU validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
24
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 23 publications
1
24
0
Order By: Relevance
“…VSwapper showed that uncooperative swapping of memory of virtual machines can be made efficient, despite the common belief that this is impossible [14]. Virtual CPU validation showed how to uncover a massive amount of (confirmed and now fixed) hypervisor bugs by applying Intel's physical CPU testing infrastructure to the KVM hypervisor [15]. EIOVAR and its successor projects allowed for substantially faster and safer IOMMU protection and found their way into the Linux kernel [126,127,142].…”
Section: Authors' Perspectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…VSwapper showed that uncooperative swapping of memory of virtual machines can be made efficient, despite the common belief that this is impossible [14]. Virtual CPU validation showed how to uncover a massive amount of (confirmed and now fixed) hypervisor bugs by applying Intel's physical CPU testing infrastructure to the KVM hypervisor [15]. EIOVAR and its successor projects allowed for substantially faster and safer IOMMU protection and found their way into the Linux kernel [126,127,142].…”
Section: Authors' Perspectivesmentioning
confidence: 99%
“…It remains error-prone. A recent study by Amit et al [15] identified 117 emulation bugs in the KVM kernel module, of which 72 were in the emulator alone.…”
Section: The Kvm Kernel Modulementioning
confidence: 99%
“…The study in [43] has demonstrated how Xen's memory is hijacked from the Dom0 domain. A CPU testing method has uncovered 117 bugs on the Linux KVM hypervisor, which introduced security vulnerabilities to the VMs, and flaws in Intel virtualization technology that cause an differences in the observable behavior of code running on virtual and bare-metal servers [44]. In the following, we describe attacks targeting the hypervisor.…”
Section: Attacks On the Hypervisormentioning
confidence: 99%
“…Naturally, a first use case being to validate critical components such as the hypervisor. For example, Leinenbach et al [16] verified a subset of the Microsoft Hyper-V hypervisor instructions while Amit et al [1] used the Intel Hardware validation tool, to perform a test-based validation of the virtual VCPU behaviour inside the KVM hypervisor. Amazon used TLA specifications coupled with the TLC model checker to exhibit new bugs inside Amazon S3 and DynamoDB [22].…”
Section: Related Workmentioning
confidence: 99%
“…This solution is illustrated on BtrPlace [13], an open-source VM scheduler that received contributions from developers with various expertise. BtrPlace is also used in production by Nutanix, a provider of entreprise clusters, to mitigate local load spikes in thousands of private entreprise clouds 1 .…”
Section: Introductionmentioning
confidence: 99%