Re: Verifying Execution Integrity in Untrusted hypervisors

2014-07-26 Thread Andrey Korolyov
On Sat, Jul 26, 2014 at 2:06 AM, Paolo Bonzini wrote: > >> Thanks a lot Paolo. >> >> Is there a way to atleast detect that the hypervisor has done something >> malicious and the client will be able to refer to some kind of logs to >> prove it? > > If you want a theoretical, perfect solution, no.

Re: [PATCH v3 6/6] kvm, mem-hotplug: Reload L1's apic access page if it is migrated when L2 is running.

2014-07-26 Thread Jan Kiszka
On 2014-07-23 21:42, Tang Chen wrote: > This patch only handle "L1 and L2 vm share one apic access page" situation. > > When L1 vm is running, if the shared apic access page is migrated, > mmu_notifier will > request all vcpus to exit to L0, and reload apic access page physical address > for > a

Re: [PATCH 3/4] x86/kvm: Resolve shadow warnings in macro expansion

2014-07-26 Thread Paolo Bonzini
Il 25/07/2014 19:18, Rustad, Mark D ha scritto: > On Jul 25, 2014, at 7:06 AM, Paolo Bonzini wrote: > >> Il 25/07/2014 15:27, Jeff Kirsher ha scritto: >>> From: Mark Rustad >>> >>> Resolve shadow warnings that appear in W=2 builds. In this case, >>> a macro declared an inner local variable with