All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Michael S. Tsirkin" <mst@redhat.com>
To: Stefan Hajnoczi <stefanha@gmail.com>
Cc: Wei Wang <wei.w.wang@intel.com>,
	"virtio-dev@lists.oasis-open.org"
	<virtio-dev@lists.oasis-open.org>,
	"Yang, Zhiyong" <zhiyong.yang@intel.com>,
	"jan.kiszka@siemens.com" <jan.kiszka@siemens.com>,
	"jasowang@redhat.com" <jasowang@redhat.com>,
	"avi.cohen@huawei.com" <avi.cohen@huawei.com>,
	"qemu-devel@nongnu.org" <qemu-devel@nongnu.org>,
	Stefan Hajnoczi <stefanha@redhat.com>,
	"pbonzini@redhat.com" <pbonzini@redhat.com>,
	"marcandre.lureau@redhat.com" <marcandre.lureau@redhat.com>
Subject: [virtio-dev] Re: [Qemu-devel] [virtio-dev] [PATCH v3 0/7] Vhost-pci for inter-VM communication
Date: Thu, 7 Dec 2017 19:38:49 +0200	[thread overview]
Message-ID: <20171207193003-mutt-send-email-mst@kernel.org> (raw)
In-Reply-To: <CAJSP0QVnukGD3Afu9myv=v5OjqrPDpXu6JL3Tpf+Cdk=em9V3w@mail.gmail.com>

On Thu, Dec 07, 2017 at 05:29:14PM +0000, Stefan Hajnoczi wrote:
> On Thu, Dec 7, 2017 at 4:47 PM, Michael S. Tsirkin <mst@redhat.com> wrote:
> > On Thu, Dec 07, 2017 at 04:29:45PM +0000, Stefan Hajnoczi wrote:
> >> On Thu, Dec 7, 2017 at 2:02 PM, Michael S. Tsirkin <mst@redhat.com> wrote:
> >> > On Thu, Dec 07, 2017 at 01:08:04PM +0000, Stefan Hajnoczi wrote:
> >> >> Instead of responding individually to these points, I hope this will
> >> >> explain my perspective.  Let me know if you do want individual
> >> >> responses, I'm happy to talk more about the points above but I think
> >> >> the biggest difference is our perspective on this:
> >> >>
> >> >> Existing vhost-user slave code should be able to run on top of
> >> >> vhost-pci.  For example, QEMU's
> >> >> contrib/vhost-user-scsi/vhost-user-scsi.c should work inside the guest
> >> >> with only minimal changes to the source file (i.e. today it explicitly
> >> >> opens a UNIX domain socket and that should be done by libvhost-user
> >> >> instead).  It shouldn't be hard to add vhost-pci vfio support to
> >> >> contrib/libvhost-user/ alongside the existing UNIX domain socket code.
> >> >>
> >> >> This seems pretty easy to achieve with the vhost-pci PCI adapter that
> >> >> I've described but I'm not sure how to implement libvhost-user on top
> >> >> of vhost-pci vfio if the device doesn't expose the vhost-user
> >> >> protocol.
> >> >>
> >> >> I think this is a really important goal.  Let's use a single
> >> >> vhost-user software stack instead of creating a separate one for guest
> >> >> code only.
> >> >>
> >> >> Do you agree that the vhost-user software stack should be shared
> >> >> between host userspace and guest code as much as possible?
> >> >
> >> >
> >> >
> >> > The sharing you propose is not necessarily practical because the security goals
> >> > of the two are different.
> >> >
> >> > It seems that the best motivation presentation is still the original rfc
> >> >
> >> > http://virtualization.linux-foundation.narkive.com/A7FkzAgp/rfc-vhost-user-enhancements-for-vm2vm-communication
> >> >
> >> > So comparing with vhost-user iotlb handling is different:
> >> >
> >> > With vhost-user guest trusts the vhost-user backend on the host.
> >> >
> >> > With vhost-pci we can strive to limit the trust to qemu only.
> >> > The switch running within a VM does not have to be trusted.
> >>
> >> Can you give a concrete example?
> >>
> >> I have an idea about what you're saying but it may be wrong:
> >>
> >> Today the iotlb mechanism in vhost-user does not actually enforce
> >> memory permissions.  The vhost-user slave has full access to mmapped
> >> memory regions even when iotlb is enabled.  Currently the iotlb just
> >> adds an indirection layer but no real security.  (Is this correct?)
> >
> > Not exactly. iotlb protects against malicious drivers within guest.
> > But yes, not against a vhost-user driver on the host.
> >
> >> Are you saying the vhost-pci device code in QEMU should enforce iotlb
> >> permissions so the vhost-user slave guest only has access to memory
> >> regions that are allowed by the iotlb?
> >
> > Yes.
> 
> Okay, thanks for confirming.
> 
> This can be supported by the approach I've described.  The vhost-pci
> QEMU code has control over the BAR memory so it can prevent the guest
> from accessing regions that are not allowed by the iotlb.
> 
> Inside the guest the vhost-user slave still has the memory region
> descriptions and sends iotlb messages.  This is completely compatible
> with the libvirt-user APIs and existing vhost-user slave code can run
> fine.  The only unique thing is that guest accesses to memory regions
> not allowed by the iotlb do not work because QEMU has prevented it.

I don't think this can work since suddenly you need
to map full IOMMU address space into BAR.

Besides, this means implementing iotlb in both qemu and guest.

> If better performance is needed then it might be possible to optimize
> this interface by handling most or even all of the iotlb stuff in QEMU
> vhost-pci code and not exposing it to the vhost-user slave in the
> guest.  But it doesn't change the fact that the vhost-user protocol
> can be used and the same software stack works.

For one, the iotlb part would be out of scope then.
Instead you would have code to offset from BAR.

> Do you have a concrete example of why sharing the same vhost-user
> software stack inside the guest can't work?

With enough dedication some code might be shared.  OTOH reusing virtio
gains you a ready feature negotiation and discovery protocol.

I'm not convinced which has more value, and the second proposal
has been implemented already.



> >> and QEMU generally doesn't
> >> implement things this way.
> >
> > Not sure what does this mean.
> 
> It's the reason why virtio-9p has a separate virtfs-proxy-helper
> program.  Root is needed to set file uid/gids.  Instead of running
> QEMU as root, there is a separate helper process that handles the
> privileged operations.  It slows things down and makes the codebase
> larger but it prevents the guest from getting root in case of QEMU
> bugs.
>
> The reason why VMs are considered more secure than containers is
> because of the extra level of isolation provided by running device
> emulation in an unprivileged userspace process.  If you change this
> model then QEMU loses the "security in depth" advantage.
> 
> Stefan

I don't see where vhost-pci needs QEMU to run as root though.

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


WARNING: multiple messages have this Message-ID (diff)
From: "Michael S. Tsirkin" <mst@redhat.com>
To: Stefan Hajnoczi <stefanha@gmail.com>
Cc: Wei Wang <wei.w.wang@intel.com>,
	"virtio-dev@lists.oasis-open.org"
	<virtio-dev@lists.oasis-open.org>,
	"Yang, Zhiyong" <zhiyong.yang@intel.com>,
	"jan.kiszka@siemens.com" <jan.kiszka@siemens.com>,
	"jasowang@redhat.com" <jasowang@redhat.com>,
	"avi.cohen@huawei.com" <avi.cohen@huawei.com>,
	"qemu-devel@nongnu.org" <qemu-devel@nongnu.org>,
	Stefan Hajnoczi <stefanha@redhat.com>,
	"pbonzini@redhat.com" <pbonzini@redhat.com>,
	"marcandre.lureau@redhat.com" <marcandre.lureau@redhat.com>
Subject: Re: [Qemu-devel] [virtio-dev] [PATCH v3 0/7] Vhost-pci for inter-VM communication
Date: Thu, 7 Dec 2017 19:38:49 +0200	[thread overview]
Message-ID: <20171207193003-mutt-send-email-mst@kernel.org> (raw)
In-Reply-To: <CAJSP0QVnukGD3Afu9myv=v5OjqrPDpXu6JL3Tpf+Cdk=em9V3w@mail.gmail.com>

On Thu, Dec 07, 2017 at 05:29:14PM +0000, Stefan Hajnoczi wrote:
> On Thu, Dec 7, 2017 at 4:47 PM, Michael S. Tsirkin <mst@redhat.com> wrote:
> > On Thu, Dec 07, 2017 at 04:29:45PM +0000, Stefan Hajnoczi wrote:
> >> On Thu, Dec 7, 2017 at 2:02 PM, Michael S. Tsirkin <mst@redhat.com> wrote:
> >> > On Thu, Dec 07, 2017 at 01:08:04PM +0000, Stefan Hajnoczi wrote:
> >> >> Instead of responding individually to these points, I hope this will
> >> >> explain my perspective.  Let me know if you do want individual
> >> >> responses, I'm happy to talk more about the points above but I think
> >> >> the biggest difference is our perspective on this:
> >> >>
> >> >> Existing vhost-user slave code should be able to run on top of
> >> >> vhost-pci.  For example, QEMU's
> >> >> contrib/vhost-user-scsi/vhost-user-scsi.c should work inside the guest
> >> >> with only minimal changes to the source file (i.e. today it explicitly
> >> >> opens a UNIX domain socket and that should be done by libvhost-user
> >> >> instead).  It shouldn't be hard to add vhost-pci vfio support to
> >> >> contrib/libvhost-user/ alongside the existing UNIX domain socket code.
> >> >>
> >> >> This seems pretty easy to achieve with the vhost-pci PCI adapter that
> >> >> I've described but I'm not sure how to implement libvhost-user on top
> >> >> of vhost-pci vfio if the device doesn't expose the vhost-user
> >> >> protocol.
> >> >>
> >> >> I think this is a really important goal.  Let's use a single
> >> >> vhost-user software stack instead of creating a separate one for guest
> >> >> code only.
> >> >>
> >> >> Do you agree that the vhost-user software stack should be shared
> >> >> between host userspace and guest code as much as possible?
> >> >
> >> >
> >> >
> >> > The sharing you propose is not necessarily practical because the security goals
> >> > of the two are different.
> >> >
> >> > It seems that the best motivation presentation is still the original rfc
> >> >
> >> > http://virtualization.linux-foundation.narkive.com/A7FkzAgp/rfc-vhost-user-enhancements-for-vm2vm-communication
> >> >
> >> > So comparing with vhost-user iotlb handling is different:
> >> >
> >> > With vhost-user guest trusts the vhost-user backend on the host.
> >> >
> >> > With vhost-pci we can strive to limit the trust to qemu only.
> >> > The switch running within a VM does not have to be trusted.
> >>
> >> Can you give a concrete example?
> >>
> >> I have an idea about what you're saying but it may be wrong:
> >>
> >> Today the iotlb mechanism in vhost-user does not actually enforce
> >> memory permissions.  The vhost-user slave has full access to mmapped
> >> memory regions even when iotlb is enabled.  Currently the iotlb just
> >> adds an indirection layer but no real security.  (Is this correct?)
> >
> > Not exactly. iotlb protects against malicious drivers within guest.
> > But yes, not against a vhost-user driver on the host.
> >
> >> Are you saying the vhost-pci device code in QEMU should enforce iotlb
> >> permissions so the vhost-user slave guest only has access to memory
> >> regions that are allowed by the iotlb?
> >
> > Yes.
> 
> Okay, thanks for confirming.
> 
> This can be supported by the approach I've described.  The vhost-pci
> QEMU code has control over the BAR memory so it can prevent the guest
> from accessing regions that are not allowed by the iotlb.
> 
> Inside the guest the vhost-user slave still has the memory region
> descriptions and sends iotlb messages.  This is completely compatible
> with the libvirt-user APIs and existing vhost-user slave code can run
> fine.  The only unique thing is that guest accesses to memory regions
> not allowed by the iotlb do not work because QEMU has prevented it.

I don't think this can work since suddenly you need
to map full IOMMU address space into BAR.

Besides, this means implementing iotlb in both qemu and guest.

> If better performance is needed then it might be possible to optimize
> this interface by handling most or even all of the iotlb stuff in QEMU
> vhost-pci code and not exposing it to the vhost-user slave in the
> guest.  But it doesn't change the fact that the vhost-user protocol
> can be used and the same software stack works.

For one, the iotlb part would be out of scope then.
Instead you would have code to offset from BAR.

> Do you have a concrete example of why sharing the same vhost-user
> software stack inside the guest can't work?

With enough dedication some code might be shared.  OTOH reusing virtio
gains you a ready feature negotiation and discovery protocol.

I'm not convinced which has more value, and the second proposal
has been implemented already.



> >> and QEMU generally doesn't
> >> implement things this way.
> >
> > Not sure what does this mean.
> 
> It's the reason why virtio-9p has a separate virtfs-proxy-helper
> program.  Root is needed to set file uid/gids.  Instead of running
> QEMU as root, there is a separate helper process that handles the
> privileged operations.  It slows things down and makes the codebase
> larger but it prevents the guest from getting root in case of QEMU
> bugs.
>
> The reason why VMs are considered more secure than containers is
> because of the extra level of isolation provided by running device
> emulation in an unprivileged userspace process.  If you change this
> model then QEMU loses the "security in depth" advantage.
> 
> Stefan

I don't see where vhost-pci needs QEMU to run as root though.

  reply	other threads:[~2017-12-07 17:38 UTC|newest]

Thread overview: 170+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-12-05  3:33 [virtio-dev] [PATCH v3 0/7] Vhost-pci for inter-VM communication Wei Wang
2017-12-05  3:33 ` [Qemu-devel] " Wei Wang
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 1/7] vhost-user: share the vhost-user protocol related structures Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 2/7] vhost-pci-net: add vhost-pci-net Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05 14:59   ` [virtio-dev] " Stefan Hajnoczi
2017-12-05 14:59     ` [Qemu-devel] " Stefan Hajnoczi
2017-12-05 15:17     ` Michael S. Tsirkin
2017-12-05 15:17       ` [Qemu-devel] " Michael S. Tsirkin
2017-12-05 15:55     ` Michael S. Tsirkin
2017-12-05 15:55       ` [Qemu-devel] " Michael S. Tsirkin
2017-12-05 16:41       ` Stefan Hajnoczi
2017-12-05 16:41         ` [Qemu-devel] " Stefan Hajnoczi
2017-12-05 16:53         ` Michael S. Tsirkin
2017-12-05 16:53           ` [Qemu-devel] " Michael S. Tsirkin
2017-12-05 17:00           ` [virtio-dev] " Cornelia Huck
2017-12-05 17:00             ` Cornelia Huck
2017-12-05 18:06             ` [virtio-dev] " Michael S. Tsirkin
2017-12-05 18:06               ` Michael S. Tsirkin
2017-12-06 10:17     ` Wei Wang
2017-12-06 10:17       ` [Qemu-devel] " Wei Wang
2017-12-06 12:01       ` Stefan Hajnoczi
2017-12-06 12:01         ` [Qemu-devel] " Stefan Hajnoczi
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 3/7] virtio/virtio-pci.c: add vhost-pci-net-pci Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 4/7] vhost-pci-slave: add vhost-pci slave implementation Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05 15:56   ` [virtio-dev] " Stefan Hajnoczi
2017-12-05 15:56     ` [Qemu-devel] " Stefan Hajnoczi
2017-12-14 17:30   ` [virtio-dev] " Stefan Hajnoczi
2017-12-14 17:30     ` [Qemu-devel] " Stefan Hajnoczi
2017-12-14 17:48   ` [virtio-dev] " Stefan Hajnoczi
2017-12-14 17:48     ` [Qemu-devel] " Stefan Hajnoczi
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 5/7] vhost-user: VHOST_USER_SET_VHOST_PCI msg Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05 16:00   ` [virtio-dev] " Stefan Hajnoczi
2017-12-05 16:00     ` [Qemu-devel] " Stefan Hajnoczi
2017-12-06 10:32     ` [virtio-dev] " Wei Wang
2017-12-06 10:32       ` [Qemu-devel] " Wei Wang
2017-12-15 12:40       ` Stefan Hajnoczi
2017-12-15 12:40         ` [Qemu-devel] " Stefan Hajnoczi
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 6/7] vhost-pci-slave: handle VHOST_USER_SET_VHOST_PCI Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05  3:33 ` [virtio-dev] [PATCH v3 7/7] virtio/vhost.c: vhost-pci needs remote gpa Wei Wang
2017-12-05  3:33   ` [Qemu-devel] " Wei Wang
2017-12-05 16:05   ` [virtio-dev] " Stefan Hajnoczi
2017-12-05 16:05     ` [Qemu-devel] " Stefan Hajnoczi
2017-12-06 10:46     ` [virtio-dev] " Wei Wang
2017-12-06 10:46       ` [Qemu-devel] " Wei Wang
2017-12-05  4:13 ` [Qemu-devel] [PATCH v3 0/7] Vhost-pci for inter-VM communication no-reply
2017-12-05  7:01 ` [virtio-dev] " Jason Wang
2017-12-05  7:01   ` [Qemu-devel] " Jason Wang
2017-12-05  7:15   ` Wei Wang
2017-12-05  7:15     ` [Qemu-devel] " Wei Wang
2017-12-05  7:19     ` Jason Wang
2017-12-05  7:19       ` [Qemu-devel] " Jason Wang
2017-12-05  8:49       ` Avi Cohen (A)
2017-12-05  8:49         ` [Qemu-devel] " Avi Cohen (A)
2017-12-05 10:36         ` Wei Wang
2017-12-05 10:36           ` [Qemu-devel] " Wei Wang
2017-12-05 14:30 ` Stefan Hajnoczi
2017-12-05 14:30   ` [Qemu-devel] " Stefan Hajnoczi
2017-12-05 15:20 ` [virtio-dev] " Michael S. Tsirkin
2017-12-05 15:20   ` [Qemu-devel] " Michael S. Tsirkin
2017-12-05 16:06 ` [virtio-dev] " Stefan Hajnoczi
2017-12-05 16:06   ` [Qemu-devel] " Stefan Hajnoczi
2017-12-06 13:49 ` Stefan Hajnoczi
2017-12-06 13:49   ` [Qemu-devel] " Stefan Hajnoczi
2017-12-06 16:09   ` Wang, Wei W
2017-12-06 16:09     ` [Qemu-devel] " Wang, Wei W
2017-12-06 16:27     ` Stefan Hajnoczi
2017-12-07  3:57       ` [virtio-dev] " Wei Wang
2017-12-07  3:57         ` Wei Wang
2017-12-07  5:11         ` [virtio-dev] " Michael S. Tsirkin
2017-12-07  5:11           ` Michael S. Tsirkin
2017-12-07  5:34           ` [virtio-dev] " Wei Wang
2017-12-07  5:34             ` Wei Wang
2017-12-07  6:31         ` Stefan Hajnoczi
2017-12-07  7:54           ` [virtio-dev] " Avi Cohen (A)
2017-12-07  7:54             ` Avi Cohen (A)
2017-12-07  8:04             ` Stefan Hajnoczi
2017-12-07  8:31               ` [virtio-dev] " Jason Wang
2017-12-07  8:31                 ` Jason Wang
2017-12-07 10:24                 ` [virtio-dev] " Stefan Hajnoczi
2017-12-07 10:24                   ` [Qemu-devel] [virtio-dev] " Stefan Hajnoczi
2017-12-07 13:33             ` [virtio-dev] Re: [Qemu-devel] " Michael S. Tsirkin
2017-12-07 13:33               ` Michael S. Tsirkin
2017-12-07  9:02           ` [virtio-dev] " Wei Wang
2017-12-07  9:02             ` Wei Wang
2017-12-07 13:08             ` Stefan Hajnoczi
2017-12-07 14:02               ` [virtio-dev] " Michael S. Tsirkin
2017-12-07 14:02                 ` Michael S. Tsirkin
2017-12-07 16:29                 ` Stefan Hajnoczi
2017-12-07 16:47                   ` [virtio-dev] " Michael S. Tsirkin
2017-12-07 16:47                     ` Michael S. Tsirkin
2017-12-07 17:29                     ` Stefan Hajnoczi
2017-12-07 17:38                       ` Michael S. Tsirkin [this message]
2017-12-07 17:38                         ` Michael S. Tsirkin
2017-12-07 18:28                         ` Stefan Hajnoczi
2017-12-07 23:54                           ` [virtio-dev] " Michael S. Tsirkin
2017-12-07 23:54                             ` Michael S. Tsirkin
2017-12-08  6:08                             ` Stefan Hajnoczi
2017-12-08 14:27                               ` [virtio-dev] " Michael S. Tsirkin
2017-12-08 14:27                                 ` Michael S. Tsirkin
2017-12-08 16:15                                 ` Stefan Hajnoczi
2017-12-09 16:08                                 ` [virtio-dev] " Wang, Wei W
2017-12-09 16:08                                   ` Wang, Wei W
2017-12-08  6:43                             ` [virtio-dev] " Wei Wang
2017-12-08  6:43                               ` Wei Wang
2017-12-08  8:33                               ` Stefan Hajnoczi
2017-12-09 16:23                                 ` [virtio-dev] " Wang, Wei W
2017-12-09 16:23                                   ` Wang, Wei W
2017-12-11 11:11                                   ` [virtio-dev] " Stefan Hajnoczi
2017-12-11 11:11                                     ` Stefan Hajnoczi
2017-12-11 13:53                                     ` [virtio-dev] " Wang, Wei W
2017-12-11 13:53                                       ` Wang, Wei W
2017-12-12 10:14                                       ` [virtio-dev] " Stefan Hajnoczi
2017-12-12 10:14                                         ` Stefan Hajnoczi
2017-12-13  8:11                                         ` [virtio-dev] " Wei Wang
2017-12-13  8:11                                           ` Wei Wang
2017-12-13 12:35                                           ` Stefan Hajnoczi
2017-12-13 15:01                                             ` [virtio-dev] " Michael S. Tsirkin
2017-12-13 15:01                                               ` Michael S. Tsirkin
2017-12-13 20:08                                               ` Stefan Hajnoczi
2017-12-13 20:59                                                 ` [virtio-dev] " Michael S. Tsirkin
2017-12-13 20:59                                                   ` Michael S. Tsirkin
2017-12-14 15:06                                                   ` [virtio-dev] " Stefan Hajnoczi
2017-12-14 15:06                                                     ` Stefan Hajnoczi
2017-12-15 10:33                                                     ` [virtio-dev] " Wei Wang
2017-12-15 10:33                                                       ` Wei Wang
2017-12-15 12:37                                                       ` [virtio-dev] " Stefan Hajnoczi
2017-12-15 12:37                                                         ` Stefan Hajnoczi
2017-12-13 21:50                                                 ` [virtio-dev] " Maxime Coquelin
2017-12-13 21:50                                                   ` Maxime Coquelin
2017-12-14 15:46                                                   ` [virtio-dev] " Stefan Hajnoczi
2017-12-14 15:46                                                     ` [Qemu-devel] [virtio-dev] " Stefan Hajnoczi
2017-12-14 16:27                                                     ` [virtio-dev] Re: [Qemu-devel] " Michael S. Tsirkin
2017-12-14 16:27                                                       ` [Qemu-devel] [virtio-dev] " Michael S. Tsirkin
2017-12-14 16:39                                                       ` [virtio-dev] Re: [Qemu-devel] " Maxime Coquelin
2017-12-14 16:39                                                         ` [Qemu-devel] [virtio-dev] " Maxime Coquelin
2017-12-14 16:40                                                         ` [virtio-dev] Re: [Qemu-devel] " Michael S. Tsirkin
2017-12-14 16:40                                                           ` [Qemu-devel] [virtio-dev] " Michael S. Tsirkin
2017-12-14 16:50                                                           ` [virtio-dev] Re: [Qemu-devel] " Maxime Coquelin
2017-12-14 16:50                                                             ` [Qemu-devel] [virtio-dev] " Maxime Coquelin
2017-12-14 18:11                                                             ` [virtio-dev] Re: [Qemu-devel] " Stefan Hajnoczi
2017-12-14 18:11                                                               ` [Qemu-devel] [virtio-dev] " Stefan Hajnoczi
2017-12-14  5:53                                             ` [virtio-dev] Re: [Qemu-devel] " Wei Wang
2017-12-14  5:53                                               ` Wei Wang
2017-12-14 17:32                                               ` [virtio-dev] " Stefan Hajnoczi
2017-12-14 17:32                                                 ` Stefan Hajnoczi
2017-12-15  9:10                                                 ` [virtio-dev] " Wei Wang
2017-12-15  9:10                                                   ` Wei Wang
2017-12-15 12:26                                                   ` [virtio-dev] " Stefan Hajnoczi
2017-12-15 12:26                                                     ` Stefan Hajnoczi
2017-12-14 18:04                                               ` [virtio-dev] " Stefan Hajnoczi
2017-12-14 18:04                                                 ` Stefan Hajnoczi
2017-12-15 10:33                                                 ` [virtio-dev] " Wei Wang
2017-12-15 10:33                                                   ` [Qemu-devel] [virtio-dev] " Wei Wang
2017-12-15 12:00                                                   ` [virtio-dev] Re: [Qemu-devel] " Stefan Hajnoczi
2017-12-15 12:00                                                     ` [Qemu-devel] [virtio-dev] " Stefan Hajnoczi
2017-12-06 16:13   ` [Qemu-devel] " Stefan Hajnoczi
2017-12-19 11:35 ` Stefan Hajnoczi
2017-12-19 11:35   ` [Qemu-devel] " Stefan Hajnoczi
2017-12-19 14:56   ` Michael S. Tsirkin
2017-12-19 14:56     ` [Qemu-devel] " Michael S. Tsirkin
2017-12-19 17:05     ` Stefan Hajnoczi
2017-12-20  4:06       ` [virtio-dev] " Michael S. Tsirkin
2017-12-20  4:06         ` Michael S. Tsirkin
2017-12-20  6:26         ` Stefan Hajnoczi

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20171207193003-mutt-send-email-mst@kernel.org \
    --to=mst@redhat.com \
    --cc=avi.cohen@huawei.com \
    --cc=jan.kiszka@siemens.com \
    --cc=jasowang@redhat.com \
    --cc=marcandre.lureau@redhat.com \
    --cc=pbonzini@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=stefanha@gmail.com \
    --cc=stefanha@redhat.com \
    --cc=virtio-dev@lists.oasis-open.org \
    --cc=wei.w.wang@intel.com \
    --cc=zhiyong.yang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.