[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH 0/6] virtio: Solution to restrict memory access under Xen using xen-virtio DMA ops layer
 
- To: Oleksandr Tyshchenko <olekstysh@xxxxxxxxx>
 
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
 
- Date: Fri, 15 Apr 2022 00:41:36 -0700
 
- Cc: xen-devel@xxxxxxxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx,	linux-arm-kernel@xxxxxxxxxxxxxxxxxxx,	virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx,	Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx>,	"Michael S. Tsirkin" <mst@xxxxxxxxxx>,	Stefano Stabellini <sstabellini@xxxxxxxxxx>,	Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>,	Juergen Gross <jgross@xxxxxxxx>, Julien Grall <julien@xxxxxxx>,	Bertrand Marquis <bertrand.marquis@xxxxxxx>,	Wei Chen <Wei.Chen@xxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>,	Kaly Xin <Kaly.Xin@xxxxxxx>, Jiamei Xie <Jiamei.Xie@xxxxxxx>,	Alex Bennée <alex.bennee@xxxxxxxxxx>
 
- Delivery-date: Fri, 15 Apr 2022 07:41:52 +0000
 
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
 
 
 
I can only see three out of 6 patches on the linux-arm-kernel list,
which makes reviewing this impossible.  Also please Cc me directly
on any series doing crazy things with dma ops.  Thanks!
 
 
    
     |