lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20101007194431.GA32442@dumpdata.com>
Date:	Thu, 7 Oct 2010 15:44:31 -0400
From:	Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>
To:	Jan Beulich <JBeulich@...ell.com>
Cc:	Jeremy Fitzhardinge <jeremy@...p.org>,
	xen-devel@...ts.xensource.com, linux-kernel@...r.kernel.org
Subject: Re: [Xen-devel] [PATCH v7] Xen PCI + Xen PCI frontend driver.

On Wed, Oct 06, 2010 at 06:50:43PM -0400, Konrad Rzeszutek Wilk wrote:
> On Tue, Oct 05, 2010 at 08:47:20AM +0100, Jan Beulich wrote:
> > >>> On 04.10.10 at 20:13, Konrad Rzeszutek Wilk <konrad.wilk@...cle.com> wrote:
> > > This patch set contains the supporting patches and the driver itself for
> > > Xen Paravirtualized (PV) domains to use PCI pass-through devices (the git 
> > > tree
> > > is git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git 
> > > devel/xen-pcifront-0.7).
> .. snip..
> > Somehow this patch series appears to be incomplete: Neither on
> > xen-devel nor on patchwork I can find patches 6, 11, 18, 19, and 20.
> 
> Shucks! I am not sure what happend, the git-send-email looked to have sent them 
> all.  Let me redo them and resend them with more attention to this.

AHA! I think I know the answer. Those are the patches for which the Author:
is bouncing. Any ideas of what to do except next time just manually respond
and paste in the patches?

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ