[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YlkhsH4zqly/BykB@infradead.org>
Date: Fri, 15 Apr 2022 00:41:36 -0700
From: Christoph Hellwig <hch@...radead.org>
To: Oleksandr Tyshchenko <olekstysh@...il.com>
Cc: xen-devel@...ts.xenproject.org, linux-kernel@...r.kernel.org,
linux-arm-kernel@...ts.infradead.org,
virtualization@...ts.linux-foundation.org,
Oleksandr Tyshchenko <oleksandr_tyshchenko@...m.com>,
"Michael S. Tsirkin" <mst@...hat.com>,
Stefano Stabellini <sstabellini@...nel.org>,
Boris Ostrovsky <boris.ostrovsky@...cle.com>,
Juergen Gross <jgross@...e.com>, Julien Grall <julien@....org>,
Bertrand Marquis <bertrand.marquis@....com>,
Wei Chen <Wei.Chen@....com>, Henry Wang <Henry.Wang@....com>,
Kaly Xin <Kaly.Xin@....com>, Jiamei Xie <Jiamei.Xie@....com>,
Alex Bennée <alex.bennee@...aro.org>
Subject: Re: [RFC PATCH 0/6] virtio: Solution to restrict memory access under
Xen using xen-virtio DMA ops layer
I can only see three out of 6 patches on the linux-arm-kernel list,
which makes reviewing this impossible. Also please Cc me directly
on any series doing crazy things with dma ops. Thanks!
Powered by blists - more mailing lists