Displaying 3 results from an estimated 3 matches for "2b3uzm8rtpnffymlrx84ogug".
2019 Nov 23
0
[PATCH 1/1] virtio_ring: fix return code on DMA mapping fails
...gt;
> [1] https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FAMDESE%2FAMDSEV%23faq-4&data=02%7C01%7CThomas.Lendacky%40amd.com%7Cd733eab74c7346b72fb608d76f4d175d%7C3dd8961fe4884e608e11a82d994e183d%7C0%7C0%7C637100249200530156&sdata=mUISWUHYJfLE3c1cYoqC%2B3uzM8RtpnffyMlrX84oGug%3D&reserved=0
>
> On Tue, 19 Nov 2019 08:04:29 -0500
> "Michael S. Tsirkin" <mst at redhat.com> wrote:
>
>> Will be in the next pull request.
>>
>> On Tue, Nov 19, 2019 at 12:10:22PM +0100, Halil Pasic wrote:
>>> ping
>>>
>...
2019 Nov 22
3
[PATCH 1/1] virtio_ring: fix return code on DMA mapping fails
Thanks Michael!
Actually I also hoped to start a discussion on virtio with encrypted
memory.
I assume the AMD folks have the most experience with this, and I very
much like to understand how do they master the challenges we are all
facing.
My understanding of IO in the context of AMD SEV is that the user
is responsible for choosing the swiotlb command line parameter of the
guest kernel so, that
2019 Nov 22
3
[PATCH 1/1] virtio_ring: fix return code on DMA mapping fails
Thanks Michael!
Actually I also hoped to start a discussion on virtio with encrypted
memory.
I assume the AMD folks have the most experience with this, and I very
much like to understand how do they master the challenges we are all
facing.
My understanding of IO in the context of AMD SEV is that the user
is responsible for choosing the swiotlb command line parameter of the
guest kernel so, that