search for: 2b3uzm8rtpnffymlrx84ogug

Displaying 3 results from an estimated 3 matches for "2b3uzm8rtpnffymlrx84ogug".

2019 Nov 23
0
[PATCH 1/1] virtio_ring: fix return code on DMA mapping fails
...gt; > [1] https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FAMDESE%2FAMDSEV%23faq-4&amp;data=02%7C01%7CThomas.Lendacky%40amd.com%7Cd733eab74c7346b72fb608d76f4d175d%7C3dd8961fe4884e608e11a82d994e183d%7C0%7C0%7C637100249200530156&amp;sdata=mUISWUHYJfLE3c1cYoqC%2B3uzM8RtpnffyMlrX84oGug%3D&amp;reserved=0 > > On Tue, 19 Nov 2019 08:04:29 -0500 > "Michael S. Tsirkin" <mst at redhat.com> wrote: > >> Will be in the next pull request. >> >> On Tue, Nov 19, 2019 at 12:10:22PM +0100, Halil Pasic wrote: >>> ping >>> &gt...
2019 Nov 22
3
[PATCH 1/1] virtio_ring: fix return code on DMA mapping fails
Thanks Michael! Actually I also hoped to start a discussion on virtio with encrypted memory. I assume the AMD folks have the most experience with this, and I very much like to understand how do they master the challenges we are all facing. My understanding of IO in the context of AMD SEV is that the user is responsible for choosing the swiotlb command line parameter of the guest kernel so, that
2019 Nov 22
3
[PATCH 1/1] virtio_ring: fix return code on DMA mapping fails
Thanks Michael! Actually I also hoped to start a discussion on virtio with encrypted memory. I assume the AMD folks have the most experience with this, and I very much like to understand how do they master the challenges we are all facing. My understanding of IO in the context of AMD SEV is that the user is responsible for choosing the swiotlb command line parameter of the guest kernel so, that