** Description changed:

  Description:
  Direct mapping is not good for accessing encrypted pages as all memory is 
mapped with KeyID 0.
  
  We need the temporary mapping with correct KeyID. kmap()/kmap_atomic()
  API seems fill our needs.
  
  Target Release: 19.10
- Target Kernel: TBD
+ Target Kernel: 5.4

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835138

Title:
  MKTME: make encrypted memory accessible by kernel

Status in intel:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Description:
  Direct mapping is not good for accessing encrypted pages as all memory is 
mapped with KeyID 0.

  We need the temporary mapping with correct KeyID. kmap()/kmap_atomic()
  API seems fill our needs.

  Target Release: 19.10
  Target Kernel: 5.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1835138/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to