** Description changed: Description: Direct mapping is not good for accessing encrypted pages as all memory is mapped with KeyID 0. We need the temporary mapping with correct KeyID. kmap()/kmap_atomic() API seems fill our needs. Target Release: 19.10 - Target Kernel: TBD + Target Kernel: 5.4
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1835138 Title: MKTME: make encrypted memory accessible by kernel Status in intel: New Status in linux package in Ubuntu: Incomplete Bug description: Description: Direct mapping is not good for accessing encrypted pages as all memory is mapped with KeyID 0. We need the temporary mapping with correct KeyID. kmap()/kmap_atomic() API seems fill our needs. Target Release: 19.10 Target Kernel: 5.4 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1835138/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp