Public bug reported:

Description:
Direct mapping is not good for accessing encrypted pages as all memory is 
mapped with KeyID 0.

We need the temporary mapping with correct KeyID. kmap()/kmap_atomic()
API seems fill our needs.

Target Release: 19.10
Target Kernel: TBD

** Affects: intel
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: intel-kernel-19.10

** Also affects: linux (Ubuntu)
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1835138

Title:
  MKTME: make encrypted memory accessible by kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1835138/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to