Public bug reported:
Description:
Direct mapping is not good for accessing encrypted pages as all memory is
mapped with KeyID 0.
We need the temporary mapping with correct KeyID. kmap()/kmap_atomic()
API seems fill our needs.
Target Release: 19.10
Target Kernel: TBD
** Affects: intel
Importance: Undecided
Status: New
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Tags: intel-kernel-19.10
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835138
Title:
MKTME: make encrypted memory accessible by kernel
Status in intel:
New
Status in linux package in Ubuntu:
New
Bug description:
Description:
Direct mapping is not good for accessing encrypted pages as all memory is
mapped with KeyID 0.
We need the temporary mapping with correct KeyID. kmap()/kmap_atomic()
API seems fill our needs.
Target Release: 19.10
Target Kernel: TBD
To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1835138/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp