[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190903131504.18935-1-thomas_os@shipmail.org>
Date: Tue, 3 Sep 2019 15:15:00 +0200
From: Thomas Hellström (VMware)
<thomas_os@...pmail.org>
To: dri-devel@...ts.freedesktop.org, pv-drivers@...are.com,
linux-graphics-maintainer@...are.com, linux-kernel@...r.kernel.org
Cc: Thomas Hellström <thomas_os@...pmail.org>
Subject: [PATCH v2 0/4] Have TTM support SEV encryption with coherent memory
With SEV memory encryption and in some cases also with SME memory
encryption, coherent memory is unencrypted. In those cases, TTM doesn't
set up the correct page protection. Fix this by having the TTM
coherent page allocator call into the platform code to determine whether
coherent memory is encrypted or not, and modify the page protection if
it is not.
v2:
- Use force_dma_unencrypted() rather than sev_active() to catch also the
special SME encryption cases.
Powered by blists - more mailing lists