Date: Sun, 14 Feb 2021 16:55:44 +0000 From: Johannes Totz <johannes@jo-t.de> To: freebsd-security@freebsd.org Cc: freebsd-hackers@freebsd.org Subject: Re: AMD's memory encryption (aka SME) Message-ID: <s0bkmh$2q6$1@ciao.gmane.io> In-Reply-To: <rtf6no$r1u$1@ciao.gmane.io> References: <rtf6no$r1u$1@ciao.gmane.io>
next in thread | previous in thread | raw e-mail | index | archive | help
On 10/01/2021 15:33, Johannes Totz wrote: > Hi there, > > does anyone have an opinion on AMD's "Secure Memory Encryption"? This > transparently encrypts all/most RAM pages. > Looking at some tech docs, this seems fairly easy to implement. I took a stab at it https://reviews.freebsd.org/D28635 Doesn't work, haha. Anyone wanna take a look at let me know what I'm missing? I don't know how physical pages move around in the VM system. Thought I'd try to enable encryption for user-mode pages first. But that assumes those never transition to/from kernel-mode. > I was wondering if someone has attempted that already, or knows of > reasons why not to. > > > Thanks, > > Johannes > > _______________________________________________ > freebsd-security@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?s0bkmh$2q6$1>