On Wed, May 29, 2019 at 10:30:07AM +0300, Mike Rapoport wrote: > On Wed, May 08, 2019 at 05:43:20PM +0300, Kirill A. Shutemov wrote: > > = Intro = > > > > The patchset brings enabling of Intel Multi-Key Total Memory Encryption. > > It consists of changes into multiple subsystems: > > > > * Core MM: infrastructure for allocation pages, dealing with encrypted VMAs > > and providing API setup encrypted mappings. > > * arch/x86: feature enumeration, program keys into hardware, setup > > page table entries for encrypted pages and more. > > * Key management service: setup and management of encryption keys. > > * DMA/IOMMU: dealing with encrypted memory on IO side. > > * KVM: interaction with virtualization side. > > * Documentation: description of APIs and usage examples. > > > > The patchset is huge. This submission aims to give view to the full picture and > > get feedback on the overall design. The patchset will be split into more > > digestible pieces later. > > > > Please review. Any feedback is welcome. > > It would be nice to have a brief usage description in cover letter rather > than in the last patches in the series ;-) > Thanks for making it all the way to the last patches in the set ;) Yes, we will certainly include that usage model in the cover letters of future patchsets. Alison