Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - U index

CONFIG_UNMAP_KERNEL_AT_EL0: Unmap kernel when running in userspace (KPTI)

General informations

The Linux kernel configuration item CONFIG_UNMAP_KERNEL_AT_EL0 has multiple definitions:

Unmap kernel when running in userspace (KPTI) found in arch/arm64/Kconfig

The configuration item CONFIG_UNMAP_KERNEL_AT_EL0:

Help text

Speculation attacks against some high-performance processors can be used to bypass MMU permission checks and leak kernel data to userspace. This can be defended against by unmapping the kernel when running in userspace, mapping it back in on exception entry via a trampoline page in the vector table.

If unsure, say Y.

Unmap kernel when running in userspace (aka 'KAISER') found in arch/arm64/Kconfig

The configuration item CONFIG_UNMAP_KERNEL_AT_EL0:

Help text

Speculation attacks against some high-performance processors can be used to bypass MMU permission checks and leak kernel data to userspace. This can be defended against by unmapping the kernel when running in userspace, mapping it back in on exception entry via a trampoline page in the vector table.

If unsure, say Y.

Hardware

LKDDb

Raw data from LKDDb:

Sources

This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).

The data is retrived from:

Automatic links from Google (and ads)

Custom Search

Popular queries:

Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - U index

Automatically generated (in year 2024). See also LKDDb sources on GitLab