[PATCH 27/30] x86, kaiser: un-poison PGDs at runtime

2017-11-10 Thread Dave Hansen
From: Dave Hansen With KAISER Kernel PGDs that map userspace are "poisoned" with the NX bit. This ensures that if a kernel->user CR3 switch is missed, userspace crashes instead of running in an unhardened state. This code will be needed in a moment when KAISER is

[PATCH 27/30] x86, kaiser: un-poison PGDs at runtime

2017-11-10 Thread Dave Hansen
From: Dave Hansen With KAISER Kernel PGDs that map userspace are "poisoned" with the NX bit. This ensures that if a kernel->user CR3 switch is missed, userspace crashes instead of running in an unhardened state. This code will be needed in a moment when KAISER is turned on and off at runtime.

[PATCH 27/30] x86, kaiser: un-poison PGDs at runtime

2017-11-08 Thread Dave Hansen
From: Dave Hansen We poison kernel PGDs that map userspace with the NX bit. This ensures that if we miss a kernel->user CR3 switch, userspace crashes instead of running in an unhardened state. We will need this code in a moment when we turn kaiser on and off at

[PATCH 27/30] x86, kaiser: un-poison PGDs at runtime

2017-11-08 Thread Dave Hansen
From: Dave Hansen We poison kernel PGDs that map userspace with the NX bit. This ensures that if we miss a kernel->user CR3 switch, userspace crashes instead of running in an unhardened state. We will need this code in a moment when we turn kaiser on and off at runtime. Note that we now need