path: root/security/Kconfig
diff options
authorDave Hansen <>2017-12-04 15:08:03 +0100
committerIngo Molnar <>2017-12-23 21:13:01 +0100
commit385ce0ea4c078517fa51c261882c4e72fba53005 (patch)
tree5e9c6a3a58922f08c87fdce70a8619720cf93985 /security/Kconfig
parent5f26d76c3fd67c48806415ef8b1116c97beff8ba (diff)
x86/mm/pti: Add Kconfig
Finally allow CONFIG_PAGE_TABLE_ISOLATION to be enabled. PARAVIRT generally requires that the kernel not manage its own page tables. It also means that the hypervisor and kernel must agree wholeheartedly about what format the page tables are in and what they contain. PAGE_TABLE_ISOLATION, unfortunately, changes the rules and they can not be used together. I've seen conflicting feedback from maintainers lately about whether they want the Kconfig magic to go first or last in a patch series. It's going last here because the partially-applied series leads to kernels that can not boot in a bunch of cases. I did a run through the entire series with CONFIG_PAGE_TABLE_ISOLATION=y to look for build errors, though. [ tglx: Removed SMP and !PARAVIRT dependencies as they not longer exist ] Signed-off-by: Dave Hansen <> Signed-off-by: Thomas Gleixner <> Cc: Andy Lutomirski <> Cc: Boris Ostrovsky <> Cc: Borislav Petkov <> Cc: Brian Gerst <> Cc: David Laight <> Cc: Denys Vlasenko <> Cc: Eduardo Valentin <> Cc: Greg KH <> Cc: H. Peter Anvin <> Cc: Josh Poimboeuf <> Cc: Juergen Gross <> Cc: Linus Torvalds <> Cc: Peter Zijlstra <> Cc: Will Deacon <> Cc: Cc: Cc: Cc: Cc: Signed-off-by: Ingo Molnar <>
Diffstat (limited to 'security/Kconfig')
1 files changed, 10 insertions, 0 deletions
diff --git a/security/Kconfig b/security/Kconfig
index e8e449444e65..a623d13bf288 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -54,6 +54,16 @@ config SECURITY_NETWORK
implement socket and networking access controls.
If you are unsure how to answer this question, answer N.
+ bool "Remove the kernel mapping in user mode"
+ depends on X86_64 && !UML
+ help
+ This feature reduces the number of hardware side channels by
+ ensuring that the majority of kernel addresses are not mapped
+ into userspace.
+ See Documentation/x86/pagetable-isolation.txt for more details.
bool "Infiniband Security Hooks"