Component Type: kbuild config
Description: Unmap kernel when running in userspace (aka "KAISER")
More info: Speculation attacks against some high-performance processors can be used to bypass MMU permission checks and leak kernel data to userspace. This can be defended against by unmapping the kernel when running in userspace, mapping it back in on exception entry via a trampoline page in the vector table. If unsure, say Y.
Build project: Kconfig (Linux kconfig) (Path: arch\arm64\Kconfig )
Other views: file explorer