Re: [PATCH 4/4] x86,module: Detect CRn and DRn manipulation
From: Peter Zijlstra
Date: Tue Apr 07 2020 - 17:28:29 EST
On Tue, Apr 07, 2020 at 02:22:11PM -0700, Nadav Amit wrote:
> Anyhow, I do not think it is the only use-case which is not covered by your
> patches (even considering CRs/DRs alone). For example, there is no kernel
> function to turn on CR4.VMXE, which is required to run hypervisors on x86.
That needs an exported function; there is no way we'll allow random
writes to CR4, there's too much dodgy stuff in there.