Map userspace portion of VA in the PTI kernel-mode page table as non-executable. This way, if we ever miss reloading ucr3 into %cr3 on return to usermode, the process traps instead of executing in potentially vulnerable setup.
I peek this in some article about Linux implementation.