Searched refs:SMAP (Results 1 – 11 of 11) sorted by relevance
16 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro28 ireg.edx = SMAP; in detect_memory_e820()60 if (oreg.eax != SMAP) { in detect_memory_e820()
401 - if CR4.SMAP is disabled: since the page has been changed to a kernel402 page, it can not be reused when CR4.SMAP is enabled. We set403 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,404 here we do not care the case that CR4.SMAP is enabled since KVM will
144 "no5lvl". SMAP and SMEP are disabled with the aforementioned parameters,
395 F(ADX) | F(SMAP) | F(AVX512IFMA) | F(AVX512F) | F(AVX512PF) | in kvm_set_cpu_caps()
100 (x86's SMEP/SMAP, ARM's PXN/PAN) or via emulation (ARM's Memory Domains).
296 X86: SMAP (stac/clac): __uaccess_begin()/__uaccess_end()
7269 cr4_fixed1_update(X86_CR4_SMAP, ebx, feature_bit(SMAP)); in nested_vmx_cr_fixed1_bits_update()
1852 Supervisor Mode Access Prevention (SMAP) is a security
3331 Disable SMAP (Supervisor Mode Access Prevention)
3814 • ‘SMAP’ – Supervisor-Mode Access Prevention.