Home
last modified time | relevance | path

Searched refs:SMAP (Results 1 – 11 of 11) sorted by relevance

/OK3568_Linux_fs/kernel/arch/x86/boot/
H A Dmemory.c16 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro
28 ireg.edx = SMAP; in detect_memory_e820()
60 if (oreg.eax != SMAP) { in detect_memory_e820()
/OK3568_Linux_fs/kernel/Documentation/virt/kvm/
H A Dmmu.rst401 - if CR4.SMAP is disabled: since the page has been changed to a kernel
402 page, it can not be reused when CR4.SMAP is enabled. We set
403 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,
404 here we do not care the case that CR4.SMAP is enabled since KVM will
/OK3568_Linux_fs/kernel/Documentation/x86/
H A Dcpuinfo.rst144 "no5lvl". SMAP and SMEP are disabled with the aforementioned parameters,
/OK3568_Linux_fs/kernel/arch/x86/kvm/
H A Dcpuid.c395 F(ADX) | F(SMAP) | F(AVX512IFMA) | F(AVX512F) | F(AVX512PF) | in kvm_set_cpu_caps()
/OK3568_Linux_fs/kernel/Documentation/security/
H A Dself-protection.rst100 (x86's SMEP/SMAP, ARM's PXN/PAN) or via emulation (ARM's Memory Domains).
/OK3568_Linux_fs/kernel/tools/objtool/Documentation/
H A Dstack-validation.txt296 X86: SMAP (stac/clac): __uaccess_begin()/__uaccess_end()
/OK3568_Linux_fs/kernel/arch/x86/kvm/vmx/
H A Dvmx.c7269 cr4_fixed1_update(X86_CR4_SMAP, ebx, feature_bit(SMAP)); in nested_vmx_cr_fixed1_bits_update()
/OK3568_Linux_fs/kernel/arch/x86/
H A DKconfig1852 Supervisor Mode Access Prevention (SMAP) is a security
/OK3568_Linux_fs/kernel/Documentation/admin-guide/
H A Dkernel-parameters.txt3331 Disable SMAP (Supervisor Mode Access Prevention)
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/share/info/
H A Dlibc.info-153814 • ‘SMAP’ – Supervisor-Mode Access Prevention.
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/share/info/
H A Dlibc.info-153814 • ‘SMAP’ – Supervisor-Mode Access Prevention.