Searched refs:SMAP (Results 1 – 6 of 6) sorted by relevance
18 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro30 ireg.edx = SMAP; in detect_memory_e820()62 if (oreg.eax != SMAP) { in detect_memory_e820()
367 - if CR4.SMAP is disabled: since the page has been changed to a kernel368 page, it can not be reused when CR4.SMAP is enabled. We set369 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,370 here we do not care the case that CR4.SMAP is enabled since KVM will
396 F(ADX) | F(SMAP) | F(AVX512IFMA) | F(AVX512F) | F(AVX512PF) | in __do_cpuid_ent()
100 (x86's SMEP/SMAP, ARM's PXN/PAN) or via emulation (ARM's Memory Domains).
1849 Supervisor Mode Access Prevention (SMAP) is a security
2768 Disable SMAP (Supervisor Mode Access Prevention)