Searched refs:SMAP (Results 1 – 9 of 9) sorted by relevance
16 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro28 ireg.edx = SMAP; in detect_memory_e820()60 if (oreg.eax != SMAP) { in detect_memory_e820()
398 - if CR4.SMAP is disabled: since the page has been changed to a kernel399 page, it can not be reused when CR4.SMAP is enabled. We set400 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,401 here we do not care the case that CR4.SMAP is enabled since KVM will
144 "no5lvl". SMAP and SMEP are disabled with the aforementioned parameters,
468 F(ADX) | F(SMAP) | F(AVX512IFMA) | F(AVX512F) | F(AVX512PF) | in kvm_set_cpu_caps()
100 (x86's SMEP/SMAP, ARM's PXN/PAN) or via emulation (ARM's Memory Domains).
296 X86: SMAP (stac/clac): __uaccess_begin()/__uaccess_end()
7073 cr4_fixed1_update(X86_CR4_SMAP, ebx, feature_bit(SMAP)); in nested_vmx_cr_fixed1_bits_update()
1829 Supervisor Mode Access Prevention (SMAP) is a security
3384 Disable SMAP (Supervisor Mode Access Prevention)
Completed in 36 milliseconds