Searched refs:SMAP (Results 1 – 8 of 8) sorted by relevance
16 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro28 ireg.edx = SMAP; in detect_memory_e820()60 if (oreg.eax != SMAP) { in detect_memory_e820()
91 持(如x86的SMEP/SMAP,ARM的PXN/PAN)或通过仿真(如ARM的内存
427 - if CR4.SMAP is disabled: since the page has been changed to a kernel428 page, it can not be reused when CR4.SMAP is enabled. We set429 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,430 here we do not care the case that CR4.SMAP is enabled since KVM will
49 implementation of Supervisor Mode Access Protection (SMAP)410 X86: SMAP (stac/clac): __uaccess_begin()/__uaccess_end()
99 (x86's SMEP/SMAP, ARM's PXN/PAN) or via emulation (ARM's Memory Domains).
915 F(SMAP), in kvm_set_cpu_caps()
7799 cr4_fixed1_update(X86_CR4_SMAP, ebx, feature_bit(SMAP)); in nested_vmx_cr_fixed1_bits_update()
4273 Disable SMAP (Supervisor Mode Access Prevention)