Searched refs:SMAP (Results 1 – 7 of 7) sorted by relevance
16 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro28 ireg.edx = SMAP; in detect_memory_e820()60 if (oreg.eax != SMAP) { in detect_memory_e820()
91 持(如x86的SMEP/SMAP,ARM的PXN/PAN)或通过仿真(如ARM的内存
427 - if CR4.SMAP is disabled: since the page has been changed to a kernel428 page, it can not be reused when CR4.SMAP is enabled. We set429 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,430 here we do not care the case that CR4.SMAP is enabled since KVM will
99 (x86's SMEP/SMAP, ARM's PXN/PAN) or via emulation (ARM's Memory Domains).
923 F(SMAP), in kvm_set_cpu_caps()
7797 cr4_fixed1_update(X86_CR4_SMAP, ebx, feature_bit(SMAP)); in nested_vmx_cr_fixed1_bits_update()
4570 Disable SMAP (Supervisor Mode Access Prevention)