Home
last modified time | relevance | path

Searched refs:SMAP (Results 1 – 5 of 5) sorted by relevance

/linux-4.1.27/arch/x86/boot/
Dmemory.c18 #define SMAP 0x534d4150 /* ASCII "SMAP" */ macro
30 ireg.edx = SMAP; in detect_memory_e820()
62 if (oreg.eax != SMAP) { in detect_memory_e820()
/linux-4.1.27/Documentation/virtual/kvm/
Dmmu.txt357 - if CR4.SMAP is disabled: since the page has been changed to a kernel
358 page, it can not be reused when CR4.SMAP is enabled. We set
359 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note,
360 here we do not care the case that CR4.SMAP is enabled since KVM will
/linux-4.1.27/arch/x86/kvm/
Dcpuid.c348 F(ADX) | F(SMAP) | F(AVX512F) | F(AVX512PF) | F(AVX512ER) | in __do_cpuid_ent()
/linux-4.1.27/arch/x86/
DKconfig1627 Supervisor Mode Access Prevention (SMAP) is a security
/linux-4.1.27/Documentation/
Dkernel-parameters.txt2345 Disable SMAP (Supervisor Mode Access Prevention)