SMAP bypass vulnerability disclosed
Without Supervisor Mode Access Prevention, supervisor code usually has full read and write access to user-space memory mappings (or has the ability to obtain full access).
This has led to the development of several security exploits, including privilege escalation exploits, which operate by causing the kernel to access user space memory when it did not intend to.
Operating systems can block these exploits by using SMAP to force unintended user space memory accesses to trigger page faults.
Additionally, SMAP can expose flawed kernel code which does not follow the intended procedures for accessing user space memory.