aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYury Khrustalev <yury.khrustalev@arm.com>2024-11-20 11:20:33 +0000
committerWilco Dijkstra <wilco.dijkstra@arm.com>2024-11-20 11:30:58 +0000
commit47311cca31e685fa7bfe19bb8cef17d2d3d7fff9 (patch)
tree315d15f0e3b7d6d952f5680e6222a87a4c810b6e
parentf4d00dd60da0f8f520e7a7f71df3bc4d83cd4787 (diff)
downloadglibc-47311cca31e685fa7bfe19bb8cef17d2d3d7fff9.zip
glibc-47311cca31e685fa7bfe19bb8cef17d2d3d7fff9.tar.gz
glibc-47311cca31e685fa7bfe19bb8cef17d2d3d7fff9.tar.bz2
manual: Add description of AArch64-specific pkey flags
Describe AArch64 specific flags PKEY_DISABLE_READ and PKEY_DISABLE_EXECUTE that are available on AArch64 systems with enabled Stage 1 permission overlays feature introduced in Armv8.9 / 9.4 (FEAT_S1POE). Reviewed-by: Adhemerval Zanella <adhemerval.zanella@linaro.org>
-rw-r--r--manual/memory.texi16
1 files changed, 15 insertions, 1 deletions
diff --git a/manual/memory.texi b/manual/memory.texi
index 324c120..dc4621e 100644
--- a/manual/memory.texi
+++ b/manual/memory.texi
@@ -3261,6 +3261,12 @@ the page protection flags are applied. Otherwise, @var{access_restrictions} is
a combination of the following flags:
@vtable @code
+@item PKEY_DISABLE_READ
+@standards{Linux, sys/mman.h}
+Subsequent attempts to read from memory with the specified protection
+key will fault. At present only AArch64 platforms with enabled Stage 1
+permission overlays feature support this type of restriction.
+
@item PKEY_DISABLE_WRITE
@standards{Linux, sys/mman.h}
Subsequent attempts to write to memory with the specified protection
@@ -3269,7 +3275,15 @@ key will fault.
@item PKEY_DISABLE_ACCESS
@standards{Linux, sys/mman.h}
Subsequent attempts to write to or read from memory with the specified
-protection key will fault.
+protection key will fault. On AArch64 platforms with enabled Stage 1
+permission overlays feature this restriction value has the same effect
+as combination of @code{PKEY_DISABLE_READ} and @code{PKEY_DISABLE_WRITE}.
+
+@item PKEY_DISABLE_EXECUTE
+@standards{Linux, sys/mman.h}
+Subsequent attempts to execute from memory with the specified protection
+key will fault. At present only AArch64 platforms with enabled Stage 1
+permission overlays feature support this type of restriction.
@end vtable
Operations not specified as flags are not restricted. In particular,