Lines Matching +full:use +full:- +full:guard +full:- +full:pages
7 .\" Redistribution and use in source and binary forms, with or without
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .Nm Protection Key Rights for User pages
33 .Nd provide fast user-managed key-based access control for pages
57 to control access to user-mode addresses.
61 It cannot guard against conscious accesses since permissions
62 are user-controllable.
65 has an associated 4-bit protection key.
66 A new per-thread PKRU hardware register determines, for each protection
67 key, whether user-mode addresses with that protection key may be
82 Protection keys require that the system uses 4-level paging
85 Both 64-bit and 32-bit applications can use protection keys.
92 Per-key permissions are managed using the user-mode instructions
115 .Bl -tag -width
129 They are re-established when the current mapping is destroyed
130 and a new mapping is created in any sub-range of the specified range.
131 You must use a
139 Existing mappings are changed to use key index zero in page table entries.
160 The non-zero value of the variable pointed to by the
169 .Rv -std
171 .Bl -tag -width Er
183 The supplied address range does not completely fit into the user-managed
202 functions are non-standard and first appeared in