* Dave Hansen <[email protected]> wrote:
>
> From: Dave Hansen <[email protected]>
>
> This spells out all of the pkey-related system calls that we have
> and provides some example code fragments to demonstrate how we
> expect them to be used.
>
> Signed-off-by: Dave Hansen <[email protected]>
> Cc: [email protected]
> Cc: [email protected]
> Cc: [email protected]
> Cc: [email protected]
> Cc: [email protected]
> ---
>
> b/Documentation/x86/protection-keys.txt | 63
> ++++++++++++++++++++++++++++++++
> 1 file changed, 63 insertions(+)
Please also add pkeys testcases to tools/tests/self-tests.
Thanks,
Ingo