* Dave Hansen <[email protected]> wrote:

> 
> From: Dave Hansen <[email protected]>
> 
> This spells out all of the pkey-related system calls that we have
> and provides some example code fragments to demonstrate how we
> expect them to be used.
> 
> Signed-off-by: Dave Hansen <[email protected]>
> Cc: [email protected]
> Cc: [email protected]
> Cc: [email protected]
> Cc: [email protected]
> Cc: [email protected]
> ---
> 
>  b/Documentation/x86/protection-keys.txt |   63 
> ++++++++++++++++++++++++++++++++
>  1 file changed, 63 insertions(+)

Please also add pkeys testcases to tools/tests/self-tests.

Thanks,

        Ingo

Reply via email to