* Dave Hansen <d...@sr71.net> wrote:

> 
> From: Dave Hansen <dave.han...@linux.intel.com>
> 
> This spells out all of the pkey-related system calls that we have
> and provides some example code fragments to demonstrate how we
> expect them to be used.
> 
> Signed-off-by: Dave Hansen <dave.han...@linux.intel.com>
> Cc: linux-...@vger.kernel.org
> Cc: linux...@kvack.org
> Cc: x...@kernel.org
> Cc: torva...@linux-foundation.org
> Cc: a...@linux-foundation.org
> ---
> 
>  b/Documentation/x86/protection-keys.txt |   63 
> ++++++++++++++++++++++++++++++++
>  1 file changed, 63 insertions(+)

Please also add pkeys testcases to tools/tests/self-tests.

Thanks,

        Ingo

Reply via email to