* Dave Hansen <d...@sr71.net> wrote: > > From: Dave Hansen <dave.han...@linux.intel.com> > > This spells out all of the pkey-related system calls that we have > and provides some example code fragments to demonstrate how we > expect them to be used. > > Signed-off-by: Dave Hansen <dave.han...@linux.intel.com> > Cc: linux-...@vger.kernel.org > Cc: linux...@kvack.org > Cc: x...@kernel.org > Cc: torva...@linux-foundation.org > Cc: a...@linux-foundation.org > --- > > b/Documentation/x86/protection-keys.txt | 63 > ++++++++++++++++++++++++++++++++ > 1 file changed, 63 insertions(+)
Please also add pkeys testcases to tools/tests/self-tests. Thanks, Ingo