提交 1eecbcdc 编写于 作者: M Mauro Carvalho Chehab 提交者: Jonathan Corbet

docs: move protection-keys.rst to the core-api book

This document is used by multiple architectures:

	$ echo $(git grep -l  pkey_mprotect arch|cut -d'/' -f 2|sort|uniq)
	alpha arm arm64 ia64 m68k microblaze mips parisc powerpc s390 sh sparc x86 xtensa

So, let's move it to the core book and adjust the links to it
accordingly.
Signed-off-by: NMauro Carvalho Chehab <mchehab+samsung@kernel.org>
Signed-off-by: NJonathan Corbet <corbet@lwn.net>
上级 14b76743
......@@ -34,6 +34,7 @@ Core utilities
timekeeping
boot-time-mm
memory-hotplug
protection-keys
Interfaces for kernel debugging
......
......@@ -19,7 +19,6 @@ x86-specific Documentation
tlb
mtrr
pat
protection-keys
intel_mpx
amd-memory-encryption
pti
......
......@@ -898,7 +898,7 @@ config PPC_MEM_KEYS
page-based protections, but without requiring modification of the
page tables when an application changes protection domains.
For details, see Documentation/vm/protection-keys.rst
For details, see Documentation/core-api/protection-keys.rst
If unsure, say y.
......
......@@ -1911,7 +1911,7 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS
page-based protections, but without requiring modification of the
page tables when an application changes protection domains.
For details, see Documentation/x86/protection-keys.txt
For details, see Documentation/core-api/protection-keys.rst
If unsure, say y.
......
// SPDX-License-Identifier: GPL-2.0
/*
* Tests x86 Memory Protection Keys (see Documentation/x86/protection-keys.txt)
* Tests x86 Memory Protection Keys (see Documentation/core-api/protection-keys.rst)
*
* There are examples in here of:
* * how to set protection keys on memory
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册