x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt
authorWang Kai <morgan.wang@huawei.com>
Mon, 24 Jul 2017 13:03:46 +0000 (21:03 +0800)
committerIngo Molnar <mingo@kernel.org>
Tue, 25 Jul 2017 09:28:13 +0000 (11:28 +0200)
Replace PKEY_DENY_WRITE with PKEY_DISABLE_WRITE,
to match the source code.

Signed-off-by: Wang Kai <morgan.wang@huawei.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: corbet@lwn.net
Cc: dave.hansen@intel.com
Cc: dave.hansen@linux.intel.com
Cc: linux-doc@vger.kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Documentation/x86/protection-keys.txt

index b643045408218669de1af81b9a9a661c035ffc70..fa46dcb347bc1d2ac60901c4621bd3bad81de601 100644 (file)
@@ -34,7 +34,7 @@ with a key.  In this example WRPKRU is wrapped by a C function
 called pkey_set().
 
        int real_prot = PROT_READ|PROT_WRITE;
-       pkey = pkey_alloc(0, PKEY_DENY_WRITE);
+       pkey = pkey_alloc(0, PKEY_DISABLE_WRITE);
        ptr = mmap(NULL, PAGE_SIZE, PROT_NONE, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
        ret = pkey_mprotect(ptr, PAGE_SIZE, real_prot, pkey);
        ... application runs here
@@ -42,9 +42,9 @@ called pkey_set().
 Now, if the application needs to update the data at 'ptr', it can
 gain access, do the update, then remove its write access:
 
-       pkey_set(pkey, 0); // clear PKEY_DENY_WRITE
+       pkey_set(pkey, 0); // clear PKEY_DISABLE_WRITE
        *ptr = foo; // assign something
-       pkey_set(pkey, PKEY_DENY_WRITE); // set PKEY_DENY_WRITE again
+       pkey_set(pkey, PKEY_DISABLE_WRITE); // set PKEY_DISABLE_WRITE again
 
 Now when it frees the memory, it will also free the pkey since it
 is no longer in use: