From: Dave Hansen <dave.hansen@linux.intel.com> For protection keys, we need to understand whether protections should be enforced in software or not.
↧