From: Dave Hansen <dave.hansen@linux.intel.com> We try to enforce protection keys in software the same way that we do in hardware. (See long example
↧