Skip to content

Implement x86 protection keys

Protection keys should be easy to implement per-page, and can be used both to improve security in memory-unsafe applications. It is also required if coprocesses are going to be implemented.