Implement x86 protection keys
Protection keys should be easy to implement per-page, and can be used both to improve security in memory-unsafe applications. It is also required if coprocesses are going to be implemented.
Protection keys should be easy to implement per-page, and can be used both to improve security in memory-unsafe applications. It is also required if coprocesses are going to be implemented.