[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALCETrXwVb99hAvqR2o54aPwtpr8oubROtiRt45SiYRfUTAxCw@mail.gmail.com>
Date: Fri, 4 Dec 2015 15:31:34 -0800
From: Andy Lutomirski <luto@...capital.net>
To: Dave Hansen <dave@...1.net>
Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-mm@...ck.org" <linux-mm@...ck.org>, X86 ML <x86@...nel.org>,
Linux API <linux-api@...r.kernel.org>,
linux-arch <linux-arch@...r.kernel.org>,
Andrea Arcangeli <aarcange@...hat.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Jan Kara <jack@...e.cz>,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Naoya Horiguchi <n-horiguchi@...jp.nec.com>
Subject: Re: [PATCH 00/34] x86: Memory Protection Keys (v5)
On Thu, Dec 3, 2015 at 5:14 PM, Dave Hansen <dave@...1.net> wrote:
> Memory Protection Keys for User pages is a CPU feature which will
> first appear on Skylake Servers, but will also be supported on
> future non-server parts. It provides a mechanism for enforcing
> page-based protections, but without requiring modification of the
> page tables when an application changes protection domains. See
> the Documentation/ patch for more details.
What, if anything, happened to the signal handling parts?
Also, do you have a git tree for this somewhere? I can't actually
enable it (my laptop, while very shiny, is not a Skylake server), but
I can poke around a bit.
--Andy
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists