On 03/06/2017 06:25 PM, Anthony Yznaga wrote:
>
>> On Mar 6, 2017, at 4:31 PM, Khalid Aziz wrote:
>>
>> On 03/06/2017 05:13 PM, Anthony Yznaga wrote:
>>>
On Feb 28, 2017, at 10:35 AM, Khalid Aziz wrote:
diff --git a/arch/sparc/kernel/etrap_64.S b/arch/sparc/kernel/etrap_64.S
On 03/06/2017 05:13 PM, Anthony Yznaga wrote:
On Feb 28, 2017, at 10:35 AM, Khalid Aziz wrote:
diff --git a/arch/sparc/kernel/etrap_64.S b/arch/sparc/kernel/etrap_64.S
index 1276ca2..7be33bf 100644
--- a/arch/sparc/kernel/etrap_64.S
+++ b/arch/sparc/kernel/etrap_64.S
@@ -132,7 +132,33 @@ etra
> On Mar 6, 2017, at 4:31 PM, Khalid Aziz wrote:
>
> On 03/06/2017 05:13 PM, Anthony Yznaga wrote:
>>
>>> On Feb 28, 2017, at 10:35 AM, Khalid Aziz wrote:
>>>
>>> diff --git a/arch/sparc/kernel/etrap_64.S b/arch/sparc/kernel/etrap_64.S
>>> index 1276ca2..7be33bf 100644
>>> --- a/arch/sparc/ke
ADI is a new feature supported on SPARC M7 and newer processors to allow
hardware to catch rogue accesses to memory. ADI is supported for data
fetches only and not instruction fetches. An app can enable ADI on its
data pages, set version tags on them and use versioned addresses to
access the data p