--- linux/arch/i386/kernel/setup.c.orig Wed Oct 15 22:07:23 1997
+++ linux/arch/i386/kernel/setup.c Wed Oct 15 22:11:05 1997
@@ -258,7 +258,8 @@
static const char *model[] = {
"SSA5 (PR-75, PR-90, PR-100)", "5k86 (PR-120, PR-133)",
"5k86 (PR-166)", "5k86 (PR-200)", "", "",
- "K6(PR-133..PR-166)","K6(PR-133..PR-200)"
+ "K6 (166 - 266)","K6 (166 - 300)", "K6 (model 8)",
+ "K6 (model 9)"
};
if (nr < sizeof(model)/sizeof(char *))
return model[nr];
**************************************************************************************************
Snip
There are still some typos at the end of
linux/include/asm-i386/bugs.h:
.......
/*
* B step AMD K6 before B 9729AIJW have hardware bugs that can
cause
* misexecution of code under Linux. Owners of such processors
should
* contact AMD for precise details and a CPU swap.
*
* See http://www.creaweb.fr/bpc/k6bug_faq.html
-----> should be:
* See http://www.chorus.com/~poulot/k6bug.html
* http://www.amd.com/K6/k6docs/revgd.html
*/
__initfunc(static void check_amd_k6(void))
{
/* B Step AMD K6 */
if(x86_model==6 && x86_mask==1 && memcmp(x86_vendor_id,
"AuthenticAMD", 12)==0)
{
printk(KERN_INFO "AMD K6 stepping B detected - system
stability may be impaired. Please s
ee.\n");
printk(KERN_INFO
"http://www.creaweb.fr/bpc/k6bug_faq.html");
-----> should be:
printk(KERN_INFO
"http://www.chorus.com/~poulot/k6bug.html\n");
}
}
__initfunc(static void check_bugs(void))
{
check_tlb();
check_fpu();
check_hlt();
check_popad();
check_amd_k6();
system_utsname.machine[1] = '0' + x86;
}
Cheers,
--Dieter Nuetzel Graduate Student, Computer Science
University of Hamburg Department of Computer Science Cognitive Systems Group Vogt-Koelln-Strasse 30 22527 Hamburg, Germany
email: nuetzel@kogs.informatik.uni-hamburg.de