* Yinghai Lu <[EMAIL PROTECTED]> wrote: > > thanks. But, i think we should rather do the following: if X86_PAT > > is eanbled then /proc/mtrr should be read-only. There's no problem > > _looking_ at MTRR contents, as long as we do not try to modify them. > > Hm? > > anyway > > depends on !PAT > > need to be removed. > > it seems when PAT is used, some code still touch MTRR.
you mean modifies MTRRs? Which code is that? (besides the /proc/mtrr userspace API) Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/