diff options
author | Pavel Machek <pavel@suse.cz> | 2008-11-26 17:15:21 +0100 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2008-12-03 16:09:53 -0700 |
commit | 2884f00b94be73a6a7875bada739bf9bb2f9a1b6 (patch) | |
tree | 20b5ac7acccd0c38e6b52e335cd01cddab7a6a5a /Documentation | |
parent | 1c12757c56b4c9ab5aab1f6c1248ae4ea8af3a01 (diff) | |
download | kernel-crypto-2884f00b94be73a6a7875bada739bf9bb2f9a1b6.tar.gz kernel-crypto-2884f00b94be73a6a7875bada739bf9bb2f9a1b6.tar.xz kernel-crypto-2884f00b94be73a6a7875bada739bf9bb2f9a1b6.zip |
Document handling of bad memory
Document how to deal with bad memory reported with memtest.
Signed-off-by: Jan-Simon Möller <dl9pf@gmx.de>
Signed-off-by: Pavel Machek <pavel@suse.cz>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation')
-rw-r--r-- | Documentation/bad_memory.txt | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/Documentation/bad_memory.txt b/Documentation/bad_memory.txt new file mode 100644 index 00000000000..df841621320 --- /dev/null +++ b/Documentation/bad_memory.txt @@ -0,0 +1,45 @@ +March 2008 +Jan-Simon Moeller, dl9pf@gmx.de + + +How to deal with bad memory e.g. reported by memtest86+ ? +######################################################### + +There are three possibilities I know of: + +1) Reinsert/swap the memory modules + +2) Buy new modules (best!) or try to exchange the memory + if you have spare-parts + +3) Use BadRAM or memmap + +This Howto is about number 3) . + + +BadRAM +###### +BadRAM is the actively developed and available as kernel-patch +here: http://rick.vanrein.org/linux/badram/ + +For more details see the BadRAM documentation. + +memmap +###### + +memmap is already in the kernel and usable as kernel-parameter at +boot-time. Its syntax is slightly strange and you may need to +calculate the values by yourself! + +Syntax to exclude a memory area (see kernel-parameters.txt for details): +memmap=<size>$<address> + +Example: memtest86+ reported here errors at address 0x18691458, 0x18698424 and + some others. All had 0x1869xxxx in common, so I chose a pattern of + 0x18690000,0xffff0000. + +With the numbers of the example above: +memmap=64K$0x18690000 + or +memmap=0x10000$0x18690000 + |