summaryrefslogtreecommitdiffstats
path: root/Documentation
diff options
context:
space:
mode:
authorPavel Machek <pavel@suse.cz>2008-11-26 17:15:21 +0100
committerJonathan Corbet <corbet@lwn.net>2008-12-03 16:09:53 -0700
commit2884f00b94be73a6a7875bada739bf9bb2f9a1b6 (patch)
tree20b5ac7acccd0c38e6b52e335cd01cddab7a6a5a /Documentation
parent1c12757c56b4c9ab5aab1f6c1248ae4ea8af3a01 (diff)
downloadkernel-crypto-2884f00b94be73a6a7875bada739bf9bb2f9a1b6.tar.gz
kernel-crypto-2884f00b94be73a6a7875bada739bf9bb2f9a1b6.tar.xz
kernel-crypto-2884f00b94be73a6a7875bada739bf9bb2f9a1b6.zip
Document handling of bad memory
Document how to deal with bad memory reported with memtest. Signed-off-by: Jan-Simon Möller <dl9pf@gmx.de> Signed-off-by: Pavel Machek <pavel@suse.cz> Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/bad_memory.txt45
1 files changed, 45 insertions, 0 deletions
diff --git a/Documentation/bad_memory.txt b/Documentation/bad_memory.txt
new file mode 100644
index 00000000000..df841621320
--- /dev/null
+++ b/Documentation/bad_memory.txt
@@ -0,0 +1,45 @@
+March 2008
+Jan-Simon Moeller, dl9pf@gmx.de
+
+
+How to deal with bad memory e.g. reported by memtest86+ ?
+#########################################################
+
+There are three possibilities I know of:
+
+1) Reinsert/swap the memory modules
+
+2) Buy new modules (best!) or try to exchange the memory
+ if you have spare-parts
+
+3) Use BadRAM or memmap
+
+This Howto is about number 3) .
+
+
+BadRAM
+######
+BadRAM is the actively developed and available as kernel-patch
+here: http://rick.vanrein.org/linux/badram/
+
+For more details see the BadRAM documentation.
+
+memmap
+######
+
+memmap is already in the kernel and usable as kernel-parameter at
+boot-time. Its syntax is slightly strange and you may need to
+calculate the values by yourself!
+
+Syntax to exclude a memory area (see kernel-parameters.txt for details):
+memmap=<size>$<address>
+
+Example: memtest86+ reported here errors at address 0x18691458, 0x18698424 and
+ some others. All had 0x1869xxxx in common, so I chose a pattern of
+ 0x18690000,0xffff0000.
+
+With the numbers of the example above:
+memmap=64K$0x18690000
+ or
+memmap=0x10000$0x18690000
+