lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 09 Jan 2013 15:04:00 +0100
From:	"lkml@...usoft.pl" <lkml@...usoft.pl>
To:	linux-kernel@...r.kernel.org
Subject: Re: 3.2.35 problem with M5A97 PRO ram: bad_page free_pages_prepare
 mem_init

On 09/01/13 09:02, lkml@...usoft.pl wrote:
> On 08/01/13 16:59, Borislav Petkov wrote:
>> On Tue, Jan 08, 2013 at 01:21:26AM +0100, lkml@...usoft.pl wrote:
>>> On 08/01/13 01:13, lkml@...usoft.pl wrote:
>>>
>>>> linux kernel
>>>> 3.2.0-0.bpo.4-rt-amd64 #1 SMP PREEMPT RT Debian 3.2.35-2~bpo60+1 x86_64
>>>> GNU/Linux
>>>
>>> will post later how it behaves on vanilla 3.2.36 and 3.7.1
>>
>> Yes, also, if your DRAM supports ECC, try enabling it in the BIOS.
>> This board should support ECC. Then, enable CONFIG_EDAC_AMD64 and
>> CONFIG_EDAC_DECODE_MCE to check whether it catches any DRAM errors.
>>
>> If your DRAM is non-ECC, try consecutively swapping out a DIMM each time
>> and booting to see whether removing one of the DIMMs makes the errors go
>> away.
>>
>> HTH.
>>
> 
> Thank you;
> On vanilla 3.2.36 there is the same problem.
> 
> Also problems happen on each boot so not random memory error, but I will
> try to swap rams, run memtest and so on.

Turned out it was just a hardware problem after all.
Solution is simply to try good memtest86 memory tester and swap out bad
chip.

Sorry for the trouble, thanks.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ