lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1156415447.4889.14.camel@Maciek.xqueue.qu>
Date:	Thu, 24 Aug 2006 12:30:47 +0200
From:	Maciek Zobniow <maciej.zobniow@...1.com>
To:	linux-kernel@...r.kernel.org
Subject: Re: Kernel 2.6.17.8 on Quad AMD Opteron 852 with 16x 4GB Modules
	(64GB RAM)

>Björn Engelhardt wrote:
>> Hello,
>> 
>> we upgraded a Server from 32 GB RAM to 64 GB. Now we try to get a Linux 
>> (FC5) with kernel 2.6.17.8 on a Quad Opteron (852; 64bit)-system with 
>> 16x 4GB modules to run.
>> With 32 GB (8x 4GB modules) the system starts without any problems, but 
>> above I get kernelpanics.
>> The output then gives me several memoryaddresses bevore the panic 
>> appears. The board (a Tyan K8QW,model S4881) should support up to 64GB 
>> Ram. A Memorytest under Linux recognizes the 64GB and continues without 
>> an error.
>> I tried several BIOS-Settings.
>> Does the kernel support the new 4GB-Modules by 64GB Ram?
>> 
>
>Sounds like your memory is bad.
>
>	-hpa

My friend Bjoern has forgotten to write that we actually checked the memory with only 32GB and kernel booted normally. 
The problem appears when we want to put more, even just next 4GB, over the 32GB. It seems to be a kernel problem to me. 
Will try to retrive and send oops tonight.

Thanks for any suggestion!

Regards
Maciek  

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ