lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200803101523.03620.dl9pf@gmx.de>
Date:	Mon, 10 Mar 2008 15:23:02 +0100
From:	Jan-Simon Möller <dl9pf@....de>
To:	Pavel Machek <pavel@....cz>
Cc:	Jiri Kosina <jkosina@...e.cz>, "H. Peter Anvin" <hpa@...or.com>,
	Ingo Molnar <mingo@...e.hu>, devzero@....de,
	linux-kernel@...r.kernel.org, rick@...rein.org
Subject: Re: [PATCH 2.6.24] mm: BadRAM support for broken memory

Am Montag 10 März 2008 12:52:37 schrieb Pavel Machek:
> On Mon 2008-03-10 12:24:06, Jan-Simon Möller wrote:
> > Am Montag 10 März 2008 11:14:48 schrieben Sie:
> > > Feel free to improve memmap documentation.
> >
> > BUT ...
> > to do that, I would need to know already a bit of memmap ?!
> >
> > This is a Chicken-egg-problem !
> >
> > And I won't "waste" my time if i've a solution at hand already ?!
>
> ...so you waste everyone elses...?

This is no fair answer, Pavel - I already invested my time to find a solution 
and only found BadRAM at that time. So my impression is that for memmap 
there's so little doc that no average user is able to use it. This will also 
prevent users from making "derived" documentation for other use-cases. And 
again we're back to the chicken-egg ??
You can have the "nicest" solution out there - as long as its 
either "nasty-to-use" or zero-documented, no one will really use it.

> > Lets do it like this: Show me what i need to know about the usage of
> > memmap and i'll write some doc.
> >
> > Just shouting "write your own doc" is pointless, as I don't know this
> > part of the kernel myself (yet).
>
> Read the thread you are replying to. It was already there.

I did that and also read kernel-parameters.txt / memory.txt :
But there is _NO_ example line, just the synopsis. 
Do you expect all users to know what's e820 table is ? - this is not 
realistic. Not everybody is an expert in computer science.

Thats why BadRAM is used out there - memtest prints the values and BadRam can 
use them.

Lets try to get an example and document it:
My starting point would be: i wanna exclude this memory-area

badram=0x18690000,0xffff0000
(which means a whole from 0x18690000 to 0x1869ffff )

what would that be in memmap= -Syntax if i've got 2GB RAM in total ?

Best regards
Jan-Simon
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ