RAM Mapping Script

Jim Kuzdrall gnhlug at intrel.com
Sun Mar 2 21:45:07 EST 2008


On Sunday 02 March 2008 13:28, Ben Scott wrote:

    Boo-hoo!  Still the same memory error.  Apparently Dell didn't 
shuffle RAM modules on this one.

    I can't say I am making any progress toward saving the computer, but 
I am learning a lot.  Thanks guys.

>From Michael ODonnell

> Que?  It's been ages since I thought about this stuff but I'm pretty
> sure int19h is (or was, when dinosaurs roamed and I was versed in
> this stuff) the vector that points to some sort of booter code;
> nothing to do with keypads.

    Right.  I was looking at 0040:0019 in the variables page. 

> the IA32
> architecture has used the IDT register to point at the vector table
> (official name: Interrupt Descriptor Table) wherever it happens to be.

   I knew that!  I think.  Once upon a time - but I forgot.  Yes, the 
x86 instructions LIDT AND SIDT load and store the register which points 
to the table in the protected mode.  Makes sense.  All other memory 
accesses must go through a Descriptor Table, so why handle the 
processor services differently.

>From  VirginSnow at vfemail.net

> Somewhere, floating around the 'net, there's something called the "bad
> RAM" patch for the linux kernel.

   I saw that too.  It might have been needed to solve a memory 
exception problem with the DEC Alpha chip.

Summary:
   Memory error is in on-board chip; impractical to replace.
   Linux maps the interrupt table elsewhere for protected mode, likely
   The RAM at the memory error acts like it is in the stack area
   There is nothing resembling memmap or any related thing on this Linux 
system

   So, the next thing to try is a program that executes right after boot 
and puts 128 bytes of zeros on the stack and stays in the background 
doing nothing.

Jim Kuzdrall


    



More information about the gnhlug-discuss mailing list