Sponsored Content
Full Discussion: RAM check
Operating Systems Solaris RAM check Post 302776925 by orange47 on Thursday 7th of March 2013 05:58:21 AM
Old 03-07-2013
thanks.
our servers are quite old, and we might have to use used RAM.
is there a risk of physical damage to server if RAM modules are faulty?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Total ram

Hi How can i find the total ram in the system? :confused: (4 Replies)
Discussion started by: orca
4 Replies

2. HP-UX

Ram structure

Hi all, I would like know if we can enter a command under UNIX (HPUX 10.xx) to know the hard ram memory structure . Thanks Dorian (1 Reply)
Discussion started by: Dorian
1 Replies

3. UNIX for Dummies Questions & Answers

RAM Drive

I need to have fast access to some of my files (like 5 Gb). Im on: Linux franklin3 2.4.21-4.EL #1 Fri Oct 3 18:13:58 EDT 2003 i686 i686 i386 GNU/Linux How can I load my files in my RAM ? Thank you in advance! (0 Replies)
Discussion started by: Gab
0 Replies

4. Solaris

getting available physical RAM

What command should I be using on Solaris 9 to get an accurate representation of the available physical RAM? (4 Replies)
Discussion started by: dangral
4 Replies

5. AIX

Know RAM and CPU

Dear How i can know the ( RAM and CPU ) on unix. we use AIX operating system. This is for security purposes. (10 Replies)
Discussion started by: abu_hassan
10 Replies

6. Red Hat

red hat Linux 5.0 is detecting 3gb ram but physical ram is 16gb

Hi, On server 64bit Hw Arch , Linux 5.0(32bit) is installed it is showing only 3gb of ram though physical is 16gb can u give me idea why? (4 Replies)
Discussion started by: manoj.solaris
4 Replies

7. UNIX for Dummies Questions & Answers

Command to check RAM usage

Hi Guys, How can i check the RAM usage for a particular user on the Linux machine. What command can be used. Thanks in advance, Swapna (1 Reply)
Discussion started by: Swapna173
1 Replies

8. Hardware

skip RAM check?

is there a way to skip RAM check on sparc boot before the ok prompt? (2 Replies)
Discussion started by: orange47
2 Replies

9. Red Hat

Need to check full utilization of my pc RAM - any commands ???

hi guys, I wanted to utilize my PC's full RAM memory to check its performance, for that how can i perform this full RAM utilization with the help of a process or a command in rhel 6. for example, in windows, while checking the harddisk for error (chkdsk - command ) could takes full RAM... (7 Replies)
Discussion started by: redhatlbug
7 Replies

10. UNIX for Dummies Questions & Answers

Want to update the RAM

hi, i m working on my ubuntu 12.10 i wanted to update my desktop's RAM. so kindly let me know how i get below details (thru commands in terminal) 1) what is the processor am using currently 2) what is the RAM am using currently 3) max how much i can upgrade my RAM (4 Replies)
Discussion started by: anandpasunoori
4 Replies
SYSTEMD-CRYPTSETUP-GENERATOR(8) 			   systemd-cryptsetup-generator 			   SYSTEMD-CRYPTSETUP-GENERATOR(8)

NAME
systemd-cryptsetup-generator - Unit generator for /etc/crypttab SYNOPSIS
/lib/systemd/system-generators/systemd-cryptsetup-generator DESCRIPTION
systemd-cryptsetup-generator is a generator that translates /etc/crypttab into native systemd units early at boot and when configuration of the system manager is reloaded. This will create systemd-cryptsetup@.service(8) units as necessary. systemd-cryptsetup-generator implements systemd.generator(7). KERNEL COMMAND LINE
systemd-cryptsetup-generator understands the following kernel command line parameters: luks=, rd.luks= Takes a boolean argument. Defaults to "yes". If "no", disables the generator entirely. rd.luks= is honored only by initial RAM disk (initrd) while luks= is honored by both the main system and the initrd. luks.crypttab=, rd.luks.crypttab= Takes a boolean argument. Defaults to "yes". If "no", causes the generator to ignore any devices configured in /etc/crypttab (luks.uuid= will still work however). rd.luks.crypttab= is honored only by initial RAM disk (initrd) while luks.crypttab= is honored by both the main system and the initrd. luks.uuid=, rd.luks.uuid= Takes a LUKS superblock UUID as argument. This will activate the specified device as part of the boot process as if it was listed in /etc/crypttab. This option may be specified more than once in order to set up multiple devices. rd.luks.uuid= is honored only by initial RAM disk (initrd) while luks.uuid= is honored by both the main system and the initrd. If /etc/crypttab contains entries with the same UUID, then the name, keyfile and options specified there will be used. Otherwise, the device will have the name "luks-UUID". If /etc/crypttab exists, only those UUIDs specified on the kernel command line will be activated in the initrd or the real root. luks.name=, rd.luks.name= Takes a LUKS super block UUID followed by an "=" and a name. This implies rd.luks.uuid= or luks.uuid= and will additionally make the LUKS device given by the UUID appear under the provided name. rd.luks.name= is honored only by initial RAM disk (initrd) while luks.name= is honored by both the main system and the initrd. luks.options=, rd.luks.options= Takes a LUKS super block UUID followed by an "=" and a string of options separated by commas as argument. This will override the options for the given UUID. If only a list of options, without an UUID, is specified, they apply to any UUIDs not specified elsewhere, and without an entry in /etc/crypttab. rd.luks.options= is honored only by initial RAM disk (initrd) while luks.options= is honored by both the main system and the initrd. luks.key=, rd.luks.key= Takes a password file name as argument or a LUKS super block UUID followed by a "=" and a password file name. For those entries specified with rd.luks.uuid= or luks.uuid=, the password file will be set to the one specified by rd.luks.key= or luks.key= of the corresponding UUID, or the password file that was specified without a UUID. rd.luks.key= is honored only by initial RAM disk (initrd) while luks.key= is honored by both the main system and the initrd. SEE ALSO
systemd(1), crypttab(5), systemd-cryptsetup@.service(8), cryptsetup(8), systemd-fstab-generator(8) systemd 237 SYSTEMD-CRYPTSETUP-GENERATOR(8)
All times are GMT -4. The time now is 03:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy