[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: 2 GB RAM support in woody



On Wed, Dec 29, 2004 at 05:59:47AM -0800, saravanan ganapathy wrote:
> Date: Wed, 29 Dec 2004 05:59:47 -0800 (PST)
> From: saravanan ganapathy <sarav_gsa@yahoo.com>
> To: Alexei Chetroi <debian@lexa.uniflux-line.net>
> Cc: debian-user@lists.debian.org
> Subject: Re: 2 GB RAM support in woody
> 
> --- Alexei Chetroi <debian@lexa.uniflux-line.net>
> wrote:
> 
> > On Tue, Dec 28, 2004 at 09:10:52PM -0800, saravanan
> > ganapathy wrote:
> > > Date: Tue, 28 Dec 2004 21:10:52 -0800 (PST)
> > > From: saravanan ganapathy <sarav_gsa@yahoo.com>
> > > To: Adam Aube <aaube01@baker.edu>,
> > debian-user@lists.debian.org
> > > Subject: Re: 2 GB RAM support in woody
> > > 
> > > My arch is 686 only. 686-smp testing version only
> > > supports highmem support. I 've installed
> > > kernel-image-2.4.18-smp (stable) which doesn't
> > support
> > > highmem support
> > > 
> >  1st of all, pls don't top post.
> > 
> >  2nd, if you want to use kernel that comes with
> > stable, install package
> > kernel-source-2.4.18 and recompile it with highmem
> > enabled. I wouln't
> > recommend package from kernel.org as Debian kernel
> > include some patches
> > and security back-ports. Otherwise you have to stay
> > on latest kernel (if
> > you don't want local kernel exploits) and recompile
> > everytime new kernel
> > gets out.
> 
> The latest kernel version in kernel.org for 2.4.x
> series is 2.4.28. But the debian stable kernel version
> is 2.4.18. 
  
  The latest kernel on kernel.org is 2.4.28 indeed. The debian stable
choosed kernel 2.4.18 as kernel for woody release. So debian's kernel
2.4.18 includes security patches for exploits found in kernels 2.4.19,
.20, etc.

  Kernel 2.4.18 does support highmem, but debian's package is compiled
without highmem support. So you have two options:

1st.
Recompile debian's 2.4.18 kernel with highmem support, keep eye on
debian-security-announce list and whenever kernel 2.4.18 gets updated
recompile it.

2nd.
use latest kernel from kernel.org compiled with highmem support and 
recompile it whenever security hole is discovered.


> 
> Is there any lack in this?

--
Alexei Chetroi



Reply to: