lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 26 Apr 2007 13:23:52 -0700
From:	Jeremy Fitzhardinge <jeremy@...p.org>
To:	Xen-devel <xen-devel@...ts.xensource.com>,
	Virtualization Mailing List <virtualization@...ts.osdl.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
CC:	Andi Kleen <ak@...e.de>, Zachary Amsden <zach@...are.com>
Subject: Xen/paravirt_ops kernel available for testing

Hi all,

I'm pleased to announce a Xen paravirt_ops kernel available for testing
at http://xenbits.xensource.com/ext/paravirt_ops/.

These kernels are based on this morning's 2.6.21, along with all the
paravirt_ops + Xen patches.  The pre-built i386 kernel RPM is based on
the FC6 configuration, and it has both Xen and VMI paravirt_ops support
enabled.  Unfortunately the RPM is a bit rough, and you'll need to
generate an initrd and update your boot-loader to make it bootable.  To
boot under Xen, use /boot/vmlinux-.gz as the kernel image.

This is definitely a testing snapshot release, but it has had a bit of
testing.  I've been using it running native on my main work machine, and
it behaves exactly like a non-paravirt kernel.  It has also been tested
under Xen on XenRT, XenSource's automated testing infrastructure, where
it passes almost everything.

There are a couple of expected BUG messages which appear on boot: one in
init_sched_clock, and one in xen_apic_read.  Both are harmless warning
messages, and will be removed shortly.  (However, if you see more than
one xen_apic_read warning, please send me the details along with your
kernel config.)

Please see the RELEASE*.txt for release notes.

    J
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ