[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] updating kernel


  • To: "Matt Ouellette" <mfo62786@xxxxxxxxxx>
  • From: "Henning Sprang" <henning_sprang@xxxxxx>
  • Date: Wed, 19 Jul 2006 11:38:46 +0200
  • Cc: xen-users@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 19 Jul 2006 02:39:21 -0700
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; b=lsXF+c1tWSwEo7R+ejmYstqH6b1yDV890al9Mm0lZeIYPeR3oTKG6BB3wtzc9eKVeB4qt4ZZWSlh/CZovJgIxjYjMY6MQgCv1EFQsVpvg/qACqtMXbq0g6Gw+DNV8z1o7k5t/dixhhvHDxCgChUsqygJHqTK6B2XvL8uyjF1RXY=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

On 7/17/06, Matt Ouellette <mfo62786@xxxxxxxxxx> wrote:
Hello,
    I am still new to xen, and was just wondering how people handle
updating their kernels for xen.

I install a new version and adjust my grub config.

More specifically for those that build
their kernels from source.  Are there patches available or do you have
to recompile your kernels whenever and exploit is found?

You mean binary patches? Why do you think it's open _source_?

So yes, you have to use the binary packages, or compile each new
version, each new source patch. Additionally, the xen patches are
always made against a specific kernel version. That means, if in
kernel 2.6.16 an issue is found, you most probably have to wait until
the xen developers release a xen patch version for the new, fixed,
upstream kernel.

Henning

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.