[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] updating kernel


  • To: "Matt Ouellette" <mfo62786@xxxxxxxxxx>
  • From: "Krishna Kumar" <krish.kumar@xxxxxxxxx>
  • Date: Wed, 27 Sep 2006 20:04:39 +0530
  • Cc: xen-users@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 28 Sep 2006 01:26:28 -0700
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=h608xR90IulV19/Rs4ur7tktlcQdwnAvWohLQ92K9/s2CpCGAOF6hxMQa/7BkILR35Esf4WWuZGRk/d5gU0X/Qt7rVqd2lXx3245ZNPvTopXlsWvKhLBt0ytLtT3PK/HDuOsf1OrRtyuKEk0FmY95J/JdHL7BQYZBNbrfqJYv5k=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

Binaries never work for weird/obscure machine configurations... so
building from source is the norm for using Xen, rather than just for
plugging exploits/compatibilities.

Regards,
KK

On 7/18/06, Matt Ouellette <mfo62786@xxxxxxxxxx> wrote:
Hello,
    I am still new to xen, and was just wondering how people handle
updating their kernels for xen.  More specifically for those that build
their kernels from source.  Are there patches available or do you have
to recompile your kernels whenever and exploit is found?

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.