Linux Kernel Security Done Right (Google Security Blog)
Long-term Linux robustness depends on developers, but especially on effective kernel maintainers. Although there is effort in the industry to train new developers, this has been traditionally justified only by the "feature driven" jobs they can get. But focusing only on product timelines ultimately leads Linux into the Tragedy of the Commons. Expanding the number of maintainers can avoid it. Luckily the "pipeline" for new maintainers is straightforward.Maintainers are built not only from their depth of knowledge of a subsystem's technology, but also from their experience with mentorship of other developers and code review. Training new reviewers must become the norm, motivated by making upstream review part of the job. Today's reviewers become tomorrow's maintainers. If each major kernel subsystem gained four more dedicated maintainers, we could double productivity.
Posted Aug 4, 2021 9:09 UTC (Wed)
by pabs (subscriber, #43278)
[Link]
Posted Aug 4, 2021 11:07 UTC (Wed)
by smoogen (subscriber, #97)
[Link] (7 responses)
Most of those regulations are usually written to deal with the last catastrophe where people quit using their 'common sense' in one way or another so they tend to cause a backward way of thinking on how to fix things. [Yes some of them are written to create barriers of entry or monopolies or whatever but in general most of them are because people did something 'stupid' multiple times (versus once). ] So getting the policies written with the idea of forward thinking of the next problem versus the last one is needed. [Also much of this regulation isn't government but instead finding out your company can't get any insurance unless you can show your processes meet some new standard. The bigger your company, the more these industry standards come into play.]
The other area is where software is a complicated beast. You run version X.Y of the kernel and the software works (say your payroll system or your manufacturing looms). You run version X.(Y+m) of the kernel and something starts breaking. Then you play a long game of blame between the software you need to work and the kernel about whose fault it is. That is time and money you usually don't have because your competition instead went to X.Y.(Z+n) of the kernel or not at all and is running fine. [Usually the problem isn't with either the software you need or the kernel. It is some middle piece which no one remembers but needs fixing.]
This is a different sort of bureaucracy because you need to work out a lot of things from all the different software needed for various industries to work. It is also a lot of people time versus engineering because it is about getting a coalition of companies to work together.
Posted Aug 4, 2021 12:59 UTC (Wed)
by wtarreau (subscriber, #51152)
[Link] (1 responses)
Right now the benefit of updating it often not perceived, hence is often balanced against the risk of rergression and that's what must change. Updating is not a benefit, it's a necessity. The exception should be not updating for a good reason.
Posted Aug 4, 2021 14:03 UTC (Wed)
by smoogen (subscriber, #97)
[Link]
That is the part that I think any security initiative will also need :/.
Posted Aug 4, 2021 13:08 UTC (Wed)
by pmenzel (subscriber, #113811)
[Link] (2 responses)
Actually, Linux’ no-regression rule “We do not break userspace.“ is very clear, making it Linux’ problem.
Posted Aug 4, 2021 14:06 UTC (Wed)
by smoogen (subscriber, #97)
[Link]
Posted Aug 10, 2021 15:01 UTC (Tue)
by geert (subscriber, #98403)
[Link]
Posted Aug 4, 2021 13:12 UTC (Wed)
by jwb (guest, #15467)
[Link] (1 responses)
Posted Aug 4, 2021 14:12 UTC (Wed)
by smoogen (subscriber, #97)
[Link]
Some are written so that anyone can 'meet them in the field' and others are written that you must run XYZ code as certified by ABC firm of auditors and published in DEF registry. My understanding was that if you are needing to meet the second set of certifications, you don't get the latest kernel/library set they publish.. you instead get an old set which did meet those certificates and is backported patched in a way that whatever regulation allows for.
Posted Aug 5, 2021 2:35 UTC (Thu)
by timrichardson (subscriber, #72836)
[Link]
As for the metaphor: The US car industry was not reformed. It was out-competed by new entrants who started without legacy baggage and a focus on quality as a point of difference. Maybe the vision is possible with Rust and modern software engineering. Assuming the problem is actually real enough. How often does linux catch fire, by the way? The only problem I have on my servers is OOM, and that's rare and it seems to be getting fixed.
Posted Aug 5, 2021 7:06 UTC (Thu)
by marcH (subscriber, #57642)
[Link]
How many companies allocate or track time for code reviews or reward them? Maintainers are overwhelmed by code reviews because they're the only ones facing some consequences in the lack of them. All other engineers are running behind their underestimated schedules and have "more important things to do" than code reviews.
You get what you pay for.
Posted Aug 5, 2021 9:22 UTC (Thu)
by ncm (guest, #165)
[Link] (1 responses)
In such an environment it is not hard to see why updates are considered nothing but trouble. Without a change in incentive structure, there is no reason to expect a change in behavior will even be possible in almost all organizations.
Posted Aug 5, 2021 13:31 UTC (Thu)
by mathstuf (subscriber, #69389)
[Link]
[1] https://arstechnica.com/gadgets/2021/08/google-class-acti...
Posted Aug 5, 2021 12:28 UTC (Thu)
by scientes (guest, #83068)
[Link]
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)
Linux Kernel Security Done Right (Google Security Blog)