Civil Infrastructure Platform to maintain 6.1 for 10 years
CIP kernels are maintained like regular long-term-stable (LTS) kernels, and developers of the CIP kernel are also involved in LTS kernel review and testing. While regular LTS kernels are moving back to 2 years maintenance, CIP kernels are set up for 10 years. In order to enable this extended lifetime, CIP kernels are scoped-down in actively supported kernel features and target architecture. At the same time, CIP kernels accept non-invasive backports from newer mainline kernels that enable new hardware.
Posted Oct 12, 2023 18:43 UTC (Thu)
by florianfainelli (subscriber, #61952)
[Link]
Posted Oct 12, 2023 19:43 UTC (Thu)
by faramir (subscriber, #2327)
[Link] (8 responses)
Posted Oct 12, 2023 20:28 UTC (Thu)
by smoogen (subscriber, #97)
[Link] (1 responses)
While the EL7 kernel says it is 3.10.0, the EL8 says its 4.18.0, and the EL9 says its 5.14.0, what the actual code is may be very different in places. I expect that something similar is done for the other distributions but on different timelines.
Posted Oct 13, 2023 11:08 UTC (Fri)
by joib (subscriber, #8541)
[Link]
Posted Oct 13, 2023 11:59 UTC (Fri)
by DOT (subscriber, #58786)
[Link] (5 responses)
Posted Oct 13, 2023 12:19 UTC (Fri)
by pbonzini (subscriber, #60935)
[Link] (4 responses)
Posted Oct 13, 2023 14:56 UTC (Fri)
by nim-nim (subscriber, #34454)
[Link] (3 responses)
Those customers admit they need some form of security update process but live in deep fear any behaviour change will cause the gluetaped software skyscraper to crumble. They are ready to pay good money to someone like Red Hat to gate changes and postpone as long as possible the need to deal with most kernel changes.
Posted Oct 13, 2023 15:02 UTC (Fri)
by nim-nim (subscriber, #34454)
[Link]
Posted Oct 13, 2023 15:03 UTC (Fri)
by smoogen (subscriber, #97)
[Link] (1 responses)
Posted Oct 16, 2023 10:56 UTC (Mon)
by nim-nim (subscriber, #34454)
[Link]
Networked IT is very powerful, but it also means any problem in any point of the network of inter-linked apps will have huge effects (and it’s not a linear progression, the cost of mistakes grows much faster than the size of IT systems as a whole).
But the cost savings when everything is done right is also big enough there is a huge pressure to interlink everything.
Posted Oct 13, 2023 7:31 UTC (Fri)
by Lionel_Debroux (subscriber, #30014)
[Link] (5 responses)
*: the grsecurity patch for 4.4.162, which was published at the end of 2018, was in the hundreds of missing backports ballpark, and that was for a period much shorter than 10 years. Not all of the vulnerabilities were severe, but still. On 2019/01/01, I selected and sent 5 commit IDs to Greg KH, one of which had a message containing "oops"; I received a reply on 2019/11/21.
Posted Oct 13, 2023 9:13 UTC (Fri)
by wtarreau (subscriber, #51152)
[Link]
Posted Oct 13, 2023 12:16 UTC (Fri)
by mcatanzaro (subscriber, #93033)
[Link] (3 responses)
The best way to stay safe is to regularly update to the latest upstream version every few years, i.e. don't use LTS distros for too long. I'd say 2-3 years is the longest time that I would be reasonably comfortable with personally. LTS distros do a good job of tracking and fixing CVEs, but they cannot save you from the unknown. Maintain reasonable expectations when you see outrageously long support commitments.
Posted Oct 13, 2023 12:45 UTC (Fri)
by danielthompson (subscriber, #97243)
[Link]
I'm dubious about "only [] security bugs [with a CVE] can be tracked and fixed". Sure, that will be true for some projects but it's certainly not the case for the LTS kernel releases (and is likewise unlikely to be only way to maintain CIP kernels either). For LTS kernels, it is git metadata that drives the backporting of bug fixes, not CVEs.
Posted Oct 13, 2023 15:11 UTC (Fri)
by nim-nim (subscriber, #34454)
[Link]
However that does not work when you live in software version support matrix hell, the people paying want to wait at least a year to shake out bugs before committing to any distro version, integrating all the bits that will be deployed over this distro version once the matrix is resolved is itself a long many-months process, and you can add some software procurement negotiations delays to the mix.
Posted Oct 16, 2023 9:04 UTC (Mon)
by taladar (subscriber, #68407)
[Link]
Posted Oct 13, 2023 9:47 UTC (Fri)
by arekm (guest, #4846)
[Link] (1 responses)
Posted Oct 13, 2023 12:38 UTC (Fri)
by wtarreau (subscriber, #51152)
[Link]
Posted Oct 13, 2023 16:07 UTC (Fri)
by mfuzzey (subscriber, #57966)
[Link] (1 responses)
For the normal LTS kernels it's described in Documentation/process/stable-kernel-rules.rst
In particular
Posted Oct 13, 2023 17:37 UTC (Fri)
by geert (subscriber, #98403)
[Link]
Posted Oct 14, 2023 16:59 UTC (Sat)
by fratti (guest, #105722)
[Link] (3 responses)
Posted Oct 14, 2023 19:51 UTC (Sat)
by willy (subscriber, #9762)
[Link] (2 responses)
The hardware of 2037 is likely to be even more multicore and multithreaded than the hardware of today. So these improvements are only going to be more significant in the future.
No, they're not in any meaningful sense backportable fixes. The fetish for maintaining ancient software for new hardware is harmful. The kernel doesn't (intentionally) break userspace compatibility. Upgrade your kernel every couple of years and be happy.
Posted Oct 14, 2023 21:06 UTC (Sat)
by fratti (guest, #105722)
[Link] (1 responses)
Posted Oct 23, 2023 4:21 UTC (Mon)
by nilsmeyer (guest, #122604)
[Link]
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
AFAICS in https://gitlab.com/cip-project/cip-kernel/cip-kernel-config , the 3 known sources of streams of vulnerabilities I looked at are either enabled in modern versions (BPF_JIT, USER_NS though the real problem is with _unprivileged_ user namespaces) or not explicitly disabled (IO_URING).
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
> those security bugs can be tracked and fixed.
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
* What are the criteria for an upstream patch to be back ported?
* What is the process for requesting a backport?
* Will things tagged "stable" in mainline commits get merged into both normal LTS and CIP?
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
Civil Infrastructure Platform to maintain 6.1 for 10 years
