public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: FD Cami <francois.cami@free.fr>
To: Jeff Arnold <jbarnold@MIT.EDU>
Cc: linux-kernel@vger.kernel.org
Subject: Re: A system for rebootless kernel security updates
Date: Wed, 23 Apr 2008 23:37:22 +0200	[thread overview]
Message-ID: <20080423233722.646012fb@olorin> (raw)
In-Reply-To: <alpine.DEB.1.00.0802221606520.21343@vinegar-pot.mit.edu>

On Wed, 23 Apr 2008 14:59:05 -0400 (EDT)
Jeff Arnold <jbarnold@MIT.EDU> wrote:

> Hello,

Hi Jeff,

> I've put together an automatic system for applying kernel security patches 
> to the Linux kernel without rebooting it, and I wanted to share this 
> system with the community in case others find it useful or interesting.

(reading on)

> Here's the summary:  The system takes as input a kernel security patch 
> (which can be a unified diff taken directly from Linus' GIT tree) and the 
> source code corresponding to the running kernel, and it automatically 
> creates a set of kernel modules to perform the update.  The running kernel 
> does not need to have been customized in advance in any way.  To be fully 
> automatic, the system cannot be used to apply patches that introduce 
> semantic changes to data structures, but most Linux kernel security 
> patches don't make these kinds of changes.  I've evaluated the system 
> against various kernel versions and security vulnerabilities, and the 
> system can automatically apply 84% of the significant kernel security 
> patches from May 2005 through December 2007.

Awesome. Please note that reading this, I thought at first that the set of
kernel modules were in fact, updated kernel modules (i.e. necessary unloading/
loading of modules) which I understood was not the case after reading your
PDF. After checking with a friend of mine, he understood it like I did.
Perhaps :

- it automatically creates a set of kernel modules to perform the update.
+ it automatically creates a set of kernel modules containing the kernel
+ functions touched by the update, and arranges for the running kernel to
+ use the new functions from now on.

would be better.

> I've been pursuing this project because I don't like dealing with reboots 
> whenever a new local kernel security vulnerability is discovered.  The 
> rebootless update practices/systems that are already out there require 
> manually constructing an update (through a process that can be tricky and 
> error-prone), and they tend to have other disadvantages as well (such as 
> requiring a custom kernel, not handling inline functions properly, etc). 
> This new system works on existing kernels, and it simply takes a unified 
> diff as input and does the rest on its own.

It really looks like a non intrusive way of achieving superior uptime.

Congrats ! 

Best,

Francois

  reply	other threads:[~2008-04-23 21:37 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-04-23 18:59 A system for rebootless kernel security updates Jeff Arnold
2008-04-23 21:37 ` FD Cami [this message]
2008-04-24 13:42 ` Andi Kleen
2008-04-28  6:18   ` Jeff Arnold
2008-04-28 10:29     ` Andi Kleen
2008-04-29  6:55       ` Jeff Arnold
2008-04-29 12:57         ` Dan Noe
2008-04-29 22:43           ` Jeff Arnold
2008-05-01 11:38         ` Enrico Weigelt
2008-05-01 13:35           ` David Collier-Brown
2008-04-24 13:43 ` Christian Hesse
2008-04-24 18:13   ` Jeff Arnold
2008-04-24 19:16     ` Christian Hesse
2008-04-28  6:11       ` Jeff Arnold
  -- strict thread matches above, loose matches on Subject: below --
2008-04-24 14:26 Tomasz Chmielewski
2008-04-24 14:42 ` Andi Kleen
2008-04-27 10:17 ` Pavel Machek
2008-04-27 17:00   ` Gilles Espinasse
2008-04-27 17:49   ` Willy Tarreau
2008-04-27 19:51     ` Oliver Pinter
2008-04-27 19:58     ` Jesper Juhl
2008-04-28 19:07 ` Bill Davidsen
2008-04-29 23:39 ` Jeff Arnold

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20080423233722.646012fb@olorin \
    --to=francois.cami@free.fr \
    --cc=jbarnold@MIT.EDU \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox