Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

"No Reboot" Kernel Patching - And Why You Should Care
Linux Journal ^ | 22 April 2015 | James Darvell

Posted on 04/27/2015 5:48:18 AM PDT by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-26 last
To: PieterCasparzen
This is an introduction of a vulnerability.

Servers can avoid reboots for long periods of time, but not forever.

I wouldn't call it a 'vulnerability', but it does bring up something that can sometimes cause problems, and that is, the longer a system runs, the less confidence administrators tend to have of it coming back up cleanly after a reboot. I've seen servers go years between reboots even without this feature because they weren't being religiously patched. (They were fairly stable systems that weren't externally facing). The longer they'd go, the less confidence you'd have that you actually knew about any changes that had been made to the systems. Additionally, having long uptimes could occasionally mask hardware issues. I've seen AIX servers that pretty much ran continuously from the time the OS was installed until the next update, which in the case of these systems was about 4-5 years. For some, once the hard drive would spin down, they just wouldn't spin back up, so they were fine as long as they were chugging along, but the moment you tried to reboot, you were in serious trouble..

If your change control procedures are good, you can stay on top of any configuration changes that have occurred, but sometimes it's hard to remember stuff from more than a year back.

 

21 posted on 04/27/2015 7:37:46 AM PDT by zeugma ( The Clintons Could Find a Loophole in a Stop Sign)
[ Post Reply | Private Reply | To 3 | View Replies]

To: zeugma

It might be required that hot updates (handoffs) be made only between certain versions or releases of the kernel, the kernels themselves containing the requisite handoff code.

So a requirement for using hot updates would be to keep the system hot updated every so many releases of the kernel. Otherwise you have to update in the normal manner, with a reboot.


22 posted on 04/27/2015 7:46:52 AM PDT by HiTech RedNeck (Embrace the Lion of Judah and He will roar for you and teach you to roar too. See my page.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: zeugma

Yes, I agree with all.

Except the conventional wisdom of applying updates without fully testing them in test systems exhaustively and letting them “age”.

But on that practice I am pretty much contrarian to all admins.

Admins, I get it, have the job of applying system updates.

But they don’t have the authority to order exhaustive system tests... which would be whole projects in and of themselves that would involve business users and other IT folks, significantly... with no perceived benefit for the business user community and use of tons of their time and effort.

So, in lieu of comprehensive system testing... sys adms simply have to apply system updates on their own schedule.

The “conventional wisdom” that has been pushed on everyone is to continuously apply every update as fast as possible, i.e., keep up.

Skip no updates, apply them all as they come out as soon as possible.

Unfortunately, every update is not secure.

Therefore, the apply all as fast as you can practice actually guarantees that every insecure update will get applied at some point in time.

So the admin does not avoid any vulnerabilities, he installs every one, followed by its fix at some point, along with succeeding new vulnerabilities.

The best strategy for security, of course, would be to search for, test for, and build configurations that had a combination of updates that was secure, as much as can possibly be determined by researching the vulernabilities of each piece of software and its updates. Every server configuration deemed ready for production would have a combination of updates applied such that the system either had no vulnerabilities or had workarounds that were properly implemented for those that were known.

But alas, this is too much work.


23 posted on 04/27/2015 8:16:16 AM PDT by PieterCasparzen (Do we then make void the law through faith? God forbid: yea, we establish the law.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: PieterCasparzen
But alas, this is too much work.

... for little perceived benifit by the business owners. It is really hard to prove a negative, i.e., if you force the BU to fully test patches (and other updates), you won't have as many errors.

Sometimes you can, but folks who aren't serious nerds don't generally understand how computers do their various magics in the first place, so explanations are lost on them.

Many moons ago, I worked for MCI. We had a really awesome lab facility that had copies of every bit of hardware installed on the network, so we could do full integration testing of all patches, updates and upgrades. It was freaking excellent. The "as-built" docs were astoundingly detailed.

So, MCI was bought by a criminal organization known as "Worldcom" so as to keep a ponzi scheme by the mastermind of the criminal organization afloat.

I recall an email conversation that followed a rather large outage that occurred on the Worldcom side of the house. The WC guy asked, why the MCI side hadn't expedienced the particular outage when patch "X" was applied to their switches. The MCI guy replied, well, when we loaded it in the test systems in the lab  it broke stuff, so we sent it back to the vendor and held off deploying it. The WC guy response was essentially "you tested it first?"  Uh, yeah bud. this is a multi-billion dollar corporation, we test our stuff.

Personally, I really like the idea of not having to reboot for kernel updates. There will always be exceptions. From what I read, there is some stuff that just can't safely be hot-patched because of dependencies. However, for routine stuff, it's a Godsend IMO. Computers should almost never have to be rebooted. The concept of monthly reboots is an artifact of the shoddy code produced by Microsoft. Real computers don't need monthly reboots, and IMO, anyone who recommends them is not someone I'm inclined to listen closely to.

 

24 posted on 04/27/2015 9:10:57 AM PDT by zeugma ( The Clintons Could Find a Loophole in a Stop Sign)
[ Post Reply | Private Reply | To 23 | View Replies]

To: HiTech RedNeck
Yes, you make an astute observation.

However, my work area is resiliency and recovery so my “pain point” is the outage. This often comes device drivers in a monolithic kernel, this tends to take out the whole OS. A more compartmentalized OS (Minix3) allows a driver to be restarted without taking down the whole OS.

Just my view of the world.

25 posted on 04/27/2015 9:21:54 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 20 | View Replies]

To: PieterCasparzen

Remember the floating-point accumulating error on the old Patriot missile system ?

Their workaround was to reboot every so often. Otherwise, according to reports, accuracy was not good.


*Completely* different situation from kernel patching and memory leak. That was a numerical issue due to propagation of numerical error due to limited precision of the floating point representation of numbers.


26 posted on 04/28/2015 12:22:36 PM PDT by 2 Kool 2 Be 4-Gotten
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-26 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson