Anyone using ksplice to patch kernel without reboot?
Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Distribution: debian on servers, ubuntu on desktops/laptops
Posts: 45
Rep:
Anyone using ksplice to patch kernel without reboot?
Got a few multiuser systems for which scheduling an occasional reboot is a major PITA. Wondering if the ksplice solution is as painless as it sounds or there are tradeoffs I just haven't learned of yet...
I think that you need to subscribe to a service to use it. Also there may be security concerns. If you enable live patching of the kernel, couldn't a blackhat do the same to install his custom rootkit?
I think that you need to subscribe to a service to use it.
That's correct.
We have a completely free version for Ubuntu Desktop and Fedora (https://www.ksplice.com/uptrack/download), and then the other distributions have a 30-day free trial.
Quote:
Also there may be security concerns. If you enable live patching of the kernel, couldn't a blackhat do the same to install his custom rootkit?
This isn't correct. You don't need to boot into a custom kernel or enable some sort of live patching feature to use Ksplice. We can start running on the system you already have -- the ability to live patch the kernel is one that's inherent to being root and being able to load modules on the system.
So in short, no, there is no security concern here. If anything, your security is much improved, since you're now able to apply important security patches much sooner than you would otherwise have been able to.
Distribution: debian on servers, ubuntu on desktops/laptops
Posts: 45
Original Poster
Rep:
Hi, thanks for the reply. One part I don't understand is how does getting kernel patches from ksplice coexist with patches coming through standard channels (APT/YUM)?
Yeah, that's a good question.
Ksplice Uptrack only updates the kernel, and only does so in memory.
The package manager continues to be responsible for updating all of your packages on disk (including the kernel image on disk).
So they're complementary.
Most of our customers will:
- Use the package manager to upgrade the kernel (but they don't reboot afterwards)
- Then also use "uptrack-upgrade" to upgrade the kernel in memory
Now you're secure and up-to-date in your running system, and if you later have to reboot for some reason, you have the option of booting into the new, "traditionally updated" kernel image on disk.
Distribution: debian on servers, ubuntu on desktops/laptops
Posts: 45
Original Poster
Rep:
Thanks for that, it's starting to make sense to me now.
All "official" kernel patches come from kernel.org, right? So there would never be a situation where the patch one gets through Ksplice Uptrack is different from what one gets from the distribution maintainers, correct?
Actually, it's even better: we ONLY take the patches that your vendor has released.
For example, on RHEL: When Red Hat releases a new kernel, only then do we go and look at that kernel and make the important security and bugfix updates rebootless (and then we deliver them to you). So you're actually getting the same updates as released by your vendor, but you're getting them in rebootless form.
(In other words, you're not getting some patches we're making up, or anything like that - they all come from the vendor.)
Distribution: debian on servers, ubuntu on desktops/laptops
Posts: 45
Original Poster
Rep:
Sounds good, thanks. The machines I'm researching this is for are running Debian Lenny and I probably won't get around to upgrading to Squeeze till later this year. Will Ksplice continue to support Lenny as long as Debian will continue releasing security patches for it?
Distribution: debian on servers, ubuntu on desktops/laptops
Posts: 45
Original Poster
Rep:
Quote:
Originally Posted by wdaher
Actually, it's even better: we ONLY take the patches that your vendor has released.
For example, on RHEL: When Red Hat releases a new kernel, only then do we go and look at that kernel and make the important security and bugfix updates rebootless (and then we deliver them to you). So you're actually getting the same updates as released by your vendor, but you're getting them in rebootless form.
(In other words, you're not getting some patches we're making up, or anything like that - they all come from the vendor.)
One other question on this. What's the typical delay between when the vendor releases a patch and when it becomes available through Ksplice? Does it depend on how much programming effort is involved on your part and varies from patch to patch or there's a fixed release schedule of +1 day, etc?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.