-
Notifications
You must be signed in to change notification settings - Fork 304
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
uname enhancement #1044
Comments
This is the part that bothers me the most. It seems like setting an "effective kernel version", when in fact it would be missing most of the patches from the corresponding real kernel, is actively misleading. |
Not to say that we shouldn't do it, just that we should be cautious in deciding to do it. |
Assigning myself as Joe proposed. Brainstorming/ideas to follow. |
I agree and I think that is why we've been reluctant to add it in the past. IMHO, a CVEs-fixed field would be more descriptive, though Red Hat distributed kpatches already contain that information in the RPM changelog. I wonder if the tagging that SUSE uses, i.e. something like kpatch-kernel-3.10.0-123.12.1.el7 would be enough to differentiate from kernel-3.10.0-123.12.1.el7? |
I agree that not cramming too much info in the version string is probably best, as long as there's a simple element clearly showing that a patched kernel is running. I would pick the version field as opposed to the release field so that uname -r which is relied upon like you mentioned earlier continue to work as expected. We have the option of adding a prefix to the version string (uname -v) that immediately follows the release field (returned by in uname -r) with some marker to show that the kernel runs with kpatch. |
maybe something like (square brakets to show uts fields grouping): |
Some customers want to know what kernel level their system has been patched to. That information could be output by uname, or by some other command (such as the kpatch command). Some security scanners will look for the kernel version as returned by "uname -r". On the other hand, we can dictate where to get that information. Periodically we need to convince customers that fixes from newer upstream kernel versions have been backported to the supported kernel. |
Closing this one until we have real requirements. Given the variety of solutions, it would be most helpful if scanning tools looked for something specific -- with that we would know what to build. Until then, closing this issue. |
I think this idea has been floated a few times, most recently by @lulinqing or maybe @mmilgram : should kpatch provide supplemental uname information?
For reference:
SyS_newuname
to add akGraft-@@GITREV@@
tag to the kernel version string.I think we have a few options:
list
or (new)uname
sub-commands./sys/kernel/livepatch/<patch>/uname
interface or similar upstream.Some caveats to consider:
uname -r
format. I'm reluctant to modify this.The text was updated successfully, but these errors were encountered: