Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7247632pxb; Thu, 18 Feb 2021 05:33:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJzGu2aMJD2Aq2N8PTj75lZX44f3w77B2KQU5otGsuAqY7QIzSnhrAxtKpaTy6mBtltp8H6a X-Received: by 2002:a17:906:145b:: with SMTP id q27mr4115804ejc.432.1613655194183; Thu, 18 Feb 2021 05:33:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613655194; cv=none; d=google.com; s=arc-20160816; b=HN2ANv3SpB7mAOQXKEPtrdK/J+N+fxaNanygOd4PUSwuvln1RxXquT4fERXDLefPGb Kn1gguRJ4zv9oO8Mr/NFGaON89PBUsN/YDF7lw5KrOdOCiH/Wi7BX1IUuFB/OkYHYK92 z7pfDOJshK18U/4MYijWLOkUECsZN88pzAkGFnqmp14FS4GfEBUIvIh51+2s04ttCFVg +XWkYLQx2betSUppVAoqAmuBOMQwgzWrLOtfE3T+sjOERUgL8Tr7mHREzurtrcr298WX mJAu36A/qkpW6dElFGydWUffnjFzyFyjYCiesv6lBNPQRgcbh1UADlvSPal1DwSdGj1l P3eA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=LAqKfVhnwfQXU8iMHq5R0KJAwSJo/C8+eOnXeWpfj5A=; b=p6DU36Zk3+mUIcmHxhC8HPj9xjmEOCD1gmOPpwSZdSBC8k6NqKDFJLESuP5qsQK83L KmRLlWjRApPe1EJzqdtGmBbGfieOorIZCjJHs0ocAQldvl+5kGuopRCy4yaKf79hIUaN OSZq/hexgOLNeuTiJiQzKoOApi7K/sKcmZ5T8mArLMm57nTpkEH27URoq0RpgCtBw7KN Q+HZ1wSG2cbEONQLbcNk48HhLCgE+tA2zRAUWZR6aJgvLunLH190ecbxC0eYXisza1GD 5n8kqpi6BINSc2CeHV1Rnoa/MAFzltHU1WBv7K/UGjApknj3c+vop/dF8WYsRVPzIbXU 2C9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hs7si4473036ejc.745.2021.02.18.05.32.44; Thu, 18 Feb 2021 05:33:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233555AbhBRN3J (ORCPT + 99 others); Thu, 18 Feb 2021 08:29:09 -0500 Received: from wtarreau.pck.nerim.net ([62.212.114.60]:49851 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230218AbhBRLq0 (ORCPT ); Thu, 18 Feb 2021 06:46:26 -0500 Received: (from willy@localhost) by pcw.home.local (8.15.2/8.15.2/Submit) id 11IBV7Lt013142; Thu, 18 Feb 2021 12:31:07 +0100 Date: Thu, 18 Feb 2021 12:31:07 +0100 From: Willy Tarreau To: Greg Kroah-Hartman , Scott Branden Cc: Linux ARM , LKML , BCM Kernel Feedback Subject: Re: 5.10 LTS Kernel: 2 or 6 years? Message-ID: <20210218113107.GA12547@1wt.eu> References: <8cf503db-ac4c-a546-13c0-aac6da5c073b@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 18, 2021 at 08:43:48AM +0100, Greg Kroah-Hartman wrote: > On Wed, Feb 17, 2021 at 11:48:21AM -0800, Scott Branden wrote: > > Other difficulty with the LTS version is the frequency it is updated. What a stange statement! So basically if fixes come in quickly so that customers are not exposed too long to well-known issues, it's a difficulty ? I guess by now every serious OS vendor provides at least weekly fixes, and at an era where devices are all interconnected, it's really necessary (unless of course you don't care about your customer's security). > > We would not > > pickup the changes that frequently to test. A quarterly, bi-annually, or when a critical fix > > is identified would be when we update and perform any meaningful testing when in maintainence. > > How are you "identifying" these "critical fixes"? We fix at least one > known security issue a week, and probably multitudes of > unknown-at-this-moment ones. How are you determining when you need to > send a new base kernel update off to your customers? At such long > intervals it feels like anyone using your kernel releases is woefully > insecure. +1! It seems like this dangerous practice will never end :-( Let me explain a personal experience. When I took over 2.6.32 many years ago, Greg asked me to adapt to the new maintenance process involving the patch reviews. At first I feared that it would increase my amount of work. And it did. But I also discovered how important these reviews were, because I started to get lots of "don't take this one in this version" and more importantly "if you merge this you'll need these ones as well". And very quickly I discovered how bogus the branches I used to maintain before had been, given the high feedback ratio! So based on this experience, I can assure anyone doing cherry-picks in their garage from LTS kernels that they're doing crap and that they must not distribute these kernels to anyone because THESE KERNELS ARE DANGEROUS. It's even very easy to introduce vulnerabilities by doing this! The only set of fixes that can be trusted are the "official" stable kernels, because they are the only ones that are approved by the patches authors themselves. Adding more stuff on top of stable kernels is fine (and done at your own risk), but randomly dropping stuff from stable kernels just because you don't think you need that is totally non-sense and must not be done anymore! Willy