Ksplice

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Ksplice
Ksplice-logo.png
Ksplice-uptrack-applied.png
Screenshot of Ksplice Uptrack with applied updates
Developer(s) Ksplice, Inc.
Initial release April 23, 2008 (2008-04-23)[1]
Stable release 0.9.9.1 / July 28, 2011; 3 years ago (2011-07-28)
Operating system Linux
Type Kernel extension
License GNU General Public License version 2[2]
Website http://www.ksplice.com/

Ksplice is a free software[2] extension of the Linux kernel which allows system administrators to apply security patches to a running kernel without having to reboot the operating system (a technique broadly referred to as Dynamic Software Updating). It only supports patches that do not make significant semantic changes to kernel data structures.[3]

Ksplice has been implemented for Linux on the x86-32 and x86-64 architectures. It was developed by Ksplice, Inc. until 21 July 2011, when Oracle acquired Ksplice and started offering support for Oracle Linux. Support for Red Hat Enterprise Linux was dropped and turned into a free 30-day trial for RHEL customers as an incentive to migrate to Oracle Linux Premier Support.[4][5]

Design[edit]

Ksplice takes as input a unified diff and the original kernel source code, and it updates the running kernel in memory. Using Ksplice does not require any preparation before the system is originally booted, (the running kernel needs no special prior compiling, for example). In order to generate an update, Ksplice must determine what code within the kernel has been changed by the source code patch. Ksplice performs this analysis at the Executable and Linkable Format (ELF) object code layer, rather than at the C source code layer.

To apply a patch, Ksplice first freezes execution of a computer so it is the only program running. The system verifies that no processors were in the middle of executing functions that will be modified by the patch. Ksplice modifies the beginning of changed functions so that they instead point to new, updated versions of those functions, and modifies data and structures in memory that need to be changed. Finally, Ksplice resumes each processor running where it left off.

To be fully automatic, Ksplice's design was originally limited to patches that did not introduce semantic changes to data structures, since most Linux kernel security patches do not make these kinds of changes. An evaluation against Linux kernel security patches from May 2005 to May 2008 found that Ksplice was able to apply fixes for all the 64 significant kernel vulnerabilities discovered in that interval. In 2009, major Linux vendors asked their customers to install a kernel update more than once per month.[6] For patches that do introduce semantic changes to data structures, Ksplice requires a programmer to write a short amount of additional code to help apply the patch. This was necessary for 12% of the updates in that time period.[7]

History[edit]

The Ksplice software was created by four MIT students based on Jeff Arnold's master's thesis.[8] Jeff Arnold later created Ksplice, Inc. with himself as the president of the company. Around May 2009, the company won the MIT $100K Entrepreneurship Competition and the Cyber Security Challenge of Global Security Challenge.

Whereas the Ksplice software was provided under an open source license, Ksplice, Inc. provided a service to make it easier to use the software. Ksplice, Inc. provided prebuilt and tested updates for the Red Hat, CentOS, Debian, Ubuntu and Fedora Linux distributions.[9] The virtualization technologies OpenVZ and Virtuozzo were also supported. Updates for Ubuntu Desktop and Fedora systems were provided free of charge, whereas other platforms were offered on a subscription basis.[10]

On 21 July 2011, Oracle announced they acquired Ksplice, Inc. At the time the company was acquired, Ksplice, Inc. claimed to have over 700 companies using the service to protect over 100,000 servers. While the service had been available for multiple Linux distributions, it was stated at the time of acquisition that "Oracle believes it will be the only enterprise Linux provider that can offer zero downtime updates." More explicitly, "Oracle does not plan to support the use of Ksplice technology with Red Hat Enterprise Linux."[5] Existing legacy customers continue to be supported by Ksplice, but no new customers are being accepted for other platforms.[11]

See also[edit]

  • kexec – a method for loading a whole new kernel from a running system
  • kGraft – another Linux kernel live patching technology developed by SUSE
  • kpatch – another Linux kernel live patching technology developed by Red Hat
  • Loadable kernel module

References[edit]

  1. ^ Arnold, Jeff (23 April 2008). "A system for rebootless kernel security updates". LKML mailing list. http://kerneltrap.org/mailarchive/linux-kernel/2008/4/23/1570474. Retrieved 27 July 2013.
  2. ^ a b "Ksplice source code". Oracle. 28 July 2011. Retrieved 27 July 2013. 
  3. ^ Ksplice Team (26 September 2008). "ksplice-create - Create a set of kernel modules for a rebootless kernel update". Ksplice manual pages. Retrieved 27 July 2013. 
  4. ^ "Free 30-day trial of Ksplice Zero-Downtime Updates for Red Hat Enterprise Linux Customers". Ksplice. 
  5. ^ a b "Customer Letter Oracle and Ksplice". Oracle. 7 September 2010. Retrieved 22 July 2011. 
  6. ^ "Nexcess Adopts Ksplice Uptrack "Rebootless" Technology". Nexcess. 30 November 2010. Retrieved 18 February 2011. 
  7. ^ "Performance record". Ksplice. Retrieved 4 June 2009. 
  8. ^ Edge, Jake (10 June 2009). "Ksplice provides updates without reboots". LWN. Retrieved 21 July 2011. 
  9. ^ "Ksplice Uptrack". Ksplice. Retrieved 19 July 2009. 
  10. ^ "Pricing". Ksplice, Inc. Retrieved 13 March 2011. 
  11. ^ "Supported Kernels". Ksplice website. Oracle America. Retrieved 13 February 2012. 

External links[edit]