Replies: 5 comments 6 replies
-
The Bottlerocket team is exploring alternatives for providing a 6.12 kernel with a much wider range of drivers. We don't have final details yet, but we do want to address your needs. If you can share either a list of drivers, or a general-purpose Linux distribution that includes what you need, that would help us. |
Beta Was this translation helpful? Give feedback.
-
We're working under these constraints:
So that leaves us in a bind: if we enable additional modules, then they come into scope for patching, and we can't guarantee that patches will be applied. Some paths forward we've considered:
If none of the other distro vendor kernels are sufficiently lean, then one path might be to maintain a kernel config, pair it with the upstream kernel.org LTS release, and ship that as an alternative kernel package. That may be what you were suggesting, but just to spell it out for clarity: relative to the current set of kernels, the critical difference is that Amazon Linux wouldn't be in the loop at all. All the patching for that kernel would happen upstream, and all the testing would happen downstream. |
Beta Was this translation helpful? Give feedback.
-
I have spent some significant time and research on this and the main reason I wanted to keep the Amazon Linux upstream is because I know the AL team maintain a significant patch stack (gregkh/linux@linux-6.12.y...amazonlinux:linux:amazon-6.12.y/mainline) which is quite relevant to us also. If I understand it correctly, the AL team follows the weekly releases of the kernel.org releases relatively well (much more so than most more established upstreams with larger patch stacks) and the kernel.org team has no OOB patch mechanism other than emailing out to the open vendors mailing list whenever a CVE fix is available. The problem for the metal kernel would be the same, in other words, if we were using the kernel.org kernel or the AL kernel upstream, which is that someone would need to add themselves to the vendor list and make sure to cherrypick out critical CVE patches that the AL team would ignore because of irrelevance outside of this regular weekly release cycle. The burden would if anything be lighter with the AL upstream because at least some of (or most/all?) the patches would be cherrypicked for us as they are within the purview of the AL team. Maybe you could figure out if and how they filter those internally (?) We do not have a full-time person who could be readily available to cherrypick security patches, and for our use-case, a worst case 1 week response time is fine, and will be fine for a long time. If relying on the weekly kernel release also for security patches on the kernel is not good enough in general to fulfil your obligations, is there a way you could label, mark or document the metal kernel in particular as an "unsupported" artefact? or a "community supported" artefact perhaps? |
Beta Was this translation helpful? Give feedback.
-
Thanks for the response. It's helpful, in particular, to know what you value in the current Amazon Linux upstream. |
Beta Was this translation helpful? Give feedback.
-
In areas other than security, documenting the limitations of technical support would be fine. I don't think it provides any air cover here: the distributed artifacts will either be free of known vulnerabilities or they won't be. On my list of fun things to explore is RPM's new declarative builds mechanism. It could clean up a lot of boilerplate - most of the specs for cross-compiling autotools-based libraries are very similar. In the best possible version of this, a custom kernel build would only need a few lines for a package spec, something like:
Ideally, Bottlerocket's own kernel builds would be converted to the same build system so we tripped over any problems first. Conceptually those builds are just Amazon Linux kernel RPMs with a custom kernel config and some patches, so it should work for them if it's going to work downstream. If something like that existed, would it meet your needs? You'd only need to maintain the kernel config and after that the custom kernel would be rebuilt whenever the kit dependencies were updated. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
After the community meeting and the info that the decision has been made to drop metal driver support from the 6.12 LTS kernel we had a conversation internally about the removal of metal drivers from the 6.12 kernel.
An alternative we would like to discuss with the maintainers is that we, as users of the metal compatible config of the current kernel, could offer to within the https://github.com/bottlerocket-os/bottlerocket-kernel-kit maintain the 6.12 kernel with metal drivers as a separate RPM package.
It would simplify our footprint if we could just carry a separate config set in the upstream and maintain it together with you as a separate RPM package rather than building a kernel from scratch/forking the kernel-kit and publishing it under our own org.
It would also reduce the work (potentially?) for you in getting tooling and testing in to support installing an upstream kernel.
We could commit to keeping the config up to date with the hardware we run on (a mixture of Dell and Supermicro for now), but also respond to any user requests for driver inclusions.
Is this something you could consider? We could use CODEOWNERS to allow us/me to only merge against the metal config so that we have no authority over the mainline variants still.
Beta Was this translation helpful? Give feedback.
All reactions