StableReleaseCadence

Differences between revisions 7 and 8
Revision 7 as of 2010-11-16 17:40:27
Size: 6786
Editor: user-69-73-1-154
Comment:
Revision 8 as of 2010-11-19 18:26:47
Size: 8482
Editor: user-69-73-1-154
Comment:
Deletions are marked like this. Additions are marked like this.
Line 29: Line 29:
Whenever possible, Stable kernels will now be released on a two-week cadence. The cycle is two weeks long, and repeats every two weeks, with the exception of holidays, UDS weeks, and other considerations. An attempt will be made to synchronize the schedule with the the Ubuntu platform schedule. Whenever possible, Stable kernels will now be released on a short cadence. The cycle consists of two phases - the '''verification phase''', and the '''testing phase'''. The intended complete cycle length is two weeks, with one week for each phase. The cycle immediately repeats every two weeks, with the exception of holidays, UDS weeks, and other considerations. An attempt will be made to synchronize the schedule with the the Ubuntu platform schedule.

The cycle begins upon publication of a new kernel to the -proposed archive which contains all accumulated fixes.
Line 43: Line 45:
   At the end of the first week of baking in -proposed, if these patches have not been verified as fixing the specific bugs the patch will be reverted.    These patches are required to be verified during the '''verification phase''', and if not verified, will be reverted before the '''testing phase''' begins.
Line 47: Line 50:
 * Non-Critical   With the faster release cycle, most CVEs can be released faster as part of the normal stable kernel cycle than if we created a special security release. Critical security fixes are those which must be released as soon as possible, generally because they involve a remotely exploitable vulnerability or something similar. Embargoed CVEs are not necessarily critical.
Line 49: Line 52:
   Non-critical CVE patches will be applied directly to the master branch of the effected git repository and will be part of the next -proposed upload. A special -security upload will not be required for these patches.  * Non-Critical CVEs
Line 51: Line 54:
 * Critical    Non-critical CVE patches will be applied directly to the master branch of the affected git repository and will be part of the next -proposed upload. A special -security upload will not be required for these patches.
Line 53: Line 56:
   Critical CVE patches will be applied to the master branch of the effected git repository and will be uploaded as a -security release which will be released imediately.  * Non-embargoed Critical CVEs
Line 55: Line 58:
   If it arrives during the "verification phase" we will:

   * Take the last kernel which was released (from -updates or -security), make the security fix on that, then push it through whatever testing that the security team does and certification testing, and release that to -security and -updates.
   * Place all the changes which were currently in verification back onto this new kernel, and accept that any which have been verified are still valid passes for verification, and continue the verification cycle using this kernel with the security fix.
   * This may extend the verification phase a little, but not much, and we would then enter testing phase.

   If it arrives during the "testing phase" we will:

   * Already have reverted all non-verified fixes from the verification phase
   * Apply the security fix
   * Begin the testing phase, restarting it if needed
   * Notify the security team to perform any testing they require.

 * Embargoed Critical CVEs

   These are handled the same as Non-embargoed Critical CVEs, but we may have to adjust the actual release date. This will be handled on a case-by-case basis.
Line 58: Line 77:
   There are 3 types of required testing: verification, certification, and regression.
   The testing of a -proposed kernel must be completed within 14 working days begining
   when the upload has been accepted to the -proposed pocket.
   There are 3 types of required testing: verification, certification, and regression. Verification testing happens during the "verification phase" of the cycle, and certification and regression testing occur during the "testing phase".
Line 68: Line 85:
 * A tracking bug will be created and associated with each stable kernel in order to track status and completion of testing  * For certification and regression testing, a tracking bug will be created and associated with each stable kernel in order to track status and completion of testing.

Stable Kernel Release Cadence

Goals

The Kernel Stable Cadence was arrived at during discussions before and during Natty Narwhal Developer Summit in Orlando. The Blueprint from the UDS sessions may be found here. The new process has a number of goals which are designed to improve some problems with the old process. These goals are:

  1. Reduce the maximum time between valid fixed are applied and verified and their delivery to the end user.
  2. Assure that every bug fix is verified to solve the problem while the kernel is in -proposed testing.
  3. Increase kernel quality by applying comprehensive regression and certification testing to all stable kernels before release.
  4. Reduce the time until non-critical and non-embargoed security fixes are applied and released.
  5. Reduce the impact that critical and embargoed security updates have on the normal stable release schedule.
  6. Reduce the amount of time it takes for upstream stable kernel updates to reach users.
  7. Avoid kernel updates which contain a very large number of updates.
  8. Provide more predictability of when a fix that's been applied to the source repository will be released.

Implementation

Whenever possible, Stable kernels will now be released on a short cadence. The cycle consists of two phases - the verification phase, and the testing phase. The intended complete cycle length is two weeks, with one week for each phase. The cycle immediately repeats every two weeks, with the exception of holidays, UDS weeks, and other considerations. An attempt will be made to synchronize the schedule with the the Ubuntu platform schedule.

The cycle begins upon publication of a new kernel to the -proposed archive which contains all accumulated fixes.

Patches will be divided into the following classes:

Non-Security Patches

  • Stable Upstream Patches
    • Stable updates from upstream (GregKH's repos) will be accepted without testing of individual functionality.
  • Other Patches
    • No patch will be accepted for a bug if we don't have the hardware to test it or high confidence that it will be tested by the community.

      These patches are required to be verified during the verification phase, and if not verified, will be reverted before the testing phase begins.

Security (CVE) Patches

  • With the faster release cycle, most CVEs can be released faster as part of the normal stable kernel cycle than if we created a special security release. Critical security fixes are those which must be released as soon as possible, generally because they involve a remotely exploitable vulnerability or something similar. Embargoed CVEs are not necessarily critical.
  • Non-Critical CVEs
    • Non-critical CVE patches will be applied directly to the master branch of the affected git repository and will be part of the next -proposed upload. A special -security upload will not be required for these patches.
  • Non-embargoed Critical CVEs
    • If it arrives during the "verification phase" we will:
    • Take the last kernel which was released (from -updates or -security), make the security fix on that, then push it through whatever testing that the security team does and certification testing, and release that to -security and -updates.
    • Place all the changes which were currently in verification back onto this new kernel, and accept that any which have been verified are still valid passes for verification, and continue the verification cycle using this kernel with the security fix.
    • This may extend the verification phase a little, but not much, and we would then enter testing phase. If it arrives during the "testing phase" we will:
    • Already have reverted all non-verified fixes from the verification phase
    • Apply the security fix
    • Begin the testing phase, restarting it if needed
    • Notify the security team to perform any testing they require.
  • Embargoed Critical CVEs
    • These are handled the same as Non-embargoed Critical CVEs, but we may have to adjust the actual release date. This will be handled on a case-by-case basis.

Testing

  • There are 3 types of required testing: verification, certification, and regression. Verification testing happens during the "verification phase" of the cycle, and certification and regression testing occur during the "testing phase".
  • Verification testing is the assurance that a bug is actually fixed by the proposed kernel, and is the responsibility of the bug reporter. Tags used for tracking verification are verification-needed-<releasename>, verification-done-<releasename>, and verification-failed-<releasename>. NOTE: The addition of <releasename> to these tags was recently decided, and will be phased in asap.

  • Certification is assurance that the kernel passes certification tests on specific hardware, and is the responsibility of the Platform Services, certification QA team.
  • Regression testing is testing to assure that no bugs have been re-introduced by the proposed kernel, and is the responsibility of the Platform QA team.
  • For certification and regression testing, a tracking bug will be created and associated with each stable kernel in order to track status and completion of testing.
    • This tracking bug will be listed in the changelog for the upload
    • This tracking bug will be assigned to (TBD - probably QA team)
    • This tracking bug number will be included in announcements sent when a new kernel is ready for testing after reverts have been made
    • Setting the tag "verification-done" on this tracking bug will signify that the kernel has passed testing and may be released
  • All tracking bugs associated with upstream stable patch sets will be set to verification-done (by Cert?, QA?) when the kernel has passed testing.

Details

  • Changes from bug reports will only be considered if we have the hardware and resources to test the fix, or a very high confidence that the bug reporter will test the proposed release.
  • At the beginning of the two-week cycle, bug fixes, upstream stable patches, and non-embargoed security fixes will be applied, and the kernel uploaded to proposed.
  • At the end of the first week, any bug fixes which have not been verified as fixed by the reporter or by internal testing will have the patches reverted, and the associated bugs set to "incomplete". A tag of "stable-reverted-<release>" will be added at this time (where <release> is [lucid | maverick . . .]). A comment will be added to the bug describing how to request reapplication of the fix.

  • During the second week, certification and regression testing will be performed to insure that the kernel is functional. Minimum testing will insure that the kernels boots, networking operates, X starts (for workstations), and updates can be performed. Certification tests will not include the entire set of manually executed tests, but will include an automated set of tests. Testing will be a joint effort by the QA and certification teams. The exact testing to be performed is To Be Determined.
  • Proposed releases will be tracked with a tracking bug opened by the stable kernel team, and linked via an entry in the changelog. This bug will be assigned to the QA team (or a launchpad team - TBD), and tracked on the kernel bug dashboard. The bug will be set to verified when all QA and Cert testing has passed.
  • Security kernels which are critical or embargoed will also receive the same tests required for proposed kernels.

Reconsideration of reverted fixes

When fixes are reverted due to lack of verification, they may be proposed for reconsideration by performing the following:

  • Update the bug with a firm commitment to verify the fix during the next stable kernel release cycle (usually this will begin one week after the fix is reverted). Change the "stable-reverted-<release>" tag to "stable-reapply-<release>" (where <release> is [lucid | maverick . . .]).

Initial Implementation Schedule

The initial cycles will adhere as much as possible to the two-week cadence, with adjustments for holidays.

Kernel/StableReleaseCadence (last edited 2019-03-14 10:47:54 by anthonywong)