LWN: Comments on "Glibc project revisits infrastructure security" https://lwn.net/Articles/1021837/ This is a special feed containing comments posted to the individual LWN article titled "Glibc project revisits infrastructure security". en-us Thu, 16 Oct 2025 18:23:38 +0000 Thu, 16 Oct 2025 18:23:38 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Please fix the buggy rwlock! https://lwn.net/Articles/1023598/ https://lwn.net/Articles/1023598/ PengZheng <div class="FormattedComment"> Anyone follow my explanation in the bugzilla thread [0] will agree that this is obviously a severe bug.<br> It is common sense that infinite user space spin should almost NEVER be allowed.<br> <p> This just illustrates the lack of testing infrastructure of glibc.<br> <p> [0] <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=31477#c9">https://sourceware.org/bugzilla/show_bug.cgi?id=31477#c9</a><br> </div> Tue, 03 Jun 2025 09:15:49 +0000 Please fix the buggy rwlock! https://lwn.net/Articles/1023594/ https://lwn.net/Articles/1023594/ PengZheng <div class="FormattedComment"> I'm afraid that it is not, just as another commenter has already pointed out:<br> <p> <span class="QuotedText">&gt; glibc test-suite does not cover pthread well.</span><br> </div> Tue, 03 Jun 2025 08:43:24 +0000 Please fix the buggy rwlock! https://lwn.net/Articles/1023593/ https://lwn.net/Articles/1023593/ jwakely <div class="FormattedComment"> This is completely off topic on an lwn article about the project infrastructure.<br> </div> Tue, 03 Jun 2025 08:25:57 +0000 Some small Sourceware updates https://lwn.net/Articles/1023395/ https://lwn.net/Articles/1023395/ mjw <div class="FormattedComment"> The article is correct that the <a href="https://sourceware.org/sourceware-security-vision.html#plans">https://sourceware.org/sourceware-security-vision.html#plans</a> page hadn't been updated for some time. There are some updates now. Also we added a sponsor@sourceware.org address to <a href="https://sourceware.org/donate.html">https://sourceware.org/donate.html</a> in case people want to talk about sponsoring, donating hardware, services, etc.<br> <p> We do like to not be totally dependent on corporate sponsorship, so we also take individual donations and grants. And encourage people to become Software Freedom Conservancy sustainers <a href="https://sfconservancy.org/sustainer/">https://sfconservancy.org/sustainer/</a> and/or donate to the OSU Open Source Lab <a href="https://osuosl.org/donate">https://osuosl.org/donate</a><br> </div> Sun, 01 Jun 2025 23:11:41 +0000 Please fix the buggy rwlock! https://lwn.net/Articles/1022976/ https://lwn.net/Articles/1022976/ PengZheng <div class="FormattedComment"> This issue is relatively trivial to reproduce and the impact is HUGE: billions of embedded multimedia devices might be affected.<br> <p> "Fortunately", there is an easy way out: revert to the good old implementation by Ulrich Drepper. <br> I have done that 5-6 times in the past year for glibc toolchains from various SOC vendors.<br> <p> To be honest, I really missed Ulrich Drepper.<br> </div> Thu, 29 May 2025 10:50:56 +0000 Please fix the buggy rwlock! https://lwn.net/Articles/1022971/ https://lwn.net/Articles/1022971/ ballombe <div class="FormattedComment"> My experience is that glibc test-suite does not cover pthread well.<br> </div> Thu, 29 May 2025 10:26:34 +0000 Please fix the buggy rwlock! https://lwn.net/Articles/1022958/ https://lwn.net/Articles/1022958/ PengZheng <div class="FormattedComment"> I should have mentioned that both musl and uclibc(-ng) do not have this issue.<br> </div> Thu, 29 May 2025 05:02:13 +0000 Please fix the buggy rwlock! https://lwn.net/Articles/1022957/ https://lwn.net/Articles/1022957/ PengZheng <div class="FormattedComment"> Once again, I call for glibc developers take time to fix the buggy rwlock implementation introduced by Torvald Riegel, which make glibc's rwlock completely unusable with realtime tasks.<br> <p> <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=31477">https://sourceware.org/bugzilla/show_bug.cgi?id=31477</a><br> <p> This issue has extensive impact because OpenSSL use wrlock as ordinary mutex by default.<br> <p> <a href="https://github.com/openssl/openssl/blob/3cb0755323281267211fbe951b94a2552e99d32a/crypto/threads_pthread.c#L622">https://github.com/openssl/openssl/blob/3cb07553232812672...</a><br> <p> And it impacts nearly all subsystems of OpenSSL.<br> <p> <a href="https://github.com/openssl/openssl/blob/b372b1f76450acdfed1e2301a39810146e28b02c/crypto/ex_data.c#L50C22-L50C34">https://github.com/openssl/openssl/blob/b372b1f76450acdfe...</a><br> <p> I can safely tell that nearly all linux running real-time task using OpenSSL might be affected by this issue (like real-time video streaming over TLS connection). <br> </div> Thu, 29 May 2025 05:00:09 +0000 Some small Sourceware updates https://lwn.net/Articles/1022953/ https://lwn.net/Articles/1022953/ mjw <div class="FormattedComment"> Thanks, that is a good overview of the current state. We really should update the Sourceware infrastructure security page with recent updates on the isolated services and the pull-request server, which turned into forge.sourceware.org (an experiment with Forgejo) also hosted in the Red Hat Community Cage on a separate VM now.<br> <p> The opportunity to move to separate containers or VMs is not (just) because of the move to a new datacenter, but because Red Hat has been so generous to host an extra (bigger) server in the new community cage for us. That server will be installed before the move. So we have some time to setup the services on a new setup on a server big enough to run multiple VMs. And then we have three physical servers in the new place, after the existing servers also move there, to have extra redundancy.<br> </div> Thu, 29 May 2025 01:55:07 +0000