From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: X-Spam-Status: No, score=-4.2 required=3.0 tests=AWL,BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS shortcircuit=no autolearn=ham autolearn_force=no version=3.4.6 Received: from sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by dcvr.yhbt.net (Postfix) with ESMTPS id 41F0D1F47D for ; Wed, 1 Mar 2023 22:39:46 +0000 (UTC) Authentication-Results: dcvr.yhbt.net; dkim=pass (1024-bit key; secure) header.d=sourceware.org header.i=@sourceware.org header.a=rsa-sha256 header.s=default header.b=KxGTjwi6; dkim-atps=neutral Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 0D5843858416 for ; Wed, 1 Mar 2023 22:39:44 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 0D5843858416 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1677710384; bh=nUC4o5JYA+COze3TIUpRkiC1awLOGOJZGvMTS3ArcHM=; h=Date:To:Cc:Subject:References:In-Reply-To:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: From:Reply-To:From; b=KxGTjwi6BP+ei4LnNVIgcnwHyPoQk4pTzcOZa+MT+kYZUmtbCeDVJgqLv07Fb98gk rRSETf8Tw0e3t1vdrnW3Zr4abZYTRc/6jYGcFS8aGw1xySO+uhISmc73jl8FYNYWC1 8ZIjL2gVfcIGFgqER8BkxE6fvsRpwmAfHFp9b3l4= Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by sourceware.org (Postfix) with ESMTPS id C57373858C83 for ; Wed, 1 Mar 2023 22:39:24 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org C57373858C83 Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-567-SafxIWZCOUWoflpyKh2KJw-1; Wed, 01 Mar 2023 17:39:21 -0500 X-MC-Unique: SafxIWZCOUWoflpyKh2KJw-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C8DBE855710; Wed, 1 Mar 2023 22:39:02 +0000 (UTC) Received: from redhat.com (unknown [10.2.16.108]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E5BFD400D79D; Wed, 1 Mar 2023 22:39:00 +0000 (UTC) Date: Wed, 1 Mar 2023 16:38:59 -0600 To: Sam James Cc: Carlos O'Donell via Libc-alpha , autoconf@gnu.org, c-std-porting@lists.linux.dev, Zack Weinberg , David Seifert , Gentoo Toolchain , Arsen =?utf-8?Q?Arsenovi=C4=87?= , Paul Eggert , berrange@redhat.com, rjones@redhat.com Subject: Re: On time64 and Large File Support Message-ID: <20230301223859.chl5o3bedqckf3tx@redhat.com> References: MIME-Version: 1.0 In-Reply-To: User-Agent: NeoMutt/20220429 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.2 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , From: Eric Blake via Libc-alpha Reply-To: Eric Blake Errors-To: libc-alpha-bounces+e=80x24.org@sourceware.org Sender: "Libc-alpha" [replying to the original post, because I'm not sure where else in the more recent activity on this thread would be more appropriate] On Fri, Nov 11, 2022 at 08:38:18AM +0000, Sam James wrote: > Hi all, > > In Gentoo, we've been planning out what we should do for time64 on glibc [0] > and concluded that we need some support in glibc for a newer option. I'll outline > why below. > ... > > Indeed, the gnulib version of change #2 is exactly how we ended up with > wget/gnutls breaking [1]. I feel this shows that the only approach > "supported" by glibc right now is untenable. > [1] https://bugs.gentoo.org/828001 Now Fedora is also being hit by the gnutls ABI change due to time_t in public interfaces being silently changed. From an IRC conversation I had with Dan Berrange and Rich Jones (I think Rich mean i686 below): rjones (IRC): oh wow, the certificates created on i696 are not quite right ..... Validity: Not Before: Sat Sep 05 00:23:57 UTC 2703 Not After: Sun Sep 06 00:23:57 UTC 2703 just a few years too early i think this is looking like a gnutls regression, downgrading gnutls makes it work ... rjones (IRC): hmm, i'm beginning to think gnutls has been miscompiled by gcc gnutls_x509_crt_get_activation_time inside the gnutls verification api returns garbage but the very same call done from a demo program returns the right answer ... OMG, gnulib-- has silently changed gnutls to use 64-bit time_t ...which is an ABI incompatibility because gnutls has public APIs which have time_t parameters so apps talking to gnutls will expect 32-bit time_t, but gnutls is processing 64-bit time_t this is utterly insane -- Eric Blake, Principal Software Engineer Red Hat, Inc. +1-919-301-3266 Virtualization: qemu.org | libvirt.org