Bug 2135684

Summary: Threat model finding: shared memory race conditions / other-end-verifications.
Product: Red Hat Enterprise Linux 9 Reporter: Wade Mealing <wmealing>
Component: chronyAssignee: Miroslav Lichvar <mlichvar>
Status: ASSIGNED --- QA Contact: rhel-cs-infra-services-qe <rhel-cs-infra-services-qe>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.0Keywords: Triaged
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2231078    
Bug Blocks:    

Comment 1 Miroslav Lichvar 2022-12-01 16:04:04 UTC
We need to deprecate the SHM protocol in favor of the SOCK protocol using Unix domain sockets or possibly something else.

The two most important time sources using SHM are gpsd and phc2sys from linuxptp. gpsd in the latest code now fully supports SOCK as a replacement for SHM. A patch adding SOCK was submitted for linuxptp, but was not accepted yet.

Comment 2 Miroslav Lichvar 2023-01-12 15:35:48 UTC
gpsd-3.25 was released, which has full support for chrony SOCK.

The chrony man page and FAQ in the upstream repository was modified to deprecate SHM in favor of SOCK.

Comment 3 Miroslav Lichvar 2023-08-10 13:41:42 UTC
This will be addressed by rebase to chrony-4.4 (bug #2231078).