2016-12-31 18:02:17 +00:00
|
|
|
# Generate dl-tunable-list.h from dl-tunables.list
|
|
|
|
|
|
|
|
BEGIN {
|
Fix range check in do_tunable_update_val
Current implementation of tunables does not set arena_max and arena_test
values. Any value provided by glibc.malloc.arena_max and
glibc.malloc.arena_test parameters is ignored.
These tunables have minval value set to 1 (see elf/dl-tunables.list file)
and undefined maxval value. In that case default value (which is 0. see
scripts/gen-tunables.awk) is being used to set maxval.
For instance, generated tunable_list[] entry for arena_max is:
(gdb) p *cur
$1 = {name = 0x7ffff7df6217 "glibc.malloc.arena_max",
type = {type_code = TUNABLE_TYPE_SIZE_T, min = 1, max = 0},
val = {numval = 0, strval = 0x0}, initialized = false,
security_level = TUNABLE_SECLEVEL_SXID_IGNORE,
env_alias = 0x7ffff7df622e "MALLOC_ARENA_MAX"}
As a result, any value of glibc.malloc.arena_max is ignored by
TUNABLE_SET_VAL_IF_VALID_RANGE macro
__type min = (__cur)->type.min; <- initialized to 1
__type max = (__cur)->type.max; <- initialized to 0!
if (min == max) <- false
{
min = __default_min;
max = __default_max;
}
if ((__type) (__val) >= min && (__type) (val) <= max) <- false
{
(__cur)->val.numval = val;
(__cur)->initialized = true;
}
Assigning correct min/max values at a build time fixes a problem.
Plus, a bit of optimization: Setting of default min/max values for the
given type at a run time might be eliminated.
* elf/dl-tunables.c (do_tunable_update_val): Range checking fix.
* scripts/gen-tunables.awk: Set unspecified minval and/or maxval
values to correct default value for given type.
2017-09-26 21:14:09 +00:00
|
|
|
min_of["STRING"]="0"
|
|
|
|
max_of["STRING"]="0"
|
|
|
|
min_of["INT_32"]="INT32_MIN"
|
|
|
|
max_of["INT_32"]="INT32_MAX"
|
|
|
|
min_of["UINT_64"]="0"
|
|
|
|
max_of["UINT_64"]="UINT64_MAX"
|
|
|
|
min_of["SIZE_T"]="0"
|
|
|
|
max_of["SIZE_T"]="SIZE_MAX"
|
2016-12-31 18:02:17 +00:00
|
|
|
tunable=""
|
|
|
|
ns=""
|
|
|
|
top_ns=""
|
2021-01-12 16:28:27 +00:00
|
|
|
max_name_len=0
|
|
|
|
max_alias_len=0
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# Skip over blank lines and comments.
|
|
|
|
/^#/ {
|
|
|
|
next
|
|
|
|
}
|
|
|
|
|
|
|
|
/^[ \t]*$/ {
|
|
|
|
next
|
|
|
|
}
|
|
|
|
|
|
|
|
# Beginning of either a top namespace, tunable namespace or a tunable, decided
|
|
|
|
# on the current value of TUNABLE, NS or TOP_NS.
|
|
|
|
$2 == "{" {
|
|
|
|
if (top_ns == "") {
|
|
|
|
top_ns = $1
|
|
|
|
}
|
|
|
|
else if (ns == "") {
|
|
|
|
ns = $1
|
|
|
|
}
|
|
|
|
else if (tunable == "") {
|
|
|
|
tunable = $1
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
printf ("Unexpected occurrence of '{': %s:%d\n", FILENAME, FNR)
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
|
|
|
|
next
|
|
|
|
}
|
|
|
|
|
|
|
|
# End of either a top namespace, tunable namespace or a tunable.
|
|
|
|
$1 == "}" {
|
|
|
|
if (tunable != "") {
|
|
|
|
# Tunables definition ended, now fill in default attributes.
|
2017-06-19 09:17:21 +00:00
|
|
|
if (!types[top_ns,ns,tunable]) {
|
|
|
|
types[top_ns,ns,tunable] = "STRING"
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
2017-06-19 09:17:21 +00:00
|
|
|
if (!minvals[top_ns,ns,tunable]) {
|
Fix range check in do_tunable_update_val
Current implementation of tunables does not set arena_max and arena_test
values. Any value provided by glibc.malloc.arena_max and
glibc.malloc.arena_test parameters is ignored.
These tunables have minval value set to 1 (see elf/dl-tunables.list file)
and undefined maxval value. In that case default value (which is 0. see
scripts/gen-tunables.awk) is being used to set maxval.
For instance, generated tunable_list[] entry for arena_max is:
(gdb) p *cur
$1 = {name = 0x7ffff7df6217 "glibc.malloc.arena_max",
type = {type_code = TUNABLE_TYPE_SIZE_T, min = 1, max = 0},
val = {numval = 0, strval = 0x0}, initialized = false,
security_level = TUNABLE_SECLEVEL_SXID_IGNORE,
env_alias = 0x7ffff7df622e "MALLOC_ARENA_MAX"}
As a result, any value of glibc.malloc.arena_max is ignored by
TUNABLE_SET_VAL_IF_VALID_RANGE macro
__type min = (__cur)->type.min; <- initialized to 1
__type max = (__cur)->type.max; <- initialized to 0!
if (min == max) <- false
{
min = __default_min;
max = __default_max;
}
if ((__type) (__val) >= min && (__type) (val) <= max) <- false
{
(__cur)->val.numval = val;
(__cur)->initialized = true;
}
Assigning correct min/max values at a build time fixes a problem.
Plus, a bit of optimization: Setting of default min/max values for the
given type at a run time might be eliminated.
* elf/dl-tunables.c (do_tunable_update_val): Range checking fix.
* scripts/gen-tunables.awk: Set unspecified minval and/or maxval
values to correct default value for given type.
2017-09-26 21:14:09 +00:00
|
|
|
minvals[top_ns,ns,tunable] = min_of[types[top_ns,ns,tunable]]
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
2017-06-19 09:17:21 +00:00
|
|
|
if (!maxvals[top_ns,ns,tunable]) {
|
Fix range check in do_tunable_update_val
Current implementation of tunables does not set arena_max and arena_test
values. Any value provided by glibc.malloc.arena_max and
glibc.malloc.arena_test parameters is ignored.
These tunables have minval value set to 1 (see elf/dl-tunables.list file)
and undefined maxval value. In that case default value (which is 0. see
scripts/gen-tunables.awk) is being used to set maxval.
For instance, generated tunable_list[] entry for arena_max is:
(gdb) p *cur
$1 = {name = 0x7ffff7df6217 "glibc.malloc.arena_max",
type = {type_code = TUNABLE_TYPE_SIZE_T, min = 1, max = 0},
val = {numval = 0, strval = 0x0}, initialized = false,
security_level = TUNABLE_SECLEVEL_SXID_IGNORE,
env_alias = 0x7ffff7df622e "MALLOC_ARENA_MAX"}
As a result, any value of glibc.malloc.arena_max is ignored by
TUNABLE_SET_VAL_IF_VALID_RANGE macro
__type min = (__cur)->type.min; <- initialized to 1
__type max = (__cur)->type.max; <- initialized to 0!
if (min == max) <- false
{
min = __default_min;
max = __default_max;
}
if ((__type) (__val) >= min && (__type) (val) <= max) <- false
{
(__cur)->val.numval = val;
(__cur)->initialized = true;
}
Assigning correct min/max values at a build time fixes a problem.
Plus, a bit of optimization: Setting of default min/max values for the
given type at a run time might be eliminated.
* elf/dl-tunables.c (do_tunable_update_val): Range checking fix.
* scripts/gen-tunables.awk: Set unspecified minval and/or maxval
values to correct default value for given type.
2017-09-26 21:14:09 +00:00
|
|
|
maxvals[top_ns,ns,tunable] = max_of[types[top_ns,ns,tunable]]
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
2017-06-19 09:17:21 +00:00
|
|
|
if (!env_alias[top_ns,ns,tunable]) {
|
2021-01-12 16:28:27 +00:00
|
|
|
env_alias[top_ns,ns,tunable] = "{0}"
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
2017-06-19 09:17:21 +00:00
|
|
|
if (!security_level[top_ns,ns,tunable]) {
|
|
|
|
security_level[top_ns,ns,tunable] = "SXID_ERASE"
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
2021-01-12 16:28:27 +00:00
|
|
|
len = length(top_ns"."ns"."tunable)
|
|
|
|
if (len > max_name_len)
|
|
|
|
max_name_len = len
|
2016-12-31 18:02:17 +00:00
|
|
|
|
|
|
|
tunable = ""
|
|
|
|
}
|
|
|
|
else if (ns != "") {
|
|
|
|
ns = ""
|
|
|
|
}
|
|
|
|
else if (top_ns != "") {
|
|
|
|
top_ns = ""
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
printf ("syntax error: extra }: %s:%d\n", FILENAME, FNR)
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
next
|
|
|
|
}
|
|
|
|
|
|
|
|
# Everything else, which could either be a tunable without any attributes or a
|
|
|
|
# tunable attribute.
|
|
|
|
{
|
|
|
|
if (ns == "") {
|
|
|
|
printf("Line %d: Invalid tunable outside a namespace: %s\n", NR, $0)
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tunable == "") {
|
|
|
|
# We encountered a tunable without any attributes, so note it with a
|
|
|
|
# default.
|
2017-06-19 09:17:21 +00:00
|
|
|
types[top_ns,ns,$1] = "STRING"
|
2016-12-31 18:02:17 +00:00
|
|
|
next
|
|
|
|
}
|
|
|
|
|
|
|
|
# Otherwise, we have encountered a tunable attribute.
|
|
|
|
split($0, arr, ":")
|
|
|
|
attr = gensub(/^[ \t]+|[ \t]+$/, "", "g", arr[1])
|
|
|
|
val = gensub(/^[ \t]+|[ \t]+$/, "", "g", arr[2])
|
|
|
|
|
|
|
|
if (attr == "type") {
|
2017-06-19 09:17:21 +00:00
|
|
|
types[top_ns,ns,tunable] = val
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
else if (attr == "minval") {
|
2017-06-19 09:17:21 +00:00
|
|
|
minvals[top_ns,ns,tunable] = val
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
else if (attr == "maxval") {
|
2017-06-19 09:17:21 +00:00
|
|
|
maxvals[top_ns,ns,tunable] = val
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
else if (attr == "env_alias") {
|
2017-06-19 09:17:21 +00:00
|
|
|
env_alias[top_ns,ns,tunable] = sprintf("\"%s\"", val)
|
2021-01-12 16:28:27 +00:00
|
|
|
len = length(val)
|
|
|
|
if (len > max_alias_len)
|
|
|
|
max_alias_len = len
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
2017-02-02 10:16:01 +00:00
|
|
|
else if (attr == "security_level") {
|
|
|
|
if (val == "SXID_ERASE" || val == "SXID_IGNORE" || val == "NONE") {
|
2017-06-19 09:17:21 +00:00
|
|
|
security_level[top_ns,ns,tunable] = val
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
else {
|
2017-03-24 05:38:28 +00:00
|
|
|
printf("Line %d: Invalid value (%s) for security_level: %s, ", NR, val,
|
2016-12-31 18:02:17 +00:00
|
|
|
$0)
|
2017-03-24 05:38:28 +00:00
|
|
|
print("Allowed values are 'SXID_ERASE', 'SXID_IGNORE', or 'NONE'")
|
2016-12-31 18:02:17 +00:00
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
}
|
2017-05-17 07:41:00 +00:00
|
|
|
else if (attr == "default") {
|
2017-06-19 09:17:21 +00:00
|
|
|
if (types[top_ns,ns,tunable] == "STRING") {
|
|
|
|
default_val[top_ns,ns,tunable] = sprintf(".strval = \"%s\"", val);
|
2017-05-17 07:41:00 +00:00
|
|
|
}
|
|
|
|
else {
|
2017-06-19 09:17:21 +00:00
|
|
|
default_val[top_ns,ns,tunable] = sprintf(".numval = %s", val)
|
2017-05-17 07:41:00 +00:00
|
|
|
}
|
|
|
|
}
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
END {
|
|
|
|
if (ns != "") {
|
|
|
|
print "Unterminated namespace. Is a closing brace missing?"
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
|
|
|
|
print "/* AUTOGENERATED by gen-tunables.awk. */"
|
|
|
|
print "#ifndef _TUNABLES_H_"
|
|
|
|
print "# error \"Do not include this file directly.\""
|
|
|
|
print "# error \"Include tunables.h instead.\""
|
|
|
|
print "#endif"
|
2017-04-17 04:30:35 +00:00
|
|
|
print "#include <dl-procinfo.h>\n"
|
2016-12-31 18:02:17 +00:00
|
|
|
|
|
|
|
# Now, the enum names
|
|
|
|
print "\ntypedef enum"
|
|
|
|
print "{"
|
2017-06-19 09:17:21 +00:00
|
|
|
for (tnm in types) {
|
|
|
|
split (tnm, indices, SUBSEP);
|
|
|
|
t = indices[1];
|
|
|
|
n = indices[2];
|
|
|
|
m = indices[3];
|
|
|
|
printf (" TUNABLE_ENUM_NAME(%s, %s, %s),\n", t, n, m);
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
print "} tunable_id_t;\n"
|
|
|
|
|
|
|
|
print "\n#ifdef TUNABLES_INTERNAL"
|
2021-01-06 17:19:24 +00:00
|
|
|
# Internal definitions.
|
2021-01-12 16:28:27 +00:00
|
|
|
print "# define TUNABLE_NAME_MAX " (max_name_len + 1)
|
|
|
|
print "# define TUNABLE_ALIAS_MAX " (max_alias_len + 1)
|
2021-01-06 17:19:24 +00:00
|
|
|
print "# include \"dl-tunable-types.h\""
|
|
|
|
# Finally, the tunable list.
|
2017-05-11 14:43:49 +00:00
|
|
|
print "static tunable_t tunable_list[] attribute_relro = {"
|
2017-06-19 09:17:21 +00:00
|
|
|
for (tnm in types) {
|
|
|
|
split (tnm, indices, SUBSEP);
|
|
|
|
t = indices[1];
|
|
|
|
n = indices[2];
|
|
|
|
m = indices[3];
|
|
|
|
printf (" {TUNABLE_NAME_S(%s, %s, %s)", t, n, m)
|
2021-06-08 13:03:38 +00:00
|
|
|
printf (", {TUNABLE_TYPE_%s, %s, %s}, {%s}, false, TUNABLE_SECLEVEL_%s, %s},\n",
|
2017-06-19 09:17:21 +00:00
|
|
|
types[t,n,m], minvals[t,n,m], maxvals[t,n,m],
|
|
|
|
default_val[t,n,m], security_level[t,n,m], env_alias[t,n,m]);
|
2016-12-31 18:02:17 +00:00
|
|
|
}
|
|
|
|
print "};"
|
|
|
|
print "#endif"
|
|
|
|
}
|