mirror of
git://sourceware.org/git/glibc.git
synced 2024-12-27 04:41:02 +08:00
8920855c45
When mcount overflows, no gmon.out file is generated, but no message is printed
to the user, leaving the user with no idea why, and thinking maybe there is
some bug - which is how BZ 27576 ended up being logged. Print a message to
stderr in this case so the user knows what is going on.
As a comment in sys/gmon.h acknowledges, the hardcoded MAXARCS value is too
small for some large applications, including the test case in that BZ. Rather
than increase it, add tunables to enable MINARCS and MAXARCS to be overridden
at runtime (glibc.gmon.minarcs and glibc.gmon.maxarcs). So if a user gets the
mcount overflow error, they can try increasing maxarcs (they might need to
increase minarcs too if the heuristic is wrong in their case.)
Note setting minarcs/maxarcs too large can cause monstartup to fail with an
out of memory error. If you set them large enough, it can cause an integer
overflow in calculating the buffer size. I haven't done anything to defend
against that - it would not generally be a security vulnerability, since these
tunables will be ignored in suid/sgid programs (due to the SXID_ERASE default),
and if you can set GLIBC_TUNABLES in the environment of a process, you can take
it over anyway (LD_PRELOAD, LD_LIBRARY_PATH, etc). I thought about modifying
the code of monstartup to defend against integer overflows, but doing so is
complicated, and I realise the existing code is susceptible to them even prior
to this change (e.g. try passing a pathologically large highpc argument to
monstartup), so I decided just to leave that possibility in-place.
Add a test case which demonstrates mcount overflow and the tunables.
Document the new tunables in the manual.
Signed-off-by: Simon Kissane <skissane@gmail.com>
Reviewed-by: DJ Delorie <dj@redhat.com>
(cherry picked from commit 31be941e43
)
186 lines
3.7 KiB
Plaintext
186 lines
3.7 KiB
Plaintext
# Copyright (C) 2016-2022 Free Software Foundation, Inc.
|
|
# This file is part of the GNU C Library.
|
|
|
|
# The GNU C Library is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU Lesser General Public
|
|
# License as published by the Free Software Foundation; either
|
|
# version 2.1 of the License, or (at your option) any later version.
|
|
|
|
# The GNU C Library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
# Lesser General Public License for more details.
|
|
|
|
# You should have received a copy of the GNU Lesser General Public
|
|
# License along with the GNU C Library; if not, see
|
|
# <https://www.gnu.org/licenses/>.
|
|
|
|
# Allowed attributes for tunables:
|
|
#
|
|
# type: Defaults to STRING
|
|
# minval: Optional minimum acceptable value
|
|
# maxval: Optional maximum acceptable value
|
|
# env_alias: An alias environment variable
|
|
# security_level: Specify security level of the tunable for AT_SECURE binaries.
|
|
# Valid values are:
|
|
#
|
|
# SXID_ERASE: (default) Do not read and do not pass on to
|
|
# child processes.
|
|
# SXID_IGNORE: Do not read, but retain for non-AT_SECURE
|
|
# subprocesses.
|
|
# NONE: Read all the time.
|
|
|
|
glibc {
|
|
malloc {
|
|
check {
|
|
type: INT_32
|
|
minval: 0
|
|
maxval: 3
|
|
env_alias: MALLOC_CHECK_
|
|
}
|
|
top_pad {
|
|
type: SIZE_T
|
|
env_alias: MALLOC_TOP_PAD_
|
|
security_level: SXID_IGNORE
|
|
}
|
|
perturb {
|
|
type: INT_32
|
|
minval: 0
|
|
maxval: 0xff
|
|
env_alias: MALLOC_PERTURB_
|
|
security_level: SXID_IGNORE
|
|
}
|
|
mmap_threshold {
|
|
type: SIZE_T
|
|
env_alias: MALLOC_MMAP_THRESHOLD_
|
|
security_level: SXID_IGNORE
|
|
}
|
|
trim_threshold {
|
|
type: SIZE_T
|
|
env_alias: MALLOC_TRIM_THRESHOLD_
|
|
security_level: SXID_IGNORE
|
|
}
|
|
mmap_max {
|
|
type: INT_32
|
|
env_alias: MALLOC_MMAP_MAX_
|
|
security_level: SXID_IGNORE
|
|
minval: 0
|
|
}
|
|
arena_max {
|
|
type: SIZE_T
|
|
env_alias: MALLOC_ARENA_MAX
|
|
minval: 1
|
|
security_level: SXID_IGNORE
|
|
}
|
|
arena_test {
|
|
type: SIZE_T
|
|
env_alias: MALLOC_ARENA_TEST
|
|
minval: 1
|
|
security_level: SXID_IGNORE
|
|
}
|
|
tcache_max {
|
|
type: SIZE_T
|
|
}
|
|
tcache_count {
|
|
type: SIZE_T
|
|
}
|
|
tcache_unsorted_limit {
|
|
type: SIZE_T
|
|
}
|
|
mxfast {
|
|
type: SIZE_T
|
|
minval: 0
|
|
security_level: SXID_IGNORE
|
|
}
|
|
hugetlb {
|
|
type: SIZE_T
|
|
minval: 0
|
|
}
|
|
}
|
|
cpu {
|
|
hwcap_mask {
|
|
type: UINT_64
|
|
env_alias: LD_HWCAP_MASK
|
|
default: HWCAP_IMPORTANT
|
|
}
|
|
}
|
|
|
|
elision {
|
|
enable {
|
|
type: INT_32
|
|
minval: 0
|
|
maxval: 1
|
|
}
|
|
skip_lock_busy {
|
|
type: INT_32
|
|
default: 3
|
|
minval: 0
|
|
}
|
|
skip_lock_internal_abort {
|
|
type: INT_32
|
|
default: 3
|
|
minval: 0
|
|
}
|
|
skip_lock_after_retries {
|
|
type: INT_32
|
|
default: 3
|
|
minval: 0
|
|
}
|
|
tries {
|
|
type: INT_32
|
|
default: 3
|
|
minval: 0
|
|
}
|
|
skip_trylock_internal_abort {
|
|
type: INT_32
|
|
default: 3
|
|
minval: 0
|
|
}
|
|
}
|
|
|
|
rtld {
|
|
nns {
|
|
type: SIZE_T
|
|
minval: 1
|
|
maxval: 16
|
|
default: 4
|
|
}
|
|
optional_static_tls {
|
|
type: SIZE_T
|
|
minval: 0
|
|
default: 512
|
|
}
|
|
}
|
|
|
|
mem {
|
|
tagging {
|
|
type: INT_32
|
|
minval: 0
|
|
maxval: 255
|
|
security_level: SXID_IGNORE
|
|
}
|
|
}
|
|
|
|
rtld {
|
|
dynamic_sort {
|
|
type: INT_32
|
|
minval: 1
|
|
maxval: 2
|
|
default: 2
|
|
}
|
|
}
|
|
|
|
gmon {
|
|
minarcs {
|
|
type: INT_32
|
|
minval: 50
|
|
default: 50
|
|
}
|
|
maxarcs {
|
|
type: INT_32
|
|
minval: 50
|
|
default: 1048576
|
|
}
|
|
}
|
|
}
|