2021-01-07 01:19:24 +08:00
|
|
|
/* Internal representation of tunables.
|
2017-01-01 02:02:17 +08:00
|
|
|
|
2021-01-03 03:32:25 +08:00
|
|
|
Copyright (C) 2016-2021 Free Software Foundation, Inc.
|
2017-01-01 02:02:17 +08:00
|
|
|
This file is part of the GNU C Library.
|
|
|
|
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU Lesser General Public
|
|
|
|
License as published by the Free Software Foundation; either
|
|
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
|
|
License along with the GNU C Library; if not, see
|
Prefer https to http for gnu.org and fsf.org URLs
Also, change sources.redhat.com to sourceware.org.
This patch was automatically generated by running the following shell
script, which uses GNU sed, and which avoids modifying files imported
from upstream:
sed -ri '
s,(http|ftp)(://(.*\.)?(gnu|fsf|sourceware)\.org($|[^.]|\.[^a-z])),https\2,g
s,(http|ftp)(://(.*\.)?)sources\.redhat\.com($|[^.]|\.[^a-z]),https\2sourceware.org\4,g
' \
$(find $(git ls-files) -prune -type f \
! -name '*.po' \
! -name 'ChangeLog*' \
! -path COPYING ! -path COPYING.LIB \
! -path manual/fdl-1.3.texi ! -path manual/lgpl-2.1.texi \
! -path manual/texinfo.tex ! -path scripts/config.guess \
! -path scripts/config.sub ! -path scripts/install-sh \
! -path scripts/mkinstalldirs ! -path scripts/move-if-change \
! -path INSTALL ! -path locale/programs/charmap-kw.h \
! -path po/libc.pot ! -path sysdeps/gnu/errlist.c \
! '(' -name configure \
-execdir test -f configure.ac -o -f configure.in ';' ')' \
! '(' -name preconfigure \
-execdir test -f preconfigure.ac ';' ')' \
-print)
and then by running 'make dist-prepare' to regenerate files built
from the altered files, and then executing the following to cleanup:
chmod a+x sysdeps/unix/sysv/linux/riscv/configure
# Omit irrelevant whitespace and comment-only changes,
# perhaps from a slightly-different Autoconf version.
git checkout -f \
sysdeps/csky/configure \
sysdeps/hppa/configure \
sysdeps/riscv/configure \
sysdeps/unix/sysv/linux/csky/configure
# Omit changes that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/powerpc/powerpc64/ppc-mcount.S: trailing lines
git checkout -f \
sysdeps/powerpc/powerpc64/ppc-mcount.S \
sysdeps/unix/sysv/linux/s390/s390-64/syscall.S
# Omit change that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S: last line does not end in newline
git checkout -f sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S
2019-09-07 13:40:42 +08:00
|
|
|
<https://www.gnu.org/licenses/>. */
|
2017-01-01 02:02:17 +08:00
|
|
|
|
|
|
|
#ifndef _TUNABLE_TYPES_H_
|
2021-01-07 01:19:24 +08:00
|
|
|
#define _TUNABLE_TYPES_H_
|
|
|
|
|
|
|
|
/* Note: This header is included in the generated dl-tunables-list.h and
|
|
|
|
only used internally in the tunables implementation in dl-tunables.c. */
|
|
|
|
|
|
|
|
#include <stdbool.h>
|
2017-01-01 02:02:17 +08:00
|
|
|
#include <stddef.h>
|
2021-01-07 01:19:24 +08:00
|
|
|
#include <stdint.h>
|
2017-01-01 02:02:17 +08:00
|
|
|
|
|
|
|
typedef enum
|
|
|
|
{
|
|
|
|
TUNABLE_TYPE_INT_32,
|
2017-05-17 15:41:55 +08:00
|
|
|
TUNABLE_TYPE_UINT_64,
|
2017-01-01 02:02:17 +08:00
|
|
|
TUNABLE_TYPE_SIZE_T,
|
|
|
|
TUNABLE_TYPE_STRING
|
|
|
|
} tunable_type_code_t;
|
|
|
|
|
|
|
|
typedef struct
|
|
|
|
{
|
|
|
|
tunable_type_code_t type_code;
|
2021-02-05 15:48:58 +08:00
|
|
|
tunable_num_t min;
|
|
|
|
tunable_num_t max;
|
2017-01-01 02:02:17 +08:00
|
|
|
} tunable_type_t;
|
|
|
|
|
2017-02-02 18:16:01 +08:00
|
|
|
/* Security level for tunables. This decides what to do with individual
|
|
|
|
tunables for AT_SECURE binaries. */
|
|
|
|
typedef enum
|
|
|
|
{
|
|
|
|
/* Erase the tunable for AT_SECURE binaries so that child processes don't
|
|
|
|
read it. */
|
|
|
|
TUNABLE_SECLEVEL_SXID_ERASE = 0,
|
|
|
|
/* Ignore the tunable for AT_SECURE binaries, but don't erase it, so that
|
|
|
|
child processes can read it. */
|
|
|
|
TUNABLE_SECLEVEL_SXID_IGNORE = 1,
|
|
|
|
/* Read the tunable. */
|
|
|
|
TUNABLE_SECLEVEL_NONE = 2,
|
|
|
|
} tunable_seclevel_t;
|
|
|
|
|
2021-01-07 01:19:24 +08:00
|
|
|
/* A tunable. */
|
|
|
|
struct _tunable
|
|
|
|
{
|
2021-01-13 00:28:27 +08:00
|
|
|
const char name[TUNABLE_NAME_MAX]; /* Internal name of the tunable. */
|
2021-01-07 01:19:24 +08:00
|
|
|
tunable_type_t type; /* Data type of the tunable. */
|
|
|
|
tunable_val_t val; /* The value. */
|
|
|
|
bool initialized; /* Flag to indicate that the tunable is
|
|
|
|
initialized. */
|
|
|
|
tunable_seclevel_t security_level; /* Specify the security level for the
|
|
|
|
tunable with respect to AT_SECURE
|
|
|
|
programs. See description of
|
|
|
|
tunable_seclevel_t to see a
|
|
|
|
description of the values.
|
|
|
|
|
|
|
|
Note that even if the tunable is
|
|
|
|
read, it may not get used by the
|
|
|
|
target module if the value is
|
|
|
|
considered unsafe. */
|
|
|
|
/* Compatibility elements. */
|
2021-01-13 00:28:27 +08:00
|
|
|
const char env_alias[TUNABLE_ALIAS_MAX]; /* The compatibility environment
|
2021-01-07 01:19:24 +08:00
|
|
|
variable name. */
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef struct _tunable tunable_t;
|
2017-02-02 18:16:01 +08:00
|
|
|
|
2021-03-16 21:01:02 +08:00
|
|
|
static __always_inline bool
|
|
|
|
unsigned_tunable_type (tunable_type_code_t t)
|
|
|
|
{
|
|
|
|
switch (t)
|
|
|
|
{
|
|
|
|
case TUNABLE_TYPE_INT_32:
|
|
|
|
return false;
|
|
|
|
case TUNABLE_TYPE_UINT_64:
|
|
|
|
case TUNABLE_TYPE_SIZE_T:
|
|
|
|
return true;
|
|
|
|
case TUNABLE_TYPE_STRING:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
__builtin_unreachable ();
|
|
|
|
}
|
|
|
|
|
2017-01-01 02:02:17 +08:00
|
|
|
#endif
|