Linux Address Space Layout Randomization (ASLR)引起的Oracle的Bug

Linux Address Space Layout Randomization (ASLR)引起的Oracle的Bug

 

报错:Waited for process W001 to initialize for 60 seconds

 

MOS上的信息:

Applies to:

Oracle Database – Enterprise Edition – Version 11.2.0.1 to 12.1.0.1 [Release 11.2 to 12.1]

CRM On Demand – Version N/A to N/A

IBM: Linux on System z

Linux x86-64

Linux x86

Symptoms

Errors are seen in the alert log relating to spawning of processes such as:

@ Checked for relevance on 17th Jan 2012

ORA-00445: background process “m001″ did not start after 120 seconds

Incident details in: /opt/u01/app/oracle/diag/rdbms/incident/incdir_3721/db1_mmon_7417_i3721.trc

ERROR: Unable to normalize symbol name for the following short stack (at offset 2):

Tue Jun 21 03:03:06 2011

ORA-00445: background process “J003″ did not start after 120 seconds

 
 

or

Waited for process W002 to initialize for 60 seconds

 
 

 

 

The system appears to be running very slowly and defunct processes can appear.

Changes

REDHAT 5 kernel 2.6.18-194.el5 #1 SMP Tue Mar 16

Oracle 11.2.0.2 Single Instance

IBM: Linux on System z

Cause

Recent linux kernels have a feature called Address Space Layout Randomization (ASLR).

ASLR  is a feature that is activated by default on some of the newer linux distributions.

It is designed to load shared memory objects in random addresses.

In Oracle, multiple processes map a shared memory object at the same address across the processes.

 
 

With ASLR turned on Oracle cannot guarantee the availability of this shared memory address.

This conflict in the address space means that a process trying to attach a shared memory object to a specific address may not be able to do so, resulting in a failure in shmat subroutine.

 
 

However, on subsequent retry (using a new process) the shared memory attachment may work.

The result is a “random” set of failures in the alert log.

 
 

Solution

It should be noted that this problem has only been positively diagnosed in Redhat 5 and Oracle 11.2.0.2.

It is also likely, as per unpublished BUG:8527473,  that this issue will reproduce running on Generic Linux platforms running  any Oracle 11.2.0.x. or 12.1.0.x  on Redhat/OEL kernels which have ASLR. 

This issue has been seen in both Single Instance and RAC environments.

 
 

ASLR also exists in SLES10 and SLES 11 kernels and by default ASLR is turned on.  To date no problem has been seen on SuSE servers running Oracle  but Novell confirm ASLR may cause problems.  Please refer to

http://www.novell.com/support/kb/doc.php?id=7004855 mmap occasionally infringes on stack

You can verify whether ASLR is being used as follows:

 # /sbin/sysctl -a | grep randomize

kernel.randomize_va_space = 1

 
 

If the parameter is set to any value other than 0 then ASLR is in use.

On Redhat 5 to permanently disable ASLR.

add/modify this parameter in /etc/sysctl.conf

kernel.randomize_va_space=0

kernel.exec-shield=0

 
 

You need to reboot for kernel.exec-shield parameter to take effect. 

Note that both kernel parameters are required for ASLR to be switched off.

 
 

There may be other reasons for a process failing to start, however, by switching ASLR off, you can quickly discount ASLR being the problem. More and more issues are being identified when ASLR is in operation.

 

SELS 上关闭ASLR的方法:

A:

- Either at boot time by adding the kernel boot parameter

“norandmaps” to the kernel boot command line.

 
 

B:

 
 

- add the following line to the /etc/sysctl.conf file

kernel.randomize_va_space = 0

 - run sysctl -p for the change to take effect.

 

验证ASLR是否关闭的方法:

验证:

cat /proc/sys/kernel/randomize_va_space =>1

 
 

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffd3ee58c0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fff4bf83fd0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fff5d621510)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fff10fa5590)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fff74f045a0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fff71676430)

 
 

cat /proc/sys/kernel/randomize_va_space =>0

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffffffe2e0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffffffe2e0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffffffe2e0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffffffe2e0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffffffe2e0)

SuSE11PS2:~/ASLR # ./stack

Stack pointer (ESP : 0x7fffffffe2e0)

 

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>