ClickHouse/src/Common/TaskStatsInfoGetter.cpp

319 lines
8.7 KiB
C++
Raw Normal View History

#include "TaskStatsInfoGetter.h"
#include <Common/Exception.h>
2021-10-02 07:13:14 +00:00
#include <base/types.h>
#include <unistd.h>
2019-09-15 10:35:12 +00:00
#if defined(OS_LINUX)
#include "hasLinuxCapability.h"
2021-10-02 07:13:14 +00:00
#include <base/unaligned.h>
2018-08-22 02:54:24 +00:00
#include <cerrno>
#include <cstdio>
#include <cstdlib>
#include <cstring>
#include <sys/socket.h>
#include <linux/genetlink.h>
#include <linux/netlink.h>
#include <linux/taskstats.h>
#include <linux/capability.h>
2020-05-09 23:35:20 +00:00
#if defined(__clang__)
#pragma clang diagnostic ignored "-Wgnu-anonymous-struct"
2022-07-14 11:42:25 +00:00
#pragma clang diagnostic ignored "-Wnested-anon-types"
2020-05-09 23:35:20 +00:00
#endif
2018-08-21 21:05:30 +00:00
2018-08-19 04:43:58 +00:00
/// Basic idea is motivated by "iotop" tool.
/// More info: https://www.kernel.org/doc/Documentation/accounting/taskstats.txt
namespace DB
{
namespace ErrorCodes
{
extern const int NETLINK_ERROR;
}
2019-07-18 18:16:36 +00:00
// Replace NLMSG_OK with explicit casts since that system macro contains signedness bugs which are not going to be fixed.
static inline bool is_nlmsg_ok(const struct nlmsghdr * const nlh, const ssize_t len)
{
return len >= static_cast<ssize_t>(sizeof(*nlh)) && nlh->nlmsg_len >= sizeof(*nlh) && static_cast<size_t>(len) >= nlh->nlmsg_len;
}
namespace
{
2018-08-22 02:54:24 +00:00
/** The message contains:
* - Netlink protocol header;
* - Generic Netlink (is a sub-protocol of Netlink that we use) protocol header;
* - Payload
* -- that itself is a list of "Attributes" (sub-messages), each of them contains length (including header), type, and its own payload.
* -- and attribute payload may be represented by the list of embedded attributes.
*/
struct NetlinkMessage
{
static size_t constexpr MAX_MSG_SIZE = 1024;
2018-08-22 02:54:24 +00:00
alignas(NLMSG_ALIGNTO) ::nlmsghdr header;
2018-08-22 02:54:24 +00:00
struct Attribute
{
::nlattr header;
2018-08-22 02:54:24 +00:00
alignas(NLMSG_ALIGNTO) char payload[0];
const Attribute * next() const
{
return reinterpret_cast<const Attribute *>(reinterpret_cast<const char *>(this) + NLA_ALIGN(header.nla_len));
}
};
union alignas(NLMSG_ALIGNTO)
2018-08-22 02:54:24 +00:00
{
struct
{
::genlmsghdr generic_header;
union alignas(NLMSG_ALIGNTO)
2018-08-22 02:54:24 +00:00
{
char buf[MAX_MSG_SIZE];
Attribute attribute; /// First attribute. There may be more.
} payload;
};
2018-08-22 02:54:24 +00:00
::nlmsgerr error;
};
2018-08-22 02:54:24 +00:00
const Attribute * end() const
{
return reinterpret_cast<const Attribute *>(reinterpret_cast<const char *>(this) + header.nlmsg_len);
}
2018-08-22 02:54:24 +00:00
void send(int fd) const
{
2018-08-22 02:54:24 +00:00
const char * request_buf = reinterpret_cast<const char *>(this);
ssize_t request_size = header.nlmsg_len;
2019-06-16 18:12:14 +00:00
union
{
::sockaddr_nl nladdr{};
::sockaddr sockaddr;
};
2018-08-22 02:54:24 +00:00
nladdr.nl_family = AF_NETLINK;
2018-08-22 02:54:24 +00:00
while (true)
{
2019-06-16 18:12:14 +00:00
ssize_t bytes_sent = ::sendto(fd, request_buf, request_size, 0, &sockaddr, sizeof(nladdr));
2018-08-22 02:54:24 +00:00
if (bytes_sent <= 0)
{
if (errno == EAGAIN)
continue;
else
throwFromErrno("Can't send a Netlink command", ErrorCodes::NETLINK_ERROR);
}
if (bytes_sent > request_size)
throw Exception("Wrong result of sendto system call: bytes_sent is greater than request size", ErrorCodes::NETLINK_ERROR);
if (bytes_sent == request_size)
break;
request_buf += bytes_sent;
request_size -= bytes_sent;
}
}
2018-08-22 02:54:24 +00:00
void receive(int fd)
{
ssize_t bytes_received = ::recv(fd, this, sizeof(*this), 0);
2018-08-29 21:30:39 +00:00
if (header.nlmsg_type == NLMSG_ERROR)
throw Exception("Can't receive Netlink response: error " + std::to_string(error.error), ErrorCodes::NETLINK_ERROR);
2019-07-18 18:24:38 +00:00
if (!is_nlmsg_ok(&header, bytes_received))
2018-08-29 21:30:39 +00:00
throw Exception("Can't receive Netlink response: wrong number of bytes received", ErrorCodes::NETLINK_ERROR);
2018-08-22 02:54:24 +00:00
}
};
NetlinkMessage query(
int fd,
UInt16 type,
UInt32 pid,
UInt8 command,
UInt16 attribute_type,
const void * attribute_data,
int attribute_size)
{
NetlinkMessage request{};
2018-08-22 02:54:24 +00:00
request.header.nlmsg_len = NLMSG_LENGTH(GENL_HDRLEN); /// Length of both headers.
request.header.nlmsg_type = type;
request.header.nlmsg_flags = NLM_F_REQUEST; /// A request.
request.header.nlmsg_seq = 0;
request.header.nlmsg_pid = pid;
request.generic_header.cmd = command;
request.generic_header.version = 1;
request.payload.attribute.header.nla_type = attribute_type;
request.payload.attribute.header.nla_len = attribute_size + NLA_HDRLEN;
2018-08-22 02:54:24 +00:00
memcpy(&request.payload.attribute.payload, attribute_data, attribute_size);
request.header.nlmsg_len += NLMSG_ALIGN(request.payload.attribute.header.nla_len);
request.send(fd);
NetlinkMessage response;
response.receive(fd);
return response;
}
2018-08-22 02:54:24 +00:00
UInt16 getFamilyIdImpl(int fd)
{
2018-08-22 02:54:24 +00:00
NetlinkMessage answer = query(fd, GENL_ID_CTRL, getpid(), CTRL_CMD_GETFAMILY, CTRL_ATTR_FAMILY_NAME, TASKSTATS_GENL_NAME, strlen(TASKSTATS_GENL_NAME) + 1);
/// NOTE Why the relevant info is located in the second attribute?
const NetlinkMessage::Attribute * attr = answer.payload.attribute.next();
if (attr->header.nla_type != CTRL_ATTR_FAMILY_ID)
throw Exception("Received wrong attribute as an answer to GET_FAMILY Netlink command", ErrorCodes::NETLINK_ERROR);
return unalignedLoad<UInt16>(attr->payload);
}
2018-08-22 00:24:55 +00:00
bool checkPermissionsImpl()
{
static bool res = hasLinuxCapability(CAP_NET_ADMIN);
if (!res)
2018-08-29 21:30:39 +00:00
return false;
/// Check that we can successfully initialize TaskStatsInfoGetter.
/// It will ask about family id through Netlink.
/// On some LXC containers we have capability but we still cannot use Netlink.
try
{
TaskStatsInfoGetter();
}
catch (...)
{
tryLogCurrentException(__PRETTY_FUNCTION__);
return false;
}
return true;
}
2018-08-22 02:54:24 +00:00
UInt16 getFamilyId(int fd)
{
2018-08-22 00:24:55 +00:00
/// It is thread and exception safe since C++11 and even before.
2018-08-22 02:54:24 +00:00
static UInt16 res = getFamilyIdImpl(fd);
2018-08-22 00:24:55 +00:00
return res;
}
}
bool TaskStatsInfoGetter::checkPermissions()
{
static bool res = checkPermissionsImpl();
return res;
}
TaskStatsInfoGetter::TaskStatsInfoGetter()
{
netlink_socket_fd = ::socket(PF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
if (netlink_socket_fd < 0)
2018-08-21 16:49:20 +00:00
throwFromErrno("Can't create PF_NETLINK socket", ErrorCodes::NETLINK_ERROR);
2018-08-21 16:40:54 +00:00
2018-08-22 02:54:24 +00:00
/// On some containerized environments, operation on Netlink socket could hang forever.
/// We set reasonably small timeout to overcome this issue.
2018-08-21 21:05:30 +00:00
struct timeval tv;
tv.tv_sec = 0;
tv.tv_usec = 50000;
2018-08-21 16:13:07 +00:00
if (0 != ::setsockopt(netlink_socket_fd, SOL_SOCKET, SO_RCVTIMEO, reinterpret_cast<const char *>(&tv), sizeof(tv)))
2018-08-21 16:49:20 +00:00
throwFromErrno("Can't set timeout on PF_NETLINK socket", ErrorCodes::NETLINK_ERROR);
2019-06-16 18:12:14 +00:00
union
{
::sockaddr_nl addr{};
::sockaddr sockaddr;
};
addr.nl_family = AF_NETLINK;
2019-06-16 18:12:14 +00:00
if (::bind(netlink_socket_fd, &sockaddr, sizeof(addr)) < 0)
2018-08-21 16:49:20 +00:00
throwFromErrno("Can't bind PF_NETLINK socket", ErrorCodes::NETLINK_ERROR);
2018-08-22 00:24:55 +00:00
taskstats_family_id = getFamilyId(netlink_socket_fd);
}
2018-08-21 21:05:30 +00:00
2020-04-22 05:39:31 +00:00
void TaskStatsInfoGetter::getStat(::taskstats & out_stats, pid_t tid) const
{
2018-08-22 02:54:24 +00:00
NetlinkMessage answer = query(netlink_socket_fd, taskstats_family_id, tid, TASKSTATS_CMD_GET, TASKSTATS_CMD_ATTR_PID, &tid, sizeof(tid));
const NetlinkMessage::Attribute * attr = &answer.payload.attribute;
if (attr->header.nla_type != TASKSTATS_TYPE_AGGR_PID)
throw Exception("Expected TASKSTATS_TYPE_AGGR_PID", ErrorCodes::NETLINK_ERROR);
/// TASKSTATS_TYPE_AGGR_PID
const NetlinkMessage::Attribute * nested_attr = reinterpret_cast<const NetlinkMessage::Attribute *>(attr->payload);
if (nested_attr->header.nla_type != TASKSTATS_TYPE_PID)
throw Exception("Expected TASKSTATS_TYPE_PID", ErrorCodes::NETLINK_ERROR);
if (nested_attr == nested_attr->next())
throw Exception("No TASKSTATS_TYPE_STATS packet after TASKSTATS_TYPE_PID", ErrorCodes::NETLINK_ERROR);
nested_attr = nested_attr->next();
if (nested_attr->header.nla_type != TASKSTATS_TYPE_STATS)
throw Exception("Expected TASKSTATS_TYPE_STATS", ErrorCodes::NETLINK_ERROR);
out_stats = unalignedLoad<::taskstats>(nested_attr->payload);
if (attr->next() != answer.end())
throw Exception("Unexpected end of response", ErrorCodes::NETLINK_ERROR);
}
2018-08-21 21:05:30 +00:00
TaskStatsInfoGetter::~TaskStatsInfoGetter()
{
if (netlink_socket_fd >= 0)
close(netlink_socket_fd);
}
}
#else
namespace DB
{
bool TaskStatsInfoGetter::checkPermissions()
{
return false;
}
2020-03-11 12:01:58 +00:00
TaskStatsInfoGetter::TaskStatsInfoGetter() = default;
TaskStatsInfoGetter::~TaskStatsInfoGetter() = default;
2020-04-22 14:56:31 +00:00
void TaskStatsInfoGetter::getStat(::taskstats &, pid_t) const
{
}
}
#endif