summaryrefslogtreecommitdiffstats
path: root/src/syscheck.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/syscheck.c')
-rw-r--r--src/syscheck.c375
1 files changed, 375 insertions, 0 deletions
diff --git a/src/syscheck.c b/src/syscheck.c
new file mode 100644
index 0000000..41545f0
--- /dev/null
+++ b/src/syscheck.c
@@ -0,0 +1,375 @@
+/*
+ * Copyright (c) 2022, Redis Ltd.
+ * Copyright (c) 2016, Salvatore Sanfilippo <antirez at gmail dot com>
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * * Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * * Neither the name of Redis nor the names of its contributors may be used
+ * to endorse or promote products derived from this software without
+ * specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+#include "fmacros.h"
+#include "config.h"
+#include "syscheck.h"
+#include "sds.h"
+#include "anet.h"
+
+#include <time.h>
+#include <sys/resource.h>
+#include <unistd.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <errno.h>
+#include <sys/wait.h>
+
+#ifdef __linux__
+#include <sys/mman.h>
+#endif
+
+
+#ifdef __linux__
+static sds read_sysfs_line(char *path) {
+ char buf[256];
+ FILE *f = fopen(path, "r");
+ if (!f) return NULL;
+ if (!fgets(buf, sizeof(buf), f)) {
+ fclose(f);
+ return NULL;
+ }
+ fclose(f);
+ sds res = sdsnew(buf);
+ res = sdstrim(res, " \n");
+ return res;
+}
+
+/* Verify our clokcsource implementation doesn't go through a system call (uses vdso).
+ * Going through a system call to check the time degrades Redis performance. */
+static int checkClocksource(sds *error_msg) {
+ unsigned long test_time_us, system_hz;
+ struct timespec ts;
+ unsigned long long start_us;
+ struct rusage ru_start, ru_end;
+
+ system_hz = sysconf(_SC_CLK_TCK);
+
+ if (getrusage(RUSAGE_SELF, &ru_start) != 0)
+ return 0;
+ if (clock_gettime(CLOCK_MONOTONIC, &ts) < 0) {
+ return 0;
+ }
+ start_us = (ts.tv_sec * 1000000 + ts.tv_nsec / 1000);
+
+ /* clock_gettime() busy loop of 5 times system tick (for a system_hz of 100 this is 50ms)
+ * Using system_hz is required to ensure accurate measurements from getrusage().
+ * If our clocksource is configured correctly (vdso) this will result in no system calls.
+ * If our clocksource is inefficient it'll waste most of the busy loop in the kernel. */
+ test_time_us = 5 * 1000000 / system_hz;
+ while (1) {
+ unsigned long long d;
+ if (clock_gettime(CLOCK_MONOTONIC, &ts) < 0)
+ return 0;
+ d = (ts.tv_sec * 1000000 + ts.tv_nsec / 1000) - start_us;
+ if (d >= test_time_us) break;
+ }
+ if (getrusage(RUSAGE_SELF, &ru_end) != 0)
+ return 0;
+
+ long long stime_us = (ru_end.ru_stime.tv_sec * 1000000 + ru_end.ru_stime.tv_usec) - (ru_start.ru_stime.tv_sec * 1000000 + ru_start.ru_stime.tv_usec);
+ long long utime_us = (ru_end.ru_utime.tv_sec * 1000000 + ru_end.ru_utime.tv_usec) - (ru_start.ru_utime.tv_sec * 1000000 + ru_start.ru_utime.tv_usec);
+
+ /* If more than 10% of the process time was in system calls we probably have an inefficient clocksource, print a warning */
+ if (stime_us * 10 > stime_us + utime_us) {
+ sds avail = read_sysfs_line("/sys/devices/system/clocksource/clocksource0/available_clocksource");
+ sds curr = read_sysfs_line("/sys/devices/system/clocksource/clocksource0/current_clocksource");
+ *error_msg = sdscatprintf(sdsempty(),
+ "Slow system clocksource detected. This can result in degraded performance. "
+ "Consider changing the system's clocksource. "
+ "Current clocksource: %s. Available clocksources: %s. "
+ "For example: run the command 'echo tsc > /sys/devices/system/clocksource/clocksource0/current_clocksource' as root. "
+ "To permanently change the system's clocksource you'll need to set the 'clocksource=' kernel command line parameter.",
+ curr ? curr : "", avail ? avail : "");
+ sdsfree(avail);
+ sdsfree(curr);
+ return -1;
+ } else {
+ return 1;
+ }
+}
+
+/* Verify we're not using the `xen` clocksource. The xen hypervisor's default clocksource is slow and affects
+ * Redis's performance. This has been measured on ec2 xen based instances. ec2 recommends using the non-default
+ * tsc clock source for these instances. */
+int checkXenClocksource(sds *error_msg) {
+ sds curr = read_sysfs_line("/sys/devices/system/clocksource/clocksource0/current_clocksource");
+ int res = 1;
+ if (curr == NULL) {
+ res = 0;
+ } else if (strcmp(curr, "xen") == 0) {
+ *error_msg = sdsnew(
+ "Your system is configured to use the 'xen' clocksource which might lead to degraded performance. "
+ "Check the result of the [slow-clocksource] system check: run 'redis-server --check-system' to check if "
+ "the system's clocksource isn't degrading performance.");
+ res = -1;
+ }
+ sdsfree(curr);
+ return res;
+}
+
+/* Verify overcommit is enabled.
+ * When overcommit memory is disabled Linux will kill the forked child of a background save
+ * if we don't have enough free memory to satisfy double the current memory usage even though
+ * the forked child uses copy-on-write to reduce its actual memory usage. */
+int checkOvercommit(sds *error_msg) {
+ FILE *fp = fopen("/proc/sys/vm/overcommit_memory","r");
+ char buf[64];
+
+ if (!fp) return 0;
+ if (fgets(buf,64,fp) == NULL) {
+ fclose(fp);
+ return 0;
+ }
+ fclose(fp);
+
+ if (strtol(buf, NULL, 10) != 1) {
+ *error_msg = sdsnew(
+ "Memory overcommit must be enabled! Without it, a background save or replication may fail under low memory condition. "
+#if defined(USE_JEMALLOC)
+ "Being disabled, it can can also cause failures without low memory condition, see https://github.com/jemalloc/jemalloc/issues/1328. "
+#endif
+ "To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the "
+ "command 'sysctl vm.overcommit_memory=1' for this to take effect.");
+ return -1;
+ } else {
+ return 1;
+ }
+}
+
+/* Make sure transparent huge pages aren't always enabled. When they are this can cause copy-on-write logic
+ * to consume much more memory and reduce performance during forks. */
+int checkTHPEnabled(sds *error_msg) {
+ char buf[1024];
+
+ FILE *fp = fopen("/sys/kernel/mm/transparent_hugepage/enabled","r");
+ if (!fp) return 0;
+ if (fgets(buf,sizeof(buf),fp) == NULL) {
+ fclose(fp);
+ return 0;
+ }
+ fclose(fp);
+
+ if (strstr(buf,"[always]") != NULL) {
+ *error_msg = sdsnew(
+ "You have Transparent Huge Pages (THP) support enabled in your kernel. "
+ "This will create latency and memory usage issues with Redis. "
+ "To fix this issue run the command 'echo madvise > /sys/kernel/mm/transparent_hugepage/enabled' as root, "
+ "and add it to your /etc/rc.local in order to retain the setting after a reboot. "
+ "Redis must be restarted after THP is disabled (set to 'madvise' or 'never').");
+ return -1;
+ } else {
+ return 1;
+ }
+}
+
+#ifdef __arm64__
+/* Get size in kilobytes of the Shared_Dirty pages of the calling process for the
+ * memory map corresponding to the provided address, or -1 on error. */
+static int smapsGetSharedDirty(unsigned long addr) {
+ int ret, in_mapping = 0, val = -1;
+ unsigned long from, to;
+ char buf[64];
+ FILE *f;
+
+ f = fopen("/proc/self/smaps", "r");
+ if (!f) return -1;
+
+ while (1) {
+ if (!fgets(buf, sizeof(buf), f))
+ break;
+
+ ret = sscanf(buf, "%lx-%lx", &from, &to);
+ if (ret == 2)
+ in_mapping = from <= addr && addr < to;
+
+ if (in_mapping && !memcmp(buf, "Shared_Dirty:", 13)) {
+ sscanf(buf, "%*s %d", &val);
+ /* If parsing fails, we remain with val == -1 */
+ break;
+ }
+ }
+
+ fclose(f);
+ return val;
+}
+
+/* Older arm64 Linux kernels have a bug that could lead to data corruption
+ * during background save in certain scenarios. This function checks if the
+ * kernel is affected.
+ * The bug was fixed in commit ff1712f953e27f0b0718762ec17d0adb15c9fd0b
+ * titled: "arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect()"
+ */
+int checkLinuxMadvFreeForkBug(sds *error_msg) {
+ int ret, pipefd[2] = { -1, -1 };
+ pid_t pid;
+ char *p = NULL, *q;
+ int res = 1;
+ long page_size = sysconf(_SC_PAGESIZE);
+ long map_size = 3 * page_size;
+
+ /* Create a memory map that's in our full control (not one used by the allocator). */
+ p = mmap(NULL, map_size, PROT_READ, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
+ if (p == MAP_FAILED) {
+ return 0;
+ }
+
+ q = p + page_size;
+
+ /* Split the memory map in 3 pages by setting their protection as RO|RW|RO to prevent
+ * Linux from merging this memory map with adjacent VMAs. */
+ ret = mprotect(q, page_size, PROT_READ | PROT_WRITE);
+ if (ret < 0) {
+ res = 0;
+ goto exit;
+ }
+
+ /* Write to the page once to make it resident */
+ *(volatile char*)q = 0;
+
+ /* Tell the kernel that this page is free to be reclaimed. */
+#ifndef MADV_FREE
+#define MADV_FREE 8
+#endif
+ ret = madvise(q, page_size, MADV_FREE);
+ if (ret < 0) {
+ /* MADV_FREE is not available on older kernels that are presumably
+ * not affected. */
+ if (errno == EINVAL) goto exit;
+
+ res = 0;
+ goto exit;
+ }
+
+ /* Write to the page after being marked for freeing, this is supposed to take
+ * ownership of that page again. */
+ *(volatile char*)q = 0;
+
+ /* Create a pipe for the child to return the info to the parent. */
+ ret = anetPipe(pipefd, 0, 0);
+ if (ret < 0) {
+ res = 0;
+ goto exit;
+ }
+
+ /* Fork the process. */
+ pid = fork();
+ if (pid < 0) {
+ res = 0;
+ goto exit;
+ } else if (!pid) {
+ /* Child: check if the page is marked as dirty, page_size in kb.
+ * A value of 0 means the kernel is affected by the bug. */
+ ret = smapsGetSharedDirty((unsigned long) q);
+ if (!ret)
+ res = -1;
+ else if (ret == -1) /* Failed to read */
+ res = 0;
+
+ ret = write(pipefd[1], &res, sizeof(res)); /* Assume success, ignore return value*/
+ exit(0);
+ } else {
+ /* Read the result from the child. */
+ ret = read(pipefd[0], &res, sizeof(res));
+ if (ret < 0) {
+ res = 0;
+ }
+
+ /* Reap the child pid. */
+ waitpid(pid, NULL, 0);
+ }
+
+exit:
+ /* Cleanup */
+ if (pipefd[0] != -1) close(pipefd[0]);
+ if (pipefd[1] != -1) close(pipefd[1]);
+ if (p != NULL) munmap(p, map_size);
+
+ if (res == -1)
+ *error_msg = sdsnew(
+ "Your kernel has a bug that could lead to data corruption during background save. "
+ "Please upgrade to the latest stable kernel.");
+
+ return res;
+}
+#endif /* __arm64__ */
+#endif /* __linux__ */
+
+/*
+ * Standard system check interface:
+ * Each check has a name `name` and a functions pointer `check_fn`.
+ * `check_fn` should return:
+ * -1 in case the check fails.
+ * 1 in case the check passes.
+ * 0 in case the check could not be completed (usually because of some unexpected failed system call).
+ * When (and only when) the check fails and -1 is returned and error description is places in a new sds pointer to by
+ * the single `sds*` argument to `check_fn`. This message should be freed by the caller via `sdsfree()`.
+ */
+typedef struct {
+ const char *name;
+ int (*check_fn)(sds*);
+} check;
+
+check checks[] = {
+#ifdef __linux__
+ {.name = "slow-clocksource", .check_fn = checkClocksource},
+ {.name = "xen-clocksource", .check_fn = checkXenClocksource},
+ {.name = "overcommit", .check_fn = checkOvercommit},
+ {.name = "THP", .check_fn = checkTHPEnabled},
+#ifdef __arm64__
+ {.name = "madvise-free-fork-bug", .check_fn = checkLinuxMadvFreeForkBug},
+#endif
+#endif
+ {.name = NULL, .check_fn = NULL}
+};
+
+/* Performs various system checks, returns 0 if any check fails, 1 otherwise. */
+int syscheck(void) {
+ check *cur_check = checks;
+ int ret = 1;
+ sds err_msg = NULL;
+ while (cur_check->check_fn) {
+ int res = cur_check->check_fn(&err_msg);
+ printf("[%s]...", cur_check->name);
+ if (res == 0) {
+ printf("skipped\n");
+ } else if (res == 1) {
+ printf("OK\n");
+ } else {
+ printf("WARNING:\n");
+ printf("%s\n", err_msg);
+ sdsfree(err_msg);
+ ret = 0;
+ }
+ cur_check++;
+ }
+
+ return ret;
+}