ebpf_dcstat.c 41 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_dcstat.h"
  4. static char *dcstat_counter_dimension_name[NETDATA_DCSTAT_IDX_END] = { "ratio", "reference", "slow", "miss" };
  5. static netdata_syscall_stat_t dcstat_counter_aggregated_data[NETDATA_DCSTAT_IDX_END];
  6. static netdata_publish_syscall_t dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_END];
  7. netdata_dcstat_pid_t *dcstat_vector = NULL;
  8. static netdata_idx_t dcstat_hash_values[NETDATA_DCSTAT_IDX_END];
  9. static netdata_idx_t *dcstat_values = NULL;
  10. struct config dcstat_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. ebpf_local_maps_t dcstat_maps[] = {{.name = "dcstat_global", .internal_input = NETDATA_DIRECTORY_CACHE_END,
  16. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  17. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  18. {.name = "dcstat_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  19. .user_input = 0,
  20. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  21. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  22. {.name = "dcstat_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  23. .user_input = 0,
  24. .type = NETDATA_EBPF_MAP_CONTROLLER,
  25. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  26. {.name = NULL, .internal_input = 0, .user_input = 0,
  27. .type = NETDATA_EBPF_MAP_CONTROLLER,
  28. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  29. static ebpf_specify_name_t dc_optional_name[] = { {.program_name = "netdata_lookup_fast",
  30. .function_to_attach = "lookup_fast",
  31. .optional = NULL,
  32. .retprobe = CONFIG_BOOLEAN_NO},
  33. {.program_name = NULL}};
  34. netdata_ebpf_targets_t dc_targets[] = { {.name = "lookup_fast", .mode = EBPF_LOAD_TRAMPOLINE},
  35. {.name = "d_lookup", .mode = EBPF_LOAD_TRAMPOLINE},
  36. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  37. #ifdef LIBBPF_MAJOR_VERSION
  38. /**
  39. * Disable probe
  40. *
  41. * Disable all probes to use exclusively another method.
  42. *
  43. * @param obj is the main structure for bpf objects
  44. */
  45. static inline void ebpf_dc_disable_probes(struct dc_bpf *obj)
  46. {
  47. bpf_program__set_autoload(obj->progs.netdata_lookup_fast_kprobe, false);
  48. bpf_program__set_autoload(obj->progs.netdata_d_lookup_kretprobe, false);
  49. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_kprobe, false);
  50. }
  51. /*
  52. * Disable trampoline
  53. *
  54. * Disable all trampoline to use exclusively another method.
  55. *
  56. * @param obj is the main structure for bpf objects.
  57. */
  58. static inline void ebpf_dc_disable_trampoline(struct dc_bpf *obj)
  59. {
  60. bpf_program__set_autoload(obj->progs.netdata_lookup_fast_fentry, false);
  61. bpf_program__set_autoload(obj->progs.netdata_d_lookup_fexit, false);
  62. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_fentry, false);
  63. }
  64. /**
  65. * Set trampoline target
  66. *
  67. * Set the targets we will monitor.
  68. *
  69. * @param obj is the main structure for bpf objects.
  70. */
  71. static void ebpf_dc_set_trampoline_target(struct dc_bpf *obj)
  72. {
  73. bpf_program__set_attach_target(obj->progs.netdata_lookup_fast_fentry, 0,
  74. dc_targets[NETDATA_DC_TARGET_LOOKUP_FAST].name);
  75. bpf_program__set_attach_target(obj->progs.netdata_d_lookup_fexit, 0,
  76. dc_targets[NETDATA_DC_TARGET_D_LOOKUP].name);
  77. bpf_program__set_attach_target(obj->progs.netdata_dcstat_release_task_fentry, 0,
  78. EBPF_COMMON_FNCT_CLEAN_UP);
  79. }
  80. /**
  81. * Mount Attach Probe
  82. *
  83. * Attach probes to target
  84. *
  85. * @param obj is the main structure for bpf objects.
  86. *
  87. * @return It returns 0 on success and -1 otherwise.
  88. */
  89. static int ebpf_dc_attach_probes(struct dc_bpf *obj)
  90. {
  91. obj->links.netdata_d_lookup_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_d_lookup_kretprobe,
  92. true,
  93. dc_targets[NETDATA_DC_TARGET_D_LOOKUP].name);
  94. int ret = libbpf_get_error(obj->links.netdata_d_lookup_kretprobe);
  95. if (ret)
  96. return -1;
  97. char *lookup_name = (dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional) ?
  98. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional :
  99. dc_targets[NETDATA_DC_TARGET_LOOKUP_FAST].name ;
  100. obj->links.netdata_lookup_fast_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_lookup_fast_kprobe,
  101. false,
  102. lookup_name);
  103. ret = libbpf_get_error(obj->links.netdata_lookup_fast_kprobe);
  104. if (ret)
  105. return -1;
  106. obj->links.netdata_dcstat_release_task_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_dcstat_release_task_kprobe,
  107. false,
  108. EBPF_COMMON_FNCT_CLEAN_UP);
  109. ret = libbpf_get_error(obj->links.netdata_dcstat_release_task_kprobe);
  110. if (ret)
  111. return -1;
  112. return 0;
  113. }
  114. /**
  115. * Adjust Map Size
  116. *
  117. * Resize maps according input from users.
  118. *
  119. * @param obj is the main structure for bpf objects.
  120. * @param em structure with configuration
  121. */
  122. static void ebpf_dc_adjust_map_size(struct dc_bpf *obj, ebpf_module_t *em)
  123. {
  124. ebpf_update_map_size(obj->maps.dcstat_pid, &dcstat_maps[NETDATA_DCSTAT_PID_STATS],
  125. em, bpf_map__name(obj->maps.dcstat_pid));
  126. }
  127. /**
  128. * Set hash tables
  129. *
  130. * Set the values for maps according the value given by kernel.
  131. *
  132. * @param obj is the main structure for bpf objects.
  133. */
  134. static void ebpf_dc_set_hash_tables(struct dc_bpf *obj)
  135. {
  136. dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS].map_fd = bpf_map__fd(obj->maps.dcstat_global);
  137. dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd = bpf_map__fd(obj->maps.dcstat_pid);
  138. dcstat_maps[NETDATA_DCSTAT_CTRL].map_fd = bpf_map__fd(obj->maps.dcstat_ctrl);
  139. }
  140. /**
  141. * Update Load
  142. *
  143. * For directory cache, some distributions change the function name, and we do not have condition to use
  144. * TRAMPOLINE like other functions.
  145. *
  146. * @param em structure with configuration
  147. *
  148. * @return When then symbols were not modified, it returns TRAMPOLINE, else it returns RETPROBE.
  149. */
  150. netdata_ebpf_program_loaded_t ebpf_dc_update_load(ebpf_module_t *em)
  151. {
  152. if (!strcmp(dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional,
  153. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].function_to_attach))
  154. return EBPF_LOAD_TRAMPOLINE;
  155. if (em->targets[NETDATA_DC_TARGET_LOOKUP_FAST].mode != EBPF_LOAD_RETPROBE)
  156. info("When your kernel was compiled the symbol %s was modified, instead to use `trampoline`, the plugin will use `probes`.",
  157. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].function_to_attach);
  158. return EBPF_LOAD_RETPROBE;
  159. }
  160. /**
  161. * Disable Release Task
  162. *
  163. * Disable release task when apps is not enabled.
  164. *
  165. * @param obj is the main structure for bpf objects.
  166. */
  167. static void ebpf_dc_disable_release_task(struct dc_bpf *obj)
  168. {
  169. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_kprobe, false);
  170. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_fentry, false);
  171. }
  172. /**
  173. * Load and attach
  174. *
  175. * Load and attach the eBPF code in kernel.
  176. *
  177. * @param obj is the main structure for bpf objects.
  178. * @param em structure with configuration
  179. *
  180. * @return it returns 0 on success and -1 otherwise
  181. */
  182. static inline int ebpf_dc_load_and_attach(struct dc_bpf *obj, ebpf_module_t *em)
  183. {
  184. netdata_ebpf_program_loaded_t test = ebpf_dc_update_load(em);
  185. if (test == EBPF_LOAD_TRAMPOLINE) {
  186. ebpf_dc_disable_probes(obj);
  187. ebpf_dc_set_trampoline_target(obj);
  188. } else {
  189. ebpf_dc_disable_trampoline(obj);
  190. }
  191. ebpf_dc_adjust_map_size(obj, em);
  192. if (!em->apps_charts && !em->cgroup_charts)
  193. ebpf_dc_disable_release_task(obj);
  194. int ret = dc_bpf__load(obj);
  195. if (ret) {
  196. return ret;
  197. }
  198. ret = (test == EBPF_LOAD_TRAMPOLINE) ? dc_bpf__attach(obj) : ebpf_dc_attach_probes(obj);
  199. if (!ret) {
  200. ebpf_dc_set_hash_tables(obj);
  201. ebpf_update_controller(dcstat_maps[NETDATA_DCSTAT_CTRL].map_fd, em);
  202. }
  203. return ret;
  204. }
  205. #endif
  206. /*****************************************************************
  207. *
  208. * COMMON FUNCTIONS
  209. *
  210. *****************************************************************/
  211. /**
  212. * Update publish
  213. *
  214. * Update publish values before to write dimension.
  215. *
  216. * @param out structure that will receive data.
  217. * @param cache_access number of access to directory cache.
  218. * @param not_found number of files not found on the file system
  219. */
  220. void dcstat_update_publish(netdata_publish_dcstat_t *out, uint64_t cache_access, uint64_t not_found)
  221. {
  222. NETDATA_DOUBLE successful_access = (NETDATA_DOUBLE) (((long long)cache_access) - ((long long)not_found));
  223. NETDATA_DOUBLE ratio = (cache_access) ? successful_access/(NETDATA_DOUBLE)cache_access : 0;
  224. out->ratio = (long long )(ratio*100);
  225. }
  226. /*****************************************************************
  227. *
  228. * FUNCTIONS TO CLOSE THE THREAD
  229. *
  230. *****************************************************************/
  231. /**
  232. * Clean names
  233. *
  234. * Clean the optional names allocated during startup.
  235. */
  236. void ebpf_dcstat_clean_names()
  237. {
  238. size_t i = 0;
  239. while (dc_optional_name[i].program_name) {
  240. freez(dc_optional_name[i].optional);
  241. i++;
  242. }
  243. }
  244. /**
  245. * DCstat Free
  246. *
  247. * Cleanup variables after child threads to stop
  248. *
  249. * @param ptr thread data.
  250. */
  251. static void ebpf_dcstat_free(ebpf_module_t *em )
  252. {
  253. pthread_mutex_lock(&ebpf_exit_cleanup);
  254. em->enabled = NETDATA_THREAD_EBPF_STOPPING;
  255. pthread_mutex_unlock(&ebpf_exit_cleanup);
  256. freez(dcstat_vector);
  257. freez(dcstat_values);
  258. ebpf_dcstat_clean_names();
  259. pthread_mutex_lock(&ebpf_exit_cleanup);
  260. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  261. pthread_mutex_unlock(&ebpf_exit_cleanup);
  262. }
  263. /**
  264. * DCstat exit
  265. *
  266. * Cancel child and exit.
  267. *
  268. * @param ptr thread data.
  269. */
  270. static void ebpf_dcstat_exit(void *ptr)
  271. {
  272. ebpf_module_t *em = (ebpf_module_t *)ptr;
  273. ebpf_dcstat_free(em);
  274. }
  275. /*****************************************************************
  276. *
  277. * APPS
  278. *
  279. *****************************************************************/
  280. /**
  281. * Create apps charts
  282. *
  283. * Call ebpf_create_chart to create the charts on apps submenu.
  284. *
  285. * @param em a pointer to the structure with the default values.
  286. */
  287. void ebpf_dcstat_create_apps_charts(struct ebpf_module *em, void *ptr)
  288. {
  289. struct ebpf_target *root = ptr;
  290. ebpf_create_charts_on_apps(NETDATA_DC_HIT_CHART,
  291. "Percentage of files inside directory cache",
  292. EBPF_COMMON_DIMENSION_PERCENTAGE,
  293. NETDATA_DIRECTORY_CACHE_SUBMENU,
  294. NETDATA_EBPF_CHART_TYPE_LINE,
  295. 20100,
  296. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  297. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  298. ebpf_create_charts_on_apps(NETDATA_DC_REFERENCE_CHART,
  299. "Count file access",
  300. EBPF_COMMON_DIMENSION_FILES,
  301. NETDATA_DIRECTORY_CACHE_SUBMENU,
  302. NETDATA_EBPF_CHART_TYPE_STACKED,
  303. 20101,
  304. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  305. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  306. ebpf_create_charts_on_apps(NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  307. "Files not present inside directory cache",
  308. EBPF_COMMON_DIMENSION_FILES,
  309. NETDATA_DIRECTORY_CACHE_SUBMENU,
  310. NETDATA_EBPF_CHART_TYPE_STACKED,
  311. 20102,
  312. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  313. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  314. ebpf_create_charts_on_apps(NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  315. "Files not found",
  316. EBPF_COMMON_DIMENSION_FILES,
  317. NETDATA_DIRECTORY_CACHE_SUBMENU,
  318. NETDATA_EBPF_CHART_TYPE_STACKED,
  319. 20103,
  320. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  321. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  322. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  323. }
  324. /*****************************************************************
  325. *
  326. * MAIN LOOP
  327. *
  328. *****************************************************************/
  329. /**
  330. * Apps Accumulator
  331. *
  332. * Sum all values read from kernel and store in the first address.
  333. *
  334. * @param out the vector with read values.
  335. */
  336. static void dcstat_apps_accumulator(netdata_dcstat_pid_t *out)
  337. {
  338. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  339. netdata_dcstat_pid_t *total = &out[0];
  340. for (i = 1; i < end; i++) {
  341. netdata_dcstat_pid_t *w = &out[i];
  342. total->cache_access += w->cache_access;
  343. total->file_system += w->file_system;
  344. total->not_found += w->not_found;
  345. }
  346. }
  347. /**
  348. * Save PID values
  349. *
  350. * Save the current values inside the structure
  351. *
  352. * @param out vector used to plot charts
  353. * @param publish vector with values read from hash tables.
  354. */
  355. static inline void dcstat_save_pid_values(netdata_publish_dcstat_t *out, netdata_dcstat_pid_t *publish)
  356. {
  357. memcpy(&out->curr, &publish[0], sizeof(netdata_dcstat_pid_t));
  358. }
  359. /**
  360. * Fill PID
  361. *
  362. * Fill PID structures
  363. *
  364. * @param current_pid pid that we are collecting data
  365. * @param out values read from hash tables;
  366. */
  367. static void dcstat_fill_pid(uint32_t current_pid, netdata_dcstat_pid_t *publish)
  368. {
  369. netdata_publish_dcstat_t *curr = dcstat_pid[current_pid];
  370. if (!curr) {
  371. curr = ebpf_publish_dcstat_get();
  372. dcstat_pid[current_pid] = curr;
  373. }
  374. dcstat_save_pid_values(curr, publish);
  375. }
  376. /**
  377. * Read APPS table
  378. *
  379. * Read the apps table and store data inside the structure.
  380. */
  381. static void read_apps_table()
  382. {
  383. netdata_dcstat_pid_t *cv = dcstat_vector;
  384. uint32_t key;
  385. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  386. int fd = dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd;
  387. size_t length = sizeof(netdata_dcstat_pid_t)*ebpf_nprocs;
  388. while (pids) {
  389. key = pids->pid;
  390. if (bpf_map_lookup_elem(fd, &key, cv)) {
  391. pids = pids->next;
  392. continue;
  393. }
  394. dcstat_apps_accumulator(cv);
  395. dcstat_fill_pid(key, cv);
  396. // We are cleaning to avoid passing data read from one process to other.
  397. memset(cv, 0, length);
  398. pids = pids->next;
  399. }
  400. }
  401. /**
  402. * Update cgroup
  403. *
  404. * Update cgroup data based in
  405. */
  406. static void ebpf_update_dc_cgroup()
  407. {
  408. netdata_dcstat_pid_t *cv = dcstat_vector;
  409. int fd = dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd;
  410. size_t length = sizeof(netdata_dcstat_pid_t)*ebpf_nprocs;
  411. ebpf_cgroup_target_t *ect;
  412. pthread_mutex_lock(&mutex_cgroup_shm);
  413. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  414. struct pid_on_target2 *pids;
  415. for (pids = ect->pids; pids; pids = pids->next) {
  416. int pid = pids->pid;
  417. netdata_dcstat_pid_t *out = &pids->dc;
  418. if (likely(dcstat_pid) && dcstat_pid[pid]) {
  419. netdata_publish_dcstat_t *in = dcstat_pid[pid];
  420. memcpy(out, &in->curr, sizeof(netdata_dcstat_pid_t));
  421. } else {
  422. memset(cv, 0, length);
  423. if (bpf_map_lookup_elem(fd, &pid, cv)) {
  424. continue;
  425. }
  426. dcstat_apps_accumulator(cv);
  427. memcpy(out, cv, sizeof(netdata_dcstat_pid_t));
  428. }
  429. }
  430. }
  431. pthread_mutex_unlock(&mutex_cgroup_shm);
  432. }
  433. /**
  434. * Read global table
  435. *
  436. * Read the table with number of calls for all functions
  437. */
  438. static void ebpf_dc_read_global_table()
  439. {
  440. uint32_t idx;
  441. netdata_idx_t *val = dcstat_hash_values;
  442. netdata_idx_t *stored = dcstat_values;
  443. int fd = dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS].map_fd;
  444. for (idx = NETDATA_KEY_DC_REFERENCE; idx < NETDATA_DIRECTORY_CACHE_END; idx++) {
  445. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  446. int i;
  447. int end = ebpf_nprocs;
  448. netdata_idx_t total = 0;
  449. for (i = 0; i < end; i++)
  450. total += stored[i];
  451. val[idx] = total;
  452. }
  453. }
  454. }
  455. /**
  456. * Cachestat sum PIDs
  457. *
  458. * Sum values for all PIDs associated to a group
  459. *
  460. * @param publish output structure.
  461. * @param root structure with listed IPs
  462. */
  463. void ebpf_dcstat_sum_pids(netdata_publish_dcstat_t *publish, struct ebpf_pid_on_target *root)
  464. {
  465. memset(&publish->curr, 0, sizeof(netdata_dcstat_pid_t));
  466. netdata_dcstat_pid_t *dst = &publish->curr;
  467. while (root) {
  468. int32_t pid = root->pid;
  469. netdata_publish_dcstat_t *w = dcstat_pid[pid];
  470. if (w) {
  471. netdata_dcstat_pid_t *src = &w->curr;
  472. dst->cache_access += src->cache_access;
  473. dst->file_system += src->file_system;
  474. dst->not_found += src->not_found;
  475. }
  476. root = root->next;
  477. }
  478. }
  479. /**
  480. * Send data to Netdata calling auxiliary functions.
  481. *
  482. * @param root the target list.
  483. */
  484. void ebpf_dcache_send_apps_data(struct ebpf_target *root)
  485. {
  486. struct ebpf_target *w;
  487. collected_number value;
  488. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_HIT_CHART);
  489. for (w = root; w; w = w->next) {
  490. if (unlikely(w->exposed && w->processes)) {
  491. ebpf_dcstat_sum_pids(&w->dcstat, w->root_pid);
  492. uint64_t cache = w->dcstat.curr.cache_access;
  493. uint64_t not_found = w->dcstat.curr.not_found;
  494. dcstat_update_publish(&w->dcstat, cache, not_found);
  495. value = (collected_number) w->dcstat.ratio;
  496. write_chart_dimension(w->name, value);
  497. }
  498. }
  499. write_end_chart();
  500. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REFERENCE_CHART);
  501. for (w = root; w; w = w->next) {
  502. if (unlikely(w->exposed && w->processes)) {
  503. if (w->dcstat.curr.cache_access < w->dcstat.prev.cache_access) {
  504. w->dcstat.prev.cache_access = 0;
  505. }
  506. w->dcstat.cache_access = (long long)w->dcstat.curr.cache_access - (long long)w->dcstat.prev.cache_access;
  507. value = (collected_number) w->dcstat.cache_access;
  508. write_chart_dimension(w->name, value);
  509. w->dcstat.prev.cache_access = w->dcstat.curr.cache_access;
  510. }
  511. }
  512. write_end_chart();
  513. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  514. for (w = root; w; w = w->next) {
  515. if (unlikely(w->exposed && w->processes)) {
  516. if (w->dcstat.curr.file_system < w->dcstat.prev.file_system) {
  517. w->dcstat.prev.file_system = 0;
  518. }
  519. value = (collected_number) (!w->dcstat.cache_access) ? 0 :
  520. (long long )w->dcstat.curr.file_system - (long long)w->dcstat.prev.file_system;
  521. write_chart_dimension(w->name, value);
  522. w->dcstat.prev.file_system = w->dcstat.curr.file_system;
  523. }
  524. }
  525. write_end_chart();
  526. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  527. for (w = root; w; w = w->next) {
  528. if (unlikely(w->exposed && w->processes)) {
  529. if (w->dcstat.curr.not_found < w->dcstat.prev.not_found) {
  530. w->dcstat.prev.not_found = 0;
  531. }
  532. value = (collected_number) (!w->dcstat.cache_access) ? 0 :
  533. (long long)w->dcstat.curr.not_found - (long long)w->dcstat.prev.not_found;
  534. write_chart_dimension(w->name, value);
  535. w->dcstat.prev.not_found = w->dcstat.curr.not_found;
  536. }
  537. }
  538. write_end_chart();
  539. }
  540. /**
  541. * Send global
  542. *
  543. * Send global charts to Netdata
  544. */
  545. static void dcstat_send_global(netdata_publish_dcstat_t *publish)
  546. {
  547. dcstat_update_publish(publish, dcstat_hash_values[NETDATA_KEY_DC_REFERENCE],
  548. dcstat_hash_values[NETDATA_KEY_DC_MISS]);
  549. netdata_publish_syscall_t *ptr = dcstat_counter_publish_aggregated;
  550. netdata_idx_t value = dcstat_hash_values[NETDATA_KEY_DC_REFERENCE];
  551. if (value != ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall) {
  552. ptr[NETDATA_DCSTAT_IDX_REFERENCE].ncall = value - ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall;
  553. ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall = value;
  554. value = dcstat_hash_values[NETDATA_KEY_DC_SLOW];
  555. ptr[NETDATA_DCSTAT_IDX_SLOW].ncall = value - ptr[NETDATA_DCSTAT_IDX_SLOW].pcall;
  556. ptr[NETDATA_DCSTAT_IDX_SLOW].pcall = value;
  557. value = dcstat_hash_values[NETDATA_KEY_DC_MISS];
  558. ptr[NETDATA_DCSTAT_IDX_MISS].ncall = value - ptr[NETDATA_DCSTAT_IDX_MISS].pcall;
  559. ptr[NETDATA_DCSTAT_IDX_MISS].pcall = value;
  560. } else {
  561. ptr[NETDATA_DCSTAT_IDX_REFERENCE].ncall = 0;
  562. ptr[NETDATA_DCSTAT_IDX_SLOW].ncall = 0;
  563. ptr[NETDATA_DCSTAT_IDX_MISS].ncall = 0;
  564. }
  565. ebpf_one_dimension_write_charts(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_HIT_CHART,
  566. ptr[NETDATA_DCSTAT_IDX_RATIO].dimension, publish->ratio);
  567. write_count_chart(
  568. NETDATA_DC_REFERENCE_CHART, NETDATA_FILESYSTEM_FAMILY,
  569. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 3);
  570. }
  571. /**
  572. * Create specific directory cache charts
  573. *
  574. * Create charts for cgroup/application.
  575. *
  576. * @param type the chart type.
  577. * @param update_every value to overwrite the update frequency set by the server.
  578. */
  579. static void ebpf_create_specific_dc_charts(char *type, int update_every)
  580. {
  581. ebpf_create_chart(type, NETDATA_DC_HIT_CHART, "Percentage of files inside directory cache",
  582. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  583. NETDATA_CGROUP_DC_HIT_RATIO_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  584. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5700,
  585. ebpf_create_global_dimension,
  586. dcstat_counter_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  587. ebpf_create_chart(type, NETDATA_DC_REFERENCE_CHART, "Count file access",
  588. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  589. NETDATA_CGROUP_DC_REFERENCE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  590. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5701,
  591. ebpf_create_global_dimension,
  592. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 1,
  593. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  594. ebpf_create_chart(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  595. "Files not present inside directory cache",
  596. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  597. NETDATA_CGROUP_DC_NOT_CACHE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  598. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5702,
  599. ebpf_create_global_dimension,
  600. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_SLOW], 1,
  601. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  602. ebpf_create_chart(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  603. "Files not found",
  604. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  605. NETDATA_CGROUP_DC_NOT_FOUND_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  606. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5703,
  607. ebpf_create_global_dimension,
  608. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_MISS], 1,
  609. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  610. }
  611. /**
  612. * Obsolete specific directory cache charts
  613. *
  614. * Obsolete charts for cgroup/application.
  615. *
  616. * @param type the chart type.
  617. * @param update_every value to overwrite the update frequency set by the server.
  618. */
  619. static void ebpf_obsolete_specific_dc_charts(char *type, int update_every)
  620. {
  621. ebpf_write_chart_obsolete(type, NETDATA_DC_HIT_CHART,
  622. "Percentage of files inside directory cache",
  623. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  624. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_HIT_RATIO_CONTEXT,
  625. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5700, update_every);
  626. ebpf_write_chart_obsolete(type, NETDATA_DC_REFERENCE_CHART,
  627. "Count file access",
  628. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  629. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_REFERENCE_CONTEXT,
  630. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5701, update_every);
  631. ebpf_write_chart_obsolete(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  632. "Files not present inside directory cache",
  633. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  634. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_NOT_CACHE_CONTEXT,
  635. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5702, update_every);
  636. ebpf_write_chart_obsolete(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  637. "Files not found",
  638. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  639. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_NOT_FOUND_CONTEXT,
  640. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5703, update_every);
  641. }
  642. /**
  643. * Cachestat sum PIDs
  644. *
  645. * Sum values for all PIDs associated to a group
  646. *
  647. * @param publish output structure.
  648. * @param root structure with listed IPs
  649. */
  650. void ebpf_dc_sum_cgroup_pids(netdata_publish_dcstat_t *publish, struct pid_on_target2 *root)
  651. {
  652. memset(&publish->curr, 0, sizeof(netdata_dcstat_pid_t));
  653. netdata_dcstat_pid_t *dst = &publish->curr;
  654. while (root) {
  655. netdata_dcstat_pid_t *src = &root->dc;
  656. dst->cache_access += src->cache_access;
  657. dst->file_system += src->file_system;
  658. dst->not_found += src->not_found;
  659. root = root->next;
  660. }
  661. }
  662. /**
  663. * Calc chart values
  664. *
  665. * Do necessary math to plot charts.
  666. */
  667. void ebpf_dc_calc_chart_values()
  668. {
  669. ebpf_cgroup_target_t *ect;
  670. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  671. ebpf_dc_sum_cgroup_pids(&ect->publish_dc, ect->pids);
  672. uint64_t cache = ect->publish_dc.curr.cache_access;
  673. uint64_t not_found = ect->publish_dc.curr.not_found;
  674. dcstat_update_publish(&ect->publish_dc, cache, not_found);
  675. ect->publish_dc.cache_access = (long long)ect->publish_dc.curr.cache_access -
  676. (long long)ect->publish_dc.prev.cache_access;
  677. ect->publish_dc.prev.cache_access = ect->publish_dc.curr.cache_access;
  678. if (ect->publish_dc.curr.not_found < ect->publish_dc.prev.not_found) {
  679. ect->publish_dc.prev.not_found = 0;
  680. }
  681. }
  682. }
  683. /**
  684. * Create Systemd directory cache Charts
  685. *
  686. * Create charts when systemd is enabled
  687. *
  688. * @param update_every value to overwrite the update frequency set by the server.
  689. **/
  690. static void ebpf_create_systemd_dc_charts(int update_every)
  691. {
  692. ebpf_create_charts_on_systemd(NETDATA_DC_HIT_CHART,
  693. "Percentage of files inside directory cache",
  694. EBPF_COMMON_DIMENSION_PERCENTAGE,
  695. NETDATA_DIRECTORY_CACHE_SUBMENU,
  696. NETDATA_EBPF_CHART_TYPE_LINE,
  697. 21200,
  698. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  699. NETDATA_SYSTEMD_DC_HIT_RATIO_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  700. update_every);
  701. ebpf_create_charts_on_systemd(NETDATA_DC_REFERENCE_CHART,
  702. "Count file access",
  703. EBPF_COMMON_DIMENSION_FILES,
  704. NETDATA_DIRECTORY_CACHE_SUBMENU,
  705. NETDATA_EBPF_CHART_TYPE_LINE,
  706. 21201,
  707. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  708. NETDATA_SYSTEMD_DC_REFERENCE_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  709. update_every);
  710. ebpf_create_charts_on_systemd(NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  711. "Files not present inside directory cache",
  712. EBPF_COMMON_DIMENSION_FILES,
  713. NETDATA_DIRECTORY_CACHE_SUBMENU,
  714. NETDATA_EBPF_CHART_TYPE_LINE,
  715. 21202,
  716. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  717. NETDATA_SYSTEMD_DC_NOT_CACHE_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  718. update_every);
  719. ebpf_create_charts_on_systemd(NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  720. "Files not found",
  721. EBPF_COMMON_DIMENSION_FILES,
  722. NETDATA_DIRECTORY_CACHE_SUBMENU,
  723. NETDATA_EBPF_CHART_TYPE_LINE,
  724. 21202,
  725. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  726. NETDATA_SYSTEMD_DC_NOT_FOUND_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  727. update_every);
  728. }
  729. /**
  730. * Send Directory Cache charts
  731. *
  732. * Send collected data to Netdata.
  733. */
  734. static void ebpf_send_systemd_dc_charts()
  735. {
  736. collected_number value;
  737. ebpf_cgroup_target_t *ect;
  738. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_HIT_CHART);
  739. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  740. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  741. write_chart_dimension(ect->name, (long long) ect->publish_dc.ratio);
  742. }
  743. }
  744. write_end_chart();
  745. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REFERENCE_CHART);
  746. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  747. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  748. write_chart_dimension(ect->name, (long long) ect->publish_dc.cache_access);
  749. }
  750. }
  751. write_end_chart();
  752. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  753. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  754. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  755. value = (collected_number) (!ect->publish_dc.cache_access) ? 0 :
  756. (long long )ect->publish_dc.curr.file_system - (long long)ect->publish_dc.prev.file_system;
  757. ect->publish_dc.prev.file_system = ect->publish_dc.curr.file_system;
  758. write_chart_dimension(ect->name, (long long) value);
  759. }
  760. }
  761. write_end_chart();
  762. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  763. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  764. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  765. value = (collected_number) (!ect->publish_dc.cache_access) ? 0 :
  766. (long long)ect->publish_dc.curr.not_found - (long long)ect->publish_dc.prev.not_found;
  767. ect->publish_dc.prev.not_found = ect->publish_dc.curr.not_found;
  768. write_chart_dimension(ect->name, (long long) value);
  769. }
  770. }
  771. write_end_chart();
  772. }
  773. /**
  774. * Send Directory Cache charts
  775. *
  776. * Send collected data to Netdata.
  777. *
  778. */
  779. static void ebpf_send_specific_dc_data(char *type, netdata_publish_dcstat_t *pdc)
  780. {
  781. collected_number value;
  782. write_begin_chart(type, NETDATA_DC_HIT_CHART);
  783. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_RATIO].name,
  784. (long long) pdc->ratio);
  785. write_end_chart();
  786. write_begin_chart(type, NETDATA_DC_REFERENCE_CHART);
  787. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE].name,
  788. (long long) pdc->cache_access);
  789. write_end_chart();
  790. value = (collected_number) (!pdc->cache_access) ? 0 :
  791. (long long )pdc->curr.file_system - (long long)pdc->prev.file_system;
  792. pdc->prev.file_system = pdc->curr.file_system;
  793. write_begin_chart(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  794. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_SLOW].name, (long long) value);
  795. write_end_chart();
  796. value = (collected_number) (!pdc->cache_access) ? 0 :
  797. (long long)pdc->curr.not_found - (long long)pdc->prev.not_found;
  798. pdc->prev.not_found = pdc->curr.not_found;
  799. write_begin_chart(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  800. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_MISS].name, (long long) value);
  801. write_end_chart();
  802. }
  803. /**
  804. * Send data to Netdata calling auxiliary functions.
  805. *
  806. * @param update_every value to overwrite the update frequency set by the server.
  807. */
  808. void ebpf_dc_send_cgroup_data(int update_every)
  809. {
  810. if (!ebpf_cgroup_pids)
  811. return;
  812. pthread_mutex_lock(&mutex_cgroup_shm);
  813. ebpf_cgroup_target_t *ect;
  814. ebpf_dc_calc_chart_values();
  815. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  816. if (has_systemd) {
  817. if (send_cgroup_chart) {
  818. ebpf_create_systemd_dc_charts(update_every);
  819. }
  820. ebpf_send_systemd_dc_charts();
  821. }
  822. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  823. if (ect->systemd)
  824. continue;
  825. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_DC_CHART) && ect->updated) {
  826. ebpf_create_specific_dc_charts(ect->name, update_every);
  827. ect->flags |= NETDATA_EBPF_CGROUP_HAS_DC_CHART;
  828. }
  829. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_DC_CHART) {
  830. if (ect->updated) {
  831. ebpf_send_specific_dc_data(ect->name, &ect->publish_dc);
  832. } else {
  833. ebpf_obsolete_specific_dc_charts(ect->name, update_every);
  834. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_DC_CHART;
  835. }
  836. }
  837. }
  838. pthread_mutex_unlock(&mutex_cgroup_shm);
  839. }
  840. /**
  841. * Main loop for this collector.
  842. */
  843. static void dcstat_collector(ebpf_module_t *em)
  844. {
  845. netdata_publish_dcstat_t publish;
  846. memset(&publish, 0, sizeof(publish));
  847. int cgroups = em->cgroup_charts;
  848. int update_every = em->update_every;
  849. heartbeat_t hb;
  850. heartbeat_init(&hb);
  851. int counter = update_every - 1;
  852. while (!ebpf_exit_plugin) {
  853. (void)heartbeat_next(&hb, USEC_PER_SEC);
  854. if (ebpf_exit_plugin || ++counter != update_every)
  855. continue;
  856. counter = 0;
  857. netdata_apps_integration_flags_t apps = em->apps_charts;
  858. ebpf_dc_read_global_table();
  859. pthread_mutex_lock(&collect_data_mutex);
  860. if (apps)
  861. read_apps_table();
  862. if (cgroups)
  863. ebpf_update_dc_cgroup();
  864. pthread_mutex_lock(&lock);
  865. dcstat_send_global(&publish);
  866. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  867. ebpf_dcache_send_apps_data(apps_groups_root_target);
  868. #ifdef NETDATA_DEV_MODE
  869. if (ebpf_aral_dcstat_pid)
  870. ebpf_send_data_aral_chart(ebpf_aral_dcstat_pid, em);
  871. #endif
  872. if (cgroups)
  873. ebpf_dc_send_cgroup_data(update_every);
  874. pthread_mutex_unlock(&lock);
  875. pthread_mutex_unlock(&collect_data_mutex);
  876. }
  877. }
  878. /*****************************************************************
  879. *
  880. * INITIALIZE THREAD
  881. *
  882. *****************************************************************/
  883. /**
  884. * Create filesystem charts
  885. *
  886. * Call ebpf_create_chart to create the charts for the collector.
  887. *
  888. * @param update_every value to overwrite the update frequency set by the server.
  889. */
  890. static void ebpf_create_filesystem_charts(int update_every)
  891. {
  892. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_HIT_CHART,
  893. "Percentage of files inside directory cache",
  894. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  895. NULL,
  896. NETDATA_EBPF_CHART_TYPE_LINE,
  897. 21200,
  898. ebpf_create_global_dimension,
  899. dcstat_counter_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  900. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_REFERENCE_CHART,
  901. "Variables used to calculate hit ratio.",
  902. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  903. NULL,
  904. NETDATA_EBPF_CHART_TYPE_LINE,
  905. 21201,
  906. ebpf_create_global_dimension,
  907. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 3,
  908. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  909. fflush(stdout);
  910. }
  911. /**
  912. * Allocate vectors used with this thread.
  913. *
  914. * We are not testing the return, because callocz does this and shutdown the software
  915. * case it was not possible to allocate.
  916. *
  917. * @param apps is apps enabled?
  918. */
  919. static void ebpf_dcstat_allocate_global_vectors(int apps)
  920. {
  921. if (apps) {
  922. ebpf_dcstat_aral_init();
  923. dcstat_pid = callocz((size_t)pid_max, sizeof(netdata_publish_dcstat_t *));
  924. dcstat_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_dcstat_pid_t));
  925. }
  926. dcstat_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  927. memset(dcstat_counter_aggregated_data, 0, NETDATA_DCSTAT_IDX_END * sizeof(netdata_syscall_stat_t));
  928. memset(dcstat_counter_publish_aggregated, 0, NETDATA_DCSTAT_IDX_END * sizeof(netdata_publish_syscall_t));
  929. }
  930. /*****************************************************************
  931. *
  932. * MAIN THREAD
  933. *
  934. *****************************************************************/
  935. /*
  936. * Load BPF
  937. *
  938. * Load BPF files.
  939. *
  940. * @param em the structure with configuration
  941. */
  942. static int ebpf_dcstat_load_bpf(ebpf_module_t *em)
  943. {
  944. int ret = 0;
  945. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_DC_TARGET_LOOKUP_FAST].mode);
  946. if (em->load & EBPF_LOAD_LEGACY) {
  947. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  948. if (!em->probe_links) {
  949. ret = -1;
  950. }
  951. }
  952. #ifdef LIBBPF_MAJOR_VERSION
  953. else {
  954. dc_bpf_obj = dc_bpf__open();
  955. if (!dc_bpf_obj)
  956. ret = -1;
  957. else
  958. ret = ebpf_dc_load_and_attach(dc_bpf_obj, em);
  959. }
  960. #endif
  961. if (ret)
  962. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  963. return ret;
  964. }
  965. /**
  966. * Directory Cache thread
  967. *
  968. * Thread used to make dcstat thread
  969. *
  970. * @param ptr a pointer to `struct ebpf_module`
  971. *
  972. * @return It always returns NULL
  973. */
  974. void *ebpf_dcstat_thread(void *ptr)
  975. {
  976. netdata_thread_cleanup_push(ebpf_dcstat_exit, ptr);
  977. ebpf_module_t *em = (ebpf_module_t *)ptr;
  978. em->maps = dcstat_maps;
  979. ebpf_update_pid_table(&dcstat_maps[NETDATA_DCSTAT_PID_STATS], em);
  980. ebpf_update_names(dc_optional_name, em);
  981. #ifdef LIBBPF_MAJOR_VERSION
  982. ebpf_adjust_thread_load(em, default_btf);
  983. #endif
  984. if (ebpf_dcstat_load_bpf(em)) {
  985. goto enddcstat;
  986. }
  987. ebpf_dcstat_allocate_global_vectors(em->apps_charts);
  988. int algorithms[NETDATA_DCSTAT_IDX_END] = {
  989. NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX,
  990. NETDATA_EBPF_ABSOLUTE_IDX
  991. };
  992. ebpf_global_labels(dcstat_counter_aggregated_data, dcstat_counter_publish_aggregated,
  993. dcstat_counter_dimension_name, dcstat_counter_dimension_name,
  994. algorithms, NETDATA_DCSTAT_IDX_END);
  995. pthread_mutex_lock(&lock);
  996. ebpf_create_filesystem_charts(em->update_every);
  997. ebpf_update_stats(&plugin_statistics, em);
  998. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps);
  999. #ifdef NETDATA_DEV_MODE
  1000. if (ebpf_aral_dcstat_pid)
  1001. ebpf_statistic_create_aral_chart(NETDATA_EBPF_DCSTAT_ARAL_NAME, em);
  1002. #endif
  1003. pthread_mutex_unlock(&lock);
  1004. dcstat_collector(em);
  1005. enddcstat:
  1006. ebpf_update_disabled_plugin_stats(em);
  1007. netdata_thread_cleanup_pop(1);
  1008. return NULL;
  1009. }