ebpf_fd.c 40 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_fd.h"
  4. static char *fd_dimension_names[NETDATA_FD_SYSCALL_END] = { "open", "close" };
  5. static char *fd_id_names[NETDATA_FD_SYSCALL_END] = { "do_sys_open", "__close_fd" };
  6. static char *close_targets[NETDATA_EBPF_MAX_FD_TARGETS] = {"close_fd", "__close_fd"};
  7. static char *open_targets[NETDATA_EBPF_MAX_FD_TARGETS] = {"do_sys_openat2", "do_sys_open"};
  8. static netdata_syscall_stat_t fd_aggregated_data[NETDATA_FD_SYSCALL_END];
  9. static netdata_publish_syscall_t fd_publish_aggregated[NETDATA_FD_SYSCALL_END];
  10. static ebpf_local_maps_t fd_maps[] = {{.name = "tbl_fd_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  11. .user_input = 0,
  12. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  13. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  14. {.name = "tbl_fd_global", .internal_input = NETDATA_KEY_END_VECTOR,
  15. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  16. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  17. {.name = "fd_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  18. .user_input = 0,
  19. .type = NETDATA_EBPF_MAP_CONTROLLER,
  20. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  21. {.name = NULL, .internal_input = 0, .user_input = 0,
  22. .type = NETDATA_EBPF_MAP_CONTROLLER,
  23. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  24. struct config fd_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  25. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  26. .rwlock = AVL_LOCK_INITIALIZER } };
  27. static netdata_idx_t fd_hash_values[NETDATA_FD_COUNTER];
  28. static netdata_idx_t *fd_values = NULL;
  29. netdata_fd_stat_t *fd_vector = NULL;
  30. netdata_fd_stat_t **fd_pid = NULL;
  31. netdata_ebpf_targets_t fd_targets[] = { {.name = "open", .mode = EBPF_LOAD_TRAMPOLINE},
  32. {.name = "close", .mode = EBPF_LOAD_TRAMPOLINE},
  33. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  34. #ifdef LIBBPF_MAJOR_VERSION
  35. #include "includes/fd.skel.h" // BTF code
  36. static struct fd_bpf *bpf_obj = NULL;
  37. /**
  38. * Disable probe
  39. *
  40. * Disable all probes to use exclusively another method.
  41. *
  42. * @param obj is the main structure for bpf objects
  43. */
  44. static inline void ebpf_fd_disable_probes(struct fd_bpf *obj)
  45. {
  46. bpf_program__set_autoload(obj->progs.netdata_sys_open_kprobe, false);
  47. bpf_program__set_autoload(obj->progs.netdata_sys_open_kretprobe, false);
  48. bpf_program__set_autoload(obj->progs.netdata_release_task_fd_kprobe, false);
  49. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  50. bpf_program__set_autoload(obj->progs.netdata___close_fd_kretprobe, false);
  51. bpf_program__set_autoload(obj->progs.netdata___close_fd_kprobe, false);
  52. bpf_program__set_autoload(obj->progs.netdata_close_fd_kprobe, false);
  53. } else {
  54. bpf_program__set_autoload(obj->progs.netdata___close_fd_kprobe, false);
  55. bpf_program__set_autoload(obj->progs.netdata_close_fd_kretprobe, false);
  56. bpf_program__set_autoload(obj->progs.netdata_close_fd_kprobe, false);
  57. }
  58. }
  59. /*
  60. * Disable specific probe
  61. *
  62. * Disable probes according the kernel version
  63. *
  64. * @param obj is the main structure for bpf objects
  65. */
  66. static inline void ebpf_disable_specific_probes(struct fd_bpf *obj)
  67. {
  68. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  69. bpf_program__set_autoload(obj->progs.netdata___close_fd_kretprobe, false);
  70. bpf_program__set_autoload(obj->progs.netdata___close_fd_kprobe, false);
  71. } else {
  72. bpf_program__set_autoload(obj->progs.netdata_close_fd_kretprobe, false);
  73. bpf_program__set_autoload(obj->progs.netdata_close_fd_kprobe, false);
  74. }
  75. }
  76. /*
  77. * Disable trampoline
  78. *
  79. * Disable all trampoline to use exclusively another method.
  80. *
  81. * @param obj is the main structure for bpf objects.
  82. */
  83. static inline void ebpf_disable_trampoline(struct fd_bpf *obj)
  84. {
  85. bpf_program__set_autoload(obj->progs.netdata_sys_open_fentry, false);
  86. bpf_program__set_autoload(obj->progs.netdata_sys_open_fexit, false);
  87. bpf_program__set_autoload(obj->progs.netdata_close_fd_fentry, false);
  88. bpf_program__set_autoload(obj->progs.netdata_close_fd_fexit, false);
  89. bpf_program__set_autoload(obj->progs.netdata___close_fd_fentry, false);
  90. bpf_program__set_autoload(obj->progs.netdata___close_fd_fexit, false);
  91. bpf_program__set_autoload(obj->progs.netdata_release_task_fd_fentry, false);
  92. }
  93. /*
  94. * Disable specific trampoline
  95. *
  96. * Disable trampoline according to kernel version.
  97. *
  98. * @param obj is the main structure for bpf objects.
  99. */
  100. static inline void ebpf_disable_specific_trampoline(struct fd_bpf *obj)
  101. {
  102. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  103. bpf_program__set_autoload(obj->progs.netdata___close_fd_fentry, false);
  104. bpf_program__set_autoload(obj->progs.netdata___close_fd_fexit, false);
  105. } else {
  106. bpf_program__set_autoload(obj->progs.netdata_close_fd_fentry, false);
  107. bpf_program__set_autoload(obj->progs.netdata_close_fd_fexit, false);
  108. }
  109. }
  110. /**
  111. * Set trampoline target
  112. *
  113. * Set the targets we will monitor.
  114. *
  115. * @param obj is the main structure for bpf objects.
  116. */
  117. static void ebpf_set_trampoline_target(struct fd_bpf *obj)
  118. {
  119. bpf_program__set_attach_target(obj->progs.netdata_sys_open_fentry, 0, fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  120. bpf_program__set_attach_target(obj->progs.netdata_sys_open_fexit, 0, fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  121. bpf_program__set_attach_target(obj->progs.netdata_release_task_fd_fentry, 0, EBPF_COMMON_FNCT_CLEAN_UP);
  122. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  123. bpf_program__set_attach_target(
  124. obj->progs.netdata_close_fd_fentry, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  125. bpf_program__set_attach_target(obj->progs.netdata_close_fd_fexit, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  126. } else {
  127. bpf_program__set_attach_target(
  128. obj->progs.netdata___close_fd_fentry, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  129. bpf_program__set_attach_target(
  130. obj->progs.netdata___close_fd_fexit, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  131. }
  132. }
  133. /**
  134. * Mount Attach Probe
  135. *
  136. * Attach probes to target
  137. *
  138. * @param obj is the main structure for bpf objects.
  139. *
  140. * @return It returns 0 on success and -1 otherwise.
  141. */
  142. static int ebpf_fd_attach_probe(struct fd_bpf *obj)
  143. {
  144. obj->links.netdata_sys_open_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_sys_open_kprobe, false,
  145. fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  146. int ret = libbpf_get_error(obj->links.netdata_sys_open_kprobe);
  147. if (ret)
  148. return -1;
  149. obj->links.netdata_sys_open_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_sys_open_kretprobe, true,
  150. fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  151. ret = libbpf_get_error(obj->links.netdata_sys_open_kretprobe);
  152. if (ret)
  153. return -1;
  154. obj->links.netdata_release_task_fd_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_release_task_fd_kprobe,
  155. false,
  156. EBPF_COMMON_FNCT_CLEAN_UP);
  157. ret = libbpf_get_error(obj->links.netdata_release_task_fd_kprobe);
  158. if (ret)
  159. return -1;
  160. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  161. obj->links.netdata_close_fd_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_close_fd_kretprobe, true,
  162. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  163. ret = libbpf_get_error(obj->links.netdata_close_fd_kretprobe);
  164. if (ret)
  165. return -1;
  166. obj->links.netdata_close_fd_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_close_fd_kprobe, false,
  167. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  168. ret = libbpf_get_error(obj->links.netdata_close_fd_kprobe);
  169. if (ret)
  170. return -1;
  171. } else {
  172. obj->links.netdata___close_fd_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata___close_fd_kretprobe,
  173. true,
  174. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  175. ret = libbpf_get_error(obj->links.netdata___close_fd_kretprobe);
  176. if (ret)
  177. return -1;
  178. obj->links.netdata___close_fd_kprobe = bpf_program__attach_kprobe(obj->progs.netdata___close_fd_kprobe,
  179. false,
  180. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  181. ret = libbpf_get_error(obj->links.netdata___close_fd_kprobe);
  182. if (ret)
  183. return -1;
  184. }
  185. return 0;
  186. }
  187. /**
  188. * FD Fill Address
  189. *
  190. * Fill address value used to load probes/trampoline.
  191. */
  192. static inline void ebpf_fd_fill_address(ebpf_addresses_t *address, char **targets)
  193. {
  194. int i;
  195. for (i = 0; i < NETDATA_EBPF_MAX_FD_TARGETS; i++) {
  196. address->function = targets[i];
  197. ebpf_load_addresses(address, -1);
  198. if (address->addr)
  199. break;
  200. }
  201. }
  202. /**
  203. * Set target values
  204. *
  205. * Set pointers used to load data.
  206. *
  207. * @return It returns 0 on success and -1 otherwise.
  208. */
  209. static int ebpf_fd_set_target_values()
  210. {
  211. ebpf_addresses_t address = {.function = NULL, .hash = 0, .addr = 0};
  212. ebpf_fd_fill_address(&address, close_targets);
  213. if (!address.addr)
  214. return -1;
  215. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name = address.function;
  216. address.addr = 0;
  217. ebpf_fd_fill_address(&address, open_targets);
  218. if (!address.addr)
  219. return -1;
  220. fd_targets[NETDATA_FD_SYSCALL_OPEN].name = address.function;
  221. return 0;
  222. }
  223. /**
  224. * Set hash tables
  225. *
  226. * Set the values for maps according the value given by kernel.
  227. *
  228. * @param obj is the main structure for bpf objects.
  229. */
  230. static void ebpf_fd_set_hash_tables(struct fd_bpf *obj)
  231. {
  232. fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd = bpf_map__fd(obj->maps.tbl_fd_global);
  233. fd_maps[NETDATA_FD_PID_STATS].map_fd = bpf_map__fd(obj->maps.tbl_fd_pid);
  234. fd_maps[NETDATA_FD_CONTROLLER].map_fd = bpf_map__fd(obj->maps.fd_ctrl);
  235. }
  236. /**
  237. * Adjust Map Size
  238. *
  239. * Resize maps according input from users.
  240. *
  241. * @param obj is the main structure for bpf objects.
  242. * @param em structure with configuration
  243. */
  244. static void ebpf_fd_adjust_map_size(struct fd_bpf *obj, ebpf_module_t *em)
  245. {
  246. ebpf_update_map_size(obj->maps.tbl_fd_pid, &fd_maps[NETDATA_FD_PID_STATS],
  247. em, bpf_map__name(obj->maps.tbl_fd_pid));
  248. }
  249. /**
  250. * Disable Release Task
  251. *
  252. * Disable release task when apps is not enabled.
  253. *
  254. * @param obj is the main structure for bpf objects.
  255. */
  256. static void ebpf_fd_disable_release_task(struct fd_bpf *obj)
  257. {
  258. bpf_program__set_autoload(obj->progs.netdata_release_task_fd_kprobe, false);
  259. bpf_program__set_autoload(obj->progs.netdata_release_task_fd_fentry, false);
  260. }
  261. /**
  262. * Load and attach
  263. *
  264. * Load and attach the eBPF code in kernel.
  265. *
  266. * @param obj is the main structure for bpf objects.
  267. * @param em structure with configuration
  268. *
  269. * @return it returns 0 on success and -1 otherwise
  270. */
  271. static inline int ebpf_fd_load_and_attach(struct fd_bpf *obj, ebpf_module_t *em)
  272. {
  273. netdata_ebpf_targets_t *mt = em->targets;
  274. netdata_ebpf_program_loaded_t test = mt[NETDATA_FD_SYSCALL_OPEN].mode;
  275. if (ebpf_fd_set_target_values()) {
  276. error("%s file descriptor.", NETDATA_EBPF_DEFAULT_FNT_NOT_FOUND);
  277. return -1;
  278. }
  279. if (test == EBPF_LOAD_TRAMPOLINE) {
  280. ebpf_fd_disable_probes(obj);
  281. ebpf_disable_specific_trampoline(obj);
  282. ebpf_set_trampoline_target(obj);
  283. // TODO: Remove this in next PR, because this specific trampoline has an error.
  284. bpf_program__set_autoload(obj->progs.netdata_release_task_fd_fentry, false);
  285. } else {
  286. ebpf_disable_trampoline(obj);
  287. ebpf_disable_specific_probes(obj);
  288. }
  289. ebpf_fd_adjust_map_size(obj, em);
  290. if (!em->apps_charts && !em->cgroup_charts)
  291. ebpf_fd_disable_release_task(obj);
  292. int ret = fd_bpf__load(obj);
  293. if (ret) {
  294. return ret;
  295. }
  296. ret = (test == EBPF_LOAD_TRAMPOLINE) ? fd_bpf__attach(obj) : ebpf_fd_attach_probe(obj);
  297. if (!ret) {
  298. ebpf_fd_set_hash_tables(obj);
  299. ebpf_update_controller(fd_maps[NETDATA_CACHESTAT_CTRL].map_fd, em);
  300. }
  301. return ret;
  302. }
  303. #endif
  304. /*****************************************************************
  305. *
  306. * FUNCTIONS TO CLOSE THE THREAD
  307. *
  308. *****************************************************************/
  309. /**
  310. * FD Free
  311. *
  312. * Cleanup variables after child threads to stop
  313. *
  314. * @param ptr thread data.
  315. */
  316. static void ebpf_fd_free(ebpf_module_t *em)
  317. {
  318. pthread_mutex_lock(&ebpf_exit_cleanup);
  319. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPING;
  320. pthread_mutex_unlock(&ebpf_exit_cleanup);
  321. ebpf_cleanup_publish_syscall(fd_publish_aggregated);
  322. freez(fd_values);
  323. freez(fd_vector);
  324. #ifdef LIBBPF_MAJOR_VERSION
  325. if (bpf_obj)
  326. fd_bpf__destroy(bpf_obj);
  327. #endif
  328. pthread_mutex_lock(&ebpf_exit_cleanup);
  329. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  330. pthread_mutex_unlock(&ebpf_exit_cleanup);
  331. }
  332. /**
  333. * FD Exit
  334. *
  335. * Cancel child thread and exit.
  336. *
  337. * @param ptr thread data.
  338. */
  339. static void ebpf_fd_exit(void *ptr)
  340. {
  341. ebpf_module_t *em = (ebpf_module_t *)ptr;
  342. ebpf_fd_free(em);
  343. }
  344. /*****************************************************************
  345. *
  346. * MAIN LOOP
  347. *
  348. *****************************************************************/
  349. /**
  350. * Send data to Netdata calling auxiliary functions.
  351. *
  352. * @param em the structure with thread information
  353. */
  354. static void ebpf_fd_send_data(ebpf_module_t *em)
  355. {
  356. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].ncall = fd_hash_values[NETDATA_KEY_CALLS_DO_SYS_OPEN];
  357. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].nerr = fd_hash_values[NETDATA_KEY_ERROR_DO_SYS_OPEN];
  358. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].ncall = fd_hash_values[NETDATA_KEY_CALLS_CLOSE_FD];
  359. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].nerr = fd_hash_values[NETDATA_KEY_ERROR_CLOSE_FD];
  360. write_count_chart(NETDATA_FILE_OPEN_CLOSE_COUNT, NETDATA_FILESYSTEM_FAMILY, fd_publish_aggregated,
  361. NETDATA_FD_SYSCALL_END);
  362. if (em->mode < MODE_ENTRY) {
  363. write_err_chart(NETDATA_FILE_OPEN_ERR_COUNT, NETDATA_FILESYSTEM_FAMILY,
  364. fd_publish_aggregated, NETDATA_FD_SYSCALL_END);
  365. }
  366. }
  367. /**
  368. * Read global counter
  369. *
  370. * Read the table with number of calls for all functions
  371. */
  372. static void ebpf_fd_read_global_table()
  373. {
  374. uint32_t idx;
  375. netdata_idx_t *val = fd_hash_values;
  376. netdata_idx_t *stored = fd_values;
  377. int fd = fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd;
  378. for (idx = NETDATA_KEY_CALLS_DO_SYS_OPEN; idx < NETDATA_FD_COUNTER; idx++) {
  379. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  380. int i;
  381. int end = ebpf_nprocs;
  382. netdata_idx_t total = 0;
  383. for (i = 0; i < end; i++)
  384. total += stored[i];
  385. val[idx] = total;
  386. }
  387. }
  388. }
  389. /**
  390. * Apps Accumulator
  391. *
  392. * Sum all values read from kernel and store in the first address.
  393. *
  394. * @param out the vector with read values.
  395. */
  396. static void fd_apps_accumulator(netdata_fd_stat_t *out)
  397. {
  398. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  399. netdata_fd_stat_t *total = &out[0];
  400. for (i = 1; i < end; i++) {
  401. netdata_fd_stat_t *w = &out[i];
  402. total->open_call += w->open_call;
  403. total->close_call += w->close_call;
  404. total->open_err += w->open_err;
  405. total->close_err += w->close_err;
  406. }
  407. }
  408. /**
  409. * Fill PID
  410. *
  411. * Fill PID structures
  412. *
  413. * @param current_pid pid that we are collecting data
  414. * @param out values read from hash tables;
  415. */
  416. static void fd_fill_pid(uint32_t current_pid, netdata_fd_stat_t *publish)
  417. {
  418. netdata_fd_stat_t *curr = fd_pid[current_pid];
  419. if (!curr) {
  420. curr = callocz(1, sizeof(netdata_fd_stat_t));
  421. fd_pid[current_pid] = curr;
  422. }
  423. memcpy(curr, &publish[0], sizeof(netdata_fd_stat_t));
  424. }
  425. /**
  426. * Read APPS table
  427. *
  428. * Read the apps table and store data inside the structure.
  429. */
  430. static void read_apps_table()
  431. {
  432. netdata_fd_stat_t *fv = fd_vector;
  433. uint32_t key;
  434. struct pid_stat *pids = root_of_pids;
  435. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  436. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  437. while (pids) {
  438. key = pids->pid;
  439. if (bpf_map_lookup_elem(fd, &key, fv)) {
  440. pids = pids->next;
  441. continue;
  442. }
  443. fd_apps_accumulator(fv);
  444. fd_fill_pid(key, fv);
  445. // We are cleaning to avoid passing data read from one process to other.
  446. memset(fv, 0, length);
  447. pids = pids->next;
  448. }
  449. }
  450. /**
  451. * Update cgroup
  452. *
  453. * Update cgroup data based in
  454. */
  455. static void ebpf_update_fd_cgroup()
  456. {
  457. ebpf_cgroup_target_t *ect ;
  458. netdata_fd_stat_t *fv = fd_vector;
  459. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  460. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  461. pthread_mutex_lock(&mutex_cgroup_shm);
  462. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  463. struct pid_on_target2 *pids;
  464. for (pids = ect->pids; pids; pids = pids->next) {
  465. int pid = pids->pid;
  466. netdata_fd_stat_t *out = &pids->fd;
  467. if (likely(fd_pid) && fd_pid[pid]) {
  468. netdata_fd_stat_t *in = fd_pid[pid];
  469. memcpy(out, in, sizeof(netdata_fd_stat_t));
  470. } else {
  471. memset(fv, 0, length);
  472. if (!bpf_map_lookup_elem(fd, &pid, fv)) {
  473. fd_apps_accumulator(fv);
  474. memcpy(out, fv, sizeof(netdata_fd_stat_t));
  475. }
  476. }
  477. }
  478. }
  479. pthread_mutex_unlock(&mutex_cgroup_shm);
  480. }
  481. /**
  482. * Sum PIDs
  483. *
  484. * Sum values for all targets.
  485. *
  486. * @param fd the output
  487. * @param root list of pids
  488. */
  489. static void ebpf_fd_sum_pids(netdata_fd_stat_t *fd, struct pid_on_target *root)
  490. {
  491. uint32_t open_call = 0;
  492. uint32_t close_call = 0;
  493. uint32_t open_err = 0;
  494. uint32_t close_err = 0;
  495. while (root) {
  496. int32_t pid = root->pid;
  497. netdata_fd_stat_t *w = fd_pid[pid];
  498. if (w) {
  499. open_call += w->open_call;
  500. close_call += w->close_call;
  501. open_err += w->open_err;
  502. close_err += w->close_err;
  503. }
  504. root = root->next;
  505. }
  506. // These conditions were added, because we are using incremental algorithm
  507. fd->open_call = (open_call >= fd->open_call) ? open_call : fd->open_call;
  508. fd->close_call = (close_call >= fd->close_call) ? close_call : fd->close_call;
  509. fd->open_err = (open_err >= fd->open_err) ? open_err : fd->open_err;
  510. fd->close_err = (close_err >= fd->close_err) ? close_err : fd->close_err;
  511. }
  512. /**
  513. * Send data to Netdata calling auxiliary functions.
  514. *
  515. * @param em the structure with thread information
  516. * @param root the target list.
  517. */
  518. void ebpf_fd_send_apps_data(ebpf_module_t *em, struct target *root)
  519. {
  520. struct target *w;
  521. for (w = root; w; w = w->next) {
  522. if (unlikely(w->exposed && w->processes)) {
  523. ebpf_fd_sum_pids(&w->fd, w->root_pid);
  524. }
  525. }
  526. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  527. for (w = root; w; w = w->next) {
  528. if (unlikely(w->exposed && w->processes)) {
  529. write_chart_dimension(w->name, w->fd.open_call);
  530. }
  531. }
  532. write_end_chart();
  533. if (em->mode < MODE_ENTRY) {
  534. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  535. for (w = root; w; w = w->next) {
  536. if (unlikely(w->exposed && w->processes)) {
  537. write_chart_dimension(w->name, w->fd.open_err);
  538. }
  539. }
  540. write_end_chart();
  541. }
  542. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  543. for (w = root; w; w = w->next) {
  544. if (unlikely(w->exposed && w->processes)) {
  545. write_chart_dimension(w->name, w->fd.close_call);
  546. }
  547. }
  548. write_end_chart();
  549. if (em->mode < MODE_ENTRY) {
  550. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  551. for (w = root; w; w = w->next) {
  552. if (unlikely(w->exposed && w->processes)) {
  553. write_chart_dimension(w->name, w->fd.close_err);
  554. }
  555. }
  556. write_end_chart();
  557. }
  558. }
  559. /**
  560. * Sum PIDs
  561. *
  562. * Sum values for all targets.
  563. *
  564. * @param fd structure used to store data
  565. * @param pids input data
  566. */
  567. static void ebpf_fd_sum_cgroup_pids(netdata_fd_stat_t *fd, struct pid_on_target2 *pids)
  568. {
  569. netdata_fd_stat_t accumulator;
  570. memset(&accumulator, 0, sizeof(accumulator));
  571. while (pids) {
  572. netdata_fd_stat_t *w = &pids->fd;
  573. accumulator.open_err += w->open_err;
  574. accumulator.open_call += w->open_call;
  575. accumulator.close_call += w->close_call;
  576. accumulator.close_err += w->close_err;
  577. pids = pids->next;
  578. }
  579. fd->open_call = (accumulator.open_call >= fd->open_call) ? accumulator.open_call : fd->open_call;
  580. fd->open_err = (accumulator.open_err >= fd->open_err) ? accumulator.open_err : fd->open_err;
  581. fd->close_call = (accumulator.close_call >= fd->close_call) ? accumulator.close_call : fd->close_call;
  582. fd->close_err = (accumulator.close_err >= fd->close_err) ? accumulator.close_err : fd->close_err;
  583. }
  584. /**
  585. * Create specific file descriptor charts
  586. *
  587. * Create charts for cgroup/application.
  588. *
  589. * @param type the chart type.
  590. * @param em the main thread structure.
  591. */
  592. static void ebpf_create_specific_fd_charts(char *type, ebpf_module_t *em)
  593. {
  594. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  595. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  596. NETDATA_CGROUP_FD_OPEN_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  597. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400,
  598. ebpf_create_global_dimension,
  599. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  600. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  601. if (em->mode < MODE_ENTRY) {
  602. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  603. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  604. NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  605. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401,
  606. ebpf_create_global_dimension,
  607. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  608. 1, em->update_every,
  609. NETDATA_EBPF_MODULE_NAME_SWAP);
  610. }
  611. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  612. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  613. NETDATA_CGROUP_FD_CLOSE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  614. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402,
  615. ebpf_create_global_dimension,
  616. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  617. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  618. if (em->mode < MODE_ENTRY) {
  619. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  620. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  621. NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  622. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403,
  623. ebpf_create_global_dimension,
  624. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  625. 1, em->update_every,
  626. NETDATA_EBPF_MODULE_NAME_SWAP);
  627. }
  628. }
  629. /**
  630. * Obsolete specific file descriptor charts
  631. *
  632. * Obsolete charts for cgroup/application.
  633. *
  634. * @param type the chart type.
  635. * @param em the main thread structure.
  636. */
  637. static void ebpf_obsolete_specific_fd_charts(char *type, ebpf_module_t *em)
  638. {
  639. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  640. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  641. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_CONTEXT,
  642. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400, em->update_every);
  643. if (em->mode < MODE_ENTRY) {
  644. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  645. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  646. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT,
  647. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401, em->update_every);
  648. }
  649. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  650. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  651. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_CONTEXT,
  652. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402, em->update_every);
  653. if (em->mode < MODE_ENTRY) {
  654. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  655. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  656. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT,
  657. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403, em->update_every);
  658. }
  659. }
  660. /*
  661. * Send specific file descriptor data
  662. *
  663. * Send data for specific cgroup/apps.
  664. *
  665. * @param type chart type
  666. * @param values structure with values that will be sent to netdata
  667. */
  668. static void ebpf_send_specific_fd_data(char *type, netdata_fd_stat_t *values, ebpf_module_t *em)
  669. {
  670. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN);
  671. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_call);
  672. write_end_chart();
  673. if (em->mode < MODE_ENTRY) {
  674. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  675. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_err);
  676. write_end_chart();
  677. }
  678. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  679. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_call);
  680. write_end_chart();
  681. if (em->mode < MODE_ENTRY) {
  682. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  683. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_err);
  684. write_end_chart();
  685. }
  686. }
  687. /**
  688. * Create systemd file descriptor charts
  689. *
  690. * Create charts when systemd is enabled
  691. *
  692. * @param em the main collector structure
  693. **/
  694. static void ebpf_create_systemd_fd_charts(ebpf_module_t *em)
  695. {
  696. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  697. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  698. NETDATA_EBPF_CHART_TYPE_STACKED, 20061,
  699. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_CONTEXT,
  700. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  701. if (em->mode < MODE_ENTRY) {
  702. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  703. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  704. NETDATA_EBPF_CHART_TYPE_STACKED, 20062,
  705. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_ERR_CONTEXT,
  706. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  707. }
  708. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  709. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  710. NETDATA_EBPF_CHART_TYPE_STACKED, 20063,
  711. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_CONTEXT,
  712. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  713. if (em->mode < MODE_ENTRY) {
  714. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  715. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  716. NETDATA_EBPF_CHART_TYPE_STACKED, 20064,
  717. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_ERR_CONTEXT,
  718. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  719. }
  720. }
  721. /**
  722. * Send Systemd charts
  723. *
  724. * Send collected data to Netdata.
  725. *
  726. * @param em the main collector structure
  727. */
  728. static void ebpf_send_systemd_fd_charts(ebpf_module_t *em)
  729. {
  730. ebpf_cgroup_target_t *ect;
  731. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  732. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  733. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  734. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_call);
  735. }
  736. }
  737. write_end_chart();
  738. if (em->mode < MODE_ENTRY) {
  739. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  740. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  741. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  742. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_err);
  743. }
  744. }
  745. write_end_chart();
  746. }
  747. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  748. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  749. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  750. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_call);
  751. }
  752. }
  753. write_end_chart();
  754. if (em->mode < MODE_ENTRY) {
  755. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  756. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  757. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  758. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_err);
  759. }
  760. }
  761. write_end_chart();
  762. }
  763. }
  764. /**
  765. * Send data to Netdata calling auxiliary functions.
  766. *
  767. * @param em the main collector structure
  768. */
  769. static void ebpf_fd_send_cgroup_data(ebpf_module_t *em)
  770. {
  771. if (!ebpf_cgroup_pids)
  772. return;
  773. pthread_mutex_lock(&mutex_cgroup_shm);
  774. ebpf_cgroup_target_t *ect;
  775. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  776. ebpf_fd_sum_cgroup_pids(&ect->publish_systemd_fd, ect->pids);
  777. }
  778. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  779. if (has_systemd) {
  780. if (send_cgroup_chart) {
  781. ebpf_create_systemd_fd_charts(em);
  782. }
  783. ebpf_send_systemd_fd_charts(em);
  784. }
  785. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  786. if (ect->systemd)
  787. continue;
  788. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART) && ect->updated) {
  789. ebpf_create_specific_fd_charts(ect->name, em);
  790. ect->flags |= NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  791. }
  792. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART ) {
  793. if (ect->updated) {
  794. ebpf_send_specific_fd_data(ect->name, &ect->publish_systemd_fd, em);
  795. } else {
  796. ebpf_obsolete_specific_fd_charts(ect->name, em);
  797. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  798. }
  799. }
  800. }
  801. pthread_mutex_unlock(&mutex_cgroup_shm);
  802. }
  803. /**
  804. * Main loop for this collector.
  805. */
  806. static void fd_collector(ebpf_module_t *em)
  807. {
  808. int cgroups = em->cgroup_charts;
  809. heartbeat_t hb;
  810. heartbeat_init(&hb);
  811. int update_every = em->update_every;
  812. int counter = update_every - 1;
  813. while (!ebpf_exit_plugin) {
  814. (void)heartbeat_next(&hb, USEC_PER_SEC);
  815. if (ebpf_exit_plugin || ++counter != update_every)
  816. continue;
  817. counter = 0;
  818. netdata_apps_integration_flags_t apps = em->apps_charts;
  819. ebpf_fd_read_global_table();
  820. pthread_mutex_lock(&collect_data_mutex);
  821. if (apps)
  822. read_apps_table();
  823. if (cgroups)
  824. ebpf_update_fd_cgroup();
  825. pthread_mutex_lock(&lock);
  826. ebpf_fd_send_data(em);
  827. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  828. ebpf_fd_send_apps_data(em, apps_groups_root_target);
  829. if (cgroups)
  830. ebpf_fd_send_cgroup_data(em);
  831. pthread_mutex_unlock(&lock);
  832. pthread_mutex_unlock(&collect_data_mutex);
  833. }
  834. }
  835. /*****************************************************************
  836. *
  837. * CREATE CHARTS
  838. *
  839. *****************************************************************/
  840. /**
  841. * Create apps charts
  842. *
  843. * Call ebpf_create_chart to create the charts on apps submenu.
  844. *
  845. * @param em a pointer to the structure with the default values.
  846. */
  847. void ebpf_fd_create_apps_charts(struct ebpf_module *em, void *ptr)
  848. {
  849. struct target *root = ptr;
  850. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN,
  851. "Number of open files",
  852. EBPF_COMMON_DIMENSION_CALL,
  853. NETDATA_APPS_FILE_GROUP,
  854. NETDATA_EBPF_CHART_TYPE_STACKED,
  855. 20061,
  856. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  857. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  858. if (em->mode < MODE_ENTRY) {
  859. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR,
  860. "Fails to open files",
  861. EBPF_COMMON_DIMENSION_CALL,
  862. NETDATA_APPS_FILE_GROUP,
  863. NETDATA_EBPF_CHART_TYPE_STACKED,
  864. 20062,
  865. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  866. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  867. }
  868. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSED,
  869. "Files closed",
  870. EBPF_COMMON_DIMENSION_CALL,
  871. NETDATA_APPS_FILE_GROUP,
  872. NETDATA_EBPF_CHART_TYPE_STACKED,
  873. 20063,
  874. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  875. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  876. if (em->mode < MODE_ENTRY) {
  877. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR,
  878. "Fails to close files",
  879. EBPF_COMMON_DIMENSION_CALL,
  880. NETDATA_APPS_FILE_GROUP,
  881. NETDATA_EBPF_CHART_TYPE_STACKED,
  882. 20064,
  883. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  884. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  885. }
  886. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  887. }
  888. /**
  889. * Create global charts
  890. *
  891. * Call ebpf_create_chart to create the charts for the collector.
  892. *
  893. * @param em a pointer to the structure with the default values.
  894. */
  895. static void ebpf_create_fd_global_charts(ebpf_module_t *em)
  896. {
  897. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  898. NETDATA_FILE_OPEN_CLOSE_COUNT,
  899. "Open and close calls",
  900. EBPF_COMMON_DIMENSION_CALL,
  901. NETDATA_FILE_GROUP,
  902. NULL,
  903. NETDATA_EBPF_CHART_TYPE_LINE,
  904. NETDATA_CHART_PRIO_EBPF_FD_CHARTS,
  905. ebpf_create_global_dimension,
  906. fd_publish_aggregated,
  907. NETDATA_FD_SYSCALL_END,
  908. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  909. if (em->mode < MODE_ENTRY) {
  910. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  911. NETDATA_FILE_OPEN_ERR_COUNT,
  912. "Open fails",
  913. EBPF_COMMON_DIMENSION_CALL,
  914. NETDATA_FILE_GROUP,
  915. NULL,
  916. NETDATA_EBPF_CHART_TYPE_LINE,
  917. NETDATA_CHART_PRIO_EBPF_FD_CHARTS + 1,
  918. ebpf_create_global_dimension,
  919. fd_publish_aggregated,
  920. NETDATA_FD_SYSCALL_END,
  921. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  922. }
  923. }
  924. /*****************************************************************
  925. *
  926. * MAIN THREAD
  927. *
  928. *****************************************************************/
  929. /**
  930. * Allocate vectors used with this thread.
  931. *
  932. * We are not testing the return, because callocz does this and shutdown the software
  933. * case it was not possible to allocate.
  934. *
  935. * @param apps is apps enabled?
  936. */
  937. static void ebpf_fd_allocate_global_vectors(int apps)
  938. {
  939. if (apps)
  940. fd_pid = callocz((size_t)pid_max, sizeof(netdata_fd_stat_t *));
  941. fd_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_fd_stat_t));
  942. fd_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  943. }
  944. /*
  945. * Load BPF
  946. *
  947. * Load BPF files.
  948. *
  949. * @param em the structure with configuration
  950. */
  951. static int ebpf_fd_load_bpf(ebpf_module_t *em)
  952. {
  953. int ret = 0;
  954. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_FD_SYSCALL_OPEN].mode);
  955. if (em->load & EBPF_LOAD_LEGACY) {
  956. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  957. if (!em->probe_links) {
  958. em->enabled = CONFIG_BOOLEAN_NO;
  959. ret = -1;
  960. }
  961. }
  962. #ifdef LIBBPF_MAJOR_VERSION
  963. else {
  964. bpf_obj = fd_bpf__open();
  965. if (!bpf_obj)
  966. ret = -1;
  967. else
  968. ret = ebpf_fd_load_and_attach(bpf_obj, em);
  969. }
  970. #endif
  971. if (ret)
  972. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  973. return ret;
  974. }
  975. /**
  976. * Directory Cache thread
  977. *
  978. * Thread used to make dcstat thread
  979. *
  980. * @param ptr a pointer to `struct ebpf_module`
  981. *
  982. * @return It always returns NULL
  983. */
  984. void *ebpf_fd_thread(void *ptr)
  985. {
  986. netdata_thread_cleanup_push(ebpf_fd_exit, ptr);
  987. ebpf_module_t *em = (ebpf_module_t *)ptr;
  988. em->maps = fd_maps;
  989. #ifdef LIBBPF_MAJOR_VERSION
  990. ebpf_adjust_thread_load(em, default_btf);
  991. #endif
  992. if (ebpf_fd_load_bpf(em)) {
  993. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  994. goto endfd;
  995. }
  996. ebpf_fd_allocate_global_vectors(em->apps_charts);
  997. int algorithms[NETDATA_FD_SYSCALL_END] = {
  998. NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX
  999. };
  1000. ebpf_global_labels(fd_aggregated_data, fd_publish_aggregated, fd_dimension_names, fd_id_names,
  1001. algorithms, NETDATA_FD_SYSCALL_END);
  1002. pthread_mutex_lock(&lock);
  1003. ebpf_create_fd_global_charts(em);
  1004. ebpf_update_stats(&plugin_statistics, em);
  1005. pthread_mutex_unlock(&lock);
  1006. fd_collector(em);
  1007. endfd:
  1008. ebpf_update_disabled_plugin_stats(em);
  1009. netdata_thread_cleanup_pop(1);
  1010. return NULL;
  1011. }