ebpf_mount.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_mount.h"
  4. static ebpf_local_maps_t mount_maps[] = {{.name = "tbl_mount", .internal_input = NETDATA_MOUNT_END,
  5. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  6. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  7. {.name = NULL, .internal_input = 0, .user_input = 0,
  8. .type = NETDATA_EBPF_MAP_CONTROLLER,
  9. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  10. static char *mount_dimension_name[NETDATA_EBPF_MOUNT_SYSCALL] = { "mount", "umount" };
  11. static netdata_syscall_stat_t mount_aggregated_data[NETDATA_EBPF_MOUNT_SYSCALL];
  12. static netdata_publish_syscall_t mount_publish_aggregated[NETDATA_EBPF_MOUNT_SYSCALL];
  13. struct config mount_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  14. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  15. .rwlock = AVL_LOCK_INITIALIZER } };
  16. static netdata_idx_t *mount_values = NULL;
  17. static netdata_idx_t mount_hash_values[NETDATA_MOUNT_END];
  18. netdata_ebpf_targets_t mount_targets[] = { {.name = "mount", .mode = EBPF_LOAD_TRAMPOLINE},
  19. {.name = "umount", .mode = EBPF_LOAD_TRAMPOLINE},
  20. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  21. #ifdef LIBBPF_MAJOR_VERSION
  22. #include "includes/mount.skel.h" // BTF code
  23. static struct mount_bpf *bpf_obj = NULL;
  24. /*****************************************************************
  25. *
  26. * BTF FUNCTIONS
  27. *
  28. *****************************************************************/
  29. /*
  30. * Disable probe
  31. *
  32. * Disable all probes to use exclusively another method.
  33. *
  34. * @param obj is the main structure for bpf objects.
  35. */
  36. static inline void ebpf_mount_disable_probe(struct mount_bpf *obj)
  37. {
  38. bpf_program__set_autoload(obj->progs.netdata_mount_probe, false);
  39. bpf_program__set_autoload(obj->progs.netdata_umount_probe, false);
  40. bpf_program__set_autoload(obj->progs.netdata_mount_retprobe, false);
  41. bpf_program__set_autoload(obj->progs.netdata_umount_retprobe, false);
  42. }
  43. /*
  44. * Disable tracepoint
  45. *
  46. * Disable all tracepoints to use exclusively another method.
  47. *
  48. * @param obj is the main structure for bpf objects.
  49. */
  50. static inline void ebpf_mount_disable_tracepoint(struct mount_bpf *obj)
  51. {
  52. bpf_program__set_autoload(obj->progs.netdata_mount_exit, false);
  53. bpf_program__set_autoload(obj->progs.netdata_umount_exit, false);
  54. }
  55. /*
  56. * Disable trampoline
  57. *
  58. * Disable all trampoline to use exclusively another method.
  59. *
  60. * @param obj is the main structure for bpf objects.
  61. */
  62. static inline void ebpf_mount_disable_trampoline(struct mount_bpf *obj)
  63. {
  64. bpf_program__set_autoload(obj->progs.netdata_mount_fentry, false);
  65. bpf_program__set_autoload(obj->progs.netdata_umount_fentry, false);
  66. bpf_program__set_autoload(obj->progs.netdata_mount_fexit, false);
  67. bpf_program__set_autoload(obj->progs.netdata_umount_fexit, false);
  68. }
  69. /**
  70. * Set trampoline target
  71. *
  72. * Set the targets we will monitor.
  73. *
  74. * @param obj is the main structure for bpf objects.
  75. */
  76. static inline void netdata_set_trampoline_target(struct mount_bpf *obj)
  77. {
  78. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  79. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  80. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  81. bpf_program__set_attach_target(obj->progs.netdata_mount_fentry, 0,
  82. syscall);
  83. bpf_program__set_attach_target(obj->progs.netdata_mount_fexit, 0,
  84. syscall);
  85. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  86. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  87. bpf_program__set_attach_target(obj->progs.netdata_umount_fentry, 0,
  88. syscall);
  89. bpf_program__set_attach_target(obj->progs.netdata_umount_fexit, 0,
  90. syscall);
  91. }
  92. /**
  93. * Mount Attach Probe
  94. *
  95. * Attach probes to target
  96. *
  97. * @param obj is the main structure for bpf objects.
  98. *
  99. * @return It returns 0 on success and -1 otherwise.
  100. */
  101. static int ebpf_mount_attach_probe(struct mount_bpf *obj)
  102. {
  103. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  104. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  105. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  106. obj->links.netdata_mount_probe = bpf_program__attach_kprobe(obj->progs.netdata_mount_probe,
  107. false, syscall);
  108. int ret = (int)libbpf_get_error(obj->links.netdata_mount_probe);
  109. if (ret)
  110. return -1;
  111. obj->links.netdata_mount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_mount_retprobe,
  112. true, syscall);
  113. ret = (int)libbpf_get_error(obj->links.netdata_mount_retprobe);
  114. if (ret)
  115. return -1;
  116. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  117. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  118. obj->links.netdata_umount_probe = bpf_program__attach_kprobe(obj->progs.netdata_umount_probe,
  119. false, syscall);
  120. ret = (int)libbpf_get_error(obj->links.netdata_umount_probe);
  121. if (ret)
  122. return -1;
  123. obj->links.netdata_umount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_umount_retprobe,
  124. true, syscall);
  125. ret = (int)libbpf_get_error(obj->links.netdata_umount_retprobe);
  126. if (ret)
  127. return -1;
  128. return 0;
  129. }
  130. /**
  131. * Set hash tables
  132. *
  133. * Set the values for maps according the value given by kernel.
  134. *
  135. * @param obj is the main structure for bpf objects.
  136. */
  137. static void ebpf_mount_set_hash_tables(struct mount_bpf *obj)
  138. {
  139. mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_mount);
  140. }
  141. /**
  142. * Load and attach
  143. *
  144. * Load and attach the eBPF code in kernel.
  145. *
  146. * @param obj is the main structure for bpf objects.
  147. * @param em structure with configuration
  148. *
  149. * @return it returns 0 on success and -1 otherwise
  150. */
  151. static inline int ebpf_mount_load_and_attach(struct mount_bpf *obj, ebpf_module_t *em)
  152. {
  153. netdata_ebpf_targets_t *mt = em->targets;
  154. netdata_ebpf_program_loaded_t test = mt[NETDATA_MOUNT_SYSCALL].mode;
  155. // We are testing only one, because all will have the same behavior
  156. if (test == EBPF_LOAD_TRAMPOLINE ) {
  157. ebpf_mount_disable_probe(obj);
  158. ebpf_mount_disable_tracepoint(obj);
  159. netdata_set_trampoline_target(obj);
  160. } else if (test == EBPF_LOAD_PROBE ||
  161. test == EBPF_LOAD_RETPROBE ) {
  162. ebpf_mount_disable_tracepoint(obj);
  163. ebpf_mount_disable_trampoline(obj);
  164. } else {
  165. ebpf_mount_disable_probe(obj);
  166. ebpf_mount_disable_trampoline(obj);
  167. }
  168. int ret = mount_bpf__load(obj);
  169. if (!ret) {
  170. if (test != EBPF_LOAD_PROBE && test != EBPF_LOAD_RETPROBE )
  171. ret = mount_bpf__attach(obj);
  172. else
  173. ret = ebpf_mount_attach_probe(obj);
  174. if (!ret)
  175. ebpf_mount_set_hash_tables(obj);
  176. }
  177. return ret;
  178. }
  179. #endif
  180. /*****************************************************************
  181. *
  182. * FUNCTIONS TO CLOSE THE THREAD
  183. *
  184. *****************************************************************/
  185. /**
  186. * Mount Free
  187. *
  188. * Cleanup variables after child threads to stop
  189. *
  190. * @param ptr thread data.
  191. */
  192. static void ebpf_mount_free(ebpf_module_t *em)
  193. {
  194. pthread_mutex_lock(&ebpf_exit_cleanup);
  195. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPING;
  196. pthread_mutex_unlock(&ebpf_exit_cleanup);
  197. freez(mount_values);
  198. #ifdef LIBBPF_MAJOR_VERSION
  199. if (bpf_obj)
  200. mount_bpf__destroy(bpf_obj);
  201. #endif
  202. pthread_mutex_lock(&ebpf_exit_cleanup);
  203. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  204. pthread_mutex_unlock(&ebpf_exit_cleanup);
  205. }
  206. /**
  207. * Mount Exit
  208. *
  209. * Cancel child thread.
  210. *
  211. * @param ptr thread data.
  212. */
  213. static void ebpf_mount_exit(void *ptr)
  214. {
  215. ebpf_module_t *em = (ebpf_module_t *)ptr;
  216. ebpf_mount_free(em);
  217. }
  218. /*****************************************************************
  219. *
  220. * MAIN LOOP
  221. *
  222. *****************************************************************/
  223. /**
  224. * Read global table
  225. *
  226. * Read the table with number of calls for all functions
  227. */
  228. static void ebpf_mount_read_global_table()
  229. {
  230. uint32_t idx;
  231. netdata_idx_t *val = mount_hash_values;
  232. netdata_idx_t *stored = mount_values;
  233. int fd = mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd;
  234. for (idx = NETDATA_KEY_MOUNT_CALL; idx < NETDATA_MOUNT_END; idx++) {
  235. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  236. int i;
  237. int end = ebpf_nprocs;
  238. netdata_idx_t total = 0;
  239. for (i = 0; i < end; i++)
  240. total += stored[i];
  241. val[idx] = total;
  242. }
  243. }
  244. }
  245. /**
  246. * Send data to Netdata calling auxiliary functions.
  247. */
  248. static void ebpf_mount_send_data()
  249. {
  250. int i, j;
  251. int end = NETDATA_EBPF_MOUNT_SYSCALL;
  252. for (i = NETDATA_KEY_MOUNT_CALL, j = NETDATA_KEY_MOUNT_ERROR; i < end; i++, j++) {
  253. mount_publish_aggregated[i].ncall = mount_hash_values[i];
  254. mount_publish_aggregated[i].nerr = mount_hash_values[j];
  255. }
  256. write_count_chart(NETDATA_EBPF_MOUNT_CALLS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  257. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  258. write_err_chart(NETDATA_EBPF_MOUNT_ERRORS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  259. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  260. }
  261. /**
  262. * Main loop for this collector.
  263. */
  264. static void mount_collector(ebpf_module_t *em)
  265. {
  266. mount_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  267. memset(mount_hash_values, 0, sizeof(mount_hash_values));
  268. heartbeat_t hb;
  269. heartbeat_init(&hb);
  270. int update_every = em->update_every;
  271. int counter = update_every - 1;
  272. while (!ebpf_exit_plugin) {
  273. (void)heartbeat_next(&hb, USEC_PER_SEC);
  274. if (ebpf_exit_plugin || ++counter != update_every)
  275. continue;
  276. counter = 0;
  277. ebpf_mount_read_global_table();
  278. pthread_mutex_lock(&lock);
  279. ebpf_mount_send_data();
  280. pthread_mutex_unlock(&lock);
  281. }
  282. }
  283. /*****************************************************************
  284. *
  285. * INITIALIZE THREAD
  286. *
  287. *****************************************************************/
  288. /**
  289. * Create mount charts
  290. *
  291. * Call ebpf_create_chart to create the charts for the collector.
  292. *
  293. * @param update_every value to overwrite the update frequency set by the server.
  294. */
  295. static void ebpf_create_mount_charts(int update_every)
  296. {
  297. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_CALLS,
  298. "Calls to mount and umount syscalls",
  299. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  300. NULL,
  301. NETDATA_EBPF_CHART_TYPE_LINE,
  302. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS,
  303. ebpf_create_global_dimension,
  304. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  305. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  306. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_ERRORS,
  307. "Errors to mount and umount file systems",
  308. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  309. NULL,
  310. NETDATA_EBPF_CHART_TYPE_LINE,
  311. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS + 1,
  312. ebpf_create_global_dimension,
  313. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  314. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  315. fflush(stdout);
  316. }
  317. /*****************************************************************
  318. *
  319. * MAIN THREAD
  320. *
  321. *****************************************************************/
  322. /*
  323. * Load BPF
  324. *
  325. * Load BPF files.
  326. *
  327. * @param em the structure with configuration
  328. */
  329. static int ebpf_mount_load_bpf(ebpf_module_t *em)
  330. {
  331. int ret = 0;
  332. if (em->load & EBPF_LOAD_LEGACY) {
  333. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  334. if (!em->probe_links) {
  335. em->enabled = CONFIG_BOOLEAN_NO;
  336. ret = -1;
  337. }
  338. }
  339. #ifdef LIBBPF_MAJOR_VERSION
  340. else {
  341. bpf_obj = mount_bpf__open();
  342. if (!bpf_obj)
  343. ret = -1;
  344. else
  345. ret = ebpf_mount_load_and_attach(bpf_obj, em);
  346. }
  347. #endif
  348. if (ret)
  349. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  350. return ret;
  351. }
  352. /**
  353. * Mount thread
  354. *
  355. * Thread used to make mount thread
  356. *
  357. * @param ptr a pointer to `struct ebpf_module`
  358. *
  359. * @return It always returns NULL
  360. */
  361. void *ebpf_mount_thread(void *ptr)
  362. {
  363. netdata_thread_cleanup_push(ebpf_mount_exit, ptr);
  364. ebpf_module_t *em = (ebpf_module_t *)ptr;
  365. em->maps = mount_maps;
  366. #ifdef LIBBPF_MAJOR_VERSION
  367. ebpf_adjust_thread_load(em, default_btf);
  368. #endif
  369. if (ebpf_mount_load_bpf(em)) {
  370. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  371. goto endmount;
  372. }
  373. int algorithms[NETDATA_EBPF_MOUNT_SYSCALL] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  374. ebpf_global_labels(mount_aggregated_data, mount_publish_aggregated, mount_dimension_name, mount_dimension_name,
  375. algorithms, NETDATA_EBPF_MOUNT_SYSCALL);
  376. pthread_mutex_lock(&lock);
  377. ebpf_create_mount_charts(em->update_every);
  378. ebpf_update_stats(&plugin_statistics, em);
  379. pthread_mutex_unlock(&lock);
  380. mount_collector(em);
  381. endmount:
  382. ebpf_update_disabled_plugin_stats(em);
  383. netdata_thread_cleanup_pop(1);
  384. return NULL;
  385. }