ebpf_fd.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_fd.h"
  4. static char *fd_dimension_names[NETDATA_FD_SYSCALL_END] = { "open", "close" };
  5. static char *fd_id_names[NETDATA_FD_SYSCALL_END] = { "do_sys_open", "__close_fd" };
  6. static netdata_syscall_stat_t fd_aggregated_data[NETDATA_FD_SYSCALL_END];
  7. static netdata_publish_syscall_t fd_publish_aggregated[NETDATA_FD_SYSCALL_END];
  8. static ebpf_local_maps_t fd_maps[] = {{.name = "tbl_fd_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  9. .user_input = 0,
  10. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  11. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  12. {.name = "tbl_fd_global", .internal_input = NETDATA_KEY_END_VECTOR,
  13. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  14. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  15. {.name = "fd_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_CONTROLLER,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  19. {.name = NULL, .internal_input = 0, .user_input = 0,
  20. .type = NETDATA_EBPF_MAP_CONTROLLER,
  21. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  22. struct config fd_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  23. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  24. .rwlock = AVL_LOCK_INITIALIZER } };
  25. struct netdata_static_thread fd_thread = {"FD KERNEL", NULL, NULL, 1, NULL,
  26. NULL, NULL};
  27. static enum ebpf_threads_status ebpf_fd_exited = NETDATA_THREAD_EBPF_RUNNING;
  28. static netdata_idx_t fd_hash_values[NETDATA_FD_COUNTER];
  29. static netdata_idx_t *fd_values = NULL;
  30. netdata_fd_stat_t *fd_vector = NULL;
  31. netdata_fd_stat_t **fd_pid = NULL;
  32. /*****************************************************************
  33. *
  34. * FUNCTIONS TO CLOSE THE THREAD
  35. *
  36. *****************************************************************/
  37. /**
  38. * FD Exit
  39. *
  40. * Cancel child thread and exit.
  41. *
  42. * @param ptr thread data.
  43. */
  44. static void ebpf_fd_exit(void *ptr)
  45. {
  46. ebpf_module_t *em = (ebpf_module_t *)ptr;
  47. if (!em->enabled) {
  48. em->enabled = NETDATA_MAIN_THREAD_EXITED;
  49. return;
  50. }
  51. ebpf_fd_exited = NETDATA_THREAD_EBPF_STOPPING;
  52. }
  53. /**
  54. * Clean up the main thread.
  55. *
  56. * @param ptr thread data.
  57. */
  58. static void ebpf_fd_cleanup(void *ptr)
  59. {
  60. ebpf_module_t *em = (ebpf_module_t *)ptr;
  61. if (ebpf_fd_exited != NETDATA_THREAD_EBPF_STOPPED)
  62. return;
  63. ebpf_cleanup_publish_syscall(fd_publish_aggregated);
  64. freez(fd_thread.thread);
  65. freez(fd_values);
  66. freez(fd_vector);
  67. fd_thread.enabled = NETDATA_MAIN_THREAD_EXITED;
  68. em->enabled = NETDATA_MAIN_THREAD_EXITED;
  69. }
  70. /*****************************************************************
  71. *
  72. * MAIN LOOP
  73. *
  74. *****************************************************************/
  75. /**
  76. * Send data to Netdata calling auxiliary functions.
  77. *
  78. * @param em the structure with thread information
  79. */
  80. static void ebpf_fd_send_data(ebpf_module_t *em)
  81. {
  82. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].ncall = fd_hash_values[NETDATA_KEY_CALLS_DO_SYS_OPEN];
  83. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].nerr = fd_hash_values[NETDATA_KEY_ERROR_DO_SYS_OPEN];
  84. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].ncall = fd_hash_values[NETDATA_KEY_CALLS_CLOSE_FD];
  85. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].nerr = fd_hash_values[NETDATA_KEY_ERROR_CLOSE_FD];
  86. write_count_chart(NETDATA_FILE_OPEN_CLOSE_COUNT, NETDATA_FILESYSTEM_FAMILY, fd_publish_aggregated,
  87. NETDATA_FD_SYSCALL_END);
  88. if (em->mode < MODE_ENTRY) {
  89. write_err_chart(NETDATA_FILE_OPEN_ERR_COUNT, NETDATA_FILESYSTEM_FAMILY,
  90. fd_publish_aggregated, NETDATA_FD_SYSCALL_END);
  91. }
  92. }
  93. /**
  94. * Read global counter
  95. *
  96. * Read the table with number of calls for all functions
  97. */
  98. static void read_global_table()
  99. {
  100. uint32_t idx;
  101. netdata_idx_t *val = fd_hash_values;
  102. netdata_idx_t *stored = fd_values;
  103. int fd = fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd;
  104. for (idx = NETDATA_KEY_CALLS_DO_SYS_OPEN; idx < NETDATA_FD_COUNTER; idx++) {
  105. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  106. int i;
  107. int end = ebpf_nprocs;
  108. netdata_idx_t total = 0;
  109. for (i = 0; i < end; i++)
  110. total += stored[i];
  111. val[idx] = total;
  112. }
  113. }
  114. }
  115. /**
  116. * File descriptor read hash
  117. *
  118. * This is the thread callback.
  119. * This thread is necessary, because we cannot freeze the whole plugin to read the data.
  120. *
  121. * @param ptr It is a NULL value for this thread.
  122. *
  123. * @return It always returns NULL.
  124. */
  125. void *ebpf_fd_read_hash(void *ptr)
  126. {
  127. netdata_thread_cleanup_push(ebpf_fd_cleanup, ptr);
  128. heartbeat_t hb;
  129. heartbeat_init(&hb);
  130. ebpf_module_t *em = (ebpf_module_t *)ptr;
  131. usec_t step = NETDATA_FD_SLEEP_MS * em->update_every;
  132. while (ebpf_fd_exited == NETDATA_THREAD_EBPF_RUNNING) {
  133. usec_t dt = heartbeat_next(&hb, step);
  134. (void)dt;
  135. if (ebpf_fd_exited == NETDATA_THREAD_EBPF_STOPPING)
  136. break;
  137. read_global_table();
  138. }
  139. ebpf_fd_exited = NETDATA_THREAD_EBPF_STOPPED;
  140. netdata_thread_cleanup_pop(1);
  141. return NULL;
  142. }
  143. /**
  144. * Apps Accumulator
  145. *
  146. * Sum all values read from kernel and store in the first address.
  147. *
  148. * @param out the vector with read values.
  149. */
  150. static void fd_apps_accumulator(netdata_fd_stat_t *out)
  151. {
  152. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  153. netdata_fd_stat_t *total = &out[0];
  154. for (i = 1; i < end; i++) {
  155. netdata_fd_stat_t *w = &out[i];
  156. total->open_call += w->open_call;
  157. total->close_call += w->close_call;
  158. total->open_err += w->open_err;
  159. total->close_err += w->close_err;
  160. }
  161. }
  162. /**
  163. * Fill PID
  164. *
  165. * Fill PID structures
  166. *
  167. * @param current_pid pid that we are collecting data
  168. * @param out values read from hash tables;
  169. */
  170. static void fd_fill_pid(uint32_t current_pid, netdata_fd_stat_t *publish)
  171. {
  172. netdata_fd_stat_t *curr = fd_pid[current_pid];
  173. if (!curr) {
  174. curr = callocz(1, sizeof(netdata_fd_stat_t));
  175. fd_pid[current_pid] = curr;
  176. }
  177. memcpy(curr, &publish[0], sizeof(netdata_fd_stat_t));
  178. }
  179. /**
  180. * Read APPS table
  181. *
  182. * Read the apps table and store data inside the structure.
  183. */
  184. static void read_apps_table()
  185. {
  186. netdata_fd_stat_t *fv = fd_vector;
  187. uint32_t key;
  188. struct pid_stat *pids = root_of_pids;
  189. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  190. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  191. while (pids) {
  192. key = pids->pid;
  193. if (bpf_map_lookup_elem(fd, &key, fv)) {
  194. pids = pids->next;
  195. continue;
  196. }
  197. fd_apps_accumulator(fv);
  198. fd_fill_pid(key, fv);
  199. // We are cleaning to avoid passing data read from one process to other.
  200. memset(fv, 0, length);
  201. pids = pids->next;
  202. }
  203. }
  204. /**
  205. * Update cgroup
  206. *
  207. * Update cgroup data based in
  208. */
  209. static void ebpf_update_fd_cgroup()
  210. {
  211. ebpf_cgroup_target_t *ect ;
  212. netdata_fd_stat_t *fv = fd_vector;
  213. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  214. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  215. pthread_mutex_lock(&mutex_cgroup_shm);
  216. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  217. struct pid_on_target2 *pids;
  218. for (pids = ect->pids; pids; pids = pids->next) {
  219. int pid = pids->pid;
  220. netdata_fd_stat_t *out = &pids->fd;
  221. if (likely(fd_pid) && fd_pid[pid]) {
  222. netdata_fd_stat_t *in = fd_pid[pid];
  223. memcpy(out, in, sizeof(netdata_fd_stat_t));
  224. } else {
  225. memset(fv, 0, length);
  226. if (!bpf_map_lookup_elem(fd, &pid, fv)) {
  227. fd_apps_accumulator(fv);
  228. memcpy(out, fv, sizeof(netdata_fd_stat_t));
  229. }
  230. }
  231. }
  232. }
  233. pthread_mutex_unlock(&mutex_cgroup_shm);
  234. }
  235. /**
  236. * Sum PIDs
  237. *
  238. * Sum values for all targets.
  239. *
  240. * @param fd the output
  241. * @param root list of pids
  242. */
  243. static void ebpf_fd_sum_pids(netdata_fd_stat_t *fd, struct pid_on_target *root)
  244. {
  245. uint32_t open_call = 0;
  246. uint32_t close_call = 0;
  247. uint32_t open_err = 0;
  248. uint32_t close_err = 0;
  249. while (root) {
  250. int32_t pid = root->pid;
  251. netdata_fd_stat_t *w = fd_pid[pid];
  252. if (w) {
  253. open_call += w->open_call;
  254. close_call += w->close_call;
  255. open_err += w->open_err;
  256. close_err += w->close_err;
  257. }
  258. root = root->next;
  259. }
  260. // These conditions were added, because we are using incremental algorithm
  261. fd->open_call = (open_call >= fd->open_call) ? open_call : fd->open_call;
  262. fd->close_call = (close_call >= fd->close_call) ? close_call : fd->close_call;
  263. fd->open_err = (open_err >= fd->open_err) ? open_err : fd->open_err;
  264. fd->close_err = (close_err >= fd->close_err) ? close_err : fd->close_err;
  265. }
  266. /**
  267. * Send data to Netdata calling auxiliary functions.
  268. *
  269. * @param em the structure with thread information
  270. * @param root the target list.
  271. */
  272. void ebpf_fd_send_apps_data(ebpf_module_t *em, struct target *root)
  273. {
  274. struct target *w;
  275. for (w = root; w; w = w->next) {
  276. if (unlikely(w->exposed && w->processes)) {
  277. ebpf_fd_sum_pids(&w->fd, w->root_pid);
  278. }
  279. }
  280. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  281. for (w = root; w; w = w->next) {
  282. if (unlikely(w->exposed && w->processes)) {
  283. write_chart_dimension(w->name, w->fd.open_call);
  284. }
  285. }
  286. write_end_chart();
  287. if (em->mode < MODE_ENTRY) {
  288. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  289. for (w = root; w; w = w->next) {
  290. if (unlikely(w->exposed && w->processes)) {
  291. write_chart_dimension(w->name, w->fd.open_err);
  292. }
  293. }
  294. write_end_chart();
  295. }
  296. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  297. for (w = root; w; w = w->next) {
  298. if (unlikely(w->exposed && w->processes)) {
  299. write_chart_dimension(w->name, w->fd.close_call);
  300. }
  301. }
  302. write_end_chart();
  303. if (em->mode < MODE_ENTRY) {
  304. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  305. for (w = root; w; w = w->next) {
  306. if (unlikely(w->exposed && w->processes)) {
  307. write_chart_dimension(w->name, w->fd.close_err);
  308. }
  309. }
  310. write_end_chart();
  311. }
  312. }
  313. /**
  314. * Sum PIDs
  315. *
  316. * Sum values for all targets.
  317. *
  318. * @param fd structure used to store data
  319. * @param pids input data
  320. */
  321. static void ebpf_fd_sum_cgroup_pids(netdata_fd_stat_t *fd, struct pid_on_target2 *pids)
  322. {
  323. netdata_fd_stat_t accumulator;
  324. memset(&accumulator, 0, sizeof(accumulator));
  325. while (pids) {
  326. netdata_fd_stat_t *w = &pids->fd;
  327. accumulator.open_err += w->open_err;
  328. accumulator.open_call += w->open_call;
  329. accumulator.close_call += w->close_call;
  330. accumulator.close_err += w->close_err;
  331. pids = pids->next;
  332. }
  333. fd->open_call = (accumulator.open_call >= fd->open_call) ? accumulator.open_call : fd->open_call;
  334. fd->open_err = (accumulator.open_err >= fd->open_err) ? accumulator.open_err : fd->open_err;
  335. fd->close_call = (accumulator.close_call >= fd->close_call) ? accumulator.close_call : fd->close_call;
  336. fd->close_err = (accumulator.close_err >= fd->close_err) ? accumulator.close_err : fd->close_err;
  337. }
  338. /**
  339. * Create specific file descriptor charts
  340. *
  341. * Create charts for cgroup/application.
  342. *
  343. * @param type the chart type.
  344. * @param em the main thread structure.
  345. */
  346. static void ebpf_create_specific_fd_charts(char *type, ebpf_module_t *em)
  347. {
  348. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  349. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  350. NETDATA_CGROUP_FD_OPEN_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  351. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400,
  352. ebpf_create_global_dimension,
  353. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  354. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  355. if (em->mode < MODE_ENTRY) {
  356. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  357. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  358. NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  359. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401,
  360. ebpf_create_global_dimension,
  361. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  362. 1, em->update_every,
  363. NETDATA_EBPF_MODULE_NAME_SWAP);
  364. }
  365. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  366. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  367. NETDATA_CGROUP_FD_CLOSE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  368. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402,
  369. ebpf_create_global_dimension,
  370. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  371. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  372. if (em->mode < MODE_ENTRY) {
  373. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  374. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  375. NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  376. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403,
  377. ebpf_create_global_dimension,
  378. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  379. 1, em->update_every,
  380. NETDATA_EBPF_MODULE_NAME_SWAP);
  381. }
  382. }
  383. /**
  384. * Obsolete specific file descriptor charts
  385. *
  386. * Obsolete charts for cgroup/application.
  387. *
  388. * @param type the chart type.
  389. * @param em the main thread structure.
  390. */
  391. static void ebpf_obsolete_specific_fd_charts(char *type, ebpf_module_t *em)
  392. {
  393. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  394. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  395. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_CONTEXT,
  396. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400, em->update_every);
  397. if (em->mode < MODE_ENTRY) {
  398. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  399. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  400. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT,
  401. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401, em->update_every);
  402. }
  403. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  404. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  405. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_CONTEXT,
  406. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402, em->update_every);
  407. if (em->mode < MODE_ENTRY) {
  408. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  409. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  410. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT,
  411. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403, em->update_every);
  412. }
  413. }
  414. /*
  415. * Send specific file descriptor data
  416. *
  417. * Send data for specific cgroup/apps.
  418. *
  419. * @param type chart type
  420. * @param values structure with values that will be sent to netdata
  421. */
  422. static void ebpf_send_specific_fd_data(char *type, netdata_fd_stat_t *values, ebpf_module_t *em)
  423. {
  424. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN);
  425. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_call);
  426. write_end_chart();
  427. if (em->mode < MODE_ENTRY) {
  428. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  429. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_err);
  430. write_end_chart();
  431. }
  432. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  433. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_call);
  434. write_end_chart();
  435. if (em->mode < MODE_ENTRY) {
  436. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  437. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_err);
  438. write_end_chart();
  439. }
  440. }
  441. /**
  442. * Create systemd file descriptor charts
  443. *
  444. * Create charts when systemd is enabled
  445. *
  446. * @param em the main collector structure
  447. **/
  448. static void ebpf_create_systemd_fd_charts(ebpf_module_t *em)
  449. {
  450. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  451. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  452. NETDATA_EBPF_CHART_TYPE_STACKED, 20061,
  453. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_CONTEXT,
  454. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  455. if (em->mode < MODE_ENTRY) {
  456. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  457. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  458. NETDATA_EBPF_CHART_TYPE_STACKED, 20062,
  459. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_ERR_CONTEXT,
  460. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  461. }
  462. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  463. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  464. NETDATA_EBPF_CHART_TYPE_STACKED, 20063,
  465. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_CONTEXT,
  466. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  467. if (em->mode < MODE_ENTRY) {
  468. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  469. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  470. NETDATA_EBPF_CHART_TYPE_STACKED, 20064,
  471. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_ERR_CONTEXT,
  472. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  473. }
  474. }
  475. /**
  476. * Send Systemd charts
  477. *
  478. * Send collected data to Netdata.
  479. *
  480. * @param em the main collector structure
  481. *
  482. * @return It returns the status for chart creation, if it is necessary to remove a specific dimension zero is returned
  483. * otherwise function returns 1 to avoid chart recreation
  484. */
  485. static int ebpf_send_systemd_fd_charts(ebpf_module_t *em)
  486. {
  487. int ret = 1;
  488. ebpf_cgroup_target_t *ect;
  489. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  490. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  491. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  492. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_call);
  493. } else if (unlikely(ect->systemd))
  494. ret = 0;
  495. }
  496. write_end_chart();
  497. if (em->mode < MODE_ENTRY) {
  498. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  499. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  500. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  501. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_err);
  502. }
  503. }
  504. write_end_chart();
  505. }
  506. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  507. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  508. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  509. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_call);
  510. }
  511. }
  512. write_end_chart();
  513. if (em->mode < MODE_ENTRY) {
  514. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  515. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  516. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  517. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_err);
  518. }
  519. }
  520. write_end_chart();
  521. }
  522. return ret;
  523. }
  524. /**
  525. * Send data to Netdata calling auxiliary functions.
  526. *
  527. * @param em the main collector structure
  528. */
  529. static void ebpf_fd_send_cgroup_data(ebpf_module_t *em)
  530. {
  531. if (!ebpf_cgroup_pids)
  532. return;
  533. pthread_mutex_lock(&mutex_cgroup_shm);
  534. ebpf_cgroup_target_t *ect;
  535. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  536. ebpf_fd_sum_cgroup_pids(&ect->publish_systemd_fd, ect->pids);
  537. }
  538. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  539. if (has_systemd) {
  540. static int systemd_charts = 0;
  541. if (!systemd_charts) {
  542. ebpf_create_systemd_fd_charts(em);
  543. systemd_charts = 1;
  544. }
  545. systemd_charts = ebpf_send_systemd_fd_charts(em);
  546. }
  547. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  548. if (ect->systemd)
  549. continue;
  550. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART) && ect->updated) {
  551. ebpf_create_specific_fd_charts(ect->name, em);
  552. ect->flags |= NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  553. }
  554. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART ) {
  555. if (ect->updated) {
  556. ebpf_send_specific_fd_data(ect->name, &ect->publish_systemd_fd, em);
  557. } else {
  558. ebpf_obsolete_specific_fd_charts(ect->name, em);
  559. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  560. }
  561. }
  562. }
  563. pthread_mutex_unlock(&mutex_cgroup_shm);
  564. }
  565. /**
  566. * Main loop for this collector.
  567. */
  568. static void fd_collector(ebpf_module_t *em)
  569. {
  570. fd_thread.thread = mallocz(sizeof(netdata_thread_t));
  571. fd_thread.start_routine = ebpf_fd_read_hash;
  572. netdata_thread_create(fd_thread.thread, fd_thread.name, NETDATA_THREAD_OPTION_DEFAULT,
  573. ebpf_fd_read_hash, em);
  574. int cgroups = em->cgroup_charts;
  575. heartbeat_t hb;
  576. heartbeat_init(&hb);
  577. usec_t step = em->update_every * USEC_PER_SEC;
  578. while (!ebpf_exit_plugin) {
  579. (void)heartbeat_next(&hb, step);
  580. if (ebpf_exit_plugin)
  581. break;
  582. netdata_apps_integration_flags_t apps = em->apps_charts;
  583. pthread_mutex_lock(&collect_data_mutex);
  584. if (apps)
  585. read_apps_table();
  586. if (cgroups)
  587. ebpf_update_fd_cgroup();
  588. pthread_mutex_lock(&lock);
  589. ebpf_fd_send_data(em);
  590. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  591. ebpf_fd_send_apps_data(em, apps_groups_root_target);
  592. if (cgroups)
  593. ebpf_fd_send_cgroup_data(em);
  594. pthread_mutex_unlock(&lock);
  595. pthread_mutex_unlock(&collect_data_mutex);
  596. }
  597. }
  598. /*****************************************************************
  599. *
  600. * CREATE CHARTS
  601. *
  602. *****************************************************************/
  603. /**
  604. * Create apps charts
  605. *
  606. * Call ebpf_create_chart to create the charts on apps submenu.
  607. *
  608. * @param em a pointer to the structure with the default values.
  609. */
  610. void ebpf_fd_create_apps_charts(struct ebpf_module *em, void *ptr)
  611. {
  612. struct target *root = ptr;
  613. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN,
  614. "Number of open files",
  615. EBPF_COMMON_DIMENSION_CALL,
  616. NETDATA_APPS_FILE_GROUP,
  617. NETDATA_EBPF_CHART_TYPE_STACKED,
  618. 20061,
  619. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  620. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  621. if (em->mode < MODE_ENTRY) {
  622. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR,
  623. "Fails to open files",
  624. EBPF_COMMON_DIMENSION_CALL,
  625. NETDATA_APPS_FILE_GROUP,
  626. NETDATA_EBPF_CHART_TYPE_STACKED,
  627. 20062,
  628. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  629. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  630. }
  631. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSED,
  632. "Files closed",
  633. EBPF_COMMON_DIMENSION_CALL,
  634. NETDATA_APPS_FILE_GROUP,
  635. NETDATA_EBPF_CHART_TYPE_STACKED,
  636. 20063,
  637. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  638. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  639. if (em->mode < MODE_ENTRY) {
  640. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR,
  641. "Fails to close files",
  642. EBPF_COMMON_DIMENSION_CALL,
  643. NETDATA_APPS_FILE_GROUP,
  644. NETDATA_EBPF_CHART_TYPE_STACKED,
  645. 20064,
  646. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  647. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  648. }
  649. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  650. }
  651. /**
  652. * Create global charts
  653. *
  654. * Call ebpf_create_chart to create the charts for the collector.
  655. *
  656. * @param em a pointer to the structure with the default values.
  657. */
  658. static void ebpf_create_fd_global_charts(ebpf_module_t *em)
  659. {
  660. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  661. NETDATA_FILE_OPEN_CLOSE_COUNT,
  662. "Open and close calls",
  663. EBPF_COMMON_DIMENSION_CALL,
  664. NETDATA_FILE_GROUP,
  665. NULL,
  666. NETDATA_EBPF_CHART_TYPE_LINE,
  667. NETDATA_CHART_PRIO_EBPF_FD_CHARTS,
  668. ebpf_create_global_dimension,
  669. fd_publish_aggregated,
  670. NETDATA_FD_SYSCALL_END,
  671. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  672. if (em->mode < MODE_ENTRY) {
  673. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  674. NETDATA_FILE_OPEN_ERR_COUNT,
  675. "Open fails",
  676. EBPF_COMMON_DIMENSION_CALL,
  677. NETDATA_FILE_GROUP,
  678. NULL,
  679. NETDATA_EBPF_CHART_TYPE_LINE,
  680. NETDATA_CHART_PRIO_EBPF_FD_CHARTS + 1,
  681. ebpf_create_global_dimension,
  682. fd_publish_aggregated,
  683. NETDATA_FD_SYSCALL_END,
  684. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  685. }
  686. }
  687. /*****************************************************************
  688. *
  689. * MAIN THREAD
  690. *
  691. *****************************************************************/
  692. /**
  693. * Allocate vectors used with this thread.
  694. *
  695. * We are not testing the return, because callocz does this and shutdown the software
  696. * case it was not possible to allocate.
  697. *
  698. * @param apps is apps enabled?
  699. */
  700. static void ebpf_fd_allocate_global_vectors(int apps)
  701. {
  702. if (apps)
  703. fd_pid = callocz((size_t)pid_max, sizeof(netdata_fd_stat_t *));
  704. fd_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_fd_stat_t));
  705. fd_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  706. }
  707. /**
  708. * Directory Cache thread
  709. *
  710. * Thread used to make dcstat thread
  711. *
  712. * @param ptr a pointer to `struct ebpf_module`
  713. *
  714. * @return It always returns NULL
  715. */
  716. void *ebpf_fd_thread(void *ptr)
  717. {
  718. netdata_thread_cleanup_push(ebpf_fd_exit, ptr);
  719. ebpf_module_t *em = (ebpf_module_t *)ptr;
  720. em->maps = fd_maps;
  721. if (!em->enabled)
  722. goto endfd;
  723. ebpf_fd_allocate_global_vectors(em->apps_charts);
  724. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  725. if (!em->probe_links) {
  726. em->enabled = CONFIG_BOOLEAN_NO;
  727. goto endfd;
  728. }
  729. int algorithms[NETDATA_FD_SYSCALL_END] = {
  730. NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX
  731. };
  732. ebpf_global_labels(fd_aggregated_data, fd_publish_aggregated, fd_dimension_names, fd_id_names,
  733. algorithms, NETDATA_FD_SYSCALL_END);
  734. pthread_mutex_lock(&lock);
  735. ebpf_create_fd_global_charts(em);
  736. ebpf_update_stats(&plugin_statistics, em);
  737. pthread_mutex_unlock(&lock);
  738. fd_collector(em);
  739. endfd:
  740. if (!em->enabled)
  741. ebpf_update_disabled_plugin_stats(em);
  742. netdata_thread_cleanup_pop(1);
  743. return NULL;
  744. }