ebpf_fd.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_fd.h"
  4. static char *fd_dimension_names[NETDATA_FD_SYSCALL_END] = { "open", "close" };
  5. static char *fd_id_names[NETDATA_FD_SYSCALL_END] = { "do_sys_open", "__close_fd" };
  6. static netdata_syscall_stat_t fd_aggregated_data[NETDATA_FD_SYSCALL_END];
  7. static netdata_publish_syscall_t fd_publish_aggregated[NETDATA_FD_SYSCALL_END];
  8. static ebpf_local_maps_t fd_maps[] = {{.name = "tbl_fd_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  9. .user_input = 0,
  10. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  11. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  12. {.name = "tbl_fd_global", .internal_input = NETDATA_KEY_END_VECTOR,
  13. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  14. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  15. {.name = "fd_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_CONTROLLER,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  19. {.name = NULL, .internal_input = 0, .user_input = 0,
  20. .type = NETDATA_EBPF_MAP_CONTROLLER,
  21. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  22. struct config fd_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  23. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  24. .rwlock = AVL_LOCK_INITIALIZER } };
  25. static struct bpf_link **probe_links = NULL;
  26. static struct bpf_object *objects = NULL;
  27. struct netdata_static_thread fd_thread = {"FD KERNEL", NULL, NULL, 1, NULL,
  28. NULL, NULL};
  29. static int read_thread_closed = 1;
  30. static netdata_idx_t fd_hash_values[NETDATA_FD_COUNTER];
  31. static netdata_idx_t *fd_values = NULL;
  32. netdata_fd_stat_t *fd_vector = NULL;
  33. netdata_fd_stat_t **fd_pid = NULL;
  34. /*****************************************************************
  35. *
  36. * FUNCTIONS TO CLOSE THE THREAD
  37. *
  38. *****************************************************************/
  39. /**
  40. * Clean PID structures
  41. *
  42. * Clean the allocated structures.
  43. */
  44. void clean_fd_pid_structures() {
  45. struct pid_stat *pids = root_of_pids;
  46. while (pids) {
  47. freez(fd_pid[pids->pid]);
  48. pids = pids->next;
  49. }
  50. }
  51. /**
  52. * Clean up the main thread.
  53. *
  54. * @param ptr thread data.
  55. */
  56. static void ebpf_fd_cleanup(void *ptr)
  57. {
  58. ebpf_module_t *em = (ebpf_module_t *)ptr;
  59. if (!em->enabled)
  60. return;
  61. heartbeat_t hb;
  62. heartbeat_init(&hb);
  63. uint32_t tick = 2 * USEC_PER_MS;
  64. while (!read_thread_closed) {
  65. usec_t dt = heartbeat_next(&hb, tick);
  66. UNUSED(dt);
  67. }
  68. ebpf_cleanup_publish_syscall(fd_publish_aggregated);
  69. freez(fd_thread.thread);
  70. freez(fd_values);
  71. freez(fd_vector);
  72. if (probe_links) {
  73. struct bpf_program *prog;
  74. size_t i = 0 ;
  75. bpf_object__for_each_program(prog, objects) {
  76. bpf_link__destroy(probe_links[i]);
  77. i++;
  78. }
  79. bpf_object__close(objects);
  80. }
  81. }
  82. /*****************************************************************
  83. *
  84. * MAIN LOOP
  85. *
  86. *****************************************************************/
  87. /**
  88. * Send data to Netdata calling auxiliary functions.
  89. *
  90. * @param em the structure with thread information
  91. */
  92. static void ebpf_fd_send_data(ebpf_module_t *em)
  93. {
  94. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].ncall = fd_hash_values[NETDATA_KEY_CALLS_DO_SYS_OPEN];
  95. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].nerr = fd_hash_values[NETDATA_KEY_ERROR_DO_SYS_OPEN];
  96. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].ncall = fd_hash_values[NETDATA_KEY_CALLS_CLOSE_FD];
  97. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].nerr = fd_hash_values[NETDATA_KEY_ERROR_CLOSE_FD];
  98. write_count_chart(NETDATA_FILE_OPEN_CLOSE_COUNT, NETDATA_FILESYSTEM_FAMILY, fd_publish_aggregated,
  99. NETDATA_FD_SYSCALL_END);
  100. if (em->mode < MODE_ENTRY) {
  101. write_err_chart(NETDATA_FILE_OPEN_ERR_COUNT, NETDATA_FILESYSTEM_FAMILY,
  102. fd_publish_aggregated, NETDATA_FD_SYSCALL_END);
  103. }
  104. }
  105. /**
  106. * Read global counter
  107. *
  108. * Read the table with number of calls for all functions
  109. */
  110. static void read_global_table()
  111. {
  112. uint32_t idx;
  113. netdata_idx_t *val = fd_hash_values;
  114. netdata_idx_t *stored = fd_values;
  115. int fd = fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd;
  116. for (idx = NETDATA_KEY_CALLS_DO_SYS_OPEN; idx < NETDATA_FD_COUNTER; idx++) {
  117. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  118. int i;
  119. int end = ebpf_nprocs;
  120. netdata_idx_t total = 0;
  121. for (i = 0; i < end; i++)
  122. total += stored[i];
  123. val[idx] = total;
  124. }
  125. }
  126. }
  127. /**
  128. * File descriptor read hash
  129. *
  130. * This is the thread callback.
  131. * This thread is necessary, because we cannot freeze the whole plugin to read the data.
  132. *
  133. * @param ptr It is a NULL value for this thread.
  134. *
  135. * @return It always returns NULL.
  136. */
  137. void *ebpf_fd_read_hash(void *ptr)
  138. {
  139. read_thread_closed = 0;
  140. heartbeat_t hb;
  141. heartbeat_init(&hb);
  142. ebpf_module_t *em = (ebpf_module_t *)ptr;
  143. usec_t step = NETDATA_FD_SLEEP_MS * em->update_every;
  144. while (!close_ebpf_plugin) {
  145. usec_t dt = heartbeat_next(&hb, step);
  146. (void)dt;
  147. read_global_table();
  148. }
  149. read_thread_closed = 1;
  150. return NULL;
  151. }
  152. /**
  153. * Apps Accumulator
  154. *
  155. * Sum all values read from kernel and store in the first address.
  156. *
  157. * @param out the vector with read values.
  158. */
  159. static void fd_apps_accumulator(netdata_fd_stat_t *out)
  160. {
  161. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  162. netdata_fd_stat_t *total = &out[0];
  163. for (i = 1; i < end; i++) {
  164. netdata_fd_stat_t *w = &out[i];
  165. total->open_call += w->open_call;
  166. total->close_call += w->close_call;
  167. total->open_err += w->open_err;
  168. total->close_err += w->close_err;
  169. }
  170. }
  171. /**
  172. * Fill PID
  173. *
  174. * Fill PID structures
  175. *
  176. * @param current_pid pid that we are collecting data
  177. * @param out values read from hash tables;
  178. */
  179. static void fd_fill_pid(uint32_t current_pid, netdata_fd_stat_t *publish)
  180. {
  181. netdata_fd_stat_t *curr = fd_pid[current_pid];
  182. if (!curr) {
  183. curr = callocz(1, sizeof(netdata_fd_stat_t));
  184. fd_pid[current_pid] = curr;
  185. }
  186. memcpy(curr, &publish[0], sizeof(netdata_fd_stat_t));
  187. }
  188. /**
  189. * Read APPS table
  190. *
  191. * Read the apps table and store data inside the structure.
  192. */
  193. static void read_apps_table()
  194. {
  195. netdata_fd_stat_t *fv = fd_vector;
  196. uint32_t key;
  197. struct pid_stat *pids = root_of_pids;
  198. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  199. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  200. while (pids) {
  201. key = pids->pid;
  202. if (bpf_map_lookup_elem(fd, &key, fv)) {
  203. pids = pids->next;
  204. continue;
  205. }
  206. fd_apps_accumulator(fv);
  207. fd_fill_pid(key, fv);
  208. // We are cleaning to avoid passing data read from one process to other.
  209. memset(fv, 0, length);
  210. pids = pids->next;
  211. }
  212. }
  213. /**
  214. * Update cgroup
  215. *
  216. * Update cgroup data based in
  217. */
  218. static void ebpf_update_fd_cgroup()
  219. {
  220. ebpf_cgroup_target_t *ect ;
  221. netdata_fd_stat_t *fv = fd_vector;
  222. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  223. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  224. pthread_mutex_lock(&mutex_cgroup_shm);
  225. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  226. struct pid_on_target2 *pids;
  227. for (pids = ect->pids; pids; pids = pids->next) {
  228. int pid = pids->pid;
  229. netdata_fd_stat_t *out = &pids->fd;
  230. if (likely(fd_pid) && fd_pid[pid]) {
  231. netdata_fd_stat_t *in = fd_pid[pid];
  232. memcpy(out, in, sizeof(netdata_fd_stat_t));
  233. } else {
  234. memset(fv, 0, length);
  235. if (!bpf_map_lookup_elem(fd, &pid, fv)) {
  236. fd_apps_accumulator(fv);
  237. memcpy(out, fv, sizeof(netdata_fd_stat_t));
  238. }
  239. }
  240. }
  241. }
  242. pthread_mutex_unlock(&mutex_cgroup_shm);
  243. }
  244. /**
  245. * Sum PIDs
  246. *
  247. * Sum values for all targets.
  248. *
  249. * @param fd the output
  250. * @param root list of pids
  251. */
  252. static void ebpf_fd_sum_pids(netdata_fd_stat_t *fd, struct pid_on_target *root)
  253. {
  254. uint32_t open_call = 0;
  255. uint32_t close_call = 0;
  256. uint32_t open_err = 0;
  257. uint32_t close_err = 0;
  258. while (root) {
  259. int32_t pid = root->pid;
  260. netdata_fd_stat_t *w = fd_pid[pid];
  261. if (w) {
  262. open_call += w->open_call;
  263. close_call += w->close_call;
  264. open_err += w->open_err;
  265. close_err += w->close_err;
  266. }
  267. root = root->next;
  268. }
  269. // These conditions were added, because we are using incremental algorithm
  270. fd->open_call = (open_call >= fd->open_call) ? open_call : fd->open_call;
  271. fd->close_call = (close_call >= fd->close_call) ? close_call : fd->close_call;
  272. fd->open_err = (open_err >= fd->open_err) ? open_err : fd->open_err;
  273. fd->close_err = (close_err >= fd->close_err) ? close_err : fd->close_err;
  274. }
  275. /**
  276. * Send data to Netdata calling auxiliary functions.
  277. *
  278. * @param em the structure with thread information
  279. * @param root the target list.
  280. */
  281. void ebpf_fd_send_apps_data(ebpf_module_t *em, struct target *root)
  282. {
  283. struct target *w;
  284. for (w = root; w; w = w->next) {
  285. if (unlikely(w->exposed && w->processes)) {
  286. ebpf_fd_sum_pids(&w->fd, w->root_pid);
  287. }
  288. }
  289. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  290. for (w = root; w; w = w->next) {
  291. if (unlikely(w->exposed && w->processes)) {
  292. write_chart_dimension(w->name, w->fd.open_call);
  293. }
  294. }
  295. write_end_chart();
  296. if (em->mode < MODE_ENTRY) {
  297. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  298. for (w = root; w; w = w->next) {
  299. if (unlikely(w->exposed && w->processes)) {
  300. write_chart_dimension(w->name, w->fd.open_err);
  301. }
  302. }
  303. write_end_chart();
  304. }
  305. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  306. for (w = root; w; w = w->next) {
  307. if (unlikely(w->exposed && w->processes)) {
  308. write_chart_dimension(w->name, w->fd.close_call);
  309. }
  310. }
  311. write_end_chart();
  312. if (em->mode < MODE_ENTRY) {
  313. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  314. for (w = root; w; w = w->next) {
  315. if (unlikely(w->exposed && w->processes)) {
  316. write_chart_dimension(w->name, w->fd.close_err);
  317. }
  318. }
  319. write_end_chart();
  320. }
  321. }
  322. /**
  323. * Sum PIDs
  324. *
  325. * Sum values for all targets.
  326. *
  327. * @param fd structure used to store data
  328. * @param pids input data
  329. */
  330. static void ebpf_fd_sum_cgroup_pids(netdata_fd_stat_t *fd, struct pid_on_target2 *pids)
  331. {
  332. netdata_fd_stat_t accumulator;
  333. memset(&accumulator, 0, sizeof(accumulator));
  334. while (pids) {
  335. netdata_fd_stat_t *w = &pids->fd;
  336. accumulator.open_err += w->open_err;
  337. accumulator.open_call += w->open_call;
  338. accumulator.close_call += w->close_call;
  339. accumulator.close_err += w->close_err;
  340. pids = pids->next;
  341. }
  342. fd->open_call = (accumulator.open_call >= fd->open_call) ? accumulator.open_call : fd->open_call;
  343. fd->open_err = (accumulator.open_err >= fd->open_err) ? accumulator.open_err : fd->open_err;
  344. fd->close_call = (accumulator.close_call >= fd->close_call) ? accumulator.close_call : fd->close_call;
  345. fd->close_err = (accumulator.close_err >= fd->close_err) ? accumulator.close_err : fd->close_err;
  346. }
  347. /**
  348. * Create specific file descriptor charts
  349. *
  350. * Create charts for cgroup/application.
  351. *
  352. * @param type the chart type.
  353. * @param em the main thread structure.
  354. */
  355. static void ebpf_create_specific_fd_charts(char *type, ebpf_module_t *em)
  356. {
  357. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  358. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  359. NETDATA_CGROUP_FD_OPEN_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  360. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400,
  361. ebpf_create_global_dimension,
  362. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  363. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  364. if (em->mode < MODE_ENTRY) {
  365. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  366. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  367. NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  368. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401,
  369. ebpf_create_global_dimension,
  370. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  371. 1, em->update_every,
  372. NETDATA_EBPF_MODULE_NAME_SWAP);
  373. }
  374. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  375. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  376. NETDATA_CGROUP_FD_CLOSE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  377. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402,
  378. ebpf_create_global_dimension,
  379. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  380. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  381. if (em->mode < MODE_ENTRY) {
  382. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  383. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  384. NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  385. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403,
  386. ebpf_create_global_dimension,
  387. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  388. 1, em->update_every,
  389. NETDATA_EBPF_MODULE_NAME_SWAP);
  390. }
  391. }
  392. /**
  393. * Obsolete specific file descriptor charts
  394. *
  395. * Obsolete charts for cgroup/application.
  396. *
  397. * @param type the chart type.
  398. * @param em the main thread structure.
  399. */
  400. static void ebpf_obsolete_specific_fd_charts(char *type, ebpf_module_t *em)
  401. {
  402. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  403. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  404. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_CONTEXT,
  405. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400, em->update_every);
  406. if (em->mode < MODE_ENTRY) {
  407. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  408. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  409. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT,
  410. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401, em->update_every);
  411. }
  412. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  413. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  414. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_CONTEXT,
  415. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402, em->update_every);
  416. if (em->mode < MODE_ENTRY) {
  417. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  418. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  419. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT,
  420. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403, em->update_every);
  421. }
  422. }
  423. /*
  424. * Send specific file descriptor data
  425. *
  426. * Send data for specific cgroup/apps.
  427. *
  428. * @param type chart type
  429. * @param values structure with values that will be sent to netdata
  430. */
  431. static void ebpf_send_specific_fd_data(char *type, netdata_fd_stat_t *values, ebpf_module_t *em)
  432. {
  433. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN);
  434. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_call);
  435. write_end_chart();
  436. if (em->mode < MODE_ENTRY) {
  437. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  438. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_err);
  439. write_end_chart();
  440. }
  441. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  442. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_call);
  443. write_end_chart();
  444. if (em->mode < MODE_ENTRY) {
  445. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  446. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_err);
  447. write_end_chart();
  448. }
  449. }
  450. /**
  451. * Create systemd file descriptor charts
  452. *
  453. * Create charts when systemd is enabled
  454. *
  455. * @param em the main collector structure
  456. **/
  457. static void ebpf_create_systemd_fd_charts(ebpf_module_t *em)
  458. {
  459. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  460. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  461. NETDATA_EBPF_CHART_TYPE_STACKED, 20061,
  462. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_CONTEXT,
  463. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  464. if (em->mode < MODE_ENTRY) {
  465. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  466. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  467. NETDATA_EBPF_CHART_TYPE_STACKED, 20062,
  468. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_ERR_CONTEXT,
  469. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  470. }
  471. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  472. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  473. NETDATA_EBPF_CHART_TYPE_STACKED, 20063,
  474. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_CONTEXT,
  475. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  476. if (em->mode < MODE_ENTRY) {
  477. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  478. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  479. NETDATA_EBPF_CHART_TYPE_STACKED, 20064,
  480. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_ERR_CONTEXT,
  481. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  482. }
  483. }
  484. /**
  485. * Send Systemd charts
  486. *
  487. * Send collected data to Netdata.
  488. *
  489. * @param em the main collector structure
  490. *
  491. * @return It returns the status for chart creation, if it is necessary to remove a specific dimension zero is returned
  492. * otherwise function returns 1 to avoid chart recreation
  493. */
  494. static int ebpf_send_systemd_fd_charts(ebpf_module_t *em)
  495. {
  496. int ret = 1;
  497. ebpf_cgroup_target_t *ect;
  498. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  499. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  500. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  501. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_call);
  502. } else
  503. ret = 0;
  504. }
  505. write_end_chart();
  506. if (em->mode < MODE_ENTRY) {
  507. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  508. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  509. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  510. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_err);
  511. }
  512. }
  513. write_end_chart();
  514. }
  515. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  516. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  517. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  518. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_call);
  519. }
  520. }
  521. write_end_chart();
  522. if (em->mode < MODE_ENTRY) {
  523. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  524. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  525. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  526. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_err);
  527. }
  528. }
  529. write_end_chart();
  530. }
  531. return ret;
  532. }
  533. /**
  534. * Send data to Netdata calling auxiliary functions.
  535. *
  536. * @param em the main collector structure
  537. */
  538. static void ebpf_fd_send_cgroup_data(ebpf_module_t *em)
  539. {
  540. if (!ebpf_cgroup_pids)
  541. return;
  542. pthread_mutex_lock(&mutex_cgroup_shm);
  543. ebpf_cgroup_target_t *ect;
  544. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  545. ebpf_fd_sum_cgroup_pids(&ect->publish_systemd_fd, ect->pids);
  546. }
  547. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  548. if (has_systemd) {
  549. static int systemd_charts = 0;
  550. if (!systemd_charts) {
  551. ebpf_create_systemd_fd_charts(em);
  552. systemd_charts = 1;
  553. }
  554. systemd_charts = ebpf_send_systemd_fd_charts(em);
  555. }
  556. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  557. if (ect->systemd)
  558. continue;
  559. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART) && ect->updated) {
  560. ebpf_create_specific_fd_charts(ect->name, em);
  561. ect->flags |= NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  562. }
  563. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART ) {
  564. if (ect->updated) {
  565. ebpf_send_specific_fd_data(ect->name, &ect->publish_systemd_fd, em);
  566. } else {
  567. ebpf_obsolete_specific_fd_charts(ect->name, em);
  568. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  569. }
  570. }
  571. }
  572. pthread_mutex_unlock(&mutex_cgroup_shm);
  573. }
  574. /**
  575. * Main loop for this collector.
  576. */
  577. static void fd_collector(ebpf_module_t *em)
  578. {
  579. fd_thread.thread = mallocz(sizeof(netdata_thread_t));
  580. fd_thread.start_routine = ebpf_fd_read_hash;
  581. netdata_thread_create(fd_thread.thread, fd_thread.name, NETDATA_THREAD_OPTION_JOINABLE,
  582. ebpf_fd_read_hash, em);
  583. int apps = em->apps_charts;
  584. int cgroups = em->cgroup_charts;
  585. int update_every = em->update_every;
  586. int counter = update_every - 1;
  587. while (!close_ebpf_plugin) {
  588. pthread_mutex_lock(&collect_data_mutex);
  589. pthread_cond_wait(&collect_data_cond_var, &collect_data_mutex);
  590. if (++counter == update_every) {
  591. counter = 0;
  592. if (apps)
  593. read_apps_table();
  594. if (cgroups)
  595. ebpf_update_fd_cgroup();
  596. pthread_mutex_lock(&lock);
  597. ebpf_fd_send_data(em);
  598. if (apps)
  599. ebpf_fd_send_apps_data(em, apps_groups_root_target);
  600. if (cgroups)
  601. ebpf_fd_send_cgroup_data(em);
  602. pthread_mutex_unlock(&lock);
  603. }
  604. pthread_mutex_unlock(&collect_data_mutex);
  605. }
  606. }
  607. /*****************************************************************
  608. *
  609. * CREATE CHARTS
  610. *
  611. *****************************************************************/
  612. /**
  613. * Create apps charts
  614. *
  615. * Call ebpf_create_chart to create the charts on apps submenu.
  616. *
  617. * @param em a pointer to the structure with the default values.
  618. */
  619. void ebpf_fd_create_apps_charts(struct ebpf_module *em, void *ptr)
  620. {
  621. struct target *root = ptr;
  622. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN,
  623. "Number of open files",
  624. EBPF_COMMON_DIMENSION_CALL,
  625. NETDATA_APPS_FILE_GROUP,
  626. NETDATA_EBPF_CHART_TYPE_STACKED,
  627. 20061,
  628. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  629. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  630. if (em->mode < MODE_ENTRY) {
  631. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR,
  632. "Fails to open files",
  633. EBPF_COMMON_DIMENSION_CALL,
  634. NETDATA_APPS_FILE_GROUP,
  635. NETDATA_EBPF_CHART_TYPE_STACKED,
  636. 20062,
  637. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  638. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  639. }
  640. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSED,
  641. "Files closed",
  642. EBPF_COMMON_DIMENSION_CALL,
  643. NETDATA_APPS_FILE_GROUP,
  644. NETDATA_EBPF_CHART_TYPE_STACKED,
  645. 20063,
  646. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  647. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  648. if (em->mode < MODE_ENTRY) {
  649. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR,
  650. "Fails to close files",
  651. EBPF_COMMON_DIMENSION_CALL,
  652. NETDATA_APPS_FILE_GROUP,
  653. NETDATA_EBPF_CHART_TYPE_STACKED,
  654. 20064,
  655. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  656. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  657. }
  658. }
  659. /**
  660. * Create global charts
  661. *
  662. * Call ebpf_create_chart to create the charts for the collector.
  663. *
  664. * @param em a pointer to the structure with the default values.
  665. */
  666. static void ebpf_create_fd_global_charts(ebpf_module_t *em)
  667. {
  668. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  669. NETDATA_FILE_OPEN_CLOSE_COUNT,
  670. "Open and close calls",
  671. EBPF_COMMON_DIMENSION_CALL,
  672. NETDATA_FILE_GROUP,
  673. NULL,
  674. NETDATA_EBPF_CHART_TYPE_LINE,
  675. NETDATA_CHART_PRIO_EBPF_FD_CHARTS,
  676. ebpf_create_global_dimension,
  677. fd_publish_aggregated,
  678. NETDATA_FD_SYSCALL_END,
  679. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  680. if (em->mode < MODE_ENTRY) {
  681. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  682. NETDATA_FILE_OPEN_ERR_COUNT,
  683. "Open fails",
  684. EBPF_COMMON_DIMENSION_CALL,
  685. NETDATA_FILE_GROUP,
  686. NULL,
  687. NETDATA_EBPF_CHART_TYPE_LINE,
  688. NETDATA_CHART_PRIO_EBPF_FD_CHARTS + 1,
  689. ebpf_create_global_dimension,
  690. fd_publish_aggregated,
  691. NETDATA_FD_SYSCALL_END,
  692. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  693. }
  694. }
  695. /*****************************************************************
  696. *
  697. * MAIN THREAD
  698. *
  699. *****************************************************************/
  700. /**
  701. * Allocate vectors used with this thread.
  702. *
  703. * We are not testing the return, because callocz does this and shutdown the software
  704. * case it was not possible to allocate.
  705. *
  706. * @param apps is apps enabled?
  707. */
  708. static void ebpf_fd_allocate_global_vectors(int apps)
  709. {
  710. if (apps)
  711. fd_pid = callocz((size_t)pid_max, sizeof(netdata_fd_stat_t *));
  712. fd_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_fd_stat_t));
  713. fd_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  714. }
  715. /**
  716. * Directory Cache thread
  717. *
  718. * Thread used to make dcstat thread
  719. *
  720. * @param ptr a pointer to `struct ebpf_module`
  721. *
  722. * @return It always returns NULL
  723. */
  724. void *ebpf_fd_thread(void *ptr)
  725. {
  726. netdata_thread_cleanup_push(ebpf_fd_cleanup, ptr);
  727. ebpf_module_t *em = (ebpf_module_t *)ptr;
  728. em->maps = fd_maps;
  729. if (!em->enabled)
  730. goto endfd;
  731. ebpf_fd_allocate_global_vectors(em->apps_charts);
  732. probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &objects);
  733. if (!probe_links) {
  734. em->enabled = CONFIG_BOOLEAN_NO;
  735. goto endfd;
  736. }
  737. int algorithms[NETDATA_FD_SYSCALL_END] = {
  738. NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX
  739. };
  740. ebpf_global_labels(fd_aggregated_data, fd_publish_aggregated, fd_dimension_names, fd_id_names,
  741. algorithms, NETDATA_FD_SYSCALL_END);
  742. pthread_mutex_lock(&lock);
  743. ebpf_create_fd_global_charts(em);
  744. ebpf_update_stats(&plugin_statistics, em);
  745. pthread_mutex_unlock(&lock);
  746. fd_collector(em);
  747. endfd:
  748. if (!em->enabled)
  749. ebpf_update_disabled_plugin_stats(em);
  750. netdata_thread_cleanup_pop(1);
  751. return NULL;
  752. }