ebpf_mount.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_mount.h"
  4. static ebpf_local_maps_t mount_maps[] = {{.name = "tbl_mount", .internal_input = NETDATA_MOUNT_END,
  5. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  6. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  7. {.name = NULL, .internal_input = 0, .user_input = 0,
  8. .type = NETDATA_EBPF_MAP_CONTROLLER,
  9. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  10. static char *mount_dimension_name[NETDATA_EBPF_MOUNT_SYSCALL] = { "mount", "umount" };
  11. static netdata_syscall_stat_t mount_aggregated_data[NETDATA_EBPF_MOUNT_SYSCALL];
  12. static netdata_publish_syscall_t mount_publish_aggregated[NETDATA_EBPF_MOUNT_SYSCALL];
  13. struct config mount_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  14. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  15. .rwlock = AVL_LOCK_INITIALIZER } };
  16. static netdata_idx_t *mount_values = NULL;
  17. static netdata_idx_t mount_hash_values[NETDATA_MOUNT_END];
  18. struct netdata_static_thread mount_thread = {
  19. .name = "MOUNT KERNEL",
  20. .config_section = NULL,
  21. .config_name = NULL,
  22. .env_name = NULL,
  23. .enabled = 1,
  24. .thread = NULL,
  25. .init_routine = NULL,
  26. .start_routine = NULL
  27. };
  28. netdata_ebpf_targets_t mount_targets[] = { {.name = "mount", .mode = EBPF_LOAD_TRAMPOLINE},
  29. {.name = "umount", .mode = EBPF_LOAD_TRAMPOLINE},
  30. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  31. #ifdef LIBBPF_MAJOR_VERSION
  32. #include "includes/mount.skel.h" // BTF code
  33. static struct mount_bpf *bpf_obj = NULL;
  34. /*****************************************************************
  35. *
  36. * BTF FUNCTIONS
  37. *
  38. *****************************************************************/
  39. /*
  40. * Disable probe
  41. *
  42. * Disable all probes to use exclusively another method.
  43. *
  44. * @param obj is the main structure for bpf objects.
  45. */
  46. static inline void ebpf_mount_disable_probe(struct mount_bpf *obj)
  47. {
  48. bpf_program__set_autoload(obj->progs.netdata_mount_probe, false);
  49. bpf_program__set_autoload(obj->progs.netdata_umount_probe, false);
  50. bpf_program__set_autoload(obj->progs.netdata_mount_retprobe, false);
  51. bpf_program__set_autoload(obj->progs.netdata_umount_retprobe, false);
  52. }
  53. /*
  54. * Disable tracepoint
  55. *
  56. * Disable all tracepoints to use exclusively another method.
  57. *
  58. * @param obj is the main structure for bpf objects.
  59. */
  60. static inline void ebpf_mount_disable_tracepoint(struct mount_bpf *obj)
  61. {
  62. bpf_program__set_autoload(obj->progs.netdata_mount_exit, false);
  63. bpf_program__set_autoload(obj->progs.netdata_umount_exit, false);
  64. }
  65. /*
  66. * Disable trampoline
  67. *
  68. * Disable all trampoline to use exclusively another method.
  69. *
  70. * @param obj is the main structure for bpf objects.
  71. */
  72. static inline void ebpf_mount_disable_trampoline(struct mount_bpf *obj)
  73. {
  74. bpf_program__set_autoload(obj->progs.netdata_mount_fentry, false);
  75. bpf_program__set_autoload(obj->progs.netdata_umount_fentry, false);
  76. bpf_program__set_autoload(obj->progs.netdata_mount_fexit, false);
  77. bpf_program__set_autoload(obj->progs.netdata_umount_fexit, false);
  78. }
  79. /**
  80. * Set trampoline target
  81. *
  82. * Set the targets we will monitor.
  83. *
  84. * @param obj is the main structure for bpf objects.
  85. */
  86. static inline void netdata_set_trampoline_target(struct mount_bpf *obj)
  87. {
  88. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  89. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  90. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  91. bpf_program__set_attach_target(obj->progs.netdata_mount_fentry, 0,
  92. syscall);
  93. bpf_program__set_attach_target(obj->progs.netdata_mount_fexit, 0,
  94. syscall);
  95. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  96. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  97. bpf_program__set_attach_target(obj->progs.netdata_umount_fentry, 0,
  98. syscall);
  99. bpf_program__set_attach_target(obj->progs.netdata_umount_fexit, 0,
  100. syscall);
  101. }
  102. /**
  103. * Mount Attach Probe
  104. *
  105. * Attach probes to target
  106. *
  107. * @param obj is the main structure for bpf objects.
  108. *
  109. * @return It returns 0 on success and -1 otherwise.
  110. */
  111. static int ebpf_mount_attach_probe(struct mount_bpf *obj)
  112. {
  113. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  114. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  115. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  116. obj->links.netdata_mount_probe = bpf_program__attach_kprobe(obj->progs.netdata_mount_probe,
  117. false, syscall);
  118. int ret = (int)libbpf_get_error(obj->links.netdata_mount_probe);
  119. if (ret)
  120. return -1;
  121. obj->links.netdata_mount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_mount_retprobe,
  122. true, syscall);
  123. ret = (int)libbpf_get_error(obj->links.netdata_mount_retprobe);
  124. if (ret)
  125. return -1;
  126. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  127. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  128. obj->links.netdata_umount_probe = bpf_program__attach_kprobe(obj->progs.netdata_umount_probe,
  129. false, syscall);
  130. ret = (int)libbpf_get_error(obj->links.netdata_umount_probe);
  131. if (ret)
  132. return -1;
  133. obj->links.netdata_umount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_umount_retprobe,
  134. true, syscall);
  135. ret = (int)libbpf_get_error(obj->links.netdata_umount_retprobe);
  136. if (ret)
  137. return -1;
  138. return 0;
  139. }
  140. /**
  141. * Set hash tables
  142. *
  143. * Set the values for maps according the value given by kernel.
  144. *
  145. * @param obj is the main structure for bpf objects.
  146. */
  147. static void ebpf_mount_set_hash_tables(struct mount_bpf *obj)
  148. {
  149. mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_mount);
  150. }
  151. /**
  152. * Load and attach
  153. *
  154. * Load and attach the eBPF code in kernel.
  155. *
  156. * @param obj is the main structure for bpf objects.
  157. * @param em structure with configuration
  158. *
  159. * @return it returns 0 on success and -1 otherwise
  160. */
  161. static inline int ebpf_mount_load_and_attach(struct mount_bpf *obj, ebpf_module_t *em)
  162. {
  163. netdata_ebpf_targets_t *mt = em->targets;
  164. netdata_ebpf_program_loaded_t test = mt[NETDATA_MOUNT_SYSCALL].mode;
  165. // We are testing only one, because all will have the same behavior
  166. if (test == EBPF_LOAD_TRAMPOLINE ) {
  167. ebpf_mount_disable_probe(obj);
  168. ebpf_mount_disable_tracepoint(obj);
  169. netdata_set_trampoline_target(obj);
  170. } else if (test == EBPF_LOAD_PROBE ||
  171. test == EBPF_LOAD_RETPROBE ) {
  172. ebpf_mount_disable_tracepoint(obj);
  173. ebpf_mount_disable_trampoline(obj);
  174. } else {
  175. ebpf_mount_disable_probe(obj);
  176. ebpf_mount_disable_trampoline(obj);
  177. }
  178. int ret = mount_bpf__load(obj);
  179. if (!ret) {
  180. if (test != EBPF_LOAD_PROBE && test != EBPF_LOAD_RETPROBE )
  181. ret = mount_bpf__attach(obj);
  182. else
  183. ret = ebpf_mount_attach_probe(obj);
  184. if (!ret)
  185. ebpf_mount_set_hash_tables(obj);
  186. }
  187. return ret;
  188. }
  189. #endif
  190. /*****************************************************************
  191. *
  192. * FUNCTIONS TO CLOSE THE THREAD
  193. *
  194. *****************************************************************/
  195. /**
  196. * Mount Free
  197. *
  198. * Cleanup variables after child threads to stop
  199. *
  200. * @param ptr thread data.
  201. */
  202. static void ebpf_mount_free(ebpf_module_t *em)
  203. {
  204. pthread_mutex_lock(&ebpf_exit_cleanup);
  205. if (em->thread->enabled == NETDATA_THREAD_EBPF_RUNNING) {
  206. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPING;
  207. pthread_mutex_unlock(&ebpf_exit_cleanup);
  208. return;
  209. }
  210. pthread_mutex_unlock(&ebpf_exit_cleanup);
  211. freez(mount_thread.thread);
  212. freez(mount_values);
  213. #ifdef LIBBPF_MAJOR_VERSION
  214. if (bpf_obj)
  215. mount_bpf__destroy(bpf_obj);
  216. #endif
  217. pthread_mutex_lock(&ebpf_exit_cleanup);
  218. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  219. pthread_mutex_unlock(&ebpf_exit_cleanup);
  220. }
  221. /**
  222. * Mount Exit
  223. *
  224. * Cancel child thread.
  225. *
  226. * @param ptr thread data.
  227. */
  228. static void ebpf_mount_exit(void *ptr)
  229. {
  230. ebpf_module_t *em = (ebpf_module_t *)ptr;
  231. if (mount_thread.thread)
  232. netdata_thread_cancel(*mount_thread.thread);
  233. ebpf_mount_free(em);
  234. }
  235. /**
  236. * Mount cleanup
  237. *
  238. * Clean up allocated memory.
  239. *
  240. * @param ptr thread data.
  241. */
  242. static void ebpf_mount_cleanup(void *ptr)
  243. {
  244. ebpf_module_t *em = (ebpf_module_t *)ptr;
  245. ebpf_mount_free(em);
  246. }
  247. /*****************************************************************
  248. *
  249. * MAIN LOOP
  250. *
  251. *****************************************************************/
  252. /**
  253. * Read global table
  254. *
  255. * Read the table with number of calls for all functions
  256. */
  257. static void read_global_table()
  258. {
  259. uint32_t idx;
  260. netdata_idx_t *val = mount_hash_values;
  261. netdata_idx_t *stored = mount_values;
  262. int fd = mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd;
  263. for (idx = NETDATA_KEY_MOUNT_CALL; idx < NETDATA_MOUNT_END; idx++) {
  264. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  265. int i;
  266. int end = ebpf_nprocs;
  267. netdata_idx_t total = 0;
  268. for (i = 0; i < end; i++)
  269. total += stored[i];
  270. val[idx] = total;
  271. }
  272. }
  273. }
  274. /**
  275. * Mount read hash
  276. *
  277. * This is the thread callback.
  278. * This thread is necessary, because we cannot freeze the whole plugin to read the data.
  279. *
  280. * @param ptr It is a NULL value for this thread.
  281. *
  282. * @return It always returns NULL.
  283. */
  284. void *ebpf_mount_read_hash(void *ptr)
  285. {
  286. netdata_thread_cleanup_push(ebpf_mount_cleanup, ptr);
  287. heartbeat_t hb;
  288. heartbeat_init(&hb);
  289. ebpf_module_t *em = (ebpf_module_t *)ptr;
  290. usec_t step = NETDATA_LATENCY_MOUNT_SLEEP_MS * em->update_every;
  291. //This will be cancelled by its parent
  292. while (!ebpf_exit_plugin) {
  293. (void)heartbeat_next(&hb, step);
  294. read_global_table();
  295. }
  296. netdata_thread_cleanup_pop(1);
  297. return NULL;
  298. }
  299. /**
  300. * Send data to Netdata calling auxiliary functions.
  301. */
  302. static void ebpf_mount_send_data()
  303. {
  304. int i, j;
  305. int end = NETDATA_EBPF_MOUNT_SYSCALL;
  306. for (i = NETDATA_KEY_MOUNT_CALL, j = NETDATA_KEY_MOUNT_ERROR; i < end; i++, j++) {
  307. mount_publish_aggregated[i].ncall = mount_hash_values[i];
  308. mount_publish_aggregated[i].nerr = mount_hash_values[j];
  309. }
  310. write_count_chart(NETDATA_EBPF_MOUNT_CALLS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  311. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  312. write_err_chart(NETDATA_EBPF_MOUNT_ERRORS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  313. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  314. }
  315. /**
  316. * Main loop for this collector.
  317. */
  318. static void mount_collector(ebpf_module_t *em)
  319. {
  320. mount_thread.thread = mallocz(sizeof(netdata_thread_t));
  321. mount_thread.start_routine = ebpf_mount_read_hash;
  322. memset(mount_hash_values, 0, sizeof(mount_hash_values));
  323. mount_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  324. netdata_thread_create(mount_thread.thread, mount_thread.name, NETDATA_THREAD_OPTION_DEFAULT,
  325. ebpf_mount_read_hash, em);
  326. heartbeat_t hb;
  327. heartbeat_init(&hb);
  328. usec_t step = em->update_every * USEC_PER_SEC;
  329. while (!ebpf_exit_plugin) {
  330. (void)heartbeat_next(&hb, step);
  331. if (ebpf_exit_plugin)
  332. break;
  333. pthread_mutex_lock(&lock);
  334. ebpf_mount_send_data();
  335. pthread_mutex_unlock(&lock);
  336. }
  337. }
  338. /*****************************************************************
  339. *
  340. * INITIALIZE THREAD
  341. *
  342. *****************************************************************/
  343. /**
  344. * Create mount charts
  345. *
  346. * Call ebpf_create_chart to create the charts for the collector.
  347. *
  348. * @param update_every value to overwrite the update frequency set by the server.
  349. */
  350. static void ebpf_create_mount_charts(int update_every)
  351. {
  352. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_CALLS,
  353. "Calls to mount and umount syscalls",
  354. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  355. NULL,
  356. NETDATA_EBPF_CHART_TYPE_LINE,
  357. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS,
  358. ebpf_create_global_dimension,
  359. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  360. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  361. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_ERRORS,
  362. "Errors to mount and umount file systems",
  363. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  364. NULL,
  365. NETDATA_EBPF_CHART_TYPE_LINE,
  366. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS + 1,
  367. ebpf_create_global_dimension,
  368. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  369. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  370. fflush(stdout);
  371. }
  372. /*****************************************************************
  373. *
  374. * MAIN THREAD
  375. *
  376. *****************************************************************/
  377. /*
  378. * Load BPF
  379. *
  380. * Load BPF files.
  381. *
  382. * @param em the structure with configuration
  383. */
  384. static int ebpf_mount_load_bpf(ebpf_module_t *em)
  385. {
  386. int ret = 0;
  387. if (em->load & EBPF_LOAD_LEGACY) {
  388. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  389. if (!em->probe_links) {
  390. em->enabled = CONFIG_BOOLEAN_NO;
  391. ret = -1;
  392. }
  393. }
  394. #ifdef LIBBPF_MAJOR_VERSION
  395. else {
  396. bpf_obj = mount_bpf__open();
  397. if (!bpf_obj)
  398. ret = -1;
  399. else
  400. ret = ebpf_mount_load_and_attach(bpf_obj, em);
  401. }
  402. #endif
  403. if (ret)
  404. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  405. return ret;
  406. }
  407. /**
  408. * Mount thread
  409. *
  410. * Thread used to make mount thread
  411. *
  412. * @param ptr a pointer to `struct ebpf_module`
  413. *
  414. * @return It always returns NULL
  415. */
  416. void *ebpf_mount_thread(void *ptr)
  417. {
  418. netdata_thread_cleanup_push(ebpf_mount_exit, ptr);
  419. ebpf_module_t *em = (ebpf_module_t *)ptr;
  420. em->maps = mount_maps;
  421. #ifdef LIBBPF_MAJOR_VERSION
  422. ebpf_adjust_thread_load(em, default_btf);
  423. #endif
  424. if (ebpf_mount_load_bpf(em)) {
  425. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  426. goto endmount;
  427. }
  428. int algorithms[NETDATA_EBPF_MOUNT_SYSCALL] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  429. ebpf_global_labels(mount_aggregated_data, mount_publish_aggregated, mount_dimension_name, mount_dimension_name,
  430. algorithms, NETDATA_EBPF_MOUNT_SYSCALL);
  431. pthread_mutex_lock(&lock);
  432. ebpf_create_mount_charts(em->update_every);
  433. ebpf_update_stats(&plugin_statistics, em);
  434. pthread_mutex_unlock(&lock);
  435. mount_collector(em);
  436. endmount:
  437. ebpf_update_disabled_plugin_stats(em);
  438. netdata_thread_cleanup_pop(1);
  439. return NULL;
  440. }