ebpf_dcstat.c 41 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_dcstat.h"
  4. static char *dcstat_counter_dimension_name[NETDATA_DCSTAT_IDX_END] = { "ratio", "reference", "slow", "miss" };
  5. static netdata_syscall_stat_t dcstat_counter_aggregated_data[NETDATA_DCSTAT_IDX_END];
  6. static netdata_publish_syscall_t dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_END];
  7. netdata_dcstat_pid_t *dcstat_vector = NULL;
  8. netdata_publish_dcstat_t **dcstat_pid = NULL;
  9. static struct bpf_link **probe_links = NULL;
  10. static struct bpf_object *objects = NULL;
  11. static netdata_idx_t dcstat_hash_values[NETDATA_DCSTAT_IDX_END];
  12. static netdata_idx_t *dcstat_values = NULL;
  13. static int read_thread_closed = 1;
  14. struct config dcstat_config = { .first_section = NULL,
  15. .last_section = NULL,
  16. .mutex = NETDATA_MUTEX_INITIALIZER,
  17. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  18. .rwlock = AVL_LOCK_INITIALIZER } };
  19. struct netdata_static_thread dcstat_threads = {"DCSTAT KERNEL",
  20. NULL, NULL, 1, NULL,
  21. NULL, NULL};
  22. static ebpf_local_maps_t dcstat_maps[] = {{.name = "dcstat_global", .internal_input = NETDATA_DIRECTORY_CACHE_END,
  23. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  24. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  25. {.name = "dcstat_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  26. .user_input = 0,
  27. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  28. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  29. {.name = "dcstat_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  30. .user_input = 0,
  31. .type = NETDATA_EBPF_MAP_CONTROLLER,
  32. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  33. {.name = NULL, .internal_input = 0, .user_input = 0,
  34. .type = NETDATA_EBPF_MAP_CONTROLLER,
  35. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  36. static ebpf_specify_name_t dc_optional_name[] = { {.program_name = "netdata_lookup_fast",
  37. .function_to_attach = "lookup_fast",
  38. .optional = NULL,
  39. .retprobe = CONFIG_BOOLEAN_NO},
  40. {.program_name = NULL}};
  41. netdata_ebpf_targets_t dc_targets[] = { {.name = "lookup_fast", .mode = EBPF_LOAD_TRAMPOLINE},
  42. {.name = "d_lookup", .mode = EBPF_LOAD_TRAMPOLINE},
  43. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  44. #ifdef LIBBPF_MAJOR_VERSION
  45. #include "includes/dc.skel.h" // BTF code
  46. static struct dc_bpf *bpf_obj = NULL;
  47. /**
  48. * Disable probe
  49. *
  50. * Disable all probes to use exclusively another method.
  51. *
  52. * @param obj is the main structure for bpf objects
  53. */
  54. static inline void ebpf_dc_disable_probes(struct dc_bpf *obj)
  55. {
  56. bpf_program__set_autoload(obj->progs.netdata_lookup_fast_kprobe, false);
  57. bpf_program__set_autoload(obj->progs.netdata_d_lookup_kretprobe, false);
  58. }
  59. /*
  60. * Disable trampoline
  61. *
  62. * Disable all trampoline to use exclusively another method.
  63. *
  64. * @param obj is the main structure for bpf objects.
  65. */
  66. static inline void ebpf_dc_disable_trampoline(struct dc_bpf *obj)
  67. {
  68. bpf_program__set_autoload(obj->progs.netdata_lookup_fast_fentry, false);
  69. bpf_program__set_autoload(obj->progs.netdata_d_lookup_fexit, false);
  70. }
  71. /**
  72. * Set trampoline target
  73. *
  74. * Set the targets we will monitor.
  75. *
  76. * @param obj is the main structure for bpf objects.
  77. */
  78. static void ebpf_dc_set_trampoline_target(struct dc_bpf *obj)
  79. {
  80. bpf_program__set_attach_target(obj->progs.netdata_lookup_fast_fentry, 0,
  81. dc_targets[NETDATA_DC_TARGET_LOOKUP_FAST].name);
  82. bpf_program__set_attach_target(obj->progs.netdata_d_lookup_fexit, 0,
  83. dc_targets[NETDATA_DC_TARGET_D_LOOKUP].name);
  84. }
  85. /**
  86. * Mount Attach Probe
  87. *
  88. * Attach probes to target
  89. *
  90. * @param obj is the main structure for bpf objects.
  91. *
  92. * @return It returns 0 on success and -1 otherwise.
  93. */
  94. static int ebpf_dc_attach_probes(struct dc_bpf *obj)
  95. {
  96. obj->links.netdata_d_lookup_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_d_lookup_kretprobe,
  97. true,
  98. dc_targets[NETDATA_DC_TARGET_D_LOOKUP].name);
  99. int ret = libbpf_get_error(obj->links.netdata_d_lookup_kretprobe);
  100. if (ret)
  101. return -1;
  102. char *lookup_name = (dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional) ?
  103. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional :
  104. dc_targets[NETDATA_DC_TARGET_LOOKUP_FAST].name ;
  105. obj->links.netdata_lookup_fast_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_lookup_fast_kprobe,
  106. false,
  107. lookup_name);
  108. ret = libbpf_get_error(obj->links.netdata_lookup_fast_kprobe);
  109. if (ret)
  110. return -1;
  111. return 0;
  112. }
  113. /**
  114. * Adjust Map Size
  115. *
  116. * Resize maps according input from users.
  117. *
  118. * @param obj is the main structure for bpf objects.
  119. * @param em structure with configuration
  120. */
  121. static void ebpf_dc_adjust_map_size(struct dc_bpf *obj, ebpf_module_t *em)
  122. {
  123. ebpf_update_map_size(obj->maps.dcstat_pid, &dcstat_maps[NETDATA_DCSTAT_PID_STATS],
  124. em, bpf_map__name(obj->maps.dcstat_pid));
  125. }
  126. /**
  127. * Set hash tables
  128. *
  129. * Set the values for maps according the value given by kernel.
  130. *
  131. * @param obj is the main structure for bpf objects.
  132. */
  133. static void ebpf_dc_set_hash_tables(struct dc_bpf *obj)
  134. {
  135. dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS].map_fd = bpf_map__fd(obj->maps.dcstat_global);
  136. dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd = bpf_map__fd(obj->maps.dcstat_pid);
  137. dcstat_maps[NETDATA_DCSTAT_CTRL].map_fd = bpf_map__fd(obj->maps.dcstat_ctrl);
  138. }
  139. /**
  140. * Update Load
  141. *
  142. * For directory cache, some distributions change the function name, and we do not have condition to use
  143. * TRAMPOLINE like other functions.
  144. *
  145. * @param em structure with configuration
  146. *
  147. * @return When then symbols were not modified, it returns TRAMPOLINE, else it returns RETPROBE.
  148. */
  149. netdata_ebpf_program_loaded_t ebpf_dc_update_load(ebpf_module_t *em)
  150. {
  151. if (!strcmp(dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional,
  152. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].function_to_attach))
  153. return EBPF_LOAD_TRAMPOLINE;
  154. if (em->targets[NETDATA_DC_TARGET_LOOKUP_FAST].mode != EBPF_LOAD_RETPROBE)
  155. info("When your kernel was compiled the symbol %s was modified, instead to use `trampoline`, the plugin will use `probes`.",
  156. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].function_to_attach);
  157. return EBPF_LOAD_RETPROBE;
  158. }
  159. /**
  160. * Load and attach
  161. *
  162. * Load and attach the eBPF code in kernel.
  163. *
  164. * @param obj is the main structure for bpf objects.
  165. * @param em structure with configuration
  166. *
  167. * @return it returns 0 on succes and -1 otherwise
  168. */
  169. static inline int ebpf_dc_load_and_attach(struct dc_bpf *obj, ebpf_module_t *em)
  170. {
  171. netdata_ebpf_program_loaded_t test = ebpf_dc_update_load(em);
  172. if (test == EBPF_LOAD_TRAMPOLINE) {
  173. ebpf_dc_disable_probes(obj);
  174. ebpf_dc_set_trampoline_target(obj);
  175. } else {
  176. ebpf_dc_disable_trampoline(obj);
  177. }
  178. int ret = dc_bpf__load(obj);
  179. if (ret) {
  180. return ret;
  181. }
  182. ebpf_dc_adjust_map_size(obj, em);
  183. ret = (test == EBPF_LOAD_TRAMPOLINE) ? dc_bpf__attach(obj) : ebpf_dc_attach_probes(obj);
  184. if (!ret) {
  185. ebpf_dc_set_hash_tables(obj);
  186. ebpf_update_controller(dcstat_maps[NETDATA_DCSTAT_CTRL].map_fd, em);
  187. }
  188. return ret;
  189. }
  190. #endif
  191. /*****************************************************************
  192. *
  193. * COMMON FUNCTIONS
  194. *
  195. *****************************************************************/
  196. /**
  197. * Update publish
  198. *
  199. * Update publish values before to write dimension.
  200. *
  201. * @param out structure that will receive data.
  202. * @param cache_access number of access to directory cache.
  203. * @param not_found number of files not found on the file system
  204. */
  205. void dcstat_update_publish(netdata_publish_dcstat_t *out, uint64_t cache_access, uint64_t not_found)
  206. {
  207. NETDATA_DOUBLE successful_access = (NETDATA_DOUBLE) (((long long)cache_access) - ((long long)not_found));
  208. NETDATA_DOUBLE ratio = (cache_access) ? successful_access/(NETDATA_DOUBLE)cache_access : 0;
  209. out->ratio = (long long )(ratio*100);
  210. }
  211. /*****************************************************************
  212. *
  213. * FUNCTIONS TO CLOSE THE THREAD
  214. *
  215. *****************************************************************/
  216. /**
  217. * Clean names
  218. *
  219. * Clean the optional names allocated during startup.
  220. */
  221. void ebpf_dcstat_clean_names()
  222. {
  223. size_t i = 0;
  224. while (dc_optional_name[i].program_name) {
  225. freez(dc_optional_name[i].optional);
  226. i++;
  227. }
  228. }
  229. /**
  230. * Clean up the main thread.
  231. *
  232. * @param ptr thread data.
  233. */
  234. static void ebpf_dcstat_cleanup(void *ptr)
  235. {
  236. ebpf_module_t *em = (ebpf_module_t *)ptr;
  237. if (!em->enabled)
  238. return;
  239. heartbeat_t hb;
  240. heartbeat_init(&hb);
  241. uint32_t tick = 2 * USEC_PER_MS;
  242. while (!read_thread_closed) {
  243. usec_t dt = heartbeat_next(&hb, tick);
  244. UNUSED(dt);
  245. }
  246. freez(dcstat_vector);
  247. freez(dcstat_values);
  248. ebpf_cleanup_publish_syscall(dcstat_counter_publish_aggregated);
  249. ebpf_dcstat_clean_names();
  250. if (probe_links) {
  251. struct bpf_program *prog;
  252. size_t i = 0 ;
  253. bpf_object__for_each_program(prog, objects) {
  254. bpf_link__destroy(probe_links[i]);
  255. i++;
  256. }
  257. if (objects)
  258. bpf_object__close(objects);
  259. }
  260. #ifdef LIBBPF_MAJOR_VERSION
  261. else if (bpf_obj)
  262. dc_bpf__destroy(bpf_obj);
  263. #endif
  264. }
  265. /*****************************************************************
  266. *
  267. * APPS
  268. *
  269. *****************************************************************/
  270. /**
  271. * Create apps charts
  272. *
  273. * Call ebpf_create_chart to create the charts on apps submenu.
  274. *
  275. * @param em a pointer to the structure with the default values.
  276. */
  277. void ebpf_dcstat_create_apps_charts(struct ebpf_module *em, void *ptr)
  278. {
  279. struct target *root = ptr;
  280. ebpf_create_charts_on_apps(NETDATA_DC_HIT_CHART,
  281. "Percentage of files inside directory cache",
  282. EBPF_COMMON_DIMENSION_PERCENTAGE,
  283. NETDATA_DIRECTORY_CACHE_SUBMENU,
  284. NETDATA_EBPF_CHART_TYPE_LINE,
  285. 20100,
  286. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  287. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  288. ebpf_create_charts_on_apps(NETDATA_DC_REFERENCE_CHART,
  289. "Count file access",
  290. EBPF_COMMON_DIMENSION_FILES,
  291. NETDATA_DIRECTORY_CACHE_SUBMENU,
  292. NETDATA_EBPF_CHART_TYPE_STACKED,
  293. 20101,
  294. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  295. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  296. ebpf_create_charts_on_apps(NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  297. "Files not present inside directory cache",
  298. EBPF_COMMON_DIMENSION_FILES,
  299. NETDATA_DIRECTORY_CACHE_SUBMENU,
  300. NETDATA_EBPF_CHART_TYPE_STACKED,
  301. 20102,
  302. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  303. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  304. ebpf_create_charts_on_apps(NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  305. "Files not found",
  306. EBPF_COMMON_DIMENSION_FILES,
  307. NETDATA_DIRECTORY_CACHE_SUBMENU,
  308. NETDATA_EBPF_CHART_TYPE_STACKED,
  309. 20103,
  310. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  311. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  312. }
  313. /*****************************************************************
  314. *
  315. * MAIN LOOP
  316. *
  317. *****************************************************************/
  318. /**
  319. * Apps Accumulator
  320. *
  321. * Sum all values read from kernel and store in the first address.
  322. *
  323. * @param out the vector with read values.
  324. */
  325. static void dcstat_apps_accumulator(netdata_dcstat_pid_t *out)
  326. {
  327. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  328. netdata_dcstat_pid_t *total = &out[0];
  329. for (i = 1; i < end; i++) {
  330. netdata_dcstat_pid_t *w = &out[i];
  331. total->cache_access += w->cache_access;
  332. total->file_system += w->file_system;
  333. total->not_found += w->not_found;
  334. }
  335. }
  336. /**
  337. * Save PID values
  338. *
  339. * Save the current values inside the structure
  340. *
  341. * @param out vector used to plot charts
  342. * @param publish vector with values read from hash tables.
  343. */
  344. static inline void dcstat_save_pid_values(netdata_publish_dcstat_t *out, netdata_dcstat_pid_t *publish)
  345. {
  346. memcpy(&out->curr, &publish[0], sizeof(netdata_dcstat_pid_t));
  347. }
  348. /**
  349. * Fill PID
  350. *
  351. * Fill PID structures
  352. *
  353. * @param current_pid pid that we are collecting data
  354. * @param out values read from hash tables;
  355. */
  356. static void dcstat_fill_pid(uint32_t current_pid, netdata_dcstat_pid_t *publish)
  357. {
  358. netdata_publish_dcstat_t *curr = dcstat_pid[current_pid];
  359. if (!curr) {
  360. curr = callocz(1, sizeof(netdata_publish_dcstat_t));
  361. dcstat_pid[current_pid] = curr;
  362. }
  363. dcstat_save_pid_values(curr, publish);
  364. }
  365. /**
  366. * Read APPS table
  367. *
  368. * Read the apps table and store data inside the structure.
  369. */
  370. static void read_apps_table()
  371. {
  372. netdata_dcstat_pid_t *cv = dcstat_vector;
  373. uint32_t key;
  374. struct pid_stat *pids = root_of_pids;
  375. int fd = dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd;
  376. size_t length = sizeof(netdata_dcstat_pid_t)*ebpf_nprocs;
  377. while (pids) {
  378. key = pids->pid;
  379. if (bpf_map_lookup_elem(fd, &key, cv)) {
  380. pids = pids->next;
  381. continue;
  382. }
  383. dcstat_apps_accumulator(cv);
  384. dcstat_fill_pid(key, cv);
  385. // We are cleaning to avoid passing data read from one process to other.
  386. memset(cv, 0, length);
  387. pids = pids->next;
  388. }
  389. }
  390. /**
  391. * Update cgroup
  392. *
  393. * Update cgroup data based in
  394. */
  395. static void ebpf_update_dc_cgroup()
  396. {
  397. netdata_dcstat_pid_t *cv = dcstat_vector;
  398. int fd = dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd;
  399. size_t length = sizeof(netdata_dcstat_pid_t)*ebpf_nprocs;
  400. ebpf_cgroup_target_t *ect;
  401. pthread_mutex_lock(&mutex_cgroup_shm);
  402. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  403. struct pid_on_target2 *pids;
  404. for (pids = ect->pids; pids; pids = pids->next) {
  405. int pid = pids->pid;
  406. netdata_dcstat_pid_t *out = &pids->dc;
  407. if (likely(dcstat_pid) && dcstat_pid[pid]) {
  408. netdata_publish_dcstat_t *in = dcstat_pid[pid];
  409. memcpy(out, &in->curr, sizeof(netdata_dcstat_pid_t));
  410. } else {
  411. memset(cv, 0, length);
  412. if (bpf_map_lookup_elem(fd, &pid, cv)) {
  413. continue;
  414. }
  415. dcstat_apps_accumulator(cv);
  416. memcpy(out, cv, sizeof(netdata_dcstat_pid_t));
  417. }
  418. }
  419. }
  420. pthread_mutex_unlock(&mutex_cgroup_shm);
  421. }
  422. /**
  423. * Read global table
  424. *
  425. * Read the table with number of calls for all functions
  426. */
  427. static void read_global_table()
  428. {
  429. uint32_t idx;
  430. netdata_idx_t *val = dcstat_hash_values;
  431. netdata_idx_t *stored = dcstat_values;
  432. int fd = dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS].map_fd;
  433. for (idx = NETDATA_KEY_DC_REFERENCE; idx < NETDATA_DIRECTORY_CACHE_END; idx++) {
  434. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  435. int i;
  436. int end = ebpf_nprocs;
  437. netdata_idx_t total = 0;
  438. for (i = 0; i < end; i++)
  439. total += stored[i];
  440. val[idx] = total;
  441. }
  442. }
  443. }
  444. /**
  445. * DCstat read hash
  446. *
  447. * This is the thread callback.
  448. * This thread is necessary, because we cannot freeze the whole plugin to read the data.
  449. *
  450. * @param ptr It is a NULL value for this thread.
  451. *
  452. * @return It always returns NULL.
  453. */
  454. void *ebpf_dcstat_read_hash(void *ptr)
  455. {
  456. read_thread_closed = 0;
  457. heartbeat_t hb;
  458. heartbeat_init(&hb);
  459. ebpf_module_t *em = (ebpf_module_t *)ptr;
  460. usec_t step = NETDATA_LATENCY_DCSTAT_SLEEP_MS * em->update_every;
  461. while (!close_ebpf_plugin) {
  462. usec_t dt = heartbeat_next(&hb, step);
  463. (void)dt;
  464. read_global_table();
  465. }
  466. read_thread_closed = 1;
  467. return NULL;
  468. }
  469. /**
  470. * Cachestat sum PIDs
  471. *
  472. * Sum values for all PIDs associated to a group
  473. *
  474. * @param publish output structure.
  475. * @param root structure with listed IPs
  476. */
  477. void ebpf_dcstat_sum_pids(netdata_publish_dcstat_t *publish, struct pid_on_target *root)
  478. {
  479. memset(&publish->curr, 0, sizeof(netdata_dcstat_pid_t));
  480. netdata_dcstat_pid_t *dst = &publish->curr;
  481. while (root) {
  482. int32_t pid = root->pid;
  483. netdata_publish_dcstat_t *w = dcstat_pid[pid];
  484. if (w) {
  485. netdata_dcstat_pid_t *src = &w->curr;
  486. dst->cache_access += src->cache_access;
  487. dst->file_system += src->file_system;
  488. dst->not_found += src->not_found;
  489. }
  490. root = root->next;
  491. }
  492. }
  493. /**
  494. * Send data to Netdata calling auxiliary functions.
  495. *
  496. * @param root the target list.
  497. */
  498. void ebpf_dcache_send_apps_data(struct target *root)
  499. {
  500. struct target *w;
  501. collected_number value;
  502. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_HIT_CHART);
  503. for (w = root; w; w = w->next) {
  504. if (unlikely(w->exposed && w->processes)) {
  505. ebpf_dcstat_sum_pids(&w->dcstat, w->root_pid);
  506. uint64_t cache = w->dcstat.curr.cache_access;
  507. uint64_t not_found = w->dcstat.curr.not_found;
  508. dcstat_update_publish(&w->dcstat, cache, not_found);
  509. value = (collected_number) w->dcstat.ratio;
  510. write_chart_dimension(w->name, value);
  511. }
  512. }
  513. write_end_chart();
  514. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REFERENCE_CHART);
  515. for (w = root; w; w = w->next) {
  516. if (unlikely(w->exposed && w->processes)) {
  517. if (w->dcstat.curr.cache_access < w->dcstat.prev.cache_access) {
  518. w->dcstat.prev.cache_access = 0;
  519. }
  520. w->dcstat.cache_access = (long long)w->dcstat.curr.cache_access - (long long)w->dcstat.prev.cache_access;
  521. value = (collected_number) w->dcstat.cache_access;
  522. write_chart_dimension(w->name, value);
  523. w->dcstat.prev.cache_access = w->dcstat.curr.cache_access;
  524. }
  525. }
  526. write_end_chart();
  527. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  528. for (w = root; w; w = w->next) {
  529. if (unlikely(w->exposed && w->processes)) {
  530. if (w->dcstat.curr.file_system < w->dcstat.prev.file_system) {
  531. w->dcstat.prev.file_system = 0;
  532. }
  533. value = (collected_number) (!w->dcstat.cache_access) ? 0 :
  534. (long long )w->dcstat.curr.file_system - (long long)w->dcstat.prev.file_system;
  535. write_chart_dimension(w->name, value);
  536. w->dcstat.prev.file_system = w->dcstat.curr.file_system;
  537. }
  538. }
  539. write_end_chart();
  540. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  541. for (w = root; w; w = w->next) {
  542. if (unlikely(w->exposed && w->processes)) {
  543. if (w->dcstat.curr.not_found < w->dcstat.prev.not_found) {
  544. w->dcstat.prev.not_found = 0;
  545. }
  546. value = (collected_number) (!w->dcstat.cache_access) ? 0 :
  547. (long long)w->dcstat.curr.not_found - (long long)w->dcstat.prev.not_found;
  548. write_chart_dimension(w->name, value);
  549. w->dcstat.prev.not_found = w->dcstat.curr.not_found;
  550. }
  551. }
  552. write_end_chart();
  553. }
  554. /**
  555. * Send global
  556. *
  557. * Send global charts to Netdata
  558. */
  559. static void dcstat_send_global(netdata_publish_dcstat_t *publish)
  560. {
  561. dcstat_update_publish(publish, dcstat_hash_values[NETDATA_KEY_DC_REFERENCE],
  562. dcstat_hash_values[NETDATA_KEY_DC_MISS]);
  563. netdata_publish_syscall_t *ptr = dcstat_counter_publish_aggregated;
  564. netdata_idx_t value = dcstat_hash_values[NETDATA_KEY_DC_REFERENCE];
  565. if (value != ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall) {
  566. ptr[NETDATA_DCSTAT_IDX_REFERENCE].ncall = value - ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall;
  567. ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall = value;
  568. value = dcstat_hash_values[NETDATA_KEY_DC_SLOW];
  569. ptr[NETDATA_DCSTAT_IDX_SLOW].ncall = value - ptr[NETDATA_DCSTAT_IDX_SLOW].pcall;
  570. ptr[NETDATA_DCSTAT_IDX_SLOW].pcall = value;
  571. value = dcstat_hash_values[NETDATA_KEY_DC_MISS];
  572. ptr[NETDATA_DCSTAT_IDX_MISS].ncall = value - ptr[NETDATA_DCSTAT_IDX_MISS].pcall;
  573. ptr[NETDATA_DCSTAT_IDX_MISS].pcall = value;
  574. } else {
  575. ptr[NETDATA_DCSTAT_IDX_REFERENCE].ncall = 0;
  576. ptr[NETDATA_DCSTAT_IDX_SLOW].ncall = 0;
  577. ptr[NETDATA_DCSTAT_IDX_MISS].ncall = 0;
  578. }
  579. ebpf_one_dimension_write_charts(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_HIT_CHART,
  580. ptr[NETDATA_DCSTAT_IDX_RATIO].dimension, publish->ratio);
  581. write_count_chart(
  582. NETDATA_DC_REFERENCE_CHART, NETDATA_FILESYSTEM_FAMILY,
  583. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 3);
  584. }
  585. /**
  586. * Create specific directory cache charts
  587. *
  588. * Create charts for cgroup/application.
  589. *
  590. * @param type the chart type.
  591. * @param update_every value to overwrite the update frequency set by the server.
  592. */
  593. static void ebpf_create_specific_dc_charts(char *type, int update_every)
  594. {
  595. ebpf_create_chart(type, NETDATA_DC_HIT_CHART, "Percentage of files inside directory cache",
  596. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  597. NETDATA_CGROUP_DC_HIT_RATIO_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  598. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5700,
  599. ebpf_create_global_dimension,
  600. dcstat_counter_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  601. ebpf_create_chart(type, NETDATA_DC_REFERENCE_CHART, "Count file access",
  602. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  603. NETDATA_CGROUP_DC_REFERENCE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  604. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5701,
  605. ebpf_create_global_dimension,
  606. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 1,
  607. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  608. ebpf_create_chart(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  609. "Files not present inside directory cache",
  610. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  611. NETDATA_CGROUP_DC_NOT_CACHE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  612. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5702,
  613. ebpf_create_global_dimension,
  614. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_SLOW], 1,
  615. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  616. ebpf_create_chart(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  617. "Files not found",
  618. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  619. NETDATA_CGROUP_DC_NOT_FOUND_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  620. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5703,
  621. ebpf_create_global_dimension,
  622. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_MISS], 1,
  623. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  624. }
  625. /**
  626. * Obsolete specific directory cache charts
  627. *
  628. * Obsolete charts for cgroup/application.
  629. *
  630. * @param type the chart type.
  631. * @param update_every value to overwrite the update frequency set by the server.
  632. */
  633. static void ebpf_obsolete_specific_dc_charts(char *type, int update_every)
  634. {
  635. ebpf_write_chart_obsolete(type, NETDATA_DC_HIT_CHART,
  636. "Percentage of files inside directory cache",
  637. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  638. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_HIT_RATIO_CONTEXT,
  639. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5700, update_every);
  640. ebpf_write_chart_obsolete(type, NETDATA_DC_REFERENCE_CHART,
  641. "Count file access",
  642. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  643. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_REFERENCE_CONTEXT,
  644. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5701, update_every);
  645. ebpf_write_chart_obsolete(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  646. "Files not present inside directory cache",
  647. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  648. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_NOT_CACHE_CONTEXT,
  649. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5702, update_every);
  650. ebpf_write_chart_obsolete(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  651. "Files not found",
  652. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  653. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_NOT_FOUND_CONTEXT,
  654. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5703, update_every);
  655. }
  656. /**
  657. * Cachestat sum PIDs
  658. *
  659. * Sum values for all PIDs associated to a group
  660. *
  661. * @param publish output structure.
  662. * @param root structure with listed IPs
  663. */
  664. void ebpf_dc_sum_cgroup_pids(netdata_publish_dcstat_t *publish, struct pid_on_target2 *root)
  665. {
  666. memset(&publish->curr, 0, sizeof(netdata_dcstat_pid_t));
  667. netdata_dcstat_pid_t *dst = &publish->curr;
  668. while (root) {
  669. netdata_dcstat_pid_t *src = &root->dc;
  670. dst->cache_access += src->cache_access;
  671. dst->file_system += src->file_system;
  672. dst->not_found += src->not_found;
  673. root = root->next;
  674. }
  675. }
  676. /**
  677. * Calc chart values
  678. *
  679. * Do necessary math to plot charts.
  680. */
  681. void ebpf_dc_calc_chart_values()
  682. {
  683. ebpf_cgroup_target_t *ect;
  684. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  685. ebpf_dc_sum_cgroup_pids(&ect->publish_dc, ect->pids);
  686. uint64_t cache = ect->publish_dc.curr.cache_access;
  687. uint64_t not_found = ect->publish_dc.curr.not_found;
  688. dcstat_update_publish(&ect->publish_dc, cache, not_found);
  689. ect->publish_dc.cache_access = (long long)ect->publish_dc.curr.cache_access -
  690. (long long)ect->publish_dc.prev.cache_access;
  691. ect->publish_dc.prev.cache_access = ect->publish_dc.curr.cache_access;
  692. if (ect->publish_dc.curr.not_found < ect->publish_dc.prev.not_found) {
  693. ect->publish_dc.prev.not_found = 0;
  694. }
  695. }
  696. }
  697. /**
  698. * Create Systemd directory cache Charts
  699. *
  700. * Create charts when systemd is enabled
  701. *
  702. * @param update_every value to overwrite the update frequency set by the server.
  703. **/
  704. static void ebpf_create_systemd_dc_charts(int update_every)
  705. {
  706. ebpf_create_charts_on_systemd(NETDATA_DC_HIT_CHART,
  707. "Percentage of files inside directory cache",
  708. EBPF_COMMON_DIMENSION_PERCENTAGE,
  709. NETDATA_DIRECTORY_CACHE_SUBMENU,
  710. NETDATA_EBPF_CHART_TYPE_LINE,
  711. 21200,
  712. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  713. NETDATA_SYSTEMD_DC_HIT_RATIO_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  714. update_every);
  715. ebpf_create_charts_on_systemd(NETDATA_DC_REFERENCE_CHART,
  716. "Count file access",
  717. EBPF_COMMON_DIMENSION_FILES,
  718. NETDATA_DIRECTORY_CACHE_SUBMENU,
  719. NETDATA_EBPF_CHART_TYPE_LINE,
  720. 21201,
  721. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  722. NETDATA_SYSTEMD_DC_REFERENCE_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  723. update_every);
  724. ebpf_create_charts_on_systemd(NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  725. "Files not present inside directory cache",
  726. EBPF_COMMON_DIMENSION_FILES,
  727. NETDATA_DIRECTORY_CACHE_SUBMENU,
  728. NETDATA_EBPF_CHART_TYPE_LINE,
  729. 21202,
  730. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  731. NETDATA_SYSTEMD_DC_NOT_CACHE_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  732. update_every);
  733. ebpf_create_charts_on_systemd(NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  734. "Files not found",
  735. EBPF_COMMON_DIMENSION_FILES,
  736. NETDATA_DIRECTORY_CACHE_SUBMENU,
  737. NETDATA_EBPF_CHART_TYPE_LINE,
  738. 21202,
  739. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  740. NETDATA_SYSTEMD_DC_NOT_FOUND_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  741. update_every);
  742. }
  743. /**
  744. * Send Directory Cache charts
  745. *
  746. * Send collected data to Netdata.
  747. *
  748. * @return It returns the status for chart creation, if it is necessary to remove a specific dimension, zero is returned
  749. * otherwise function returns 1 to avoid chart recreation
  750. */
  751. static int ebpf_send_systemd_dc_charts()
  752. {
  753. int ret = 1;
  754. collected_number value;
  755. ebpf_cgroup_target_t *ect;
  756. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_HIT_CHART);
  757. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  758. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  759. write_chart_dimension(ect->name, (long long) ect->publish_dc.ratio);
  760. } else
  761. ret = 0;
  762. }
  763. write_end_chart();
  764. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REFERENCE_CHART);
  765. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  766. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  767. write_chart_dimension(ect->name, (long long) ect->publish_dc.cache_access);
  768. }
  769. }
  770. write_end_chart();
  771. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  772. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  773. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  774. value = (collected_number) (!ect->publish_dc.cache_access) ? 0 :
  775. (long long )ect->publish_dc.curr.file_system - (long long)ect->publish_dc.prev.file_system;
  776. ect->publish_dc.prev.file_system = ect->publish_dc.curr.file_system;
  777. write_chart_dimension(ect->name, (long long) value);
  778. }
  779. }
  780. write_end_chart();
  781. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  782. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  783. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  784. value = (collected_number) (!ect->publish_dc.cache_access) ? 0 :
  785. (long long)ect->publish_dc.curr.not_found - (long long)ect->publish_dc.prev.not_found;
  786. ect->publish_dc.prev.not_found = ect->publish_dc.curr.not_found;
  787. write_chart_dimension(ect->name, (long long) value);
  788. }
  789. }
  790. write_end_chart();
  791. return ret;
  792. }
  793. /**
  794. * Send Directory Cache charts
  795. *
  796. * Send collected data to Netdata.
  797. *
  798. */
  799. static void ebpf_send_specific_dc_data(char *type, netdata_publish_dcstat_t *pdc)
  800. {
  801. collected_number value;
  802. write_begin_chart(type, NETDATA_DC_HIT_CHART);
  803. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_RATIO].name,
  804. (long long) pdc->ratio);
  805. write_end_chart();
  806. write_begin_chart(type, NETDATA_DC_REFERENCE_CHART);
  807. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE].name,
  808. (long long) pdc->cache_access);
  809. write_end_chart();
  810. value = (collected_number) (!pdc->cache_access) ? 0 :
  811. (long long )pdc->curr.file_system - (long long)pdc->prev.file_system;
  812. pdc->prev.file_system = pdc->curr.file_system;
  813. write_begin_chart(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  814. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_SLOW].name, (long long) value);
  815. write_end_chart();
  816. value = (collected_number) (!pdc->cache_access) ? 0 :
  817. (long long)pdc->curr.not_found - (long long)pdc->prev.not_found;
  818. pdc->prev.not_found = pdc->curr.not_found;
  819. write_begin_chart(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  820. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_MISS].name, (long long) value);
  821. write_end_chart();
  822. }
  823. /**
  824. * Send data to Netdata calling auxiliary functions.
  825. *
  826. * @param update_every value to overwrite the update frequency set by the server.
  827. */
  828. void ebpf_dc_send_cgroup_data(int update_every)
  829. {
  830. if (!ebpf_cgroup_pids)
  831. return;
  832. pthread_mutex_lock(&mutex_cgroup_shm);
  833. ebpf_cgroup_target_t *ect;
  834. ebpf_dc_calc_chart_values();
  835. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  836. if (has_systemd) {
  837. static int systemd_charts = 0;
  838. if (!systemd_charts) {
  839. ebpf_create_systemd_dc_charts(update_every);
  840. systemd_charts = 1;
  841. }
  842. systemd_charts = ebpf_send_systemd_dc_charts();
  843. }
  844. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  845. if (ect->systemd)
  846. continue;
  847. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_DC_CHART) && ect->updated) {
  848. ebpf_create_specific_dc_charts(ect->name, update_every);
  849. ect->flags |= NETDATA_EBPF_CGROUP_HAS_DC_CHART;
  850. }
  851. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_DC_CHART) {
  852. if (ect->updated) {
  853. ebpf_send_specific_dc_data(ect->name, &ect->publish_dc);
  854. } else {
  855. ebpf_obsolete_specific_dc_charts(ect->name, update_every);
  856. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_DC_CHART;
  857. }
  858. }
  859. }
  860. pthread_mutex_unlock(&mutex_cgroup_shm);
  861. }
  862. /**
  863. * Main loop for this collector.
  864. */
  865. static void dcstat_collector(ebpf_module_t *em)
  866. {
  867. dcstat_threads.thread = mallocz(sizeof(netdata_thread_t));
  868. dcstat_threads.start_routine = ebpf_dcstat_read_hash;
  869. netdata_thread_create(dcstat_threads.thread, dcstat_threads.name, NETDATA_THREAD_OPTION_JOINABLE,
  870. ebpf_dcstat_read_hash, em);
  871. netdata_publish_dcstat_t publish;
  872. memset(&publish, 0, sizeof(publish));
  873. int apps = em->apps_charts;
  874. int cgroups = em->cgroup_charts;
  875. int update_every = em->update_every;
  876. int counter = update_every - 1;
  877. while (!close_ebpf_plugin) {
  878. pthread_mutex_lock(&collect_data_mutex);
  879. pthread_cond_wait(&collect_data_cond_var, &collect_data_mutex);
  880. if (++counter == update_every) {
  881. counter = 0;
  882. if (apps)
  883. read_apps_table();
  884. if (cgroups)
  885. ebpf_update_dc_cgroup();
  886. pthread_mutex_lock(&lock);
  887. dcstat_send_global(&publish);
  888. if (apps)
  889. ebpf_dcache_send_apps_data(apps_groups_root_target);
  890. if (cgroups)
  891. ebpf_dc_send_cgroup_data(update_every);
  892. pthread_mutex_unlock(&lock);
  893. }
  894. pthread_mutex_unlock(&collect_data_mutex);
  895. }
  896. }
  897. /*****************************************************************
  898. *
  899. * INITIALIZE THREAD
  900. *
  901. *****************************************************************/
  902. /**
  903. * Create filesystem charts
  904. *
  905. * Call ebpf_create_chart to create the charts for the collector.
  906. *
  907. * @param update_every value to overwrite the update frequency set by the server.
  908. */
  909. static void ebpf_create_filesystem_charts(int update_every)
  910. {
  911. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_HIT_CHART,
  912. "Percentage of files inside directory cache",
  913. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  914. NULL,
  915. NETDATA_EBPF_CHART_TYPE_LINE,
  916. 21200,
  917. ebpf_create_global_dimension,
  918. dcstat_counter_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  919. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_REFERENCE_CHART,
  920. "Variables used to calculate hit ratio.",
  921. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  922. NULL,
  923. NETDATA_EBPF_CHART_TYPE_LINE,
  924. 21201,
  925. ebpf_create_global_dimension,
  926. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 3,
  927. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  928. fflush(stdout);
  929. }
  930. /**
  931. * Allocate vectors used with this thread.
  932. *
  933. * We are not testing the return, because callocz does this and shutdown the software
  934. * case it was not possible to allocate.
  935. *
  936. * @param apps is apps enabled?
  937. */
  938. static void ebpf_dcstat_allocate_global_vectors(int apps)
  939. {
  940. if (apps)
  941. dcstat_pid = callocz((size_t)pid_max, sizeof(netdata_publish_dcstat_t *));
  942. dcstat_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_dcstat_pid_t));
  943. dcstat_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  944. memset(dcstat_counter_aggregated_data, 0, NETDATA_DCSTAT_IDX_END * sizeof(netdata_syscall_stat_t));
  945. memset(dcstat_counter_publish_aggregated, 0, NETDATA_DCSTAT_IDX_END * sizeof(netdata_publish_syscall_t));
  946. }
  947. /*****************************************************************
  948. *
  949. * MAIN THREAD
  950. *
  951. *****************************************************************/
  952. /*
  953. * Load BPF
  954. *
  955. * Load BPF files.
  956. *
  957. * @param em the structure with configuration
  958. */
  959. static int ebpf_dcstat_load_bpf(ebpf_module_t *em)
  960. {
  961. int ret = 0;
  962. if (em->load == EBPF_LOAD_LEGACY) {
  963. probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &objects);
  964. if (!probe_links) {
  965. ret = -1;
  966. }
  967. }
  968. #ifdef LIBBPF_MAJOR_VERSION
  969. else {
  970. bpf_obj = dc_bpf__open();
  971. if (!bpf_obj)
  972. ret = -1;
  973. else
  974. ret = ebpf_dc_load_and_attach(bpf_obj, em);
  975. }
  976. #endif
  977. if (ret)
  978. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  979. return ret;
  980. }
  981. /**
  982. * Directory Cache thread
  983. *
  984. * Thread used to make dcstat thread
  985. *
  986. * @param ptr a pointer to `struct ebpf_module`
  987. *
  988. * @return It always returns NULL
  989. */
  990. void *ebpf_dcstat_thread(void *ptr)
  991. {
  992. netdata_thread_cleanup_push(ebpf_dcstat_cleanup, ptr);
  993. ebpf_module_t *em = (ebpf_module_t *)ptr;
  994. em->maps = dcstat_maps;
  995. ebpf_update_pid_table(&dcstat_maps[NETDATA_DCSTAT_PID_STATS], em);
  996. ebpf_update_names(dc_optional_name, em);
  997. if (!em->enabled)
  998. goto enddcstat;
  999. #ifdef LIBBPF_MAJOR_VERSION
  1000. ebpf_adjust_thread_load(em, default_btf);
  1001. #endif
  1002. if (ebpf_dcstat_load_bpf(em)) {
  1003. em->enabled = CONFIG_BOOLEAN_NO;
  1004. goto enddcstat;
  1005. }
  1006. ebpf_dcstat_allocate_global_vectors(em->apps_charts);
  1007. int algorithms[NETDATA_DCSTAT_IDX_END] = {
  1008. NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX,
  1009. NETDATA_EBPF_ABSOLUTE_IDX
  1010. };
  1011. ebpf_global_labels(dcstat_counter_aggregated_data, dcstat_counter_publish_aggregated,
  1012. dcstat_counter_dimension_name, dcstat_counter_dimension_name,
  1013. algorithms, NETDATA_DCSTAT_IDX_END);
  1014. pthread_mutex_lock(&lock);
  1015. ebpf_create_filesystem_charts(em->update_every);
  1016. ebpf_update_stats(&plugin_statistics, em);
  1017. pthread_mutex_unlock(&lock);
  1018. dcstat_collector(em);
  1019. enddcstat:
  1020. if (!em->enabled)
  1021. ebpf_update_disabled_plugin_stats(em);
  1022. netdata_thread_cleanup_pop(1);
  1023. return NULL;
  1024. }