ebpf_mount.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_mount.h"
  4. static ebpf_local_maps_t mount_maps[] = {{.name = "tbl_mount", .internal_input = NETDATA_MOUNT_END,
  5. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  6. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  7. {.name = NULL, .internal_input = 0, .user_input = 0,
  8. .type = NETDATA_EBPF_MAP_CONTROLLER,
  9. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  10. static char *mount_dimension_name[NETDATA_EBPF_MOUNT_SYSCALL] = { "mount", "umount" };
  11. static netdata_syscall_stat_t mount_aggregated_data[NETDATA_EBPF_MOUNT_SYSCALL];
  12. static netdata_publish_syscall_t mount_publish_aggregated[NETDATA_EBPF_MOUNT_SYSCALL];
  13. struct config mount_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  14. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  15. .rwlock = AVL_LOCK_INITIALIZER } };
  16. static netdata_idx_t mount_hash_values[NETDATA_MOUNT_END];
  17. netdata_ebpf_targets_t mount_targets[] = { {.name = "mount", .mode = EBPF_LOAD_TRAMPOLINE},
  18. {.name = "umount", .mode = EBPF_LOAD_TRAMPOLINE},
  19. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  20. #ifdef LIBBPF_MAJOR_VERSION
  21. /*****************************************************************
  22. *
  23. * BTF FUNCTIONS
  24. *
  25. *****************************************************************/
  26. /*
  27. * Disable probe
  28. *
  29. * Disable all probes to use exclusively another method.
  30. *
  31. * @param obj is the main structure for bpf objects.
  32. */
  33. static inline void ebpf_mount_disable_probe(struct mount_bpf *obj)
  34. {
  35. bpf_program__set_autoload(obj->progs.netdata_mount_probe, false);
  36. bpf_program__set_autoload(obj->progs.netdata_umount_probe, false);
  37. bpf_program__set_autoload(obj->progs.netdata_mount_retprobe, false);
  38. bpf_program__set_autoload(obj->progs.netdata_umount_retprobe, false);
  39. }
  40. /*
  41. * Disable tracepoint
  42. *
  43. * Disable all tracepoints to use exclusively another method.
  44. *
  45. * @param obj is the main structure for bpf objects.
  46. */
  47. static inline void ebpf_mount_disable_tracepoint(struct mount_bpf *obj)
  48. {
  49. bpf_program__set_autoload(obj->progs.netdata_mount_exit, false);
  50. bpf_program__set_autoload(obj->progs.netdata_umount_exit, false);
  51. }
  52. /*
  53. * Disable trampoline
  54. *
  55. * Disable all trampoline to use exclusively another method.
  56. *
  57. * @param obj is the main structure for bpf objects.
  58. */
  59. static inline void ebpf_mount_disable_trampoline(struct mount_bpf *obj)
  60. {
  61. bpf_program__set_autoload(obj->progs.netdata_mount_fentry, false);
  62. bpf_program__set_autoload(obj->progs.netdata_umount_fentry, false);
  63. bpf_program__set_autoload(obj->progs.netdata_mount_fexit, false);
  64. bpf_program__set_autoload(obj->progs.netdata_umount_fexit, false);
  65. }
  66. /**
  67. * Set trampoline target
  68. *
  69. * Set the targets we will monitor.
  70. *
  71. * @param obj is the main structure for bpf objects.
  72. */
  73. static inline void netdata_set_trampoline_target(struct mount_bpf *obj)
  74. {
  75. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  76. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  77. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  78. bpf_program__set_attach_target(obj->progs.netdata_mount_fentry, 0,
  79. syscall);
  80. bpf_program__set_attach_target(obj->progs.netdata_mount_fexit, 0,
  81. syscall);
  82. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  83. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  84. bpf_program__set_attach_target(obj->progs.netdata_umount_fentry, 0,
  85. syscall);
  86. bpf_program__set_attach_target(obj->progs.netdata_umount_fexit, 0,
  87. syscall);
  88. }
  89. /**
  90. * Mount Attach Probe
  91. *
  92. * Attach probes to target
  93. *
  94. * @param obj is the main structure for bpf objects.
  95. *
  96. * @return It returns 0 on success and -1 otherwise.
  97. */
  98. static int ebpf_mount_attach_probe(struct mount_bpf *obj)
  99. {
  100. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  101. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  102. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  103. obj->links.netdata_mount_probe = bpf_program__attach_kprobe(obj->progs.netdata_mount_probe,
  104. false, syscall);
  105. int ret = (int)libbpf_get_error(obj->links.netdata_mount_probe);
  106. if (ret)
  107. return -1;
  108. obj->links.netdata_mount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_mount_retprobe,
  109. true, syscall);
  110. ret = (int)libbpf_get_error(obj->links.netdata_mount_retprobe);
  111. if (ret)
  112. return -1;
  113. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  114. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  115. obj->links.netdata_umount_probe = bpf_program__attach_kprobe(obj->progs.netdata_umount_probe,
  116. false, syscall);
  117. ret = (int)libbpf_get_error(obj->links.netdata_umount_probe);
  118. if (ret)
  119. return -1;
  120. obj->links.netdata_umount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_umount_retprobe,
  121. true, syscall);
  122. ret = (int)libbpf_get_error(obj->links.netdata_umount_retprobe);
  123. if (ret)
  124. return -1;
  125. return 0;
  126. }
  127. /**
  128. * Set hash tables
  129. *
  130. * Set the values for maps according the value given by kernel.
  131. *
  132. * @param obj is the main structure for bpf objects.
  133. */
  134. static void ebpf_mount_set_hash_tables(struct mount_bpf *obj)
  135. {
  136. mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_mount);
  137. }
  138. /**
  139. * Load and attach
  140. *
  141. * Load and attach the eBPF code in kernel.
  142. *
  143. * @param obj is the main structure for bpf objects.
  144. * @param em structure with configuration
  145. *
  146. * @return it returns 0 on success and -1 otherwise
  147. */
  148. static inline int ebpf_mount_load_and_attach(struct mount_bpf *obj, ebpf_module_t *em)
  149. {
  150. netdata_ebpf_targets_t *mt = em->targets;
  151. netdata_ebpf_program_loaded_t test = mt[NETDATA_MOUNT_SYSCALL].mode;
  152. // We are testing only one, because all will have the same behavior
  153. if (test == EBPF_LOAD_TRAMPOLINE ) {
  154. ebpf_mount_disable_probe(obj);
  155. ebpf_mount_disable_tracepoint(obj);
  156. netdata_set_trampoline_target(obj);
  157. } else if (test == EBPF_LOAD_PROBE ||
  158. test == EBPF_LOAD_RETPROBE ) {
  159. ebpf_mount_disable_tracepoint(obj);
  160. ebpf_mount_disable_trampoline(obj);
  161. } else {
  162. ebpf_mount_disable_probe(obj);
  163. ebpf_mount_disable_trampoline(obj);
  164. }
  165. int ret = mount_bpf__load(obj);
  166. if (!ret) {
  167. if (test != EBPF_LOAD_PROBE && test != EBPF_LOAD_RETPROBE )
  168. ret = mount_bpf__attach(obj);
  169. else
  170. ret = ebpf_mount_attach_probe(obj);
  171. if (!ret)
  172. ebpf_mount_set_hash_tables(obj);
  173. }
  174. return ret;
  175. }
  176. #endif
  177. /*****************************************************************
  178. *
  179. * FUNCTIONS TO CLOSE THE THREAD
  180. *
  181. *****************************************************************/
  182. /**
  183. * Mount Free
  184. *
  185. * Cleanup variables after child threads to stop
  186. *
  187. * @param ptr thread data.
  188. */
  189. static void ebpf_mount_free(ebpf_module_t *em)
  190. {
  191. pthread_mutex_lock(&ebpf_exit_cleanup);
  192. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  193. pthread_mutex_unlock(&ebpf_exit_cleanup);
  194. }
  195. /**
  196. * Mount Exit
  197. *
  198. * Cancel child thread.
  199. *
  200. * @param ptr thread data.
  201. */
  202. static void ebpf_mount_exit(void *ptr)
  203. {
  204. ebpf_module_t *em = (ebpf_module_t *)ptr;
  205. ebpf_mount_free(em);
  206. }
  207. /*****************************************************************
  208. *
  209. * MAIN LOOP
  210. *
  211. *****************************************************************/
  212. /**
  213. * Read global table
  214. *
  215. * Read the table with number of calls for all functions
  216. */
  217. static void ebpf_mount_read_global_table()
  218. {
  219. static netdata_idx_t *mount_values = NULL;
  220. if (!mount_values)
  221. mount_values = callocz((size_t)ebpf_nprocs + 1, sizeof(netdata_idx_t));
  222. uint32_t idx;
  223. netdata_idx_t *val = mount_hash_values;
  224. netdata_idx_t *stored = mount_values;
  225. int fd = mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd;
  226. for (idx = NETDATA_KEY_MOUNT_CALL; idx < NETDATA_MOUNT_END; idx++) {
  227. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  228. int i;
  229. int end = ebpf_nprocs;
  230. netdata_idx_t total = 0;
  231. for (i = 0; i < end; i++)
  232. total += stored[i];
  233. val[idx] = total;
  234. }
  235. }
  236. }
  237. /**
  238. * Send data to Netdata calling auxiliary functions.
  239. */
  240. static void ebpf_mount_send_data()
  241. {
  242. int i, j;
  243. int end = NETDATA_EBPF_MOUNT_SYSCALL;
  244. for (i = NETDATA_KEY_MOUNT_CALL, j = NETDATA_KEY_MOUNT_ERROR; i < end; i++, j++) {
  245. mount_publish_aggregated[i].ncall = mount_hash_values[i];
  246. mount_publish_aggregated[i].nerr = mount_hash_values[j];
  247. }
  248. write_count_chart(NETDATA_EBPF_MOUNT_CALLS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  249. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  250. write_err_chart(NETDATA_EBPF_MOUNT_ERRORS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  251. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  252. }
  253. /**
  254. * Main loop for this collector.
  255. */
  256. static void mount_collector(ebpf_module_t *em)
  257. {
  258. memset(mount_hash_values, 0, sizeof(mount_hash_values));
  259. heartbeat_t hb;
  260. heartbeat_init(&hb);
  261. int update_every = em->update_every;
  262. int counter = update_every - 1;
  263. while (!ebpf_exit_plugin) {
  264. (void)heartbeat_next(&hb, USEC_PER_SEC);
  265. if (ebpf_exit_plugin || ++counter != update_every)
  266. continue;
  267. counter = 0;
  268. ebpf_mount_read_global_table();
  269. pthread_mutex_lock(&lock);
  270. ebpf_mount_send_data();
  271. pthread_mutex_unlock(&lock);
  272. }
  273. }
  274. /*****************************************************************
  275. *
  276. * INITIALIZE THREAD
  277. *
  278. *****************************************************************/
  279. /**
  280. * Create mount charts
  281. *
  282. * Call ebpf_create_chart to create the charts for the collector.
  283. *
  284. * @param update_every value to overwrite the update frequency set by the server.
  285. */
  286. static void ebpf_create_mount_charts(int update_every)
  287. {
  288. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_CALLS,
  289. "Calls to mount and umount syscalls",
  290. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  291. NULL,
  292. NETDATA_EBPF_CHART_TYPE_LINE,
  293. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS,
  294. ebpf_create_global_dimension,
  295. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  296. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  297. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_ERRORS,
  298. "Errors to mount and umount file systems",
  299. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  300. NULL,
  301. NETDATA_EBPF_CHART_TYPE_LINE,
  302. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS + 1,
  303. ebpf_create_global_dimension,
  304. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  305. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  306. fflush(stdout);
  307. }
  308. /*****************************************************************
  309. *
  310. * MAIN THREAD
  311. *
  312. *****************************************************************/
  313. /*
  314. * Load BPF
  315. *
  316. * Load BPF files.
  317. *
  318. * @param em the structure with configuration
  319. */
  320. static int ebpf_mount_load_bpf(ebpf_module_t *em)
  321. {
  322. int ret = 0;
  323. if (em->load & EBPF_LOAD_LEGACY) {
  324. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  325. if (!em->probe_links) {
  326. ret = -1;
  327. }
  328. }
  329. #ifdef LIBBPF_MAJOR_VERSION
  330. else {
  331. mount_bpf_obj = mount_bpf__open();
  332. if (!mount_bpf_obj)
  333. ret = -1;
  334. else
  335. ret = ebpf_mount_load_and_attach(mount_bpf_obj, em);
  336. }
  337. #endif
  338. if (ret)
  339. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  340. return ret;
  341. }
  342. /**
  343. * Mount thread
  344. *
  345. * Thread used to make mount thread
  346. *
  347. * @param ptr a pointer to `struct ebpf_module`
  348. *
  349. * @return It always returns NULL
  350. */
  351. void *ebpf_mount_thread(void *ptr)
  352. {
  353. netdata_thread_cleanup_push(ebpf_mount_exit, ptr);
  354. ebpf_module_t *em = (ebpf_module_t *)ptr;
  355. em->maps = mount_maps;
  356. #ifdef LIBBPF_MAJOR_VERSION
  357. ebpf_adjust_thread_load(em, default_btf);
  358. #endif
  359. if (ebpf_mount_load_bpf(em)) {
  360. goto endmount;
  361. }
  362. int algorithms[NETDATA_EBPF_MOUNT_SYSCALL] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  363. ebpf_global_labels(mount_aggregated_data, mount_publish_aggregated, mount_dimension_name, mount_dimension_name,
  364. algorithms, NETDATA_EBPF_MOUNT_SYSCALL);
  365. pthread_mutex_lock(&lock);
  366. ebpf_create_mount_charts(em->update_every);
  367. ebpf_update_stats(&plugin_statistics, em);
  368. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps);
  369. pthread_mutex_unlock(&lock);
  370. mount_collector(em);
  371. endmount:
  372. ebpf_update_disabled_plugin_stats(em);
  373. netdata_thread_cleanup_pop(1);
  374. return NULL;
  375. }