ebpf_fd.c 50 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_fd.h"
  4. static char *fd_dimension_names[NETDATA_FD_SYSCALL_END] = { "open", "close" };
  5. static char *fd_id_names[NETDATA_FD_SYSCALL_END] = { "do_sys_open", "__close_fd" };
  6. static char *close_targets[NETDATA_EBPF_MAX_FD_TARGETS] = {"close_fd", "__close_fd"};
  7. static char *open_targets[NETDATA_EBPF_MAX_FD_TARGETS] = {"do_sys_openat2", "do_sys_open"};
  8. static netdata_syscall_stat_t fd_aggregated_data[NETDATA_FD_SYSCALL_END];
  9. static netdata_publish_syscall_t fd_publish_aggregated[NETDATA_FD_SYSCALL_END];
  10. static ebpf_local_maps_t fd_maps[] = {{.name = "tbl_fd_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  11. .user_input = 0,
  12. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  13. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  14. #ifdef LIBBPF_MAJOR_VERSION
  15. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  16. #endif
  17. },
  18. {.name = "tbl_fd_global", .internal_input = NETDATA_KEY_END_VECTOR,
  19. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  20. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  21. #ifdef LIBBPF_MAJOR_VERSION
  22. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  23. #endif
  24. },
  25. {.name = "fd_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  26. .user_input = 0,
  27. .type = NETDATA_EBPF_MAP_CONTROLLER,
  28. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  29. #ifdef LIBBPF_MAJOR_VERSION
  30. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  31. #endif
  32. },
  33. {.name = NULL, .internal_input = 0, .user_input = 0,
  34. .type = NETDATA_EBPF_MAP_CONTROLLER,
  35. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  36. #ifdef LIBBPF_MAJOR_VERSION
  37. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  38. #endif
  39. }};
  40. struct config fd_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  41. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  42. .rwlock = AVL_LOCK_INITIALIZER } };
  43. static netdata_idx_t fd_hash_values[NETDATA_FD_COUNTER];
  44. static netdata_idx_t *fd_values = NULL;
  45. netdata_fd_stat_t *fd_vector = NULL;
  46. netdata_ebpf_targets_t fd_targets[] = { {.name = "open", .mode = EBPF_LOAD_TRAMPOLINE},
  47. {.name = "close", .mode = EBPF_LOAD_TRAMPOLINE},
  48. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  49. #ifdef NETDATA_DEV_MODE
  50. int fd_disable_priority;
  51. #endif
  52. #ifdef LIBBPF_MAJOR_VERSION
  53. /**
  54. * Disable probe
  55. *
  56. * Disable all probes to use exclusively another method.
  57. *
  58. * @param obj is the main structure for bpf objects
  59. */
  60. static inline void ebpf_fd_disable_probes(struct fd_bpf *obj)
  61. {
  62. bpf_program__set_autoload(obj->progs.netdata_sys_open_kprobe, false);
  63. bpf_program__set_autoload(obj->progs.netdata_sys_open_kretprobe, false);
  64. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  65. bpf_program__set_autoload(obj->progs.netdata___close_fd_kretprobe, false);
  66. bpf_program__set_autoload(obj->progs.netdata___close_fd_kprobe, false);
  67. bpf_program__set_autoload(obj->progs.netdata_close_fd_kprobe, false);
  68. } else {
  69. bpf_program__set_autoload(obj->progs.netdata___close_fd_kprobe, false);
  70. bpf_program__set_autoload(obj->progs.netdata_close_fd_kretprobe, false);
  71. bpf_program__set_autoload(obj->progs.netdata_close_fd_kprobe, false);
  72. }
  73. }
  74. /*
  75. * Disable specific probe
  76. *
  77. * Disable probes according the kernel version
  78. *
  79. * @param obj is the main structure for bpf objects
  80. */
  81. static inline void ebpf_disable_specific_probes(struct fd_bpf *obj)
  82. {
  83. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  84. bpf_program__set_autoload(obj->progs.netdata___close_fd_kretprobe, false);
  85. bpf_program__set_autoload(obj->progs.netdata___close_fd_kprobe, false);
  86. } else {
  87. bpf_program__set_autoload(obj->progs.netdata_close_fd_kretprobe, false);
  88. bpf_program__set_autoload(obj->progs.netdata_close_fd_kprobe, false);
  89. }
  90. }
  91. /*
  92. * Disable trampoline
  93. *
  94. * Disable all trampoline to use exclusively another method.
  95. *
  96. * @param obj is the main structure for bpf objects.
  97. */
  98. static inline void ebpf_disable_trampoline(struct fd_bpf *obj)
  99. {
  100. bpf_program__set_autoload(obj->progs.netdata_sys_open_fentry, false);
  101. bpf_program__set_autoload(obj->progs.netdata_sys_open_fexit, false);
  102. bpf_program__set_autoload(obj->progs.netdata_close_fd_fentry, false);
  103. bpf_program__set_autoload(obj->progs.netdata_close_fd_fexit, false);
  104. bpf_program__set_autoload(obj->progs.netdata___close_fd_fentry, false);
  105. bpf_program__set_autoload(obj->progs.netdata___close_fd_fexit, false);
  106. }
  107. /*
  108. * Disable specific trampoline
  109. *
  110. * Disable trampoline according to kernel version.
  111. *
  112. * @param obj is the main structure for bpf objects.
  113. */
  114. static inline void ebpf_disable_specific_trampoline(struct fd_bpf *obj)
  115. {
  116. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  117. bpf_program__set_autoload(obj->progs.netdata___close_fd_fentry, false);
  118. bpf_program__set_autoload(obj->progs.netdata___close_fd_fexit, false);
  119. } else {
  120. bpf_program__set_autoload(obj->progs.netdata_close_fd_fentry, false);
  121. bpf_program__set_autoload(obj->progs.netdata_close_fd_fexit, false);
  122. }
  123. }
  124. /**
  125. * Set trampoline target
  126. *
  127. * Set the targets we will monitor.
  128. *
  129. * @param obj is the main structure for bpf objects.
  130. */
  131. static void ebpf_set_trampoline_target(struct fd_bpf *obj)
  132. {
  133. bpf_program__set_attach_target(obj->progs.netdata_sys_open_fentry, 0, fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  134. bpf_program__set_attach_target(obj->progs.netdata_sys_open_fexit, 0, fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  135. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  136. bpf_program__set_attach_target(
  137. obj->progs.netdata_close_fd_fentry, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  138. bpf_program__set_attach_target(obj->progs.netdata_close_fd_fexit, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  139. } else {
  140. bpf_program__set_attach_target(
  141. obj->progs.netdata___close_fd_fentry, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  142. bpf_program__set_attach_target(
  143. obj->progs.netdata___close_fd_fexit, 0, fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  144. }
  145. }
  146. /**
  147. * Mount Attach Probe
  148. *
  149. * Attach probes to target
  150. *
  151. * @param obj is the main structure for bpf objects.
  152. *
  153. * @return It returns 0 on success and -1 otherwise.
  154. */
  155. static int ebpf_fd_attach_probe(struct fd_bpf *obj)
  156. {
  157. obj->links.netdata_sys_open_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_sys_open_kprobe, false,
  158. fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  159. int ret = libbpf_get_error(obj->links.netdata_sys_open_kprobe);
  160. if (ret)
  161. return -1;
  162. obj->links.netdata_sys_open_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_sys_open_kretprobe, true,
  163. fd_targets[NETDATA_FD_SYSCALL_OPEN].name);
  164. ret = libbpf_get_error(obj->links.netdata_sys_open_kretprobe);
  165. if (ret)
  166. return -1;
  167. if (!strcmp(fd_targets[NETDATA_FD_SYSCALL_CLOSE].name, close_targets[NETDATA_FD_CLOSE_FD])) {
  168. obj->links.netdata_close_fd_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_close_fd_kretprobe, true,
  169. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  170. ret = libbpf_get_error(obj->links.netdata_close_fd_kretprobe);
  171. if (ret)
  172. return -1;
  173. obj->links.netdata_close_fd_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_close_fd_kprobe, false,
  174. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  175. ret = libbpf_get_error(obj->links.netdata_close_fd_kprobe);
  176. if (ret)
  177. return -1;
  178. } else {
  179. obj->links.netdata___close_fd_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata___close_fd_kretprobe,
  180. true,
  181. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  182. ret = libbpf_get_error(obj->links.netdata___close_fd_kretprobe);
  183. if (ret)
  184. return -1;
  185. obj->links.netdata___close_fd_kprobe = bpf_program__attach_kprobe(obj->progs.netdata___close_fd_kprobe,
  186. false,
  187. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name);
  188. ret = libbpf_get_error(obj->links.netdata___close_fd_kprobe);
  189. if (ret)
  190. return -1;
  191. }
  192. return 0;
  193. }
  194. /**
  195. * FD Fill Address
  196. *
  197. * Fill address value used to load probes/trampoline.
  198. */
  199. static inline void ebpf_fd_fill_address(ebpf_addresses_t *address, char **targets)
  200. {
  201. int i;
  202. for (i = 0; i < NETDATA_EBPF_MAX_FD_TARGETS; i++) {
  203. address->function = targets[i];
  204. ebpf_load_addresses(address, -1);
  205. if (address->addr)
  206. break;
  207. }
  208. }
  209. /**
  210. * Set target values
  211. *
  212. * Set pointers used to load data.
  213. *
  214. * @return It returns 0 on success and -1 otherwise.
  215. */
  216. static int ebpf_fd_set_target_values()
  217. {
  218. ebpf_addresses_t address = {.function = NULL, .hash = 0, .addr = 0};
  219. ebpf_fd_fill_address(&address, close_targets);
  220. if (!address.addr)
  221. return -1;
  222. fd_targets[NETDATA_FD_SYSCALL_CLOSE].name = address.function;
  223. address.addr = 0;
  224. ebpf_fd_fill_address(&address, open_targets);
  225. if (!address.addr)
  226. return -1;
  227. fd_targets[NETDATA_FD_SYSCALL_OPEN].name = address.function;
  228. return 0;
  229. }
  230. /**
  231. * Set hash tables
  232. *
  233. * Set the values for maps according the value given by kernel.
  234. *
  235. * @param obj is the main structure for bpf objects.
  236. */
  237. static void ebpf_fd_set_hash_tables(struct fd_bpf *obj)
  238. {
  239. fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd = bpf_map__fd(obj->maps.tbl_fd_global);
  240. fd_maps[NETDATA_FD_PID_STATS].map_fd = bpf_map__fd(obj->maps.tbl_fd_pid);
  241. fd_maps[NETDATA_FD_CONTROLLER].map_fd = bpf_map__fd(obj->maps.fd_ctrl);
  242. }
  243. /**
  244. * Adjust Map Size
  245. *
  246. * Resize maps according input from users.
  247. *
  248. * @param obj is the main structure for bpf objects.
  249. * @param em structure with configuration
  250. */
  251. static void ebpf_fd_adjust_map(struct fd_bpf *obj, ebpf_module_t *em)
  252. {
  253. ebpf_update_map_size(obj->maps.tbl_fd_pid, &fd_maps[NETDATA_FD_PID_STATS],
  254. em, bpf_map__name(obj->maps.tbl_fd_pid));
  255. ebpf_update_map_type(obj->maps.tbl_fd_global, &fd_maps[NETDATA_FD_GLOBAL_STATS]);
  256. ebpf_update_map_type(obj->maps.tbl_fd_pid, &fd_maps[NETDATA_FD_PID_STATS]);
  257. ebpf_update_map_type(obj->maps.fd_ctrl, &fd_maps[NETDATA_FD_CONTROLLER]);
  258. }
  259. /**
  260. * Load and attach
  261. *
  262. * Load and attach the eBPF code in kernel.
  263. *
  264. * @param obj is the main structure for bpf objects.
  265. * @param em structure with configuration
  266. *
  267. * @return it returns 0 on success and -1 otherwise
  268. */
  269. static inline int ebpf_fd_load_and_attach(struct fd_bpf *obj, ebpf_module_t *em)
  270. {
  271. netdata_ebpf_targets_t *mt = em->targets;
  272. netdata_ebpf_program_loaded_t test = mt[NETDATA_FD_SYSCALL_OPEN].mode;
  273. if (ebpf_fd_set_target_values()) {
  274. netdata_log_error("%s file descriptor.", NETDATA_EBPF_DEFAULT_FNT_NOT_FOUND);
  275. return -1;
  276. }
  277. if (test == EBPF_LOAD_TRAMPOLINE) {
  278. ebpf_fd_disable_probes(obj);
  279. ebpf_disable_specific_trampoline(obj);
  280. ebpf_set_trampoline_target(obj);
  281. } else {
  282. ebpf_disable_trampoline(obj);
  283. ebpf_disable_specific_probes(obj);
  284. }
  285. ebpf_fd_adjust_map(obj, em);
  286. int ret = fd_bpf__load(obj);
  287. if (ret) {
  288. return ret;
  289. }
  290. ret = (test == EBPF_LOAD_TRAMPOLINE) ? fd_bpf__attach(obj) : ebpf_fd_attach_probe(obj);
  291. if (!ret) {
  292. ebpf_fd_set_hash_tables(obj);
  293. ebpf_update_controller(fd_maps[NETDATA_FD_CONTROLLER].map_fd, em);
  294. }
  295. return ret;
  296. }
  297. #endif
  298. /*****************************************************************
  299. *
  300. * FUNCTIONS TO CLOSE THE THREAD
  301. *
  302. *****************************************************************/
  303. static void ebpf_obsolete_specific_fd_charts(char *type, ebpf_module_t *em);
  304. /**
  305. * Obsolete services
  306. *
  307. * Obsolete all service charts created
  308. *
  309. * @param em a pointer to `struct ebpf_module`
  310. */
  311. static void ebpf_obsolete_fd_services(ebpf_module_t *em)
  312. {
  313. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  314. NETDATA_SYSCALL_APPS_FILE_OPEN,
  315. "",
  316. "Number of open files",
  317. EBPF_COMMON_DIMENSION_CALL,
  318. NETDATA_APPS_FILE_CGROUP_GROUP,
  319. NETDATA_EBPF_CHART_TYPE_STACKED,
  320. NETDATA_CGROUP_FD_OPEN_CONTEXT,
  321. 20270,
  322. em->update_every);
  323. if (em->mode < MODE_ENTRY) {
  324. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  325. NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR,
  326. "",
  327. "Fails to open files",
  328. EBPF_COMMON_DIMENSION_CALL,
  329. NETDATA_APPS_FILE_CGROUP_GROUP,
  330. NETDATA_EBPF_CHART_TYPE_STACKED,
  331. NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT,
  332. 20271,
  333. em->update_every);
  334. }
  335. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  336. NETDATA_SYSCALL_APPS_FILE_CLOSED,
  337. "",
  338. "Files closed",
  339. EBPF_COMMON_DIMENSION_CALL,
  340. NETDATA_APPS_FILE_CGROUP_GROUP,
  341. NETDATA_EBPF_CHART_TYPE_STACKED,
  342. NETDATA_CGROUP_FD_CLOSE_CONTEXT,
  343. 20272,
  344. em->update_every);
  345. if (em->mode < MODE_ENTRY) {
  346. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  347. NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR,
  348. "",
  349. "Fails to close files",
  350. EBPF_COMMON_DIMENSION_CALL,
  351. NETDATA_APPS_FILE_CGROUP_GROUP,
  352. NETDATA_EBPF_CHART_TYPE_STACKED,
  353. NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT,
  354. 20273,
  355. em->update_every);
  356. }
  357. }
  358. /**
  359. * Obsolete cgroup chart
  360. *
  361. * Send obsolete for all charts created before to close.
  362. *
  363. * @param em a pointer to `struct ebpf_module`
  364. */
  365. static inline void ebpf_obsolete_fd_cgroup_charts(ebpf_module_t *em) {
  366. pthread_mutex_lock(&mutex_cgroup_shm);
  367. ebpf_obsolete_fd_services(em);
  368. ebpf_cgroup_target_t *ect;
  369. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  370. if (ect->systemd)
  371. continue;
  372. ebpf_obsolete_specific_fd_charts(ect->name, em);
  373. }
  374. pthread_mutex_unlock(&mutex_cgroup_shm);
  375. }
  376. /**
  377. * Obsolette apps charts
  378. *
  379. * Obsolete apps charts.
  380. *
  381. * @param em a pointer to the structure with the default values.
  382. */
  383. void ebpf_obsolete_fd_apps_charts(struct ebpf_module *em)
  384. {
  385. struct ebpf_target *w;
  386. int update_every = em->update_every;
  387. for (w = apps_groups_root_target; w; w = w->next) {
  388. if (unlikely(!(w->charts_created & (1<<EBPF_MODULE_FD_IDX))))
  389. continue;
  390. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  391. w->clean_name,
  392. "_ebpf_file_open",
  393. "Number of open files",
  394. EBPF_COMMON_DIMENSION_CALL,
  395. NETDATA_APPS_FILE_FDS,
  396. NETDATA_EBPF_CHART_TYPE_STACKED,
  397. "app.ebpf_file_open",
  398. 20220,
  399. update_every);
  400. if (em->mode < MODE_ENTRY) {
  401. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  402. w->clean_name,
  403. "_ebpf_file_open_error",
  404. "Fails to open files.",
  405. EBPF_COMMON_DIMENSION_CALL,
  406. NETDATA_APPS_FILE_FDS,
  407. NETDATA_EBPF_CHART_TYPE_STACKED,
  408. "app.ebpf_file_open_error",
  409. 20221,
  410. update_every);
  411. }
  412. ebpf_write_chart_obsolete(NETDATA_APPS_FAMILY,
  413. w->clean_name,
  414. "_ebpf_file_closed",
  415. "Files closed.",
  416. EBPF_COMMON_DIMENSION_CALL,
  417. NETDATA_APPS_FILE_FDS,
  418. NETDATA_EBPF_CHART_TYPE_STACKED,
  419. "app.ebpf_file_closed",
  420. 20222,
  421. update_every);
  422. if (em->mode < MODE_ENTRY) {
  423. ebpf_write_chart_obsolete(NETDATA_APPS_FAMILY,
  424. w->clean_name,
  425. "_ebpf_file_close_error",
  426. "Fails to close files.",
  427. EBPF_COMMON_DIMENSION_CALL,
  428. NETDATA_APPS_FILE_FDS,
  429. NETDATA_EBPF_CHART_TYPE_STACKED,
  430. "app.ebpf_fd_close_error",
  431. 20223,
  432. update_every);
  433. }
  434. w->charts_created &= ~(1<<EBPF_MODULE_FD_IDX);
  435. }
  436. }
  437. /**
  438. * Obsolete global
  439. *
  440. * Obsolete global charts created by thread.
  441. *
  442. * @param em a pointer to `struct ebpf_module`
  443. */
  444. static void ebpf_obsolete_fd_global(ebpf_module_t *em)
  445. {
  446. ebpf_write_chart_obsolete(NETDATA_FILESYSTEM_FAMILY,
  447. NETDATA_FILE_OPEN_CLOSE_COUNT,
  448. "",
  449. "Open and close calls",
  450. EBPF_COMMON_DIMENSION_CALL,
  451. NETDATA_FILE_GROUP,
  452. NETDATA_EBPF_CHART_TYPE_LINE,
  453. NULL,
  454. NETDATA_CHART_PRIO_EBPF_FD_CHARTS,
  455. em->update_every);
  456. if (em->mode < MODE_ENTRY) {
  457. ebpf_write_chart_obsolete(NETDATA_FILESYSTEM_FAMILY,
  458. NETDATA_FILE_OPEN_ERR_COUNT,
  459. "",
  460. "Open fails",
  461. EBPF_COMMON_DIMENSION_CALL,
  462. NETDATA_FILE_GROUP,
  463. NETDATA_EBPF_CHART_TYPE_LINE,
  464. NULL,
  465. NETDATA_CHART_PRIO_EBPF_FD_CHARTS + 1,
  466. em->update_every);
  467. }
  468. }
  469. /**
  470. * FD Exit
  471. *
  472. * Cancel child thread and exit.
  473. *
  474. * @param ptr thread data.
  475. */
  476. static void ebpf_fd_exit(void *ptr)
  477. {
  478. ebpf_module_t *em = (ebpf_module_t *)ptr;
  479. if (em->enabled == NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
  480. pthread_mutex_lock(&lock);
  481. if (em->cgroup_charts) {
  482. ebpf_obsolete_fd_cgroup_charts(em);
  483. fflush(stdout);
  484. }
  485. if (em->apps_charts & NETDATA_EBPF_APPS_FLAG_CHART_CREATED) {
  486. ebpf_obsolete_fd_apps_charts(em);
  487. }
  488. ebpf_obsolete_fd_global(em);
  489. #ifdef NETDATA_DEV_MODE
  490. if (ebpf_aral_fd_pid)
  491. ebpf_statistic_obsolete_aral_chart(em, fd_disable_priority);
  492. #endif
  493. fflush(stdout);
  494. pthread_mutex_unlock(&lock);
  495. }
  496. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_REMOVE);
  497. #ifdef LIBBPF_MAJOR_VERSION
  498. if (fd_bpf_obj) {
  499. fd_bpf__destroy(fd_bpf_obj);
  500. fd_bpf_obj = NULL;
  501. }
  502. #endif
  503. if (em->objects) {
  504. ebpf_unload_legacy_code(em->objects, em->probe_links);
  505. em->objects = NULL;
  506. em->probe_links = NULL;
  507. }
  508. pthread_mutex_lock(&ebpf_exit_cleanup);
  509. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  510. ebpf_update_stats(&plugin_statistics, em);
  511. pthread_mutex_unlock(&ebpf_exit_cleanup);
  512. }
  513. /*****************************************************************
  514. *
  515. * MAIN LOOP
  516. *
  517. *****************************************************************/
  518. /**
  519. * Send data to Netdata calling auxiliary functions.
  520. *
  521. * @param em the structure with thread information
  522. */
  523. static void ebpf_fd_send_data(ebpf_module_t *em)
  524. {
  525. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].ncall = fd_hash_values[NETDATA_KEY_CALLS_DO_SYS_OPEN];
  526. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].nerr = fd_hash_values[NETDATA_KEY_ERROR_DO_SYS_OPEN];
  527. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].ncall = fd_hash_values[NETDATA_KEY_CALLS_CLOSE_FD];
  528. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].nerr = fd_hash_values[NETDATA_KEY_ERROR_CLOSE_FD];
  529. write_count_chart(NETDATA_FILE_OPEN_CLOSE_COUNT, NETDATA_FILESYSTEM_FAMILY, fd_publish_aggregated,
  530. NETDATA_FD_SYSCALL_END);
  531. if (em->mode < MODE_ENTRY) {
  532. write_err_chart(NETDATA_FILE_OPEN_ERR_COUNT, NETDATA_FILESYSTEM_FAMILY,
  533. fd_publish_aggregated, NETDATA_FD_SYSCALL_END);
  534. }
  535. }
  536. /**
  537. * Read global counter
  538. *
  539. * Read the table with number of calls for all functions
  540. *
  541. * @param stats vector used to read data from control table.
  542. * @param maps_per_core do I need to read all cores?
  543. */
  544. static void ebpf_fd_read_global_tables(netdata_idx_t *stats, int maps_per_core)
  545. {
  546. ebpf_read_global_table_stats(fd_hash_values,
  547. fd_values,
  548. fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd,
  549. maps_per_core,
  550. NETDATA_KEY_CALLS_DO_SYS_OPEN,
  551. NETDATA_FD_COUNTER);
  552. ebpf_read_global_table_stats(stats,
  553. fd_values,
  554. fd_maps[NETDATA_FD_CONTROLLER].map_fd,
  555. maps_per_core,
  556. NETDATA_CONTROLLER_PID_TABLE_ADD,
  557. NETDATA_CONTROLLER_END);
  558. }
  559. /**
  560. * Apps Accumulator
  561. *
  562. * Sum all values read from kernel and store in the first address.
  563. *
  564. * @param out the vector with read values.
  565. * @param maps_per_core do I need to read all cores?
  566. */
  567. static void fd_apps_accumulator(netdata_fd_stat_t *out, int maps_per_core)
  568. {
  569. int i, end = (maps_per_core) ? ebpf_nprocs : 1;
  570. netdata_fd_stat_t *total = &out[0];
  571. for (i = 1; i < end; i++) {
  572. netdata_fd_stat_t *w = &out[i];
  573. total->open_call += w->open_call;
  574. total->close_call += w->close_call;
  575. total->open_err += w->open_err;
  576. total->close_err += w->close_err;
  577. }
  578. }
  579. /**
  580. * Fill PID
  581. *
  582. * Fill PID structures
  583. *
  584. * @param current_pid pid that we are collecting data
  585. * @param out values read from hash tables;
  586. */
  587. static void fd_fill_pid(uint32_t current_pid, netdata_fd_stat_t *publish)
  588. {
  589. netdata_fd_stat_t *curr = fd_pid[current_pid];
  590. if (!curr) {
  591. curr = ebpf_fd_stat_get();
  592. fd_pid[current_pid] = curr;
  593. }
  594. memcpy(curr, &publish[0], sizeof(netdata_fd_stat_t));
  595. }
  596. /**
  597. * Read APPS table
  598. *
  599. * Read the apps table and store data inside the structure.
  600. *
  601. * @param maps_per_core do I need to read all cores?
  602. */
  603. static void read_fd_apps_table(int maps_per_core)
  604. {
  605. netdata_fd_stat_t *fv = fd_vector;
  606. uint32_t key;
  607. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  608. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  609. size_t length = sizeof(netdata_fd_stat_t);
  610. if (maps_per_core)
  611. length *= ebpf_nprocs;
  612. while (pids) {
  613. key = pids->pid;
  614. if (bpf_map_lookup_elem(fd, &key, fv)) {
  615. pids = pids->next;
  616. continue;
  617. }
  618. fd_apps_accumulator(fv, maps_per_core);
  619. fd_fill_pid(key, fv);
  620. // We are cleaning to avoid passing data read from one process to other.
  621. memset(fv, 0, length);
  622. pids = pids->next;
  623. }
  624. }
  625. /**
  626. * Update cgroup
  627. *
  628. * Update cgroup data collected per PID.
  629. *
  630. * @param maps_per_core do I need to read all cores?
  631. */
  632. static void ebpf_update_fd_cgroup(int maps_per_core)
  633. {
  634. ebpf_cgroup_target_t *ect ;
  635. netdata_fd_stat_t *fv = fd_vector;
  636. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  637. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  638. pthread_mutex_lock(&mutex_cgroup_shm);
  639. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  640. struct pid_on_target2 *pids;
  641. for (pids = ect->pids; pids; pids = pids->next) {
  642. int pid = pids->pid;
  643. netdata_fd_stat_t *out = &pids->fd;
  644. if (likely(fd_pid) && fd_pid[pid]) {
  645. netdata_fd_stat_t *in = fd_pid[pid];
  646. memcpy(out, in, sizeof(netdata_fd_stat_t));
  647. } else {
  648. memset(fv, 0, length);
  649. if (!bpf_map_lookup_elem(fd, &pid, fv)) {
  650. fd_apps_accumulator(fv, maps_per_core);
  651. memcpy(out, fv, sizeof(netdata_fd_stat_t));
  652. }
  653. }
  654. }
  655. }
  656. pthread_mutex_unlock(&mutex_cgroup_shm);
  657. }
  658. /**
  659. * Sum PIDs
  660. *
  661. * Sum values for all targets.
  662. *
  663. * @param fd the output
  664. * @param root list of pids
  665. */
  666. static void ebpf_fd_sum_pids(netdata_fd_stat_t *fd, struct ebpf_pid_on_target *root)
  667. {
  668. uint32_t open_call = 0;
  669. uint32_t close_call = 0;
  670. uint32_t open_err = 0;
  671. uint32_t close_err = 0;
  672. while (root) {
  673. int32_t pid = root->pid;
  674. netdata_fd_stat_t *w = fd_pid[pid];
  675. if (w) {
  676. open_call += w->open_call;
  677. close_call += w->close_call;
  678. open_err += w->open_err;
  679. close_err += w->close_err;
  680. }
  681. root = root->next;
  682. }
  683. // These conditions were added, because we are using incremental algorithm
  684. fd->open_call = (open_call >= fd->open_call) ? open_call : fd->open_call;
  685. fd->close_call = (close_call >= fd->close_call) ? close_call : fd->close_call;
  686. fd->open_err = (open_err >= fd->open_err) ? open_err : fd->open_err;
  687. fd->close_err = (close_err >= fd->close_err) ? close_err : fd->close_err;
  688. }
  689. /**
  690. * Send data to Netdata calling auxiliary functions.
  691. *
  692. * @param em the structure with thread information
  693. * @param root the target list.
  694. */
  695. void ebpf_fd_send_apps_data(ebpf_module_t *em, struct ebpf_target *root)
  696. {
  697. struct ebpf_target *w;
  698. for (w = root; w; w = w->next) {
  699. if (unlikely(!(w->charts_created & (1<<EBPF_MODULE_FD_IDX))))
  700. continue;
  701. ebpf_fd_sum_pids(&w->fd, w->root_pid);
  702. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_file_open");
  703. write_chart_dimension("calls", w->fd.open_call);
  704. ebpf_write_end_chart();
  705. if (em->mode < MODE_ENTRY) {
  706. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_file_open_error");
  707. write_chart_dimension("calls", w->fd.open_err);
  708. ebpf_write_end_chart();
  709. }
  710. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_file_closed");
  711. write_chart_dimension("calls", w->fd.close_call);
  712. ebpf_write_end_chart();
  713. if (em->mode < MODE_ENTRY) {
  714. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_file_close_error");
  715. write_chart_dimension("calls", w->fd.close_err);
  716. ebpf_write_end_chart();
  717. }
  718. }
  719. }
  720. /**
  721. * Sum PIDs
  722. *
  723. * Sum values for all targets.
  724. *
  725. * @param fd structure used to store data
  726. * @param pids input data
  727. */
  728. static void ebpf_fd_sum_cgroup_pids(netdata_fd_stat_t *fd, struct pid_on_target2 *pids)
  729. {
  730. netdata_fd_stat_t accumulator;
  731. memset(&accumulator, 0, sizeof(accumulator));
  732. while (pids) {
  733. netdata_fd_stat_t *w = &pids->fd;
  734. accumulator.open_err += w->open_err;
  735. accumulator.open_call += w->open_call;
  736. accumulator.close_call += w->close_call;
  737. accumulator.close_err += w->close_err;
  738. pids = pids->next;
  739. }
  740. fd->open_call = (accumulator.open_call >= fd->open_call) ? accumulator.open_call : fd->open_call;
  741. fd->open_err = (accumulator.open_err >= fd->open_err) ? accumulator.open_err : fd->open_err;
  742. fd->close_call = (accumulator.close_call >= fd->close_call) ? accumulator.close_call : fd->close_call;
  743. fd->close_err = (accumulator.close_err >= fd->close_err) ? accumulator.close_err : fd->close_err;
  744. }
  745. /**
  746. * Create specific file descriptor charts
  747. *
  748. * Create charts for cgroup/application.
  749. *
  750. * @param type the chart type.
  751. * @param em the main thread structure.
  752. */
  753. static void ebpf_create_specific_fd_charts(char *type, ebpf_module_t *em)
  754. {
  755. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  756. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  757. NETDATA_CGROUP_FD_OPEN_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  758. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400,
  759. ebpf_create_global_dimension,
  760. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  761. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  762. if (em->mode < MODE_ENTRY) {
  763. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  764. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  765. NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  766. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401,
  767. ebpf_create_global_dimension,
  768. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  769. 1, em->update_every,
  770. NETDATA_EBPF_MODULE_NAME_FD);
  771. }
  772. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  773. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  774. NETDATA_CGROUP_FD_CLOSE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  775. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402,
  776. ebpf_create_global_dimension,
  777. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  778. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  779. if (em->mode < MODE_ENTRY) {
  780. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  781. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  782. NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  783. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403,
  784. ebpf_create_global_dimension,
  785. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  786. 1, em->update_every,
  787. NETDATA_EBPF_MODULE_NAME_FD);
  788. }
  789. }
  790. /**
  791. * Obsolete specific file descriptor charts
  792. *
  793. * Obsolete charts for cgroup/application.
  794. *
  795. * @param type the chart type.
  796. * @param em the main thread structure.
  797. */
  798. static void ebpf_obsolete_specific_fd_charts(char *type, ebpf_module_t *em)
  799. {
  800. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "", "Number of open files",
  801. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  802. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_CONTEXT,
  803. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400, em->update_every);
  804. if (em->mode < MODE_ENTRY) {
  805. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "", "Fails to open files",
  806. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  807. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT,
  808. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401, em->update_every);
  809. }
  810. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "", "Files closed",
  811. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  812. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_CONTEXT,
  813. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402, em->update_every);
  814. if (em->mode < MODE_ENTRY) {
  815. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "", "Fails to close files",
  816. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  817. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT,
  818. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403, em->update_every);
  819. }
  820. }
  821. /*
  822. * Send specific file descriptor data
  823. *
  824. * Send data for specific cgroup/apps.
  825. *
  826. * @param type chart type
  827. * @param values structure with values that will be sent to netdata
  828. */
  829. static void ebpf_send_specific_fd_data(char *type, netdata_fd_stat_t *values, ebpf_module_t *em)
  830. {
  831. ebpf_write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "");
  832. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_call);
  833. ebpf_write_end_chart();
  834. if (em->mode < MODE_ENTRY) {
  835. ebpf_write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "");
  836. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_err);
  837. ebpf_write_end_chart();
  838. }
  839. ebpf_write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "");
  840. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_call);
  841. ebpf_write_end_chart();
  842. if (em->mode < MODE_ENTRY) {
  843. ebpf_write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "");
  844. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_err);
  845. ebpf_write_end_chart();
  846. }
  847. }
  848. /**
  849. * Create systemd file descriptor charts
  850. *
  851. * Create charts when systemd is enabled
  852. *
  853. * @param em the main collector structure
  854. **/
  855. static void ebpf_create_systemd_fd_charts(ebpf_module_t *em)
  856. {
  857. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  858. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  859. NETDATA_EBPF_CHART_TYPE_STACKED, 20061,
  860. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_CONTEXT,
  861. NETDATA_EBPF_MODULE_NAME_FD, em->update_every);
  862. if (em->mode < MODE_ENTRY) {
  863. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  864. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  865. NETDATA_EBPF_CHART_TYPE_STACKED, 20062,
  866. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_ERR_CONTEXT,
  867. NETDATA_EBPF_MODULE_NAME_FD, em->update_every);
  868. }
  869. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  870. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  871. NETDATA_EBPF_CHART_TYPE_STACKED, 20063,
  872. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_CONTEXT,
  873. NETDATA_EBPF_MODULE_NAME_FD, em->update_every);
  874. if (em->mode < MODE_ENTRY) {
  875. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  876. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  877. NETDATA_EBPF_CHART_TYPE_STACKED, 20064,
  878. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_ERR_CONTEXT,
  879. NETDATA_EBPF_MODULE_NAME_FD, em->update_every);
  880. }
  881. }
  882. /**
  883. * Send Systemd charts
  884. *
  885. * Send collected data to Netdata.
  886. *
  887. * @param em the main collector structure
  888. */
  889. static void ebpf_send_systemd_fd_charts(ebpf_module_t *em)
  890. {
  891. ebpf_cgroup_target_t *ect;
  892. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN, "");
  893. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  894. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  895. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_call);
  896. }
  897. }
  898. ebpf_write_end_chart();
  899. if (em->mode < MODE_ENTRY) {
  900. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "");
  901. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  902. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  903. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_err);
  904. }
  905. }
  906. ebpf_write_end_chart();
  907. }
  908. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED, "");
  909. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  910. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  911. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_call);
  912. }
  913. }
  914. ebpf_write_end_chart();
  915. if (em->mode < MODE_ENTRY) {
  916. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "");
  917. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  918. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  919. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_err);
  920. }
  921. }
  922. ebpf_write_end_chart();
  923. }
  924. }
  925. /**
  926. * Send data to Netdata calling auxiliary functions.
  927. *
  928. * @param em the main collector structure
  929. */
  930. static void ebpf_fd_send_cgroup_data(ebpf_module_t *em)
  931. {
  932. if (!ebpf_cgroup_pids)
  933. return;
  934. pthread_mutex_lock(&mutex_cgroup_shm);
  935. ebpf_cgroup_target_t *ect;
  936. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  937. ebpf_fd_sum_cgroup_pids(&ect->publish_systemd_fd, ect->pids);
  938. }
  939. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  940. if (has_systemd) {
  941. if (send_cgroup_chart) {
  942. ebpf_create_systemd_fd_charts(em);
  943. }
  944. ebpf_send_systemd_fd_charts(em);
  945. }
  946. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  947. if (ect->systemd)
  948. continue;
  949. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART) && ect->updated) {
  950. ebpf_create_specific_fd_charts(ect->name, em);
  951. ect->flags |= NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  952. }
  953. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART ) {
  954. if (ect->updated) {
  955. ebpf_send_specific_fd_data(ect->name, &ect->publish_systemd_fd, em);
  956. } else {
  957. ebpf_obsolete_specific_fd_charts(ect->name, em);
  958. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  959. }
  960. }
  961. }
  962. pthread_mutex_unlock(&mutex_cgroup_shm);
  963. }
  964. /**
  965. * Main loop for this collector.
  966. */
  967. static void fd_collector(ebpf_module_t *em)
  968. {
  969. int cgroups = em->cgroup_charts;
  970. heartbeat_t hb;
  971. heartbeat_init(&hb);
  972. int update_every = em->update_every;
  973. int counter = update_every - 1;
  974. int maps_per_core = em->maps_per_core;
  975. uint32_t running_time = 0;
  976. uint32_t lifetime = em->lifetime;
  977. netdata_idx_t *stats = em->hash_table_stats;
  978. memset(stats, 0, sizeof(em->hash_table_stats));
  979. while (!ebpf_plugin_exit && running_time < lifetime) {
  980. (void)heartbeat_next(&hb, USEC_PER_SEC);
  981. if (ebpf_plugin_exit || ++counter != update_every)
  982. continue;
  983. counter = 0;
  984. netdata_apps_integration_flags_t apps = em->apps_charts;
  985. ebpf_fd_read_global_tables(stats, maps_per_core);
  986. pthread_mutex_lock(&collect_data_mutex);
  987. if (apps)
  988. read_fd_apps_table(maps_per_core);
  989. if (cgroups)
  990. ebpf_update_fd_cgroup(maps_per_core);
  991. pthread_mutex_lock(&lock);
  992. #ifdef NETDATA_DEV_MODE
  993. if (ebpf_aral_fd_pid)
  994. ebpf_send_data_aral_chart(ebpf_aral_fd_pid, em);
  995. #endif
  996. ebpf_fd_send_data(em);
  997. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  998. ebpf_fd_send_apps_data(em, apps_groups_root_target);
  999. if (cgroups)
  1000. ebpf_fd_send_cgroup_data(em);
  1001. pthread_mutex_unlock(&lock);
  1002. pthread_mutex_unlock(&collect_data_mutex);
  1003. pthread_mutex_lock(&ebpf_exit_cleanup);
  1004. if (running_time && !em->running_time)
  1005. running_time = update_every;
  1006. else
  1007. running_time += update_every;
  1008. em->running_time = running_time;
  1009. pthread_mutex_unlock(&ebpf_exit_cleanup);
  1010. }
  1011. }
  1012. /*****************************************************************
  1013. *
  1014. * CREATE CHARTS
  1015. *
  1016. *****************************************************************/
  1017. /**
  1018. * Create apps charts
  1019. *
  1020. * Call ebpf_create_chart to create the charts on apps submenu.
  1021. *
  1022. * @param em a pointer to the structure with the default values.
  1023. */
  1024. void ebpf_fd_create_apps_charts(struct ebpf_module *em, void *ptr)
  1025. {
  1026. struct ebpf_target *root = ptr;
  1027. struct ebpf_target *w;
  1028. int update_every = em->update_every;
  1029. for (w = root; w; w = w->next) {
  1030. if (unlikely(!w->exposed))
  1031. continue;
  1032. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1033. w->clean_name,
  1034. "_ebpf_file_open",
  1035. "Number of open files",
  1036. EBPF_COMMON_DIMENSION_CALL,
  1037. NETDATA_APPS_FILE_FDS,
  1038. NETDATA_EBPF_CHART_TYPE_STACKED,
  1039. "app.ebpf_file_open",
  1040. 20220,
  1041. update_every,
  1042. NETDATA_EBPF_MODULE_NAME_FD);
  1043. ebpf_create_chart_labels("app_group", w->name, 0);
  1044. ebpf_commit_label();
  1045. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1046. if (em->mode < MODE_ENTRY) {
  1047. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1048. w->clean_name,
  1049. "_ebpf_file_open_error",
  1050. "Fails to open files.",
  1051. EBPF_COMMON_DIMENSION_CALL,
  1052. NETDATA_APPS_FILE_FDS,
  1053. NETDATA_EBPF_CHART_TYPE_STACKED,
  1054. "app.ebpf_file_open_error",
  1055. 20221,
  1056. update_every,
  1057. NETDATA_EBPF_MODULE_NAME_FD);
  1058. ebpf_create_chart_labels("app_group", w->name, 0);
  1059. ebpf_commit_label();
  1060. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1061. }
  1062. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1063. w->clean_name,
  1064. "_ebpf_file_closed",
  1065. "Files closed.",
  1066. EBPF_COMMON_DIMENSION_CALL,
  1067. NETDATA_APPS_FILE_FDS,
  1068. NETDATA_EBPF_CHART_TYPE_STACKED,
  1069. "app.ebpf_file_closed",
  1070. 20222,
  1071. update_every,
  1072. NETDATA_EBPF_MODULE_NAME_FD);
  1073. ebpf_create_chart_labels("app_group", w->name, 0);
  1074. ebpf_commit_label();
  1075. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1076. if (em->mode < MODE_ENTRY) {
  1077. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1078. w->clean_name,
  1079. "_ebpf_file_close_error",
  1080. "Fails to close files.",
  1081. EBPF_COMMON_DIMENSION_CALL,
  1082. NETDATA_APPS_FILE_FDS,
  1083. NETDATA_EBPF_CHART_TYPE_STACKED,
  1084. "app.ebpf_file_close_error",
  1085. 20223,
  1086. update_every,
  1087. NETDATA_EBPF_MODULE_NAME_FD);
  1088. ebpf_create_chart_labels("app_group", w->name, 0);
  1089. ebpf_commit_label();
  1090. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1091. }
  1092. w->charts_created |= 1<<EBPF_MODULE_FD_IDX;
  1093. }
  1094. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  1095. }
  1096. /**
  1097. * Create global charts
  1098. *
  1099. * Call ebpf_create_chart to create the charts for the collector.
  1100. *
  1101. * @param em a pointer to the structure with the default values.
  1102. */
  1103. static void ebpf_create_fd_global_charts(ebpf_module_t *em)
  1104. {
  1105. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  1106. NETDATA_FILE_OPEN_CLOSE_COUNT,
  1107. "Open and close calls",
  1108. EBPF_COMMON_DIMENSION_CALL,
  1109. NETDATA_FILE_GROUP,
  1110. NULL,
  1111. NETDATA_EBPF_CHART_TYPE_LINE,
  1112. NETDATA_CHART_PRIO_EBPF_FD_CHARTS,
  1113. ebpf_create_global_dimension,
  1114. fd_publish_aggregated,
  1115. NETDATA_FD_SYSCALL_END,
  1116. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  1117. if (em->mode < MODE_ENTRY) {
  1118. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  1119. NETDATA_FILE_OPEN_ERR_COUNT,
  1120. "Open fails",
  1121. EBPF_COMMON_DIMENSION_CALL,
  1122. NETDATA_FILE_GROUP,
  1123. NULL,
  1124. NETDATA_EBPF_CHART_TYPE_LINE,
  1125. NETDATA_CHART_PRIO_EBPF_FD_CHARTS + 1,
  1126. ebpf_create_global_dimension,
  1127. fd_publish_aggregated,
  1128. NETDATA_FD_SYSCALL_END,
  1129. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  1130. }
  1131. fflush(stdout);
  1132. }
  1133. /*****************************************************************
  1134. *
  1135. * MAIN THREAD
  1136. *
  1137. *****************************************************************/
  1138. /**
  1139. * Allocate vectors used with this thread.
  1140. *
  1141. * We are not testing the return, because callocz does this and shutdown the software
  1142. * case it was not possible to allocate.
  1143. *
  1144. * @param apps is apps enabled?
  1145. */
  1146. static void ebpf_fd_allocate_global_vectors(int apps)
  1147. {
  1148. if (apps) {
  1149. ebpf_fd_aral_init();
  1150. fd_pid = callocz((size_t)pid_max, sizeof(netdata_fd_stat_t *));
  1151. fd_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_fd_stat_t));
  1152. }
  1153. fd_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  1154. }
  1155. /*
  1156. * Load BPF
  1157. *
  1158. * Load BPF files.
  1159. *
  1160. * @param em the structure with configuration
  1161. */
  1162. static int ebpf_fd_load_bpf(ebpf_module_t *em)
  1163. {
  1164. #ifdef LIBBPF_MAJOR_VERSION
  1165. ebpf_define_map_type(fd_maps, em->maps_per_core, running_on_kernel);
  1166. #endif
  1167. int ret = 0;
  1168. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_FD_SYSCALL_OPEN].mode);
  1169. if (em->load & EBPF_LOAD_LEGACY) {
  1170. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  1171. if (!em->probe_links) {
  1172. ret = -1;
  1173. }
  1174. }
  1175. #ifdef LIBBPF_MAJOR_VERSION
  1176. else {
  1177. fd_bpf_obj = fd_bpf__open();
  1178. if (!fd_bpf_obj)
  1179. ret = -1;
  1180. else
  1181. ret = ebpf_fd_load_and_attach(fd_bpf_obj, em);
  1182. }
  1183. #endif
  1184. if (ret)
  1185. netdata_log_error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->info.thread_name);
  1186. return ret;
  1187. }
  1188. /**
  1189. * Directory Cache thread
  1190. *
  1191. * Thread used to make dcstat thread
  1192. *
  1193. * @param ptr a pointer to `struct ebpf_module`
  1194. *
  1195. * @return It always returns NULL
  1196. */
  1197. void *ebpf_fd_thread(void *ptr)
  1198. {
  1199. netdata_thread_cleanup_push(ebpf_fd_exit, ptr);
  1200. ebpf_module_t *em = (ebpf_module_t *)ptr;
  1201. em->maps = fd_maps;
  1202. #ifdef LIBBPF_MAJOR_VERSION
  1203. ebpf_adjust_thread_load(em, default_btf);
  1204. #endif
  1205. if (ebpf_fd_load_bpf(em)) {
  1206. goto endfd;
  1207. }
  1208. ebpf_fd_allocate_global_vectors(em->apps_charts);
  1209. int algorithms[NETDATA_FD_SYSCALL_END] = {
  1210. NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX
  1211. };
  1212. ebpf_global_labels(fd_aggregated_data, fd_publish_aggregated, fd_dimension_names, fd_id_names,
  1213. algorithms, NETDATA_FD_SYSCALL_END);
  1214. pthread_mutex_lock(&lock);
  1215. ebpf_create_fd_global_charts(em);
  1216. ebpf_update_stats(&plugin_statistics, em);
  1217. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_ADD);
  1218. #ifdef NETDATA_DEV_MODE
  1219. if (ebpf_aral_fd_pid)
  1220. fd_disable_priority = ebpf_statistic_create_aral_chart(NETDATA_EBPF_FD_ARAL_NAME, em);
  1221. #endif
  1222. pthread_mutex_unlock(&lock);
  1223. fd_collector(em);
  1224. endfd:
  1225. ebpf_update_disabled_plugin_stats(em);
  1226. netdata_thread_cleanup_pop(1);
  1227. return NULL;
  1228. }