ebpf_dcstat.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_dcstat.h"
  4. static char *dcstat_counter_dimension_name[NETDATA_DCSTAT_IDX_END] = { "ratio", "reference", "slow", "miss" };
  5. static netdata_syscall_stat_t dcstat_counter_aggregated_data[NETDATA_DCSTAT_IDX_END];
  6. static netdata_publish_syscall_t dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_END];
  7. netdata_dcstat_pid_t *dcstat_vector = NULL;
  8. static netdata_idx_t dcstat_hash_values[NETDATA_DCSTAT_IDX_END];
  9. static netdata_idx_t *dcstat_values = NULL;
  10. struct config dcstat_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. ebpf_local_maps_t dcstat_maps[] = {{.name = "dcstat_global", .internal_input = NETDATA_DIRECTORY_CACHE_END,
  16. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  17. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  18. #ifdef LIBBPF_MAJOR_VERSION
  19. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  20. #endif
  21. },
  22. {.name = "dcstat_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  23. .user_input = 0,
  24. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  25. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  26. #ifdef LIBBPF_MAJOR_VERSION
  27. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  28. #endif
  29. },
  30. {.name = "dcstat_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  31. .user_input = 0,
  32. .type = NETDATA_EBPF_MAP_CONTROLLER,
  33. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  34. #ifdef LIBBPF_MAJOR_VERSION
  35. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  36. #endif
  37. },
  38. {.name = NULL, .internal_input = 0, .user_input = 0,
  39. .type = NETDATA_EBPF_MAP_CONTROLLER,
  40. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  41. #ifdef LIBBPF_MAJOR_VERSION
  42. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  43. #endif
  44. }};
  45. static ebpf_specify_name_t dc_optional_name[] = { {.program_name = "netdata_lookup_fast",
  46. .function_to_attach = "lookup_fast",
  47. .optional = NULL,
  48. .retprobe = CONFIG_BOOLEAN_NO},
  49. {.program_name = NULL}};
  50. netdata_ebpf_targets_t dc_targets[] = { {.name = "lookup_fast", .mode = EBPF_LOAD_TRAMPOLINE},
  51. {.name = "d_lookup", .mode = EBPF_LOAD_TRAMPOLINE},
  52. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  53. #ifdef LIBBPF_MAJOR_VERSION
  54. /**
  55. * Disable probe
  56. *
  57. * Disable all probes to use exclusively another method.
  58. *
  59. * @param obj is the main structure for bpf objects
  60. */
  61. static inline void ebpf_dc_disable_probes(struct dc_bpf *obj)
  62. {
  63. bpf_program__set_autoload(obj->progs.netdata_lookup_fast_kprobe, false);
  64. bpf_program__set_autoload(obj->progs.netdata_d_lookup_kretprobe, false);
  65. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_kprobe, false);
  66. }
  67. /*
  68. * Disable trampoline
  69. *
  70. * Disable all trampoline to use exclusively another method.
  71. *
  72. * @param obj is the main structure for bpf objects.
  73. */
  74. static inline void ebpf_dc_disable_trampoline(struct dc_bpf *obj)
  75. {
  76. bpf_program__set_autoload(obj->progs.netdata_lookup_fast_fentry, false);
  77. bpf_program__set_autoload(obj->progs.netdata_d_lookup_fexit, false);
  78. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_fentry, false);
  79. }
  80. /**
  81. * Set trampoline target
  82. *
  83. * Set the targets we will monitor.
  84. *
  85. * @param obj is the main structure for bpf objects.
  86. */
  87. static void ebpf_dc_set_trampoline_target(struct dc_bpf *obj)
  88. {
  89. bpf_program__set_attach_target(obj->progs.netdata_lookup_fast_fentry, 0,
  90. dc_targets[NETDATA_DC_TARGET_LOOKUP_FAST].name);
  91. bpf_program__set_attach_target(obj->progs.netdata_d_lookup_fexit, 0,
  92. dc_targets[NETDATA_DC_TARGET_D_LOOKUP].name);
  93. bpf_program__set_attach_target(obj->progs.netdata_dcstat_release_task_fentry, 0,
  94. EBPF_COMMON_FNCT_CLEAN_UP);
  95. }
  96. /**
  97. * Mount Attach Probe
  98. *
  99. * Attach probes to target
  100. *
  101. * @param obj is the main structure for bpf objects.
  102. *
  103. * @return It returns 0 on success and -1 otherwise.
  104. */
  105. static int ebpf_dc_attach_probes(struct dc_bpf *obj)
  106. {
  107. obj->links.netdata_d_lookup_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_d_lookup_kretprobe,
  108. true,
  109. dc_targets[NETDATA_DC_TARGET_D_LOOKUP].name);
  110. int ret = libbpf_get_error(obj->links.netdata_d_lookup_kretprobe);
  111. if (ret)
  112. return -1;
  113. char *lookup_name = (dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional) ?
  114. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional :
  115. dc_targets[NETDATA_DC_TARGET_LOOKUP_FAST].name ;
  116. obj->links.netdata_lookup_fast_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_lookup_fast_kprobe,
  117. false,
  118. lookup_name);
  119. ret = libbpf_get_error(obj->links.netdata_lookup_fast_kprobe);
  120. if (ret)
  121. return -1;
  122. obj->links.netdata_dcstat_release_task_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_dcstat_release_task_kprobe,
  123. false,
  124. EBPF_COMMON_FNCT_CLEAN_UP);
  125. ret = libbpf_get_error(obj->links.netdata_dcstat_release_task_kprobe);
  126. if (ret)
  127. return -1;
  128. return 0;
  129. }
  130. /**
  131. * Adjust Map Size
  132. *
  133. * Resize maps according input from users.
  134. *
  135. * @param obj is the main structure for bpf objects.
  136. * @param em structure with configuration
  137. */
  138. static void ebpf_dc_adjust_map(struct dc_bpf *obj, ebpf_module_t *em)
  139. {
  140. ebpf_update_map_size(obj->maps.dcstat_pid, &dcstat_maps[NETDATA_DCSTAT_PID_STATS],
  141. em, bpf_map__name(obj->maps.dcstat_pid));
  142. ebpf_update_map_type(obj->maps.dcstat_global, &dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS]);
  143. ebpf_update_map_type(obj->maps.dcstat_pid, &dcstat_maps[NETDATA_DCSTAT_PID_STATS]);
  144. ebpf_update_map_type(obj->maps.dcstat_ctrl, &dcstat_maps[NETDATA_DCSTAT_CTRL]);
  145. }
  146. /**
  147. * Set hash tables
  148. *
  149. * Set the values for maps according the value given by kernel.
  150. *
  151. * @param obj is the main structure for bpf objects.
  152. */
  153. static void ebpf_dc_set_hash_tables(struct dc_bpf *obj)
  154. {
  155. dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS].map_fd = bpf_map__fd(obj->maps.dcstat_global);
  156. dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd = bpf_map__fd(obj->maps.dcstat_pid);
  157. dcstat_maps[NETDATA_DCSTAT_CTRL].map_fd = bpf_map__fd(obj->maps.dcstat_ctrl);
  158. }
  159. /**
  160. * Update Load
  161. *
  162. * For directory cache, some distributions change the function name, and we do not have condition to use
  163. * TRAMPOLINE like other functions.
  164. *
  165. * @param em structure with configuration
  166. *
  167. * @return When then symbols were not modified, it returns TRAMPOLINE, else it returns RETPROBE.
  168. */
  169. netdata_ebpf_program_loaded_t ebpf_dc_update_load(ebpf_module_t *em)
  170. {
  171. if (!strcmp(dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].optional,
  172. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].function_to_attach))
  173. return EBPF_LOAD_TRAMPOLINE;
  174. if (em->targets[NETDATA_DC_TARGET_LOOKUP_FAST].mode != EBPF_LOAD_RETPROBE)
  175. info("When your kernel was compiled the symbol %s was modified, instead to use `trampoline`, the plugin will use `probes`.",
  176. dc_optional_name[NETDATA_DC_TARGET_LOOKUP_FAST].function_to_attach);
  177. return EBPF_LOAD_RETPROBE;
  178. }
  179. /**
  180. * Disable Release Task
  181. *
  182. * Disable release task when apps is not enabled.
  183. *
  184. * @param obj is the main structure for bpf objects.
  185. */
  186. static void ebpf_dc_disable_release_task(struct dc_bpf *obj)
  187. {
  188. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_kprobe, false);
  189. bpf_program__set_autoload(obj->progs.netdata_dcstat_release_task_fentry, false);
  190. }
  191. /**
  192. * Load and attach
  193. *
  194. * Load and attach the eBPF code in kernel.
  195. *
  196. * @param obj is the main structure for bpf objects.
  197. * @param em structure with configuration
  198. *
  199. * @return it returns 0 on success and -1 otherwise
  200. */
  201. static inline int ebpf_dc_load_and_attach(struct dc_bpf *obj, ebpf_module_t *em)
  202. {
  203. netdata_ebpf_program_loaded_t test = ebpf_dc_update_load(em);
  204. if (test == EBPF_LOAD_TRAMPOLINE) {
  205. ebpf_dc_disable_probes(obj);
  206. ebpf_dc_set_trampoline_target(obj);
  207. } else {
  208. ebpf_dc_disable_trampoline(obj);
  209. }
  210. ebpf_dc_adjust_map(obj, em);
  211. if (!em->apps_charts && !em->cgroup_charts)
  212. ebpf_dc_disable_release_task(obj);
  213. int ret = dc_bpf__load(obj);
  214. if (ret) {
  215. return ret;
  216. }
  217. ret = (test == EBPF_LOAD_TRAMPOLINE) ? dc_bpf__attach(obj) : ebpf_dc_attach_probes(obj);
  218. if (!ret) {
  219. ebpf_dc_set_hash_tables(obj);
  220. ebpf_update_controller(dcstat_maps[NETDATA_DCSTAT_CTRL].map_fd, em);
  221. }
  222. return ret;
  223. }
  224. #endif
  225. /*****************************************************************
  226. *
  227. * COMMON FUNCTIONS
  228. *
  229. *****************************************************************/
  230. /**
  231. * Update publish
  232. *
  233. * Update publish values before to write dimension.
  234. *
  235. * @param out structure that will receive data.
  236. * @param cache_access number of access to directory cache.
  237. * @param not_found number of files not found on the file system
  238. */
  239. void dcstat_update_publish(netdata_publish_dcstat_t *out, uint64_t cache_access, uint64_t not_found)
  240. {
  241. NETDATA_DOUBLE successful_access = (NETDATA_DOUBLE) (((long long)cache_access) - ((long long)not_found));
  242. NETDATA_DOUBLE ratio = (cache_access) ? successful_access/(NETDATA_DOUBLE)cache_access : 0;
  243. out->ratio = (long long )(ratio*100);
  244. }
  245. /*****************************************************************
  246. *
  247. * FUNCTIONS TO CLOSE THE THREAD
  248. *
  249. *****************************************************************/
  250. /**
  251. * DCstat exit
  252. *
  253. * Cancel child and exit.
  254. *
  255. * @param ptr thread data.
  256. */
  257. static void ebpf_dcstat_exit(void *ptr)
  258. {
  259. ebpf_module_t *em = (ebpf_module_t *)ptr;
  260. #ifdef LIBBPF_MAJOR_VERSION
  261. if (dc_bpf_obj)
  262. dc_bpf__destroy(dc_bpf_obj);
  263. #endif
  264. if (em->objects)
  265. ebpf_unload_legacy_code(em->objects, em->probe_links);
  266. pthread_mutex_lock(&ebpf_exit_cleanup);
  267. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  268. pthread_mutex_unlock(&ebpf_exit_cleanup);
  269. }
  270. /*****************************************************************
  271. *
  272. * APPS
  273. *
  274. *****************************************************************/
  275. /**
  276. * Create apps charts
  277. *
  278. * Call ebpf_create_chart to create the charts on apps submenu.
  279. *
  280. * @param em a pointer to the structure with the default values.
  281. */
  282. void ebpf_dcstat_create_apps_charts(struct ebpf_module *em, void *ptr)
  283. {
  284. struct ebpf_target *root = ptr;
  285. ebpf_create_charts_on_apps(NETDATA_DC_HIT_CHART,
  286. "Percentage of files inside directory cache",
  287. EBPF_COMMON_DIMENSION_PERCENTAGE,
  288. NETDATA_DIRECTORY_CACHE_SUBMENU,
  289. NETDATA_EBPF_CHART_TYPE_LINE,
  290. 20100,
  291. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  292. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  293. ebpf_create_charts_on_apps(NETDATA_DC_REFERENCE_CHART,
  294. "Count file access",
  295. EBPF_COMMON_DIMENSION_FILES,
  296. NETDATA_DIRECTORY_CACHE_SUBMENU,
  297. NETDATA_EBPF_CHART_TYPE_STACKED,
  298. 20101,
  299. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  300. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  301. ebpf_create_charts_on_apps(NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  302. "Files not present inside directory cache",
  303. EBPF_COMMON_DIMENSION_FILES,
  304. NETDATA_DIRECTORY_CACHE_SUBMENU,
  305. NETDATA_EBPF_CHART_TYPE_STACKED,
  306. 20102,
  307. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  308. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  309. ebpf_create_charts_on_apps(NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  310. "Files not found",
  311. EBPF_COMMON_DIMENSION_FILES,
  312. NETDATA_DIRECTORY_CACHE_SUBMENU,
  313. NETDATA_EBPF_CHART_TYPE_STACKED,
  314. 20103,
  315. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  316. root, em->update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  317. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  318. }
  319. /*****************************************************************
  320. *
  321. * MAIN LOOP
  322. *
  323. *****************************************************************/
  324. /**
  325. * Apps Accumulator
  326. *
  327. * Sum all values read from kernel and store in the first address.
  328. *
  329. * @param out the vector with read values.
  330. * @param maps_per_core do I need to read all cores?
  331. */
  332. static void dcstat_apps_accumulator(netdata_dcstat_pid_t *out, int maps_per_core)
  333. {
  334. int i, end = (maps_per_core) ? ebpf_nprocs : 1;
  335. netdata_dcstat_pid_t *total = &out[0];
  336. for (i = 1; i < end; i++) {
  337. netdata_dcstat_pid_t *w = &out[i];
  338. total->cache_access += w->cache_access;
  339. total->file_system += w->file_system;
  340. total->not_found += w->not_found;
  341. }
  342. }
  343. /**
  344. * Save PID values
  345. *
  346. * Save the current values inside the structure
  347. *
  348. * @param out vector used to plot charts
  349. * @param publish vector with values read from hash tables.
  350. */
  351. static inline void dcstat_save_pid_values(netdata_publish_dcstat_t *out, netdata_dcstat_pid_t *publish)
  352. {
  353. memcpy(&out->curr, &publish[0], sizeof(netdata_dcstat_pid_t));
  354. }
  355. /**
  356. * Fill PID
  357. *
  358. * Fill PID structures
  359. *
  360. * @param current_pid pid that we are collecting data
  361. * @param out values read from hash tables;
  362. */
  363. static void dcstat_fill_pid(uint32_t current_pid, netdata_dcstat_pid_t *publish)
  364. {
  365. netdata_publish_dcstat_t *curr = dcstat_pid[current_pid];
  366. if (!curr) {
  367. curr = ebpf_publish_dcstat_get();
  368. dcstat_pid[current_pid] = curr;
  369. }
  370. dcstat_save_pid_values(curr, publish);
  371. }
  372. /**
  373. * Read Directory Cache APPS table
  374. *
  375. * Read the apps table and store data inside the structure.
  376. *
  377. * @param maps_per_core do I need to read all cores?
  378. */
  379. static void read_dc_apps_table(int maps_per_core)
  380. {
  381. netdata_dcstat_pid_t *cv = dcstat_vector;
  382. uint32_t key;
  383. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  384. int fd = dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd;
  385. size_t length = sizeof(netdata_dcstat_pid_t);
  386. if (maps_per_core)
  387. length *= ebpf_nprocs;
  388. while (pids) {
  389. key = pids->pid;
  390. if (bpf_map_lookup_elem(fd, &key, cv)) {
  391. pids = pids->next;
  392. continue;
  393. }
  394. dcstat_apps_accumulator(cv, maps_per_core);
  395. dcstat_fill_pid(key, cv);
  396. // We are cleaning to avoid passing data read from one process to other.
  397. memset(cv, 0, length);
  398. pids = pids->next;
  399. }
  400. }
  401. /**
  402. * Update cgroup
  403. *
  404. * Update cgroup data based in collected PID.
  405. *
  406. * @param maps_per_core do I need to read all cores?
  407. */
  408. static void ebpf_update_dc_cgroup(int maps_per_core)
  409. {
  410. netdata_dcstat_pid_t *cv = dcstat_vector;
  411. int fd = dcstat_maps[NETDATA_DCSTAT_PID_STATS].map_fd;
  412. size_t length = sizeof(netdata_dcstat_pid_t)*ebpf_nprocs;
  413. ebpf_cgroup_target_t *ect;
  414. pthread_mutex_lock(&mutex_cgroup_shm);
  415. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  416. struct pid_on_target2 *pids;
  417. for (pids = ect->pids; pids; pids = pids->next) {
  418. int pid = pids->pid;
  419. netdata_dcstat_pid_t *out = &pids->dc;
  420. if (likely(dcstat_pid) && dcstat_pid[pid]) {
  421. netdata_publish_dcstat_t *in = dcstat_pid[pid];
  422. memcpy(out, &in->curr, sizeof(netdata_dcstat_pid_t));
  423. } else {
  424. memset(cv, 0, length);
  425. if (bpf_map_lookup_elem(fd, &pid, cv)) {
  426. continue;
  427. }
  428. dcstat_apps_accumulator(cv, maps_per_core);
  429. memcpy(out, cv, sizeof(netdata_dcstat_pid_t));
  430. }
  431. }
  432. }
  433. pthread_mutex_unlock(&mutex_cgroup_shm);
  434. }
  435. /**
  436. * Read global table
  437. *
  438. * Read the table with number of calls for all functions
  439. *
  440. * @param maps_per_core do I need to read all cores?
  441. */
  442. static void ebpf_dc_read_global_table(int maps_per_core)
  443. {
  444. uint32_t idx;
  445. netdata_idx_t *val = dcstat_hash_values;
  446. netdata_idx_t *stored = dcstat_values;
  447. int fd = dcstat_maps[NETDATA_DCSTAT_GLOBAL_STATS].map_fd;
  448. for (idx = NETDATA_KEY_DC_REFERENCE; idx < NETDATA_DIRECTORY_CACHE_END; idx++) {
  449. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  450. int i;
  451. int end = (maps_per_core) ? ebpf_nprocs: 1;
  452. netdata_idx_t total = 0;
  453. for (i = 0; i < end; i++)
  454. total += stored[i];
  455. val[idx] = total;
  456. }
  457. }
  458. }
  459. /**
  460. * Cachestat sum PIDs
  461. *
  462. * Sum values for all PIDs associated to a group
  463. *
  464. * @param publish output structure.
  465. * @param root structure with listed IPs
  466. */
  467. void ebpf_dcstat_sum_pids(netdata_publish_dcstat_t *publish, struct ebpf_pid_on_target *root)
  468. {
  469. memset(&publish->curr, 0, sizeof(netdata_dcstat_pid_t));
  470. netdata_dcstat_pid_t *dst = &publish->curr;
  471. while (root) {
  472. int32_t pid = root->pid;
  473. netdata_publish_dcstat_t *w = dcstat_pid[pid];
  474. if (w) {
  475. netdata_dcstat_pid_t *src = &w->curr;
  476. dst->cache_access += src->cache_access;
  477. dst->file_system += src->file_system;
  478. dst->not_found += src->not_found;
  479. }
  480. root = root->next;
  481. }
  482. }
  483. /**
  484. * Send data to Netdata calling auxiliary functions.
  485. *
  486. * @param root the target list.
  487. */
  488. void ebpf_dcache_send_apps_data(struct ebpf_target *root)
  489. {
  490. struct ebpf_target *w;
  491. collected_number value;
  492. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_HIT_CHART);
  493. for (w = root; w; w = w->next) {
  494. if (unlikely(w->exposed && w->processes)) {
  495. ebpf_dcstat_sum_pids(&w->dcstat, w->root_pid);
  496. uint64_t cache = w->dcstat.curr.cache_access;
  497. uint64_t not_found = w->dcstat.curr.not_found;
  498. dcstat_update_publish(&w->dcstat, cache, not_found);
  499. value = (collected_number) w->dcstat.ratio;
  500. write_chart_dimension(w->name, value);
  501. }
  502. }
  503. write_end_chart();
  504. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REFERENCE_CHART);
  505. for (w = root; w; w = w->next) {
  506. if (unlikely(w->exposed && w->processes)) {
  507. if (w->dcstat.curr.cache_access < w->dcstat.prev.cache_access) {
  508. w->dcstat.prev.cache_access = 0;
  509. }
  510. w->dcstat.cache_access = (long long)w->dcstat.curr.cache_access - (long long)w->dcstat.prev.cache_access;
  511. value = (collected_number) w->dcstat.cache_access;
  512. write_chart_dimension(w->name, value);
  513. w->dcstat.prev.cache_access = w->dcstat.curr.cache_access;
  514. }
  515. }
  516. write_end_chart();
  517. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  518. for (w = root; w; w = w->next) {
  519. if (unlikely(w->exposed && w->processes)) {
  520. if (w->dcstat.curr.file_system < w->dcstat.prev.file_system) {
  521. w->dcstat.prev.file_system = 0;
  522. }
  523. value = (collected_number) (!w->dcstat.cache_access) ? 0 :
  524. (long long )w->dcstat.curr.file_system - (long long)w->dcstat.prev.file_system;
  525. write_chart_dimension(w->name, value);
  526. w->dcstat.prev.file_system = w->dcstat.curr.file_system;
  527. }
  528. }
  529. write_end_chart();
  530. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  531. for (w = root; w; w = w->next) {
  532. if (unlikely(w->exposed && w->processes)) {
  533. if (w->dcstat.curr.not_found < w->dcstat.prev.not_found) {
  534. w->dcstat.prev.not_found = 0;
  535. }
  536. value = (collected_number) (!w->dcstat.cache_access) ? 0 :
  537. (long long)w->dcstat.curr.not_found - (long long)w->dcstat.prev.not_found;
  538. write_chart_dimension(w->name, value);
  539. w->dcstat.prev.not_found = w->dcstat.curr.not_found;
  540. }
  541. }
  542. write_end_chart();
  543. }
  544. /**
  545. * Send global
  546. *
  547. * Send global charts to Netdata
  548. */
  549. static void dcstat_send_global(netdata_publish_dcstat_t *publish)
  550. {
  551. dcstat_update_publish(publish, dcstat_hash_values[NETDATA_KEY_DC_REFERENCE],
  552. dcstat_hash_values[NETDATA_KEY_DC_MISS]);
  553. netdata_publish_syscall_t *ptr = dcstat_counter_publish_aggregated;
  554. netdata_idx_t value = dcstat_hash_values[NETDATA_KEY_DC_REFERENCE];
  555. if (value != ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall) {
  556. ptr[NETDATA_DCSTAT_IDX_REFERENCE].ncall = value - ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall;
  557. ptr[NETDATA_DCSTAT_IDX_REFERENCE].pcall = value;
  558. value = dcstat_hash_values[NETDATA_KEY_DC_SLOW];
  559. ptr[NETDATA_DCSTAT_IDX_SLOW].ncall = value - ptr[NETDATA_DCSTAT_IDX_SLOW].pcall;
  560. ptr[NETDATA_DCSTAT_IDX_SLOW].pcall = value;
  561. value = dcstat_hash_values[NETDATA_KEY_DC_MISS];
  562. ptr[NETDATA_DCSTAT_IDX_MISS].ncall = value - ptr[NETDATA_DCSTAT_IDX_MISS].pcall;
  563. ptr[NETDATA_DCSTAT_IDX_MISS].pcall = value;
  564. } else {
  565. ptr[NETDATA_DCSTAT_IDX_REFERENCE].ncall = 0;
  566. ptr[NETDATA_DCSTAT_IDX_SLOW].ncall = 0;
  567. ptr[NETDATA_DCSTAT_IDX_MISS].ncall = 0;
  568. }
  569. ebpf_one_dimension_write_charts(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_HIT_CHART,
  570. ptr[NETDATA_DCSTAT_IDX_RATIO].dimension, publish->ratio);
  571. write_count_chart(
  572. NETDATA_DC_REFERENCE_CHART, NETDATA_FILESYSTEM_FAMILY,
  573. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 3);
  574. }
  575. /**
  576. * Create specific directory cache charts
  577. *
  578. * Create charts for cgroup/application.
  579. *
  580. * @param type the chart type.
  581. * @param update_every value to overwrite the update frequency set by the server.
  582. */
  583. static void ebpf_create_specific_dc_charts(char *type, int update_every)
  584. {
  585. ebpf_create_chart(type, NETDATA_DC_HIT_CHART, "Percentage of files inside directory cache",
  586. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  587. NETDATA_CGROUP_DC_HIT_RATIO_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  588. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5700,
  589. ebpf_create_global_dimension,
  590. dcstat_counter_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  591. ebpf_create_chart(type, NETDATA_DC_REFERENCE_CHART, "Count file access",
  592. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  593. NETDATA_CGROUP_DC_REFERENCE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  594. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5701,
  595. ebpf_create_global_dimension,
  596. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 1,
  597. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  598. ebpf_create_chart(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  599. "Files not present inside directory cache",
  600. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  601. NETDATA_CGROUP_DC_NOT_CACHE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  602. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5702,
  603. ebpf_create_global_dimension,
  604. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_SLOW], 1,
  605. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  606. ebpf_create_chart(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  607. "Files not found",
  608. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  609. NETDATA_CGROUP_DC_NOT_FOUND_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  610. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5703,
  611. ebpf_create_global_dimension,
  612. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_MISS], 1,
  613. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  614. }
  615. /**
  616. * Obsolete specific directory cache charts
  617. *
  618. * Obsolete charts for cgroup/application.
  619. *
  620. * @param type the chart type.
  621. * @param update_every value to overwrite the update frequency set by the server.
  622. */
  623. static void ebpf_obsolete_specific_dc_charts(char *type, int update_every)
  624. {
  625. ebpf_write_chart_obsolete(type, NETDATA_DC_HIT_CHART,
  626. "Percentage of files inside directory cache",
  627. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  628. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_HIT_RATIO_CONTEXT,
  629. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5700, update_every);
  630. ebpf_write_chart_obsolete(type, NETDATA_DC_REFERENCE_CHART,
  631. "Count file access",
  632. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  633. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_REFERENCE_CONTEXT,
  634. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5701, update_every);
  635. ebpf_write_chart_obsolete(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  636. "Files not present inside directory cache",
  637. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  638. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_NOT_CACHE_CONTEXT,
  639. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5702, update_every);
  640. ebpf_write_chart_obsolete(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  641. "Files not found",
  642. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  643. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_DC_NOT_FOUND_CONTEXT,
  644. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5703, update_every);
  645. }
  646. /**
  647. * Cachestat sum PIDs
  648. *
  649. * Sum values for all PIDs associated to a group
  650. *
  651. * @param publish output structure.
  652. * @param root structure with listed IPs
  653. */
  654. void ebpf_dc_sum_cgroup_pids(netdata_publish_dcstat_t *publish, struct pid_on_target2 *root)
  655. {
  656. memset(&publish->curr, 0, sizeof(netdata_dcstat_pid_t));
  657. netdata_dcstat_pid_t *dst = &publish->curr;
  658. while (root) {
  659. netdata_dcstat_pid_t *src = &root->dc;
  660. dst->cache_access += src->cache_access;
  661. dst->file_system += src->file_system;
  662. dst->not_found += src->not_found;
  663. root = root->next;
  664. }
  665. }
  666. /**
  667. * Calc chart values
  668. *
  669. * Do necessary math to plot charts.
  670. */
  671. void ebpf_dc_calc_chart_values()
  672. {
  673. ebpf_cgroup_target_t *ect;
  674. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  675. ebpf_dc_sum_cgroup_pids(&ect->publish_dc, ect->pids);
  676. uint64_t cache = ect->publish_dc.curr.cache_access;
  677. uint64_t not_found = ect->publish_dc.curr.not_found;
  678. dcstat_update_publish(&ect->publish_dc, cache, not_found);
  679. ect->publish_dc.cache_access = (long long)ect->publish_dc.curr.cache_access -
  680. (long long)ect->publish_dc.prev.cache_access;
  681. ect->publish_dc.prev.cache_access = ect->publish_dc.curr.cache_access;
  682. if (ect->publish_dc.curr.not_found < ect->publish_dc.prev.not_found) {
  683. ect->publish_dc.prev.not_found = 0;
  684. }
  685. }
  686. }
  687. /**
  688. * Create Systemd directory cache Charts
  689. *
  690. * Create charts when systemd is enabled
  691. *
  692. * @param update_every value to overwrite the update frequency set by the server.
  693. **/
  694. static void ebpf_create_systemd_dc_charts(int update_every)
  695. {
  696. ebpf_create_charts_on_systemd(NETDATA_DC_HIT_CHART,
  697. "Percentage of files inside directory cache",
  698. EBPF_COMMON_DIMENSION_PERCENTAGE,
  699. NETDATA_DIRECTORY_CACHE_SUBMENU,
  700. NETDATA_EBPF_CHART_TYPE_LINE,
  701. 21200,
  702. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  703. NETDATA_SYSTEMD_DC_HIT_RATIO_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  704. update_every);
  705. ebpf_create_charts_on_systemd(NETDATA_DC_REFERENCE_CHART,
  706. "Count file access",
  707. EBPF_COMMON_DIMENSION_FILES,
  708. NETDATA_DIRECTORY_CACHE_SUBMENU,
  709. NETDATA_EBPF_CHART_TYPE_LINE,
  710. 21201,
  711. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  712. NETDATA_SYSTEMD_DC_REFERENCE_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  713. update_every);
  714. ebpf_create_charts_on_systemd(NETDATA_DC_REQUEST_NOT_CACHE_CHART,
  715. "Files not present inside directory cache",
  716. EBPF_COMMON_DIMENSION_FILES,
  717. NETDATA_DIRECTORY_CACHE_SUBMENU,
  718. NETDATA_EBPF_CHART_TYPE_LINE,
  719. 21202,
  720. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  721. NETDATA_SYSTEMD_DC_NOT_CACHE_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  722. update_every);
  723. ebpf_create_charts_on_systemd(NETDATA_DC_REQUEST_NOT_FOUND_CHART,
  724. "Files not found",
  725. EBPF_COMMON_DIMENSION_FILES,
  726. NETDATA_DIRECTORY_CACHE_SUBMENU,
  727. NETDATA_EBPF_CHART_TYPE_LINE,
  728. 21202,
  729. ebpf_algorithms[NETDATA_EBPF_ABSOLUTE_IDX],
  730. NETDATA_SYSTEMD_DC_NOT_FOUND_CONTEXT, NETDATA_EBPF_MODULE_NAME_DCSTAT,
  731. update_every);
  732. }
  733. /**
  734. * Send Directory Cache charts
  735. *
  736. * Send collected data to Netdata.
  737. */
  738. static void ebpf_send_systemd_dc_charts()
  739. {
  740. collected_number value;
  741. ebpf_cgroup_target_t *ect;
  742. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_HIT_CHART);
  743. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  744. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  745. write_chart_dimension(ect->name, (long long) ect->publish_dc.ratio);
  746. }
  747. }
  748. write_end_chart();
  749. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REFERENCE_CHART);
  750. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  751. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  752. write_chart_dimension(ect->name, (long long) ect->publish_dc.cache_access);
  753. }
  754. }
  755. write_end_chart();
  756. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  757. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  758. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  759. value = (collected_number) (!ect->publish_dc.cache_access) ? 0 :
  760. (long long )ect->publish_dc.curr.file_system - (long long)ect->publish_dc.prev.file_system;
  761. ect->publish_dc.prev.file_system = ect->publish_dc.curr.file_system;
  762. write_chart_dimension(ect->name, (long long) value);
  763. }
  764. }
  765. write_end_chart();
  766. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  767. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  768. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  769. value = (collected_number) (!ect->publish_dc.cache_access) ? 0 :
  770. (long long)ect->publish_dc.curr.not_found - (long long)ect->publish_dc.prev.not_found;
  771. ect->publish_dc.prev.not_found = ect->publish_dc.curr.not_found;
  772. write_chart_dimension(ect->name, (long long) value);
  773. }
  774. }
  775. write_end_chart();
  776. }
  777. /**
  778. * Send Directory Cache charts
  779. *
  780. * Send collected data to Netdata.
  781. *
  782. */
  783. static void ebpf_send_specific_dc_data(char *type, netdata_publish_dcstat_t *pdc)
  784. {
  785. collected_number value;
  786. write_begin_chart(type, NETDATA_DC_HIT_CHART);
  787. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_RATIO].name,
  788. (long long) pdc->ratio);
  789. write_end_chart();
  790. write_begin_chart(type, NETDATA_DC_REFERENCE_CHART);
  791. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE].name,
  792. (long long) pdc->cache_access);
  793. write_end_chart();
  794. value = (collected_number) (!pdc->cache_access) ? 0 :
  795. (long long )pdc->curr.file_system - (long long)pdc->prev.file_system;
  796. pdc->prev.file_system = pdc->curr.file_system;
  797. write_begin_chart(type, NETDATA_DC_REQUEST_NOT_CACHE_CHART);
  798. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_SLOW].name, (long long) value);
  799. write_end_chart();
  800. value = (collected_number) (!pdc->cache_access) ? 0 :
  801. (long long)pdc->curr.not_found - (long long)pdc->prev.not_found;
  802. pdc->prev.not_found = pdc->curr.not_found;
  803. write_begin_chart(type, NETDATA_DC_REQUEST_NOT_FOUND_CHART);
  804. write_chart_dimension(dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_MISS].name, (long long) value);
  805. write_end_chart();
  806. }
  807. /**
  808. * Send data to Netdata calling auxiliary functions.
  809. *
  810. * @param update_every value to overwrite the update frequency set by the server.
  811. */
  812. void ebpf_dc_send_cgroup_data(int update_every)
  813. {
  814. if (!ebpf_cgroup_pids)
  815. return;
  816. pthread_mutex_lock(&mutex_cgroup_shm);
  817. ebpf_cgroup_target_t *ect;
  818. ebpf_dc_calc_chart_values();
  819. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  820. if (has_systemd) {
  821. if (send_cgroup_chart) {
  822. ebpf_create_systemd_dc_charts(update_every);
  823. }
  824. ebpf_send_systemd_dc_charts();
  825. }
  826. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  827. if (ect->systemd)
  828. continue;
  829. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_DC_CHART) && ect->updated) {
  830. ebpf_create_specific_dc_charts(ect->name, update_every);
  831. ect->flags |= NETDATA_EBPF_CGROUP_HAS_DC_CHART;
  832. }
  833. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_DC_CHART) {
  834. if (ect->updated) {
  835. ebpf_send_specific_dc_data(ect->name, &ect->publish_dc);
  836. } else {
  837. ebpf_obsolete_specific_dc_charts(ect->name, update_every);
  838. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_DC_CHART;
  839. }
  840. }
  841. }
  842. pthread_mutex_unlock(&mutex_cgroup_shm);
  843. }
  844. /**
  845. * Main loop for this collector.
  846. */
  847. static void dcstat_collector(ebpf_module_t *em)
  848. {
  849. netdata_publish_dcstat_t publish;
  850. memset(&publish, 0, sizeof(publish));
  851. int cgroups = em->cgroup_charts;
  852. int update_every = em->update_every;
  853. heartbeat_t hb;
  854. heartbeat_init(&hb);
  855. int counter = update_every - 1;
  856. int maps_per_core = em->maps_per_core;
  857. while (!ebpf_exit_plugin) {
  858. (void)heartbeat_next(&hb, USEC_PER_SEC);
  859. if (ebpf_exit_plugin || ++counter != update_every)
  860. continue;
  861. counter = 0;
  862. netdata_apps_integration_flags_t apps = em->apps_charts;
  863. ebpf_dc_read_global_table(maps_per_core);
  864. pthread_mutex_lock(&collect_data_mutex);
  865. if (apps)
  866. read_dc_apps_table(maps_per_core);
  867. if (cgroups)
  868. ebpf_update_dc_cgroup(maps_per_core);
  869. pthread_mutex_lock(&lock);
  870. dcstat_send_global(&publish);
  871. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  872. ebpf_dcache_send_apps_data(apps_groups_root_target);
  873. #ifdef NETDATA_DEV_MODE
  874. if (ebpf_aral_dcstat_pid)
  875. ebpf_send_data_aral_chart(ebpf_aral_dcstat_pid, em);
  876. #endif
  877. if (cgroups)
  878. ebpf_dc_send_cgroup_data(update_every);
  879. pthread_mutex_unlock(&lock);
  880. pthread_mutex_unlock(&collect_data_mutex);
  881. }
  882. }
  883. /*****************************************************************
  884. *
  885. * INITIALIZE THREAD
  886. *
  887. *****************************************************************/
  888. /**
  889. * Create filesystem charts
  890. *
  891. * Call ebpf_create_chart to create the charts for the collector.
  892. *
  893. * @param update_every value to overwrite the update frequency set by the server.
  894. */
  895. static void ebpf_create_filesystem_charts(int update_every)
  896. {
  897. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_HIT_CHART,
  898. "Percentage of files inside directory cache",
  899. EBPF_COMMON_DIMENSION_PERCENTAGE, NETDATA_DIRECTORY_CACHE_SUBMENU,
  900. NULL,
  901. NETDATA_EBPF_CHART_TYPE_LINE,
  902. 21200,
  903. ebpf_create_global_dimension,
  904. dcstat_counter_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  905. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY, NETDATA_DC_REFERENCE_CHART,
  906. "Variables used to calculate hit ratio.",
  907. EBPF_COMMON_DIMENSION_FILES, NETDATA_DIRECTORY_CACHE_SUBMENU,
  908. NULL,
  909. NETDATA_EBPF_CHART_TYPE_LINE,
  910. 21201,
  911. ebpf_create_global_dimension,
  912. &dcstat_counter_publish_aggregated[NETDATA_DCSTAT_IDX_REFERENCE], 3,
  913. update_every, NETDATA_EBPF_MODULE_NAME_DCSTAT);
  914. fflush(stdout);
  915. }
  916. /**
  917. * Allocate vectors used with this thread.
  918. *
  919. * We are not testing the return, because callocz does this and shutdown the software
  920. * case it was not possible to allocate.
  921. *
  922. * @param apps is apps enabled?
  923. */
  924. static void ebpf_dcstat_allocate_global_vectors(int apps)
  925. {
  926. if (apps) {
  927. ebpf_dcstat_aral_init();
  928. dcstat_pid = callocz((size_t)pid_max, sizeof(netdata_publish_dcstat_t *));
  929. dcstat_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_dcstat_pid_t));
  930. }
  931. dcstat_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  932. memset(dcstat_counter_aggregated_data, 0, NETDATA_DCSTAT_IDX_END * sizeof(netdata_syscall_stat_t));
  933. memset(dcstat_counter_publish_aggregated, 0, NETDATA_DCSTAT_IDX_END * sizeof(netdata_publish_syscall_t));
  934. }
  935. /*****************************************************************
  936. *
  937. * MAIN THREAD
  938. *
  939. *****************************************************************/
  940. /*
  941. * Load BPF
  942. *
  943. * Load BPF files.
  944. *
  945. * @param em the structure with configuration
  946. */
  947. static int ebpf_dcstat_load_bpf(ebpf_module_t *em)
  948. {
  949. #ifdef LIBBPF_MAJOR_VERSION
  950. ebpf_define_map_type(dcstat_maps, em->maps_per_core, running_on_kernel);
  951. #endif
  952. int ret = 0;
  953. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_DC_TARGET_LOOKUP_FAST].mode);
  954. if (em->load & EBPF_LOAD_LEGACY) {
  955. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  956. if (!em->probe_links) {
  957. ret = -1;
  958. }
  959. }
  960. #ifdef LIBBPF_MAJOR_VERSION
  961. else {
  962. dc_bpf_obj = dc_bpf__open();
  963. if (!dc_bpf_obj)
  964. ret = -1;
  965. else
  966. ret = ebpf_dc_load_and_attach(dc_bpf_obj, em);
  967. }
  968. #endif
  969. if (ret)
  970. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  971. return ret;
  972. }
  973. /**
  974. * Directory Cache thread
  975. *
  976. * Thread used to make dcstat thread
  977. *
  978. * @param ptr a pointer to `struct ebpf_module`
  979. *
  980. * @return It always returns NULL
  981. */
  982. void *ebpf_dcstat_thread(void *ptr)
  983. {
  984. netdata_thread_cleanup_push(ebpf_dcstat_exit, ptr);
  985. ebpf_module_t *em = (ebpf_module_t *)ptr;
  986. em->maps = dcstat_maps;
  987. ebpf_update_pid_table(&dcstat_maps[NETDATA_DCSTAT_PID_STATS], em);
  988. ebpf_update_names(dc_optional_name, em);
  989. #ifdef LIBBPF_MAJOR_VERSION
  990. ebpf_adjust_thread_load(em, default_btf);
  991. #endif
  992. if (ebpf_dcstat_load_bpf(em)) {
  993. goto enddcstat;
  994. }
  995. ebpf_dcstat_allocate_global_vectors(em->apps_charts);
  996. int algorithms[NETDATA_DCSTAT_IDX_END] = {
  997. NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX,
  998. NETDATA_EBPF_ABSOLUTE_IDX
  999. };
  1000. ebpf_global_labels(dcstat_counter_aggregated_data, dcstat_counter_publish_aggregated,
  1001. dcstat_counter_dimension_name, dcstat_counter_dimension_name,
  1002. algorithms, NETDATA_DCSTAT_IDX_END);
  1003. pthread_mutex_lock(&lock);
  1004. ebpf_create_filesystem_charts(em->update_every);
  1005. ebpf_update_stats(&plugin_statistics, em);
  1006. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps);
  1007. #ifdef NETDATA_DEV_MODE
  1008. if (ebpf_aral_dcstat_pid)
  1009. ebpf_statistic_create_aral_chart(NETDATA_EBPF_DCSTAT_ARAL_NAME, em);
  1010. #endif
  1011. pthread_mutex_unlock(&lock);
  1012. dcstat_collector(em);
  1013. enddcstat:
  1014. ebpf_update_disabled_plugin_stats(em);
  1015. netdata_thread_cleanup_pop(1);
  1016. return NULL;
  1017. }