ebpf_mount.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_mount.h"
  4. static ebpf_local_maps_t mount_maps[] = {{.name = "tbl_mount", .internal_input = NETDATA_MOUNT_END,
  5. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  6. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  7. #ifdef LIBBPF_MAJOR_VERSION
  8. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  9. #endif
  10. },
  11. {.name = NULL, .internal_input = 0, .user_input = 0,
  12. .type = NETDATA_EBPF_MAP_CONTROLLER,
  13. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  14. #ifdef LIBBPF_MAJOR_VERSION
  15. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  16. #endif
  17. }};
  18. static char *mount_dimension_name[NETDATA_EBPF_MOUNT_SYSCALL] = { "mount", "umount" };
  19. static netdata_syscall_stat_t mount_aggregated_data[NETDATA_EBPF_MOUNT_SYSCALL];
  20. static netdata_publish_syscall_t mount_publish_aggregated[NETDATA_EBPF_MOUNT_SYSCALL];
  21. struct config mount_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  22. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  23. .rwlock = AVL_LOCK_INITIALIZER } };
  24. static netdata_idx_t mount_hash_values[NETDATA_MOUNT_END];
  25. netdata_ebpf_targets_t mount_targets[] = { {.name = "mount", .mode = EBPF_LOAD_TRAMPOLINE},
  26. {.name = "umount", .mode = EBPF_LOAD_TRAMPOLINE},
  27. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  28. #ifdef LIBBPF_MAJOR_VERSION
  29. /*****************************************************************
  30. *
  31. * BTF FUNCTIONS
  32. *
  33. *****************************************************************/
  34. /*
  35. * Disable probe
  36. *
  37. * Disable all probes to use exclusively another method.
  38. *
  39. * @param obj is the main structure for bpf objects.
  40. */
  41. static inline void ebpf_mount_disable_probe(struct mount_bpf *obj)
  42. {
  43. bpf_program__set_autoload(obj->progs.netdata_mount_probe, false);
  44. bpf_program__set_autoload(obj->progs.netdata_umount_probe, false);
  45. bpf_program__set_autoload(obj->progs.netdata_mount_retprobe, false);
  46. bpf_program__set_autoload(obj->progs.netdata_umount_retprobe, false);
  47. }
  48. /*
  49. * Disable tracepoint
  50. *
  51. * Disable all tracepoints to use exclusively another method.
  52. *
  53. * @param obj is the main structure for bpf objects.
  54. */
  55. static inline void ebpf_mount_disable_tracepoint(struct mount_bpf *obj)
  56. {
  57. bpf_program__set_autoload(obj->progs.netdata_mount_exit, false);
  58. bpf_program__set_autoload(obj->progs.netdata_umount_exit, false);
  59. }
  60. /*
  61. * Disable trampoline
  62. *
  63. * Disable all trampoline to use exclusively another method.
  64. *
  65. * @param obj is the main structure for bpf objects.
  66. */
  67. static inline void ebpf_mount_disable_trampoline(struct mount_bpf *obj)
  68. {
  69. bpf_program__set_autoload(obj->progs.netdata_mount_fentry, false);
  70. bpf_program__set_autoload(obj->progs.netdata_umount_fentry, false);
  71. bpf_program__set_autoload(obj->progs.netdata_mount_fexit, false);
  72. bpf_program__set_autoload(obj->progs.netdata_umount_fexit, false);
  73. }
  74. /**
  75. * Set trampoline target
  76. *
  77. * Set the targets we will monitor.
  78. *
  79. * @param obj is the main structure for bpf objects.
  80. */
  81. static inline void netdata_set_trampoline_target(struct mount_bpf *obj)
  82. {
  83. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  84. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  85. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  86. bpf_program__set_attach_target(obj->progs.netdata_mount_fentry, 0,
  87. syscall);
  88. bpf_program__set_attach_target(obj->progs.netdata_mount_fexit, 0,
  89. syscall);
  90. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  91. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  92. bpf_program__set_attach_target(obj->progs.netdata_umount_fentry, 0,
  93. syscall);
  94. bpf_program__set_attach_target(obj->progs.netdata_umount_fexit, 0,
  95. syscall);
  96. }
  97. /**
  98. * Mount Attach Probe
  99. *
  100. * Attach probes to target
  101. *
  102. * @param obj is the main structure for bpf objects.
  103. *
  104. * @return It returns 0 on success and -1 otherwise.
  105. */
  106. static int ebpf_mount_attach_probe(struct mount_bpf *obj)
  107. {
  108. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  109. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  110. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  111. obj->links.netdata_mount_probe = bpf_program__attach_kprobe(obj->progs.netdata_mount_probe,
  112. false, syscall);
  113. int ret = (int)libbpf_get_error(obj->links.netdata_mount_probe);
  114. if (ret)
  115. return -1;
  116. obj->links.netdata_mount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_mount_retprobe,
  117. true, syscall);
  118. ret = (int)libbpf_get_error(obj->links.netdata_mount_retprobe);
  119. if (ret)
  120. return -1;
  121. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  122. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  123. obj->links.netdata_umount_probe = bpf_program__attach_kprobe(obj->progs.netdata_umount_probe,
  124. false, syscall);
  125. ret = (int)libbpf_get_error(obj->links.netdata_umount_probe);
  126. if (ret)
  127. return -1;
  128. obj->links.netdata_umount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_umount_retprobe,
  129. true, syscall);
  130. ret = (int)libbpf_get_error(obj->links.netdata_umount_retprobe);
  131. if (ret)
  132. return -1;
  133. return 0;
  134. }
  135. /**
  136. * Set hash tables
  137. *
  138. * Set the values for maps according the value given by kernel.
  139. *
  140. * @param obj is the main structure for bpf objects.
  141. */
  142. static void ebpf_mount_set_hash_tables(struct mount_bpf *obj)
  143. {
  144. mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_mount);
  145. }
  146. /**
  147. * Load and attach
  148. *
  149. * Load and attach the eBPF code in kernel.
  150. *
  151. * @param obj is the main structure for bpf objects.
  152. * @param em structure with configuration
  153. *
  154. * @return it returns 0 on success and -1 otherwise
  155. */
  156. static inline int ebpf_mount_load_and_attach(struct mount_bpf *obj, ebpf_module_t *em)
  157. {
  158. netdata_ebpf_targets_t *mt = em->targets;
  159. netdata_ebpf_program_loaded_t test = mt[NETDATA_MOUNT_SYSCALL].mode;
  160. // We are testing only one, because all will have the same behavior
  161. if (test == EBPF_LOAD_TRAMPOLINE ) {
  162. ebpf_mount_disable_probe(obj);
  163. ebpf_mount_disable_tracepoint(obj);
  164. netdata_set_trampoline_target(obj);
  165. } else if (test == EBPF_LOAD_PROBE ||
  166. test == EBPF_LOAD_RETPROBE ) {
  167. ebpf_mount_disable_tracepoint(obj);
  168. ebpf_mount_disable_trampoline(obj);
  169. } else {
  170. ebpf_mount_disable_probe(obj);
  171. ebpf_mount_disable_trampoline(obj);
  172. }
  173. ebpf_update_map_type(obj->maps.tbl_mount, &mount_maps[NETDATA_KEY_MOUNT_TABLE]);
  174. int ret = mount_bpf__load(obj);
  175. if (!ret) {
  176. if (test != EBPF_LOAD_PROBE && test != EBPF_LOAD_RETPROBE )
  177. ret = mount_bpf__attach(obj);
  178. else
  179. ret = ebpf_mount_attach_probe(obj);
  180. if (!ret)
  181. ebpf_mount_set_hash_tables(obj);
  182. }
  183. return ret;
  184. }
  185. #endif
  186. /*****************************************************************
  187. *
  188. * FUNCTIONS TO CLOSE THE THREAD
  189. *
  190. *****************************************************************/
  191. /**
  192. * Mount Exit
  193. *
  194. * Cancel child thread.
  195. *
  196. * @param ptr thread data.
  197. */
  198. static void ebpf_mount_exit(void *ptr)
  199. {
  200. ebpf_module_t *em = (ebpf_module_t *)ptr;
  201. #ifdef LIBBPF_MAJOR_VERSION
  202. if (mount_bpf_obj)
  203. mount_bpf__destroy(mount_bpf_obj);
  204. #endif
  205. if (em->objects)
  206. ebpf_unload_legacy_code(em->objects, em->probe_links);
  207. pthread_mutex_lock(&ebpf_exit_cleanup);
  208. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  209. pthread_mutex_unlock(&ebpf_exit_cleanup);
  210. }
  211. /*****************************************************************
  212. *
  213. * MAIN LOOP
  214. *
  215. *****************************************************************/
  216. /**
  217. * Read global table
  218. *
  219. * Read the table with number of calls for all functions
  220. *
  221. * @param maps_per_core do I need to read all cores?
  222. */
  223. static void ebpf_mount_read_global_table(int maps_per_core)
  224. {
  225. static netdata_idx_t *mount_values = NULL;
  226. if (!mount_values)
  227. mount_values = callocz((size_t)ebpf_nprocs + 1, sizeof(netdata_idx_t));
  228. uint32_t idx;
  229. netdata_idx_t *val = mount_hash_values;
  230. netdata_idx_t *stored = mount_values;
  231. size_t length = sizeof(netdata_idx_t);
  232. if (maps_per_core)
  233. length *= ebpf_nprocs;
  234. int fd = mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd;
  235. for (idx = NETDATA_KEY_MOUNT_CALL; idx < NETDATA_MOUNT_END; idx++) {
  236. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  237. int i;
  238. int end = (maps_per_core) ? ebpf_nprocs : 1;
  239. netdata_idx_t total = 0;
  240. for (i = 0; i < end; i++)
  241. total += stored[i];
  242. val[idx] = total;
  243. memset(stored, 0, length);
  244. }
  245. }
  246. }
  247. /**
  248. * Send data to Netdata calling auxiliary functions.
  249. */
  250. static void ebpf_mount_send_data()
  251. {
  252. int i, j;
  253. int end = NETDATA_EBPF_MOUNT_SYSCALL;
  254. for (i = NETDATA_KEY_MOUNT_CALL, j = NETDATA_KEY_MOUNT_ERROR; i < end; i++, j++) {
  255. mount_publish_aggregated[i].ncall = mount_hash_values[i];
  256. mount_publish_aggregated[i].nerr = mount_hash_values[j];
  257. }
  258. write_count_chart(NETDATA_EBPF_MOUNT_CALLS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  259. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  260. write_err_chart(NETDATA_EBPF_MOUNT_ERRORS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  261. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  262. }
  263. /**
  264. * Main loop for this collector.
  265. */
  266. static void mount_collector(ebpf_module_t *em)
  267. {
  268. memset(mount_hash_values, 0, sizeof(mount_hash_values));
  269. heartbeat_t hb;
  270. heartbeat_init(&hb);
  271. int update_every = em->update_every;
  272. int counter = update_every - 1;
  273. int maps_per_core = em->maps_per_core;
  274. while (!ebpf_exit_plugin) {
  275. (void)heartbeat_next(&hb, USEC_PER_SEC);
  276. if (ebpf_exit_plugin || ++counter != update_every)
  277. continue;
  278. counter = 0;
  279. ebpf_mount_read_global_table(maps_per_core);
  280. pthread_mutex_lock(&lock);
  281. ebpf_mount_send_data();
  282. pthread_mutex_unlock(&lock);
  283. }
  284. }
  285. /*****************************************************************
  286. *
  287. * INITIALIZE THREAD
  288. *
  289. *****************************************************************/
  290. /**
  291. * Create mount charts
  292. *
  293. * Call ebpf_create_chart to create the charts for the collector.
  294. *
  295. * @param update_every value to overwrite the update frequency set by the server.
  296. */
  297. static void ebpf_create_mount_charts(int update_every)
  298. {
  299. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_CALLS,
  300. "Calls to mount and umount syscalls",
  301. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  302. NULL,
  303. NETDATA_EBPF_CHART_TYPE_LINE,
  304. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS,
  305. ebpf_create_global_dimension,
  306. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  307. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  308. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_ERRORS,
  309. "Errors to mount and umount file systems",
  310. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  311. NULL,
  312. NETDATA_EBPF_CHART_TYPE_LINE,
  313. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS + 1,
  314. ebpf_create_global_dimension,
  315. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  316. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  317. fflush(stdout);
  318. }
  319. /*****************************************************************
  320. *
  321. * MAIN THREAD
  322. *
  323. *****************************************************************/
  324. /*
  325. * Load BPF
  326. *
  327. * Load BPF files.
  328. *
  329. * @param em the structure with configuration
  330. */
  331. static int ebpf_mount_load_bpf(ebpf_module_t *em)
  332. {
  333. #ifdef LIBBPF_MAJOR_VERSION
  334. ebpf_define_map_type(em->maps, em->maps_per_core, running_on_kernel);
  335. #endif
  336. int ret = 0;
  337. if (em->load & EBPF_LOAD_LEGACY) {
  338. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  339. if (!em->probe_links) {
  340. ret = -1;
  341. }
  342. }
  343. #ifdef LIBBPF_MAJOR_VERSION
  344. else {
  345. mount_bpf_obj = mount_bpf__open();
  346. if (!mount_bpf_obj)
  347. ret = -1;
  348. else
  349. ret = ebpf_mount_load_and_attach(mount_bpf_obj, em);
  350. }
  351. #endif
  352. if (ret)
  353. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  354. return ret;
  355. }
  356. /**
  357. * Mount thread
  358. *
  359. * Thread used to make mount thread
  360. *
  361. * @param ptr a pointer to `struct ebpf_module`
  362. *
  363. * @return It always returns NULL
  364. */
  365. void *ebpf_mount_thread(void *ptr)
  366. {
  367. netdata_thread_cleanup_push(ebpf_mount_exit, ptr);
  368. ebpf_module_t *em = (ebpf_module_t *)ptr;
  369. em->maps = mount_maps;
  370. #ifdef LIBBPF_MAJOR_VERSION
  371. ebpf_adjust_thread_load(em, default_btf);
  372. #endif
  373. if (ebpf_mount_load_bpf(em)) {
  374. goto endmount;
  375. }
  376. int algorithms[NETDATA_EBPF_MOUNT_SYSCALL] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  377. ebpf_global_labels(mount_aggregated_data, mount_publish_aggregated, mount_dimension_name, mount_dimension_name,
  378. algorithms, NETDATA_EBPF_MOUNT_SYSCALL);
  379. pthread_mutex_lock(&lock);
  380. ebpf_create_mount_charts(em->update_every);
  381. ebpf_update_stats(&plugin_statistics, em);
  382. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps);
  383. pthread_mutex_unlock(&lock);
  384. mount_collector(em);
  385. endmount:
  386. ebpf_update_disabled_plugin_stats(em);
  387. netdata_thread_cleanup_pop(1);
  388. return NULL;
  389. }