ebpf_socket.c 120 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include <sys/resource.h>
  3. #include "ebpf.h"
  4. #include "ebpf_socket.h"
  5. /*****************************************************************
  6. *
  7. * GLOBAL VARIABLES
  8. *
  9. *****************************************************************/
  10. static char *socket_dimension_names[NETDATA_MAX_SOCKET_VECTOR] = { "received", "sent", "close",
  11. "received", "sent", "retransmitted",
  12. "connected_V4", "connected_V6", "connected_tcp",
  13. "connected_udp"};
  14. static char *socket_id_names[NETDATA_MAX_SOCKET_VECTOR] = { "tcp_cleanup_rbuf", "tcp_sendmsg", "tcp_close",
  15. "udp_recvmsg", "udp_sendmsg", "tcp_retransmit_skb",
  16. "tcp_connect_v4", "tcp_connect_v6", "inet_csk_accept_tcp",
  17. "inet_csk_accept_udp" };
  18. static ebpf_local_maps_t socket_maps[] = {{.name = "tbl_global_sock",
  19. .internal_input = NETDATA_SOCKET_COUNTER,
  20. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  21. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  22. #ifdef LIBBPF_MAJOR_VERSION
  23. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  24. #endif
  25. },
  26. {.name = "tbl_lports",
  27. .internal_input = NETDATA_SOCKET_COUNTER,
  28. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  29. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  30. #ifdef LIBBPF_MAJOR_VERSION
  31. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  32. #endif
  33. },
  34. {.name = "tbl_nd_socket",
  35. .internal_input = NETDATA_COMPILED_CONNECTIONS_ALLOWED,
  36. .user_input = NETDATA_MAXIMUM_CONNECTIONS_ALLOWED,
  37. .type = NETDATA_EBPF_MAP_STATIC,
  38. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  39. #ifdef LIBBPF_MAJOR_VERSION
  40. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  41. #endif
  42. },
  43. {.name = "tbl_nv_udp",
  44. .internal_input = NETDATA_COMPILED_UDP_CONNECTIONS_ALLOWED,
  45. .user_input = NETDATA_MAXIMUM_UDP_CONNECTIONS_ALLOWED,
  46. .type = NETDATA_EBPF_MAP_STATIC,
  47. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  48. #ifdef LIBBPF_MAJOR_VERSION
  49. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  50. #endif
  51. },
  52. {.name = "socket_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  53. .user_input = 0,
  54. .type = NETDATA_EBPF_MAP_CONTROLLER,
  55. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  56. #ifdef LIBBPF_MAJOR_VERSION
  57. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  58. #endif
  59. },
  60. {.name = NULL, .internal_input = 0, .user_input = 0,
  61. #ifdef LIBBPF_MAJOR_VERSION
  62. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  63. #endif
  64. }};
  65. static netdata_idx_t *socket_hash_values = NULL;
  66. static netdata_syscall_stat_t socket_aggregated_data[NETDATA_MAX_SOCKET_VECTOR];
  67. static netdata_publish_syscall_t socket_publish_aggregated[NETDATA_MAX_SOCKET_VECTOR];
  68. netdata_socket_t *socket_values;
  69. ebpf_network_viewer_port_list_t *listen_ports = NULL;
  70. ebpf_addresses_t tcp_v6_connect_address = {.function = "tcp_v6_connect", .hash = 0, .addr = 0, .type = 0};
  71. struct config socket_config = { .first_section = NULL,
  72. .last_section = NULL,
  73. .mutex = NETDATA_MUTEX_INITIALIZER,
  74. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  75. .rwlock = AVL_LOCK_INITIALIZER } };
  76. netdata_ebpf_targets_t socket_targets[] = { {.name = "inet_csk_accept", .mode = EBPF_LOAD_PROBE},
  77. {.name = "tcp_retransmit_skb", .mode = EBPF_LOAD_PROBE},
  78. {.name = "tcp_cleanup_rbuf", .mode = EBPF_LOAD_PROBE},
  79. {.name = "tcp_close", .mode = EBPF_LOAD_PROBE},
  80. {.name = "udp_recvmsg", .mode = EBPF_LOAD_PROBE},
  81. {.name = "tcp_sendmsg", .mode = EBPF_LOAD_PROBE},
  82. {.name = "udp_sendmsg", .mode = EBPF_LOAD_PROBE},
  83. {.name = "tcp_v4_connect", .mode = EBPF_LOAD_PROBE},
  84. {.name = "tcp_v6_connect", .mode = EBPF_LOAD_PROBE},
  85. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  86. struct netdata_static_thread ebpf_read_socket = {
  87. .name = "EBPF_READ_SOCKET",
  88. .config_section = NULL,
  89. .config_name = NULL,
  90. .env_name = NULL,
  91. .enabled = 1,
  92. .thread = NULL,
  93. .init_routine = NULL,
  94. .start_routine = NULL
  95. };
  96. ARAL *aral_socket_table = NULL;
  97. #ifdef NETDATA_DEV_MODE
  98. int socket_disable_priority;
  99. #endif
  100. #ifdef LIBBPF_MAJOR_VERSION
  101. /**
  102. * Disable Probe
  103. *
  104. * Disable probes to use trampoline.
  105. *
  106. * @param obj is the main structure for bpf objects.
  107. */
  108. static void ebpf_socket_disable_probes(struct socket_bpf *obj)
  109. {
  110. bpf_program__set_autoload(obj->progs.netdata_inet_csk_accept_kretprobe, false);
  111. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_kprobe, false);
  112. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_kretprobe, false);
  113. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_kprobe, false);
  114. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_kretprobe, false);
  115. bpf_program__set_autoload(obj->progs.netdata_tcp_retransmit_skb_kprobe, false);
  116. bpf_program__set_autoload(obj->progs.netdata_tcp_cleanup_rbuf_kprobe, false);
  117. bpf_program__set_autoload(obj->progs.netdata_tcp_close_kprobe, false);
  118. bpf_program__set_autoload(obj->progs.netdata_udp_recvmsg_kprobe, false);
  119. bpf_program__set_autoload(obj->progs.netdata_udp_recvmsg_kretprobe, false);
  120. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_kretprobe, false);
  121. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_kprobe, false);
  122. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_kretprobe, false);
  123. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_kprobe, false);
  124. }
  125. /**
  126. * Disable Trampoline
  127. *
  128. * Disable trampoline to use probes.
  129. *
  130. * @param obj is the main structure for bpf objects.
  131. */
  132. static void ebpf_socket_disable_trampoline(struct socket_bpf *obj)
  133. {
  134. bpf_program__set_autoload(obj->progs.netdata_inet_csk_accept_fexit, false);
  135. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_fentry, false);
  136. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_fexit, false);
  137. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_fentry, false);
  138. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_fexit, false);
  139. bpf_program__set_autoload(obj->progs.netdata_tcp_retransmit_skb_fentry, false);
  140. bpf_program__set_autoload(obj->progs.netdata_tcp_cleanup_rbuf_fentry, false);
  141. bpf_program__set_autoload(obj->progs.netdata_tcp_close_fentry, false);
  142. bpf_program__set_autoload(obj->progs.netdata_udp_recvmsg_fentry, false);
  143. bpf_program__set_autoload(obj->progs.netdata_udp_recvmsg_fexit, false);
  144. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_fentry, false);
  145. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_fexit, false);
  146. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_fentry, false);
  147. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_fexit, false);
  148. }
  149. /**
  150. * Set trampoline target.
  151. *
  152. * @param obj is the main structure for bpf objects.
  153. */
  154. static void ebpf_set_trampoline_target(struct socket_bpf *obj)
  155. {
  156. bpf_program__set_attach_target(obj->progs.netdata_inet_csk_accept_fexit, 0,
  157. socket_targets[NETDATA_FCNT_INET_CSK_ACCEPT].name);
  158. bpf_program__set_attach_target(obj->progs.netdata_tcp_v4_connect_fentry, 0,
  159. socket_targets[NETDATA_FCNT_TCP_V4_CONNECT].name);
  160. bpf_program__set_attach_target(obj->progs.netdata_tcp_v4_connect_fexit, 0,
  161. socket_targets[NETDATA_FCNT_TCP_V4_CONNECT].name);
  162. if (tcp_v6_connect_address.type == 'T') {
  163. bpf_program__set_attach_target(
  164. obj->progs.netdata_tcp_v6_connect_fentry, 0, socket_targets[NETDATA_FCNT_TCP_V6_CONNECT].name);
  165. bpf_program__set_attach_target(obj->progs.netdata_tcp_v6_connect_fexit, 0,
  166. socket_targets[NETDATA_FCNT_TCP_V6_CONNECT].name);
  167. }
  168. bpf_program__set_attach_target(obj->progs.netdata_tcp_retransmit_skb_fentry, 0,
  169. socket_targets[NETDATA_FCNT_TCP_RETRANSMIT].name);
  170. bpf_program__set_attach_target(obj->progs.netdata_tcp_cleanup_rbuf_fentry, 0,
  171. socket_targets[NETDATA_FCNT_CLEANUP_RBUF].name);
  172. bpf_program__set_attach_target(obj->progs.netdata_tcp_close_fentry, 0,
  173. socket_targets[NETDATA_FCNT_TCP_CLOSE].name);
  174. bpf_program__set_attach_target(obj->progs.netdata_udp_recvmsg_fentry, 0,
  175. socket_targets[NETDATA_FCNT_UDP_RECEVMSG].name);
  176. bpf_program__set_attach_target(obj->progs.netdata_udp_recvmsg_fexit, 0,
  177. socket_targets[NETDATA_FCNT_UDP_RECEVMSG].name);
  178. bpf_program__set_attach_target(obj->progs.netdata_tcp_sendmsg_fentry, 0,
  179. socket_targets[NETDATA_FCNT_TCP_SENDMSG].name);
  180. bpf_program__set_attach_target(obj->progs.netdata_tcp_sendmsg_fexit, 0,
  181. socket_targets[NETDATA_FCNT_TCP_SENDMSG].name);
  182. bpf_program__set_attach_target(obj->progs.netdata_udp_sendmsg_fentry, 0,
  183. socket_targets[NETDATA_FCNT_UDP_SENDMSG].name);
  184. bpf_program__set_attach_target(obj->progs.netdata_udp_sendmsg_fexit, 0,
  185. socket_targets[NETDATA_FCNT_UDP_SENDMSG].name);
  186. }
  187. /**
  188. * Disable specific trampoline
  189. *
  190. * Disable specific trampoline to match user selection.
  191. *
  192. * @param obj is the main structure for bpf objects.
  193. * @param sel option selected by user.
  194. */
  195. static inline void ebpf_socket_disable_specific_trampoline(struct socket_bpf *obj, netdata_run_mode_t sel)
  196. {
  197. if (sel == MODE_RETURN) {
  198. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_fentry, false);
  199. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_fentry, false);
  200. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_fentry, false);
  201. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_fentry, false);
  202. } else {
  203. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_fexit, false);
  204. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_fexit, false);
  205. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_fexit, false);
  206. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_fexit, false);
  207. }
  208. }
  209. /**
  210. * Disable specific probe
  211. *
  212. * Disable specific probe to match user selection.
  213. *
  214. * @param obj is the main structure for bpf objects.
  215. * @param sel option selected by user.
  216. */
  217. static inline void ebpf_socket_disable_specific_probe(struct socket_bpf *obj, netdata_run_mode_t sel)
  218. {
  219. if (sel == MODE_RETURN) {
  220. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_kprobe, false);
  221. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_kprobe, false);
  222. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_kprobe, false);
  223. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_kprobe, false);
  224. } else {
  225. bpf_program__set_autoload(obj->progs.netdata_tcp_sendmsg_kretprobe, false);
  226. bpf_program__set_autoload(obj->progs.netdata_tcp_v4_connect_kretprobe, false);
  227. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_kretprobe, false);
  228. bpf_program__set_autoload(obj->progs.netdata_udp_sendmsg_kretprobe, false);
  229. }
  230. }
  231. /**
  232. * Attach probes
  233. *
  234. * Attach probes to targets.
  235. *
  236. * @param obj is the main structure for bpf objects.
  237. * @param sel option selected by user.
  238. */
  239. static long ebpf_socket_attach_probes(struct socket_bpf *obj, netdata_run_mode_t sel)
  240. {
  241. obj->links.netdata_inet_csk_accept_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_inet_csk_accept_kretprobe,
  242. true,
  243. socket_targets[NETDATA_FCNT_INET_CSK_ACCEPT].name);
  244. long ret = libbpf_get_error(obj->links.netdata_inet_csk_accept_kretprobe);
  245. if (ret)
  246. return -1;
  247. obj->links.netdata_tcp_retransmit_skb_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_retransmit_skb_kprobe,
  248. false,
  249. socket_targets[NETDATA_FCNT_TCP_RETRANSMIT].name);
  250. ret = libbpf_get_error(obj->links.netdata_tcp_retransmit_skb_kprobe);
  251. if (ret)
  252. return -1;
  253. obj->links.netdata_tcp_cleanup_rbuf_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_cleanup_rbuf_kprobe,
  254. false,
  255. socket_targets[NETDATA_FCNT_CLEANUP_RBUF].name);
  256. ret = libbpf_get_error(obj->links.netdata_tcp_cleanup_rbuf_kprobe);
  257. if (ret)
  258. return -1;
  259. obj->links.netdata_tcp_close_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_close_kprobe,
  260. false,
  261. socket_targets[NETDATA_FCNT_TCP_CLOSE].name);
  262. ret = libbpf_get_error(obj->links.netdata_tcp_close_kprobe);
  263. if (ret)
  264. return -1;
  265. obj->links.netdata_udp_recvmsg_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_udp_recvmsg_kprobe,
  266. false,
  267. socket_targets[NETDATA_FCNT_UDP_RECEVMSG].name);
  268. ret = libbpf_get_error(obj->links.netdata_udp_recvmsg_kprobe);
  269. if (ret)
  270. return -1;
  271. obj->links.netdata_udp_recvmsg_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_udp_recvmsg_kretprobe,
  272. true,
  273. socket_targets[NETDATA_FCNT_UDP_RECEVMSG].name);
  274. ret = libbpf_get_error(obj->links.netdata_udp_recvmsg_kretprobe);
  275. if (ret)
  276. return -1;
  277. if (sel == MODE_RETURN) {
  278. obj->links.netdata_tcp_sendmsg_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_sendmsg_kretprobe,
  279. true,
  280. socket_targets[NETDATA_FCNT_TCP_SENDMSG].name);
  281. ret = libbpf_get_error(obj->links.netdata_tcp_sendmsg_kretprobe);
  282. if (ret)
  283. return -1;
  284. obj->links.netdata_udp_sendmsg_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_udp_sendmsg_kretprobe,
  285. true,
  286. socket_targets[NETDATA_FCNT_UDP_SENDMSG].name);
  287. ret = libbpf_get_error(obj->links.netdata_udp_sendmsg_kretprobe);
  288. if (ret)
  289. return -1;
  290. obj->links.netdata_tcp_v4_connect_kretprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_v4_connect_kretprobe,
  291. true,
  292. socket_targets[NETDATA_FCNT_TCP_V4_CONNECT].name);
  293. ret = libbpf_get_error(obj->links.netdata_tcp_v4_connect_kretprobe);
  294. if (ret)
  295. return -1;
  296. if (tcp_v6_connect_address.type == 'T') {
  297. obj->links.netdata_tcp_v6_connect_kretprobe = bpf_program__attach_kprobe(
  298. obj->progs.netdata_tcp_v6_connect_kretprobe, true, socket_targets[NETDATA_FCNT_TCP_V6_CONNECT].name);
  299. ret = libbpf_get_error(obj->links.netdata_tcp_v6_connect_kretprobe);
  300. if (ret)
  301. return -1;
  302. }
  303. } else {
  304. obj->links.netdata_tcp_sendmsg_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_sendmsg_kprobe,
  305. false,
  306. socket_targets[NETDATA_FCNT_TCP_SENDMSG].name);
  307. ret = libbpf_get_error(obj->links.netdata_tcp_sendmsg_kprobe);
  308. if (ret)
  309. return -1;
  310. obj->links.netdata_udp_sendmsg_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_udp_sendmsg_kprobe,
  311. false,
  312. socket_targets[NETDATA_FCNT_UDP_SENDMSG].name);
  313. ret = libbpf_get_error(obj->links.netdata_udp_sendmsg_kprobe);
  314. if (ret)
  315. return -1;
  316. obj->links.netdata_tcp_v4_connect_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_v4_connect_kprobe,
  317. false,
  318. socket_targets[NETDATA_FCNT_TCP_V4_CONNECT].name);
  319. ret = libbpf_get_error(obj->links.netdata_tcp_v4_connect_kprobe);
  320. if (ret)
  321. return -1;
  322. if (tcp_v6_connect_address.type == 'T') {
  323. obj->links.netdata_tcp_v6_connect_kprobe = bpf_program__attach_kprobe(obj->progs.netdata_tcp_v6_connect_kprobe,
  324. false,
  325. socket_targets[NETDATA_FCNT_TCP_V6_CONNECT].name);
  326. ret = libbpf_get_error(obj->links.netdata_tcp_v6_connect_kprobe);
  327. if (ret)
  328. return -1;
  329. }
  330. }
  331. return 0;
  332. }
  333. /**
  334. * Set hash tables
  335. *
  336. * Set the values for maps according the value given by kernel.
  337. *
  338. * @param obj is the main structure for bpf objects.
  339. */
  340. static void ebpf_socket_set_hash_tables(struct socket_bpf *obj)
  341. {
  342. socket_maps[NETDATA_SOCKET_GLOBAL].map_fd = bpf_map__fd(obj->maps.tbl_global_sock);
  343. socket_maps[NETDATA_SOCKET_LPORTS].map_fd = bpf_map__fd(obj->maps.tbl_lports);
  344. socket_maps[NETDATA_SOCKET_OPEN_SOCKET].map_fd = bpf_map__fd(obj->maps.tbl_nd_socket);
  345. socket_maps[NETDATA_SOCKET_TABLE_UDP].map_fd = bpf_map__fd(obj->maps.tbl_nv_udp);
  346. socket_maps[NETDATA_SOCKET_TABLE_CTRL].map_fd = bpf_map__fd(obj->maps.socket_ctrl);
  347. }
  348. /**
  349. * Adjust Map Size
  350. *
  351. * Resize maps according input from users.
  352. *
  353. * @param obj is the main structure for bpf objects.
  354. * @param em structure with configuration
  355. */
  356. static void ebpf_socket_adjust_map(struct socket_bpf *obj, ebpf_module_t *em)
  357. {
  358. ebpf_update_map_size(obj->maps.tbl_nd_socket, &socket_maps[NETDATA_SOCKET_OPEN_SOCKET],
  359. em, bpf_map__name(obj->maps.tbl_nd_socket));
  360. ebpf_update_map_size(obj->maps.tbl_nv_udp, &socket_maps[NETDATA_SOCKET_TABLE_UDP],
  361. em, bpf_map__name(obj->maps.tbl_nv_udp));
  362. ebpf_update_map_type(obj->maps.tbl_nd_socket, &socket_maps[NETDATA_SOCKET_OPEN_SOCKET]);
  363. ebpf_update_map_type(obj->maps.tbl_nv_udp, &socket_maps[NETDATA_SOCKET_TABLE_UDP]);
  364. ebpf_update_map_type(obj->maps.socket_ctrl, &socket_maps[NETDATA_SOCKET_TABLE_CTRL]);
  365. ebpf_update_map_type(obj->maps.tbl_global_sock, &socket_maps[NETDATA_SOCKET_GLOBAL]);
  366. ebpf_update_map_type(obj->maps.tbl_lports, &socket_maps[NETDATA_SOCKET_LPORTS]);
  367. }
  368. /**
  369. * Disable TCP V6 connect
  370. */
  371. static void ebpf_disable_tcp_v6_connect(struct socket_bpf *obj)
  372. {
  373. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_kretprobe, false);
  374. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_kprobe, false);
  375. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_fexit, false);
  376. bpf_program__set_autoload(obj->progs.netdata_tcp_v6_connect_fentry, false);
  377. }
  378. /**
  379. * Load and attach
  380. *
  381. * Load and attach the eBPF code in kernel.
  382. *
  383. * @param obj is the main structure for bpf objects.
  384. * @param em structure with configuration
  385. *
  386. * @return it returns 0 on success and -1 otherwise
  387. */
  388. static inline int ebpf_socket_load_and_attach(struct socket_bpf *obj, ebpf_module_t *em)
  389. {
  390. netdata_ebpf_targets_t *mt = em->targets;
  391. netdata_ebpf_program_loaded_t test = mt[NETDATA_FCNT_INET_CSK_ACCEPT].mode;
  392. if (test == EBPF_LOAD_TRAMPOLINE) {
  393. ebpf_socket_disable_probes(obj);
  394. ebpf_set_trampoline_target(obj);
  395. ebpf_socket_disable_specific_trampoline(obj, em->mode);
  396. } else { // We are not using tracepoints for this thread.
  397. ebpf_socket_disable_trampoline(obj);
  398. ebpf_socket_disable_specific_probe(obj, em->mode);
  399. }
  400. ebpf_socket_adjust_map(obj, em);
  401. if (tcp_v6_connect_address.type != 'T') {
  402. ebpf_disable_tcp_v6_connect(obj);
  403. }
  404. int ret = socket_bpf__load(obj);
  405. if (ret) {
  406. fprintf(stderr, "failed to load BPF object: %d\n", ret);
  407. return ret;
  408. }
  409. if (test == EBPF_LOAD_TRAMPOLINE) {
  410. ret = socket_bpf__attach(obj);
  411. } else {
  412. ret = (int)ebpf_socket_attach_probes(obj, em->mode);
  413. }
  414. if (!ret) {
  415. ebpf_socket_set_hash_tables(obj);
  416. ebpf_update_controller(socket_maps[NETDATA_SOCKET_TABLE_CTRL].map_fd, em);
  417. }
  418. return ret;
  419. }
  420. #endif
  421. /*****************************************************************
  422. *
  423. * FUNCTIONS TO CLOSE THE THREAD
  424. *
  425. *****************************************************************/
  426. /**
  427. * Socket Free
  428. *
  429. * Cleanup variables after child threads to stop
  430. *
  431. * @param ptr thread data.
  432. */
  433. static void ebpf_socket_free(ebpf_module_t *em )
  434. {
  435. pthread_mutex_lock(&ebpf_exit_cleanup);
  436. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  437. ebpf_update_stats(&plugin_statistics, em);
  438. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_REMOVE);
  439. pthread_mutex_unlock(&ebpf_exit_cleanup);
  440. }
  441. /**
  442. * Obsolete Systemd Socket Charts
  443. *
  444. * Obsolete charts when systemd is enabled
  445. *
  446. * @param update_every value to overwrite the update frequency set by the server.
  447. **/
  448. static void ebpf_obsolete_systemd_socket_charts(int update_every)
  449. {
  450. int order = 20080;
  451. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  452. NETDATA_NET_APPS_CONNECTION_TCP_V4,
  453. "",
  454. "Calls to tcp_v4_connection",
  455. EBPF_COMMON_DIMENSION_CONNECTIONS,
  456. NETDATA_APPS_NET_GROUP,
  457. NETDATA_EBPF_CHART_TYPE_STACKED,
  458. NETDATA_SERVICES_SOCKET_TCP_V4_CONN_CONTEXT,
  459. order++,
  460. update_every);
  461. if (tcp_v6_connect_address.type == 'T') {
  462. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  463. NETDATA_NET_APPS_CONNECTION_TCP_V6,
  464. "",
  465. "Calls to tcp_v6_connection",
  466. EBPF_COMMON_DIMENSION_CONNECTIONS,
  467. NETDATA_APPS_NET_GROUP,
  468. NETDATA_EBPF_CHART_TYPE_STACKED,
  469. NETDATA_SERVICES_SOCKET_TCP_V6_CONN_CONTEXT,
  470. order++,
  471. update_every);
  472. }
  473. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  474. NETDATA_NET_APPS_BANDWIDTH_RECV,
  475. "",
  476. "Bytes received",
  477. EBPF_COMMON_DIMENSION_BITS,
  478. NETDATA_APPS_NET_GROUP,
  479. NETDATA_EBPF_CHART_TYPE_STACKED,
  480. NETDATA_SERVICES_SOCKET_BYTES_RECV_CONTEXT,
  481. order++,
  482. update_every);
  483. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  484. NETDATA_NET_APPS_BANDWIDTH_SENT,
  485. "",
  486. "Bytes sent",
  487. EBPF_COMMON_DIMENSION_BITS,
  488. NETDATA_APPS_NET_GROUP,
  489. NETDATA_EBPF_CHART_TYPE_STACKED,
  490. NETDATA_SERVICES_SOCKET_BYTES_SEND_CONTEXT,
  491. order++,
  492. update_every);
  493. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  494. NETDATA_NET_APPS_BANDWIDTH_TCP_RECV_CALLS,
  495. "",
  496. "Calls to tcp_cleanup_rbuf.",
  497. EBPF_COMMON_DIMENSION_CALL,
  498. NETDATA_APPS_NET_GROUP,
  499. NETDATA_EBPF_CHART_TYPE_STACKED,
  500. NETDATA_SERVICES_SOCKET_TCP_RECV_CONTEXT,
  501. order++,
  502. update_every);
  503. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  504. NETDATA_NET_APPS_BANDWIDTH_TCP_SEND_CALLS,
  505. "",
  506. "Calls to tcp_sendmsg.",
  507. EBPF_COMMON_DIMENSION_CALL,
  508. NETDATA_APPS_NET_GROUP,
  509. NETDATA_EBPF_CHART_TYPE_STACKED,
  510. NETDATA_SERVICES_SOCKET_TCP_SEND_CONTEXT,
  511. order++,
  512. update_every);
  513. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  514. NETDATA_NET_APPS_BANDWIDTH_TCP_RETRANSMIT,
  515. "",
  516. "Calls to tcp_retransmit",
  517. EBPF_COMMON_DIMENSION_CALL,
  518. NETDATA_APPS_NET_GROUP,
  519. NETDATA_EBPF_CHART_TYPE_STACKED,
  520. NETDATA_SERVICES_SOCKET_TCP_RETRANSMIT_CONTEXT,
  521. order++,
  522. update_every);
  523. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  524. NETDATA_NET_APPS_BANDWIDTH_UDP_SEND_CALLS,
  525. "",
  526. "Calls to udp_sendmsg",
  527. EBPF_COMMON_DIMENSION_CALL,
  528. NETDATA_APPS_NET_GROUP,
  529. NETDATA_EBPF_CHART_TYPE_STACKED,
  530. NETDATA_SERVICES_SOCKET_UDP_SEND_CONTEXT,
  531. order++,
  532. update_every);
  533. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  534. NETDATA_NET_APPS_BANDWIDTH_UDP_RECV_CALLS,
  535. "",
  536. "Calls to udp_recvmsg",
  537. EBPF_COMMON_DIMENSION_CALL,
  538. NETDATA_APPS_NET_GROUP,
  539. NETDATA_EBPF_CHART_TYPE_STACKED,
  540. NETDATA_SERVICES_SOCKET_UDP_RECV_CONTEXT,
  541. order++,
  542. update_every);
  543. }
  544. static void ebpf_obsolete_specific_socket_charts(char *type, int update_every);
  545. /**
  546. * Obsolete cgroup chart
  547. *
  548. * Send obsolete for all charts created before to close.
  549. *
  550. * @param em a pointer to `struct ebpf_module`
  551. */
  552. static inline void ebpf_obsolete_socket_cgroup_charts(ebpf_module_t *em) {
  553. pthread_mutex_lock(&mutex_cgroup_shm);
  554. ebpf_obsolete_systemd_socket_charts(em->update_every);
  555. ebpf_cgroup_target_t *ect;
  556. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  557. if (ect->systemd)
  558. continue;
  559. ebpf_obsolete_specific_socket_charts(ect->name, em->update_every);
  560. }
  561. pthread_mutex_unlock(&mutex_cgroup_shm);
  562. }
  563. /**
  564. * Create apps charts
  565. *
  566. * Call ebpf_create_chart to create the charts on apps submenu.
  567. *
  568. * @param em a pointer to the structure with the default values.
  569. */
  570. void ebpf_socket_obsolete_apps_charts(struct ebpf_module *em)
  571. {
  572. int order = 20130;
  573. struct ebpf_target *w;
  574. int update_every = em->update_every;
  575. for (w = apps_groups_root_target; w; w = w->next) {
  576. if (unlikely(!(w->charts_created & (1<<EBPF_MODULE_SOCKET_IDX))))
  577. continue;
  578. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  579. w->clean_name,
  580. "_ebpf_call_tcp_v4_connection",
  581. "Calls to tcp_v4_connection.",
  582. EBPF_COMMON_DIMENSION_CONNECTIONS,
  583. NETDATA_APPS_NET_GROUP,
  584. NETDATA_EBPF_CHART_TYPE_STACKED,
  585. "app.ebpf_call_tcp_v4_connection",
  586. order++,
  587. update_every);
  588. if (tcp_v6_connect_address.type == 'T') {
  589. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  590. w->clean_name,
  591. "_ebpf_call_tcp_v6_connection",
  592. "Calls to tcp_v6_connection.",
  593. EBPF_COMMON_DIMENSION_CONNECTIONS,
  594. NETDATA_APPS_NET_GROUP,
  595. NETDATA_EBPF_CHART_TYPE_STACKED,
  596. "app.ebpf_call_tcp_v6_connection",
  597. order++,
  598. update_every);
  599. }
  600. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  601. w->clean_name,
  602. "_ebpf_sock_bytes_sent",
  603. "Bytes sent.",
  604. EBPF_COMMON_DIMENSION_BITS,
  605. NETDATA_APPS_NET_GROUP,
  606. NETDATA_EBPF_CHART_TYPE_STACKED,
  607. "app.ebpf_sock_bytes_sent",
  608. order++,
  609. update_every);
  610. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  611. w->clean_name,
  612. "_ebpf_sock_bytes_received",
  613. "Bytes received.",
  614. EBPF_COMMON_DIMENSION_BITS,
  615. NETDATA_APPS_NET_GROUP,
  616. NETDATA_EBPF_CHART_TYPE_STACKED,
  617. "app.ebpf_sock_bytes_received",
  618. order++,
  619. update_every);
  620. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  621. w->clean_name,
  622. "_ebpf_call_tcp_sendmsg",
  623. "Calls to tcp_sendmsg.",
  624. EBPF_COMMON_DIMENSION_CALL,
  625. NETDATA_APPS_NET_GROUP,
  626. NETDATA_EBPF_CHART_TYPE_STACKED,
  627. "app.ebpf_call_tcp_sendmsg",
  628. order++,
  629. update_every);
  630. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  631. w->clean_name,
  632. "_ebpf_call_tcp_cleanup_rbuf",
  633. "Calls to tcp_cleanup_rbuf.",
  634. EBPF_COMMON_DIMENSION_CALL,
  635. NETDATA_APPS_NET_GROUP,
  636. NETDATA_EBPF_CHART_TYPE_STACKED,
  637. "app.ebpf_call_tcp_cleanup_rbuf",
  638. order++,
  639. update_every);
  640. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  641. w->clean_name,
  642. "_ebpf_call_tcp_retransmit",
  643. "Calls to tcp_retransmit.",
  644. EBPF_COMMON_DIMENSION_CALL,
  645. NETDATA_APPS_NET_GROUP,
  646. NETDATA_EBPF_CHART_TYPE_STACKED,
  647. "app.ebpf_call_tcp_retransmit",
  648. order++,
  649. update_every);
  650. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  651. w->clean_name,
  652. "_ebpf_call_udp_sendmsg",
  653. "Calls to udp_sendmsg.",
  654. EBPF_COMMON_DIMENSION_CALL,
  655. NETDATA_APPS_NET_GROUP,
  656. NETDATA_EBPF_CHART_TYPE_STACKED,
  657. "app.ebpf_call_udp_sendmsg",
  658. order++,
  659. update_every);
  660. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  661. w->clean_name,
  662. "_ebpf_call_udp_recvmsg",
  663. "Calls to udp_recvmsg.",
  664. EBPF_COMMON_DIMENSION_CALL,
  665. NETDATA_APPS_NET_GROUP,
  666. NETDATA_EBPF_CHART_TYPE_STACKED,
  667. "app.ebpf_call_udp_recvmsg",
  668. order++,
  669. update_every);
  670. w->charts_created &= ~(1<<EBPF_MODULE_SOCKET_IDX);
  671. }
  672. }
  673. /**
  674. * Obsolete global charts
  675. *
  676. * Obsolete charts created.
  677. *
  678. * @param em a pointer to the structure with the default values.
  679. */
  680. static void ebpf_socket_obsolete_global_charts(ebpf_module_t *em)
  681. {
  682. int order = 21070;
  683. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  684. NETDATA_INBOUND_CONNECTIONS,
  685. "",
  686. "Inbound connections.",
  687. EBPF_COMMON_DIMENSION_CONNECTIONS,
  688. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  689. NETDATA_EBPF_CHART_TYPE_LINE,
  690. NULL,
  691. order++,
  692. em->update_every);
  693. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  694. NETDATA_TCP_OUTBOUND_CONNECTIONS,
  695. "",
  696. "TCP outbound connections.",
  697. EBPF_COMMON_DIMENSION_CONNECTIONS,
  698. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  699. NETDATA_EBPF_CHART_TYPE_LINE,
  700. NULL,
  701. order++,
  702. em->update_every);
  703. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  704. NETDATA_TCP_FUNCTION_COUNT,
  705. "",
  706. "Calls to internal functions",
  707. EBPF_COMMON_DIMENSION_CALL,
  708. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  709. NETDATA_EBPF_CHART_TYPE_LINE,
  710. NULL,
  711. order++,
  712. em->update_every);
  713. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  714. NETDATA_TCP_FUNCTION_BITS,
  715. "",
  716. "TCP bandwidth",
  717. EBPF_COMMON_DIMENSION_BITS,
  718. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  719. NETDATA_EBPF_CHART_TYPE_LINE,
  720. NULL,
  721. order++,
  722. em->update_every);
  723. if (em->mode < MODE_ENTRY) {
  724. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  725. NETDATA_TCP_FUNCTION_ERROR,
  726. "",
  727. "TCP errors",
  728. EBPF_COMMON_DIMENSION_CALL,
  729. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  730. NETDATA_EBPF_CHART_TYPE_LINE,
  731. NULL,
  732. order++,
  733. em->update_every);
  734. }
  735. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  736. NETDATA_TCP_RETRANSMIT,
  737. "",
  738. "Packages retransmitted",
  739. EBPF_COMMON_DIMENSION_CALL,
  740. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  741. NETDATA_EBPF_CHART_TYPE_LINE,
  742. NULL,
  743. order++,
  744. em->update_every);
  745. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  746. NETDATA_UDP_FUNCTION_COUNT,
  747. "",
  748. "UDP calls",
  749. EBPF_COMMON_DIMENSION_CALL,
  750. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  751. NETDATA_EBPF_CHART_TYPE_LINE,
  752. NULL,
  753. order++,
  754. em->update_every);
  755. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  756. NETDATA_UDP_FUNCTION_BITS,
  757. "",
  758. "UDP bandwidth",
  759. EBPF_COMMON_DIMENSION_BITS,
  760. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  761. NETDATA_EBPF_CHART_TYPE_LINE,
  762. NULL,
  763. order++,
  764. em->update_every);
  765. if (em->mode < MODE_ENTRY) {
  766. ebpf_write_chart_obsolete(NETDATA_EBPF_IP_FAMILY,
  767. NETDATA_UDP_FUNCTION_ERROR,
  768. "",
  769. "UDP errors",
  770. EBPF_COMMON_DIMENSION_CALL,
  771. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  772. NETDATA_EBPF_CHART_TYPE_LINE,
  773. NULL,
  774. order++,
  775. em->update_every);
  776. }
  777. fflush(stdout);
  778. }
  779. /**
  780. * Socket exit
  781. *
  782. * Clean up the main thread.
  783. *
  784. * @param ptr thread data.
  785. */
  786. static void ebpf_socket_exit(void *ptr)
  787. {
  788. ebpf_module_t *em = (ebpf_module_t *)ptr;
  789. if (ebpf_read_socket.thread)
  790. netdata_thread_cancel(*ebpf_read_socket.thread);
  791. if (em->enabled == NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
  792. pthread_mutex_lock(&lock);
  793. if (em->cgroup_charts) {
  794. ebpf_obsolete_socket_cgroup_charts(em);
  795. fflush(stdout);
  796. }
  797. if (em->apps_charts & NETDATA_EBPF_APPS_FLAG_CHART_CREATED) {
  798. ebpf_socket_obsolete_apps_charts(em);
  799. fflush(stdout);
  800. }
  801. ebpf_socket_obsolete_global_charts(em);
  802. #ifdef NETDATA_DEV_MODE
  803. if (ebpf_aral_socket_pid)
  804. ebpf_statistic_obsolete_aral_chart(em, socket_disable_priority);
  805. #endif
  806. pthread_mutex_unlock(&lock);
  807. }
  808. ebpf_socket_free(em);
  809. }
  810. /*****************************************************************
  811. *
  812. * PROCESS DATA AND SEND TO NETDATA
  813. *
  814. *****************************************************************/
  815. /**
  816. * Update publish structure before to send data to Netdata.
  817. *
  818. * @param publish the first output structure with independent dimensions
  819. * @param tcp structure to store IO from tcp sockets
  820. * @param udp structure to store IO from udp sockets
  821. * @param input the structure with the input data.
  822. */
  823. static void ebpf_update_global_publish(
  824. netdata_publish_syscall_t *publish, netdata_publish_vfs_common_t *tcp, netdata_publish_vfs_common_t *udp,
  825. netdata_syscall_stat_t *input)
  826. {
  827. netdata_publish_syscall_t *move = publish;
  828. while (move) {
  829. if (input->call != move->pcall) {
  830. // This condition happens to avoid initial values with dimensions higher than normal values.
  831. if (move->pcall) {
  832. move->ncall = (input->call > move->pcall) ? input->call - move->pcall : move->pcall - input->call;
  833. move->nbyte = (input->bytes > move->pbyte) ? input->bytes - move->pbyte : move->pbyte - input->bytes;
  834. move->nerr = (input->ecall > move->nerr) ? input->ecall - move->perr : move->perr - input->ecall;
  835. } else {
  836. move->ncall = 0;
  837. move->nbyte = 0;
  838. move->nerr = 0;
  839. }
  840. move->pcall = input->call;
  841. move->pbyte = input->bytes;
  842. move->perr = input->ecall;
  843. } else {
  844. move->ncall = 0;
  845. move->nbyte = 0;
  846. move->nerr = 0;
  847. }
  848. input = input->next;
  849. move = move->next;
  850. }
  851. tcp->write = -(long)publish[0].nbyte;
  852. tcp->read = (long)publish[1].nbyte;
  853. udp->write = -(long)publish[3].nbyte;
  854. udp->read = (long)publish[4].nbyte;
  855. }
  856. /**
  857. * Send Global Inbound connection
  858. *
  859. * Send number of connections read per protocol.
  860. */
  861. static void ebpf_socket_send_global_inbound_conn()
  862. {
  863. uint64_t udp_conn = 0;
  864. uint64_t tcp_conn = 0;
  865. ebpf_network_viewer_port_list_t *move = listen_ports;
  866. while (move) {
  867. if (move->protocol == IPPROTO_TCP)
  868. tcp_conn += move->connections;
  869. else
  870. udp_conn += move->connections;
  871. move = move->next;
  872. }
  873. ebpf_write_begin_chart(NETDATA_EBPF_IP_FAMILY, NETDATA_INBOUND_CONNECTIONS, "");
  874. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_INCOMING_CONNECTION_TCP].name, (long long) tcp_conn);
  875. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_INCOMING_CONNECTION_UDP].name, (long long) udp_conn);
  876. ebpf_write_end_chart();
  877. }
  878. /**
  879. * Send data to Netdata calling auxiliary functions.
  880. *
  881. * @param em the structure with thread information
  882. */
  883. static void ebpf_socket_send_data(ebpf_module_t *em)
  884. {
  885. netdata_publish_vfs_common_t common_tcp;
  886. netdata_publish_vfs_common_t common_udp;
  887. ebpf_update_global_publish(socket_publish_aggregated, &common_tcp, &common_udp, socket_aggregated_data);
  888. ebpf_socket_send_global_inbound_conn();
  889. write_count_chart(NETDATA_TCP_OUTBOUND_CONNECTIONS, NETDATA_EBPF_IP_FAMILY,
  890. &socket_publish_aggregated[NETDATA_IDX_TCP_CONNECTION_V4], 2);
  891. // We read bytes from function arguments, but bandwidth is given in bits,
  892. // so we need to multiply by 8 to convert for the final value.
  893. write_count_chart(NETDATA_TCP_FUNCTION_COUNT, NETDATA_EBPF_IP_FAMILY, socket_publish_aggregated, 3);
  894. write_io_chart(NETDATA_TCP_FUNCTION_BITS, NETDATA_EBPF_IP_FAMILY, socket_id_names[0],
  895. common_tcp.read * 8/BITS_IN_A_KILOBIT, socket_id_names[1],
  896. common_tcp.write * 8/BITS_IN_A_KILOBIT);
  897. if (em->mode < MODE_ENTRY) {
  898. write_err_chart(NETDATA_TCP_FUNCTION_ERROR, NETDATA_EBPF_IP_FAMILY, socket_publish_aggregated, 2);
  899. }
  900. write_count_chart(NETDATA_TCP_RETRANSMIT, NETDATA_EBPF_IP_FAMILY,
  901. &socket_publish_aggregated[NETDATA_IDX_TCP_RETRANSMIT],1);
  902. write_count_chart(NETDATA_UDP_FUNCTION_COUNT, NETDATA_EBPF_IP_FAMILY,
  903. &socket_publish_aggregated[NETDATA_IDX_UDP_RECVBUF],2);
  904. write_io_chart(NETDATA_UDP_FUNCTION_BITS, NETDATA_EBPF_IP_FAMILY,
  905. socket_id_names[3], (long long)common_udp.read * 8/BITS_IN_A_KILOBIT,
  906. socket_id_names[4], (long long)common_udp.write * 8/BITS_IN_A_KILOBIT);
  907. if (em->mode < MODE_ENTRY) {
  908. write_err_chart(NETDATA_UDP_FUNCTION_ERROR, NETDATA_EBPF_IP_FAMILY,
  909. &socket_publish_aggregated[NETDATA_UDP_START], 2);
  910. }
  911. }
  912. /**
  913. * Send data to Netdata calling auxiliary functions.
  914. *
  915. * @param em the structure with thread information
  916. * @param root the target list.
  917. */
  918. void ebpf_socket_send_apps_data(ebpf_module_t *em, struct ebpf_target *root)
  919. {
  920. UNUSED(em);
  921. struct ebpf_target *w;
  922. // This algorithm is improved in https://github.com/netdata/netdata/pull/16030
  923. collected_number values[9];
  924. for (w = root; w; w = w->next) {
  925. if (unlikely(!(w->charts_created & (1<<EBPF_MODULE_SOCKET_IDX))))
  926. continue;
  927. struct ebpf_pid_on_target *move = w->root_pid;
  928. // Simplify algorithm, but others will appear only in https://github.com/netdata/netdata/pull/16030
  929. memset(values, 0, sizeof(values));
  930. while (move) {
  931. int32_t pid = move->pid;
  932. ebpf_socket_publish_apps_t *ws = socket_bandwidth_curr[pid];
  933. if (ws) {
  934. values[0] += (collected_number) ws->call_tcp_v4_connection;
  935. values[1] += (collected_number) ws->call_tcp_v6_connection;
  936. values[2] += (collected_number) ws->bytes_sent;
  937. values[3] += (collected_number) ws->bytes_received;
  938. values[4] += (collected_number) ws->call_tcp_sent;
  939. values[5] += (collected_number) ws->call_tcp_received;
  940. values[6] += (collected_number) ws->retransmit;
  941. values[7] += (collected_number) ws->call_udp_sent;
  942. values[8] += (collected_number) ws->call_udp_received;
  943. }
  944. move = move->next;
  945. }
  946. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_tcp_v4_connection");
  947. write_chart_dimension("connections", values[0]);
  948. ebpf_write_end_chart();
  949. if (tcp_v6_connect_address.type == 'T') {
  950. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_call_tcp_v6_connection");
  951. write_chart_dimension("calls", values[1]);
  952. ebpf_write_end_chart();
  953. }
  954. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_sock_bytes_sent");
  955. // We multiply by 0.008, because we read bytes, but we display bits
  956. write_chart_dimension("bandwidth", ((values[2])*8)/1000);
  957. ebpf_write_end_chart();
  958. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_sock_bytes_received");
  959. // We multiply by 0.008, because we read bytes, but we display bits
  960. write_chart_dimension("bandwidth", ((values[3])*8)/1000);
  961. ebpf_write_end_chart();
  962. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_tcp_sendmsg");
  963. write_chart_dimension("calls", values[4]);
  964. ebpf_write_end_chart();
  965. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_tcp_cleanup_rbuf");
  966. write_chart_dimension("calls", values[5]);
  967. ebpf_write_end_chart();
  968. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_tcp_retransmit");
  969. write_chart_dimension("calls", values[6]);
  970. ebpf_write_end_chart();
  971. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_udp_sendmsg");
  972. write_chart_dimension("calls", values[7]);
  973. ebpf_write_end_chart();
  974. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_udp_recvmsg");
  975. write_chart_dimension("calls", values[8]);
  976. ebpf_write_end_chart();
  977. }
  978. }
  979. /*****************************************************************
  980. *
  981. * FUNCTIONS TO CREATE CHARTS
  982. *
  983. *****************************************************************/
  984. /**
  985. * Create global charts
  986. *
  987. * Call ebpf_create_chart to create the charts for the collector.
  988. *
  989. * @param em a pointer to the structure with the default values.
  990. */
  991. static void ebpf_socket_create_global_charts(ebpf_module_t *em)
  992. {
  993. int order = 21070;
  994. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  995. NETDATA_INBOUND_CONNECTIONS,
  996. "Inbound connections.",
  997. EBPF_COMMON_DIMENSION_CONNECTIONS,
  998. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  999. NULL,
  1000. NETDATA_EBPF_CHART_TYPE_LINE,
  1001. order++,
  1002. ebpf_create_global_dimension,
  1003. &socket_publish_aggregated[NETDATA_IDX_INCOMING_CONNECTION_TCP],
  1004. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1005. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  1006. NETDATA_TCP_OUTBOUND_CONNECTIONS,
  1007. "TCP outbound connections.",
  1008. EBPF_COMMON_DIMENSION_CONNECTIONS,
  1009. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1010. NULL,
  1011. NETDATA_EBPF_CHART_TYPE_LINE,
  1012. order++,
  1013. ebpf_create_global_dimension,
  1014. &socket_publish_aggregated[NETDATA_IDX_TCP_CONNECTION_V4],
  1015. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1016. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  1017. NETDATA_TCP_FUNCTION_COUNT,
  1018. "Calls to internal functions",
  1019. EBPF_COMMON_DIMENSION_CALL,
  1020. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1021. NULL,
  1022. NETDATA_EBPF_CHART_TYPE_LINE,
  1023. order++,
  1024. ebpf_create_global_dimension,
  1025. socket_publish_aggregated,
  1026. 3, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1027. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY, NETDATA_TCP_FUNCTION_BITS,
  1028. "TCP bandwidth", EBPF_COMMON_DIMENSION_BITS,
  1029. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1030. NULL,
  1031. NETDATA_EBPF_CHART_TYPE_LINE,
  1032. order++,
  1033. ebpf_create_global_dimension,
  1034. socket_publish_aggregated,
  1035. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1036. if (em->mode < MODE_ENTRY) {
  1037. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  1038. NETDATA_TCP_FUNCTION_ERROR,
  1039. "TCP errors",
  1040. EBPF_COMMON_DIMENSION_CALL,
  1041. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1042. NULL,
  1043. NETDATA_EBPF_CHART_TYPE_LINE,
  1044. order++,
  1045. ebpf_create_global_dimension,
  1046. socket_publish_aggregated,
  1047. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1048. }
  1049. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  1050. NETDATA_TCP_RETRANSMIT,
  1051. "Packages retransmitted",
  1052. EBPF_COMMON_DIMENSION_CALL,
  1053. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1054. NULL,
  1055. NETDATA_EBPF_CHART_TYPE_LINE,
  1056. order++,
  1057. ebpf_create_global_dimension,
  1058. &socket_publish_aggregated[NETDATA_IDX_TCP_RETRANSMIT],
  1059. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1060. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  1061. NETDATA_UDP_FUNCTION_COUNT,
  1062. "UDP calls",
  1063. EBPF_COMMON_DIMENSION_CALL,
  1064. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1065. NULL,
  1066. NETDATA_EBPF_CHART_TYPE_LINE,
  1067. order++,
  1068. ebpf_create_global_dimension,
  1069. &socket_publish_aggregated[NETDATA_IDX_UDP_RECVBUF],
  1070. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1071. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY, NETDATA_UDP_FUNCTION_BITS,
  1072. "UDP bandwidth", EBPF_COMMON_DIMENSION_BITS,
  1073. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1074. NULL,
  1075. NETDATA_EBPF_CHART_TYPE_LINE,
  1076. order++,
  1077. ebpf_create_global_dimension,
  1078. &socket_publish_aggregated[NETDATA_IDX_UDP_RECVBUF],
  1079. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1080. if (em->mode < MODE_ENTRY) {
  1081. ebpf_create_chart(NETDATA_EBPF_IP_FAMILY,
  1082. NETDATA_UDP_FUNCTION_ERROR,
  1083. "UDP errors",
  1084. EBPF_COMMON_DIMENSION_CALL,
  1085. NETDATA_SOCKET_KERNEL_FUNCTIONS,
  1086. NULL,
  1087. NETDATA_EBPF_CHART_TYPE_LINE,
  1088. order++,
  1089. ebpf_create_global_dimension,
  1090. &socket_publish_aggregated[NETDATA_IDX_UDP_RECVBUF],
  1091. 2, em->update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1092. }
  1093. fflush(stdout);
  1094. }
  1095. /**
  1096. * Create apps charts
  1097. *
  1098. * Call ebpf_create_chart to create the charts on apps submenu.
  1099. *
  1100. * @param em a pointer to the structure with the default values.
  1101. * @param ptr a pointer for targets
  1102. */
  1103. void ebpf_socket_create_apps_charts(struct ebpf_module *em, void *ptr)
  1104. {
  1105. struct ebpf_target *root = ptr;
  1106. struct ebpf_target *w;
  1107. int order = 20130;
  1108. int update_every = em->update_every;
  1109. for (w = root; w; w = w->next) {
  1110. if (unlikely(!w->exposed))
  1111. continue;
  1112. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1113. w->clean_name,
  1114. "_ebpf_call_tcp_v4_connection",
  1115. "Calls to tcp_v4_connection.",
  1116. EBPF_COMMON_DIMENSION_CONNECTIONS,
  1117. NETDATA_APPS_NET_GROUP,
  1118. NETDATA_EBPF_CHART_TYPE_STACKED,
  1119. "app.ebpf_call_tcp_v4_connection",
  1120. order++,
  1121. update_every,
  1122. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1123. ebpf_create_chart_labels("app_group", w->name, 1);
  1124. ebpf_commit_label();
  1125. fprintf(stdout, "DIMENSION connections '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1126. if (tcp_v6_connect_address.type == 'T') {
  1127. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1128. w->clean_name,
  1129. "_ebpf_call_tcp_v6_connection",
  1130. "Calls to tcp_v6_connection.",
  1131. EBPF_COMMON_DIMENSION_CONNECTIONS,
  1132. NETDATA_APPS_NET_GROUP,
  1133. NETDATA_EBPF_CHART_TYPE_STACKED,
  1134. "app.ebpf_call_tcp_v6_connection",
  1135. order++,
  1136. update_every,
  1137. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1138. ebpf_create_chart_labels("app_group", w->name, 1);
  1139. ebpf_commit_label();
  1140. fprintf(stdout, "DIMENSION connections '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1141. }
  1142. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1143. w->clean_name,
  1144. "_ebpf_sock_bytes_sent",
  1145. "Bytes sent.",
  1146. EBPF_COMMON_DIMENSION_BITS,
  1147. NETDATA_APPS_NET_GROUP,
  1148. NETDATA_EBPF_CHART_TYPE_STACKED,
  1149. "app.ebpf_sock_bytes_sent",
  1150. order++,
  1151. update_every,
  1152. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1153. ebpf_create_chart_labels("app_group", w->name, 1);
  1154. ebpf_commit_label();
  1155. fprintf(stdout, "DIMENSION bandwidth '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1156. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1157. w->clean_name,
  1158. "_ebpf_sock_bytes_received",
  1159. "Bytes received.",
  1160. EBPF_COMMON_DIMENSION_BITS,
  1161. NETDATA_APPS_NET_GROUP,
  1162. NETDATA_EBPF_CHART_TYPE_STACKED,
  1163. "app.ebpf_sock_bytes_received",
  1164. order++,
  1165. update_every,
  1166. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1167. ebpf_create_chart_labels("app_group", w->name, 1);
  1168. ebpf_commit_label();
  1169. fprintf(stdout, "DIMENSION bandwidth '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1170. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1171. w->clean_name,
  1172. "_ebpf_call_tcp_sendmsg",
  1173. "Calls to tcp_sendmsg.",
  1174. EBPF_COMMON_DIMENSION_CALL,
  1175. NETDATA_APPS_NET_GROUP,
  1176. NETDATA_EBPF_CHART_TYPE_STACKED,
  1177. "app.ebpf_call_tcp_sendmsg",
  1178. order++,
  1179. update_every,
  1180. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1181. ebpf_create_chart_labels("app_group", w->name, 1);
  1182. ebpf_commit_label();
  1183. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1184. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1185. w->clean_name,
  1186. "_ebpf_call_tcp_cleanup_rbuf",
  1187. "Calls to tcp_cleanup_rbuf.",
  1188. EBPF_COMMON_DIMENSION_CALL,
  1189. NETDATA_APPS_NET_GROUP,
  1190. NETDATA_EBPF_CHART_TYPE_STACKED,
  1191. "app.ebpf_call_tcp_cleanup_rbuf",
  1192. order++,
  1193. update_every,
  1194. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1195. ebpf_create_chart_labels("app_group", w->name, 1);
  1196. ebpf_commit_label();
  1197. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1198. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1199. w->clean_name,
  1200. "_ebpf_call_tcp_retransmit",
  1201. "Calls to tcp_retransmit.",
  1202. EBPF_COMMON_DIMENSION_CALL,
  1203. NETDATA_APPS_NET_GROUP,
  1204. NETDATA_EBPF_CHART_TYPE_STACKED,
  1205. "app.ebpf_call_tcp_retransmit",
  1206. order++,
  1207. update_every,
  1208. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1209. ebpf_create_chart_labels("app_group", w->name, 1);
  1210. ebpf_commit_label();
  1211. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1212. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1213. w->clean_name,
  1214. "_ebpf_call_udp_sendmsg",
  1215. "Calls to udp_sendmsg.",
  1216. EBPF_COMMON_DIMENSION_CALL,
  1217. NETDATA_APPS_NET_GROUP,
  1218. NETDATA_EBPF_CHART_TYPE_STACKED,
  1219. "app.ebpf_call_udp_sendmsg",
  1220. order++,
  1221. update_every,
  1222. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1223. ebpf_create_chart_labels("app_group", w->name, 1);
  1224. ebpf_commit_label();
  1225. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1226. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  1227. w->clean_name,
  1228. "_ebpf_call_udp_recvmsg",
  1229. "Calls to udp_recvmsg.",
  1230. EBPF_COMMON_DIMENSION_CALL,
  1231. NETDATA_APPS_NET_GROUP,
  1232. NETDATA_EBPF_CHART_TYPE_STACKED,
  1233. "app.ebpf_call_udp_recvmsg",
  1234. order,
  1235. update_every,
  1236. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1237. ebpf_create_chart_labels("app_group", w->name, 1);
  1238. ebpf_commit_label();
  1239. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  1240. w->charts_created |= 1<<EBPF_MODULE_SOCKET_IDX;
  1241. }
  1242. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  1243. }
  1244. /*****************************************************************
  1245. *
  1246. * READ INFORMATION FROM KERNEL RING
  1247. *
  1248. *****************************************************************/
  1249. /**
  1250. * Is specific ip inside the range
  1251. *
  1252. * Check if the ip is inside a IP range previously defined
  1253. *
  1254. * @param cmp the IP to compare
  1255. * @param family the IP family
  1256. *
  1257. * @return It returns 1 if the IP is inside the range and 0 otherwise
  1258. */
  1259. static int ebpf_is_specific_ip_inside_range(union netdata_ip_t *cmp, int family)
  1260. {
  1261. if (!network_viewer_opt.excluded_ips && !network_viewer_opt.included_ips)
  1262. return 1;
  1263. uint32_t ipv4_test = htonl(cmp->addr32[0]);
  1264. ebpf_network_viewer_ip_list_t *move = network_viewer_opt.excluded_ips;
  1265. while (move) {
  1266. if (family == AF_INET) {
  1267. if (move->first.addr32[0] <= ipv4_test &&
  1268. ipv4_test <= move->last.addr32[0])
  1269. return 0;
  1270. } else {
  1271. if (memcmp(move->first.addr8, cmp->addr8, sizeof(union netdata_ip_t)) <= 0 &&
  1272. memcmp(move->last.addr8, cmp->addr8, sizeof(union netdata_ip_t)) >= 0) {
  1273. return 0;
  1274. }
  1275. }
  1276. move = move->next;
  1277. }
  1278. move = network_viewer_opt.included_ips;
  1279. while (move) {
  1280. if (family == AF_INET && move->ver == AF_INET) {
  1281. if (move->first.addr32[0] <= ipv4_test &&
  1282. move->last.addr32[0] >= ipv4_test)
  1283. return 1;
  1284. } else {
  1285. if (move->ver == AF_INET6 &&
  1286. memcmp(move->first.addr8, cmp->addr8, sizeof(union netdata_ip_t)) <= 0 &&
  1287. memcmp(move->last.addr8, cmp->addr8, sizeof(union netdata_ip_t)) >= 0) {
  1288. return 1;
  1289. }
  1290. }
  1291. move = move->next;
  1292. }
  1293. return 0;
  1294. }
  1295. /**
  1296. * Is port inside range
  1297. *
  1298. * Verify if the cmp port is inside the range [first, last].
  1299. * This function expects only the last parameter as big endian.
  1300. *
  1301. * @param cmp the value to compare
  1302. *
  1303. * @return It returns 1 when cmp is inside and 0 otherwise.
  1304. */
  1305. static int ebpf_is_port_inside_range(uint16_t cmp)
  1306. {
  1307. // We do not have restrictions for ports.
  1308. if (!network_viewer_opt.excluded_port && !network_viewer_opt.included_port)
  1309. return 1;
  1310. // Test if port is excluded
  1311. ebpf_network_viewer_port_list_t *move = network_viewer_opt.excluded_port;
  1312. while (move) {
  1313. if (move->cmp_first <= cmp && cmp <= move->cmp_last)
  1314. return 0;
  1315. move = move->next;
  1316. }
  1317. // Test if the port is inside allowed range
  1318. move = network_viewer_opt.included_port;
  1319. while (move) {
  1320. if (move->cmp_first <= cmp && cmp <= move->cmp_last)
  1321. return 1;
  1322. move = move->next;
  1323. }
  1324. return 0;
  1325. }
  1326. /**
  1327. * Hostname matches pattern
  1328. *
  1329. * @param cmp the value to compare
  1330. *
  1331. * @return It returns 1 when the value matches and zero otherwise.
  1332. */
  1333. int hostname_matches_pattern(char *cmp)
  1334. {
  1335. if (!network_viewer_opt.included_hostnames && !network_viewer_opt.excluded_hostnames)
  1336. return 1;
  1337. ebpf_network_viewer_hostname_list_t *move = network_viewer_opt.excluded_hostnames;
  1338. while (move) {
  1339. if (simple_pattern_matches(move->value_pattern, cmp))
  1340. return 0;
  1341. move = move->next;
  1342. }
  1343. move = network_viewer_opt.included_hostnames;
  1344. while (move) {
  1345. if (simple_pattern_matches(move->value_pattern, cmp))
  1346. return 1;
  1347. move = move->next;
  1348. }
  1349. return 0;
  1350. }
  1351. /**
  1352. * Is socket allowed?
  1353. *
  1354. * Compare destination addresses and destination ports to define next steps
  1355. *
  1356. * @param key the socket read from kernel ring
  1357. * @param data the socket data used also used to refuse some sockets.
  1358. *
  1359. * @return It returns 1 if this socket is inside the ranges and 0 otherwise.
  1360. */
  1361. int ebpf_is_socket_allowed(netdata_socket_idx_t *key, netdata_socket_t *data)
  1362. {
  1363. int ret = 0;
  1364. // If family is not AF_UNSPEC and it is different of specified
  1365. if (network_viewer_opt.family && network_viewer_opt.family != data->family)
  1366. goto endsocketallowed;
  1367. if (!ebpf_is_port_inside_range(key->dport))
  1368. goto endsocketallowed;
  1369. ret = ebpf_is_specific_ip_inside_range(&key->daddr, data->family);
  1370. endsocketallowed:
  1371. return ret;
  1372. }
  1373. /**
  1374. * Hash accumulator
  1375. *
  1376. * @param values the values used to calculate the data.
  1377. * @param family the connection family
  1378. * @param end the values size.
  1379. */
  1380. static void ebpf_hash_socket_accumulator(netdata_socket_t *values, int end)
  1381. {
  1382. int i;
  1383. uint8_t protocol = values[0].protocol;
  1384. uint64_t ct = values[0].current_timestamp;
  1385. uint64_t ft = values[0].first_timestamp;
  1386. uint16_t family = AF_UNSPEC;
  1387. uint32_t external_origin = values[0].external_origin;
  1388. for (i = 1; i < end; i++) {
  1389. netdata_socket_t *w = &values[i];
  1390. values[0].tcp.call_tcp_sent += w->tcp.call_tcp_sent;
  1391. values[0].tcp.call_tcp_received += w->tcp.call_tcp_received;
  1392. values[0].tcp.tcp_bytes_received += w->tcp.tcp_bytes_received;
  1393. values[0].tcp.tcp_bytes_sent += w->tcp.tcp_bytes_sent;
  1394. values[0].tcp.close += w->tcp.close;
  1395. values[0].tcp.retransmit += w->tcp.retransmit;
  1396. values[0].tcp.ipv4_connect += w->tcp.ipv4_connect;
  1397. values[0].tcp.ipv6_connect += w->tcp.ipv6_connect;
  1398. if (!protocol)
  1399. protocol = w->protocol;
  1400. if (family == AF_UNSPEC)
  1401. family = w->family;
  1402. if (w->current_timestamp > ct)
  1403. ct = w->current_timestamp;
  1404. if (!ft)
  1405. ft = w->first_timestamp;
  1406. if (w->external_origin)
  1407. external_origin = NETDATA_EBPF_SRC_IP_ORIGIN_EXTERNAL;
  1408. }
  1409. values[0].protocol = (!protocol)?IPPROTO_TCP:protocol;
  1410. values[0].current_timestamp = ct;
  1411. values[0].first_timestamp = ft;
  1412. values[0].external_origin = external_origin;
  1413. }
  1414. /**
  1415. * Translate socket
  1416. *
  1417. * Convert socket address to string
  1418. *
  1419. * @param dst structure where we will store
  1420. * @param key the socket address
  1421. */
  1422. static void ebpf_socket_translate(netdata_socket_plus_t *dst, netdata_socket_idx_t *key)
  1423. {
  1424. uint32_t resolve = network_viewer_opt.service_resolution_enabled;
  1425. char service[NI_MAXSERV];
  1426. int ret;
  1427. if (dst->data.family == AF_INET) {
  1428. struct sockaddr_in ipv4_addr = { };
  1429. ipv4_addr.sin_port = 0;
  1430. ipv4_addr.sin_addr.s_addr = key->saddr.addr32[0];
  1431. ipv4_addr.sin_family = AF_INET;
  1432. if (resolve) {
  1433. // NI_NAMEREQD : It is too slow
  1434. ret = getnameinfo((struct sockaddr *) &ipv4_addr, sizeof(ipv4_addr), dst->socket_string.src_ip,
  1435. INET6_ADDRSTRLEN, service, NI_MAXSERV, NI_NUMERICHOST | NI_NUMERICSERV);
  1436. if (ret) {
  1437. collector_error("Cannot resolve name: %s", gai_strerror(ret));
  1438. resolve = 0;
  1439. } else {
  1440. ipv4_addr.sin_addr.s_addr = key->daddr.addr32[0];
  1441. ipv4_addr.sin_port = key->dport;
  1442. ret = getnameinfo((struct sockaddr *) &ipv4_addr, sizeof(ipv4_addr), dst->socket_string.dst_ip,
  1443. INET6_ADDRSTRLEN, dst->socket_string.dst_port, NI_MAXSERV,
  1444. NI_NUMERICHOST);
  1445. if (ret) {
  1446. collector_error("Cannot resolve name: %s", gai_strerror(ret));
  1447. resolve = 0;
  1448. }
  1449. }
  1450. }
  1451. // When resolution fail, we should use addresses
  1452. if (!resolve) {
  1453. ipv4_addr.sin_addr.s_addr = key->saddr.addr32[0];
  1454. if(!inet_ntop(AF_INET, &ipv4_addr.sin_addr, dst->socket_string.src_ip, INET6_ADDRSTRLEN))
  1455. netdata_log_info("Cannot convert IP %u .", ipv4_addr.sin_addr.s_addr);
  1456. ipv4_addr.sin_addr.s_addr = key->daddr.addr32[0];
  1457. if(!inet_ntop(AF_INET, &ipv4_addr.sin_addr, dst->socket_string.dst_ip, INET6_ADDRSTRLEN))
  1458. netdata_log_info("Cannot convert IP %u .", ipv4_addr.sin_addr.s_addr);
  1459. snprintfz(dst->socket_string.dst_port, NI_MAXSERV, "%u", ntohs(key->dport));
  1460. }
  1461. } else {
  1462. struct sockaddr_in6 ipv6_addr = { };
  1463. memcpy(&ipv6_addr.sin6_addr, key->saddr.addr8, sizeof(key->saddr.addr8));
  1464. ipv6_addr.sin6_family = AF_INET6;
  1465. if (resolve) {
  1466. ret = getnameinfo((struct sockaddr *) &ipv6_addr, sizeof(ipv6_addr), dst->socket_string.src_ip,
  1467. INET6_ADDRSTRLEN, service, NI_MAXSERV, NI_NUMERICHOST | NI_NUMERICSERV);
  1468. if (ret) {
  1469. collector_error("Cannot resolve name: %s", gai_strerror(ret));
  1470. resolve = 0;
  1471. } else {
  1472. memcpy(&ipv6_addr.sin6_addr, key->daddr.addr8, sizeof(key->daddr.addr8));
  1473. ret = getnameinfo((struct sockaddr *) &ipv6_addr, sizeof(ipv6_addr), dst->socket_string.dst_ip,
  1474. INET6_ADDRSTRLEN, dst->socket_string.dst_port, NI_MAXSERV,
  1475. NI_NUMERICHOST);
  1476. if (ret) {
  1477. collector_error("Cannot resolve name: %s", gai_strerror(ret));
  1478. resolve = 0;
  1479. }
  1480. }
  1481. }
  1482. if (!resolve) {
  1483. memcpy(&ipv6_addr.sin6_addr, key->saddr.addr8, sizeof(key->saddr.addr8));
  1484. if(!inet_ntop(AF_INET6, &ipv6_addr.sin6_addr, dst->socket_string.src_ip, INET6_ADDRSTRLEN))
  1485. netdata_log_info("Cannot convert IPv6 Address.");
  1486. memcpy(&ipv6_addr.sin6_addr, key->daddr.addr8, sizeof(key->daddr.addr8));
  1487. if(!inet_ntop(AF_INET6, &ipv6_addr.sin6_addr, dst->socket_string.dst_ip, INET6_ADDRSTRLEN))
  1488. netdata_log_info("Cannot convert IPv6 Address.");
  1489. snprintfz(dst->socket_string.dst_port, NI_MAXSERV, "%u", ntohs(key->dport));
  1490. }
  1491. }
  1492. dst->pid = key->pid;
  1493. if (!strcmp(dst->socket_string.dst_port, "0"))
  1494. snprintfz(dst->socket_string.dst_port, NI_MAXSERV, "%u", ntohs(key->dport));
  1495. #ifdef NETDATA_DEV_MODE
  1496. collector_info("New socket: { ORIGIN IP: %s, ORIGIN : %u, DST IP:%s, DST PORT: %s, PID: %u, PROTO: %d, FAMILY: %d}",
  1497. dst->socket_string.src_ip,
  1498. dst->data.external_origin,
  1499. dst->socket_string.dst_ip,
  1500. dst->socket_string.dst_port,
  1501. dst->pid,
  1502. dst->data.protocol,
  1503. dst->data.family
  1504. );
  1505. #endif
  1506. }
  1507. /**
  1508. * Update array vectors
  1509. *
  1510. * Read data from hash table and update vectors.
  1511. *
  1512. * @param em the structure with configuration
  1513. */
  1514. static void ebpf_update_array_vectors(ebpf_module_t *em)
  1515. {
  1516. netdata_thread_disable_cancelability();
  1517. netdata_socket_idx_t key = {};
  1518. netdata_socket_idx_t next_key = {};
  1519. int maps_per_core = em->maps_per_core;
  1520. int fd = em->maps[NETDATA_SOCKET_OPEN_SOCKET].map_fd;
  1521. netdata_socket_t *values = socket_values;
  1522. size_t length = sizeof(netdata_socket_t);
  1523. int test, end;
  1524. if (maps_per_core) {
  1525. length *= ebpf_nprocs;
  1526. end = ebpf_nprocs;
  1527. } else
  1528. end = 1;
  1529. // We need to reset the values when we are working on kernel 4.15 or newer, because kernel does not create
  1530. // values for specific processor unless it is used to store data. As result of this behavior one the next socket
  1531. // can have values from the previous one.
  1532. memset(values, 0, length);
  1533. time_t update_time = time(NULL);
  1534. while (bpf_map_get_next_key(fd, &key, &next_key) == 0) {
  1535. test = bpf_map_lookup_elem(fd, &key, values);
  1536. if (test < 0) {
  1537. goto end_socket_loop;
  1538. }
  1539. if (key.pid > (uint32_t)pid_max) {
  1540. goto end_socket_loop;
  1541. }
  1542. ebpf_hash_socket_accumulator(values, end);
  1543. ebpf_socket_fill_publish_apps(key.pid, values);
  1544. // We update UDP to show info with charts, but we do not show them with functions
  1545. /*
  1546. if (key.dport == NETDATA_EBPF_UDP_PORT && values[0].protocol == IPPROTO_UDP) {
  1547. bpf_map_delete_elem(fd, &key);
  1548. goto end_socket_loop;
  1549. }
  1550. */
  1551. // Discard non-bind sockets
  1552. if (!key.daddr.addr64[0] && !key.daddr.addr64[1] && !key.saddr.addr64[0] && !key.saddr.addr64[1]) {
  1553. bpf_map_delete_elem(fd, &key);
  1554. goto end_socket_loop;
  1555. }
  1556. // When socket is not allowed, we do not append it to table, but we are still keeping it to accumulate data.
  1557. if (!ebpf_is_socket_allowed(&key, values)) {
  1558. goto end_socket_loop;
  1559. }
  1560. // Get PID structure
  1561. rw_spinlock_write_lock(&ebpf_judy_pid.index.rw_spinlock);
  1562. PPvoid_t judy_array = &ebpf_judy_pid.index.JudyLArray;
  1563. netdata_ebpf_judy_pid_stats_t *pid_ptr = ebpf_get_pid_from_judy_unsafe(judy_array, key.pid);
  1564. if (!pid_ptr) {
  1565. goto end_socket_loop;
  1566. }
  1567. // Get Socket structure
  1568. rw_spinlock_write_lock(&pid_ptr->socket_stats.rw_spinlock);
  1569. netdata_socket_plus_t **socket_pptr = (netdata_socket_plus_t **)ebpf_judy_insert_unsafe(
  1570. &pid_ptr->socket_stats.JudyLArray, values[0].first_timestamp);
  1571. netdata_socket_plus_t *socket_ptr = *socket_pptr;
  1572. bool translate = false;
  1573. if (likely(*socket_pptr == NULL)) {
  1574. *socket_pptr = aral_mallocz(aral_socket_table);
  1575. socket_ptr = *socket_pptr;
  1576. translate = true;
  1577. }
  1578. uint64_t prev_period = socket_ptr->data.current_timestamp;
  1579. memcpy(&socket_ptr->data, &values[0], sizeof(netdata_socket_t));
  1580. if (translate)
  1581. ebpf_socket_translate(socket_ptr, &key);
  1582. else { // Check socket was updated
  1583. if (prev_period) {
  1584. if (values[0].current_timestamp > prev_period) // Socket updated
  1585. socket_ptr->last_update = update_time;
  1586. else if ((update_time - socket_ptr->last_update) > em->update_every) {
  1587. // Socket was not updated since last read
  1588. JudyLDel(&pid_ptr->socket_stats.JudyLArray, values[0].first_timestamp, PJE0);
  1589. aral_freez(aral_socket_table, socket_ptr);
  1590. }
  1591. } else // First time
  1592. socket_ptr->last_update = update_time;
  1593. }
  1594. rw_spinlock_write_unlock(&pid_ptr->socket_stats.rw_spinlock);
  1595. rw_spinlock_write_unlock(&ebpf_judy_pid.index.rw_spinlock);
  1596. end_socket_loop:
  1597. memset(values, 0, length);
  1598. memcpy(&key, &next_key, sizeof(key));
  1599. }
  1600. netdata_thread_enable_cancelability();
  1601. }
  1602. /**
  1603. * Socket thread
  1604. *
  1605. * Thread used to generate socket charts.
  1606. *
  1607. * @param ptr a pointer to `struct ebpf_module`
  1608. *
  1609. * @return It always return NULL
  1610. */
  1611. void *ebpf_read_socket_thread(void *ptr)
  1612. {
  1613. heartbeat_t hb;
  1614. heartbeat_init(&hb);
  1615. ebpf_module_t *em = (ebpf_module_t *)ptr;
  1616. ebpf_update_array_vectors(em);
  1617. int update_every = em->update_every;
  1618. int counter = update_every - 1;
  1619. uint32_t running_time = 0;
  1620. uint32_t lifetime = em->lifetime;
  1621. usec_t period = update_every * USEC_PER_SEC;
  1622. while (!ebpf_plugin_exit && running_time < lifetime) {
  1623. (void)heartbeat_next(&hb, period);
  1624. if (ebpf_plugin_exit || ++counter != update_every)
  1625. continue;
  1626. ebpf_update_array_vectors(em);
  1627. counter = 0;
  1628. }
  1629. return NULL;
  1630. }
  1631. /**
  1632. * Fill Network Viewer Port list
  1633. *
  1634. * Fill the structure with values read from /proc or hash table.
  1635. *
  1636. * @param out the structure where we will store data.
  1637. * @param value the ports we are listen to.
  1638. * @param proto the protocol used for this connection.
  1639. * @param in the structure with values read form different sources.
  1640. */
  1641. static inline void fill_nv_port_list(ebpf_network_viewer_port_list_t *out, uint16_t value, uint16_t proto,
  1642. netdata_passive_connection_t *in)
  1643. {
  1644. out->first = value;
  1645. out->protocol = proto;
  1646. out->pid = in->pid;
  1647. out->tgid = in->tgid;
  1648. out->connections = in->counter;
  1649. }
  1650. /**
  1651. * Update listen table
  1652. *
  1653. * Update link list when it is necessary.
  1654. *
  1655. * @param value the ports we are listen to.
  1656. * @param proto the protocol used with port connection.
  1657. * @param in the structure with values read form different sources.
  1658. */
  1659. void update_listen_table(uint16_t value, uint16_t proto, netdata_passive_connection_t *in)
  1660. {
  1661. ebpf_network_viewer_port_list_t *w;
  1662. if (likely(listen_ports)) {
  1663. ebpf_network_viewer_port_list_t *move = listen_ports, *store = listen_ports;
  1664. while (move) {
  1665. if (move->protocol == proto && move->first == value) {
  1666. move->pid = in->pid;
  1667. move->tgid = in->tgid;
  1668. move->connections = in->counter;
  1669. return;
  1670. }
  1671. store = move;
  1672. move = move->next;
  1673. }
  1674. w = callocz(1, sizeof(ebpf_network_viewer_port_list_t));
  1675. store->next = w;
  1676. } else {
  1677. w = callocz(1, sizeof(ebpf_network_viewer_port_list_t));
  1678. listen_ports = w;
  1679. }
  1680. fill_nv_port_list(w, value, proto, in);
  1681. #ifdef NETDATA_INTERNAL_CHECKS
  1682. netdata_log_info("The network viewer is monitoring inbound connections for port %u", ntohs(value));
  1683. #endif
  1684. }
  1685. /**
  1686. * Read listen table
  1687. *
  1688. * Read the table with all ports that we are listen on host.
  1689. */
  1690. static void read_listen_table()
  1691. {
  1692. netdata_passive_connection_idx_t key = {};
  1693. netdata_passive_connection_idx_t next_key = {};
  1694. int fd = socket_maps[NETDATA_SOCKET_LPORTS].map_fd;
  1695. netdata_passive_connection_t value = {};
  1696. while (bpf_map_get_next_key(fd, &key, &next_key) == 0) {
  1697. int test = bpf_map_lookup_elem(fd, &key, &value);
  1698. if (test < 0) {
  1699. key = next_key;
  1700. continue;
  1701. }
  1702. // The correct protocol must come from kernel
  1703. update_listen_table(key.port, key.protocol, &value);
  1704. key = next_key;
  1705. memset(&value, 0, sizeof(value));
  1706. }
  1707. if (next_key.port && value.pid) {
  1708. // The correct protocol must come from kernel
  1709. update_listen_table(next_key.port, next_key.protocol, &value);
  1710. }
  1711. }
  1712. /**
  1713. * Read the hash table and store data to allocated vectors.
  1714. *
  1715. * @param stats vector used to read data from control table.
  1716. * @param maps_per_core do I need to read all cores?
  1717. */
  1718. static void ebpf_socket_read_hash_global_tables(netdata_idx_t *stats, int maps_per_core)
  1719. {
  1720. netdata_idx_t res[NETDATA_SOCKET_COUNTER];
  1721. ebpf_read_global_table_stats(res,
  1722. socket_hash_values,
  1723. socket_maps[NETDATA_SOCKET_GLOBAL].map_fd,
  1724. maps_per_core,
  1725. NETDATA_KEY_CALLS_TCP_SENDMSG,
  1726. NETDATA_SOCKET_COUNTER);
  1727. ebpf_read_global_table_stats(stats,
  1728. socket_hash_values,
  1729. socket_maps[NETDATA_SOCKET_TABLE_CTRL].map_fd,
  1730. maps_per_core,
  1731. NETDATA_CONTROLLER_PID_TABLE_ADD,
  1732. NETDATA_CONTROLLER_END);
  1733. socket_aggregated_data[NETDATA_IDX_TCP_SENDMSG].call = res[NETDATA_KEY_CALLS_TCP_SENDMSG];
  1734. socket_aggregated_data[NETDATA_IDX_TCP_CLEANUP_RBUF].call = res[NETDATA_KEY_CALLS_TCP_CLEANUP_RBUF];
  1735. socket_aggregated_data[NETDATA_IDX_TCP_CLOSE].call = res[NETDATA_KEY_CALLS_TCP_CLOSE];
  1736. socket_aggregated_data[NETDATA_IDX_UDP_RECVBUF].call = res[NETDATA_KEY_CALLS_UDP_RECVMSG];
  1737. socket_aggregated_data[NETDATA_IDX_UDP_SENDMSG].call = res[NETDATA_KEY_CALLS_UDP_SENDMSG];
  1738. socket_aggregated_data[NETDATA_IDX_TCP_RETRANSMIT].call = res[NETDATA_KEY_TCP_RETRANSMIT];
  1739. socket_aggregated_data[NETDATA_IDX_TCP_CONNECTION_V4].call = res[NETDATA_KEY_CALLS_TCP_CONNECT_IPV4];
  1740. socket_aggregated_data[NETDATA_IDX_TCP_CONNECTION_V6].call = res[NETDATA_KEY_CALLS_TCP_CONNECT_IPV6];
  1741. socket_aggregated_data[NETDATA_IDX_TCP_SENDMSG].ecall = res[NETDATA_KEY_ERROR_TCP_SENDMSG];
  1742. socket_aggregated_data[NETDATA_IDX_TCP_CLEANUP_RBUF].ecall = res[NETDATA_KEY_ERROR_TCP_CLEANUP_RBUF];
  1743. socket_aggregated_data[NETDATA_IDX_UDP_RECVBUF].ecall = res[NETDATA_KEY_ERROR_UDP_RECVMSG];
  1744. socket_aggregated_data[NETDATA_IDX_UDP_SENDMSG].ecall = res[NETDATA_KEY_ERROR_UDP_SENDMSG];
  1745. socket_aggregated_data[NETDATA_IDX_TCP_CONNECTION_V4].ecall = res[NETDATA_KEY_ERROR_TCP_CONNECT_IPV4];
  1746. socket_aggregated_data[NETDATA_IDX_TCP_CONNECTION_V6].ecall = res[NETDATA_KEY_ERROR_TCP_CONNECT_IPV6];
  1747. socket_aggregated_data[NETDATA_IDX_TCP_SENDMSG].bytes = res[NETDATA_KEY_BYTES_TCP_SENDMSG];
  1748. socket_aggregated_data[NETDATA_IDX_TCP_CLEANUP_RBUF].bytes = res[NETDATA_KEY_BYTES_TCP_CLEANUP_RBUF];
  1749. socket_aggregated_data[NETDATA_IDX_UDP_RECVBUF].bytes = res[NETDATA_KEY_BYTES_UDP_RECVMSG];
  1750. socket_aggregated_data[NETDATA_IDX_UDP_SENDMSG].bytes = res[NETDATA_KEY_BYTES_UDP_SENDMSG];
  1751. }
  1752. /**
  1753. * Fill publish apps when necessary.
  1754. *
  1755. * @param current_pid the PID that I am updating
  1756. * @param ns the structure with data read from memory.
  1757. */
  1758. void ebpf_socket_fill_publish_apps(uint32_t current_pid, netdata_socket_t *ns)
  1759. {
  1760. ebpf_socket_publish_apps_t *curr = socket_bandwidth_curr[current_pid];
  1761. if (!curr) {
  1762. curr = ebpf_socket_stat_get();
  1763. socket_bandwidth_curr[current_pid] = curr;
  1764. }
  1765. curr->bytes_sent += ns->tcp.tcp_bytes_sent;
  1766. curr->bytes_received += ns->tcp.tcp_bytes_received;
  1767. curr->call_tcp_sent += ns->tcp.call_tcp_sent;
  1768. curr->call_tcp_received += ns->tcp.call_tcp_received;
  1769. curr->retransmit += ns->tcp.retransmit;
  1770. curr->call_close += ns->tcp.close;
  1771. curr->call_tcp_v4_connection += ns->tcp.ipv4_connect;
  1772. curr->call_tcp_v6_connection += ns->tcp.ipv6_connect;
  1773. curr->call_udp_sent += ns->udp.call_udp_sent;
  1774. curr->call_udp_received += ns->udp.call_udp_received;
  1775. }
  1776. /**
  1777. * Update cgroup
  1778. *
  1779. * Update cgroup data based in PIDs.
  1780. */
  1781. static void ebpf_update_socket_cgroup()
  1782. {
  1783. ebpf_cgroup_target_t *ect ;
  1784. pthread_mutex_lock(&mutex_cgroup_shm);
  1785. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  1786. struct pid_on_target2 *pids;
  1787. for (pids = ect->pids; pids; pids = pids->next) {
  1788. int pid = pids->pid;
  1789. ebpf_socket_publish_apps_t *publish = &ect->publish_socket;
  1790. if (likely(socket_bandwidth_curr) && socket_bandwidth_curr[pid]) {
  1791. ebpf_socket_publish_apps_t *in = socket_bandwidth_curr[pid];
  1792. publish->bytes_sent = in->bytes_sent;
  1793. publish->bytes_received = in->bytes_received;
  1794. publish->call_tcp_sent = in->call_tcp_sent;
  1795. publish->call_tcp_received = in->call_tcp_received;
  1796. publish->retransmit = in->retransmit;
  1797. publish->call_udp_sent = in->call_udp_sent;
  1798. publish->call_udp_received = in->call_udp_received;
  1799. publish->call_close = in->call_close;
  1800. publish->call_tcp_v4_connection = in->call_tcp_v4_connection;
  1801. publish->call_tcp_v6_connection = in->call_tcp_v6_connection;
  1802. }
  1803. }
  1804. }
  1805. pthread_mutex_unlock(&mutex_cgroup_shm);
  1806. }
  1807. /**
  1808. * Sum PIDs
  1809. *
  1810. * Sum values for all targets.
  1811. *
  1812. * @param fd structure used to store data
  1813. * @param pids input data
  1814. */
  1815. static void ebpf_socket_sum_cgroup_pids(ebpf_socket_publish_apps_t *socket, struct pid_on_target2 *pids)
  1816. {
  1817. ebpf_socket_publish_apps_t accumulator;
  1818. memset(&accumulator, 0, sizeof(accumulator));
  1819. while (pids) {
  1820. netdata_socket_t *w = &pids->socket;
  1821. accumulator.bytes_received += w->tcp.tcp_bytes_received;
  1822. accumulator.bytes_sent += w->tcp.tcp_bytes_sent;
  1823. accumulator.call_tcp_received += w->tcp.call_tcp_received;
  1824. accumulator.call_tcp_sent += w->tcp.call_tcp_sent;
  1825. accumulator.retransmit += w->tcp.retransmit;
  1826. accumulator.call_close += w->tcp.close;
  1827. accumulator.call_tcp_v4_connection += w->tcp.ipv4_connect;
  1828. accumulator.call_tcp_v6_connection += w->tcp.ipv6_connect;
  1829. accumulator.call_udp_received += w->udp.call_udp_received;
  1830. accumulator.call_udp_sent += w->udp.call_udp_sent;
  1831. pids = pids->next;
  1832. }
  1833. socket->bytes_sent = (accumulator.bytes_sent >= socket->bytes_sent) ? accumulator.bytes_sent : socket->bytes_sent;
  1834. socket->bytes_received = (accumulator.bytes_received >= socket->bytes_received) ? accumulator.bytes_received : socket->bytes_received;
  1835. socket->call_tcp_sent = (accumulator.call_tcp_sent >= socket->call_tcp_sent) ? accumulator.call_tcp_sent : socket->call_tcp_sent;
  1836. socket->call_tcp_received = (accumulator.call_tcp_received >= socket->call_tcp_received) ? accumulator.call_tcp_received : socket->call_tcp_received;
  1837. socket->retransmit = (accumulator.retransmit >= socket->retransmit) ? accumulator.retransmit : socket->retransmit;
  1838. socket->call_udp_sent = (accumulator.call_udp_sent >= socket->call_udp_sent) ? accumulator.call_udp_sent : socket->call_udp_sent;
  1839. socket->call_udp_received = (accumulator.call_udp_received >= socket->call_udp_received) ? accumulator.call_udp_received : socket->call_udp_received;
  1840. socket->call_close = (accumulator.call_close >= socket->call_close) ? accumulator.call_close : socket->call_close;
  1841. socket->call_tcp_v4_connection = (accumulator.call_tcp_v4_connection >= socket->call_tcp_v4_connection) ?
  1842. accumulator.call_tcp_v4_connection : socket->call_tcp_v4_connection;
  1843. socket->call_tcp_v6_connection = (accumulator.call_tcp_v6_connection >= socket->call_tcp_v6_connection) ?
  1844. accumulator.call_tcp_v6_connection : socket->call_tcp_v6_connection;
  1845. }
  1846. /**
  1847. * Create specific socket charts
  1848. *
  1849. * Create charts for cgroup/application.
  1850. *
  1851. * @param type the chart type.
  1852. * @param update_every value to overwrite the update frequency set by the server.
  1853. */
  1854. static void ebpf_create_specific_socket_charts(char *type, int update_every)
  1855. {
  1856. int order_basis = 5300;
  1857. ebpf_create_chart(type, NETDATA_NET_APPS_CONNECTION_TCP_V4,
  1858. "Calls to tcp_v4_connection",
  1859. EBPF_COMMON_DIMENSION_CONNECTIONS, NETDATA_CGROUP_NET_GROUP,
  1860. NETDATA_CGROUP_TCP_V4_CONN_CONTEXT,
  1861. NETDATA_EBPF_CHART_TYPE_LINE,
  1862. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1863. ebpf_create_global_dimension,
  1864. &socket_publish_aggregated[NETDATA_IDX_TCP_CONNECTION_V4], 1,
  1865. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1866. if (tcp_v6_connect_address.type == 'T') {
  1867. ebpf_create_chart(type,
  1868. NETDATA_NET_APPS_CONNECTION_TCP_V6,
  1869. "Calls to tcp_v6_connection",
  1870. EBPF_COMMON_DIMENSION_CONNECTIONS,
  1871. NETDATA_CGROUP_NET_GROUP,
  1872. NETDATA_CGROUP_TCP_V6_CONN_CONTEXT,
  1873. NETDATA_EBPF_CHART_TYPE_LINE,
  1874. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1875. ebpf_create_global_dimension,
  1876. &socket_publish_aggregated[NETDATA_IDX_TCP_CONNECTION_V6],
  1877. 1,
  1878. update_every,
  1879. NETDATA_EBPF_MODULE_NAME_SOCKET);
  1880. }
  1881. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_RECV,
  1882. "Bytes received",
  1883. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1884. NETDATA_CGROUP_SOCKET_BYTES_RECV_CONTEXT,
  1885. NETDATA_EBPF_CHART_TYPE_LINE,
  1886. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1887. ebpf_create_global_dimension,
  1888. &socket_publish_aggregated[NETDATA_IDX_TCP_CLEANUP_RBUF], 1,
  1889. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1890. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_SENT,
  1891. "Bytes sent",
  1892. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1893. NETDATA_CGROUP_SOCKET_BYTES_SEND_CONTEXT,
  1894. NETDATA_EBPF_CHART_TYPE_LINE,
  1895. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1896. ebpf_create_global_dimension,
  1897. socket_publish_aggregated, 1,
  1898. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1899. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_TCP_RECV_CALLS,
  1900. "Calls to tcp_cleanup_rbuf.",
  1901. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1902. NETDATA_CGROUP_SOCKET_TCP_RECV_CONTEXT,
  1903. NETDATA_EBPF_CHART_TYPE_LINE,
  1904. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1905. ebpf_create_global_dimension,
  1906. &socket_publish_aggregated[NETDATA_IDX_TCP_CLEANUP_RBUF], 1,
  1907. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1908. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_TCP_SEND_CALLS,
  1909. "Calls to tcp_sendmsg.",
  1910. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1911. NETDATA_CGROUP_SOCKET_TCP_SEND_CONTEXT,
  1912. NETDATA_EBPF_CHART_TYPE_LINE,
  1913. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1914. ebpf_create_global_dimension,
  1915. socket_publish_aggregated, 1,
  1916. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1917. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_TCP_RETRANSMIT,
  1918. "Calls to tcp_retransmit.",
  1919. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1920. NETDATA_CGROUP_SOCKET_TCP_RETRANSMIT_CONTEXT,
  1921. NETDATA_EBPF_CHART_TYPE_LINE,
  1922. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1923. ebpf_create_global_dimension,
  1924. &socket_publish_aggregated[NETDATA_IDX_TCP_RETRANSMIT], 1,
  1925. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1926. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_UDP_SEND_CALLS,
  1927. "Calls to udp_sendmsg",
  1928. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1929. NETDATA_CGROUP_SOCKET_UDP_SEND_CONTEXT,
  1930. NETDATA_EBPF_CHART_TYPE_LINE,
  1931. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1932. ebpf_create_global_dimension,
  1933. &socket_publish_aggregated[NETDATA_IDX_UDP_SENDMSG], 1,
  1934. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1935. ebpf_create_chart(type, NETDATA_NET_APPS_BANDWIDTH_UDP_RECV_CALLS,
  1936. "Calls to udp_recvmsg",
  1937. EBPF_COMMON_DIMENSION_CALL, NETDATA_CGROUP_NET_GROUP,
  1938. NETDATA_CGROUP_SOCKET_UDP_RECV_CONTEXT,
  1939. NETDATA_EBPF_CHART_TYPE_LINE,
  1940. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1941. ebpf_create_global_dimension,
  1942. &socket_publish_aggregated[NETDATA_IDX_UDP_RECVBUF], 1,
  1943. update_every, NETDATA_EBPF_MODULE_NAME_SOCKET);
  1944. }
  1945. /**
  1946. * Obsolete specific socket charts
  1947. *
  1948. * Obsolete charts for cgroup/application.
  1949. *
  1950. * @param type the chart type.
  1951. * @param update_every value to overwrite the update frequency set by the server.
  1952. */
  1953. static void ebpf_obsolete_specific_socket_charts(char *type, int update_every)
  1954. {
  1955. int order_basis = 5300;
  1956. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_CONNECTION_TCP_V4, "", "Calls to tcp_v4_connection",
  1957. EBPF_COMMON_DIMENSION_CONNECTIONS, NETDATA_APPS_NET_GROUP,
  1958. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_TCP_V4_CONN_CONTEXT,
  1959. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1960. if (tcp_v6_connect_address.type == 'T') {
  1961. ebpf_write_chart_obsolete(type,
  1962. NETDATA_NET_APPS_CONNECTION_TCP_V6,
  1963. "",
  1964. "Calls to tcp_v6_connection",
  1965. EBPF_COMMON_DIMENSION_CONNECTIONS,
  1966. NETDATA_APPS_NET_GROUP,
  1967. NETDATA_EBPF_CHART_TYPE_LINE,
  1968. NETDATA_SERVICES_SOCKET_TCP_V6_CONN_CONTEXT,
  1969. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++,
  1970. update_every);
  1971. }
  1972. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_RECV, "", "Bytes received",
  1973. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP,
  1974. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_BYTES_RECV_CONTEXT,
  1975. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1976. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_SENT, "","Bytes sent",
  1977. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP,
  1978. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_BYTES_SEND_CONTEXT,
  1979. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1980. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_TCP_RECV_CALLS, "", "Calls to tcp_cleanup_rbuf.",
  1981. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP,
  1982. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_TCP_RECV_CONTEXT,
  1983. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1984. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_TCP_SEND_CALLS, "", "Calls to tcp_sendmsg.",
  1985. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP,
  1986. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_TCP_SEND_CONTEXT,
  1987. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1988. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_TCP_RETRANSMIT, "", "Calls to tcp_retransmit.",
  1989. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP,
  1990. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_TCP_RETRANSMIT_CONTEXT,
  1991. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1992. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_UDP_SEND_CALLS, "", "Calls to udp_sendmsg",
  1993. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP,
  1994. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_SERVICES_SOCKET_UDP_SEND_CONTEXT,
  1995. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  1996. ebpf_write_chart_obsolete(type, NETDATA_NET_APPS_BANDWIDTH_UDP_RECV_CALLS, "", "Calls to udp_recvmsg",
  1997. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_NET_GROUP, NETDATA_EBPF_CHART_TYPE_LINE,
  1998. NETDATA_SERVICES_SOCKET_UDP_RECV_CONTEXT,
  1999. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + order_basis++, update_every);
  2000. }
  2001. /*
  2002. * Send Specific Swap data
  2003. *
  2004. * Send data for specific cgroup/apps.
  2005. *
  2006. * @param type chart type
  2007. * @param values structure with values that will be sent to netdata
  2008. */
  2009. static void ebpf_send_specific_socket_data(char *type, ebpf_socket_publish_apps_t *values)
  2010. {
  2011. ebpf_write_begin_chart(type, NETDATA_NET_APPS_CONNECTION_TCP_V4, "");
  2012. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_TCP_CONNECTION_V4].name,
  2013. (long long) values->call_tcp_v4_connection);
  2014. ebpf_write_end_chart();
  2015. if (tcp_v6_connect_address.type == 'T') {
  2016. ebpf_write_begin_chart(type, NETDATA_NET_APPS_CONNECTION_TCP_V6, "");
  2017. write_chart_dimension(
  2018. socket_publish_aggregated[NETDATA_IDX_TCP_CONNECTION_V6].name, (long long)values->call_tcp_v6_connection);
  2019. ebpf_write_end_chart();
  2020. }
  2021. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_SENT, "");
  2022. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_TCP_SENDMSG].name,
  2023. (long long) values->bytes_sent);
  2024. ebpf_write_end_chart();
  2025. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_RECV, "");
  2026. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_TCP_CLEANUP_RBUF].name,
  2027. (long long) values->bytes_received);
  2028. ebpf_write_end_chart();
  2029. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_TCP_SEND_CALLS, "");
  2030. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_TCP_SENDMSG].name,
  2031. (long long) values->call_tcp_sent);
  2032. ebpf_write_end_chart();
  2033. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_TCP_RECV_CALLS, "");
  2034. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_TCP_CLEANUP_RBUF].name,
  2035. (long long) values->call_tcp_received);
  2036. ebpf_write_end_chart();
  2037. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_TCP_RETRANSMIT, "");
  2038. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_TCP_RETRANSMIT].name,
  2039. (long long) values->retransmit);
  2040. ebpf_write_end_chart();
  2041. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_UDP_SEND_CALLS, "");
  2042. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_UDP_SENDMSG].name,
  2043. (long long) values->call_udp_sent);
  2044. ebpf_write_end_chart();
  2045. ebpf_write_begin_chart(type, NETDATA_NET_APPS_BANDWIDTH_UDP_RECV_CALLS, "");
  2046. write_chart_dimension(socket_publish_aggregated[NETDATA_IDX_UDP_RECVBUF].name,
  2047. (long long) values->call_udp_received);
  2048. ebpf_write_end_chart();
  2049. }
  2050. /**
  2051. * Create Systemd Socket Charts
  2052. *
  2053. * Create charts when systemd is enabled
  2054. *
  2055. * @param update_every value to overwrite the update frequency set by the server.
  2056. **/
  2057. static void ebpf_create_systemd_socket_charts(int update_every)
  2058. {
  2059. int order = 20080;
  2060. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_CONNECTION_TCP_V4,
  2061. "Calls to tcp_v4_connection", EBPF_COMMON_DIMENSION_CONNECTIONS,
  2062. NETDATA_APPS_NET_GROUP,
  2063. NETDATA_EBPF_CHART_TYPE_STACKED,
  2064. order++,
  2065. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2066. NETDATA_SERVICES_SOCKET_TCP_V4_CONN_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2067. update_every);
  2068. if (tcp_v6_connect_address.type == 'T') {
  2069. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_CONNECTION_TCP_V6,
  2070. "Calls to tcp_v6_connection",
  2071. EBPF_COMMON_DIMENSION_CONNECTIONS,
  2072. NETDATA_APPS_NET_GROUP,
  2073. NETDATA_EBPF_CHART_TYPE_STACKED,
  2074. order++,
  2075. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2076. NETDATA_SERVICES_SOCKET_TCP_V6_CONN_CONTEXT,
  2077. NETDATA_EBPF_MODULE_NAME_SOCKET,
  2078. update_every);
  2079. }
  2080. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_RECV,
  2081. "Bytes received", EBPF_COMMON_DIMENSION_BITS,
  2082. NETDATA_APPS_NET_GROUP,
  2083. NETDATA_EBPF_CHART_TYPE_STACKED,
  2084. order++,
  2085. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2086. NETDATA_SERVICES_SOCKET_BYTES_RECV_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2087. update_every);
  2088. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_SENT,
  2089. "Bytes sent", EBPF_COMMON_DIMENSION_BITS,
  2090. NETDATA_APPS_NET_GROUP,
  2091. NETDATA_EBPF_CHART_TYPE_STACKED,
  2092. order++,
  2093. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2094. NETDATA_SERVICES_SOCKET_BYTES_SEND_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2095. update_every);
  2096. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_TCP_RECV_CALLS,
  2097. "Calls to tcp_cleanup_rbuf.",
  2098. EBPF_COMMON_DIMENSION_CALL,
  2099. NETDATA_APPS_NET_GROUP,
  2100. NETDATA_EBPF_CHART_TYPE_STACKED,
  2101. order++,
  2102. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2103. NETDATA_SERVICES_SOCKET_TCP_RECV_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2104. update_every);
  2105. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_TCP_SEND_CALLS,
  2106. "Calls to tcp_sendmsg.",
  2107. EBPF_COMMON_DIMENSION_CALL,
  2108. NETDATA_APPS_NET_GROUP,
  2109. NETDATA_EBPF_CHART_TYPE_STACKED,
  2110. order++,
  2111. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2112. NETDATA_SERVICES_SOCKET_TCP_SEND_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2113. update_every);
  2114. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_TCP_RETRANSMIT,
  2115. "Calls to tcp_retransmit",
  2116. EBPF_COMMON_DIMENSION_CALL,
  2117. NETDATA_APPS_NET_GROUP,
  2118. NETDATA_EBPF_CHART_TYPE_STACKED,
  2119. order++,
  2120. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2121. NETDATA_SERVICES_SOCKET_TCP_RETRANSMIT_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2122. update_every);
  2123. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_UDP_SEND_CALLS,
  2124. "Calls to udp_sendmsg",
  2125. EBPF_COMMON_DIMENSION_CALL,
  2126. NETDATA_APPS_NET_GROUP,
  2127. NETDATA_EBPF_CHART_TYPE_STACKED,
  2128. order++,
  2129. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2130. NETDATA_SERVICES_SOCKET_UDP_SEND_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2131. update_every);
  2132. ebpf_create_charts_on_systemd(NETDATA_NET_APPS_BANDWIDTH_UDP_RECV_CALLS,
  2133. "Calls to udp_recvmsg",
  2134. EBPF_COMMON_DIMENSION_CALL,
  2135. NETDATA_APPS_NET_GROUP,
  2136. NETDATA_EBPF_CHART_TYPE_STACKED,
  2137. order++,
  2138. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  2139. NETDATA_SERVICES_SOCKET_UDP_RECV_CONTEXT, NETDATA_EBPF_MODULE_NAME_SOCKET,
  2140. update_every);
  2141. }
  2142. /**
  2143. * Send Systemd charts
  2144. *
  2145. * Send collected data to Netdata.
  2146. */
  2147. static void ebpf_send_systemd_socket_charts()
  2148. {
  2149. ebpf_cgroup_target_t *ect;
  2150. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_CONNECTION_TCP_V4, "");
  2151. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2152. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2153. write_chart_dimension(ect->name, (long long)ect->publish_socket.call_tcp_v4_connection);
  2154. }
  2155. }
  2156. ebpf_write_end_chart();
  2157. if (tcp_v6_connect_address.type == 'T') {
  2158. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_CONNECTION_TCP_V6, "");
  2159. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  2160. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2161. write_chart_dimension(ect->name, (long long)ect->publish_socket.call_tcp_v6_connection);
  2162. }
  2163. }
  2164. ebpf_write_end_chart();
  2165. }
  2166. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_SENT, "");
  2167. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2168. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2169. write_chart_dimension(ect->name, (long long)ect->publish_socket.bytes_sent);
  2170. }
  2171. }
  2172. ebpf_write_end_chart();
  2173. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_RECV, "");
  2174. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2175. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2176. write_chart_dimension(ect->name, (long long)ect->publish_socket.bytes_received);
  2177. }
  2178. }
  2179. ebpf_write_end_chart();
  2180. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_TCP_SEND_CALLS, "");
  2181. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2182. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2183. write_chart_dimension(ect->name, (long long)ect->publish_socket.call_tcp_sent);
  2184. }
  2185. }
  2186. ebpf_write_end_chart();
  2187. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_TCP_RECV_CALLS, "");
  2188. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2189. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2190. write_chart_dimension(ect->name, (long long)ect->publish_socket.call_tcp_received);
  2191. }
  2192. }
  2193. ebpf_write_end_chart();
  2194. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_TCP_RETRANSMIT, "");
  2195. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2196. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2197. write_chart_dimension(ect->name, (long long)ect->publish_socket.retransmit);
  2198. }
  2199. }
  2200. ebpf_write_end_chart();
  2201. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_UDP_SEND_CALLS, "");
  2202. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2203. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2204. write_chart_dimension(ect->name, (long long)ect->publish_socket.call_udp_sent);
  2205. }
  2206. }
  2207. ebpf_write_end_chart();
  2208. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_NET_APPS_BANDWIDTH_UDP_RECV_CALLS, "");
  2209. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2210. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  2211. write_chart_dimension(ect->name, (long long)ect->publish_socket.call_udp_received);
  2212. }
  2213. }
  2214. ebpf_write_end_chart();
  2215. }
  2216. /**
  2217. * Update Cgroup algorithm
  2218. *
  2219. * Change algorithm from absolute to incremental
  2220. */
  2221. void ebpf_socket_update_cgroup_algorithm()
  2222. {
  2223. int i;
  2224. for (i = 0; i < NETDATA_MAX_SOCKET_VECTOR; i++) {
  2225. netdata_publish_syscall_t *ptr = &socket_publish_aggregated[i];
  2226. ptr->algorithm = ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX];
  2227. }
  2228. }
  2229. /**
  2230. * Send data to Netdata calling auxiliary functions.
  2231. *
  2232. * @param update_every value to overwrite the update frequency set by the server.
  2233. */
  2234. static void ebpf_socket_send_cgroup_data(int update_every)
  2235. {
  2236. if (!ebpf_cgroup_pids)
  2237. return;
  2238. pthread_mutex_lock(&mutex_cgroup_shm);
  2239. ebpf_cgroup_target_t *ect;
  2240. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2241. ebpf_socket_sum_cgroup_pids(&ect->publish_socket, ect->pids);
  2242. }
  2243. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  2244. if (has_systemd) {
  2245. if (send_cgroup_chart) {
  2246. ebpf_create_systemd_socket_charts(update_every);
  2247. }
  2248. ebpf_send_systemd_socket_charts();
  2249. }
  2250. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  2251. if (ect->systemd)
  2252. continue;
  2253. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SOCKET_CHART)) {
  2254. ebpf_create_specific_socket_charts(ect->name, update_every);
  2255. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SOCKET_CHART;
  2256. }
  2257. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SOCKET_CHART && ect->updated) {
  2258. ebpf_send_specific_socket_data(ect->name, &ect->publish_socket);
  2259. } else {
  2260. ebpf_obsolete_specific_socket_charts(ect->name, update_every);
  2261. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SOCKET_CHART;
  2262. }
  2263. }
  2264. pthread_mutex_unlock(&mutex_cgroup_shm);
  2265. }
  2266. /*****************************************************************
  2267. *
  2268. * FUNCTIONS WITH THE MAIN LOOP
  2269. *
  2270. *****************************************************************/
  2271. /**
  2272. * Main loop for this collector.
  2273. *
  2274. * @param em the structure with thread information
  2275. */
  2276. static void socket_collector(ebpf_module_t *em)
  2277. {
  2278. heartbeat_t hb;
  2279. heartbeat_init(&hb);
  2280. int cgroups = em->cgroup_charts;
  2281. if (cgroups)
  2282. ebpf_socket_update_cgroup_algorithm();
  2283. int socket_global_enabled = em->global_charts;
  2284. int update_every = em->update_every;
  2285. int maps_per_core = em->maps_per_core;
  2286. int counter = update_every - 1;
  2287. uint32_t running_time = 0;
  2288. uint32_t lifetime = em->lifetime;
  2289. netdata_idx_t *stats = em->hash_table_stats;
  2290. memset(stats, 0, sizeof(em->hash_table_stats));
  2291. while (!ebpf_plugin_exit && running_time < lifetime) {
  2292. (void)heartbeat_next(&hb, USEC_PER_SEC);
  2293. if (ebpf_plugin_exit || ++counter != update_every)
  2294. continue;
  2295. counter = 0;
  2296. netdata_apps_integration_flags_t socket_apps_enabled = em->apps_charts;
  2297. if (socket_global_enabled) {
  2298. read_listen_table();
  2299. ebpf_socket_read_hash_global_tables(stats, maps_per_core);
  2300. }
  2301. pthread_mutex_lock(&collect_data_mutex);
  2302. if (cgroups)
  2303. ebpf_update_socket_cgroup();
  2304. pthread_mutex_lock(&lock);
  2305. if (socket_global_enabled)
  2306. ebpf_socket_send_data(em);
  2307. if (socket_apps_enabled & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  2308. ebpf_socket_send_apps_data(em, apps_groups_root_target);
  2309. #ifdef NETDATA_DEV_MODE
  2310. if (ebpf_aral_socket_pid)
  2311. ebpf_send_data_aral_chart(ebpf_aral_socket_pid, em);
  2312. #endif
  2313. if (cgroups)
  2314. ebpf_socket_send_cgroup_data(update_every);
  2315. fflush(stdout);
  2316. pthread_mutex_unlock(&lock);
  2317. pthread_mutex_unlock(&collect_data_mutex);
  2318. pthread_mutex_lock(&ebpf_exit_cleanup);
  2319. if (running_time && !em->running_time)
  2320. running_time = update_every;
  2321. else
  2322. running_time += update_every;
  2323. em->running_time = running_time;
  2324. pthread_mutex_unlock(&ebpf_exit_cleanup);
  2325. }
  2326. }
  2327. /*****************************************************************
  2328. *
  2329. * FUNCTIONS TO START THREAD
  2330. *
  2331. *****************************************************************/
  2332. /**
  2333. * Initialize vectors used with this thread.
  2334. *
  2335. * We are not testing the return, because callocz does this and shutdown the software
  2336. * case it was not possible to allocate.
  2337. */
  2338. static void ebpf_socket_initialize_global_vectors()
  2339. {
  2340. memset(socket_aggregated_data, 0 ,NETDATA_MAX_SOCKET_VECTOR * sizeof(netdata_syscall_stat_t));
  2341. memset(socket_publish_aggregated, 0 ,NETDATA_MAX_SOCKET_VECTOR * sizeof(netdata_publish_syscall_t));
  2342. socket_hash_values = callocz(ebpf_nprocs, sizeof(netdata_idx_t));
  2343. ebpf_socket_aral_init();
  2344. socket_bandwidth_curr = callocz((size_t)pid_max, sizeof(ebpf_socket_publish_apps_t *));
  2345. aral_socket_table = ebpf_allocate_pid_aral(NETDATA_EBPF_SOCKET_ARAL_TABLE_NAME,
  2346. sizeof(netdata_socket_plus_t));
  2347. socket_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_socket_t));
  2348. ebpf_load_addresses(&tcp_v6_connect_address, -1);
  2349. }
  2350. /*****************************************************************
  2351. *
  2352. * EBPF SOCKET THREAD
  2353. *
  2354. *****************************************************************/
  2355. /**
  2356. * Link dimension name
  2357. *
  2358. * Link user specified names inside a link list.
  2359. *
  2360. * @param port the port number associated to the dimension name.
  2361. * @param hash the calculated hash for the dimension name.
  2362. * @param name the dimension name.
  2363. */
  2364. static void ebpf_link_dimension_name(char *port, uint32_t hash, char *value)
  2365. {
  2366. int test = str2i(port);
  2367. if (test < NETDATA_MINIMUM_PORT_VALUE || test > NETDATA_MAXIMUM_PORT_VALUE){
  2368. netdata_log_error("The dimension given (%s = %s) has an invalid value and it will be ignored.", port, value);
  2369. return;
  2370. }
  2371. ebpf_network_viewer_dim_name_t *w;
  2372. w = callocz(1, sizeof(ebpf_network_viewer_dim_name_t));
  2373. w->name = strdupz(value);
  2374. w->hash = hash;
  2375. w->port = (uint16_t) htons(test);
  2376. ebpf_network_viewer_dim_name_t *names = network_viewer_opt.names;
  2377. if (unlikely(!names)) {
  2378. network_viewer_opt.names = w;
  2379. } else {
  2380. for (; names->next; names = names->next) {
  2381. if (names->port == w->port) {
  2382. netdata_log_info("Duplicated definition for a service, the name %s will be ignored. ", names->name);
  2383. freez(names->name);
  2384. names->name = w->name;
  2385. names->hash = w->hash;
  2386. freez(w);
  2387. return;
  2388. }
  2389. }
  2390. names->next = w;
  2391. }
  2392. #ifdef NETDATA_INTERNAL_CHECKS
  2393. netdata_log_info("Adding values %s( %u) to dimension name list used on network viewer", w->name, htons(w->port));
  2394. #endif
  2395. }
  2396. /**
  2397. * Parse service Name section.
  2398. *
  2399. * This function gets the values that will be used to overwrite dimensions.
  2400. *
  2401. * @param cfg the configuration structure
  2402. */
  2403. void ebpf_parse_service_name_section(struct config *cfg)
  2404. {
  2405. struct section *co = appconfig_get_section(cfg, EBPF_SERVICE_NAME_SECTION);
  2406. if (co) {
  2407. struct config_option *cv;
  2408. for (cv = co->values; cv ; cv = cv->next) {
  2409. ebpf_link_dimension_name(cv->name, cv->hash, cv->value);
  2410. }
  2411. }
  2412. // Always associated the default port to Netdata
  2413. ebpf_network_viewer_dim_name_t *names = network_viewer_opt.names;
  2414. if (names) {
  2415. uint16_t default_port = htons(19999);
  2416. while (names) {
  2417. if (names->port == default_port)
  2418. return;
  2419. names = names->next;
  2420. }
  2421. }
  2422. char *port_string = getenv("NETDATA_LISTEN_PORT");
  2423. if (port_string) {
  2424. // if variable has an invalid value, we assume netdata is using 19999
  2425. int default_port = str2i(port_string);
  2426. if (default_port > 0 && default_port < 65536)
  2427. ebpf_link_dimension_name(port_string, simple_hash(port_string), "Netdata");
  2428. }
  2429. }
  2430. /**
  2431. * Parse table size options
  2432. *
  2433. * @param cfg configuration options read from user file.
  2434. */
  2435. void parse_table_size_options(struct config *cfg)
  2436. {
  2437. socket_maps[NETDATA_SOCKET_OPEN_SOCKET].user_input = (uint32_t) appconfig_get_number(cfg,
  2438. EBPF_GLOBAL_SECTION,
  2439. EBPF_CONFIG_SOCKET_MONITORING_SIZE,
  2440. NETDATA_MAXIMUM_CONNECTIONS_ALLOWED);
  2441. socket_maps[NETDATA_SOCKET_TABLE_UDP].user_input = (uint32_t) appconfig_get_number(cfg,
  2442. EBPF_GLOBAL_SECTION,
  2443. EBPF_CONFIG_UDP_SIZE, NETDATA_MAXIMUM_UDP_CONNECTIONS_ALLOWED);
  2444. }
  2445. /*
  2446. * Load BPF
  2447. *
  2448. * Load BPF files.
  2449. *
  2450. * @param em the structure with configuration
  2451. */
  2452. static int ebpf_socket_load_bpf(ebpf_module_t *em)
  2453. {
  2454. #ifdef LIBBPF_MAJOR_VERSION
  2455. ebpf_define_map_type(em->maps, em->maps_per_core, running_on_kernel);
  2456. #endif
  2457. int ret = 0;
  2458. if (em->load & EBPF_LOAD_LEGACY) {
  2459. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  2460. if (!em->probe_links) {
  2461. ret = -1;
  2462. }
  2463. }
  2464. #ifdef LIBBPF_MAJOR_VERSION
  2465. else {
  2466. socket_bpf_obj = socket_bpf__open();
  2467. if (!socket_bpf_obj)
  2468. ret = -1;
  2469. else
  2470. ret = ebpf_socket_load_and_attach(socket_bpf_obj, em);
  2471. }
  2472. #endif
  2473. if (ret) {
  2474. netdata_log_error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->info.thread_name);
  2475. }
  2476. return ret;
  2477. }
  2478. /**
  2479. * Socket thread
  2480. *
  2481. * Thread used to generate socket charts.
  2482. *
  2483. * @param ptr a pointer to `struct ebpf_module`
  2484. *
  2485. * @return It always return NULL
  2486. */
  2487. void *ebpf_socket_thread(void *ptr)
  2488. {
  2489. netdata_thread_cleanup_push(ebpf_socket_exit, ptr);
  2490. ebpf_module_t *em = (ebpf_module_t *)ptr;
  2491. if (em->enabled > NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
  2492. collector_error("There is already a thread %s running", em->info.thread_name);
  2493. return NULL;
  2494. }
  2495. em->maps = socket_maps;
  2496. rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
  2497. // It was not enabled from main config file (ebpf.d.conf)
  2498. if (!network_viewer_opt.enabled)
  2499. network_viewer_opt.enabled = appconfig_get_boolean(&socket_config, EBPF_NETWORK_VIEWER_SECTION, "enabled",
  2500. CONFIG_BOOLEAN_YES);
  2501. rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
  2502. parse_table_size_options(&socket_config);
  2503. ebpf_socket_initialize_global_vectors();
  2504. if (running_on_kernel < NETDATA_EBPF_KERNEL_5_0)
  2505. em->mode = MODE_ENTRY;
  2506. #ifdef LIBBPF_MAJOR_VERSION
  2507. ebpf_adjust_thread_load(em, default_btf);
  2508. #endif
  2509. if (ebpf_socket_load_bpf(em)) {
  2510. pthread_mutex_unlock(&lock);
  2511. goto endsocket;
  2512. }
  2513. int algorithms[NETDATA_MAX_SOCKET_VECTOR] = {
  2514. NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX,
  2515. NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX,
  2516. NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_ABSOLUTE_IDX, NETDATA_EBPF_INCREMENTAL_IDX,
  2517. NETDATA_EBPF_INCREMENTAL_IDX
  2518. };
  2519. ebpf_global_labels(
  2520. socket_aggregated_data, socket_publish_aggregated, socket_dimension_names, socket_id_names,
  2521. algorithms, NETDATA_MAX_SOCKET_VECTOR);
  2522. ebpf_read_socket.thread = mallocz(sizeof(netdata_thread_t));
  2523. netdata_thread_create(ebpf_read_socket.thread,
  2524. ebpf_read_socket.name,
  2525. NETDATA_THREAD_OPTION_DEFAULT,
  2526. ebpf_read_socket_thread,
  2527. em);
  2528. pthread_mutex_lock(&lock);
  2529. ebpf_socket_create_global_charts(em);
  2530. ebpf_update_stats(&plugin_statistics, em);
  2531. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_ADD);
  2532. #ifdef NETDATA_DEV_MODE
  2533. if (ebpf_aral_socket_pid)
  2534. socket_disable_priority = ebpf_statistic_create_aral_chart(NETDATA_EBPF_SOCKET_ARAL_NAME, em);
  2535. #endif
  2536. pthread_mutex_unlock(&lock);
  2537. socket_collector(em);
  2538. endsocket:
  2539. ebpf_update_disabled_plugin_stats(em);
  2540. netdata_thread_cleanup_pop(1);
  2541. return NULL;
  2542. }