ebpf_fd.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_fd.h"
  4. static char *fd_dimension_names[NETDATA_FD_SYSCALL_END] = { "open", "close" };
  5. static char *fd_id_names[NETDATA_FD_SYSCALL_END] = { "do_sys_open", "__close_fd" };
  6. static netdata_syscall_stat_t fd_aggregated_data[NETDATA_FD_SYSCALL_END];
  7. static netdata_publish_syscall_t fd_publish_aggregated[NETDATA_FD_SYSCALL_END];
  8. static ebpf_local_maps_t fd_maps[] = {{.name = "tbl_fd_pid", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  9. .user_input = 0,
  10. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  11. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  12. {.name = "tbl_fd_global", .internal_input = NETDATA_KEY_END_VECTOR,
  13. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  14. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  15. {.name = "fd_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_CONTROLLER,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  19. {.name = NULL, .internal_input = 0, .user_input = 0,
  20. .type = NETDATA_EBPF_MAP_CONTROLLER,
  21. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  22. struct config fd_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  23. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  24. .rwlock = AVL_LOCK_INITIALIZER } };
  25. static struct bpf_link **probe_links = NULL;
  26. static struct bpf_object *objects = NULL;
  27. struct netdata_static_thread fd_thread = {"FD KERNEL", NULL, NULL, 1, NULL,
  28. NULL, NULL};
  29. static int read_thread_closed = 1;
  30. static netdata_idx_t fd_hash_values[NETDATA_FD_COUNTER];
  31. static netdata_idx_t *fd_values = NULL;
  32. netdata_fd_stat_t *fd_vector = NULL;
  33. netdata_fd_stat_t **fd_pid = NULL;
  34. /*****************************************************************
  35. *
  36. * FUNCTIONS TO CLOSE THE THREAD
  37. *
  38. *****************************************************************/
  39. /**
  40. * Clean up the main thread.
  41. *
  42. * @param ptr thread data.
  43. */
  44. static void ebpf_fd_cleanup(void *ptr)
  45. {
  46. ebpf_module_t *em = (ebpf_module_t *)ptr;
  47. if (!em->enabled)
  48. return;
  49. heartbeat_t hb;
  50. heartbeat_init(&hb);
  51. uint32_t tick = 2 * USEC_PER_MS;
  52. while (!read_thread_closed) {
  53. usec_t dt = heartbeat_next(&hb, tick);
  54. UNUSED(dt);
  55. }
  56. ebpf_cleanup_publish_syscall(fd_publish_aggregated);
  57. freez(fd_thread.thread);
  58. freez(fd_values);
  59. freez(fd_vector);
  60. if (probe_links) {
  61. struct bpf_program *prog;
  62. size_t i = 0 ;
  63. bpf_object__for_each_program(prog, objects) {
  64. bpf_link__destroy(probe_links[i]);
  65. i++;
  66. }
  67. if (objects)
  68. bpf_object__close(objects);
  69. }
  70. }
  71. /*****************************************************************
  72. *
  73. * MAIN LOOP
  74. *
  75. *****************************************************************/
  76. /**
  77. * Send data to Netdata calling auxiliary functions.
  78. *
  79. * @param em the structure with thread information
  80. */
  81. static void ebpf_fd_send_data(ebpf_module_t *em)
  82. {
  83. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].ncall = fd_hash_values[NETDATA_KEY_CALLS_DO_SYS_OPEN];
  84. fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].nerr = fd_hash_values[NETDATA_KEY_ERROR_DO_SYS_OPEN];
  85. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].ncall = fd_hash_values[NETDATA_KEY_CALLS_CLOSE_FD];
  86. fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].nerr = fd_hash_values[NETDATA_KEY_ERROR_CLOSE_FD];
  87. write_count_chart(NETDATA_FILE_OPEN_CLOSE_COUNT, NETDATA_FILESYSTEM_FAMILY, fd_publish_aggregated,
  88. NETDATA_FD_SYSCALL_END);
  89. if (em->mode < MODE_ENTRY) {
  90. write_err_chart(NETDATA_FILE_OPEN_ERR_COUNT, NETDATA_FILESYSTEM_FAMILY,
  91. fd_publish_aggregated, NETDATA_FD_SYSCALL_END);
  92. }
  93. }
  94. /**
  95. * Read global counter
  96. *
  97. * Read the table with number of calls for all functions
  98. */
  99. static void read_global_table()
  100. {
  101. uint32_t idx;
  102. netdata_idx_t *val = fd_hash_values;
  103. netdata_idx_t *stored = fd_values;
  104. int fd = fd_maps[NETDATA_FD_GLOBAL_STATS].map_fd;
  105. for (idx = NETDATA_KEY_CALLS_DO_SYS_OPEN; idx < NETDATA_FD_COUNTER; idx++) {
  106. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  107. int i;
  108. int end = ebpf_nprocs;
  109. netdata_idx_t total = 0;
  110. for (i = 0; i < end; i++)
  111. total += stored[i];
  112. val[idx] = total;
  113. }
  114. }
  115. }
  116. /**
  117. * File descriptor read hash
  118. *
  119. * This is the thread callback.
  120. * This thread is necessary, because we cannot freeze the whole plugin to read the data.
  121. *
  122. * @param ptr It is a NULL value for this thread.
  123. *
  124. * @return It always returns NULL.
  125. */
  126. void *ebpf_fd_read_hash(void *ptr)
  127. {
  128. read_thread_closed = 0;
  129. heartbeat_t hb;
  130. heartbeat_init(&hb);
  131. ebpf_module_t *em = (ebpf_module_t *)ptr;
  132. usec_t step = NETDATA_FD_SLEEP_MS * em->update_every;
  133. while (!close_ebpf_plugin) {
  134. usec_t dt = heartbeat_next(&hb, step);
  135. (void)dt;
  136. read_global_table();
  137. }
  138. read_thread_closed = 1;
  139. return NULL;
  140. }
  141. /**
  142. * Apps Accumulator
  143. *
  144. * Sum all values read from kernel and store in the first address.
  145. *
  146. * @param out the vector with read values.
  147. */
  148. static void fd_apps_accumulator(netdata_fd_stat_t *out)
  149. {
  150. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  151. netdata_fd_stat_t *total = &out[0];
  152. for (i = 1; i < end; i++) {
  153. netdata_fd_stat_t *w = &out[i];
  154. total->open_call += w->open_call;
  155. total->close_call += w->close_call;
  156. total->open_err += w->open_err;
  157. total->close_err += w->close_err;
  158. }
  159. }
  160. /**
  161. * Fill PID
  162. *
  163. * Fill PID structures
  164. *
  165. * @param current_pid pid that we are collecting data
  166. * @param out values read from hash tables;
  167. */
  168. static void fd_fill_pid(uint32_t current_pid, netdata_fd_stat_t *publish)
  169. {
  170. netdata_fd_stat_t *curr = fd_pid[current_pid];
  171. if (!curr) {
  172. curr = callocz(1, sizeof(netdata_fd_stat_t));
  173. fd_pid[current_pid] = curr;
  174. }
  175. memcpy(curr, &publish[0], sizeof(netdata_fd_stat_t));
  176. }
  177. /**
  178. * Read APPS table
  179. *
  180. * Read the apps table and store data inside the structure.
  181. */
  182. static void read_apps_table()
  183. {
  184. netdata_fd_stat_t *fv = fd_vector;
  185. uint32_t key;
  186. struct pid_stat *pids = root_of_pids;
  187. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  188. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  189. while (pids) {
  190. key = pids->pid;
  191. if (bpf_map_lookup_elem(fd, &key, fv)) {
  192. pids = pids->next;
  193. continue;
  194. }
  195. fd_apps_accumulator(fv);
  196. fd_fill_pid(key, fv);
  197. // We are cleaning to avoid passing data read from one process to other.
  198. memset(fv, 0, length);
  199. pids = pids->next;
  200. }
  201. }
  202. /**
  203. * Update cgroup
  204. *
  205. * Update cgroup data based in
  206. */
  207. static void ebpf_update_fd_cgroup()
  208. {
  209. ebpf_cgroup_target_t *ect ;
  210. netdata_fd_stat_t *fv = fd_vector;
  211. int fd = fd_maps[NETDATA_FD_PID_STATS].map_fd;
  212. size_t length = sizeof(netdata_fd_stat_t) * ebpf_nprocs;
  213. pthread_mutex_lock(&mutex_cgroup_shm);
  214. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  215. struct pid_on_target2 *pids;
  216. for (pids = ect->pids; pids; pids = pids->next) {
  217. int pid = pids->pid;
  218. netdata_fd_stat_t *out = &pids->fd;
  219. if (likely(fd_pid) && fd_pid[pid]) {
  220. netdata_fd_stat_t *in = fd_pid[pid];
  221. memcpy(out, in, sizeof(netdata_fd_stat_t));
  222. } else {
  223. memset(fv, 0, length);
  224. if (!bpf_map_lookup_elem(fd, &pid, fv)) {
  225. fd_apps_accumulator(fv);
  226. memcpy(out, fv, sizeof(netdata_fd_stat_t));
  227. }
  228. }
  229. }
  230. }
  231. pthread_mutex_unlock(&mutex_cgroup_shm);
  232. }
  233. /**
  234. * Sum PIDs
  235. *
  236. * Sum values for all targets.
  237. *
  238. * @param fd the output
  239. * @param root list of pids
  240. */
  241. static void ebpf_fd_sum_pids(netdata_fd_stat_t *fd, struct pid_on_target *root)
  242. {
  243. uint32_t open_call = 0;
  244. uint32_t close_call = 0;
  245. uint32_t open_err = 0;
  246. uint32_t close_err = 0;
  247. while (root) {
  248. int32_t pid = root->pid;
  249. netdata_fd_stat_t *w = fd_pid[pid];
  250. if (w) {
  251. open_call += w->open_call;
  252. close_call += w->close_call;
  253. open_err += w->open_err;
  254. close_err += w->close_err;
  255. }
  256. root = root->next;
  257. }
  258. // These conditions were added, because we are using incremental algorithm
  259. fd->open_call = (open_call >= fd->open_call) ? open_call : fd->open_call;
  260. fd->close_call = (close_call >= fd->close_call) ? close_call : fd->close_call;
  261. fd->open_err = (open_err >= fd->open_err) ? open_err : fd->open_err;
  262. fd->close_err = (close_err >= fd->close_err) ? close_err : fd->close_err;
  263. }
  264. /**
  265. * Send data to Netdata calling auxiliary functions.
  266. *
  267. * @param em the structure with thread information
  268. * @param root the target list.
  269. */
  270. void ebpf_fd_send_apps_data(ebpf_module_t *em, struct target *root)
  271. {
  272. struct target *w;
  273. for (w = root; w; w = w->next) {
  274. if (unlikely(w->exposed && w->processes)) {
  275. ebpf_fd_sum_pids(&w->fd, w->root_pid);
  276. }
  277. }
  278. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  279. for (w = root; w; w = w->next) {
  280. if (unlikely(w->exposed && w->processes)) {
  281. write_chart_dimension(w->name, w->fd.open_call);
  282. }
  283. }
  284. write_end_chart();
  285. if (em->mode < MODE_ENTRY) {
  286. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  287. for (w = root; w; w = w->next) {
  288. if (unlikely(w->exposed && w->processes)) {
  289. write_chart_dimension(w->name, w->fd.open_err);
  290. }
  291. }
  292. write_end_chart();
  293. }
  294. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  295. for (w = root; w; w = w->next) {
  296. if (unlikely(w->exposed && w->processes)) {
  297. write_chart_dimension(w->name, w->fd.close_call);
  298. }
  299. }
  300. write_end_chart();
  301. if (em->mode < MODE_ENTRY) {
  302. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  303. for (w = root; w; w = w->next) {
  304. if (unlikely(w->exposed && w->processes)) {
  305. write_chart_dimension(w->name, w->fd.close_err);
  306. }
  307. }
  308. write_end_chart();
  309. }
  310. }
  311. /**
  312. * Sum PIDs
  313. *
  314. * Sum values for all targets.
  315. *
  316. * @param fd structure used to store data
  317. * @param pids input data
  318. */
  319. static void ebpf_fd_sum_cgroup_pids(netdata_fd_stat_t *fd, struct pid_on_target2 *pids)
  320. {
  321. netdata_fd_stat_t accumulator;
  322. memset(&accumulator, 0, sizeof(accumulator));
  323. while (pids) {
  324. netdata_fd_stat_t *w = &pids->fd;
  325. accumulator.open_err += w->open_err;
  326. accumulator.open_call += w->open_call;
  327. accumulator.close_call += w->close_call;
  328. accumulator.close_err += w->close_err;
  329. pids = pids->next;
  330. }
  331. fd->open_call = (accumulator.open_call >= fd->open_call) ? accumulator.open_call : fd->open_call;
  332. fd->open_err = (accumulator.open_err >= fd->open_err) ? accumulator.open_err : fd->open_err;
  333. fd->close_call = (accumulator.close_call >= fd->close_call) ? accumulator.close_call : fd->close_call;
  334. fd->close_err = (accumulator.close_err >= fd->close_err) ? accumulator.close_err : fd->close_err;
  335. }
  336. /**
  337. * Create specific file descriptor charts
  338. *
  339. * Create charts for cgroup/application.
  340. *
  341. * @param type the chart type.
  342. * @param em the main thread structure.
  343. */
  344. static void ebpf_create_specific_fd_charts(char *type, ebpf_module_t *em)
  345. {
  346. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  347. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  348. NETDATA_CGROUP_FD_OPEN_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  349. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400,
  350. ebpf_create_global_dimension,
  351. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  352. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  353. if (em->mode < MODE_ENTRY) {
  354. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  355. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  356. NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  357. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401,
  358. ebpf_create_global_dimension,
  359. &fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN],
  360. 1, em->update_every,
  361. NETDATA_EBPF_MODULE_NAME_SWAP);
  362. }
  363. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  364. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  365. NETDATA_CGROUP_FD_CLOSE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  366. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402,
  367. ebpf_create_global_dimension,
  368. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  369. 1, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  370. if (em->mode < MODE_ENTRY) {
  371. ebpf_create_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  372. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  373. NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  374. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403,
  375. ebpf_create_global_dimension,
  376. &fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE],
  377. 1, em->update_every,
  378. NETDATA_EBPF_MODULE_NAME_SWAP);
  379. }
  380. }
  381. /**
  382. * Obsolete specific file descriptor charts
  383. *
  384. * Obsolete charts for cgroup/application.
  385. *
  386. * @param type the chart type.
  387. * @param em the main thread structure.
  388. */
  389. static void ebpf_obsolete_specific_fd_charts(char *type, ebpf_module_t *em)
  390. {
  391. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  392. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  393. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_CONTEXT,
  394. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5400, em->update_every);
  395. if (em->mode < MODE_ENTRY) {
  396. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  397. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  398. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_OPEN_ERR_CONTEXT,
  399. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5401, em->update_every);
  400. }
  401. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  402. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  403. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_CONTEXT,
  404. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5402, em->update_every);
  405. if (em->mode < MODE_ENTRY) {
  406. ebpf_write_chart_obsolete(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  407. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_GROUP,
  408. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_FD_CLOSE_ERR_CONTEXT,
  409. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5403, em->update_every);
  410. }
  411. }
  412. /*
  413. * Send specific file descriptor data
  414. *
  415. * Send data for specific cgroup/apps.
  416. *
  417. * @param type chart type
  418. * @param values structure with values that will be sent to netdata
  419. */
  420. static void ebpf_send_specific_fd_data(char *type, netdata_fd_stat_t *values, ebpf_module_t *em)
  421. {
  422. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN);
  423. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_call);
  424. write_end_chart();
  425. if (em->mode < MODE_ENTRY) {
  426. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  427. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_OPEN].name, (long long)values->open_err);
  428. write_end_chart();
  429. }
  430. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  431. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_call);
  432. write_end_chart();
  433. if (em->mode < MODE_ENTRY) {
  434. write_begin_chart(type, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  435. write_chart_dimension(fd_publish_aggregated[NETDATA_FD_SYSCALL_CLOSE].name, (long long)values->close_err);
  436. write_end_chart();
  437. }
  438. }
  439. /**
  440. * Create systemd file descriptor charts
  441. *
  442. * Create charts when systemd is enabled
  443. *
  444. * @param em the main collector structure
  445. **/
  446. static void ebpf_create_systemd_fd_charts(ebpf_module_t *em)
  447. {
  448. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN, "Number of open files",
  449. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  450. NETDATA_EBPF_CHART_TYPE_STACKED, 20061,
  451. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_CONTEXT,
  452. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  453. if (em->mode < MODE_ENTRY) {
  454. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR, "Fails to open files",
  455. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  456. NETDATA_EBPF_CHART_TYPE_STACKED, 20062,
  457. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_OPEN_ERR_CONTEXT,
  458. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  459. }
  460. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSED, "Files closed",
  461. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  462. NETDATA_EBPF_CHART_TYPE_STACKED, 20063,
  463. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_CONTEXT,
  464. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  465. if (em->mode < MODE_ENTRY) {
  466. ebpf_create_charts_on_systemd(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR, "Fails to close files",
  467. EBPF_COMMON_DIMENSION_CALL, NETDATA_APPS_FILE_CGROUP_GROUP,
  468. NETDATA_EBPF_CHART_TYPE_STACKED, 20064,
  469. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_FD_CLOSE_ERR_CONTEXT,
  470. NETDATA_EBPF_MODULE_NAME_PROCESS, em->update_every);
  471. }
  472. }
  473. /**
  474. * Send Systemd charts
  475. *
  476. * Send collected data to Netdata.
  477. *
  478. * @param em the main collector structure
  479. *
  480. * @return It returns the status for chart creation, if it is necessary to remove a specific dimension zero is returned
  481. * otherwise function returns 1 to avoid chart recreation
  482. */
  483. static int ebpf_send_systemd_fd_charts(ebpf_module_t *em)
  484. {
  485. int ret = 1;
  486. ebpf_cgroup_target_t *ect;
  487. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN);
  488. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  489. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  490. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_call);
  491. } else
  492. ret = 0;
  493. }
  494. write_end_chart();
  495. if (em->mode < MODE_ENTRY) {
  496. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR);
  497. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  498. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  499. write_chart_dimension(ect->name, ect->publish_systemd_fd.open_err);
  500. }
  501. }
  502. write_end_chart();
  503. }
  504. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSED);
  505. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  506. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  507. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_call);
  508. }
  509. }
  510. write_end_chart();
  511. if (em->mode < MODE_ENTRY) {
  512. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR);
  513. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  514. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  515. write_chart_dimension(ect->name, ect->publish_systemd_fd.close_err);
  516. }
  517. }
  518. write_end_chart();
  519. }
  520. return ret;
  521. }
  522. /**
  523. * Send data to Netdata calling auxiliary functions.
  524. *
  525. * @param em the main collector structure
  526. */
  527. static void ebpf_fd_send_cgroup_data(ebpf_module_t *em)
  528. {
  529. if (!ebpf_cgroup_pids)
  530. return;
  531. pthread_mutex_lock(&mutex_cgroup_shm);
  532. ebpf_cgroup_target_t *ect;
  533. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  534. ebpf_fd_sum_cgroup_pids(&ect->publish_systemd_fd, ect->pids);
  535. }
  536. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  537. if (has_systemd) {
  538. static int systemd_charts = 0;
  539. if (!systemd_charts) {
  540. ebpf_create_systemd_fd_charts(em);
  541. systemd_charts = 1;
  542. }
  543. systemd_charts = ebpf_send_systemd_fd_charts(em);
  544. }
  545. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  546. if (ect->systemd)
  547. continue;
  548. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART) && ect->updated) {
  549. ebpf_create_specific_fd_charts(ect->name, em);
  550. ect->flags |= NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  551. }
  552. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_FD_CHART ) {
  553. if (ect->updated) {
  554. ebpf_send_specific_fd_data(ect->name, &ect->publish_systemd_fd, em);
  555. } else {
  556. ebpf_obsolete_specific_fd_charts(ect->name, em);
  557. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_FD_CHART;
  558. }
  559. }
  560. }
  561. pthread_mutex_unlock(&mutex_cgroup_shm);
  562. }
  563. /**
  564. * Main loop for this collector.
  565. */
  566. static void fd_collector(ebpf_module_t *em)
  567. {
  568. fd_thread.thread = mallocz(sizeof(netdata_thread_t));
  569. fd_thread.start_routine = ebpf_fd_read_hash;
  570. netdata_thread_create(fd_thread.thread, fd_thread.name, NETDATA_THREAD_OPTION_JOINABLE,
  571. ebpf_fd_read_hash, em);
  572. int apps = em->apps_charts;
  573. int cgroups = em->cgroup_charts;
  574. int update_every = em->update_every;
  575. int counter = update_every - 1;
  576. while (!close_ebpf_plugin) {
  577. pthread_mutex_lock(&collect_data_mutex);
  578. pthread_cond_wait(&collect_data_cond_var, &collect_data_mutex);
  579. if (++counter == update_every) {
  580. counter = 0;
  581. if (apps)
  582. read_apps_table();
  583. if (cgroups)
  584. ebpf_update_fd_cgroup();
  585. pthread_mutex_lock(&lock);
  586. ebpf_fd_send_data(em);
  587. if (apps)
  588. ebpf_fd_send_apps_data(em, apps_groups_root_target);
  589. if (cgroups)
  590. ebpf_fd_send_cgroup_data(em);
  591. pthread_mutex_unlock(&lock);
  592. }
  593. pthread_mutex_unlock(&collect_data_mutex);
  594. }
  595. }
  596. /*****************************************************************
  597. *
  598. * CREATE CHARTS
  599. *
  600. *****************************************************************/
  601. /**
  602. * Create apps charts
  603. *
  604. * Call ebpf_create_chart to create the charts on apps submenu.
  605. *
  606. * @param em a pointer to the structure with the default values.
  607. */
  608. void ebpf_fd_create_apps_charts(struct ebpf_module *em, void *ptr)
  609. {
  610. struct target *root = ptr;
  611. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN,
  612. "Number of open files",
  613. EBPF_COMMON_DIMENSION_CALL,
  614. NETDATA_APPS_FILE_GROUP,
  615. NETDATA_EBPF_CHART_TYPE_STACKED,
  616. 20061,
  617. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  618. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  619. if (em->mode < MODE_ENTRY) {
  620. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_OPEN_ERROR,
  621. "Fails to open files",
  622. EBPF_COMMON_DIMENSION_CALL,
  623. NETDATA_APPS_FILE_GROUP,
  624. NETDATA_EBPF_CHART_TYPE_STACKED,
  625. 20062,
  626. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  627. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  628. }
  629. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSED,
  630. "Files closed",
  631. EBPF_COMMON_DIMENSION_CALL,
  632. NETDATA_APPS_FILE_GROUP,
  633. NETDATA_EBPF_CHART_TYPE_STACKED,
  634. 20063,
  635. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  636. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  637. if (em->mode < MODE_ENTRY) {
  638. ebpf_create_charts_on_apps(NETDATA_SYSCALL_APPS_FILE_CLOSE_ERROR,
  639. "Fails to close files",
  640. EBPF_COMMON_DIMENSION_CALL,
  641. NETDATA_APPS_FILE_GROUP,
  642. NETDATA_EBPF_CHART_TYPE_STACKED,
  643. 20064,
  644. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  645. root, em->update_every, NETDATA_EBPF_MODULE_NAME_PROCESS);
  646. }
  647. }
  648. /**
  649. * Create global charts
  650. *
  651. * Call ebpf_create_chart to create the charts for the collector.
  652. *
  653. * @param em a pointer to the structure with the default values.
  654. */
  655. static void ebpf_create_fd_global_charts(ebpf_module_t *em)
  656. {
  657. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  658. NETDATA_FILE_OPEN_CLOSE_COUNT,
  659. "Open and close calls",
  660. EBPF_COMMON_DIMENSION_CALL,
  661. NETDATA_FILE_GROUP,
  662. NULL,
  663. NETDATA_EBPF_CHART_TYPE_LINE,
  664. NETDATA_CHART_PRIO_EBPF_FD_CHARTS,
  665. ebpf_create_global_dimension,
  666. fd_publish_aggregated,
  667. NETDATA_FD_SYSCALL_END,
  668. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  669. if (em->mode < MODE_ENTRY) {
  670. ebpf_create_chart(NETDATA_FILESYSTEM_FAMILY,
  671. NETDATA_FILE_OPEN_ERR_COUNT,
  672. "Open fails",
  673. EBPF_COMMON_DIMENSION_CALL,
  674. NETDATA_FILE_GROUP,
  675. NULL,
  676. NETDATA_EBPF_CHART_TYPE_LINE,
  677. NETDATA_CHART_PRIO_EBPF_FD_CHARTS + 1,
  678. ebpf_create_global_dimension,
  679. fd_publish_aggregated,
  680. NETDATA_FD_SYSCALL_END,
  681. em->update_every, NETDATA_EBPF_MODULE_NAME_FD);
  682. }
  683. }
  684. /*****************************************************************
  685. *
  686. * MAIN THREAD
  687. *
  688. *****************************************************************/
  689. /**
  690. * Allocate vectors used with this thread.
  691. *
  692. * We are not testing the return, because callocz does this and shutdown the software
  693. * case it was not possible to allocate.
  694. *
  695. * @param apps is apps enabled?
  696. */
  697. static void ebpf_fd_allocate_global_vectors(int apps)
  698. {
  699. if (apps)
  700. fd_pid = callocz((size_t)pid_max, sizeof(netdata_fd_stat_t *));
  701. fd_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_fd_stat_t));
  702. fd_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  703. }
  704. /**
  705. * Directory Cache thread
  706. *
  707. * Thread used to make dcstat thread
  708. *
  709. * @param ptr a pointer to `struct ebpf_module`
  710. *
  711. * @return It always returns NULL
  712. */
  713. void *ebpf_fd_thread(void *ptr)
  714. {
  715. netdata_thread_cleanup_push(ebpf_fd_cleanup, ptr);
  716. ebpf_module_t *em = (ebpf_module_t *)ptr;
  717. em->maps = fd_maps;
  718. if (!em->enabled)
  719. goto endfd;
  720. ebpf_fd_allocate_global_vectors(em->apps_charts);
  721. probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &objects);
  722. if (!probe_links) {
  723. em->enabled = CONFIG_BOOLEAN_NO;
  724. goto endfd;
  725. }
  726. int algorithms[NETDATA_FD_SYSCALL_END] = {
  727. NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX
  728. };
  729. ebpf_global_labels(fd_aggregated_data, fd_publish_aggregated, fd_dimension_names, fd_id_names,
  730. algorithms, NETDATA_FD_SYSCALL_END);
  731. pthread_mutex_lock(&lock);
  732. ebpf_create_fd_global_charts(em);
  733. ebpf_update_stats(&plugin_statistics, em);
  734. pthread_mutex_unlock(&lock);
  735. fd_collector(em);
  736. endfd:
  737. if (!em->enabled)
  738. ebpf_update_disabled_plugin_stats(em);
  739. netdata_thread_cleanup_pop(1);
  740. return NULL;
  741. }