ebpf_mount.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_mount.h"
  4. static ebpf_local_maps_t mount_maps[] = {{.name = "tbl_mount", .internal_input = NETDATA_MOUNT_END,
  5. .user_input = 0, .type = NETDATA_EBPF_MAP_STATIC,
  6. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  7. {.name = NULL, .internal_input = 0, .user_input = 0,
  8. .type = NETDATA_EBPF_MAP_CONTROLLER,
  9. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED}};
  10. static char *mount_dimension_name[NETDATA_EBPF_MOUNT_SYSCALL] = { "mount", "umount" };
  11. static netdata_syscall_stat_t mount_aggregated_data[NETDATA_EBPF_MOUNT_SYSCALL];
  12. static netdata_publish_syscall_t mount_publish_aggregated[NETDATA_EBPF_MOUNT_SYSCALL];
  13. struct config mount_config = { .first_section = NULL, .last_section = NULL, .mutex = NETDATA_MUTEX_INITIALIZER,
  14. .index = {.avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  15. .rwlock = AVL_LOCK_INITIALIZER } };
  16. static int read_thread_closed = 1;
  17. static netdata_idx_t *mount_values = NULL;
  18. static struct bpf_link **probe_links = NULL;
  19. static struct bpf_object *objects = NULL;
  20. static netdata_idx_t mount_hash_values[NETDATA_MOUNT_END];
  21. struct netdata_static_thread mount_thread = {"MOUNT KERNEL",
  22. NULL, NULL, 1, NULL,
  23. NULL, NULL};
  24. netdata_ebpf_targets_t mount_targets[] = { {.name = "mount", .mode = EBPF_LOAD_TRAMPOLINE},
  25. {.name = "umount", .mode = EBPF_LOAD_TRAMPOLINE},
  26. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  27. #ifdef LIBBPF_MAJOR_VERSION
  28. #include "includes/mount.skel.h" // BTF code
  29. static struct mount_bpf *bpf_obj = NULL;
  30. /*****************************************************************
  31. *
  32. * BTF FUNCTIONS
  33. *
  34. *****************************************************************/
  35. /*
  36. * Disable probe
  37. *
  38. * Disable all probes to use exclusively another method.
  39. *
  40. * @param obj is the main structure for bpf objects.
  41. */
  42. static inline void ebpf_mount_disable_probe(struct mount_bpf *obj)
  43. {
  44. bpf_program__set_autoload(obj->progs.netdata_mount_probe, false);
  45. bpf_program__set_autoload(obj->progs.netdata_umount_probe, false);
  46. bpf_program__set_autoload(obj->progs.netdata_mount_retprobe, false);
  47. bpf_program__set_autoload(obj->progs.netdata_umount_retprobe, false);
  48. }
  49. /*
  50. * Disable tracepoint
  51. *
  52. * Disable all tracepoints to use exclusively another method.
  53. *
  54. * @param obj is the main structure for bpf objects.
  55. */
  56. static inline void ebpf_mount_disable_tracepoint(struct mount_bpf *obj)
  57. {
  58. bpf_program__set_autoload(obj->progs.netdata_mount_exit, false);
  59. bpf_program__set_autoload(obj->progs.netdata_umount_exit, false);
  60. }
  61. /*
  62. * Disable trampoline
  63. *
  64. * Disable all trampoline to use exclusively another method.
  65. *
  66. * @param obj is the main structure for bpf objects.
  67. */
  68. static inline void ebpf_mount_disable_trampoline(struct mount_bpf *obj)
  69. {
  70. bpf_program__set_autoload(obj->progs.netdata_mount_fentry, false);
  71. bpf_program__set_autoload(obj->progs.netdata_umount_fentry, false);
  72. bpf_program__set_autoload(obj->progs.netdata_mount_fexit, false);
  73. bpf_program__set_autoload(obj->progs.netdata_umount_fexit, false);
  74. }
  75. /**
  76. * Set trampoline target
  77. *
  78. * Set the targets we will monitor.
  79. *
  80. * @param obj is the main structure for bpf objects.
  81. */
  82. static inline void netdata_set_trampoline_target(struct mount_bpf *obj)
  83. {
  84. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  85. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  86. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  87. bpf_program__set_attach_target(obj->progs.netdata_mount_fentry, 0,
  88. syscall);
  89. bpf_program__set_attach_target(obj->progs.netdata_mount_fexit, 0,
  90. syscall);
  91. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  92. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  93. bpf_program__set_attach_target(obj->progs.netdata_umount_fentry, 0,
  94. syscall);
  95. bpf_program__set_attach_target(obj->progs.netdata_umount_fexit, 0,
  96. syscall);
  97. }
  98. /**
  99. * Mount Attach Probe
  100. *
  101. * Attach probes to target
  102. *
  103. * @param obj is the main structure for bpf objects.
  104. *
  105. * @return It returns 0 on success and -1 otherwise.
  106. */
  107. static int ebpf_mount_attach_probe(struct mount_bpf *obj)
  108. {
  109. char syscall[NETDATA_EBPF_MAX_SYSCALL_LENGTH + 1];
  110. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  111. mount_targets[NETDATA_MOUNT_SYSCALL].name, running_on_kernel);
  112. obj->links.netdata_mount_probe = bpf_program__attach_kprobe(obj->progs.netdata_mount_probe,
  113. false, syscall);
  114. int ret = (int)libbpf_get_error(obj->links.netdata_mount_probe);
  115. if (ret)
  116. return -1;
  117. obj->links.netdata_mount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_mount_retprobe,
  118. true, syscall);
  119. ret = (int)libbpf_get_error(obj->links.netdata_mount_retprobe);
  120. if (ret)
  121. return -1;
  122. ebpf_select_host_prefix(syscall, NETDATA_EBPF_MAX_SYSCALL_LENGTH,
  123. mount_targets[NETDATA_UMOUNT_SYSCALL].name, running_on_kernel);
  124. obj->links.netdata_umount_probe = bpf_program__attach_kprobe(obj->progs.netdata_umount_probe,
  125. false, syscall);
  126. ret = (int)libbpf_get_error(obj->links.netdata_umount_probe);
  127. if (ret)
  128. return -1;
  129. obj->links.netdata_umount_retprobe = bpf_program__attach_kprobe(obj->progs.netdata_umount_retprobe,
  130. true, syscall);
  131. ret = (int)libbpf_get_error(obj->links.netdata_umount_retprobe);
  132. if (ret)
  133. return -1;
  134. return 0;
  135. }
  136. /**
  137. * Set hash tables
  138. *
  139. * Set the values for maps according the value given by kernel.
  140. *
  141. * @param obj is the main structure for bpf objects.
  142. */
  143. static void ebpf_mount_set_hash_tables(struct mount_bpf *obj)
  144. {
  145. mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_mount);
  146. }
  147. /**
  148. * Load and attach
  149. *
  150. * Load and attach the eBPF code in kernel.
  151. *
  152. * @param obj is the main structure for bpf objects.
  153. * @param em structure with configuration
  154. *
  155. * @return it returns 0 on succes and -1 otherwise
  156. */
  157. static inline int ebpf_mount_load_and_attach(struct mount_bpf *obj, ebpf_module_t *em)
  158. {
  159. netdata_ebpf_targets_t *mt = em->targets;
  160. netdata_ebpf_program_loaded_t test = mt[NETDATA_MOUNT_SYSCALL].mode;
  161. // We are testing only one, because all will have the same behavior
  162. if (test == EBPF_LOAD_TRAMPOLINE ) {
  163. ebpf_mount_disable_probe(obj);
  164. ebpf_mount_disable_tracepoint(obj);
  165. netdata_set_trampoline_target(obj);
  166. } else if (test == EBPF_LOAD_PROBE ||
  167. test == EBPF_LOAD_RETPROBE ) {
  168. ebpf_mount_disable_tracepoint(obj);
  169. ebpf_mount_disable_trampoline(obj);
  170. } else {
  171. ebpf_mount_disable_probe(obj);
  172. ebpf_mount_disable_trampoline(obj);
  173. }
  174. int ret = mount_bpf__load(obj);
  175. if (!ret) {
  176. if (test != EBPF_LOAD_PROBE && test != EBPF_LOAD_RETPROBE )
  177. ret = mount_bpf__attach(obj);
  178. else
  179. ret = ebpf_mount_attach_probe(obj);
  180. if (!ret)
  181. ebpf_mount_set_hash_tables(obj);
  182. }
  183. return ret;
  184. }
  185. #endif
  186. /*****************************************************************
  187. *
  188. * FUNCTIONS TO CLOSE THE THREAD
  189. *
  190. *****************************************************************/
  191. /**
  192. * Clean up the main thread.
  193. *
  194. * @param ptr thread data.
  195. */
  196. static void ebpf_mount_cleanup(void *ptr)
  197. {
  198. ebpf_module_t *em = (ebpf_module_t *)ptr;
  199. if (!em->enabled)
  200. return;
  201. freez(mount_thread.thread);
  202. freez(mount_values);
  203. if (probe_links) {
  204. struct bpf_program *prog;
  205. size_t i = 0 ;
  206. bpf_object__for_each_program(prog, objects) {
  207. bpf_link__destroy(probe_links[i]);
  208. i++;
  209. }
  210. if (objects)
  211. bpf_object__close(objects);
  212. }
  213. #ifdef LIBBPF_MAJOR_VERSION
  214. else if (bpf_obj)
  215. mount_bpf__destroy(bpf_obj);
  216. #endif
  217. }
  218. /*****************************************************************
  219. *
  220. * MAIN LOOP
  221. *
  222. *****************************************************************/
  223. /**
  224. * Read global table
  225. *
  226. * Read the table with number of calls for all functions
  227. */
  228. static void read_global_table()
  229. {
  230. uint32_t idx;
  231. netdata_idx_t *val = mount_hash_values;
  232. netdata_idx_t *stored = mount_values;
  233. int fd = mount_maps[NETDATA_KEY_MOUNT_TABLE].map_fd;
  234. for (idx = NETDATA_KEY_MOUNT_CALL; idx < NETDATA_MOUNT_END; idx++) {
  235. if (!bpf_map_lookup_elem(fd, &idx, stored)) {
  236. int i;
  237. int end = ebpf_nprocs;
  238. netdata_idx_t total = 0;
  239. for (i = 0; i < end; i++)
  240. total += stored[i];
  241. val[idx] = total;
  242. }
  243. }
  244. }
  245. /**
  246. * Mount read hash
  247. *
  248. * This is the thread callback.
  249. * This thread is necessary, because we cannot freeze the whole plugin to read the data.
  250. *
  251. * @param ptr It is a NULL value for this thread.
  252. *
  253. * @return It always returns NULL.
  254. */
  255. void *ebpf_mount_read_hash(void *ptr)
  256. {
  257. read_thread_closed = 0;
  258. heartbeat_t hb;
  259. heartbeat_init(&hb);
  260. ebpf_module_t *em = (ebpf_module_t *)ptr;
  261. usec_t step = NETDATA_LATENCY_MOUNT_SLEEP_MS * em->update_every;
  262. while (!close_ebpf_plugin) {
  263. usec_t dt = heartbeat_next(&hb, step);
  264. (void)dt;
  265. read_global_table();
  266. }
  267. read_thread_closed = 1;
  268. return NULL;
  269. }
  270. /**
  271. * Send data to Netdata calling auxiliary functions.
  272. */
  273. static void ebpf_mount_send_data()
  274. {
  275. int i, j;
  276. int end = NETDATA_EBPF_MOUNT_SYSCALL;
  277. for (i = NETDATA_KEY_MOUNT_CALL, j = NETDATA_KEY_MOUNT_ERROR; i < end; i++, j++) {
  278. mount_publish_aggregated[i].ncall = mount_hash_values[i];
  279. mount_publish_aggregated[i].nerr = mount_hash_values[j];
  280. }
  281. write_count_chart(NETDATA_EBPF_MOUNT_CALLS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  282. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  283. write_err_chart(NETDATA_EBPF_MOUNT_ERRORS, NETDATA_EBPF_MOUNT_GLOBAL_FAMILY,
  284. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL);
  285. }
  286. /**
  287. * Main loop for this collector.
  288. */
  289. static void mount_collector(ebpf_module_t *em)
  290. {
  291. mount_thread.thread = mallocz(sizeof(netdata_thread_t));
  292. mount_thread.start_routine = ebpf_mount_read_hash;
  293. memset(mount_hash_values, 0, sizeof(mount_hash_values));
  294. mount_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  295. netdata_thread_create(mount_thread.thread, mount_thread.name, NETDATA_THREAD_OPTION_JOINABLE,
  296. ebpf_mount_read_hash, em);
  297. int update_every = em->update_every;
  298. int counter = update_every - 1;
  299. while (!close_ebpf_plugin) {
  300. pthread_mutex_lock(&collect_data_mutex);
  301. pthread_cond_wait(&collect_data_cond_var, &collect_data_mutex);
  302. if (++counter == update_every) {
  303. counter = 0;
  304. pthread_mutex_lock(&lock);
  305. ebpf_mount_send_data();
  306. pthread_mutex_unlock(&lock);
  307. }
  308. pthread_mutex_unlock(&collect_data_mutex);
  309. }
  310. }
  311. /*****************************************************************
  312. *
  313. * INITIALIZE THREAD
  314. *
  315. *****************************************************************/
  316. /**
  317. * Create mount charts
  318. *
  319. * Call ebpf_create_chart to create the charts for the collector.
  320. *
  321. * @param update_every value to overwrite the update frequency set by the server.
  322. */
  323. static void ebpf_create_mount_charts(int update_every)
  324. {
  325. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_CALLS,
  326. "Calls to mount and umount syscalls",
  327. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  328. NULL,
  329. NETDATA_EBPF_CHART_TYPE_LINE,
  330. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS,
  331. ebpf_create_global_dimension,
  332. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  333. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  334. ebpf_create_chart(NETDATA_EBPF_MOUNT_GLOBAL_FAMILY, NETDATA_EBPF_MOUNT_ERRORS,
  335. "Errors to mount and umount file systems",
  336. EBPF_COMMON_DIMENSION_CALL, NETDATA_EBPF_MOUNT_FAMILY,
  337. NULL,
  338. NETDATA_EBPF_CHART_TYPE_LINE,
  339. NETDATA_CHART_PRIO_EBPF_MOUNT_CHARTS + 1,
  340. ebpf_create_global_dimension,
  341. mount_publish_aggregated, NETDATA_EBPF_MOUNT_SYSCALL,
  342. update_every, NETDATA_EBPF_MODULE_NAME_MOUNT);
  343. fflush(stdout);
  344. }
  345. /*****************************************************************
  346. *
  347. * MAIN THREAD
  348. *
  349. *****************************************************************/
  350. /*
  351. * Load BPF
  352. *
  353. * Load BPF files.
  354. *
  355. * @param em the structure with configuration
  356. */
  357. static int ebpf_mount_load_bpf(ebpf_module_t *em)
  358. {
  359. int ret = 0;
  360. if (em->load == EBPF_LOAD_LEGACY) {
  361. probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &objects);
  362. if (!probe_links) {
  363. em->enabled = CONFIG_BOOLEAN_NO;
  364. ret = -1;
  365. }
  366. }
  367. #ifdef LIBBPF_MAJOR_VERSION
  368. else {
  369. bpf_obj = mount_bpf__open();
  370. if (!bpf_obj)
  371. ret = -1;
  372. else
  373. ret = ebpf_mount_load_and_attach(bpf_obj, em);
  374. }
  375. #endif
  376. if (ret)
  377. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  378. return ret;
  379. }
  380. /**
  381. * Mount thread
  382. *
  383. * Thread used to make mount thread
  384. *
  385. * @param ptr a pointer to `struct ebpf_module`
  386. *
  387. * @return It always returns NULL
  388. */
  389. void *ebpf_mount_thread(void *ptr)
  390. {
  391. netdata_thread_cleanup_push(ebpf_mount_cleanup, ptr);
  392. ebpf_module_t *em = (ebpf_module_t *)ptr;
  393. em->maps = mount_maps;
  394. if (!em->enabled)
  395. goto endmount;
  396. #ifdef LIBBPF_MAJOR_VERSION
  397. ebpf_adjust_thread_load(em, default_btf);
  398. #endif
  399. if (ebpf_mount_load_bpf(em)) {
  400. em->enabled = CONFIG_BOOLEAN_NO;
  401. goto endmount;
  402. }
  403. int algorithms[NETDATA_EBPF_MOUNT_SYSCALL] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  404. ebpf_global_labels(mount_aggregated_data, mount_publish_aggregated, mount_dimension_name, mount_dimension_name,
  405. algorithms, NETDATA_EBPF_MOUNT_SYSCALL);
  406. pthread_mutex_lock(&lock);
  407. ebpf_create_mount_charts(em->update_every);
  408. ebpf_update_stats(&plugin_statistics, em);
  409. pthread_mutex_unlock(&lock);
  410. mount_collector(em);
  411. endmount:
  412. if (!em->enabled)
  413. ebpf_update_disabled_plugin_stats(em);
  414. netdata_thread_cleanup_pop(1);
  415. return NULL;
  416. }