ebpf_swap.c 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. netdata_publish_swap_t *swap_vector = NULL;
  8. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  9. static netdata_idx_t *swap_values = NULL;
  10. netdata_publish_swap_t **swap_pid = NULL;
  11. struct config swap_config = { .first_section = NULL,
  12. .last_section = NULL,
  13. .mutex = NETDATA_MUTEX_INITIALIZER,
  14. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  15. .rwlock = AVL_LOCK_INITIALIZER } };
  16. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  17. .user_input = 0,
  18. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  19. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  20. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  21. .user_input = 0,
  22. .type = NETDATA_EBPF_MAP_CONTROLLER,
  23. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  24. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  25. .user_input = 0,
  26. .type = NETDATA_EBPF_MAP_STATIC,
  27. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  28. {.name = NULL, .internal_input = 0, .user_input = 0}};
  29. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  30. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  31. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  32. #ifdef LIBBPF_MAJOR_VERSION
  33. #include "includes/swap.skel.h" // BTF code
  34. static struct swap_bpf *bpf_obj = NULL;
  35. /**
  36. * Disable probe
  37. *
  38. * Disable all probes to use exclusively another method.
  39. *
  40. * @param obj is the main structure for bpf objects
  41. */
  42. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  43. {
  44. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  45. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  46. }
  47. /*
  48. * Disable trampoline
  49. *
  50. * Disable all trampoline to use exclusively another method.
  51. *
  52. * @param obj is the main structure for bpf objects.
  53. */
  54. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  55. {
  56. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  57. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  58. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  59. }
  60. /**
  61. * Set trampoline target
  62. *
  63. * Set the targets we will monitor.
  64. *
  65. * @param obj is the main structure for bpf objects.
  66. */
  67. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  68. {
  69. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  70. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  71. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  72. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  73. bpf_program__set_attach_target(obj->progs.netdata_release_task_fentry, 0,
  74. EBPF_COMMON_FNCT_CLEAN_UP);
  75. }
  76. /**
  77. * Mount Attach Probe
  78. *
  79. * Attach probes to target
  80. *
  81. * @param obj is the main structure for bpf objects.
  82. *
  83. * @return It returns 0 on success and -1 otherwise.
  84. */
  85. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  86. {
  87. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  88. false,
  89. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  90. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  91. if (ret)
  92. return -1;
  93. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  94. false,
  95. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  96. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  97. if (ret)
  98. return -1;
  99. obj->links.netdata_release_task_probe = bpf_program__attach_kprobe(obj->progs.netdata_release_task_probe,
  100. false,
  101. EBPF_COMMON_FNCT_CLEAN_UP);
  102. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  103. if (ret)
  104. return -1;
  105. return 0;
  106. }
  107. /**
  108. * Set hash tables
  109. *
  110. * Set the values for maps according the value given by kernel.
  111. *
  112. * @param obj is the main structure for bpf objects.
  113. */
  114. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  115. {
  116. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  117. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  118. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  119. }
  120. /**
  121. * Adjust Map Size
  122. *
  123. * Resize maps according input from users.
  124. *
  125. * @param obj is the main structure for bpf objects.
  126. * @param em structure with configuration
  127. */
  128. static void ebpf_swap_adjust_map_size(struct swap_bpf *obj, ebpf_module_t *em)
  129. {
  130. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  131. em, bpf_map__name(obj->maps.tbl_pid_swap));
  132. }
  133. /**
  134. * Disable Release Task
  135. *
  136. * Disable release task when apps is not enabled.
  137. *
  138. * @param obj is the main structure for bpf objects.
  139. */
  140. static void ebpf_swap_disable_release_task(struct swap_bpf *obj)
  141. {
  142. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  143. bpf_program__set_autoload(obj->progs.netdata_release_task_probe, false);
  144. }
  145. /**
  146. * Load and attach
  147. *
  148. * Load and attach the eBPF code in kernel.
  149. *
  150. * @param obj is the main structure for bpf objects.
  151. * @param em structure with configuration
  152. *
  153. * @return it returns 0 on success and -1 otherwise
  154. */
  155. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  156. {
  157. netdata_ebpf_targets_t *mt = em->targets;
  158. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  159. if (test == EBPF_LOAD_TRAMPOLINE) {
  160. ebpf_swap_disable_probe(obj);
  161. ebpf_swap_set_trampoline_target(obj);
  162. } else {
  163. ebpf_swap_disable_trampoline(obj);
  164. }
  165. ebpf_swap_adjust_map_size(obj, em);
  166. if (!em->apps_charts && !em->cgroup_charts)
  167. ebpf_swap_disable_release_task(obj);
  168. int ret = swap_bpf__load(obj);
  169. if (ret) {
  170. return ret;
  171. }
  172. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  173. if (!ret) {
  174. ebpf_swap_set_hash_tables(obj);
  175. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  176. }
  177. return ret;
  178. }
  179. #endif
  180. /*****************************************************************
  181. *
  182. * FUNCTIONS TO CLOSE THE THREAD
  183. *
  184. *****************************************************************/
  185. /**
  186. * Cachestat Free
  187. *
  188. * Cleanup variables after child threads to stop
  189. *
  190. * @param ptr thread data.
  191. */
  192. static void ebpf_swap_free(ebpf_module_t *em)
  193. {
  194. pthread_mutex_lock(&ebpf_exit_cleanup);
  195. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPING;
  196. pthread_mutex_unlock(&ebpf_exit_cleanup);
  197. ebpf_cleanup_publish_syscall(swap_publish_aggregated);
  198. freez(swap_vector);
  199. freez(swap_values);
  200. #ifdef LIBBPF_MAJOR_VERSION
  201. if (bpf_obj)
  202. swap_bpf__destroy(bpf_obj);
  203. #endif
  204. pthread_mutex_lock(&ebpf_exit_cleanup);
  205. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  206. pthread_mutex_unlock(&ebpf_exit_cleanup);
  207. }
  208. /**
  209. * Swap exit
  210. *
  211. * Cancel thread and exit.
  212. *
  213. * @param ptr thread data.
  214. */
  215. static void ebpf_swap_exit(void *ptr)
  216. {
  217. ebpf_module_t *em = (ebpf_module_t *)ptr;
  218. ebpf_swap_free(em);
  219. }
  220. /*****************************************************************
  221. *
  222. * COLLECTOR THREAD
  223. *
  224. *****************************************************************/
  225. /**
  226. * Apps Accumulator
  227. *
  228. * Sum all values read from kernel and store in the first address.
  229. *
  230. * @param out the vector with read values.
  231. */
  232. static void swap_apps_accumulator(netdata_publish_swap_t *out)
  233. {
  234. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  235. netdata_publish_swap_t *total = &out[0];
  236. for (i = 1; i < end; i++) {
  237. netdata_publish_swap_t *w = &out[i];
  238. total->write += w->write;
  239. total->read += w->read;
  240. }
  241. }
  242. /**
  243. * Fill PID
  244. *
  245. * Fill PID structures
  246. *
  247. * @param current_pid pid that we are collecting data
  248. * @param out values read from hash tables;
  249. */
  250. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  251. {
  252. netdata_publish_swap_t *curr = swap_pid[current_pid];
  253. if (!curr) {
  254. curr = callocz(1, sizeof(netdata_publish_swap_t));
  255. swap_pid[current_pid] = curr;
  256. }
  257. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  258. }
  259. /**
  260. * Update cgroup
  261. *
  262. * Update cgroup data based in
  263. */
  264. static void ebpf_update_swap_cgroup()
  265. {
  266. ebpf_cgroup_target_t *ect ;
  267. netdata_publish_swap_t *cv = swap_vector;
  268. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  269. size_t length = sizeof(netdata_publish_swap_t)*ebpf_nprocs;
  270. pthread_mutex_lock(&mutex_cgroup_shm);
  271. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  272. struct pid_on_target2 *pids;
  273. for (pids = ect->pids; pids; pids = pids->next) {
  274. int pid = pids->pid;
  275. netdata_publish_swap_t *out = &pids->swap;
  276. if (likely(swap_pid) && swap_pid[pid]) {
  277. netdata_publish_swap_t *in = swap_pid[pid];
  278. memcpy(out, in, sizeof(netdata_publish_swap_t));
  279. } else {
  280. memset(cv, 0, length);
  281. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  282. swap_apps_accumulator(cv);
  283. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  284. }
  285. }
  286. }
  287. }
  288. pthread_mutex_unlock(&mutex_cgroup_shm);
  289. }
  290. /**
  291. * Read APPS table
  292. *
  293. * Read the apps table and store data inside the structure.
  294. */
  295. static void read_apps_table()
  296. {
  297. netdata_publish_swap_t *cv = swap_vector;
  298. uint32_t key;
  299. struct pid_stat *pids = root_of_pids;
  300. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  301. size_t length = sizeof(netdata_publish_swap_t)*ebpf_nprocs;
  302. while (pids) {
  303. key = pids->pid;
  304. if (bpf_map_lookup_elem(fd, &key, cv)) {
  305. pids = pids->next;
  306. continue;
  307. }
  308. swap_apps_accumulator(cv);
  309. swap_fill_pid(key, cv);
  310. // We are cleaning to avoid passing data read from one process to other.
  311. memset(cv, 0, length);
  312. pids = pids->next;
  313. }
  314. }
  315. /**
  316. * Send global
  317. *
  318. * Send global charts to Netdata
  319. */
  320. static void swap_send_global()
  321. {
  322. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_SYSTEM_GROUP,
  323. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  324. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  325. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  326. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  327. }
  328. /**
  329. * Read global counter
  330. *
  331. * Read the table with number of calls to all functions
  332. */
  333. static void ebpf_swap_read_global_table()
  334. {
  335. netdata_idx_t *stored = swap_values;
  336. netdata_idx_t *val = swap_hash_values;
  337. int fd = swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd;
  338. uint32_t i, end = NETDATA_SWAP_END;
  339. for (i = NETDATA_KEY_SWAP_READPAGE_CALL; i < end; i++) {
  340. if (!bpf_map_lookup_elem(fd, &i, stored)) {
  341. int j;
  342. int last = ebpf_nprocs;
  343. netdata_idx_t total = 0;
  344. for (j = 0; j < last; j++)
  345. total += stored[j];
  346. val[i] = total;
  347. }
  348. }
  349. }
  350. /**
  351. * Sum PIDs
  352. *
  353. * Sum values for all targets.
  354. *
  355. * @param swap
  356. * @param root
  357. */
  358. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct pid_on_target *root)
  359. {
  360. uint64_t local_read = 0;
  361. uint64_t local_write = 0;
  362. while (root) {
  363. int32_t pid = root->pid;
  364. netdata_publish_swap_t *w = swap_pid[pid];
  365. if (w) {
  366. local_write += w->write;
  367. local_read += w->read;
  368. }
  369. root = root->next;
  370. }
  371. // These conditions were added, because we are using incremental algorithm
  372. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  373. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  374. }
  375. /**
  376. * Send data to Netdata calling auxiliary functions.
  377. *
  378. * @param root the target list.
  379. */
  380. void ebpf_swap_send_apps_data(struct target *root)
  381. {
  382. struct target *w;
  383. for (w = root; w; w = w->next) {
  384. if (unlikely(w->exposed && w->processes)) {
  385. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  386. }
  387. }
  388. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  389. for (w = root; w; w = w->next) {
  390. if (unlikely(w->exposed && w->processes)) {
  391. write_chart_dimension(w->name, (long long) w->swap.read);
  392. }
  393. }
  394. write_end_chart();
  395. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  396. for (w = root; w; w = w->next) {
  397. if (unlikely(w->exposed && w->processes)) {
  398. write_chart_dimension(w->name, (long long) w->swap.write);
  399. }
  400. }
  401. write_end_chart();
  402. }
  403. /**
  404. * Sum PIDs
  405. *
  406. * Sum values for all targets.
  407. *
  408. * @param swap
  409. * @param root
  410. */
  411. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  412. {
  413. uint64_t local_read = 0;
  414. uint64_t local_write = 0;
  415. while (pids) {
  416. netdata_publish_swap_t *w = &pids->swap;
  417. local_write += w->write;
  418. local_read += w->read;
  419. pids = pids->next;
  420. }
  421. // These conditions were added, because we are using incremental algorithm
  422. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  423. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  424. }
  425. /**
  426. * Send Systemd charts
  427. *
  428. * Send collected data to Netdata.
  429. */
  430. static void ebpf_send_systemd_swap_charts()
  431. {
  432. ebpf_cgroup_target_t *ect;
  433. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  434. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  435. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  436. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  437. }
  438. }
  439. write_end_chart();
  440. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  441. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  442. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  443. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  444. }
  445. }
  446. write_end_chart();
  447. }
  448. /**
  449. * Create specific swap charts
  450. *
  451. * Create charts for cgroup/application.
  452. *
  453. * @param type the chart type.
  454. * @param update_every value to overwrite the update frequency set by the server.
  455. */
  456. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  457. {
  458. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  459. "Calls to function <code>swap_readpage</code>.",
  460. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  461. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  462. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  463. ebpf_create_global_dimension,
  464. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  465. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  466. "Calls to function <code>swap_writepage</code>.",
  467. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  468. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  469. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  470. ebpf_create_global_dimension,
  471. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  472. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  473. }
  474. /**
  475. * Create specific swap charts
  476. *
  477. * Create charts for cgroup/application.
  478. *
  479. * @param type the chart type.
  480. * @param update_every value to overwrite the update frequency set by the server.
  481. */
  482. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  483. {
  484. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART,"Calls to function <code>swap_readpage</code>.",
  485. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  486. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  487. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  488. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "Calls to function <code>swap_writepage</code>.",
  489. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  490. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  491. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  492. }
  493. /*
  494. * Send Specific Swap data
  495. *
  496. * Send data for specific cgroup/apps.
  497. *
  498. * @param type chart type
  499. * @param values structure with values that will be sent to netdata
  500. */
  501. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  502. {
  503. write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART);
  504. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  505. write_end_chart();
  506. write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART);
  507. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  508. write_end_chart();
  509. }
  510. /**
  511. * Create Systemd Swap Charts
  512. *
  513. * Create charts when systemd is enabled
  514. *
  515. * @param update_every value to overwrite the update frequency set by the server.
  516. **/
  517. static void ebpf_create_systemd_swap_charts(int update_every)
  518. {
  519. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  520. "Calls to <code>swap_readpage</code>.",
  521. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  522. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  523. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  524. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  525. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  526. "Calls to function <code>swap_writepage</code>.",
  527. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  528. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  529. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  530. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  531. }
  532. /**
  533. * Send data to Netdata calling auxiliary functions.
  534. *
  535. * @param update_every value to overwrite the update frequency set by the server.
  536. */
  537. void ebpf_swap_send_cgroup_data(int update_every)
  538. {
  539. if (!ebpf_cgroup_pids)
  540. return;
  541. pthread_mutex_lock(&mutex_cgroup_shm);
  542. ebpf_cgroup_target_t *ect;
  543. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  544. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  545. }
  546. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  547. if (has_systemd) {
  548. if (send_cgroup_chart) {
  549. ebpf_create_systemd_swap_charts(update_every);
  550. fflush(stdout);
  551. }
  552. ebpf_send_systemd_swap_charts();
  553. }
  554. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  555. if (ect->systemd)
  556. continue;
  557. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  558. ebpf_create_specific_swap_charts(ect->name, update_every);
  559. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  560. }
  561. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  562. if (ect->updated) {
  563. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  564. } else {
  565. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  566. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  567. }
  568. }
  569. }
  570. pthread_mutex_unlock(&mutex_cgroup_shm);
  571. }
  572. /**
  573. * Main loop for this collector.
  574. */
  575. static void swap_collector(ebpf_module_t *em)
  576. {
  577. int cgroup = em->cgroup_charts;
  578. int update_every = em->update_every;
  579. heartbeat_t hb;
  580. heartbeat_init(&hb);
  581. int counter = update_every - 1;
  582. while (!ebpf_exit_plugin) {
  583. (void)heartbeat_next(&hb, USEC_PER_SEC);
  584. if (ebpf_exit_plugin || ++counter != update_every)
  585. continue;
  586. counter = 0;
  587. netdata_apps_integration_flags_t apps = em->apps_charts;
  588. ebpf_swap_read_global_table();
  589. pthread_mutex_lock(&collect_data_mutex);
  590. if (apps)
  591. read_apps_table();
  592. if (cgroup)
  593. ebpf_update_swap_cgroup();
  594. pthread_mutex_lock(&lock);
  595. swap_send_global();
  596. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  597. ebpf_swap_send_apps_data(apps_groups_root_target);
  598. if (cgroup)
  599. ebpf_swap_send_cgroup_data(update_every);
  600. pthread_mutex_unlock(&lock);
  601. pthread_mutex_unlock(&collect_data_mutex);
  602. }
  603. }
  604. /*****************************************************************
  605. *
  606. * INITIALIZE THREAD
  607. *
  608. *****************************************************************/
  609. /**
  610. * Create apps charts
  611. *
  612. * Call ebpf_create_chart to create the charts on apps submenu.
  613. *
  614. * @param em a pointer to the structure with the default values.
  615. */
  616. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  617. {
  618. struct target *root = ptr;
  619. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_READ_CHART,
  620. "Calls to function <code>swap_readpage</code>.",
  621. EBPF_COMMON_DIMENSION_CALL,
  622. NETDATA_SWAP_SUBMENU,
  623. NETDATA_EBPF_CHART_TYPE_STACKED,
  624. 20191,
  625. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  626. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  627. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_WRITE_CHART,
  628. "Calls to function <code>swap_writepage</code>.",
  629. EBPF_COMMON_DIMENSION_CALL,
  630. NETDATA_SWAP_SUBMENU,
  631. NETDATA_EBPF_CHART_TYPE_STACKED,
  632. 20192,
  633. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  634. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  635. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  636. }
  637. /**
  638. * Allocate vectors used with this thread.
  639. *
  640. * We are not testing the return, because callocz does this and shutdown the software
  641. * case it was not possible to allocate.
  642. *
  643. * @param apps is apps enabled?
  644. */
  645. static void ebpf_swap_allocate_global_vectors(int apps)
  646. {
  647. if (apps)
  648. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  649. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  650. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  651. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  652. }
  653. /*****************************************************************
  654. *
  655. * MAIN THREAD
  656. *
  657. *****************************************************************/
  658. /**
  659. * Create global charts
  660. *
  661. * Call ebpf_create_chart to create the charts for the collector.
  662. *
  663. * @param update_every value to overwrite the update frequency set by the server.
  664. */
  665. static void ebpf_create_swap_charts(int update_every)
  666. {
  667. ebpf_create_chart(NETDATA_EBPF_SYSTEM_GROUP, NETDATA_MEM_SWAP_CHART,
  668. "Calls to access swap memory",
  669. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  670. NULL,
  671. NETDATA_EBPF_CHART_TYPE_LINE,
  672. 202,
  673. ebpf_create_global_dimension,
  674. swap_publish_aggregated, NETDATA_SWAP_END,
  675. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  676. }
  677. /*
  678. * Load BPF
  679. *
  680. * Load BPF files.
  681. *
  682. * @param em the structure with configuration
  683. */
  684. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  685. {
  686. int ret = 0;
  687. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_KEY_SWAP_READPAGE_CALL].mode);
  688. if (em->load & EBPF_LOAD_LEGACY) {
  689. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  690. if (!em->probe_links) {
  691. ret = -1;
  692. }
  693. }
  694. #ifdef LIBBPF_MAJOR_VERSION
  695. else {
  696. bpf_obj = swap_bpf__open();
  697. if (!bpf_obj)
  698. ret = -1;
  699. else
  700. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  701. }
  702. #endif
  703. if (ret)
  704. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  705. return ret;
  706. }
  707. /**
  708. * SWAP thread
  709. *
  710. * Thread used to make swap thread
  711. *
  712. * @param ptr a pointer to `struct ebpf_module`
  713. *
  714. * @return It always return NULL
  715. */
  716. void *ebpf_swap_thread(void *ptr)
  717. {
  718. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  719. ebpf_module_t *em = (ebpf_module_t *)ptr;
  720. em->maps = swap_maps;
  721. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  722. #ifdef LIBBPF_MAJOR_VERSION
  723. ebpf_adjust_thread_load(em, default_btf);
  724. #endif
  725. if (ebpf_swap_load_bpf(em)) {
  726. em->thread->enabled = NETDATA_THREAD_EBPF_STOPPED;
  727. goto endswap;
  728. }
  729. ebpf_swap_allocate_global_vectors(em->apps_charts);
  730. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  731. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  732. algorithms, NETDATA_SWAP_END);
  733. pthread_mutex_lock(&lock);
  734. ebpf_create_swap_charts(em->update_every);
  735. ebpf_update_stats(&plugin_statistics, em);
  736. pthread_mutex_unlock(&lock);
  737. swap_collector(em);
  738. endswap:
  739. ebpf_update_disabled_plugin_stats(em);
  740. netdata_thread_cleanup_pop(1);
  741. return NULL;
  742. }