ebpf_swap.c 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  8. static netdata_idx_t *swap_values = NULL;
  9. netdata_publish_swap_t *swap_vector = NULL;
  10. struct config swap_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  19. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  20. .user_input = 0,
  21. .type = NETDATA_EBPF_MAP_CONTROLLER,
  22. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  23. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  24. .user_input = 0,
  25. .type = NETDATA_EBPF_MAP_STATIC,
  26. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  27. {.name = NULL, .internal_input = 0, .user_input = 0}};
  28. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  29. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  30. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  31. #ifdef LIBBPF_MAJOR_VERSION
  32. /**
  33. * Disable probe
  34. *
  35. * Disable all probes to use exclusively another method.
  36. *
  37. * @param obj is the main structure for bpf objects
  38. */
  39. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  40. {
  41. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  42. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  43. }
  44. /*
  45. * Disable trampoline
  46. *
  47. * Disable all trampoline to use exclusively another method.
  48. *
  49. * @param obj is the main structure for bpf objects.
  50. */
  51. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  52. {
  53. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  54. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  55. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  56. }
  57. /**
  58. * Set trampoline target
  59. *
  60. * Set the targets we will monitor.
  61. *
  62. * @param obj is the main structure for bpf objects.
  63. */
  64. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  65. {
  66. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  67. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  68. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  69. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  70. bpf_program__set_attach_target(obj->progs.netdata_release_task_fentry, 0,
  71. EBPF_COMMON_FNCT_CLEAN_UP);
  72. }
  73. /**
  74. * Mount Attach Probe
  75. *
  76. * Attach probes to target
  77. *
  78. * @param obj is the main structure for bpf objects.
  79. *
  80. * @return It returns 0 on success and -1 otherwise.
  81. */
  82. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  83. {
  84. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  85. false,
  86. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  87. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  88. if (ret)
  89. return -1;
  90. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  91. false,
  92. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  93. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  94. if (ret)
  95. return -1;
  96. obj->links.netdata_release_task_probe = bpf_program__attach_kprobe(obj->progs.netdata_release_task_probe,
  97. false,
  98. EBPF_COMMON_FNCT_CLEAN_UP);
  99. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  100. if (ret)
  101. return -1;
  102. return 0;
  103. }
  104. /**
  105. * Set hash tables
  106. *
  107. * Set the values for maps according the value given by kernel.
  108. *
  109. * @param obj is the main structure for bpf objects.
  110. */
  111. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  112. {
  113. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  114. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  115. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  116. }
  117. /**
  118. * Adjust Map Size
  119. *
  120. * Resize maps according input from users.
  121. *
  122. * @param obj is the main structure for bpf objects.
  123. * @param em structure with configuration
  124. */
  125. static void ebpf_swap_adjust_map_size(struct swap_bpf *obj, ebpf_module_t *em)
  126. {
  127. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  128. em, bpf_map__name(obj->maps.tbl_pid_swap));
  129. }
  130. /**
  131. * Disable Release Task
  132. *
  133. * Disable release task when apps is not enabled.
  134. *
  135. * @param obj is the main structure for bpf objects.
  136. */
  137. static void ebpf_swap_disable_release_task(struct swap_bpf *obj)
  138. {
  139. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  140. bpf_program__set_autoload(obj->progs.netdata_release_task_probe, false);
  141. }
  142. /**
  143. * Load and attach
  144. *
  145. * Load and attach the eBPF code in kernel.
  146. *
  147. * @param obj is the main structure for bpf objects.
  148. * @param em structure with configuration
  149. *
  150. * @return it returns 0 on success and -1 otherwise
  151. */
  152. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  153. {
  154. netdata_ebpf_targets_t *mt = em->targets;
  155. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  156. if (test == EBPF_LOAD_TRAMPOLINE) {
  157. ebpf_swap_disable_probe(obj);
  158. ebpf_swap_set_trampoline_target(obj);
  159. } else {
  160. ebpf_swap_disable_trampoline(obj);
  161. }
  162. ebpf_swap_adjust_map_size(obj, em);
  163. if (!em->apps_charts && !em->cgroup_charts)
  164. ebpf_swap_disable_release_task(obj);
  165. int ret = swap_bpf__load(obj);
  166. if (ret) {
  167. return ret;
  168. }
  169. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  170. if (!ret) {
  171. ebpf_swap_set_hash_tables(obj);
  172. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  173. }
  174. return ret;
  175. }
  176. #endif
  177. /*****************************************************************
  178. *
  179. * FUNCTIONS TO CLOSE THE THREAD
  180. *
  181. *****************************************************************/
  182. /**
  183. * Cachestat Free
  184. *
  185. * Cleanup variables after child threads to stop
  186. *
  187. * @param ptr thread data.
  188. */
  189. static void ebpf_swap_free(ebpf_module_t *em)
  190. {
  191. freez(swap_vector);
  192. freez(swap_values);
  193. pthread_mutex_lock(&ebpf_exit_cleanup);
  194. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  195. pthread_mutex_unlock(&ebpf_exit_cleanup);
  196. }
  197. /**
  198. * Swap exit
  199. *
  200. * Cancel thread and exit.
  201. *
  202. * @param ptr thread data.
  203. */
  204. static void ebpf_swap_exit(void *ptr)
  205. {
  206. ebpf_module_t *em = (ebpf_module_t *)ptr;
  207. ebpf_swap_free(em);
  208. }
  209. /*****************************************************************
  210. *
  211. * COLLECTOR THREAD
  212. *
  213. *****************************************************************/
  214. /**
  215. * Apps Accumulator
  216. *
  217. * Sum all values read from kernel and store in the first address.
  218. *
  219. * @param out the vector with read values.
  220. */
  221. static void swap_apps_accumulator(netdata_publish_swap_t *out)
  222. {
  223. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  224. netdata_publish_swap_t *total = &out[0];
  225. for (i = 1; i < end; i++) {
  226. netdata_publish_swap_t *w = &out[i];
  227. total->write += w->write;
  228. total->read += w->read;
  229. }
  230. }
  231. /**
  232. * Fill PID
  233. *
  234. * Fill PID structures
  235. *
  236. * @param current_pid pid that we are collecting data
  237. * @param out values read from hash tables;
  238. */
  239. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  240. {
  241. netdata_publish_swap_t *curr = swap_pid[current_pid];
  242. if (!curr) {
  243. curr = callocz(1, sizeof(netdata_publish_swap_t));
  244. swap_pid[current_pid] = curr;
  245. }
  246. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  247. }
  248. /**
  249. * Update cgroup
  250. *
  251. * Update cgroup data based in
  252. */
  253. static void ebpf_update_swap_cgroup()
  254. {
  255. ebpf_cgroup_target_t *ect ;
  256. netdata_publish_swap_t *cv = swap_vector;
  257. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  258. size_t length = sizeof(netdata_publish_swap_t)*ebpf_nprocs;
  259. pthread_mutex_lock(&mutex_cgroup_shm);
  260. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  261. struct pid_on_target2 *pids;
  262. for (pids = ect->pids; pids; pids = pids->next) {
  263. int pid = pids->pid;
  264. netdata_publish_swap_t *out = &pids->swap;
  265. if (likely(swap_pid) && swap_pid[pid]) {
  266. netdata_publish_swap_t *in = swap_pid[pid];
  267. memcpy(out, in, sizeof(netdata_publish_swap_t));
  268. } else {
  269. memset(cv, 0, length);
  270. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  271. swap_apps_accumulator(cv);
  272. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  273. }
  274. }
  275. }
  276. }
  277. pthread_mutex_unlock(&mutex_cgroup_shm);
  278. }
  279. /**
  280. * Read APPS table
  281. *
  282. * Read the apps table and store data inside the structure.
  283. */
  284. static void read_apps_table()
  285. {
  286. netdata_publish_swap_t *cv = swap_vector;
  287. uint32_t key;
  288. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  289. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  290. size_t length = sizeof(netdata_publish_swap_t)*ebpf_nprocs;
  291. while (pids) {
  292. key = pids->pid;
  293. if (bpf_map_lookup_elem(fd, &key, cv)) {
  294. pids = pids->next;
  295. continue;
  296. }
  297. swap_apps_accumulator(cv);
  298. swap_fill_pid(key, cv);
  299. // We are cleaning to avoid passing data read from one process to other.
  300. memset(cv, 0, length);
  301. pids = pids->next;
  302. }
  303. }
  304. /**
  305. * Send global
  306. *
  307. * Send global charts to Netdata
  308. */
  309. static void swap_send_global()
  310. {
  311. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_SYSTEM_GROUP,
  312. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  313. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  314. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  315. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  316. }
  317. /**
  318. * Read global counter
  319. *
  320. * Read the table with number of calls to all functions
  321. */
  322. static void ebpf_swap_read_global_table()
  323. {
  324. netdata_idx_t *stored = swap_values;
  325. netdata_idx_t *val = swap_hash_values;
  326. int fd = swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd;
  327. uint32_t i, end = NETDATA_SWAP_END;
  328. for (i = NETDATA_KEY_SWAP_READPAGE_CALL; i < end; i++) {
  329. if (!bpf_map_lookup_elem(fd, &i, stored)) {
  330. int j;
  331. int last = ebpf_nprocs;
  332. netdata_idx_t total = 0;
  333. for (j = 0; j < last; j++)
  334. total += stored[j];
  335. val[i] = total;
  336. }
  337. }
  338. }
  339. /**
  340. * Sum PIDs
  341. *
  342. * Sum values for all targets.
  343. *
  344. * @param swap
  345. * @param root
  346. */
  347. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct ebpf_pid_on_target *root)
  348. {
  349. uint64_t local_read = 0;
  350. uint64_t local_write = 0;
  351. while (root) {
  352. int32_t pid = root->pid;
  353. netdata_publish_swap_t *w = swap_pid[pid];
  354. if (w) {
  355. local_write += w->write;
  356. local_read += w->read;
  357. }
  358. root = root->next;
  359. }
  360. // These conditions were added, because we are using incremental algorithm
  361. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  362. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  363. }
  364. /**
  365. * Send data to Netdata calling auxiliary functions.
  366. *
  367. * @param root the target list.
  368. */
  369. void ebpf_swap_send_apps_data(struct ebpf_target *root)
  370. {
  371. struct ebpf_target *w;
  372. for (w = root; w; w = w->next) {
  373. if (unlikely(w->exposed && w->processes)) {
  374. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  375. }
  376. }
  377. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  378. for (w = root; w; w = w->next) {
  379. if (unlikely(w->exposed && w->processes)) {
  380. write_chart_dimension(w->name, (long long) w->swap.read);
  381. }
  382. }
  383. write_end_chart();
  384. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  385. for (w = root; w; w = w->next) {
  386. if (unlikely(w->exposed && w->processes)) {
  387. write_chart_dimension(w->name, (long long) w->swap.write);
  388. }
  389. }
  390. write_end_chart();
  391. }
  392. /**
  393. * Sum PIDs
  394. *
  395. * Sum values for all targets.
  396. *
  397. * @param swap
  398. * @param root
  399. */
  400. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  401. {
  402. uint64_t local_read = 0;
  403. uint64_t local_write = 0;
  404. while (pids) {
  405. netdata_publish_swap_t *w = &pids->swap;
  406. local_write += w->write;
  407. local_read += w->read;
  408. pids = pids->next;
  409. }
  410. // These conditions were added, because we are using incremental algorithm
  411. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  412. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  413. }
  414. /**
  415. * Send Systemd charts
  416. *
  417. * Send collected data to Netdata.
  418. */
  419. static void ebpf_send_systemd_swap_charts()
  420. {
  421. ebpf_cgroup_target_t *ect;
  422. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  423. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  424. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  425. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  426. }
  427. }
  428. write_end_chart();
  429. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  430. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  431. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  432. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  433. }
  434. }
  435. write_end_chart();
  436. }
  437. /**
  438. * Create specific swap charts
  439. *
  440. * Create charts for cgroup/application.
  441. *
  442. * @param type the chart type.
  443. * @param update_every value to overwrite the update frequency set by the server.
  444. */
  445. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  446. {
  447. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  448. "Calls to function <code>swap_readpage</code>.",
  449. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  450. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  451. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  452. ebpf_create_global_dimension,
  453. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  454. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  455. "Calls to function <code>swap_writepage</code>.",
  456. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  457. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  458. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  459. ebpf_create_global_dimension,
  460. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  461. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  462. }
  463. /**
  464. * Create specific swap charts
  465. *
  466. * Create charts for cgroup/application.
  467. *
  468. * @param type the chart type.
  469. * @param update_every value to overwrite the update frequency set by the server.
  470. */
  471. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  472. {
  473. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART,"Calls to function <code>swap_readpage</code>.",
  474. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  475. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  476. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  477. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "Calls to function <code>swap_writepage</code>.",
  478. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  479. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  480. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  481. }
  482. /*
  483. * Send Specific Swap data
  484. *
  485. * Send data for specific cgroup/apps.
  486. *
  487. * @param type chart type
  488. * @param values structure with values that will be sent to netdata
  489. */
  490. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  491. {
  492. write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART);
  493. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  494. write_end_chart();
  495. write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART);
  496. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  497. write_end_chart();
  498. }
  499. /**
  500. * Create Systemd Swap Charts
  501. *
  502. * Create charts when systemd is enabled
  503. *
  504. * @param update_every value to overwrite the update frequency set by the server.
  505. **/
  506. static void ebpf_create_systemd_swap_charts(int update_every)
  507. {
  508. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  509. "Calls to <code>swap_readpage</code>.",
  510. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  511. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  512. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  513. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  514. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  515. "Calls to function <code>swap_writepage</code>.",
  516. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  517. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  518. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  519. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  520. }
  521. /**
  522. * Send data to Netdata calling auxiliary functions.
  523. *
  524. * @param update_every value to overwrite the update frequency set by the server.
  525. */
  526. void ebpf_swap_send_cgroup_data(int update_every)
  527. {
  528. if (!ebpf_cgroup_pids)
  529. return;
  530. pthread_mutex_lock(&mutex_cgroup_shm);
  531. ebpf_cgroup_target_t *ect;
  532. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  533. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  534. }
  535. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  536. if (has_systemd) {
  537. if (send_cgroup_chart) {
  538. ebpf_create_systemd_swap_charts(update_every);
  539. fflush(stdout);
  540. }
  541. ebpf_send_systemd_swap_charts();
  542. }
  543. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  544. if (ect->systemd)
  545. continue;
  546. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  547. ebpf_create_specific_swap_charts(ect->name, update_every);
  548. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  549. }
  550. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  551. if (ect->updated) {
  552. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  553. } else {
  554. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  555. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  556. }
  557. }
  558. }
  559. pthread_mutex_unlock(&mutex_cgroup_shm);
  560. }
  561. /**
  562. * Main loop for this collector.
  563. */
  564. static void swap_collector(ebpf_module_t *em)
  565. {
  566. int cgroup = em->cgroup_charts;
  567. int update_every = em->update_every;
  568. heartbeat_t hb;
  569. heartbeat_init(&hb);
  570. int counter = update_every - 1;
  571. while (!ebpf_exit_plugin) {
  572. (void)heartbeat_next(&hb, USEC_PER_SEC);
  573. if (ebpf_exit_plugin || ++counter != update_every)
  574. continue;
  575. counter = 0;
  576. netdata_apps_integration_flags_t apps = em->apps_charts;
  577. ebpf_swap_read_global_table();
  578. pthread_mutex_lock(&collect_data_mutex);
  579. if (apps)
  580. read_apps_table();
  581. if (cgroup)
  582. ebpf_update_swap_cgroup();
  583. pthread_mutex_lock(&lock);
  584. swap_send_global();
  585. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  586. ebpf_swap_send_apps_data(apps_groups_root_target);
  587. if (cgroup)
  588. ebpf_swap_send_cgroup_data(update_every);
  589. pthread_mutex_unlock(&lock);
  590. pthread_mutex_unlock(&collect_data_mutex);
  591. }
  592. }
  593. /*****************************************************************
  594. *
  595. * INITIALIZE THREAD
  596. *
  597. *****************************************************************/
  598. /**
  599. * Create apps charts
  600. *
  601. * Call ebpf_create_chart to create the charts on apps submenu.
  602. *
  603. * @param em a pointer to the structure with the default values.
  604. */
  605. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  606. {
  607. struct ebpf_target *root = ptr;
  608. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_READ_CHART,
  609. "Calls to function <code>swap_readpage</code>.",
  610. EBPF_COMMON_DIMENSION_CALL,
  611. NETDATA_SWAP_SUBMENU,
  612. NETDATA_EBPF_CHART_TYPE_STACKED,
  613. 20191,
  614. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  615. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  616. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_WRITE_CHART,
  617. "Calls to function <code>swap_writepage</code>.",
  618. EBPF_COMMON_DIMENSION_CALL,
  619. NETDATA_SWAP_SUBMENU,
  620. NETDATA_EBPF_CHART_TYPE_STACKED,
  621. 20192,
  622. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  623. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  624. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  625. }
  626. /**
  627. * Allocate vectors used with this thread.
  628. *
  629. * We are not testing the return, because callocz does this and shutdown the software
  630. * case it was not possible to allocate.
  631. *
  632. * @param apps is apps enabled?
  633. */
  634. static void ebpf_swap_allocate_global_vectors(int apps)
  635. {
  636. if (apps)
  637. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  638. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  639. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  640. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  641. }
  642. /*****************************************************************
  643. *
  644. * MAIN THREAD
  645. *
  646. *****************************************************************/
  647. /**
  648. * Create global charts
  649. *
  650. * Call ebpf_create_chart to create the charts for the collector.
  651. *
  652. * @param update_every value to overwrite the update frequency set by the server.
  653. */
  654. static void ebpf_create_swap_charts(int update_every)
  655. {
  656. ebpf_create_chart(NETDATA_EBPF_SYSTEM_GROUP, NETDATA_MEM_SWAP_CHART,
  657. "Calls to access swap memory",
  658. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  659. NULL,
  660. NETDATA_EBPF_CHART_TYPE_LINE,
  661. NETDATA_CHART_PRIO_SYSTEM_SWAP_CALLS,
  662. ebpf_create_global_dimension,
  663. swap_publish_aggregated, NETDATA_SWAP_END,
  664. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  665. }
  666. /*
  667. * Load BPF
  668. *
  669. * Load BPF files.
  670. *
  671. * @param em the structure with configuration
  672. */
  673. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  674. {
  675. int ret = 0;
  676. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_KEY_SWAP_READPAGE_CALL].mode);
  677. if (em->load & EBPF_LOAD_LEGACY) {
  678. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  679. if (!em->probe_links) {
  680. ret = -1;
  681. }
  682. }
  683. #ifdef LIBBPF_MAJOR_VERSION
  684. else {
  685. bpf_obj = swap_bpf__open();
  686. if (!bpf_obj)
  687. ret = -1;
  688. else
  689. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  690. }
  691. #endif
  692. if (ret)
  693. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  694. return ret;
  695. }
  696. /**
  697. * SWAP thread
  698. *
  699. * Thread used to make swap thread
  700. *
  701. * @param ptr a pointer to `struct ebpf_module`
  702. *
  703. * @return It always return NULL
  704. */
  705. void *ebpf_swap_thread(void *ptr)
  706. {
  707. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  708. ebpf_module_t *em = (ebpf_module_t *)ptr;
  709. em->maps = swap_maps;
  710. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  711. #ifdef LIBBPF_MAJOR_VERSION
  712. ebpf_adjust_thread_load(em, default_btf);
  713. #endif
  714. if (ebpf_swap_load_bpf(em)) {
  715. goto endswap;
  716. }
  717. ebpf_swap_allocate_global_vectors(em->apps_charts);
  718. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  719. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  720. algorithms, NETDATA_SWAP_END);
  721. pthread_mutex_lock(&lock);
  722. ebpf_create_swap_charts(em->update_every);
  723. ebpf_update_stats(&plugin_statistics, em);
  724. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps);
  725. pthread_mutex_unlock(&lock);
  726. swap_collector(em);
  727. endswap:
  728. ebpf_update_disabled_plugin_stats(em);
  729. netdata_thread_cleanup_pop(1);
  730. return NULL;
  731. }