ebpf_swap.c 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. netdata_publish_swap_t *swap_vector = NULL;
  8. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  9. static netdata_idx_t *swap_values = NULL;
  10. netdata_publish_swap_t **swap_pid = NULL;
  11. struct config swap_config = { .first_section = NULL,
  12. .last_section = NULL,
  13. .mutex = NETDATA_MUTEX_INITIALIZER,
  14. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  15. .rwlock = AVL_LOCK_INITIALIZER } };
  16. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  17. .user_input = 0,
  18. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  19. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  20. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  21. .user_input = 0,
  22. .type = NETDATA_EBPF_MAP_CONTROLLER,
  23. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  24. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  25. .user_input = 0,
  26. .type = NETDATA_EBPF_MAP_STATIC,
  27. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED},
  28. {.name = NULL, .internal_input = 0, .user_input = 0}};
  29. struct netdata_static_thread swap_threads = {"SWAP KERNEL", NULL, NULL, 1,
  30. NULL, NULL, NULL};
  31. static enum ebpf_threads_status ebpf_swap_exited = NETDATA_THREAD_EBPF_RUNNING;
  32. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  33. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  34. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  35. #ifdef LIBBPF_MAJOR_VERSION
  36. #include "includes/swap.skel.h" // BTF code
  37. static struct swap_bpf *bpf_obj = NULL;
  38. /**
  39. * Disable probe
  40. *
  41. * Disable all probes to use exclusively another method.
  42. *
  43. * @param obj is the main structure for bpf objects
  44. */
  45. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  46. {
  47. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  48. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  49. }
  50. /*
  51. * Disable trampoline
  52. *
  53. * Disable all trampoline to use exclusively another method.
  54. *
  55. * @param obj is the main structure for bpf objects.
  56. */
  57. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  58. {
  59. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  60. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  61. }
  62. /**
  63. * Set trampoline target
  64. *
  65. * Set the targets we will monitor.
  66. *
  67. * @param obj is the main structure for bpf objects.
  68. */
  69. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  70. {
  71. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  72. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  73. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  74. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  75. }
  76. /**
  77. * Mount Attach Probe
  78. *
  79. * Attach probes to target
  80. *
  81. * @param obj is the main structure for bpf objects.
  82. *
  83. * @return It returns 0 on success and -1 otherwise.
  84. */
  85. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  86. {
  87. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  88. false,
  89. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  90. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  91. if (ret)
  92. return -1;
  93. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  94. false,
  95. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  96. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  97. if (ret)
  98. return -1;
  99. return 0;
  100. }
  101. /**
  102. * Set hash tables
  103. *
  104. * Set the values for maps according the value given by kernel.
  105. *
  106. * @param obj is the main structure for bpf objects.
  107. */
  108. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  109. {
  110. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  111. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  112. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  113. }
  114. /**
  115. * Adjust Map Size
  116. *
  117. * Resize maps according input from users.
  118. *
  119. * @param obj is the main structure for bpf objects.
  120. * @param em structure with configuration
  121. */
  122. static void ebpf_swap_adjust_map_size(struct swap_bpf *obj, ebpf_module_t *em)
  123. {
  124. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  125. em, bpf_map__name(obj->maps.tbl_pid_swap));
  126. }
  127. /**
  128. * Load and attach
  129. *
  130. * Load and attach the eBPF code in kernel.
  131. *
  132. * @param obj is the main structure for bpf objects.
  133. * @param em structure with configuration
  134. *
  135. * @return it returns 0 on succes and -1 otherwise
  136. */
  137. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  138. {
  139. netdata_ebpf_targets_t *mt = em->targets;
  140. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  141. if (test == EBPF_LOAD_TRAMPOLINE) {
  142. ebpf_swap_disable_probe(obj);
  143. ebpf_swap_set_trampoline_target(obj);
  144. } else {
  145. ebpf_swap_disable_trampoline(obj);
  146. }
  147. int ret = swap_bpf__load(obj);
  148. if (ret) {
  149. return ret;
  150. }
  151. ebpf_swap_adjust_map_size(obj, em);
  152. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  153. if (!ret) {
  154. ebpf_swap_set_hash_tables(obj);
  155. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  156. }
  157. return ret;
  158. }
  159. #endif
  160. /*****************************************************************
  161. *
  162. * FUNCTIONS TO CLOSE THE THREAD
  163. *
  164. *****************************************************************/
  165. /**
  166. * Swap exit
  167. *
  168. * Cancel thread and exit.
  169. *
  170. * @param ptr thread data.
  171. */
  172. static void ebpf_swap_exit(void *ptr)
  173. {
  174. ebpf_module_t *em = (ebpf_module_t *)ptr;
  175. if (!em->enabled) {
  176. em->enabled = NETDATA_MAIN_THREAD_EXITED;
  177. return;
  178. }
  179. ebpf_swap_exited = NETDATA_THREAD_EBPF_STOPPING;
  180. }
  181. /**
  182. * Swap cleanup
  183. *
  184. * Clean up allocated memory.
  185. *
  186. * @param ptr thread data.
  187. */
  188. static void ebpf_swap_cleanup(void *ptr)
  189. {
  190. ebpf_module_t *em = (ebpf_module_t *)ptr;
  191. if (ebpf_swap_exited != NETDATA_THREAD_EBPF_STOPPED)
  192. return;
  193. ebpf_cleanup_publish_syscall(swap_publish_aggregated);
  194. freez(swap_vector);
  195. freez(swap_values);
  196. freez(swap_threads.thread);
  197. #ifdef LIBBPF_MAJOR_VERSION
  198. if (bpf_obj)
  199. swap_bpf__destroy(bpf_obj);
  200. #endif
  201. swap_threads.enabled = NETDATA_MAIN_THREAD_EXITED;
  202. em->enabled = NETDATA_MAIN_THREAD_EXITED;
  203. }
  204. /*****************************************************************
  205. *
  206. * COLLECTOR THREAD
  207. *
  208. *****************************************************************/
  209. /**
  210. * Apps Accumulator
  211. *
  212. * Sum all values read from kernel and store in the first address.
  213. *
  214. * @param out the vector with read values.
  215. */
  216. static void swap_apps_accumulator(netdata_publish_swap_t *out)
  217. {
  218. int i, end = (running_on_kernel >= NETDATA_KERNEL_V4_15) ? ebpf_nprocs : 1;
  219. netdata_publish_swap_t *total = &out[0];
  220. for (i = 1; i < end; i++) {
  221. netdata_publish_swap_t *w = &out[i];
  222. total->write += w->write;
  223. total->read += w->read;
  224. }
  225. }
  226. /**
  227. * Fill PID
  228. *
  229. * Fill PID structures
  230. *
  231. * @param current_pid pid that we are collecting data
  232. * @param out values read from hash tables;
  233. */
  234. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  235. {
  236. netdata_publish_swap_t *curr = swap_pid[current_pid];
  237. if (!curr) {
  238. curr = callocz(1, sizeof(netdata_publish_swap_t));
  239. swap_pid[current_pid] = curr;
  240. }
  241. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  242. }
  243. /**
  244. * Update cgroup
  245. *
  246. * Update cgroup data based in
  247. */
  248. static void ebpf_update_swap_cgroup()
  249. {
  250. ebpf_cgroup_target_t *ect ;
  251. netdata_publish_swap_t *cv = swap_vector;
  252. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  253. size_t length = sizeof(netdata_publish_swap_t)*ebpf_nprocs;
  254. pthread_mutex_lock(&mutex_cgroup_shm);
  255. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  256. struct pid_on_target2 *pids;
  257. for (pids = ect->pids; pids; pids = pids->next) {
  258. int pid = pids->pid;
  259. netdata_publish_swap_t *out = &pids->swap;
  260. if (likely(swap_pid) && swap_pid[pid]) {
  261. netdata_publish_swap_t *in = swap_pid[pid];
  262. memcpy(out, in, sizeof(netdata_publish_swap_t));
  263. } else {
  264. memset(cv, 0, length);
  265. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  266. swap_apps_accumulator(cv);
  267. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  268. }
  269. }
  270. }
  271. }
  272. pthread_mutex_unlock(&mutex_cgroup_shm);
  273. }
  274. /**
  275. * Read APPS table
  276. *
  277. * Read the apps table and store data inside the structure.
  278. */
  279. static void read_apps_table()
  280. {
  281. netdata_publish_swap_t *cv = swap_vector;
  282. uint32_t key;
  283. struct pid_stat *pids = root_of_pids;
  284. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  285. size_t length = sizeof(netdata_publish_swap_t)*ebpf_nprocs;
  286. while (pids) {
  287. key = pids->pid;
  288. if (bpf_map_lookup_elem(fd, &key, cv)) {
  289. pids = pids->next;
  290. continue;
  291. }
  292. swap_apps_accumulator(cv);
  293. swap_fill_pid(key, cv);
  294. // We are cleaning to avoid passing data read from one process to other.
  295. memset(cv, 0, length);
  296. pids = pids->next;
  297. }
  298. }
  299. /**
  300. * Send global
  301. *
  302. * Send global charts to Netdata
  303. */
  304. static void swap_send_global()
  305. {
  306. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_SYSTEM_GROUP,
  307. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  308. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  309. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  310. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  311. }
  312. /**
  313. * Read global counter
  314. *
  315. * Read the table with number of calls to all functions
  316. */
  317. static void read_global_table()
  318. {
  319. netdata_idx_t *stored = swap_values;
  320. netdata_idx_t *val = swap_hash_values;
  321. int fd = swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd;
  322. uint32_t i, end = NETDATA_SWAP_END;
  323. for (i = NETDATA_KEY_SWAP_READPAGE_CALL; i < end; i++) {
  324. if (!bpf_map_lookup_elem(fd, &i, stored)) {
  325. int j;
  326. int last = ebpf_nprocs;
  327. netdata_idx_t total = 0;
  328. for (j = 0; j < last; j++)
  329. total += stored[j];
  330. val[i] = total;
  331. }
  332. }
  333. }
  334. /**
  335. * Swap read hash
  336. *
  337. * This is the thread callback.
  338. *
  339. * @param ptr It is a NULL value for this thread.
  340. *
  341. * @return It always returns NULL.
  342. */
  343. void *ebpf_swap_read_hash(void *ptr)
  344. {
  345. netdata_thread_cleanup_push(ebpf_swap_cleanup, ptr);
  346. heartbeat_t hb;
  347. heartbeat_init(&hb);
  348. ebpf_module_t *em = (ebpf_module_t *)ptr;
  349. usec_t step = NETDATA_SWAP_SLEEP_MS * em->update_every;
  350. while (ebpf_swap_exited == NETDATA_THREAD_EBPF_RUNNING) {
  351. usec_t dt = heartbeat_next(&hb, step);
  352. (void)dt;
  353. if (ebpf_swap_exited == NETDATA_THREAD_EBPF_STOPPING)
  354. break;
  355. read_global_table();
  356. }
  357. ebpf_swap_exited = NETDATA_THREAD_EBPF_STOPPED;
  358. netdata_thread_cleanup_pop(1);
  359. return NULL;
  360. }
  361. /**
  362. * Sum PIDs
  363. *
  364. * Sum values for all targets.
  365. *
  366. * @param swap
  367. * @param root
  368. */
  369. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct pid_on_target *root)
  370. {
  371. uint64_t local_read = 0;
  372. uint64_t local_write = 0;
  373. while (root) {
  374. int32_t pid = root->pid;
  375. netdata_publish_swap_t *w = swap_pid[pid];
  376. if (w) {
  377. local_write += w->write;
  378. local_read += w->read;
  379. }
  380. root = root->next;
  381. }
  382. // These conditions were added, because we are using incremental algorithm
  383. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  384. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  385. }
  386. /**
  387. * Send data to Netdata calling auxiliary functions.
  388. *
  389. * @param root the target list.
  390. */
  391. void ebpf_swap_send_apps_data(struct target *root)
  392. {
  393. struct target *w;
  394. for (w = root; w; w = w->next) {
  395. if (unlikely(w->exposed && w->processes)) {
  396. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  397. }
  398. }
  399. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  400. for (w = root; w; w = w->next) {
  401. if (unlikely(w->exposed && w->processes)) {
  402. write_chart_dimension(w->name, (long long) w->swap.read);
  403. }
  404. }
  405. write_end_chart();
  406. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  407. for (w = root; w; w = w->next) {
  408. if (unlikely(w->exposed && w->processes)) {
  409. write_chart_dimension(w->name, (long long) w->swap.write);
  410. }
  411. }
  412. write_end_chart();
  413. }
  414. /**
  415. * Sum PIDs
  416. *
  417. * Sum values for all targets.
  418. *
  419. * @param swap
  420. * @param root
  421. */
  422. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  423. {
  424. uint64_t local_read = 0;
  425. uint64_t local_write = 0;
  426. while (pids) {
  427. netdata_publish_swap_t *w = &pids->swap;
  428. local_write += w->write;
  429. local_read += w->read;
  430. pids = pids->next;
  431. }
  432. // These conditions were added, because we are using incremental algorithm
  433. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  434. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  435. }
  436. /**
  437. * Send Systemd charts
  438. *
  439. * Send collected data to Netdata.
  440. *
  441. * @return It returns the status for chart creation, if it is necessary to remove a specific dimension, zero is returned
  442. * otherwise function returns 1 to avoid chart recreation
  443. */
  444. static int ebpf_send_systemd_swap_charts()
  445. {
  446. int ret = 1;
  447. ebpf_cgroup_target_t *ect;
  448. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  449. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  450. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  451. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  452. } else if (unlikely(ect->systemd))
  453. ret = 0;
  454. }
  455. write_end_chart();
  456. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  457. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  458. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  459. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  460. }
  461. }
  462. write_end_chart();
  463. return ret;
  464. }
  465. /**
  466. * Create specific swap charts
  467. *
  468. * Create charts for cgroup/application.
  469. *
  470. * @param type the chart type.
  471. * @param update_every value to overwrite the update frequency set by the server.
  472. */
  473. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  474. {
  475. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  476. "Calls to function <code>swap_readpage</code>.",
  477. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  478. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  479. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  480. ebpf_create_global_dimension,
  481. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  482. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  483. "Calls to function <code>swap_writepage</code>.",
  484. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  485. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  486. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  487. ebpf_create_global_dimension,
  488. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  489. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  490. }
  491. /**
  492. * Create specific swap charts
  493. *
  494. * Create charts for cgroup/application.
  495. *
  496. * @param type the chart type.
  497. * @param update_every value to overwrite the update frequency set by the server.
  498. */
  499. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  500. {
  501. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART,"Calls to function <code>swap_readpage</code>.",
  502. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  503. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  504. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  505. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "Calls to function <code>swap_writepage</code>.",
  506. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  507. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  508. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  509. }
  510. /*
  511. * Send Specific Swap data
  512. *
  513. * Send data for specific cgroup/apps.
  514. *
  515. * @param type chart type
  516. * @param values structure with values that will be sent to netdata
  517. */
  518. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  519. {
  520. write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART);
  521. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  522. write_end_chart();
  523. write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART);
  524. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  525. write_end_chart();
  526. }
  527. /**
  528. * Create Systemd Swap Charts
  529. *
  530. * Create charts when systemd is enabled
  531. *
  532. * @param update_every value to overwrite the update frequency set by the server.
  533. **/
  534. static void ebpf_create_systemd_swap_charts(int update_every)
  535. {
  536. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  537. "Calls to <code>swap_readpage</code>.",
  538. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  539. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  540. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  541. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  542. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  543. "Calls to function <code>swap_writepage</code>.",
  544. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  545. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  546. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  547. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  548. }
  549. /**
  550. * Send data to Netdata calling auxiliary functions.
  551. *
  552. * @param update_every value to overwrite the update frequency set by the server.
  553. */
  554. void ebpf_swap_send_cgroup_data(int update_every)
  555. {
  556. if (!ebpf_cgroup_pids)
  557. return;
  558. pthread_mutex_lock(&mutex_cgroup_shm);
  559. ebpf_cgroup_target_t *ect;
  560. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  561. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  562. }
  563. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  564. if (has_systemd) {
  565. static int systemd_charts = 0;
  566. if (!systemd_charts) {
  567. ebpf_create_systemd_swap_charts(update_every);
  568. systemd_charts = 1;
  569. fflush(stdout);
  570. }
  571. systemd_charts = ebpf_send_systemd_swap_charts();
  572. }
  573. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  574. if (ect->systemd)
  575. continue;
  576. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  577. ebpf_create_specific_swap_charts(ect->name, update_every);
  578. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  579. }
  580. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  581. if (ect->updated) {
  582. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  583. } else {
  584. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  585. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  586. }
  587. }
  588. }
  589. pthread_mutex_unlock(&mutex_cgroup_shm);
  590. }
  591. /**
  592. * Main loop for this collector.
  593. */
  594. static void swap_collector(ebpf_module_t *em)
  595. {
  596. swap_threads.thread = mallocz(sizeof(netdata_thread_t));
  597. swap_threads.start_routine = ebpf_swap_read_hash;
  598. netdata_thread_create(swap_threads.thread, swap_threads.name, NETDATA_THREAD_OPTION_DEFAULT,
  599. ebpf_swap_read_hash, em);
  600. int cgroup = em->cgroup_charts;
  601. int update_every = em->update_every;
  602. heartbeat_t hb;
  603. heartbeat_init(&hb);
  604. usec_t step = update_every * USEC_PER_SEC;
  605. while (!ebpf_exit_plugin) {
  606. (void)heartbeat_next(&hb, step);
  607. if (ebpf_exit_plugin)
  608. break;
  609. netdata_apps_integration_flags_t apps = em->apps_charts;
  610. pthread_mutex_lock(&collect_data_mutex);
  611. if (apps)
  612. read_apps_table();
  613. if (cgroup)
  614. ebpf_update_swap_cgroup();
  615. pthread_mutex_lock(&lock);
  616. swap_send_global();
  617. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  618. ebpf_swap_send_apps_data(apps_groups_root_target);
  619. if (cgroup)
  620. ebpf_swap_send_cgroup_data(update_every);
  621. pthread_mutex_unlock(&lock);
  622. pthread_mutex_unlock(&collect_data_mutex);
  623. }
  624. }
  625. /*****************************************************************
  626. *
  627. * INITIALIZE THREAD
  628. *
  629. *****************************************************************/
  630. /**
  631. * Create apps charts
  632. *
  633. * Call ebpf_create_chart to create the charts on apps submenu.
  634. *
  635. * @param em a pointer to the structure with the default values.
  636. */
  637. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  638. {
  639. struct target *root = ptr;
  640. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_READ_CHART,
  641. "Calls to function <code>swap_readpage</code>.",
  642. EBPF_COMMON_DIMENSION_CALL,
  643. NETDATA_SWAP_SUBMENU,
  644. NETDATA_EBPF_CHART_TYPE_STACKED,
  645. 20191,
  646. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  647. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  648. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_WRITE_CHART,
  649. "Calls to function <code>swap_writepage</code>.",
  650. EBPF_COMMON_DIMENSION_CALL,
  651. NETDATA_SWAP_SUBMENU,
  652. NETDATA_EBPF_CHART_TYPE_STACKED,
  653. 20192,
  654. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  655. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  656. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  657. }
  658. /**
  659. * Allocate vectors used with this thread.
  660. *
  661. * We are not testing the return, because callocz does this and shutdown the software
  662. * case it was not possible to allocate.
  663. *
  664. * @param apps is apps enabled?
  665. */
  666. static void ebpf_swap_allocate_global_vectors(int apps)
  667. {
  668. if (apps)
  669. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  670. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  671. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  672. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  673. }
  674. /*****************************************************************
  675. *
  676. * MAIN THREAD
  677. *
  678. *****************************************************************/
  679. /**
  680. * Create global charts
  681. *
  682. * Call ebpf_create_chart to create the charts for the collector.
  683. *
  684. * @param update_every value to overwrite the update frequency set by the server.
  685. */
  686. static void ebpf_create_swap_charts(int update_every)
  687. {
  688. ebpf_create_chart(NETDATA_EBPF_SYSTEM_GROUP, NETDATA_MEM_SWAP_CHART,
  689. "Calls to access swap memory",
  690. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  691. NULL,
  692. NETDATA_EBPF_CHART_TYPE_LINE,
  693. 202,
  694. ebpf_create_global_dimension,
  695. swap_publish_aggregated, NETDATA_SWAP_END,
  696. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  697. }
  698. /*
  699. * Load BPF
  700. *
  701. * Load BPF files.
  702. *
  703. * @param em the structure with configuration
  704. */
  705. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  706. {
  707. int ret = 0;
  708. if (em->load == EBPF_LOAD_LEGACY) {
  709. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  710. if (!em->probe_links) {
  711. ret = -1;
  712. }
  713. }
  714. #ifdef LIBBPF_MAJOR_VERSION
  715. else {
  716. bpf_obj = swap_bpf__open();
  717. if (!bpf_obj)
  718. ret = -1;
  719. else
  720. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  721. }
  722. #endif
  723. if (ret)
  724. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  725. return ret;
  726. }
  727. /**
  728. * SWAP thread
  729. *
  730. * Thread used to make swap thread
  731. *
  732. * @param ptr a pointer to `struct ebpf_module`
  733. *
  734. * @return It always return NULL
  735. */
  736. void *ebpf_swap_thread(void *ptr)
  737. {
  738. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  739. ebpf_module_t *em = (ebpf_module_t *)ptr;
  740. em->maps = swap_maps;
  741. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  742. if (!em->enabled)
  743. goto endswap;
  744. #ifdef LIBBPF_MAJOR_VERSION
  745. ebpf_adjust_thread_load(em, default_btf);
  746. #endif
  747. if (ebpf_swap_load_bpf(em)) {
  748. em->enabled = CONFIG_BOOLEAN_NO;
  749. goto endswap;
  750. }
  751. ebpf_swap_allocate_global_vectors(em->apps_charts);
  752. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  753. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  754. algorithms, NETDATA_SWAP_END);
  755. pthread_mutex_lock(&lock);
  756. ebpf_create_swap_charts(em->update_every);
  757. ebpf_update_stats(&plugin_statistics, em);
  758. pthread_mutex_unlock(&lock);
  759. swap_collector(em);
  760. endswap:
  761. if (!em->enabled)
  762. ebpf_update_disabled_plugin_stats(em);
  763. netdata_thread_cleanup_pop(1);
  764. return NULL;
  765. }