ebpf_swap.c 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  8. static netdata_idx_t *swap_values = NULL;
  9. netdata_publish_swap_t *swap_vector = NULL;
  10. struct config swap_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  19. #ifdef LIBBPF_MAJOR_VERSION
  20. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  21. #endif
  22. },
  23. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  24. .user_input = 0,
  25. .type = NETDATA_EBPF_MAP_CONTROLLER,
  26. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  27. #ifdef LIBBPF_MAJOR_VERSION
  28. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  29. #endif
  30. },
  31. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  32. .user_input = 0,
  33. .type = NETDATA_EBPF_MAP_STATIC,
  34. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  35. #ifdef LIBBPF_MAJOR_VERSION
  36. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  37. #endif
  38. },
  39. {.name = NULL, .internal_input = 0, .user_input = 0,
  40. #ifdef LIBBPF_MAJOR_VERSION
  41. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  42. #endif
  43. }};
  44. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  45. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  46. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  47. #ifdef LIBBPF_MAJOR_VERSION
  48. /**
  49. * Disable probe
  50. *
  51. * Disable all probes to use exclusively another method.
  52. *
  53. * @param obj is the main structure for bpf objects
  54. */
  55. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  56. {
  57. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  58. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  59. }
  60. /*
  61. * Disable trampoline
  62. *
  63. * Disable all trampoline to use exclusively another method.
  64. *
  65. * @param obj is the main structure for bpf objects.
  66. */
  67. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  68. {
  69. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  70. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  71. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  72. }
  73. /**
  74. * Set trampoline target
  75. *
  76. * Set the targets we will monitor.
  77. *
  78. * @param obj is the main structure for bpf objects.
  79. */
  80. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  81. {
  82. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  83. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  84. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  85. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  86. bpf_program__set_attach_target(obj->progs.netdata_release_task_fentry, 0,
  87. EBPF_COMMON_FNCT_CLEAN_UP);
  88. }
  89. /**
  90. * Mount Attach Probe
  91. *
  92. * Attach probes to target
  93. *
  94. * @param obj is the main structure for bpf objects.
  95. *
  96. * @return It returns 0 on success and -1 otherwise.
  97. */
  98. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  99. {
  100. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  101. false,
  102. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  103. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  104. if (ret)
  105. return -1;
  106. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  107. false,
  108. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  109. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  110. if (ret)
  111. return -1;
  112. obj->links.netdata_release_task_probe = bpf_program__attach_kprobe(obj->progs.netdata_release_task_probe,
  113. false,
  114. EBPF_COMMON_FNCT_CLEAN_UP);
  115. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  116. if (ret)
  117. return -1;
  118. return 0;
  119. }
  120. /**
  121. * Set hash tables
  122. *
  123. * Set the values for maps according the value given by kernel.
  124. *
  125. * @param obj is the main structure for bpf objects.
  126. */
  127. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  128. {
  129. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  130. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  131. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  132. }
  133. /**
  134. * Adjust Map
  135. *
  136. * Resize maps according input from users.
  137. *
  138. * @param obj is the main structure for bpf objects.
  139. * @param em structure with configuration
  140. */
  141. static void ebpf_swap_adjust_map(struct swap_bpf *obj, ebpf_module_t *em)
  142. {
  143. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  144. em, bpf_map__name(obj->maps.tbl_pid_swap));
  145. ebpf_update_map_type(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE]);
  146. ebpf_update_map_type(obj->maps.tbl_swap, &swap_maps[NETDATA_SWAP_GLOBAL_TABLE]);
  147. ebpf_update_map_type(obj->maps.swap_ctrl, &swap_maps[NETDATA_SWAP_CONTROLLER]);
  148. }
  149. /**
  150. * Disable Release Task
  151. *
  152. * Disable release task when apps is not enabled.
  153. *
  154. * @param obj is the main structure for bpf objects.
  155. */
  156. static void ebpf_swap_disable_release_task(struct swap_bpf *obj)
  157. {
  158. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  159. bpf_program__set_autoload(obj->progs.netdata_release_task_probe, false);
  160. }
  161. /**
  162. * Load and attach
  163. *
  164. * Load and attach the eBPF code in kernel.
  165. *
  166. * @param obj is the main structure for bpf objects.
  167. * @param em structure with configuration
  168. *
  169. * @return it returns 0 on success and -1 otherwise
  170. */
  171. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  172. {
  173. netdata_ebpf_targets_t *mt = em->targets;
  174. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  175. if (test == EBPF_LOAD_TRAMPOLINE) {
  176. ebpf_swap_disable_probe(obj);
  177. ebpf_swap_set_trampoline_target(obj);
  178. } else {
  179. ebpf_swap_disable_trampoline(obj);
  180. }
  181. ebpf_swap_adjust_map(obj, em);
  182. if (!em->apps_charts && !em->cgroup_charts)
  183. ebpf_swap_disable_release_task(obj);
  184. int ret = swap_bpf__load(obj);
  185. if (ret) {
  186. return ret;
  187. }
  188. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  189. if (!ret) {
  190. ebpf_swap_set_hash_tables(obj);
  191. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  192. }
  193. return ret;
  194. }
  195. #endif
  196. /*****************************************************************
  197. *
  198. * FUNCTIONS TO CLOSE THE THREAD
  199. *
  200. *****************************************************************/
  201. /**
  202. * Swap exit
  203. *
  204. * Cancel thread and exit.
  205. *
  206. * @param ptr thread data.
  207. */
  208. static void ebpf_swap_exit(void *ptr)
  209. {
  210. ebpf_module_t *em = (ebpf_module_t *)ptr;
  211. #ifdef LIBBPF_MAJOR_VERSION
  212. if (bpf_obj)
  213. swap_bpf__destroy(bpf_obj);
  214. #endif
  215. if (em->objects)
  216. ebpf_unload_legacy_code(em->objects, em->probe_links);
  217. pthread_mutex_lock(&ebpf_exit_cleanup);
  218. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  219. pthread_mutex_unlock(&ebpf_exit_cleanup);
  220. }
  221. /*****************************************************************
  222. *
  223. * COLLECTOR THREAD
  224. *
  225. *****************************************************************/
  226. /**
  227. * Apps Accumulator
  228. *
  229. * Sum all values read from kernel and store in the first address.
  230. *
  231. * @param out the vector with read values.
  232. * @param maps_per_core do I need to read all cores?
  233. */
  234. static void swap_apps_accumulator(netdata_publish_swap_t *out, int maps_per_core)
  235. {
  236. int i, end = (maps_per_core) ? ebpf_nprocs : 1;
  237. netdata_publish_swap_t *total = &out[0];
  238. for (i = 1; i < end; i++) {
  239. netdata_publish_swap_t *w = &out[i];
  240. total->write += w->write;
  241. total->read += w->read;
  242. }
  243. }
  244. /**
  245. * Fill PID
  246. *
  247. * Fill PID structures
  248. *
  249. * @param current_pid pid that we are collecting data
  250. * @param out values read from hash tables;
  251. */
  252. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  253. {
  254. netdata_publish_swap_t *curr = swap_pid[current_pid];
  255. if (!curr) {
  256. curr = callocz(1, sizeof(netdata_publish_swap_t));
  257. swap_pid[current_pid] = curr;
  258. }
  259. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  260. }
  261. /**
  262. * Update cgroup
  263. *
  264. * Update cgroup data based in
  265. *
  266. * @param maps_per_core do I need to read all cores?
  267. */
  268. static void ebpf_update_swap_cgroup(int maps_per_core)
  269. {
  270. ebpf_cgroup_target_t *ect ;
  271. netdata_publish_swap_t *cv = swap_vector;
  272. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  273. size_t length = sizeof(netdata_publish_swap_t);
  274. if (maps_per_core)
  275. length *= ebpf_nprocs;
  276. pthread_mutex_lock(&mutex_cgroup_shm);
  277. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  278. struct pid_on_target2 *pids;
  279. for (pids = ect->pids; pids; pids = pids->next) {
  280. int pid = pids->pid;
  281. netdata_publish_swap_t *out = &pids->swap;
  282. if (likely(swap_pid) && swap_pid[pid]) {
  283. netdata_publish_swap_t *in = swap_pid[pid];
  284. memcpy(out, in, sizeof(netdata_publish_swap_t));
  285. } else {
  286. memset(cv, 0, length);
  287. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  288. swap_apps_accumulator(cv, maps_per_core);
  289. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  290. // We are cleaning to avoid passing data read from one process to other.
  291. memset(cv, 0, length);
  292. }
  293. }
  294. }
  295. }
  296. pthread_mutex_unlock(&mutex_cgroup_shm);
  297. }
  298. /**
  299. * Read APPS table
  300. *
  301. * Read the apps table and store data inside the structure.
  302. *
  303. * @param maps_per_core do I need to read all cores?
  304. */
  305. static void read_swap_apps_table(int maps_per_core)
  306. {
  307. netdata_publish_swap_t *cv = swap_vector;
  308. uint32_t key;
  309. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  310. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  311. size_t length = sizeof(netdata_publish_swap_t);
  312. if (maps_per_core)
  313. length *= ebpf_nprocs;
  314. while (pids) {
  315. key = pids->pid;
  316. if (bpf_map_lookup_elem(fd, &key, cv)) {
  317. pids = pids->next;
  318. continue;
  319. }
  320. swap_apps_accumulator(cv, maps_per_core);
  321. swap_fill_pid(key, cv);
  322. // We are cleaning to avoid passing data read from one process to other.
  323. memset(cv, 0, length);
  324. pids = pids->next;
  325. }
  326. }
  327. /**
  328. * Send global
  329. *
  330. * Send global charts to Netdata
  331. */
  332. static void swap_send_global()
  333. {
  334. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_SYSTEM_GROUP,
  335. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  336. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  337. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  338. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  339. }
  340. /**
  341. * Read global counter
  342. *
  343. * Read the table with number of calls to all functions
  344. *
  345. * @param maps_per_core do I need to read all cores?
  346. */
  347. static void ebpf_swap_read_global_table(int maps_per_core)
  348. {
  349. netdata_idx_t *stored = swap_values;
  350. netdata_idx_t *val = swap_hash_values;
  351. int fd = swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd;
  352. uint32_t i, end = NETDATA_SWAP_END;
  353. for (i = NETDATA_KEY_SWAP_READPAGE_CALL; i < end; i++) {
  354. if (!bpf_map_lookup_elem(fd, &i, stored)) {
  355. int j;
  356. int last = (maps_per_core) ? ebpf_nprocs : 1;
  357. netdata_idx_t total = 0;
  358. for (j = 0; j < last; j++)
  359. total += stored[j];
  360. val[i] = total;
  361. }
  362. }
  363. }
  364. /**
  365. * Sum PIDs
  366. *
  367. * Sum values for all targets.
  368. *
  369. * @param swap
  370. * @param root
  371. */
  372. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct ebpf_pid_on_target *root)
  373. {
  374. uint64_t local_read = 0;
  375. uint64_t local_write = 0;
  376. while (root) {
  377. int32_t pid = root->pid;
  378. netdata_publish_swap_t *w = swap_pid[pid];
  379. if (w) {
  380. local_write += w->write;
  381. local_read += w->read;
  382. }
  383. root = root->next;
  384. }
  385. // These conditions were added, because we are using incremental algorithm
  386. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  387. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  388. }
  389. /**
  390. * Send data to Netdata calling auxiliary functions.
  391. *
  392. * @param root the target list.
  393. */
  394. void ebpf_swap_send_apps_data(struct ebpf_target *root)
  395. {
  396. struct ebpf_target *w;
  397. for (w = root; w; w = w->next) {
  398. if (unlikely(w->exposed && w->processes)) {
  399. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  400. }
  401. }
  402. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  403. for (w = root; w; w = w->next) {
  404. if (unlikely(w->exposed && w->processes)) {
  405. write_chart_dimension(w->name, (long long) w->swap.read);
  406. }
  407. }
  408. write_end_chart();
  409. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  410. for (w = root; w; w = w->next) {
  411. if (unlikely(w->exposed && w->processes)) {
  412. write_chart_dimension(w->name, (long long) w->swap.write);
  413. }
  414. }
  415. write_end_chart();
  416. }
  417. /**
  418. * Sum PIDs
  419. *
  420. * Sum values for all targets.
  421. *
  422. * @param swap
  423. * @param root
  424. */
  425. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  426. {
  427. uint64_t local_read = 0;
  428. uint64_t local_write = 0;
  429. while (pids) {
  430. netdata_publish_swap_t *w = &pids->swap;
  431. local_write += w->write;
  432. local_read += w->read;
  433. pids = pids->next;
  434. }
  435. // These conditions were added, because we are using incremental algorithm
  436. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  437. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  438. }
  439. /**
  440. * Send Systemd charts
  441. *
  442. * Send collected data to Netdata.
  443. */
  444. static void ebpf_send_systemd_swap_charts()
  445. {
  446. ebpf_cgroup_target_t *ect;
  447. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  448. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  449. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  450. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  451. }
  452. }
  453. write_end_chart();
  454. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  455. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  456. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  457. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  458. }
  459. }
  460. write_end_chart();
  461. }
  462. /**
  463. * Create specific swap charts
  464. *
  465. * Create charts for cgroup/application.
  466. *
  467. * @param type the chart type.
  468. * @param update_every value to overwrite the update frequency set by the server.
  469. */
  470. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  471. {
  472. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  473. "Calls to function <code>swap_readpage</code>.",
  474. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  475. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  476. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  477. ebpf_create_global_dimension,
  478. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  479. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  480. "Calls to function <code>swap_writepage</code>.",
  481. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  482. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  483. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  484. ebpf_create_global_dimension,
  485. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  486. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  487. }
  488. /**
  489. * Create specific swap charts
  490. *
  491. * Create charts for cgroup/application.
  492. *
  493. * @param type the chart type.
  494. * @param update_every value to overwrite the update frequency set by the server.
  495. */
  496. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  497. {
  498. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART,"Calls to function <code>swap_readpage</code>.",
  499. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  500. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  501. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  502. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "Calls to function <code>swap_writepage</code>.",
  503. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  504. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  505. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  506. }
  507. /*
  508. * Send Specific Swap data
  509. *
  510. * Send data for specific cgroup/apps.
  511. *
  512. * @param type chart type
  513. * @param values structure with values that will be sent to netdata
  514. */
  515. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  516. {
  517. write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART);
  518. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  519. write_end_chart();
  520. write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART);
  521. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  522. write_end_chart();
  523. }
  524. /**
  525. * Create Systemd Swap Charts
  526. *
  527. * Create charts when systemd is enabled
  528. *
  529. * @param update_every value to overwrite the update frequency set by the server.
  530. **/
  531. static void ebpf_create_systemd_swap_charts(int update_every)
  532. {
  533. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  534. "Calls to <code>swap_readpage</code>.",
  535. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  536. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  537. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  538. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  539. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  540. "Calls to function <code>swap_writepage</code>.",
  541. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  542. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  543. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  544. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  545. }
  546. /**
  547. * Send data to Netdata calling auxiliary functions.
  548. *
  549. * @param update_every value to overwrite the update frequency set by the server.
  550. */
  551. void ebpf_swap_send_cgroup_data(int update_every)
  552. {
  553. if (!ebpf_cgroup_pids)
  554. return;
  555. pthread_mutex_lock(&mutex_cgroup_shm);
  556. ebpf_cgroup_target_t *ect;
  557. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  558. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  559. }
  560. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  561. if (has_systemd) {
  562. if (send_cgroup_chart) {
  563. ebpf_create_systemd_swap_charts(update_every);
  564. fflush(stdout);
  565. }
  566. ebpf_send_systemd_swap_charts();
  567. }
  568. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  569. if (ect->systemd)
  570. continue;
  571. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  572. ebpf_create_specific_swap_charts(ect->name, update_every);
  573. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  574. }
  575. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  576. if (ect->updated) {
  577. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  578. } else {
  579. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  580. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  581. }
  582. }
  583. }
  584. pthread_mutex_unlock(&mutex_cgroup_shm);
  585. }
  586. /**
  587. * Main loop for this collector.
  588. */
  589. static void swap_collector(ebpf_module_t *em)
  590. {
  591. int cgroup = em->cgroup_charts;
  592. int update_every = em->update_every;
  593. heartbeat_t hb;
  594. heartbeat_init(&hb);
  595. int counter = update_every - 1;
  596. int maps_per_core = em->maps_per_core;
  597. while (!ebpf_exit_plugin) {
  598. (void)heartbeat_next(&hb, USEC_PER_SEC);
  599. if (ebpf_exit_plugin || ++counter != update_every)
  600. continue;
  601. counter = 0;
  602. netdata_apps_integration_flags_t apps = em->apps_charts;
  603. ebpf_swap_read_global_table(maps_per_core);
  604. pthread_mutex_lock(&collect_data_mutex);
  605. if (apps)
  606. read_swap_apps_table(maps_per_core);
  607. if (cgroup)
  608. ebpf_update_swap_cgroup(maps_per_core);
  609. pthread_mutex_lock(&lock);
  610. swap_send_global();
  611. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  612. ebpf_swap_send_apps_data(apps_groups_root_target);
  613. if (cgroup)
  614. ebpf_swap_send_cgroup_data(update_every);
  615. pthread_mutex_unlock(&lock);
  616. pthread_mutex_unlock(&collect_data_mutex);
  617. }
  618. }
  619. /*****************************************************************
  620. *
  621. * INITIALIZE THREAD
  622. *
  623. *****************************************************************/
  624. /**
  625. * Create apps charts
  626. *
  627. * Call ebpf_create_chart to create the charts on apps submenu.
  628. *
  629. * @param em a pointer to the structure with the default values.
  630. */
  631. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  632. {
  633. struct ebpf_target *root = ptr;
  634. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_READ_CHART,
  635. "Calls to function <code>swap_readpage</code>.",
  636. EBPF_COMMON_DIMENSION_CALL,
  637. NETDATA_SWAP_SUBMENU,
  638. NETDATA_EBPF_CHART_TYPE_STACKED,
  639. 20191,
  640. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  641. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  642. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_WRITE_CHART,
  643. "Calls to function <code>swap_writepage</code>.",
  644. EBPF_COMMON_DIMENSION_CALL,
  645. NETDATA_SWAP_SUBMENU,
  646. NETDATA_EBPF_CHART_TYPE_STACKED,
  647. 20192,
  648. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  649. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  650. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  651. }
  652. /**
  653. * Allocate vectors used with this thread.
  654. *
  655. * We are not testing the return, because callocz does this and shutdown the software
  656. * case it was not possible to allocate.
  657. *
  658. * @param apps is apps enabled?
  659. */
  660. static void ebpf_swap_allocate_global_vectors(int apps)
  661. {
  662. if (apps)
  663. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  664. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  665. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  666. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  667. }
  668. /*****************************************************************
  669. *
  670. * MAIN THREAD
  671. *
  672. *****************************************************************/
  673. /**
  674. * Create global charts
  675. *
  676. * Call ebpf_create_chart to create the charts for the collector.
  677. *
  678. * @param update_every value to overwrite the update frequency set by the server.
  679. */
  680. static void ebpf_create_swap_charts(int update_every)
  681. {
  682. ebpf_create_chart(NETDATA_EBPF_SYSTEM_GROUP, NETDATA_MEM_SWAP_CHART,
  683. "Calls to access swap memory",
  684. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  685. NULL,
  686. NETDATA_EBPF_CHART_TYPE_LINE,
  687. NETDATA_CHART_PRIO_SYSTEM_SWAP_CALLS,
  688. ebpf_create_global_dimension,
  689. swap_publish_aggregated, NETDATA_SWAP_END,
  690. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  691. }
  692. /*
  693. * Load BPF
  694. *
  695. * Load BPF files.
  696. *
  697. * @param em the structure with configuration
  698. */
  699. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  700. {
  701. #ifdef LIBBPF_MAJOR_VERSION
  702. ebpf_define_map_type(em->maps, em->maps_per_core, running_on_kernel);
  703. #endif
  704. int ret = 0;
  705. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_KEY_SWAP_READPAGE_CALL].mode);
  706. if (em->load & EBPF_LOAD_LEGACY) {
  707. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  708. if (!em->probe_links) {
  709. ret = -1;
  710. }
  711. }
  712. #ifdef LIBBPF_MAJOR_VERSION
  713. else {
  714. bpf_obj = swap_bpf__open();
  715. if (!bpf_obj)
  716. ret = -1;
  717. else
  718. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  719. }
  720. #endif
  721. if (ret)
  722. error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  723. return ret;
  724. }
  725. /**
  726. * SWAP thread
  727. *
  728. * Thread used to make swap thread
  729. *
  730. * @param ptr a pointer to `struct ebpf_module`
  731. *
  732. * @return It always return NULL
  733. */
  734. void *ebpf_swap_thread(void *ptr)
  735. {
  736. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  737. ebpf_module_t *em = (ebpf_module_t *)ptr;
  738. em->maps = swap_maps;
  739. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  740. #ifdef LIBBPF_MAJOR_VERSION
  741. ebpf_adjust_thread_load(em, default_btf);
  742. #endif
  743. if (ebpf_swap_load_bpf(em)) {
  744. goto endswap;
  745. }
  746. ebpf_swap_allocate_global_vectors(em->apps_charts);
  747. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  748. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  749. algorithms, NETDATA_SWAP_END);
  750. pthread_mutex_lock(&lock);
  751. ebpf_create_swap_charts(em->update_every);
  752. ebpf_update_stats(&plugin_statistics, em);
  753. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps);
  754. pthread_mutex_unlock(&lock);
  755. swap_collector(em);
  756. endswap:
  757. ebpf_update_disabled_plugin_stats(em);
  758. netdata_thread_cleanup_pop(1);
  759. return NULL;
  760. }