ebpf_swap.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  8. static netdata_idx_t *swap_values = NULL;
  9. netdata_publish_swap_t *swap_vector = NULL;
  10. struct config swap_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  19. #ifdef LIBBPF_MAJOR_VERSION
  20. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  21. #endif
  22. },
  23. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  24. .user_input = 0,
  25. .type = NETDATA_EBPF_MAP_CONTROLLER,
  26. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  27. #ifdef LIBBPF_MAJOR_VERSION
  28. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  29. #endif
  30. },
  31. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  32. .user_input = 0,
  33. .type = NETDATA_EBPF_MAP_STATIC,
  34. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  35. #ifdef LIBBPF_MAJOR_VERSION
  36. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  37. #endif
  38. },
  39. {.name = NULL, .internal_input = 0, .user_input = 0,
  40. #ifdef LIBBPF_MAJOR_VERSION
  41. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  42. #endif
  43. }};
  44. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  45. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  46. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  47. #ifdef LIBBPF_MAJOR_VERSION
  48. /**
  49. * Disable probe
  50. *
  51. * Disable all probes to use exclusively another method.
  52. *
  53. * @param obj is the main structure for bpf objects
  54. */
  55. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  56. {
  57. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  58. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  59. }
  60. /*
  61. * Disable trampoline
  62. *
  63. * Disable all trampoline to use exclusively another method.
  64. *
  65. * @param obj is the main structure for bpf objects.
  66. */
  67. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  68. {
  69. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  70. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  71. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  72. }
  73. /**
  74. * Set trampoline target
  75. *
  76. * Set the targets we will monitor.
  77. *
  78. * @param obj is the main structure for bpf objects.
  79. */
  80. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  81. {
  82. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  83. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  84. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  85. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  86. bpf_program__set_attach_target(obj->progs.netdata_release_task_fentry, 0,
  87. EBPF_COMMON_FNCT_CLEAN_UP);
  88. }
  89. /**
  90. * Mount Attach Probe
  91. *
  92. * Attach probes to target
  93. *
  94. * @param obj is the main structure for bpf objects.
  95. *
  96. * @return It returns 0 on success and -1 otherwise.
  97. */
  98. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  99. {
  100. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  101. false,
  102. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  103. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  104. if (ret)
  105. return -1;
  106. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  107. false,
  108. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  109. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  110. if (ret)
  111. return -1;
  112. obj->links.netdata_release_task_probe = bpf_program__attach_kprobe(obj->progs.netdata_release_task_probe,
  113. false,
  114. EBPF_COMMON_FNCT_CLEAN_UP);
  115. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  116. if (ret)
  117. return -1;
  118. return 0;
  119. }
  120. /**
  121. * Set hash tables
  122. *
  123. * Set the values for maps according the value given by kernel.
  124. *
  125. * @param obj is the main structure for bpf objects.
  126. */
  127. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  128. {
  129. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  130. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  131. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  132. }
  133. /**
  134. * Adjust Map
  135. *
  136. * Resize maps according input from users.
  137. *
  138. * @param obj is the main structure for bpf objects.
  139. * @param em structure with configuration
  140. */
  141. static void ebpf_swap_adjust_map(struct swap_bpf *obj, ebpf_module_t *em)
  142. {
  143. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  144. em, bpf_map__name(obj->maps.tbl_pid_swap));
  145. ebpf_update_map_type(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE]);
  146. ebpf_update_map_type(obj->maps.tbl_swap, &swap_maps[NETDATA_SWAP_GLOBAL_TABLE]);
  147. ebpf_update_map_type(obj->maps.swap_ctrl, &swap_maps[NETDATA_SWAP_CONTROLLER]);
  148. }
  149. /**
  150. * Disable Release Task
  151. *
  152. * Disable release task when apps is not enabled.
  153. *
  154. * @param obj is the main structure for bpf objects.
  155. */
  156. static void ebpf_swap_disable_release_task(struct swap_bpf *obj)
  157. {
  158. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  159. bpf_program__set_autoload(obj->progs.netdata_release_task_probe, false);
  160. }
  161. /**
  162. * Load and attach
  163. *
  164. * Load and attach the eBPF code in kernel.
  165. *
  166. * @param obj is the main structure for bpf objects.
  167. * @param em structure with configuration
  168. *
  169. * @return it returns 0 on success and -1 otherwise
  170. */
  171. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  172. {
  173. netdata_ebpf_targets_t *mt = em->targets;
  174. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  175. if (test == EBPF_LOAD_TRAMPOLINE) {
  176. ebpf_swap_disable_probe(obj);
  177. ebpf_swap_set_trampoline_target(obj);
  178. } else {
  179. ebpf_swap_disable_trampoline(obj);
  180. }
  181. ebpf_swap_adjust_map(obj, em);
  182. if (!em->apps_charts && !em->cgroup_charts)
  183. ebpf_swap_disable_release_task(obj);
  184. int ret = swap_bpf__load(obj);
  185. if (ret) {
  186. return ret;
  187. }
  188. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  189. if (!ret) {
  190. ebpf_swap_set_hash_tables(obj);
  191. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  192. }
  193. return ret;
  194. }
  195. #endif
  196. /*****************************************************************
  197. *
  198. * FUNCTIONS TO CLOSE THE THREAD
  199. *
  200. *****************************************************************/
  201. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every);
  202. /**
  203. * Obsolete services
  204. *
  205. * Obsolete all service charts created
  206. *
  207. * @param em a pointer to `struct ebpf_module`
  208. */
  209. static void ebpf_obsolete_swap_services(ebpf_module_t *em)
  210. {
  211. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  212. NETDATA_MEM_SWAP_READ_CHART,
  213. "Calls to function <code>swap_readpage</code>.",
  214. EBPF_COMMON_DIMENSION_CALL,
  215. NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  216. NETDATA_EBPF_CHART_TYPE_LINE,
  217. NETDATA_CGROUP_SWAP_READ_CONTEXT,
  218. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  219. em->update_every);
  220. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  221. NETDATA_MEM_SWAP_WRITE_CHART,
  222. "Calls to function <code>swap_writepage</code>.",
  223. EBPF_COMMON_DIMENSION_CALL,
  224. NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  225. NETDATA_EBPF_CHART_TYPE_LINE,
  226. NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  227. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  228. em->update_every);
  229. }
  230. /**
  231. * Obsolete cgroup chart
  232. *
  233. * Send obsolete for all charts created before to close.
  234. *
  235. * @param em a pointer to `struct ebpf_module`
  236. */
  237. static inline void ebpf_obsolete_swap_cgroup_charts(ebpf_module_t *em) {
  238. pthread_mutex_lock(&mutex_cgroup_shm);
  239. ebpf_obsolete_swap_services(em);
  240. ebpf_cgroup_target_t *ect;
  241. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  242. if (ect->systemd)
  243. continue;
  244. ebpf_obsolete_specific_swap_charts(ect->name, em->update_every);
  245. }
  246. pthread_mutex_unlock(&mutex_cgroup_shm);
  247. }
  248. /**
  249. * Obsolette apps charts
  250. *
  251. * Obsolete apps charts.
  252. *
  253. * @param em a pointer to the structure with the default values.
  254. */
  255. void ebpf_obsolete_swap_apps_charts(struct ebpf_module *em)
  256. {
  257. ebpf_write_chart_obsolete(NETDATA_APPS_FAMILY,
  258. NETDATA_MEM_SWAP_READ_CHART,
  259. "Calls to function <code>swap_readpage</code>.",
  260. EBPF_COMMON_DIMENSION_CALL,
  261. NETDATA_SWAP_SUBMENU,
  262. NETDATA_EBPF_CHART_TYPE_STACKED,
  263. NULL,
  264. 20191,
  265. em->update_every);
  266. ebpf_write_chart_obsolete(NETDATA_APPS_FAMILY,
  267. NETDATA_MEM_SWAP_WRITE_CHART,
  268. "Calls to function <code>swap_writepage</code>.",
  269. EBPF_COMMON_DIMENSION_CALL,
  270. NETDATA_SWAP_SUBMENU,
  271. NETDATA_EBPF_CHART_TYPE_STACKED,
  272. NULL,
  273. 20192,
  274. em->update_every);
  275. }
  276. /**
  277. * Obsolete global
  278. *
  279. * Obsolete global charts created by thread.
  280. *
  281. * @param em a pointer to `struct ebpf_module`
  282. */
  283. static void ebpf_obsolete_swap_global(ebpf_module_t *em)
  284. {
  285. ebpf_write_chart_obsolete(NETDATA_EBPF_SYSTEM_GROUP,
  286. NETDATA_MEM_SWAP_CHART,
  287. "Calls to access swap memory",
  288. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  289. NETDATA_EBPF_CHART_TYPE_LINE,
  290. NULL,
  291. NETDATA_CHART_PRIO_SYSTEM_SWAP_CALLS,
  292. em->update_every);
  293. }
  294. /**
  295. * Swap exit
  296. *
  297. * Cancel thread and exit.
  298. *
  299. * @param ptr thread data.
  300. */
  301. static void ebpf_swap_exit(void *ptr)
  302. {
  303. ebpf_module_t *em = (ebpf_module_t *)ptr;
  304. if (em->enabled == NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
  305. pthread_mutex_lock(&lock);
  306. if (em->cgroup_charts) {
  307. ebpf_obsolete_swap_cgroup_charts(em);
  308. fflush(stdout);
  309. }
  310. if (em->apps_charts & NETDATA_EBPF_APPS_FLAG_CHART_CREATED) {
  311. ebpf_obsolete_swap_apps_charts(em);
  312. }
  313. ebpf_obsolete_swap_global(em);
  314. fflush(stdout);
  315. pthread_mutex_unlock(&lock);
  316. }
  317. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_REMOVE);
  318. #ifdef LIBBPF_MAJOR_VERSION
  319. if (bpf_obj) {
  320. swap_bpf__destroy(bpf_obj);
  321. bpf_obj = NULL;
  322. }
  323. #endif
  324. if (em->objects) {
  325. ebpf_unload_legacy_code(em->objects, em->probe_links);
  326. em->objects = NULL;
  327. em->probe_links = NULL;
  328. }
  329. pthread_mutex_lock(&ebpf_exit_cleanup);
  330. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  331. ebpf_update_stats(&plugin_statistics, em);
  332. pthread_mutex_unlock(&ebpf_exit_cleanup);
  333. }
  334. /*****************************************************************
  335. *
  336. * COLLECTOR THREAD
  337. *
  338. *****************************************************************/
  339. /**
  340. * Apps Accumulator
  341. *
  342. * Sum all values read from kernel and store in the first address.
  343. *
  344. * @param out the vector with read values.
  345. * @param maps_per_core do I need to read all cores?
  346. */
  347. static void swap_apps_accumulator(netdata_publish_swap_t *out, int maps_per_core)
  348. {
  349. int i, end = (maps_per_core) ? ebpf_nprocs : 1;
  350. netdata_publish_swap_t *total = &out[0];
  351. for (i = 1; i < end; i++) {
  352. netdata_publish_swap_t *w = &out[i];
  353. total->write += w->write;
  354. total->read += w->read;
  355. }
  356. }
  357. /**
  358. * Fill PID
  359. *
  360. * Fill PID structures
  361. *
  362. * @param current_pid pid that we are collecting data
  363. * @param out values read from hash tables;
  364. */
  365. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  366. {
  367. netdata_publish_swap_t *curr = swap_pid[current_pid];
  368. if (!curr) {
  369. curr = callocz(1, sizeof(netdata_publish_swap_t));
  370. swap_pid[current_pid] = curr;
  371. }
  372. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  373. }
  374. /**
  375. * Update cgroup
  376. *
  377. * Update cgroup data based in
  378. *
  379. * @param maps_per_core do I need to read all cores?
  380. */
  381. static void ebpf_update_swap_cgroup(int maps_per_core)
  382. {
  383. ebpf_cgroup_target_t *ect ;
  384. netdata_publish_swap_t *cv = swap_vector;
  385. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  386. size_t length = sizeof(netdata_publish_swap_t);
  387. if (maps_per_core)
  388. length *= ebpf_nprocs;
  389. pthread_mutex_lock(&mutex_cgroup_shm);
  390. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  391. struct pid_on_target2 *pids;
  392. for (pids = ect->pids; pids; pids = pids->next) {
  393. int pid = pids->pid;
  394. netdata_publish_swap_t *out = &pids->swap;
  395. if (likely(swap_pid) && swap_pid[pid]) {
  396. netdata_publish_swap_t *in = swap_pid[pid];
  397. memcpy(out, in, sizeof(netdata_publish_swap_t));
  398. } else {
  399. memset(cv, 0, length);
  400. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  401. swap_apps_accumulator(cv, maps_per_core);
  402. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  403. // We are cleaning to avoid passing data read from one process to other.
  404. memset(cv, 0, length);
  405. }
  406. }
  407. }
  408. }
  409. pthread_mutex_unlock(&mutex_cgroup_shm);
  410. }
  411. /**
  412. * Read APPS table
  413. *
  414. * Read the apps table and store data inside the structure.
  415. *
  416. * @param maps_per_core do I need to read all cores?
  417. */
  418. static void read_swap_apps_table(int maps_per_core)
  419. {
  420. netdata_publish_swap_t *cv = swap_vector;
  421. uint32_t key;
  422. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  423. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  424. size_t length = sizeof(netdata_publish_swap_t);
  425. if (maps_per_core)
  426. length *= ebpf_nprocs;
  427. while (pids) {
  428. key = pids->pid;
  429. if (bpf_map_lookup_elem(fd, &key, cv)) {
  430. pids = pids->next;
  431. continue;
  432. }
  433. swap_apps_accumulator(cv, maps_per_core);
  434. swap_fill_pid(key, cv);
  435. // We are cleaning to avoid passing data read from one process to other.
  436. memset(cv, 0, length);
  437. pids = pids->next;
  438. }
  439. }
  440. /**
  441. * Send global
  442. *
  443. * Send global charts to Netdata
  444. */
  445. static void swap_send_global()
  446. {
  447. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_SYSTEM_GROUP,
  448. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  449. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  450. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  451. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  452. }
  453. /**
  454. * Read global counter
  455. *
  456. * Read the table with number of calls to all functions
  457. *
  458. * @param maps_per_core do I need to read all cores?
  459. */
  460. static void ebpf_swap_read_global_table(int maps_per_core)
  461. {
  462. netdata_idx_t *stored = swap_values;
  463. netdata_idx_t *val = swap_hash_values;
  464. int fd = swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd;
  465. uint32_t i, end = NETDATA_SWAP_END;
  466. for (i = NETDATA_KEY_SWAP_READPAGE_CALL; i < end; i++) {
  467. if (!bpf_map_lookup_elem(fd, &i, stored)) {
  468. int j;
  469. int last = (maps_per_core) ? ebpf_nprocs : 1;
  470. netdata_idx_t total = 0;
  471. for (j = 0; j < last; j++)
  472. total += stored[j];
  473. val[i] = total;
  474. }
  475. }
  476. }
  477. /**
  478. * Sum PIDs
  479. *
  480. * Sum values for all targets.
  481. *
  482. * @param swap
  483. * @param root
  484. */
  485. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct ebpf_pid_on_target *root)
  486. {
  487. uint64_t local_read = 0;
  488. uint64_t local_write = 0;
  489. while (root) {
  490. int32_t pid = root->pid;
  491. netdata_publish_swap_t *w = swap_pid[pid];
  492. if (w) {
  493. local_write += w->write;
  494. local_read += w->read;
  495. }
  496. root = root->next;
  497. }
  498. // These conditions were added, because we are using incremental algorithm
  499. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  500. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  501. }
  502. /**
  503. * Send data to Netdata calling auxiliary functions.
  504. *
  505. * @param root the target list.
  506. */
  507. void ebpf_swap_send_apps_data(struct ebpf_target *root)
  508. {
  509. struct ebpf_target *w;
  510. for (w = root; w; w = w->next) {
  511. if (unlikely(w->exposed && w->processes)) {
  512. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  513. }
  514. }
  515. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  516. for (w = root; w; w = w->next) {
  517. if (unlikely(w->exposed && w->processes)) {
  518. write_chart_dimension(w->name, (long long) w->swap.read);
  519. }
  520. }
  521. write_end_chart();
  522. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  523. for (w = root; w; w = w->next) {
  524. if (unlikely(w->exposed && w->processes)) {
  525. write_chart_dimension(w->name, (long long) w->swap.write);
  526. }
  527. }
  528. write_end_chart();
  529. }
  530. /**
  531. * Sum PIDs
  532. *
  533. * Sum values for all targets.
  534. *
  535. * @param swap
  536. * @param root
  537. */
  538. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  539. {
  540. uint64_t local_read = 0;
  541. uint64_t local_write = 0;
  542. while (pids) {
  543. netdata_publish_swap_t *w = &pids->swap;
  544. local_write += w->write;
  545. local_read += w->read;
  546. pids = pids->next;
  547. }
  548. // These conditions were added, because we are using incremental algorithm
  549. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  550. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  551. }
  552. /**
  553. * Send Systemd charts
  554. *
  555. * Send collected data to Netdata.
  556. */
  557. static void ebpf_send_systemd_swap_charts()
  558. {
  559. ebpf_cgroup_target_t *ect;
  560. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  561. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  562. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  563. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  564. }
  565. }
  566. write_end_chart();
  567. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  568. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  569. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  570. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  571. }
  572. }
  573. write_end_chart();
  574. }
  575. /**
  576. * Create specific swap charts
  577. *
  578. * Create charts for cgroup/application.
  579. *
  580. * @param type the chart type.
  581. * @param update_every value to overwrite the update frequency set by the server.
  582. */
  583. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  584. {
  585. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  586. "Calls to function <code>swap_readpage</code>.",
  587. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  588. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  589. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  590. ebpf_create_global_dimension,
  591. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  592. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  593. "Calls to function <code>swap_writepage</code>.",
  594. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  595. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  596. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  597. ebpf_create_global_dimension,
  598. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  599. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  600. }
  601. /**
  602. * Create specific swap charts
  603. *
  604. * Create charts for cgroup/application.
  605. *
  606. * @param type the chart type.
  607. * @param update_every value to overwrite the update frequency set by the server.
  608. */
  609. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  610. {
  611. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART,"Calls to function <code>swap_readpage</code>.",
  612. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  613. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  614. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  615. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "Calls to function <code>swap_writepage</code>.",
  616. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  617. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  618. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  619. }
  620. /*
  621. * Send Specific Swap data
  622. *
  623. * Send data for specific cgroup/apps.
  624. *
  625. * @param type chart type
  626. * @param values structure with values that will be sent to netdata
  627. */
  628. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  629. {
  630. write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART);
  631. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  632. write_end_chart();
  633. write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART);
  634. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  635. write_end_chart();
  636. }
  637. /**
  638. * Create Systemd Swap Charts
  639. *
  640. * Create charts when systemd is enabled
  641. *
  642. * @param update_every value to overwrite the update frequency set by the server.
  643. **/
  644. static void ebpf_create_systemd_swap_charts(int update_every)
  645. {
  646. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  647. "Calls to <code>swap_readpage</code>.",
  648. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  649. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  650. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  651. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  652. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  653. "Calls to function <code>swap_writepage</code>.",
  654. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  655. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  656. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  657. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  658. }
  659. /**
  660. * Send data to Netdata calling auxiliary functions.
  661. *
  662. * @param update_every value to overwrite the update frequency set by the server.
  663. */
  664. void ebpf_swap_send_cgroup_data(int update_every)
  665. {
  666. if (!ebpf_cgroup_pids)
  667. return;
  668. pthread_mutex_lock(&mutex_cgroup_shm);
  669. ebpf_cgroup_target_t *ect;
  670. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  671. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  672. }
  673. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  674. if (has_systemd) {
  675. if (send_cgroup_chart) {
  676. ebpf_create_systemd_swap_charts(update_every);
  677. fflush(stdout);
  678. }
  679. ebpf_send_systemd_swap_charts();
  680. }
  681. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  682. if (ect->systemd)
  683. continue;
  684. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  685. ebpf_create_specific_swap_charts(ect->name, update_every);
  686. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  687. }
  688. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  689. if (ect->updated) {
  690. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  691. } else {
  692. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  693. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  694. }
  695. }
  696. }
  697. pthread_mutex_unlock(&mutex_cgroup_shm);
  698. }
  699. /**
  700. * Main loop for this collector.
  701. */
  702. static void swap_collector(ebpf_module_t *em)
  703. {
  704. int cgroup = em->cgroup_charts;
  705. int update_every = em->update_every;
  706. heartbeat_t hb;
  707. heartbeat_init(&hb);
  708. int counter = update_every - 1;
  709. int maps_per_core = em->maps_per_core;
  710. uint32_t running_time = 0;
  711. uint32_t lifetime = em->lifetime;
  712. while (!ebpf_exit_plugin && running_time < lifetime) {
  713. (void)heartbeat_next(&hb, USEC_PER_SEC);
  714. if (ebpf_exit_plugin || ++counter != update_every)
  715. continue;
  716. counter = 0;
  717. netdata_apps_integration_flags_t apps = em->apps_charts;
  718. ebpf_swap_read_global_table(maps_per_core);
  719. pthread_mutex_lock(&collect_data_mutex);
  720. if (apps)
  721. read_swap_apps_table(maps_per_core);
  722. if (cgroup)
  723. ebpf_update_swap_cgroup(maps_per_core);
  724. pthread_mutex_lock(&lock);
  725. swap_send_global();
  726. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  727. ebpf_swap_send_apps_data(apps_groups_root_target);
  728. if (cgroup)
  729. ebpf_swap_send_cgroup_data(update_every);
  730. pthread_mutex_unlock(&lock);
  731. pthread_mutex_unlock(&collect_data_mutex);
  732. pthread_mutex_lock(&ebpf_exit_cleanup);
  733. if (running_time && !em->running_time)
  734. running_time = update_every;
  735. else
  736. running_time += update_every;
  737. em->running_time = running_time;
  738. pthread_mutex_unlock(&ebpf_exit_cleanup);
  739. }
  740. }
  741. /*****************************************************************
  742. *
  743. * INITIALIZE THREAD
  744. *
  745. *****************************************************************/
  746. /**
  747. * Create apps charts
  748. *
  749. * Call ebpf_create_chart to create the charts on apps submenu.
  750. *
  751. * @param em a pointer to the structure with the default values.
  752. */
  753. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  754. {
  755. struct ebpf_target *root = ptr;
  756. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_READ_CHART,
  757. "Calls to function <code>swap_readpage</code>.",
  758. EBPF_COMMON_DIMENSION_CALL,
  759. NETDATA_SWAP_SUBMENU,
  760. NETDATA_EBPF_CHART_TYPE_STACKED,
  761. 20191,
  762. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  763. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  764. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_WRITE_CHART,
  765. "Calls to function <code>swap_writepage</code>.",
  766. EBPF_COMMON_DIMENSION_CALL,
  767. NETDATA_SWAP_SUBMENU,
  768. NETDATA_EBPF_CHART_TYPE_STACKED,
  769. 20192,
  770. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  771. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  772. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  773. }
  774. /**
  775. * Allocate vectors used with this thread.
  776. *
  777. * We are not testing the return, because callocz does this and shutdown the software
  778. * case it was not possible to allocate.
  779. *
  780. * @param apps is apps enabled?
  781. */
  782. static void ebpf_swap_allocate_global_vectors(int apps)
  783. {
  784. if (apps)
  785. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  786. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  787. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  788. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  789. }
  790. /*****************************************************************
  791. *
  792. * MAIN THREAD
  793. *
  794. *****************************************************************/
  795. /**
  796. * Create global charts
  797. *
  798. * Call ebpf_create_chart to create the charts for the collector.
  799. *
  800. * @param update_every value to overwrite the update frequency set by the server.
  801. */
  802. static void ebpf_create_swap_charts(int update_every)
  803. {
  804. ebpf_create_chart(NETDATA_EBPF_SYSTEM_GROUP, NETDATA_MEM_SWAP_CHART,
  805. "Calls to access swap memory",
  806. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  807. NULL,
  808. NETDATA_EBPF_CHART_TYPE_LINE,
  809. NETDATA_CHART_PRIO_SYSTEM_SWAP_CALLS,
  810. ebpf_create_global_dimension,
  811. swap_publish_aggregated, NETDATA_SWAP_END,
  812. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  813. fflush(stdout);
  814. }
  815. /*
  816. * Load BPF
  817. *
  818. * Load BPF files.
  819. *
  820. * @param em the structure with configuration
  821. */
  822. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  823. {
  824. #ifdef LIBBPF_MAJOR_VERSION
  825. ebpf_define_map_type(em->maps, em->maps_per_core, running_on_kernel);
  826. #endif
  827. int ret = 0;
  828. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_KEY_SWAP_READPAGE_CALL].mode);
  829. if (em->load & EBPF_LOAD_LEGACY) {
  830. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  831. if (!em->probe_links) {
  832. ret = -1;
  833. }
  834. }
  835. #ifdef LIBBPF_MAJOR_VERSION
  836. else {
  837. bpf_obj = swap_bpf__open();
  838. if (!bpf_obj)
  839. ret = -1;
  840. else
  841. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  842. }
  843. #endif
  844. if (ret)
  845. netdata_log_error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  846. return ret;
  847. }
  848. /**
  849. * SWAP thread
  850. *
  851. * Thread used to make swap thread
  852. *
  853. * @param ptr a pointer to `struct ebpf_module`
  854. *
  855. * @return It always return NULL
  856. */
  857. void *ebpf_swap_thread(void *ptr)
  858. {
  859. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  860. ebpf_module_t *em = (ebpf_module_t *)ptr;
  861. em->maps = swap_maps;
  862. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  863. #ifdef LIBBPF_MAJOR_VERSION
  864. ebpf_adjust_thread_load(em, default_btf);
  865. #endif
  866. if (ebpf_swap_load_bpf(em)) {
  867. goto endswap;
  868. }
  869. ebpf_swap_allocate_global_vectors(em->apps_charts);
  870. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  871. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  872. algorithms, NETDATA_SWAP_END);
  873. pthread_mutex_lock(&lock);
  874. ebpf_create_swap_charts(em->update_every);
  875. ebpf_update_stats(&plugin_statistics, em);
  876. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_ADD);
  877. pthread_mutex_unlock(&lock);
  878. swap_collector(em);
  879. endswap:
  880. ebpf_update_disabled_plugin_stats(em);
  881. netdata_thread_cleanup_pop(1);
  882. return NULL;
  883. }