ebpf_swap.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  8. static netdata_idx_t *swap_values = NULL;
  9. netdata_publish_swap_t *swap_vector = NULL;
  10. struct config swap_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  19. #ifdef LIBBPF_MAJOR_VERSION
  20. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  21. #endif
  22. },
  23. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  24. .user_input = 0,
  25. .type = NETDATA_EBPF_MAP_CONTROLLER,
  26. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  27. #ifdef LIBBPF_MAJOR_VERSION
  28. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  29. #endif
  30. },
  31. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  32. .user_input = 0,
  33. .type = NETDATA_EBPF_MAP_STATIC,
  34. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  35. #ifdef LIBBPF_MAJOR_VERSION
  36. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  37. #endif
  38. },
  39. {.name = NULL, .internal_input = 0, .user_input = 0,
  40. #ifdef LIBBPF_MAJOR_VERSION
  41. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  42. #endif
  43. }};
  44. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  45. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  46. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  47. #ifdef LIBBPF_MAJOR_VERSION
  48. /**
  49. * Disable probe
  50. *
  51. * Disable all probes to use exclusively another method.
  52. *
  53. * @param obj is the main structure for bpf objects
  54. */
  55. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  56. {
  57. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  58. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  59. }
  60. /*
  61. * Disable trampoline
  62. *
  63. * Disable all trampoline to use exclusively another method.
  64. *
  65. * @param obj is the main structure for bpf objects.
  66. */
  67. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  68. {
  69. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  70. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  71. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  72. }
  73. /**
  74. * Set trampoline target
  75. *
  76. * Set the targets we will monitor.
  77. *
  78. * @param obj is the main structure for bpf objects.
  79. */
  80. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  81. {
  82. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  83. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  84. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  85. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  86. bpf_program__set_attach_target(obj->progs.netdata_release_task_fentry, 0,
  87. EBPF_COMMON_FNCT_CLEAN_UP);
  88. }
  89. /**
  90. * Mount Attach Probe
  91. *
  92. * Attach probes to target
  93. *
  94. * @param obj is the main structure for bpf objects.
  95. *
  96. * @return It returns 0 on success and -1 otherwise.
  97. */
  98. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  99. {
  100. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  101. false,
  102. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  103. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  104. if (ret)
  105. return -1;
  106. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  107. false,
  108. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  109. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  110. if (ret)
  111. return -1;
  112. obj->links.netdata_release_task_probe = bpf_program__attach_kprobe(obj->progs.netdata_release_task_probe,
  113. false,
  114. EBPF_COMMON_FNCT_CLEAN_UP);
  115. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  116. if (ret)
  117. return -1;
  118. return 0;
  119. }
  120. /**
  121. * Set hash tables
  122. *
  123. * Set the values for maps according the value given by kernel.
  124. *
  125. * @param obj is the main structure for bpf objects.
  126. */
  127. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  128. {
  129. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  130. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  131. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  132. }
  133. /**
  134. * Adjust Map
  135. *
  136. * Resize maps according input from users.
  137. *
  138. * @param obj is the main structure for bpf objects.
  139. * @param em structure with configuration
  140. */
  141. static void ebpf_swap_adjust_map(struct swap_bpf *obj, ebpf_module_t *em)
  142. {
  143. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  144. em, bpf_map__name(obj->maps.tbl_pid_swap));
  145. ebpf_update_map_type(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE]);
  146. ebpf_update_map_type(obj->maps.tbl_swap, &swap_maps[NETDATA_SWAP_GLOBAL_TABLE]);
  147. ebpf_update_map_type(obj->maps.swap_ctrl, &swap_maps[NETDATA_SWAP_CONTROLLER]);
  148. }
  149. /**
  150. * Disable Release Task
  151. *
  152. * Disable release task when apps is not enabled.
  153. *
  154. * @param obj is the main structure for bpf objects.
  155. */
  156. static void ebpf_swap_disable_release_task(struct swap_bpf *obj)
  157. {
  158. bpf_program__set_autoload(obj->progs.netdata_release_task_fentry, false);
  159. bpf_program__set_autoload(obj->progs.netdata_release_task_probe, false);
  160. }
  161. /**
  162. * Load and attach
  163. *
  164. * Load and attach the eBPF code in kernel.
  165. *
  166. * @param obj is the main structure for bpf objects.
  167. * @param em structure with configuration
  168. *
  169. * @return it returns 0 on success and -1 otherwise
  170. */
  171. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  172. {
  173. netdata_ebpf_targets_t *mt = em->targets;
  174. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  175. if (test == EBPF_LOAD_TRAMPOLINE) {
  176. ebpf_swap_disable_probe(obj);
  177. ebpf_swap_set_trampoline_target(obj);
  178. } else {
  179. ebpf_swap_disable_trampoline(obj);
  180. }
  181. ebpf_swap_adjust_map(obj, em);
  182. if (!em->apps_charts && !em->cgroup_charts)
  183. ebpf_swap_disable_release_task(obj);
  184. int ret = swap_bpf__load(obj);
  185. if (ret) {
  186. return ret;
  187. }
  188. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  189. if (!ret) {
  190. ebpf_swap_set_hash_tables(obj);
  191. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  192. }
  193. return ret;
  194. }
  195. #endif
  196. /*****************************************************************
  197. *
  198. * FUNCTIONS TO CLOSE THE THREAD
  199. *
  200. *****************************************************************/
  201. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every);
  202. /**
  203. * Obsolete services
  204. *
  205. * Obsolete all service charts created
  206. *
  207. * @param em a pointer to `struct ebpf_module`
  208. */
  209. static void ebpf_obsolete_swap_services(ebpf_module_t *em)
  210. {
  211. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  212. NETDATA_MEM_SWAP_READ_CHART,
  213. "Calls to function <code>swap_readpage</code>.",
  214. EBPF_COMMON_DIMENSION_CALL,
  215. NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  216. NETDATA_EBPF_CHART_TYPE_LINE,
  217. NETDATA_CGROUP_SWAP_READ_CONTEXT,
  218. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  219. em->update_every);
  220. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  221. NETDATA_MEM_SWAP_WRITE_CHART,
  222. "Calls to function <code>swap_writepage</code>.",
  223. EBPF_COMMON_DIMENSION_CALL,
  224. NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  225. NETDATA_EBPF_CHART_TYPE_LINE,
  226. NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  227. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  228. em->update_every);
  229. }
  230. /**
  231. * Obsolete cgroup chart
  232. *
  233. * Send obsolete for all charts created before to close.
  234. *
  235. * @param em a pointer to `struct ebpf_module`
  236. */
  237. static inline void ebpf_obsolete_swap_cgroup_charts(ebpf_module_t *em) {
  238. pthread_mutex_lock(&mutex_cgroup_shm);
  239. ebpf_obsolete_swap_services(em);
  240. ebpf_cgroup_target_t *ect;
  241. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  242. if (ect->systemd)
  243. continue;
  244. ebpf_obsolete_specific_swap_charts(ect->name, em->update_every);
  245. }
  246. pthread_mutex_unlock(&mutex_cgroup_shm);
  247. }
  248. /**
  249. * Obsolette apps charts
  250. *
  251. * Obsolete apps charts.
  252. *
  253. * @param em a pointer to the structure with the default values.
  254. */
  255. void ebpf_obsolete_swap_apps_charts(struct ebpf_module *em)
  256. {
  257. ebpf_write_chart_obsolete(NETDATA_APPS_FAMILY,
  258. NETDATA_MEM_SWAP_READ_CHART,
  259. "Calls to function <code>swap_readpage</code>.",
  260. EBPF_COMMON_DIMENSION_CALL,
  261. NETDATA_SWAP_SUBMENU,
  262. NETDATA_EBPF_CHART_TYPE_STACKED,
  263. NULL,
  264. 20191,
  265. em->update_every);
  266. ebpf_write_chart_obsolete(NETDATA_APPS_FAMILY,
  267. NETDATA_MEM_SWAP_WRITE_CHART,
  268. "Calls to function <code>swap_writepage</code>.",
  269. EBPF_COMMON_DIMENSION_CALL,
  270. NETDATA_SWAP_SUBMENU,
  271. NETDATA_EBPF_CHART_TYPE_STACKED,
  272. NULL,
  273. 20192,
  274. em->update_every);
  275. }
  276. /**
  277. * Obsolete global
  278. *
  279. * Obsolete global charts created by thread.
  280. *
  281. * @param em a pointer to `struct ebpf_module`
  282. */
  283. static void ebpf_obsolete_swap_global(ebpf_module_t *em)
  284. {
  285. ebpf_write_chart_obsolete(NETDATA_EBPF_MEMORY_GROUP,
  286. NETDATA_MEM_SWAP_CHART,
  287. "Calls to access swap memory",
  288. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  289. NETDATA_EBPF_CHART_TYPE_LINE,
  290. NULL,
  291. NETDATA_CHART_PRIO_MEM_SWAP_CALLS,
  292. em->update_every);
  293. }
  294. /**
  295. * Swap exit
  296. *
  297. * Cancel thread and exit.
  298. *
  299. * @param ptr thread data.
  300. */
  301. static void ebpf_swap_exit(void *ptr)
  302. {
  303. ebpf_module_t *em = (ebpf_module_t *)ptr;
  304. if (em->enabled == NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
  305. pthread_mutex_lock(&lock);
  306. if (em->cgroup_charts) {
  307. ebpf_obsolete_swap_cgroup_charts(em);
  308. fflush(stdout);
  309. }
  310. if (em->apps_charts & NETDATA_EBPF_APPS_FLAG_CHART_CREATED) {
  311. ebpf_obsolete_swap_apps_charts(em);
  312. }
  313. ebpf_obsolete_swap_global(em);
  314. fflush(stdout);
  315. pthread_mutex_unlock(&lock);
  316. }
  317. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_REMOVE);
  318. #ifdef LIBBPF_MAJOR_VERSION
  319. if (bpf_obj) {
  320. swap_bpf__destroy(bpf_obj);
  321. bpf_obj = NULL;
  322. }
  323. #endif
  324. if (em->objects) {
  325. ebpf_unload_legacy_code(em->objects, em->probe_links);
  326. em->objects = NULL;
  327. em->probe_links = NULL;
  328. }
  329. pthread_mutex_lock(&ebpf_exit_cleanup);
  330. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  331. ebpf_update_stats(&plugin_statistics, em);
  332. pthread_mutex_unlock(&ebpf_exit_cleanup);
  333. }
  334. /*****************************************************************
  335. *
  336. * COLLECTOR THREAD
  337. *
  338. *****************************************************************/
  339. /**
  340. * Apps Accumulator
  341. *
  342. * Sum all values read from kernel and store in the first address.
  343. *
  344. * @param out the vector with read values.
  345. * @param maps_per_core do I need to read all cores?
  346. */
  347. static void swap_apps_accumulator(netdata_publish_swap_t *out, int maps_per_core)
  348. {
  349. int i, end = (maps_per_core) ? ebpf_nprocs : 1;
  350. netdata_publish_swap_t *total = &out[0];
  351. for (i = 1; i < end; i++) {
  352. netdata_publish_swap_t *w = &out[i];
  353. total->write += w->write;
  354. total->read += w->read;
  355. }
  356. }
  357. /**
  358. * Fill PID
  359. *
  360. * Fill PID structures
  361. *
  362. * @param current_pid pid that we are collecting data
  363. * @param out values read from hash tables;
  364. */
  365. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  366. {
  367. netdata_publish_swap_t *curr = swap_pid[current_pid];
  368. if (!curr) {
  369. curr = callocz(1, sizeof(netdata_publish_swap_t));
  370. swap_pid[current_pid] = curr;
  371. }
  372. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  373. }
  374. /**
  375. * Update cgroup
  376. *
  377. * Update cgroup data based in
  378. *
  379. * @param maps_per_core do I need to read all cores?
  380. */
  381. static void ebpf_update_swap_cgroup(int maps_per_core)
  382. {
  383. ebpf_cgroup_target_t *ect ;
  384. netdata_publish_swap_t *cv = swap_vector;
  385. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  386. size_t length = sizeof(netdata_publish_swap_t);
  387. if (maps_per_core)
  388. length *= ebpf_nprocs;
  389. pthread_mutex_lock(&mutex_cgroup_shm);
  390. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  391. struct pid_on_target2 *pids;
  392. for (pids = ect->pids; pids; pids = pids->next) {
  393. int pid = pids->pid;
  394. netdata_publish_swap_t *out = &pids->swap;
  395. if (likely(swap_pid) && swap_pid[pid]) {
  396. netdata_publish_swap_t *in = swap_pid[pid];
  397. memcpy(out, in, sizeof(netdata_publish_swap_t));
  398. } else {
  399. memset(cv, 0, length);
  400. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  401. swap_apps_accumulator(cv, maps_per_core);
  402. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  403. // We are cleaning to avoid passing data read from one process to other.
  404. memset(cv, 0, length);
  405. }
  406. }
  407. }
  408. }
  409. pthread_mutex_unlock(&mutex_cgroup_shm);
  410. }
  411. /**
  412. * Read APPS table
  413. *
  414. * Read the apps table and store data inside the structure.
  415. *
  416. * @param maps_per_core do I need to read all cores?
  417. */
  418. static void read_swap_apps_table(int maps_per_core)
  419. {
  420. netdata_publish_swap_t *cv = swap_vector;
  421. uint32_t key;
  422. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  423. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  424. size_t length = sizeof(netdata_publish_swap_t);
  425. if (maps_per_core)
  426. length *= ebpf_nprocs;
  427. while (pids) {
  428. key = pids->pid;
  429. if (bpf_map_lookup_elem(fd, &key, cv)) {
  430. pids = pids->next;
  431. continue;
  432. }
  433. swap_apps_accumulator(cv, maps_per_core);
  434. swap_fill_pid(key, cv);
  435. // We are cleaning to avoid passing data read from one process to other.
  436. memset(cv, 0, length);
  437. pids = pids->next;
  438. }
  439. }
  440. /**
  441. * Send global
  442. *
  443. * Send global charts to Netdata
  444. */
  445. static void swap_send_global()
  446. {
  447. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_MEMORY_GROUP,
  448. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  449. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  450. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  451. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  452. }
  453. /**
  454. * Read global counter
  455. *
  456. * Read the table with number of calls to all functions
  457. *
  458. * @param stats vector used to read data from control table.
  459. * @param maps_per_core do I need to read all cores?
  460. */
  461. static void ebpf_swap_read_global_table(netdata_idx_t *stats, int maps_per_core)
  462. {
  463. ebpf_read_global_table_stats(swap_hash_values,
  464. swap_values,
  465. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd,
  466. maps_per_core,
  467. NETDATA_KEY_SWAP_READPAGE_CALL,
  468. NETDATA_SWAP_END);
  469. ebpf_read_global_table_stats(stats,
  470. swap_values,
  471. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd,
  472. maps_per_core,
  473. NETDATA_CONTROLLER_PID_TABLE_ADD,
  474. NETDATA_CONTROLLER_END);
  475. }
  476. /**
  477. * Sum PIDs
  478. *
  479. * Sum values for all targets.
  480. *
  481. * @param swap
  482. * @param root
  483. */
  484. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct ebpf_pid_on_target *root)
  485. {
  486. uint64_t local_read = 0;
  487. uint64_t local_write = 0;
  488. while (root) {
  489. int32_t pid = root->pid;
  490. netdata_publish_swap_t *w = swap_pid[pid];
  491. if (w) {
  492. local_write += w->write;
  493. local_read += w->read;
  494. }
  495. root = root->next;
  496. }
  497. // These conditions were added, because we are using incremental algorithm
  498. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  499. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  500. }
  501. /**
  502. * Send data to Netdata calling auxiliary functions.
  503. *
  504. * @param root the target list.
  505. */
  506. void ebpf_swap_send_apps_data(struct ebpf_target *root)
  507. {
  508. struct ebpf_target *w;
  509. for (w = root; w; w = w->next) {
  510. if (unlikely(w->exposed && w->processes)) {
  511. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  512. }
  513. }
  514. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  515. for (w = root; w; w = w->next) {
  516. if (unlikely(w->exposed && w->processes)) {
  517. write_chart_dimension(w->name, (long long) w->swap.read);
  518. }
  519. }
  520. write_end_chart();
  521. write_begin_chart(NETDATA_APPS_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  522. for (w = root; w; w = w->next) {
  523. if (unlikely(w->exposed && w->processes)) {
  524. write_chart_dimension(w->name, (long long) w->swap.write);
  525. }
  526. }
  527. write_end_chart();
  528. }
  529. /**
  530. * Sum PIDs
  531. *
  532. * Sum values for all targets.
  533. *
  534. * @param swap
  535. * @param root
  536. */
  537. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  538. {
  539. uint64_t local_read = 0;
  540. uint64_t local_write = 0;
  541. while (pids) {
  542. netdata_publish_swap_t *w = &pids->swap;
  543. local_write += w->write;
  544. local_read += w->read;
  545. pids = pids->next;
  546. }
  547. // These conditions were added, because we are using incremental algorithm
  548. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  549. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  550. }
  551. /**
  552. * Send Systemd charts
  553. *
  554. * Send collected data to Netdata.
  555. */
  556. static void ebpf_send_systemd_swap_charts()
  557. {
  558. ebpf_cgroup_target_t *ect;
  559. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART);
  560. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  561. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  562. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  563. }
  564. }
  565. write_end_chart();
  566. write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART);
  567. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  568. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  569. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  570. }
  571. }
  572. write_end_chart();
  573. }
  574. /**
  575. * Create specific swap charts
  576. *
  577. * Create charts for cgroup/application.
  578. *
  579. * @param type the chart type.
  580. * @param update_every value to overwrite the update frequency set by the server.
  581. */
  582. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  583. {
  584. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  585. "Calls to function <code>swap_readpage</code>.",
  586. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  587. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  588. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  589. ebpf_create_global_dimension,
  590. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  591. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  592. "Calls to function <code>swap_writepage</code>.",
  593. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  594. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  595. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  596. ebpf_create_global_dimension,
  597. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  598. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  599. }
  600. /**
  601. * Create specific swap charts
  602. *
  603. * Create charts for cgroup/application.
  604. *
  605. * @param type the chart type.
  606. * @param update_every value to overwrite the update frequency set by the server.
  607. */
  608. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  609. {
  610. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART,"Calls to function <code>swap_readpage</code>.",
  611. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  612. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  613. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  614. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "Calls to function <code>swap_writepage</code>.",
  615. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  616. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  617. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  618. }
  619. /*
  620. * Send Specific Swap data
  621. *
  622. * Send data for specific cgroup/apps.
  623. *
  624. * @param type chart type
  625. * @param values structure with values that will be sent to netdata
  626. */
  627. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  628. {
  629. write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART);
  630. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  631. write_end_chart();
  632. write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART);
  633. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  634. write_end_chart();
  635. }
  636. /**
  637. * Create Systemd Swap Charts
  638. *
  639. * Create charts when systemd is enabled
  640. *
  641. * @param update_every value to overwrite the update frequency set by the server.
  642. **/
  643. static void ebpf_create_systemd_swap_charts(int update_every)
  644. {
  645. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  646. "Calls to <code>swap_readpage</code>.",
  647. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  648. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  649. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  650. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  651. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  652. "Calls to function <code>swap_writepage</code>.",
  653. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  654. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  655. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  656. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  657. }
  658. /**
  659. * Send data to Netdata calling auxiliary functions.
  660. *
  661. * @param update_every value to overwrite the update frequency set by the server.
  662. */
  663. void ebpf_swap_send_cgroup_data(int update_every)
  664. {
  665. if (!ebpf_cgroup_pids)
  666. return;
  667. pthread_mutex_lock(&mutex_cgroup_shm);
  668. ebpf_cgroup_target_t *ect;
  669. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  670. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  671. }
  672. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  673. if (has_systemd) {
  674. if (send_cgroup_chart) {
  675. ebpf_create_systemd_swap_charts(update_every);
  676. fflush(stdout);
  677. }
  678. ebpf_send_systemd_swap_charts();
  679. }
  680. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  681. if (ect->systemd)
  682. continue;
  683. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  684. ebpf_create_specific_swap_charts(ect->name, update_every);
  685. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  686. }
  687. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  688. if (ect->updated) {
  689. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  690. } else {
  691. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  692. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  693. }
  694. }
  695. }
  696. pthread_mutex_unlock(&mutex_cgroup_shm);
  697. }
  698. /**
  699. * Main loop for this collector.
  700. */
  701. static void swap_collector(ebpf_module_t *em)
  702. {
  703. int cgroup = em->cgroup_charts;
  704. int update_every = em->update_every;
  705. heartbeat_t hb;
  706. heartbeat_init(&hb);
  707. int counter = update_every - 1;
  708. int maps_per_core = em->maps_per_core;
  709. uint32_t running_time = 0;
  710. uint32_t lifetime = em->lifetime;
  711. netdata_idx_t *stats = em->hash_table_stats;
  712. memset(stats, 0, sizeof(em->hash_table_stats));
  713. while (!ebpf_exit_plugin && running_time < lifetime) {
  714. (void)heartbeat_next(&hb, USEC_PER_SEC);
  715. if (ebpf_exit_plugin || ++counter != update_every)
  716. continue;
  717. counter = 0;
  718. netdata_apps_integration_flags_t apps = em->apps_charts;
  719. ebpf_swap_read_global_table(stats, maps_per_core);
  720. pthread_mutex_lock(&collect_data_mutex);
  721. if (apps)
  722. read_swap_apps_table(maps_per_core);
  723. if (cgroup)
  724. ebpf_update_swap_cgroup(maps_per_core);
  725. pthread_mutex_lock(&lock);
  726. swap_send_global();
  727. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  728. ebpf_swap_send_apps_data(apps_groups_root_target);
  729. if (cgroup)
  730. ebpf_swap_send_cgroup_data(update_every);
  731. pthread_mutex_unlock(&lock);
  732. pthread_mutex_unlock(&collect_data_mutex);
  733. pthread_mutex_lock(&ebpf_exit_cleanup);
  734. if (running_time && !em->running_time)
  735. running_time = update_every;
  736. else
  737. running_time += update_every;
  738. em->running_time = running_time;
  739. pthread_mutex_unlock(&ebpf_exit_cleanup);
  740. }
  741. }
  742. /*****************************************************************
  743. *
  744. * INITIALIZE THREAD
  745. *
  746. *****************************************************************/
  747. /**
  748. * Create apps charts
  749. *
  750. * Call ebpf_create_chart to create the charts on apps submenu.
  751. *
  752. * @param em a pointer to the structure with the default values.
  753. */
  754. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  755. {
  756. struct ebpf_target *root = ptr;
  757. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_READ_CHART,
  758. "Calls to function <code>swap_readpage</code>.",
  759. EBPF_COMMON_DIMENSION_CALL,
  760. NETDATA_SWAP_SUBMENU,
  761. NETDATA_EBPF_CHART_TYPE_STACKED,
  762. 20191,
  763. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  764. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  765. ebpf_create_charts_on_apps(NETDATA_MEM_SWAP_WRITE_CHART,
  766. "Calls to function <code>swap_writepage</code>.",
  767. EBPF_COMMON_DIMENSION_CALL,
  768. NETDATA_SWAP_SUBMENU,
  769. NETDATA_EBPF_CHART_TYPE_STACKED,
  770. 20192,
  771. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX],
  772. root, em->update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  773. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  774. }
  775. /**
  776. * Allocate vectors used with this thread.
  777. *
  778. * We are not testing the return, because callocz does this and shutdown the software
  779. * case it was not possible to allocate.
  780. *
  781. * @param apps is apps enabled?
  782. */
  783. static void ebpf_swap_allocate_global_vectors(int apps)
  784. {
  785. if (apps)
  786. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  787. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  788. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  789. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  790. }
  791. /*****************************************************************
  792. *
  793. * MAIN THREAD
  794. *
  795. *****************************************************************/
  796. /**
  797. * Create global charts
  798. *
  799. * Call ebpf_create_chart to create the charts for the collector.
  800. *
  801. * @param update_every value to overwrite the update frequency set by the server.
  802. */
  803. static void ebpf_create_swap_charts(int update_every)
  804. {
  805. ebpf_create_chart(NETDATA_EBPF_MEMORY_GROUP, NETDATA_MEM_SWAP_CHART,
  806. "Calls to access swap memory",
  807. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  808. NULL,
  809. NETDATA_EBPF_CHART_TYPE_LINE,
  810. NETDATA_CHART_PRIO_MEM_SWAP_CALLS,
  811. ebpf_create_global_dimension,
  812. swap_publish_aggregated, NETDATA_SWAP_END,
  813. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  814. fflush(stdout);
  815. }
  816. /*
  817. * Load BPF
  818. *
  819. * Load BPF files.
  820. *
  821. * @param em the structure with configuration
  822. */
  823. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  824. {
  825. #ifdef LIBBPF_MAJOR_VERSION
  826. ebpf_define_map_type(em->maps, em->maps_per_core, running_on_kernel);
  827. #endif
  828. int ret = 0;
  829. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_KEY_SWAP_READPAGE_CALL].mode);
  830. if (em->load & EBPF_LOAD_LEGACY) {
  831. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  832. if (!em->probe_links) {
  833. ret = -1;
  834. }
  835. }
  836. #ifdef LIBBPF_MAJOR_VERSION
  837. else {
  838. bpf_obj = swap_bpf__open();
  839. if (!bpf_obj)
  840. ret = -1;
  841. else
  842. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  843. }
  844. #endif
  845. if (ret)
  846. netdata_log_error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->thread_name);
  847. return ret;
  848. }
  849. /**
  850. * SWAP thread
  851. *
  852. * Thread used to make swap thread
  853. *
  854. * @param ptr a pointer to `struct ebpf_module`
  855. *
  856. * @return It always return NULL
  857. */
  858. void *ebpf_swap_thread(void *ptr)
  859. {
  860. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  861. ebpf_module_t *em = (ebpf_module_t *)ptr;
  862. em->maps = swap_maps;
  863. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  864. #ifdef LIBBPF_MAJOR_VERSION
  865. ebpf_adjust_thread_load(em, default_btf);
  866. #endif
  867. if (ebpf_swap_load_bpf(em)) {
  868. goto endswap;
  869. }
  870. ebpf_swap_allocate_global_vectors(em->apps_charts);
  871. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  872. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  873. algorithms, NETDATA_SWAP_END);
  874. pthread_mutex_lock(&lock);
  875. ebpf_create_swap_charts(em->update_every);
  876. ebpf_update_stats(&plugin_statistics, em);
  877. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_ADD);
  878. pthread_mutex_unlock(&lock);
  879. swap_collector(em);
  880. endswap:
  881. ebpf_update_disabled_plugin_stats(em);
  882. netdata_thread_cleanup_pop(1);
  883. return NULL;
  884. }