ebpf_swap.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "ebpf.h"
  3. #include "ebpf_swap.h"
  4. static char *swap_dimension_name[NETDATA_SWAP_END] = { "read", "write" };
  5. static netdata_syscall_stat_t swap_aggregated_data[NETDATA_SWAP_END];
  6. static netdata_publish_syscall_t swap_publish_aggregated[NETDATA_SWAP_END];
  7. static netdata_idx_t swap_hash_values[NETDATA_SWAP_END];
  8. static netdata_idx_t *swap_values = NULL;
  9. netdata_publish_swap_t *swap_vector = NULL;
  10. struct config swap_config = { .first_section = NULL,
  11. .last_section = NULL,
  12. .mutex = NETDATA_MUTEX_INITIALIZER,
  13. .index = { .avl_tree = { .root = NULL, .compar = appconfig_section_compare },
  14. .rwlock = AVL_LOCK_INITIALIZER } };
  15. static ebpf_local_maps_t swap_maps[] = {{.name = "tbl_pid_swap", .internal_input = ND_EBPF_DEFAULT_PID_SIZE,
  16. .user_input = 0,
  17. .type = NETDATA_EBPF_MAP_RESIZABLE | NETDATA_EBPF_MAP_PID,
  18. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  19. #ifdef LIBBPF_MAJOR_VERSION
  20. .map_type = BPF_MAP_TYPE_PERCPU_HASH
  21. #endif
  22. },
  23. {.name = "swap_ctrl", .internal_input = NETDATA_CONTROLLER_END,
  24. .user_input = 0,
  25. .type = NETDATA_EBPF_MAP_CONTROLLER,
  26. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  27. #ifdef LIBBPF_MAJOR_VERSION
  28. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  29. #endif
  30. },
  31. {.name = "tbl_swap", .internal_input = NETDATA_SWAP_END,
  32. .user_input = 0,
  33. .type = NETDATA_EBPF_MAP_STATIC,
  34. .map_fd = ND_EBPF_MAP_FD_NOT_INITIALIZED,
  35. #ifdef LIBBPF_MAJOR_VERSION
  36. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  37. #endif
  38. },
  39. {.name = NULL, .internal_input = 0, .user_input = 0,
  40. #ifdef LIBBPF_MAJOR_VERSION
  41. .map_type = BPF_MAP_TYPE_PERCPU_ARRAY
  42. #endif
  43. }};
  44. netdata_ebpf_targets_t swap_targets[] = { {.name = "swap_readpage", .mode = EBPF_LOAD_TRAMPOLINE},
  45. {.name = "swap_writepage", .mode = EBPF_LOAD_TRAMPOLINE},
  46. {.name = NULL, .mode = EBPF_LOAD_TRAMPOLINE}};
  47. #ifdef LIBBPF_MAJOR_VERSION
  48. /**
  49. * Disable probe
  50. *
  51. * Disable all probes to use exclusively another method.
  52. *
  53. * @param obj is the main structure for bpf objects
  54. */
  55. static void ebpf_swap_disable_probe(struct swap_bpf *obj)
  56. {
  57. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_probe, false);
  58. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_probe, false);
  59. }
  60. /*
  61. * Disable trampoline
  62. *
  63. * Disable all trampoline to use exclusively another method.
  64. *
  65. * @param obj is the main structure for bpf objects.
  66. */
  67. static void ebpf_swap_disable_trampoline(struct swap_bpf *obj)
  68. {
  69. bpf_program__set_autoload(obj->progs.netdata_swap_readpage_fentry, false);
  70. bpf_program__set_autoload(obj->progs.netdata_swap_writepage_fentry, false);
  71. }
  72. /**
  73. * Set trampoline target
  74. *
  75. * Set the targets we will monitor.
  76. *
  77. * @param obj is the main structure for bpf objects.
  78. */
  79. static void ebpf_swap_set_trampoline_target(struct swap_bpf *obj)
  80. {
  81. bpf_program__set_attach_target(obj->progs.netdata_swap_readpage_fentry, 0,
  82. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  83. bpf_program__set_attach_target(obj->progs.netdata_swap_writepage_fentry, 0,
  84. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  85. }
  86. /**
  87. * Mount Attach Probe
  88. *
  89. * Attach probes to target
  90. *
  91. * @param obj is the main structure for bpf objects.
  92. *
  93. * @return It returns 0 on success and -1 otherwise.
  94. */
  95. static int ebpf_swap_attach_kprobe(struct swap_bpf *obj)
  96. {
  97. obj->links.netdata_swap_readpage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_readpage_probe,
  98. false,
  99. swap_targets[NETDATA_KEY_SWAP_READPAGE_CALL].name);
  100. int ret = libbpf_get_error(obj->links.netdata_swap_readpage_probe);
  101. if (ret)
  102. return -1;
  103. obj->links.netdata_swap_writepage_probe = bpf_program__attach_kprobe(obj->progs.netdata_swap_writepage_probe,
  104. false,
  105. swap_targets[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name);
  106. ret = libbpf_get_error(obj->links.netdata_swap_writepage_probe);
  107. if (ret)
  108. return -1;
  109. return 0;
  110. }
  111. /**
  112. * Set hash tables
  113. *
  114. * Set the values for maps according the value given by kernel.
  115. *
  116. * @param obj is the main structure for bpf objects.
  117. */
  118. static void ebpf_swap_set_hash_tables(struct swap_bpf *obj)
  119. {
  120. swap_maps[NETDATA_PID_SWAP_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_pid_swap);
  121. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd = bpf_map__fd(obj->maps.swap_ctrl);
  122. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd = bpf_map__fd(obj->maps.tbl_swap);
  123. }
  124. /**
  125. * Adjust Map
  126. *
  127. * Resize maps according input from users.
  128. *
  129. * @param obj is the main structure for bpf objects.
  130. * @param em structure with configuration
  131. */
  132. static void ebpf_swap_adjust_map(struct swap_bpf *obj, ebpf_module_t *em)
  133. {
  134. ebpf_update_map_size(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE],
  135. em, bpf_map__name(obj->maps.tbl_pid_swap));
  136. ebpf_update_map_type(obj->maps.tbl_pid_swap, &swap_maps[NETDATA_PID_SWAP_TABLE]);
  137. ebpf_update_map_type(obj->maps.tbl_swap, &swap_maps[NETDATA_SWAP_GLOBAL_TABLE]);
  138. ebpf_update_map_type(obj->maps.swap_ctrl, &swap_maps[NETDATA_SWAP_CONTROLLER]);
  139. }
  140. /**
  141. * Load and attach
  142. *
  143. * Load and attach the eBPF code in kernel.
  144. *
  145. * @param obj is the main structure for bpf objects.
  146. * @param em structure with configuration
  147. *
  148. * @return it returns 0 on success and -1 otherwise
  149. */
  150. static inline int ebpf_swap_load_and_attach(struct swap_bpf *obj, ebpf_module_t *em)
  151. {
  152. netdata_ebpf_targets_t *mt = em->targets;
  153. netdata_ebpf_program_loaded_t test = mt[NETDATA_KEY_SWAP_READPAGE_CALL].mode;
  154. if (test == EBPF_LOAD_TRAMPOLINE) {
  155. ebpf_swap_disable_probe(obj);
  156. ebpf_swap_set_trampoline_target(obj);
  157. } else {
  158. ebpf_swap_disable_trampoline(obj);
  159. }
  160. ebpf_swap_adjust_map(obj, em);
  161. int ret = swap_bpf__load(obj);
  162. if (ret) {
  163. return ret;
  164. }
  165. ret = (test == EBPF_LOAD_TRAMPOLINE) ? swap_bpf__attach(obj) : ebpf_swap_attach_kprobe(obj);
  166. if (!ret) {
  167. ebpf_swap_set_hash_tables(obj);
  168. ebpf_update_controller(swap_maps[NETDATA_SWAP_CONTROLLER].map_fd, em);
  169. }
  170. return ret;
  171. }
  172. #endif
  173. /*****************************************************************
  174. *
  175. * FUNCTIONS TO CLOSE THE THREAD
  176. *
  177. *****************************************************************/
  178. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every);
  179. /**
  180. * Obsolete services
  181. *
  182. * Obsolete all service charts created
  183. *
  184. * @param em a pointer to `struct ebpf_module`
  185. */
  186. static void ebpf_obsolete_swap_services(ebpf_module_t *em)
  187. {
  188. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  189. NETDATA_MEM_SWAP_READ_CHART,
  190. "",
  191. "Calls to function swap_readpage.",
  192. EBPF_COMMON_DIMENSION_CALL,
  193. NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  194. NETDATA_EBPF_CHART_TYPE_LINE,
  195. NETDATA_CGROUP_SWAP_READ_CONTEXT,
  196. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  197. em->update_every);
  198. ebpf_write_chart_obsolete(NETDATA_SERVICE_FAMILY,
  199. NETDATA_MEM_SWAP_WRITE_CHART,
  200. "",
  201. "Calls to function swap_writepage.",
  202. EBPF_COMMON_DIMENSION_CALL,
  203. NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  204. NETDATA_EBPF_CHART_TYPE_LINE,
  205. NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  206. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  207. em->update_every);
  208. }
  209. /**
  210. * Obsolete cgroup chart
  211. *
  212. * Send obsolete for all charts created before to close.
  213. *
  214. * @param em a pointer to `struct ebpf_module`
  215. */
  216. static inline void ebpf_obsolete_swap_cgroup_charts(ebpf_module_t *em) {
  217. pthread_mutex_lock(&mutex_cgroup_shm);
  218. ebpf_obsolete_swap_services(em);
  219. ebpf_cgroup_target_t *ect;
  220. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  221. if (ect->systemd)
  222. continue;
  223. ebpf_obsolete_specific_swap_charts(ect->name, em->update_every);
  224. }
  225. pthread_mutex_unlock(&mutex_cgroup_shm);
  226. }
  227. /**
  228. * Obsolette apps charts
  229. *
  230. * Obsolete apps charts.
  231. *
  232. * @param em a pointer to the structure with the default values.
  233. */
  234. void ebpf_obsolete_swap_apps_charts(struct ebpf_module *em)
  235. {
  236. struct ebpf_target *w;
  237. int update_every = em->update_every;
  238. for (w = apps_groups_root_target; w; w = w->next) {
  239. if (unlikely(!(w->charts_created & (1<<EBPF_MODULE_SWAP_IDX))))
  240. continue;
  241. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  242. w->clean_name,
  243. "_ebpf_call_swap_readpage",
  244. "Calls to function swap_readpage.",
  245. EBPF_COMMON_DIMENSION_CALL,
  246. NETDATA_EBPF_MEMORY_GROUP,
  247. NETDATA_EBPF_CHART_TYPE_STACKED,
  248. "app.ebpf_call_swap_readpage",
  249. 20070,
  250. update_every);
  251. ebpf_write_chart_obsolete(NETDATA_APP_FAMILY,
  252. w->clean_name,
  253. "_ebpf_call_swap_writepage",
  254. "Calls to function swap_writepage.",
  255. EBPF_COMMON_DIMENSION_CALL,
  256. NETDATA_EBPF_MEMORY_GROUP,
  257. NETDATA_EBPF_CHART_TYPE_STACKED,
  258. "app.ebpf_call_swap_writepage",
  259. 20071,
  260. update_every);
  261. w->charts_created &= ~(1<<EBPF_MODULE_SWAP_IDX);
  262. }
  263. }
  264. /**
  265. * Obsolete global
  266. *
  267. * Obsolete global charts created by thread.
  268. *
  269. * @param em a pointer to `struct ebpf_module`
  270. */
  271. static void ebpf_obsolete_swap_global(ebpf_module_t *em)
  272. {
  273. ebpf_write_chart_obsolete(NETDATA_EBPF_MEMORY_GROUP,
  274. NETDATA_MEM_SWAP_CHART,
  275. "",
  276. "Calls to access swap memory",
  277. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  278. NETDATA_EBPF_CHART_TYPE_LINE,
  279. NULL,
  280. NETDATA_CHART_PRIO_MEM_SWAP_CALLS,
  281. em->update_every);
  282. }
  283. /**
  284. * Swap exit
  285. *
  286. * Cancel thread and exit.
  287. *
  288. * @param ptr thread data.
  289. */
  290. static void ebpf_swap_exit(void *ptr)
  291. {
  292. ebpf_module_t *em = (ebpf_module_t *)ptr;
  293. if (em->enabled == NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
  294. pthread_mutex_lock(&lock);
  295. if (em->cgroup_charts) {
  296. ebpf_obsolete_swap_cgroup_charts(em);
  297. fflush(stdout);
  298. }
  299. if (em->apps_charts & NETDATA_EBPF_APPS_FLAG_CHART_CREATED) {
  300. ebpf_obsolete_swap_apps_charts(em);
  301. }
  302. ebpf_obsolete_swap_global(em);
  303. fflush(stdout);
  304. pthread_mutex_unlock(&lock);
  305. }
  306. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_REMOVE);
  307. #ifdef LIBBPF_MAJOR_VERSION
  308. if (bpf_obj) {
  309. swap_bpf__destroy(bpf_obj);
  310. bpf_obj = NULL;
  311. }
  312. #endif
  313. if (em->objects) {
  314. ebpf_unload_legacy_code(em->objects, em->probe_links);
  315. em->objects = NULL;
  316. em->probe_links = NULL;
  317. }
  318. pthread_mutex_lock(&ebpf_exit_cleanup);
  319. em->enabled = NETDATA_THREAD_EBPF_STOPPED;
  320. ebpf_update_stats(&plugin_statistics, em);
  321. pthread_mutex_unlock(&ebpf_exit_cleanup);
  322. }
  323. /*****************************************************************
  324. *
  325. * COLLECTOR THREAD
  326. *
  327. *****************************************************************/
  328. /**
  329. * Apps Accumulator
  330. *
  331. * Sum all values read from kernel and store in the first address.
  332. *
  333. * @param out the vector with read values.
  334. * @param maps_per_core do I need to read all cores?
  335. */
  336. static void swap_apps_accumulator(netdata_publish_swap_t *out, int maps_per_core)
  337. {
  338. int i, end = (maps_per_core) ? ebpf_nprocs : 1;
  339. netdata_publish_swap_t *total = &out[0];
  340. for (i = 1; i < end; i++) {
  341. netdata_publish_swap_t *w = &out[i];
  342. total->write += w->write;
  343. total->read += w->read;
  344. }
  345. }
  346. /**
  347. * Fill PID
  348. *
  349. * Fill PID structures
  350. *
  351. * @param current_pid pid that we are collecting data
  352. * @param out values read from hash tables;
  353. */
  354. static void swap_fill_pid(uint32_t current_pid, netdata_publish_swap_t *publish)
  355. {
  356. netdata_publish_swap_t *curr = swap_pid[current_pid];
  357. if (!curr) {
  358. curr = callocz(1, sizeof(netdata_publish_swap_t));
  359. swap_pid[current_pid] = curr;
  360. }
  361. memcpy(curr, publish, sizeof(netdata_publish_swap_t));
  362. }
  363. /**
  364. * Update cgroup
  365. *
  366. * Update cgroup data based in
  367. *
  368. * @param maps_per_core do I need to read all cores?
  369. */
  370. static void ebpf_update_swap_cgroup(int maps_per_core)
  371. {
  372. ebpf_cgroup_target_t *ect ;
  373. netdata_publish_swap_t *cv = swap_vector;
  374. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  375. size_t length = sizeof(netdata_publish_swap_t);
  376. if (maps_per_core)
  377. length *= ebpf_nprocs;
  378. pthread_mutex_lock(&mutex_cgroup_shm);
  379. for (ect = ebpf_cgroup_pids; ect; ect = ect->next) {
  380. struct pid_on_target2 *pids;
  381. for (pids = ect->pids; pids; pids = pids->next) {
  382. int pid = pids->pid;
  383. netdata_publish_swap_t *out = &pids->swap;
  384. if (likely(swap_pid) && swap_pid[pid]) {
  385. netdata_publish_swap_t *in = swap_pid[pid];
  386. memcpy(out, in, sizeof(netdata_publish_swap_t));
  387. } else {
  388. memset(cv, 0, length);
  389. if (!bpf_map_lookup_elem(fd, &pid, cv)) {
  390. swap_apps_accumulator(cv, maps_per_core);
  391. memcpy(out, cv, sizeof(netdata_publish_swap_t));
  392. // We are cleaning to avoid passing data read from one process to other.
  393. memset(cv, 0, length);
  394. }
  395. }
  396. }
  397. }
  398. pthread_mutex_unlock(&mutex_cgroup_shm);
  399. }
  400. /**
  401. * Read APPS table
  402. *
  403. * Read the apps table and store data inside the structure.
  404. *
  405. * @param maps_per_core do I need to read all cores?
  406. */
  407. static void read_swap_apps_table(int maps_per_core)
  408. {
  409. netdata_publish_swap_t *cv = swap_vector;
  410. uint32_t key;
  411. struct ebpf_pid_stat *pids = ebpf_root_of_pids;
  412. int fd = swap_maps[NETDATA_PID_SWAP_TABLE].map_fd;
  413. size_t length = sizeof(netdata_publish_swap_t);
  414. if (maps_per_core)
  415. length *= ebpf_nprocs;
  416. while (pids) {
  417. key = pids->pid;
  418. if (bpf_map_lookup_elem(fd, &key, cv)) {
  419. pids = pids->next;
  420. continue;
  421. }
  422. swap_apps_accumulator(cv, maps_per_core);
  423. swap_fill_pid(key, cv);
  424. // We are cleaning to avoid passing data read from one process to other.
  425. memset(cv, 0, length);
  426. pids = pids->next;
  427. }
  428. }
  429. /**
  430. * Send global
  431. *
  432. * Send global charts to Netdata
  433. */
  434. static void swap_send_global()
  435. {
  436. write_io_chart(NETDATA_MEM_SWAP_CHART, NETDATA_EBPF_MEMORY_GROUP,
  437. swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].dimension,
  438. (long long) swap_hash_values[NETDATA_KEY_SWAP_WRITEPAGE_CALL],
  439. swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].dimension,
  440. (long long) swap_hash_values[NETDATA_KEY_SWAP_READPAGE_CALL]);
  441. }
  442. /**
  443. * Read global counter
  444. *
  445. * Read the table with number of calls to all functions
  446. *
  447. * @param stats vector used to read data from control table.
  448. * @param maps_per_core do I need to read all cores?
  449. */
  450. static void ebpf_swap_read_global_table(netdata_idx_t *stats, int maps_per_core)
  451. {
  452. ebpf_read_global_table_stats(swap_hash_values,
  453. swap_values,
  454. swap_maps[NETDATA_SWAP_GLOBAL_TABLE].map_fd,
  455. maps_per_core,
  456. NETDATA_KEY_SWAP_READPAGE_CALL,
  457. NETDATA_SWAP_END);
  458. ebpf_read_global_table_stats(stats,
  459. swap_values,
  460. swap_maps[NETDATA_SWAP_CONTROLLER].map_fd,
  461. maps_per_core,
  462. NETDATA_CONTROLLER_PID_TABLE_ADD,
  463. NETDATA_CONTROLLER_END);
  464. }
  465. /**
  466. * Sum PIDs
  467. *
  468. * Sum values for all targets.
  469. *
  470. * @param swap
  471. * @param root
  472. */
  473. static void ebpf_swap_sum_pids(netdata_publish_swap_t *swap, struct ebpf_pid_on_target *root)
  474. {
  475. uint64_t local_read = 0;
  476. uint64_t local_write = 0;
  477. while (root) {
  478. int32_t pid = root->pid;
  479. netdata_publish_swap_t *w = swap_pid[pid];
  480. if (w) {
  481. local_write += w->write;
  482. local_read += w->read;
  483. }
  484. root = root->next;
  485. }
  486. // These conditions were added, because we are using incremental algorithm
  487. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  488. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  489. }
  490. /**
  491. * Send data to Netdata calling auxiliary functions.
  492. *
  493. * @param root the target list.
  494. */
  495. void ebpf_swap_send_apps_data(struct ebpf_target *root)
  496. {
  497. struct ebpf_target *w;
  498. for (w = root; w; w = w->next) {
  499. if (unlikely(!(w->charts_created & (1<<EBPF_MODULE_SWAP_IDX))))
  500. continue;
  501. ebpf_swap_sum_pids(&w->swap, w->root_pid);
  502. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_swap_readpage");
  503. write_chart_dimension("calls", (long long) w->swap.read);
  504. ebpf_write_end_chart();
  505. ebpf_write_begin_chart(NETDATA_APP_FAMILY, w->clean_name, "_ebpf_call_swap_writepage");
  506. write_chart_dimension("calls", (long long) w->swap.write);
  507. ebpf_write_end_chart();
  508. }
  509. }
  510. /**
  511. * Sum PIDs
  512. *
  513. * Sum values for all targets.
  514. *
  515. * @param swap
  516. * @param root
  517. */
  518. static void ebpf_swap_sum_cgroup_pids(netdata_publish_swap_t *swap, struct pid_on_target2 *pids)
  519. {
  520. uint64_t local_read = 0;
  521. uint64_t local_write = 0;
  522. while (pids) {
  523. netdata_publish_swap_t *w = &pids->swap;
  524. local_write += w->write;
  525. local_read += w->read;
  526. pids = pids->next;
  527. }
  528. // These conditions were added, because we are using incremental algorithm
  529. swap->write = (local_write >= swap->write) ? local_write : swap->write;
  530. swap->read = (local_read >= swap->read) ? local_read : swap->read;
  531. }
  532. /**
  533. * Send Systemd charts
  534. *
  535. * Send collected data to Netdata.
  536. */
  537. static void ebpf_send_systemd_swap_charts()
  538. {
  539. ebpf_cgroup_target_t *ect;
  540. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_READ_CHART, "");
  541. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  542. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  543. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.read);
  544. }
  545. }
  546. ebpf_write_end_chart();
  547. ebpf_write_begin_chart(NETDATA_SERVICE_FAMILY, NETDATA_MEM_SWAP_WRITE_CHART, "");
  548. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  549. if (unlikely(ect->systemd) && unlikely(ect->updated)) {
  550. write_chart_dimension(ect->name, (long long) ect->publish_systemd_swap.write);
  551. }
  552. }
  553. ebpf_write_end_chart();
  554. }
  555. /**
  556. * Create specific swap charts
  557. *
  558. * Create charts for cgroup/application.
  559. *
  560. * @param type the chart type.
  561. * @param update_every value to overwrite the update frequency set by the server.
  562. */
  563. static void ebpf_create_specific_swap_charts(char *type, int update_every)
  564. {
  565. ebpf_create_chart(type, NETDATA_MEM_SWAP_READ_CHART,
  566. "Calls to function swap_readpage.",
  567. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  568. NETDATA_CGROUP_SWAP_READ_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  569. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100,
  570. ebpf_create_global_dimension,
  571. swap_publish_aggregated, 1, update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  572. ebpf_create_chart(type, NETDATA_MEM_SWAP_WRITE_CHART,
  573. "Calls to function swap_writepage.",
  574. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  575. NETDATA_CGROUP_SWAP_WRITE_CONTEXT, NETDATA_EBPF_CHART_TYPE_LINE,
  576. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101,
  577. ebpf_create_global_dimension,
  578. &swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL], 1,
  579. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  580. }
  581. /**
  582. * Create specific swap charts
  583. *
  584. * Create charts for cgroup/application.
  585. *
  586. * @param type the chart type.
  587. * @param update_every value to overwrite the update frequency set by the server.
  588. */
  589. static void ebpf_obsolete_specific_swap_charts(char *type, int update_every)
  590. {
  591. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_READ_CHART, "", "Calls to function swap_readpage.",
  592. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  593. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_READ_CONTEXT,
  594. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5100, update_every);
  595. ebpf_write_chart_obsolete(type, NETDATA_MEM_SWAP_WRITE_CHART, "", "Calls to function swap_writepage.",
  596. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  597. NETDATA_EBPF_CHART_TYPE_LINE, NETDATA_CGROUP_SWAP_WRITE_CONTEXT,
  598. NETDATA_CHART_PRIO_CGROUPS_CONTAINERS + 5101, update_every);
  599. }
  600. /*
  601. * Send Specific Swap data
  602. *
  603. * Send data for specific cgroup/apps.
  604. *
  605. * @param type chart type
  606. * @param values structure with values that will be sent to netdata
  607. */
  608. static void ebpf_send_specific_swap_data(char *type, netdata_publish_swap_t *values)
  609. {
  610. ebpf_write_begin_chart(type, NETDATA_MEM_SWAP_READ_CHART, "");
  611. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_READPAGE_CALL].name, (long long) values->read);
  612. ebpf_write_end_chart();
  613. ebpf_write_begin_chart(type, NETDATA_MEM_SWAP_WRITE_CHART, "");
  614. write_chart_dimension(swap_publish_aggregated[NETDATA_KEY_SWAP_WRITEPAGE_CALL].name, (long long) values->write);
  615. ebpf_write_end_chart();
  616. }
  617. /**
  618. * Create Systemd Swap Charts
  619. *
  620. * Create charts when systemd is enabled
  621. *
  622. * @param update_every value to overwrite the update frequency set by the server.
  623. **/
  624. static void ebpf_create_systemd_swap_charts(int update_every)
  625. {
  626. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_READ_CHART,
  627. "Calls to swap_readpage.",
  628. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  629. NETDATA_EBPF_CHART_TYPE_STACKED, 20191,
  630. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_READ_CONTEXT,
  631. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  632. ebpf_create_charts_on_systemd(NETDATA_MEM_SWAP_WRITE_CHART,
  633. "Calls to function swap_writepage.",
  634. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_CGROUP_SWAP_SUBMENU,
  635. NETDATA_EBPF_CHART_TYPE_STACKED, 20192,
  636. ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX], NETDATA_SYSTEMD_SWAP_WRITE_CONTEXT,
  637. NETDATA_EBPF_MODULE_NAME_SWAP, update_every);
  638. }
  639. /**
  640. * Send data to Netdata calling auxiliary functions.
  641. *
  642. * @param update_every value to overwrite the update frequency set by the server.
  643. */
  644. void ebpf_swap_send_cgroup_data(int update_every)
  645. {
  646. if (!ebpf_cgroup_pids)
  647. return;
  648. pthread_mutex_lock(&mutex_cgroup_shm);
  649. ebpf_cgroup_target_t *ect;
  650. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  651. ebpf_swap_sum_cgroup_pids(&ect->publish_systemd_swap, ect->pids);
  652. }
  653. int has_systemd = shm_ebpf_cgroup.header->systemd_enabled;
  654. if (has_systemd) {
  655. if (send_cgroup_chart) {
  656. ebpf_create_systemd_swap_charts(update_every);
  657. fflush(stdout);
  658. }
  659. ebpf_send_systemd_swap_charts();
  660. }
  661. for (ect = ebpf_cgroup_pids; ect ; ect = ect->next) {
  662. if (ect->systemd)
  663. continue;
  664. if (!(ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) && ect->updated) {
  665. ebpf_create_specific_swap_charts(ect->name, update_every);
  666. ect->flags |= NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  667. }
  668. if (ect->flags & NETDATA_EBPF_CGROUP_HAS_SWAP_CHART) {
  669. if (ect->updated) {
  670. ebpf_send_specific_swap_data(ect->name, &ect->publish_systemd_swap);
  671. } else {
  672. ebpf_obsolete_specific_swap_charts(ect->name, update_every);
  673. ect->flags &= ~NETDATA_EBPF_CGROUP_HAS_SWAP_CHART;
  674. }
  675. }
  676. }
  677. pthread_mutex_unlock(&mutex_cgroup_shm);
  678. }
  679. /**
  680. * Main loop for this collector.
  681. */
  682. static void swap_collector(ebpf_module_t *em)
  683. {
  684. int cgroup = em->cgroup_charts;
  685. int update_every = em->update_every;
  686. heartbeat_t hb;
  687. heartbeat_init(&hb);
  688. int counter = update_every - 1;
  689. int maps_per_core = em->maps_per_core;
  690. uint32_t running_time = 0;
  691. uint32_t lifetime = em->lifetime;
  692. netdata_idx_t *stats = em->hash_table_stats;
  693. memset(stats, 0, sizeof(em->hash_table_stats));
  694. while (!ebpf_plugin_exit && running_time < lifetime) {
  695. (void)heartbeat_next(&hb, USEC_PER_SEC);
  696. if (ebpf_plugin_exit || ++counter != update_every)
  697. continue;
  698. counter = 0;
  699. netdata_apps_integration_flags_t apps = em->apps_charts;
  700. ebpf_swap_read_global_table(stats, maps_per_core);
  701. pthread_mutex_lock(&collect_data_mutex);
  702. if (apps)
  703. read_swap_apps_table(maps_per_core);
  704. if (cgroup)
  705. ebpf_update_swap_cgroup(maps_per_core);
  706. pthread_mutex_lock(&lock);
  707. swap_send_global();
  708. if (apps & NETDATA_EBPF_APPS_FLAG_CHART_CREATED)
  709. ebpf_swap_send_apps_data(apps_groups_root_target);
  710. if (cgroup)
  711. ebpf_swap_send_cgroup_data(update_every);
  712. pthread_mutex_unlock(&lock);
  713. pthread_mutex_unlock(&collect_data_mutex);
  714. pthread_mutex_lock(&ebpf_exit_cleanup);
  715. if (running_time && !em->running_time)
  716. running_time = update_every;
  717. else
  718. running_time += update_every;
  719. em->running_time = running_time;
  720. pthread_mutex_unlock(&ebpf_exit_cleanup);
  721. }
  722. }
  723. /*****************************************************************
  724. *
  725. * INITIALIZE THREAD
  726. *
  727. *****************************************************************/
  728. /**
  729. * Create apps charts
  730. *
  731. * Call ebpf_create_chart to create the charts on apps submenu.
  732. *
  733. * @param em a pointer to the structure with the default values.
  734. */
  735. void ebpf_swap_create_apps_charts(struct ebpf_module *em, void *ptr)
  736. {
  737. struct ebpf_target *root = ptr;
  738. struct ebpf_target *w;
  739. int update_every = em->update_every;
  740. for (w = root; w; w = w->next) {
  741. if (unlikely(!w->exposed))
  742. continue;
  743. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  744. w->clean_name,
  745. "_ebpf_call_swap_readpage",
  746. "Calls to function swap_readpage.",
  747. EBPF_COMMON_DIMENSION_CALL,
  748. NETDATA_EBPF_MEMORY_GROUP,
  749. NETDATA_EBPF_CHART_TYPE_STACKED,
  750. "app.ebpf_call_swap_readpage",
  751. 20070,
  752. update_every,
  753. NETDATA_EBPF_MODULE_NAME_SWAP);
  754. ebpf_create_chart_labels("app_group", w->name, 0);
  755. ebpf_commit_label();
  756. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  757. ebpf_write_chart_cmd(NETDATA_APP_FAMILY,
  758. w->clean_name,
  759. "_ebpf_call_swap_writepage",
  760. "Calls to function swap_writepage.",
  761. EBPF_COMMON_DIMENSION_CALL,
  762. NETDATA_EBPF_MEMORY_GROUP,
  763. NETDATA_EBPF_CHART_TYPE_STACKED,
  764. "app.ebpf_call_swap_writepage",
  765. 20071,
  766. update_every,
  767. NETDATA_EBPF_MODULE_NAME_SWAP);
  768. ebpf_create_chart_labels("app_group", w->name, 0);
  769. ebpf_commit_label();
  770. fprintf(stdout, "DIMENSION calls '' %s 1 1\n", ebpf_algorithms[NETDATA_EBPF_INCREMENTAL_IDX]);
  771. w->charts_created |= 1<<EBPF_MODULE_SWAP_IDX;
  772. }
  773. em->apps_charts |= NETDATA_EBPF_APPS_FLAG_CHART_CREATED;
  774. }
  775. /**
  776. * Allocate vectors used with this thread.
  777. *
  778. * We are not testing the return, because callocz does this and shutdown the software
  779. * case it was not possible to allocate.
  780. *
  781. * @param apps is apps enabled?
  782. */
  783. static void ebpf_swap_allocate_global_vectors(int apps)
  784. {
  785. if (apps)
  786. swap_pid = callocz((size_t)pid_max, sizeof(netdata_publish_swap_t *));
  787. swap_vector = callocz((size_t)ebpf_nprocs, sizeof(netdata_publish_swap_t));
  788. swap_values = callocz((size_t)ebpf_nprocs, sizeof(netdata_idx_t));
  789. memset(swap_hash_values, 0, sizeof(swap_hash_values));
  790. }
  791. /*****************************************************************
  792. *
  793. * MAIN THREAD
  794. *
  795. *****************************************************************/
  796. /**
  797. * Create global charts
  798. *
  799. * Call ebpf_create_chart to create the charts for the collector.
  800. *
  801. * @param update_every value to overwrite the update frequency set by the server.
  802. */
  803. static void ebpf_create_swap_charts(int update_every)
  804. {
  805. ebpf_create_chart(NETDATA_EBPF_MEMORY_GROUP, NETDATA_MEM_SWAP_CHART,
  806. "Calls to access swap memory",
  807. EBPF_COMMON_DIMENSION_CALL, NETDATA_SYSTEM_SWAP_SUBMENU,
  808. NULL,
  809. NETDATA_EBPF_CHART_TYPE_LINE,
  810. NETDATA_CHART_PRIO_MEM_SWAP_CALLS,
  811. ebpf_create_global_dimension,
  812. swap_publish_aggregated, NETDATA_SWAP_END,
  813. update_every, NETDATA_EBPF_MODULE_NAME_SWAP);
  814. fflush(stdout);
  815. }
  816. /*
  817. * Load BPF
  818. *
  819. * Load BPF files.
  820. *
  821. * @param em the structure with configuration
  822. */
  823. static int ebpf_swap_load_bpf(ebpf_module_t *em)
  824. {
  825. #ifdef LIBBPF_MAJOR_VERSION
  826. ebpf_define_map_type(em->maps, em->maps_per_core, running_on_kernel);
  827. #endif
  828. int ret = 0;
  829. ebpf_adjust_apps_cgroup(em, em->targets[NETDATA_KEY_SWAP_READPAGE_CALL].mode);
  830. if (em->load & EBPF_LOAD_LEGACY) {
  831. em->probe_links = ebpf_load_program(ebpf_plugin_dir, em, running_on_kernel, isrh, &em->objects);
  832. if (!em->probe_links) {
  833. ret = -1;
  834. }
  835. }
  836. #ifdef LIBBPF_MAJOR_VERSION
  837. else {
  838. bpf_obj = swap_bpf__open();
  839. if (!bpf_obj)
  840. ret = -1;
  841. else
  842. ret = ebpf_swap_load_and_attach(bpf_obj, em);
  843. }
  844. #endif
  845. if (ret)
  846. netdata_log_error("%s %s", EBPF_DEFAULT_ERROR_MSG, em->info.thread_name);
  847. return ret;
  848. }
  849. /**
  850. * SWAP thread
  851. *
  852. * Thread used to make swap thread
  853. *
  854. * @param ptr a pointer to `struct ebpf_module`
  855. *
  856. * @return It always return NULL
  857. */
  858. void *ebpf_swap_thread(void *ptr)
  859. {
  860. netdata_thread_cleanup_push(ebpf_swap_exit, ptr);
  861. ebpf_module_t *em = (ebpf_module_t *)ptr;
  862. em->maps = swap_maps;
  863. ebpf_update_pid_table(&swap_maps[NETDATA_PID_SWAP_TABLE], em);
  864. #ifdef LIBBPF_MAJOR_VERSION
  865. ebpf_adjust_thread_load(em, default_btf);
  866. #endif
  867. if (ebpf_swap_load_bpf(em)) {
  868. goto endswap;
  869. }
  870. ebpf_swap_allocate_global_vectors(em->apps_charts);
  871. int algorithms[NETDATA_SWAP_END] = { NETDATA_EBPF_INCREMENTAL_IDX, NETDATA_EBPF_INCREMENTAL_IDX };
  872. ebpf_global_labels(swap_aggregated_data, swap_publish_aggregated, swap_dimension_name, swap_dimension_name,
  873. algorithms, NETDATA_SWAP_END);
  874. pthread_mutex_lock(&lock);
  875. ebpf_create_swap_charts(em->update_every);
  876. ebpf_update_stats(&plugin_statistics, em);
  877. ebpf_update_kernel_memory_with_vector(&plugin_statistics, em->maps, EBPF_ACTION_STAT_ADD);
  878. pthread_mutex_unlock(&lock);
  879. swap_collector(em);
  880. endswap:
  881. ebpf_update_disabled_plugin_stats(em);
  882. netdata_thread_cleanup_pop(1);
  883. return NULL;
  884. }