1 /* 2 * MM Events - eBPF programs 3 * 4 * Copyright 2024 The Android Open Source Project 5 * 6 * Licensed under the Apache License, Version 2.0 (the "License"); 7 * you may not use this file except in compliance with the License 8 * You may obtain a copy of the License at 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 */ 17 #include <string.h> 18 19 #include <linux/bpf_perf_event.h> 20 21 #include <memevents/bpf_helpers.h> 22 #include <memevents/bpf_types.h> 23 #include <memevents/memevents_test.h> 24 25 DEFINE_BPF_RINGBUF_EXT(rb, struct mem_event_t, MEM_EVENTS_RINGBUF_SIZE, DEFAULT_BPF_MAP_UID, 26 AID_SYSTEM, 0660, DEFAULT_BPF_MAP_SELINUX_CONTEXT, 27 DEFAULT_BPF_MAP_PIN_SUBDIR, PRIVATE, BPFLOADER_MIN_VER, BPFLOADER_MAX_VER, 28 LOAD_ON_ENG, LOAD_ON_USER, LOAD_ON_USERDEBUG) 29 30 DEFINE_BPF_PROG("tracepoint/oom/mark_victim", AID_ROOT, AID_SYSTEM, tp_ams) 31 (struct mark_victim_args* args) { 32 unsigned long long timestamp_ns = bpf_ktime_get_ns(); 33 struct mem_event_t* data = bpf_rb_reserve(); 34 if (data == NULL) return 1; 35 36 data->type = MEM_EVENT_OOM_KILL; 37 data->event_data.oom_kill.pid = args->pid; 38 data->event_data.oom_kill.oom_score_adj = args->oom_score_adj; 39 data->event_data.oom_kill.uid = args->uid; 40 data->event_data.oom_kill.timestamp_ms = timestamp_ns / 1000000; // Convert to milliseconds 41 data->event_data.oom_kill.total_vm_kb = args->total_vm; 42 data->event_data.oom_kill.anon_rss_kb = args->anon_rss; 43 data->event_data.oom_kill.file_rss_kb = args->file_rss; 44 data->event_data.oom_kill.shmem_rss_kb = args->shmem_rss; 45 data->event_data.oom_kill.pgtables_kb = args->pgtables; 46 47 read_str((char*)args, args->__data_loc_comm, data->event_data.oom_kill.process_name, 48 MEM_EVENT_PROC_NAME_LEN); 49 50 bpf_rb_submit(data); 51 52 return 0; 53 } 54 55 /* 56 * Following progs (`skfilter`) are for testing purposes in `memevents_test`. 57 * Note that these programs should never be attached to a socket, only 58 * executed manually with BPF_PROG_RUN, and the tracepoint bpf-progs do not 59 * currently implement this BPF_PROG_RUN operation. 60 */ 61 DEFINE_BPF_PROG_KVER("skfilter/oom_kill", AID_ROOT, AID_ROOT, tp_memevents_test_oom, KVER(5, 8, 0)) 62 (void* unused_ctx) { 63 struct mem_event_t* data = bpf_rb_reserve(); 64 if (data == NULL) return 1; 65 66 data->type = mocked_oom_event.type; 67 data->event_data.oom_kill.pid = mocked_oom_event.event_data.oom_kill.pid; 68 data->event_data.oom_kill.uid = mocked_oom_event.event_data.oom_kill.uid; 69 data->event_data.oom_kill.oom_score_adj = mocked_oom_event.event_data.oom_kill.oom_score_adj; 70 data->event_data.oom_kill.timestamp_ms = mocked_oom_event.event_data.oom_kill.timestamp_ms; 71 data->event_data.oom_kill.total_vm_kb = mocked_oom_event.event_data.oom_kill.total_vm_kb; 72 data->event_data.oom_kill.anon_rss_kb = mocked_oom_event.event_data.oom_kill.anon_rss_kb; 73 data->event_data.oom_kill.file_rss_kb = mocked_oom_event.event_data.oom_kill.file_rss_kb; 74 data->event_data.oom_kill.shmem_rss_kb = mocked_oom_event.event_data.oom_kill.shmem_rss_kb; 75 data->event_data.oom_kill.pgtables_kb = mocked_oom_event.event_data.oom_kill.pgtables_kb; 76 77 strncpy(data->event_data.oom_kill.process_name, 78 mocked_oom_event.event_data.oom_kill.process_name, 13); 79 80 bpf_rb_submit(data); 81 82 return 0; 83 } 84 85 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_begin", AID_ROOT, AID_ROOT, 86 tp_memevents_test_dr_begin, KVER(5, 8, 0)) 87 (void* unused_ctx) { 88 struct mem_event_t* data = bpf_rb_reserve(); 89 if (data == NULL) return 1; 90 91 data->type = MEM_EVENT_DIRECT_RECLAIM_BEGIN; 92 93 bpf_rb_submit(data); 94 95 return 0; 96 } 97 98 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_end", AID_ROOT, AID_ROOT, tp_memevents_test_dr_end, 99 KVER(5, 8, 0)) 100 (void* unused_ctx) { 101 struct mem_event_t* data = bpf_rb_reserve(); 102 if (data == NULL) return 1; 103 104 data->type = MEM_EVENT_DIRECT_RECLAIM_END; 105 106 bpf_rb_submit(data); 107 108 return 0; 109 } 110 111 DEFINE_BPF_PROG_KVER("skfilter/kswapd_wake", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_wake, 112 KVER(5, 8, 0)) 113 (void* unused_ctx) { 114 struct mem_event_t* data = bpf_rb_reserve(); 115 if (data == NULL) return 1; 116 117 data->type = MEM_EVENT_KSWAPD_WAKE; 118 data->event_data.kswapd_wake.node_id = mocked_kswapd_wake_event.event_data.kswapd_wake.node_id; 119 data->event_data.kswapd_wake.zone_id = mocked_kswapd_wake_event.event_data.kswapd_wake.zone_id; 120 data->event_data.kswapd_wake.alloc_order = 121 mocked_kswapd_wake_event.event_data.kswapd_wake.alloc_order; 122 123 bpf_rb_submit(data); 124 125 return 0; 126 } 127 128 DEFINE_BPF_PROG_KVER("skfilter/kswapd_sleep", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_sleep, 129 KVER(5, 8, 0)) 130 (void* unused_ctx) { 131 struct mem_event_t* data = bpf_rb_reserve(); 132 if (data == NULL) return 1; 133 134 data->type = MEM_EVENT_KSWAPD_SLEEP; 135 data->event_data.kswapd_sleep.node_id = 136 mocked_kswapd_sleep_event.event_data.kswapd_sleep.node_id; 137 138 bpf_rb_submit(data); 139 140 return 0; 141 } 142 143 // bpf_probe_read_str is GPL only symbol 144 LICENSE("GPL"); 145