1 /*
2  * MM Events - eBPF programs
3  *
4  * Copyright 2024 The Android Open Source Project
5  *
6  * Licensed under the Apache License, Version 2.0 (the "License");
7  * you may not use this file except in compliance with the License
8  * You may obtain a copy of the License at
9  *      http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17 #include <string.h>
18 
19 #include <linux/bpf_perf_event.h>
20 
21 #include <memevents/bpf_helpers.h>
22 #include <memevents/bpf_types.h>
23 #include <memevents/memevents_test.h>
24 
25 DEFINE_BPF_RINGBUF_EXT(rb, struct mem_event_t, MEM_EVENTS_RINGBUF_SIZE, DEFAULT_BPF_MAP_UID,
26                        AID_SYSTEM, 0660, DEFAULT_BPF_MAP_SELINUX_CONTEXT,
27                        DEFAULT_BPF_MAP_PIN_SUBDIR, PRIVATE, BPFLOADER_MIN_VER, BPFLOADER_MAX_VER,
28                        LOAD_ON_ENG, LOAD_ON_USER, LOAD_ON_USERDEBUG)
29 
30 DEFINE_BPF_PROG("tracepoint/oom/mark_victim", AID_ROOT, AID_SYSTEM, tp_ams)
31 (struct mark_victim_args* args) {
32     unsigned long long timestamp_ns = bpf_ktime_get_ns();
33     struct mem_event_t* data = bpf_rb_reserve();
34     if (data == NULL) return 1;
35 
36     data->type = MEM_EVENT_OOM_KILL;
37     data->event_data.oom_kill.pid = args->pid;
38     data->event_data.oom_kill.oom_score_adj = args->oom_score_adj;
39     data->event_data.oom_kill.uid = args->uid;
40     data->event_data.oom_kill.timestamp_ms = timestamp_ns / 1000000;  // Convert to milliseconds
41     data->event_data.oom_kill.total_vm_kb = args->total_vm;
42     data->event_data.oom_kill.anon_rss_kb = args->anon_rss;
43     data->event_data.oom_kill.file_rss_kb = args->file_rss;
44     data->event_data.oom_kill.shmem_rss_kb = args->shmem_rss;
45     data->event_data.oom_kill.pgtables_kb = args->pgtables;
46 
47     read_str((char*)args, args->__data_loc_comm, data->event_data.oom_kill.process_name,
48              MEM_EVENT_PROC_NAME_LEN);
49 
50     bpf_rb_submit(data);
51 
52     return 0;
53 }
54 
55 /*
56  * Following progs (`skfilter`) are for testing purposes in `memevents_test`.
57  * Note that these programs should never be attached to a socket, only
58  * executed manually with BPF_PROG_RUN, and the tracepoint bpf-progs do not
59  * currently implement this BPF_PROG_RUN operation.
60  */
61 DEFINE_BPF_PROG_KVER("skfilter/oom_kill", AID_ROOT, AID_ROOT, tp_memevents_test_oom, KVER(5, 8, 0))
62 (void* unused_ctx) {
63     struct mem_event_t* data = bpf_rb_reserve();
64     if (data == NULL) return 1;
65 
66     data->type = mocked_oom_event.type;
67     data->event_data.oom_kill.pid = mocked_oom_event.event_data.oom_kill.pid;
68     data->event_data.oom_kill.uid = mocked_oom_event.event_data.oom_kill.uid;
69     data->event_data.oom_kill.oom_score_adj = mocked_oom_event.event_data.oom_kill.oom_score_adj;
70     data->event_data.oom_kill.timestamp_ms = mocked_oom_event.event_data.oom_kill.timestamp_ms;
71     data->event_data.oom_kill.total_vm_kb = mocked_oom_event.event_data.oom_kill.total_vm_kb;
72     data->event_data.oom_kill.anon_rss_kb = mocked_oom_event.event_data.oom_kill.anon_rss_kb;
73     data->event_data.oom_kill.file_rss_kb = mocked_oom_event.event_data.oom_kill.file_rss_kb;
74     data->event_data.oom_kill.shmem_rss_kb = mocked_oom_event.event_data.oom_kill.shmem_rss_kb;
75     data->event_data.oom_kill.pgtables_kb = mocked_oom_event.event_data.oom_kill.pgtables_kb;
76 
77     strncpy(data->event_data.oom_kill.process_name,
78             mocked_oom_event.event_data.oom_kill.process_name, 13);
79 
80     bpf_rb_submit(data);
81 
82     return 0;
83 }
84 
85 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_begin", AID_ROOT, AID_ROOT,
86                      tp_memevents_test_dr_begin, KVER(5, 8, 0))
87 (void* unused_ctx) {
88     struct mem_event_t* data = bpf_rb_reserve();
89     if (data == NULL) return 1;
90 
91     data->type = MEM_EVENT_DIRECT_RECLAIM_BEGIN;
92 
93     bpf_rb_submit(data);
94 
95     return 0;
96 }
97 
98 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_end", AID_ROOT, AID_ROOT, tp_memevents_test_dr_end,
99                      KVER(5, 8, 0))
100 (void* unused_ctx) {
101     struct mem_event_t* data = bpf_rb_reserve();
102     if (data == NULL) return 1;
103 
104     data->type = MEM_EVENT_DIRECT_RECLAIM_END;
105 
106     bpf_rb_submit(data);
107 
108     return 0;
109 }
110 
111 DEFINE_BPF_PROG_KVER("skfilter/kswapd_wake", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_wake,
112                      KVER(5, 8, 0))
113 (void* unused_ctx) {
114     struct mem_event_t* data = bpf_rb_reserve();
115     if (data == NULL) return 1;
116 
117     data->type = MEM_EVENT_KSWAPD_WAKE;
118     data->event_data.kswapd_wake.node_id = mocked_kswapd_wake_event.event_data.kswapd_wake.node_id;
119     data->event_data.kswapd_wake.zone_id = mocked_kswapd_wake_event.event_data.kswapd_wake.zone_id;
120     data->event_data.kswapd_wake.alloc_order =
121             mocked_kswapd_wake_event.event_data.kswapd_wake.alloc_order;
122 
123     bpf_rb_submit(data);
124 
125     return 0;
126 }
127 
128 DEFINE_BPF_PROG_KVER("skfilter/kswapd_sleep", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_sleep,
129                      KVER(5, 8, 0))
130 (void* unused_ctx) {
131     struct mem_event_t* data = bpf_rb_reserve();
132     if (data == NULL) return 1;
133 
134     data->type = MEM_EVENT_KSWAPD_SLEEP;
135     data->event_data.kswapd_sleep.node_id =
136             mocked_kswapd_sleep_event.event_data.kswapd_sleep.node_id;
137 
138     bpf_rb_submit(data);
139 
140     return 0;
141 }
142 
143 // bpf_probe_read_str is GPL only symbol
144 LICENSE("GPL");
145