1 /*
2  * MM Events - eBPF programs
3  *
4  * Copyright 2024 The Android Open Source Project
5  *
6  * Licensed under the Apache License, Version 2.0 (the "License");
7  * you may not use this file except in compliance with the License
8  * You may obtain a copy of the License at
9  *      http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17 #include <string.h>
18 
19 #include <linux/bpf_perf_event.h>
20 
21 #include <memevents/bpf_helpers.h>
22 #include <memevents/bpf_types.h>
23 #include <memevents/memevents_test.h>
24 
25 DEFINE_BPF_RINGBUF(rb, struct mem_event_t, MEM_EVENTS_RINGBUF_SIZE, DEFAULT_BPF_MAP_UID, AID_SYSTEM,
26                    0660)
27 
28 DEFINE_BPF_PROG_KVER("tracepoint/oom/mark_victim", AID_ROOT, AID_SYSTEM, tp_ams, KVER_5_8)
29 (struct mark_victim_args* args) {
30     unsigned long long timestamp_ns = bpf_ktime_get_ns();
31     struct mem_event_t* data = bpf_rb_reserve();
32     if (data == NULL) return 1;
33 
34     data->type = MEM_EVENT_OOM_KILL;
35     data->event_data.oom_kill.pid = args->pid;
36     data->event_data.oom_kill.oom_score_adj = args->oom_score_adj;
37     data->event_data.oom_kill.uid = args->uid;
38     data->event_data.oom_kill.timestamp_ms = timestamp_ns / 1000000;  // Convert to milliseconds
39     data->event_data.oom_kill.total_vm_kb = args->total_vm;
40     data->event_data.oom_kill.anon_rss_kb = args->anon_rss;
41     data->event_data.oom_kill.file_rss_kb = args->file_rss;
42     data->event_data.oom_kill.shmem_rss_kb = args->shmem_rss;
43     data->event_data.oom_kill.pgtables_kb = args->pgtables;
44 
45     read_str((char*)args, args->__data_loc_comm, data->event_data.oom_kill.process_name,
46              MEM_EVENT_PROC_NAME_LEN);
47 
48     bpf_rb_submit(data);
49 
50     return 0;
51 }
52 
53 /*
54  * Following progs (`skfilter`) are for testing purposes in `memevents_test`.
55  * Note that these programs should never be attached to a socket, only
56  * executed manually with BPF_PROG_RUN, and the tracepoint bpf-progs do not
57  * currently implement this BPF_PROG_RUN operation.
58  */
59 DEFINE_BPF_PROG_KVER("skfilter/oom_kill", AID_ROOT, AID_ROOT, tp_memevents_test_oom, KVER_5_8)
60 (void* __unused ctx) {
61     struct mem_event_t* data = bpf_rb_reserve();
62     if (data == NULL) return 1;
63 
64     data->type = mocked_oom_event.type;
65     data->event_data.oom_kill.pid = mocked_oom_event.event_data.oom_kill.pid;
66     data->event_data.oom_kill.uid = mocked_oom_event.event_data.oom_kill.uid;
67     data->event_data.oom_kill.oom_score_adj = mocked_oom_event.event_data.oom_kill.oom_score_adj;
68     data->event_data.oom_kill.timestamp_ms = mocked_oom_event.event_data.oom_kill.timestamp_ms;
69     data->event_data.oom_kill.total_vm_kb = mocked_oom_event.event_data.oom_kill.total_vm_kb;
70     data->event_data.oom_kill.anon_rss_kb = mocked_oom_event.event_data.oom_kill.anon_rss_kb;
71     data->event_data.oom_kill.file_rss_kb = mocked_oom_event.event_data.oom_kill.file_rss_kb;
72     data->event_data.oom_kill.shmem_rss_kb = mocked_oom_event.event_data.oom_kill.shmem_rss_kb;
73     data->event_data.oom_kill.pgtables_kb = mocked_oom_event.event_data.oom_kill.pgtables_kb;
74 
75     strncpy(data->event_data.oom_kill.process_name,
76             mocked_oom_event.event_data.oom_kill.process_name, 13);
77 
78     bpf_rb_submit(data);
79 
80     return 0;
81 }
82 
83 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_begin", AID_ROOT, AID_ROOT,
84                      tp_memevents_test_dr_begin, KVER_5_8)
85 (void* __unused ctx) {
86     struct mem_event_t* data = bpf_rb_reserve();
87     if (data == NULL) return 1;
88 
89     data->type = MEM_EVENT_DIRECT_RECLAIM_BEGIN;
90 
91     bpf_rb_submit(data);
92 
93     return 0;
94 }
95 
96 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_end", AID_ROOT, AID_ROOT, tp_memevents_test_dr_end,
97                      KVER_5_8)
98 (void* __unused ctx) {
99     struct mem_event_t* data = bpf_rb_reserve();
100     if (data == NULL) return 1;
101 
102     data->type = MEM_EVENT_DIRECT_RECLAIM_END;
103 
104     bpf_rb_submit(data);
105 
106     return 0;
107 }
108 
109 DEFINE_BPF_PROG_KVER("skfilter/kswapd_wake", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_wake,
110                      KVER_5_8)
111 (void* __unused ctx) {
112     struct mem_event_t* data = bpf_rb_reserve();
113     if (data == NULL) return 1;
114 
115     data->type = MEM_EVENT_KSWAPD_WAKE;
116     data->event_data.kswapd_wake.node_id = mocked_kswapd_wake_event.event_data.kswapd_wake.node_id;
117     data->event_data.kswapd_wake.zone_id = mocked_kswapd_wake_event.event_data.kswapd_wake.zone_id;
118     data->event_data.kswapd_wake.alloc_order =
119             mocked_kswapd_wake_event.event_data.kswapd_wake.alloc_order;
120 
121     bpf_rb_submit(data);
122 
123     return 0;
124 }
125 
126 DEFINE_BPF_PROG_KVER("skfilter/kswapd_sleep", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_sleep,
127                      KVER_5_8)
128 (void* __unused ctx) {
129     struct mem_event_t* data = bpf_rb_reserve();
130     if (data == NULL) return 1;
131 
132     data->type = MEM_EVENT_KSWAPD_SLEEP;
133     data->event_data.kswapd_sleep.node_id =
134             mocked_kswapd_sleep_event.event_data.kswapd_sleep.node_id;
135 
136     bpf_rb_submit(data);
137 
138     return 0;
139 }
140 
141 // bpf_probe_read_str is GPL only symbol
142 LICENSE("GPL");
143