1 /* 2 * MM Events - eBPF programs 3 * 4 * Copyright 2024 The Android Open Source Project 5 * 6 * Licensed under the Apache License, Version 2.0 (the "License"); 7 * you may not use this file except in compliance with the License 8 * You may obtain a copy of the License at 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 */ 17 #include <string.h> 18 19 #include <linux/bpf_perf_event.h> 20 21 #include <memevents/bpf_helpers.h> 22 #include <memevents/bpf_types.h> 23 #include <memevents/memevents_test.h> 24 25 DEFINE_BPF_RINGBUF(rb, struct mem_event_t, MEM_EVENTS_RINGBUF_SIZE, DEFAULT_BPF_MAP_UID, AID_SYSTEM, 26 0660) 27 28 DEFINE_BPF_PROG_KVER("tracepoint/oom/mark_victim", AID_ROOT, AID_SYSTEM, tp_ams, KVER_5_8) 29 (struct mark_victim_args* args) { 30 unsigned long long timestamp_ns = bpf_ktime_get_ns(); 31 struct mem_event_t* data = bpf_rb_reserve(); 32 if (data == NULL) return 1; 33 34 data->type = MEM_EVENT_OOM_KILL; 35 data->event_data.oom_kill.pid = args->pid; 36 data->event_data.oom_kill.oom_score_adj = args->oom_score_adj; 37 data->event_data.oom_kill.uid = args->uid; 38 data->event_data.oom_kill.timestamp_ms = timestamp_ns / 1000000; // Convert to milliseconds 39 data->event_data.oom_kill.total_vm_kb = args->total_vm; 40 data->event_data.oom_kill.anon_rss_kb = args->anon_rss; 41 data->event_data.oom_kill.file_rss_kb = args->file_rss; 42 data->event_data.oom_kill.shmem_rss_kb = args->shmem_rss; 43 data->event_data.oom_kill.pgtables_kb = args->pgtables; 44 45 read_str((char*)args, args->__data_loc_comm, data->event_data.oom_kill.process_name, 46 MEM_EVENT_PROC_NAME_LEN); 47 48 bpf_rb_submit(data); 49 50 return 0; 51 } 52 53 /* 54 * Following progs (`skfilter`) are for testing purposes in `memevents_test`. 55 * Note that these programs should never be attached to a socket, only 56 * executed manually with BPF_PROG_RUN, and the tracepoint bpf-progs do not 57 * currently implement this BPF_PROG_RUN operation. 58 */ 59 DEFINE_BPF_PROG_KVER("skfilter/oom_kill", AID_ROOT, AID_ROOT, tp_memevents_test_oom, KVER_5_8) 60 (void* __unused ctx) { 61 struct mem_event_t* data = bpf_rb_reserve(); 62 if (data == NULL) return 1; 63 64 data->type = mocked_oom_event.type; 65 data->event_data.oom_kill.pid = mocked_oom_event.event_data.oom_kill.pid; 66 data->event_data.oom_kill.uid = mocked_oom_event.event_data.oom_kill.uid; 67 data->event_data.oom_kill.oom_score_adj = mocked_oom_event.event_data.oom_kill.oom_score_adj; 68 data->event_data.oom_kill.timestamp_ms = mocked_oom_event.event_data.oom_kill.timestamp_ms; 69 data->event_data.oom_kill.total_vm_kb = mocked_oom_event.event_data.oom_kill.total_vm_kb; 70 data->event_data.oom_kill.anon_rss_kb = mocked_oom_event.event_data.oom_kill.anon_rss_kb; 71 data->event_data.oom_kill.file_rss_kb = mocked_oom_event.event_data.oom_kill.file_rss_kb; 72 data->event_data.oom_kill.shmem_rss_kb = mocked_oom_event.event_data.oom_kill.shmem_rss_kb; 73 data->event_data.oom_kill.pgtables_kb = mocked_oom_event.event_data.oom_kill.pgtables_kb; 74 75 strncpy(data->event_data.oom_kill.process_name, 76 mocked_oom_event.event_data.oom_kill.process_name, 13); 77 78 bpf_rb_submit(data); 79 80 return 0; 81 } 82 83 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_begin", AID_ROOT, AID_ROOT, 84 tp_memevents_test_dr_begin, KVER_5_8) 85 (void* __unused ctx) { 86 struct mem_event_t* data = bpf_rb_reserve(); 87 if (data == NULL) return 1; 88 89 data->type = MEM_EVENT_DIRECT_RECLAIM_BEGIN; 90 91 bpf_rb_submit(data); 92 93 return 0; 94 } 95 96 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_end", AID_ROOT, AID_ROOT, tp_memevents_test_dr_end, 97 KVER_5_8) 98 (void* __unused ctx) { 99 struct mem_event_t* data = bpf_rb_reserve(); 100 if (data == NULL) return 1; 101 102 data->type = MEM_EVENT_DIRECT_RECLAIM_END; 103 104 bpf_rb_submit(data); 105 106 return 0; 107 } 108 109 DEFINE_BPF_PROG_KVER("skfilter/kswapd_wake", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_wake, 110 KVER_5_8) 111 (void* __unused ctx) { 112 struct mem_event_t* data = bpf_rb_reserve(); 113 if (data == NULL) return 1; 114 115 data->type = MEM_EVENT_KSWAPD_WAKE; 116 data->event_data.kswapd_wake.node_id = mocked_kswapd_wake_event.event_data.kswapd_wake.node_id; 117 data->event_data.kswapd_wake.zone_id = mocked_kswapd_wake_event.event_data.kswapd_wake.zone_id; 118 data->event_data.kswapd_wake.alloc_order = 119 mocked_kswapd_wake_event.event_data.kswapd_wake.alloc_order; 120 121 bpf_rb_submit(data); 122 123 return 0; 124 } 125 126 DEFINE_BPF_PROG_KVER("skfilter/kswapd_sleep", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_sleep, 127 KVER_5_8) 128 (void* __unused ctx) { 129 struct mem_event_t* data = bpf_rb_reserve(); 130 if (data == NULL) return 1; 131 132 data->type = MEM_EVENT_KSWAPD_SLEEP; 133 data->event_data.kswapd_sleep.node_id = 134 mocked_kswapd_sleep_event.event_data.kswapd_sleep.node_id; 135 136 bpf_rb_submit(data); 137 138 return 0; 139 } 140 141 // bpf_probe_read_str is GPL only symbol 142 LICENSE("GPL"); 143