1 /* 2 * MM Events - eBPF programs 3 * 4 * Copyright 2024 The Android Open Source Project 5 * 6 * Licensed under the Apache License, Version 2.0 (the "License"); 7 * you may not use this file except in compliance with the License 8 * You may obtain a copy of the License at 9 * http://www.apache.org/licenses/LICENSE-2.0 10 * 11 * Unless required by applicable law or agreed to in writing, software 12 * distributed under the License is distributed on an "AS IS" BASIS, 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 * See the License for the specific language governing permissions and 15 * limitations under the License. 16 */ 17 #include <string.h> 18 19 #include <linux/bpf_perf_event.h> 20 #include <linux/oom.h> 21 22 #include <memevents/bpf_helpers.h> 23 #include <memevents/bpf_types.h> 24 #include <memevents/memevents_test.h> 25 26 DEFINE_BPF_RINGBUF(rb, struct mem_event_t, MEM_EVENTS_RINGBUF_SIZE, DEFAULT_BPF_MAP_UID, AID_SYSTEM, 27 0660) 28 29 DEFINE_BPF_PROG_KVER("tracepoint/oom/mark_victim", AID_ROOT, AID_SYSTEM, tp_ams, KVER_5_10) 30 (struct mark_victim_args* args) { 31 unsigned long long timestamp_ns = bpf_ktime_get_ns(); 32 struct mem_event_t* data = bpf_rb_reserve(); 33 if (data == NULL) return 1; 34 35 data->type = MEM_EVENT_OOM_KILL; 36 data->event_data.oom_kill.pid = args->pid; 37 data->event_data.oom_kill.oom_score_adj = args->oom_score_adj; 38 data->event_data.oom_kill.uid = args->uid; 39 data->event_data.oom_kill.timestamp_ms = timestamp_ns / 1000000; // Convert to milliseconds 40 data->event_data.oom_kill.total_vm_kb = args->total_vm; 41 data->event_data.oom_kill.anon_rss_kb = args->anon_rss; 42 data->event_data.oom_kill.file_rss_kb = args->file_rss; 43 data->event_data.oom_kill.shmem_rss_kb = args->shmem_rss; 44 data->event_data.oom_kill.pgtables_kb = args->pgtables; 45 46 read_str((char*)args, args->__data_loc_comm, data->event_data.oom_kill.process_name, 47 MEM_EVENT_PROC_NAME_LEN); 48 49 bpf_rb_submit(data); 50 51 return 0; 52 } 53 54 /* 55 * Following progs (`skfilter`) are for testing purposes in `memevents_test`. 56 * Note that these programs should never be attached to a socket, only 57 * executed manually with BPF_PROG_RUN, and the tracepoint bpf-progs do not 58 * currently implement this BPF_PROG_RUN operation. 59 */ 60 DEFINE_BPF_PROG_KVER("skfilter/oom_kill", AID_ROOT, AID_ROOT, tp_memevents_test_oom, KVER_5_10) 61 (void* __unused ctx) { 62 struct mem_event_t* data = bpf_rb_reserve(); 63 if (data == NULL) return 1; 64 65 data->type = mocked_oom_event.type; 66 data->event_data.oom_kill.pid = mocked_oom_event.event_data.oom_kill.pid; 67 data->event_data.oom_kill.uid = mocked_oom_event.event_data.oom_kill.uid; 68 data->event_data.oom_kill.oom_score_adj = mocked_oom_event.event_data.oom_kill.oom_score_adj; 69 data->event_data.oom_kill.timestamp_ms = mocked_oom_event.event_data.oom_kill.timestamp_ms; 70 data->event_data.oom_kill.total_vm_kb = mocked_oom_event.event_data.oom_kill.total_vm_kb; 71 data->event_data.oom_kill.anon_rss_kb = mocked_oom_event.event_data.oom_kill.anon_rss_kb; 72 data->event_data.oom_kill.file_rss_kb = mocked_oom_event.event_data.oom_kill.file_rss_kb; 73 data->event_data.oom_kill.shmem_rss_kb = mocked_oom_event.event_data.oom_kill.shmem_rss_kb; 74 data->event_data.oom_kill.pgtables_kb = mocked_oom_event.event_data.oom_kill.pgtables_kb; 75 76 strncpy(data->event_data.oom_kill.process_name, 77 mocked_oom_event.event_data.oom_kill.process_name, 13); 78 79 bpf_rb_submit(data); 80 81 return 0; 82 } 83 84 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_begin", AID_ROOT, AID_ROOT, 85 tp_memevents_test_dr_begin, KVER_5_10) 86 (void* __unused ctx) { 87 struct mem_event_t* data = bpf_rb_reserve(); 88 if (data == NULL) return 1; 89 90 data->type = MEM_EVENT_DIRECT_RECLAIM_BEGIN; 91 92 bpf_rb_submit(data); 93 94 return 0; 95 } 96 97 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_end", AID_ROOT, AID_ROOT, tp_memevents_test_dr_end, 98 KVER_5_10) 99 (void* __unused ctx) { 100 struct mem_event_t* data = bpf_rb_reserve(); 101 if (data == NULL) return 1; 102 103 data->type = MEM_EVENT_DIRECT_RECLAIM_END; 104 105 bpf_rb_submit(data); 106 107 return 0; 108 } 109 110 DEFINE_BPF_PROG_KVER("skfilter/kswapd_wake", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_wake, 111 KVER_5_10) 112 (void* __unused ctx) { 113 struct mem_event_t* data = bpf_rb_reserve(); 114 if (data == NULL) return 1; 115 116 data->type = MEM_EVENT_KSWAPD_WAKE; 117 data->event_data.kswapd_wake.node_id = mocked_kswapd_wake_event.event_data.kswapd_wake.node_id; 118 data->event_data.kswapd_wake.zone_id = mocked_kswapd_wake_event.event_data.kswapd_wake.zone_id; 119 data->event_data.kswapd_wake.alloc_order = 120 mocked_kswapd_wake_event.event_data.kswapd_wake.alloc_order; 121 122 bpf_rb_submit(data); 123 124 return 0; 125 } 126 127 DEFINE_BPF_PROG_KVER("skfilter/kswapd_sleep", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_sleep, 128 KVER_5_10) 129 (void* __unused ctx) { 130 struct mem_event_t* data = bpf_rb_reserve(); 131 if (data == NULL) return 1; 132 133 data->type = MEM_EVENT_KSWAPD_SLEEP; 134 data->event_data.kswapd_sleep.node_id = 135 mocked_kswapd_sleep_event.event_data.kswapd_sleep.node_id; 136 137 bpf_rb_submit(data); 138 139 return 0; 140 } 141 142 DEFINE_BPF_PROG_KVER("skfilter/android_trigger_vendor_lmk_kill", AID_ROOT, AID_SYSTEM, 143 tp_memevents_test_lmkd_vendor_lmk_kill, KVER_6_1) 144 (void* __unused ctx) { 145 struct mem_event_t* data; 146 uint32_t reason = mocked_vendor_lmk_kill_event.event_data.vendor_kill.reason; 147 short min_oom_score_adj = mocked_vendor_lmk_kill_event.event_data.vendor_kill.min_oom_score_adj; 148 149 if (min_oom_score_adj < OOM_SCORE_ADJ_MIN || min_oom_score_adj > OOM_SCORE_ADJ_MAX) 150 return 0; 151 152 if (reason < 0 || reason >= NUM_VENDOR_LMK_KILL_REASON) 153 return 0; 154 155 data = bpf_rb_reserve(); 156 if (data == NULL) return 1; 157 158 data->type = MEM_EVENT_VENDOR_LMK_KILL; 159 data->event_data.vendor_kill.reason = reason; 160 data->event_data.vendor_kill.min_oom_score_adj = min_oom_score_adj; 161 162 bpf_rb_submit(data); 163 164 return 0; 165 } 166 167 DEFINE_BPF_PROG_KVER("skfilter/calculate_totalreserve_pages", AID_ROOT, AID_ROOT, 168 tp_memevents_test_calculate_totalreserve_pages, KVER_6_1) 169 (void* __unused ctx) { 170 struct mem_event_t* data = bpf_rb_reserve(); 171 if (data == NULL) return 1; 172 173 data->type = MEM_EVENT_UPDATE_ZONEINFO; 174 data->event_data.reserve_pages.num_pages = 175 mocked_total_reserve_pages_event.event_data.reserve_pages.num_pages; 176 177 bpf_rb_submit(data); 178 179 return 0; 180 } 181 // bpf_probe_read_str is GPL only symbol 182 LICENSE("GPL"); 183