• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * MM Events - eBPF programs
3  *
4  * Copyright 2024 The Android Open Source Project
5  *
6  * Licensed under the Apache License, Version 2.0 (the "License");
7  * you may not use this file except in compliance with the License
8  * You may obtain a copy of the License at
9  *      http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17 #include <string.h>
18 
19 #include <linux/bpf_perf_event.h>
20 #include <linux/oom.h>
21 
22 #include <memevents/bpf_helpers.h>
23 #include <memevents/bpf_types.h>
24 #include <memevents/memevents_test.h>
25 
26 DEFINE_BPF_RINGBUF(rb, struct mem_event_t, MEM_EVENTS_RINGBUF_SIZE, DEFAULT_BPF_MAP_UID, AID_SYSTEM,
27                    0660)
28 
29 DEFINE_BPF_PROG_KVER("tracepoint/oom/mark_victim", AID_ROOT, AID_SYSTEM, tp_ams, KVER_5_10)
30 (struct mark_victim_args* args) {
31     unsigned long long timestamp_ns = bpf_ktime_get_ns();
32     struct mem_event_t* data = bpf_rb_reserve();
33     if (data == NULL) return 1;
34 
35     data->type = MEM_EVENT_OOM_KILL;
36     data->event_data.oom_kill.pid = args->pid;
37     data->event_data.oom_kill.oom_score_adj = args->oom_score_adj;
38     data->event_data.oom_kill.uid = args->uid;
39     data->event_data.oom_kill.timestamp_ms = timestamp_ns / 1000000;  // Convert to milliseconds
40     data->event_data.oom_kill.total_vm_kb = args->total_vm;
41     data->event_data.oom_kill.anon_rss_kb = args->anon_rss;
42     data->event_data.oom_kill.file_rss_kb = args->file_rss;
43     data->event_data.oom_kill.shmem_rss_kb = args->shmem_rss;
44     data->event_data.oom_kill.pgtables_kb = args->pgtables;
45 
46     read_str((char*)args, args->__data_loc_comm, data->event_data.oom_kill.process_name,
47              MEM_EVENT_PROC_NAME_LEN);
48 
49     bpf_rb_submit(data);
50 
51     return 0;
52 }
53 
54 /*
55  * Following progs (`skfilter`) are for testing purposes in `memevents_test`.
56  * Note that these programs should never be attached to a socket, only
57  * executed manually with BPF_PROG_RUN, and the tracepoint bpf-progs do not
58  * currently implement this BPF_PROG_RUN operation.
59  */
60 DEFINE_BPF_PROG_KVER("skfilter/oom_kill", AID_ROOT, AID_ROOT, tp_memevents_test_oom, KVER_5_10)
61 (void* __unused ctx) {
62     struct mem_event_t* data = bpf_rb_reserve();
63     if (data == NULL) return 1;
64 
65     data->type = mocked_oom_event.type;
66     data->event_data.oom_kill.pid = mocked_oom_event.event_data.oom_kill.pid;
67     data->event_data.oom_kill.uid = mocked_oom_event.event_data.oom_kill.uid;
68     data->event_data.oom_kill.oom_score_adj = mocked_oom_event.event_data.oom_kill.oom_score_adj;
69     data->event_data.oom_kill.timestamp_ms = mocked_oom_event.event_data.oom_kill.timestamp_ms;
70     data->event_data.oom_kill.total_vm_kb = mocked_oom_event.event_data.oom_kill.total_vm_kb;
71     data->event_data.oom_kill.anon_rss_kb = mocked_oom_event.event_data.oom_kill.anon_rss_kb;
72     data->event_data.oom_kill.file_rss_kb = mocked_oom_event.event_data.oom_kill.file_rss_kb;
73     data->event_data.oom_kill.shmem_rss_kb = mocked_oom_event.event_data.oom_kill.shmem_rss_kb;
74     data->event_data.oom_kill.pgtables_kb = mocked_oom_event.event_data.oom_kill.pgtables_kb;
75 
76     strncpy(data->event_data.oom_kill.process_name,
77             mocked_oom_event.event_data.oom_kill.process_name, 13);
78 
79     bpf_rb_submit(data);
80 
81     return 0;
82 }
83 
84 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_begin", AID_ROOT, AID_ROOT,
85                      tp_memevents_test_dr_begin, KVER_5_10)
86 (void* __unused ctx) {
87     struct mem_event_t* data = bpf_rb_reserve();
88     if (data == NULL) return 1;
89 
90     data->type = MEM_EVENT_DIRECT_RECLAIM_BEGIN;
91 
92     bpf_rb_submit(data);
93 
94     return 0;
95 }
96 
97 DEFINE_BPF_PROG_KVER("skfilter/direct_reclaim_end", AID_ROOT, AID_ROOT, tp_memevents_test_dr_end,
98                      KVER_5_10)
99 (void* __unused ctx) {
100     struct mem_event_t* data = bpf_rb_reserve();
101     if (data == NULL) return 1;
102 
103     data->type = MEM_EVENT_DIRECT_RECLAIM_END;
104 
105     bpf_rb_submit(data);
106 
107     return 0;
108 }
109 
110 DEFINE_BPF_PROG_KVER("skfilter/kswapd_wake", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_wake,
111                      KVER_5_10)
112 (void* __unused ctx) {
113     struct mem_event_t* data = bpf_rb_reserve();
114     if (data == NULL) return 1;
115 
116     data->type = MEM_EVENT_KSWAPD_WAKE;
117     data->event_data.kswapd_wake.node_id = mocked_kswapd_wake_event.event_data.kswapd_wake.node_id;
118     data->event_data.kswapd_wake.zone_id = mocked_kswapd_wake_event.event_data.kswapd_wake.zone_id;
119     data->event_data.kswapd_wake.alloc_order =
120             mocked_kswapd_wake_event.event_data.kswapd_wake.alloc_order;
121 
122     bpf_rb_submit(data);
123 
124     return 0;
125 }
126 
127 DEFINE_BPF_PROG_KVER("skfilter/kswapd_sleep", AID_ROOT, AID_ROOT, tp_memevents_test_kswapd_sleep,
128                      KVER_5_10)
129 (void* __unused ctx) {
130     struct mem_event_t* data = bpf_rb_reserve();
131     if (data == NULL) return 1;
132 
133     data->type = MEM_EVENT_KSWAPD_SLEEP;
134     data->event_data.kswapd_sleep.node_id =
135             mocked_kswapd_sleep_event.event_data.kswapd_sleep.node_id;
136 
137     bpf_rb_submit(data);
138 
139     return 0;
140 }
141 
142 DEFINE_BPF_PROG_KVER("skfilter/android_trigger_vendor_lmk_kill", AID_ROOT, AID_SYSTEM,
143                      tp_memevents_test_lmkd_vendor_lmk_kill, KVER_6_1)
144 (void* __unused ctx) {
145     struct mem_event_t* data;
146     uint32_t reason = mocked_vendor_lmk_kill_event.event_data.vendor_kill.reason;
147     short min_oom_score_adj = mocked_vendor_lmk_kill_event.event_data.vendor_kill.min_oom_score_adj;
148 
149     if (min_oom_score_adj < OOM_SCORE_ADJ_MIN || min_oom_score_adj > OOM_SCORE_ADJ_MAX)
150         return 0;
151 
152     if (reason < 0 || reason >= NUM_VENDOR_LMK_KILL_REASON)
153         return 0;
154 
155     data = bpf_rb_reserve();
156     if (data == NULL) return 1;
157 
158     data->type = MEM_EVENT_VENDOR_LMK_KILL;
159     data->event_data.vendor_kill.reason = reason;
160     data->event_data.vendor_kill.min_oom_score_adj = min_oom_score_adj;
161 
162     bpf_rb_submit(data);
163 
164     return 0;
165 }
166 
167 DEFINE_BPF_PROG_KVER("skfilter/calculate_totalreserve_pages", AID_ROOT, AID_ROOT,
168                      tp_memevents_test_calculate_totalreserve_pages, KVER_6_1)
169 (void* __unused ctx) {
170     struct mem_event_t* data = bpf_rb_reserve();
171     if (data == NULL) return 1;
172 
173     data->type = MEM_EVENT_UPDATE_ZONEINFO;
174     data->event_data.reserve_pages.num_pages =
175             mocked_total_reserve_pages_event.event_data.reserve_pages.num_pages;
176 
177     bpf_rb_submit(data);
178 
179     return 0;
180 }
181 // bpf_probe_read_str is GPL only symbol
182 LICENSE("GPL");
183