| /* |
| * Copyright (C) 2013 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #define LOG_TAG "lowmemorykiller" |
| |
| #include <arpa/inet.h> |
| #include <errno.h> |
| #include <inttypes.h> |
| #include <sched.h> |
| #include <signal.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/cdefs.h> |
| #include <sys/epoll.h> |
| #include <sys/eventfd.h> |
| #include <sys/mman.h> |
| #include <sys/socket.h> |
| #include <sys/types.h> |
| #include <time.h> |
| #include <unistd.h> |
| |
| #include <cutils/properties.h> |
| #include <cutils/sockets.h> |
| #include <log/log.h> |
| #include <processgroup/processgroup.h> |
| |
| #ifndef __unused |
| #define __unused __attribute__((__unused__)) |
| #endif |
| |
| #define MEMCG_SYSFS_PATH "/dev/memcg/" |
| #define MEMCG_MEMORY_USAGE "/dev/memcg/memory.usage_in_bytes" |
| #define MEMCG_MEMORYSW_USAGE "/dev/memcg/memory.memsw.usage_in_bytes" |
| #define MEMPRESSURE_WATCH_MEDIUM_LEVEL "medium" |
| #define MEMPRESSURE_WATCH_CRITICAL_LEVEL "critical" |
| #define ZONEINFO_PATH "/proc/zoneinfo" |
| #define LINE_MAX 128 |
| |
| #define INKERNEL_MINFREE_PATH "/sys/module/lowmemorykiller/parameters/minfree" |
| #define INKERNEL_ADJ_PATH "/sys/module/lowmemorykiller/parameters/adj" |
| |
| #define ARRAY_SIZE(x) (sizeof(x) / sizeof(*(x))) |
| #define EIGHT_MEGA (1 << 23) |
| |
| enum lmk_cmd { |
| LMK_TARGET, |
| LMK_PROCPRIO, |
| LMK_PROCREMOVE, |
| }; |
| |
| #define MAX_TARGETS 6 |
| /* |
| * longest is LMK_TARGET followed by MAX_TARGETS each minfree and minkillprio |
| * values |
| */ |
| #define CTRL_PACKET_MAX (sizeof(int) * (MAX_TARGETS * 2 + 1)) |
| |
| /* default to old in-kernel interface if no memory pressure events */ |
| static int use_inkernel_interface = 1; |
| static bool has_inkernel_module; |
| |
| /* memory pressure level medium event */ |
| static int mpevfd[2]; |
| #define CRITICAL_INDEX 1 |
| #define MEDIUM_INDEX 0 |
| |
| static int medium_oomadj; |
| static int critical_oomadj; |
| static bool debug_process_killing; |
| static bool enable_pressure_upgrade; |
| static int64_t upgrade_pressure; |
| static int64_t downgrade_pressure; |
| static bool is_go_device; |
| |
| /* control socket listen and data */ |
| static int ctrl_lfd; |
| static int ctrl_dfd = -1; |
| static int ctrl_dfd_reopened; /* did we reopen ctrl conn on this loop? */ |
| |
| /* 2 memory pressure levels, 1 ctrl listen socket, 1 ctrl data socket */ |
| #define MAX_EPOLL_EVENTS 4 |
| static int epollfd; |
| static int maxevents; |
| |
| /* OOM score values used by both kernel and framework */ |
| #define OOM_SCORE_ADJ_MIN (-1000) |
| #define OOM_SCORE_ADJ_MAX 1000 |
| |
| static int lowmem_adj[MAX_TARGETS]; |
| static int lowmem_minfree[MAX_TARGETS]; |
| static int lowmem_targets_size; |
| |
| struct sysmeminfo { |
| int nr_free_pages; |
| int nr_file_pages; |
| int nr_shmem; |
| int totalreserve_pages; |
| }; |
| |
| struct adjslot_list { |
| struct adjslot_list *next; |
| struct adjslot_list *prev; |
| }; |
| |
| struct proc { |
| struct adjslot_list asl; |
| int pid; |
| uid_t uid; |
| int oomadj; |
| struct proc *pidhash_next; |
| }; |
| |
| #define PIDHASH_SZ 1024 |
| static struct proc *pidhash[PIDHASH_SZ]; |
| #define pid_hashfn(x) ((((x) >> 8) ^ (x)) & (PIDHASH_SZ - 1)) |
| |
| #define ADJTOSLOT(adj) ((adj) + -OOM_SCORE_ADJ_MIN) |
| static struct adjslot_list procadjslot_list[ADJTOSLOT(OOM_SCORE_ADJ_MAX) + 1]; |
| |
| /* PAGE_SIZE / 1024 */ |
| static long page_k; |
| |
| static ssize_t read_all(int fd, char *buf, size_t max_len) |
| { |
| ssize_t ret = 0; |
| |
| while (max_len > 0) { |
| ssize_t r = read(fd, buf, max_len); |
| if (r == 0) { |
| break; |
| } |
| if (r == -1) { |
| return -1; |
| } |
| ret += r; |
| buf += r; |
| max_len -= r; |
| } |
| |
| return ret; |
| } |
| |
| static struct proc *pid_lookup(int pid) { |
| struct proc *procp; |
| |
| for (procp = pidhash[pid_hashfn(pid)]; procp && procp->pid != pid; |
| procp = procp->pidhash_next) |
| ; |
| |
| return procp; |
| } |
| |
| static void adjslot_insert(struct adjslot_list *head, struct adjslot_list *new) |
| { |
| struct adjslot_list *next = head->next; |
| new->prev = head; |
| new->next = next; |
| next->prev = new; |
| head->next = new; |
| } |
| |
| static void adjslot_remove(struct adjslot_list *old) |
| { |
| struct adjslot_list *prev = old->prev; |
| struct adjslot_list *next = old->next; |
| next->prev = prev; |
| prev->next = next; |
| } |
| |
| static struct adjslot_list *adjslot_tail(struct adjslot_list *head) { |
| struct adjslot_list *asl = head->prev; |
| |
| return asl == head ? NULL : asl; |
| } |
| |
| static void proc_slot(struct proc *procp) { |
| int adjslot = ADJTOSLOT(procp->oomadj); |
| |
| adjslot_insert(&procadjslot_list[adjslot], &procp->asl); |
| } |
| |
| static void proc_unslot(struct proc *procp) { |
| adjslot_remove(&procp->asl); |
| } |
| |
| static void proc_insert(struct proc *procp) { |
| int hval = pid_hashfn(procp->pid); |
| |
| procp->pidhash_next = pidhash[hval]; |
| pidhash[hval] = procp; |
| proc_slot(procp); |
| } |
| |
| static int pid_remove(int pid) { |
| int hval = pid_hashfn(pid); |
| struct proc *procp; |
| struct proc *prevp; |
| |
| for (procp = pidhash[hval], prevp = NULL; procp && procp->pid != pid; |
| procp = procp->pidhash_next) |
| prevp = procp; |
| |
| if (!procp) |
| return -1; |
| |
| if (!prevp) |
| pidhash[hval] = procp->pidhash_next; |
| else |
| prevp->pidhash_next = procp->pidhash_next; |
| |
| proc_unslot(procp); |
| free(procp); |
| return 0; |
| } |
| |
| static void writefilestring(char *path, char *s) { |
| int fd = open(path, O_WRONLY | O_CLOEXEC); |
| int len = strlen(s); |
| int ret; |
| |
| if (fd < 0) { |
| ALOGE("Error opening %s; errno=%d", path, errno); |
| return; |
| } |
| |
| ret = write(fd, s, len); |
| if (ret < 0) { |
| ALOGE("Error writing %s; errno=%d", path, errno); |
| } else if (ret < len) { |
| ALOGE("Short write on %s; length=%d", path, ret); |
| } |
| |
| close(fd); |
| } |
| |
| static void cmd_procprio(int pid, int uid, int oomadj) { |
| struct proc *procp; |
| char path[80]; |
| char val[20]; |
| int soft_limit_mult; |
| |
| if (oomadj < OOM_SCORE_ADJ_MIN || oomadj > OOM_SCORE_ADJ_MAX) { |
| ALOGE("Invalid PROCPRIO oomadj argument %d", oomadj); |
| return; |
| } |
| |
| snprintf(path, sizeof(path), "/proc/%d/oom_score_adj", pid); |
| snprintf(val, sizeof(val), "%d", oomadj); |
| writefilestring(path, val); |
| |
| if (use_inkernel_interface) |
| return; |
| |
| if (oomadj >= 900) { |
| soft_limit_mult = 0; |
| } else if (oomadj >= 800) { |
| soft_limit_mult = 0; |
| } else if (oomadj >= 700) { |
| soft_limit_mult = 0; |
| } else if (oomadj >= 600) { |
| // Launcher should be perceptible, don't kill it. |
| oomadj = 200; |
| soft_limit_mult = 1; |
| } else if (oomadj >= 500) { |
| soft_limit_mult = 0; |
| } else if (oomadj >= 400) { |
| soft_limit_mult = 0; |
| } else if (oomadj >= 300) { |
| soft_limit_mult = 1; |
| } else if (oomadj >= 200) { |
| soft_limit_mult = 2; |
| } else if (oomadj >= 100) { |
| soft_limit_mult = 10; |
| } else if (oomadj >= 0) { |
| soft_limit_mult = 20; |
| } else { |
| // Persistent processes will have a large |
| // soft limit 512MB. |
| soft_limit_mult = 64; |
| } |
| |
| snprintf(path, sizeof(path), "/dev/memcg/apps/uid_%d/pid_%d/memory.soft_limit_in_bytes", uid, pid); |
| snprintf(val, sizeof(val), "%d", soft_limit_mult * EIGHT_MEGA); |
| writefilestring(path, val); |
| |
| procp = pid_lookup(pid); |
| if (!procp) { |
| procp = malloc(sizeof(struct proc)); |
| if (!procp) { |
| // Oh, the irony. May need to rebuild our state. |
| return; |
| } |
| |
| procp->pid = pid; |
| procp->uid = uid; |
| procp->oomadj = oomadj; |
| proc_insert(procp); |
| } else { |
| proc_unslot(procp); |
| procp->oomadj = oomadj; |
| proc_slot(procp); |
| } |
| } |
| |
| static void cmd_procremove(int pid) { |
| if (use_inkernel_interface) |
| return; |
| |
| pid_remove(pid); |
| } |
| |
| static void cmd_target(int ntargets, int *params) { |
| int i; |
| |
| if (ntargets > (int)ARRAY_SIZE(lowmem_adj)) |
| return; |
| |
| for (i = 0; i < ntargets; i++) { |
| lowmem_minfree[i] = ntohl(*params++); |
| lowmem_adj[i] = ntohl(*params++); |
| } |
| |
| lowmem_targets_size = ntargets; |
| |
| if (has_inkernel_module) { |
| char minfreestr[128]; |
| char killpriostr[128]; |
| |
| minfreestr[0] = '\0'; |
| killpriostr[0] = '\0'; |
| |
| for (i = 0; i < lowmem_targets_size; i++) { |
| char val[40]; |
| |
| if (i) { |
| strlcat(minfreestr, ",", sizeof(minfreestr)); |
| strlcat(killpriostr, ",", sizeof(killpriostr)); |
| } |
| |
| snprintf(val, sizeof(val), "%d", use_inkernel_interface ? lowmem_minfree[i] : 0); |
| strlcat(minfreestr, val, sizeof(minfreestr)); |
| snprintf(val, sizeof(val), "%d", use_inkernel_interface ? lowmem_adj[i] : 0); |
| strlcat(killpriostr, val, sizeof(killpriostr)); |
| } |
| |
| writefilestring(INKERNEL_MINFREE_PATH, minfreestr); |
| writefilestring(INKERNEL_ADJ_PATH, killpriostr); |
| } |
| } |
| |
| static void ctrl_data_close(void) { |
| ALOGI("Closing Activity Manager data connection"); |
| close(ctrl_dfd); |
| ctrl_dfd = -1; |
| maxevents--; |
| } |
| |
| static int ctrl_data_read(char *buf, size_t bufsz) { |
| int ret = 0; |
| |
| ret = read(ctrl_dfd, buf, bufsz); |
| |
| if (ret == -1) { |
| ALOGE("control data socket read failed; errno=%d", errno); |
| } else if (ret == 0) { |
| ALOGE("Got EOF on control data socket"); |
| ret = -1; |
| } |
| |
| return ret; |
| } |
| |
| static void ctrl_command_handler(void) { |
| int ibuf[CTRL_PACKET_MAX / sizeof(int)]; |
| int len; |
| int cmd = -1; |
| int nargs; |
| int targets; |
| |
| len = ctrl_data_read((char *)ibuf, CTRL_PACKET_MAX); |
| if (len <= 0) |
| return; |
| |
| nargs = len / sizeof(int) - 1; |
| if (nargs < 0) |
| goto wronglen; |
| |
| cmd = ntohl(ibuf[0]); |
| |
| switch(cmd) { |
| case LMK_TARGET: |
| targets = nargs / 2; |
| if (nargs & 0x1 || targets > (int)ARRAY_SIZE(lowmem_adj)) |
| goto wronglen; |
| cmd_target(targets, &ibuf[1]); |
| break; |
| case LMK_PROCPRIO: |
| if (nargs != 3) |
| goto wronglen; |
| cmd_procprio(ntohl(ibuf[1]), ntohl(ibuf[2]), ntohl(ibuf[3])); |
| break; |
| case LMK_PROCREMOVE: |
| if (nargs != 1) |
| goto wronglen; |
| cmd_procremove(ntohl(ibuf[1])); |
| break; |
| default: |
| ALOGE("Received unknown command code %d", cmd); |
| return; |
| } |
| |
| return; |
| |
| wronglen: |
| ALOGE("Wrong control socket read length cmd=%d len=%d", cmd, len); |
| } |
| |
| static void ctrl_data_handler(uint32_t events) { |
| if (events & EPOLLHUP) { |
| ALOGI("ActivityManager disconnected"); |
| if (!ctrl_dfd_reopened) |
| ctrl_data_close(); |
| } else if (events & EPOLLIN) { |
| ctrl_command_handler(); |
| } |
| } |
| |
| static void ctrl_connect_handler(uint32_t events __unused) { |
| struct epoll_event epev; |
| |
| if (ctrl_dfd >= 0) { |
| ctrl_data_close(); |
| ctrl_dfd_reopened = 1; |
| } |
| |
| ctrl_dfd = accept(ctrl_lfd, NULL, NULL); |
| |
| if (ctrl_dfd < 0) { |
| ALOGE("lmkd control socket accept failed; errno=%d", errno); |
| return; |
| } |
| |
| ALOGI("ActivityManager connected"); |
| maxevents++; |
| epev.events = EPOLLIN; |
| epev.data.ptr = (void *)ctrl_data_handler; |
| if (epoll_ctl(epollfd, EPOLL_CTL_ADD, ctrl_dfd, &epev) == -1) { |
| ALOGE("epoll_ctl for data connection socket failed; errno=%d", errno); |
| ctrl_data_close(); |
| return; |
| } |
| } |
| |
| static int zoneinfo_parse_protection(char *cp) { |
| int max = 0; |
| int zoneval; |
| char *save_ptr; |
| |
| for (cp = strtok_r(cp, "(), ", &save_ptr); cp; cp = strtok_r(NULL, "), ", &save_ptr)) { |
| zoneval = strtol(cp, &cp, 0); |
| if (zoneval > max) |
| max = zoneval; |
| } |
| |
| return max; |
| } |
| |
| static void zoneinfo_parse_line(char *line, struct sysmeminfo *mip) { |
| char *cp = line; |
| char *ap; |
| char *save_ptr; |
| |
| cp = strtok_r(line, " ", &save_ptr); |
| if (!cp) |
| return; |
| |
| ap = strtok_r(NULL, " ", &save_ptr); |
| if (!ap) |
| return; |
| |
| if (!strcmp(cp, "nr_free_pages")) |
| mip->nr_free_pages += strtol(ap, NULL, 0); |
| else if (!strcmp(cp, "nr_file_pages")) |
| mip->nr_file_pages += strtol(ap, NULL, 0); |
| else if (!strcmp(cp, "nr_shmem")) |
| mip->nr_shmem += strtol(ap, NULL, 0); |
| else if (!strcmp(cp, "high")) |
| mip->totalreserve_pages += strtol(ap, NULL, 0); |
| else if (!strcmp(cp, "protection:")) |
| mip->totalreserve_pages += zoneinfo_parse_protection(ap); |
| } |
| |
| static int zoneinfo_parse(struct sysmeminfo *mip) { |
| int fd; |
| ssize_t size; |
| char buf[PAGE_SIZE]; |
| char *save_ptr; |
| char *line; |
| |
| memset(mip, 0, sizeof(struct sysmeminfo)); |
| |
| fd = open(ZONEINFO_PATH, O_RDONLY | O_CLOEXEC); |
| if (fd == -1) { |
| ALOGE("%s open: errno=%d", ZONEINFO_PATH, errno); |
| return -1; |
| } |
| |
| size = read_all(fd, buf, sizeof(buf) - 1); |
| if (size < 0) { |
| ALOGE("%s read: errno=%d", ZONEINFO_PATH, errno); |
| close(fd); |
| return -1; |
| } |
| ALOG_ASSERT((size_t)size < sizeof(buf) - 1, "/proc/zoneinfo too large"); |
| buf[size] = 0; |
| |
| for (line = strtok_r(buf, "\n", &save_ptr); line; line = strtok_r(NULL, "\n", &save_ptr)) |
| zoneinfo_parse_line(line, mip); |
| |
| close(fd); |
| return 0; |
| } |
| |
| static int proc_get_size(int pid) { |
| char path[PATH_MAX]; |
| char line[LINE_MAX]; |
| int fd; |
| int rss = 0; |
| int total; |
| ssize_t ret; |
| |
| snprintf(path, PATH_MAX, "/proc/%d/statm", pid); |
| fd = open(path, O_RDONLY | O_CLOEXEC); |
| if (fd == -1) |
| return -1; |
| |
| ret = read_all(fd, line, sizeof(line) - 1); |
| if (ret < 0) { |
| close(fd); |
| return -1; |
| } |
| |
| sscanf(line, "%d %d ", &total, &rss); |
| close(fd); |
| return rss; |
| } |
| |
| static char *proc_get_name(int pid) { |
| char path[PATH_MAX]; |
| static char line[LINE_MAX]; |
| int fd; |
| char *cp; |
| ssize_t ret; |
| |
| snprintf(path, PATH_MAX, "/proc/%d/cmdline", pid); |
| fd = open(path, O_RDONLY | O_CLOEXEC); |
| if (fd == -1) |
| return NULL; |
| ret = read_all(fd, line, sizeof(line) - 1); |
| close(fd); |
| if (ret < 0) { |
| return NULL; |
| } |
| |
| cp = strchr(line, ' '); |
| if (cp) |
| *cp = '\0'; |
| |
| return line; |
| } |
| |
| static struct proc *proc_adj_lru(int oomadj) { |
| return (struct proc *)adjslot_tail(&procadjslot_list[ADJTOSLOT(oomadj)]); |
| } |
| |
| /* Kill one process specified by procp. Returns the size of the process killed */ |
| static int kill_one_process(struct proc* procp, int min_score_adj, bool is_critical) { |
| int pid = procp->pid; |
| uid_t uid = procp->uid; |
| char *taskname; |
| int tasksize; |
| int r; |
| |
| taskname = proc_get_name(pid); |
| if (!taskname) { |
| pid_remove(pid); |
| return -1; |
| } |
| |
| tasksize = proc_get_size(pid); |
| if (tasksize <= 0) { |
| pid_remove(pid); |
| return -1; |
| } |
| |
| ALOGI( |
| "Killing '%s' (%d), uid %d, adj %d\n" |
| " to free %ldkB because system is under %s memory pressure oom_adj %d\n", |
| taskname, pid, uid, procp->oomadj, tasksize * page_k, is_critical ? "critical" : "medium", |
| min_score_adj); |
| r = kill(pid, SIGKILL); |
| pid_remove(pid); |
| |
| if (r) { |
| ALOGE("kill(%d): errno=%d", procp->pid, errno); |
| return -1; |
| } else { |
| return tasksize; |
| } |
| } |
| |
| /* |
| * Find a process to kill based on the current (possibly estimated) free memory |
| * and cached memory sizes. Returns the size of the killed processes. |
| */ |
| static int find_and_kill_process(bool is_critical) { |
| int i; |
| int killed_size = 0; |
| int min_score_adj = is_critical ? critical_oomadj : medium_oomadj; |
| |
| for (i = OOM_SCORE_ADJ_MAX; i >= min_score_adj; i--) { |
| struct proc *procp; |
| |
| retry: |
| procp = proc_adj_lru(i); |
| |
| if (procp) { |
| killed_size = kill_one_process(procp, min_score_adj, is_critical); |
| if (killed_size < 0) { |
| goto retry; |
| } else { |
| return killed_size; |
| } |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int64_t get_memory_usage(const char* path) { |
| int ret; |
| int64_t mem_usage; |
| char buf[32]; |
| int fd = open(path, O_RDONLY | O_CLOEXEC); |
| if (fd == -1) { |
| ALOGE("%s open: errno=%d", path, errno); |
| return -1; |
| } |
| |
| ret = read_all(fd, buf, sizeof(buf) - 1); |
| close(fd); |
| if (ret < 0) { |
| ALOGE("%s error: errno=%d", path, errno); |
| return -1; |
| } |
| sscanf(buf, "%" SCNd64, &mem_usage); |
| if (mem_usage == 0) { |
| ALOGE("No memory!"); |
| return -1; |
| } |
| return mem_usage; |
| } |
| |
| static void mp_event_common(bool is_critical) { |
| int ret; |
| unsigned long long evcount; |
| int index = is_critical ? CRITICAL_INDEX : MEDIUM_INDEX; |
| int64_t mem_usage, memsw_usage; |
| int64_t mem_pressure; |
| |
| ret = read(mpevfd[index], &evcount, sizeof(evcount)); |
| if (ret < 0) |
| ALOGE("Error reading memory pressure event fd; errno=%d", |
| errno); |
| |
| mem_usage = get_memory_usage(MEMCG_MEMORY_USAGE); |
| memsw_usage = get_memory_usage(MEMCG_MEMORYSW_USAGE); |
| if (memsw_usage < 0 || mem_usage < 0) { |
| find_and_kill_process(is_critical); |
| return; |
| } |
| |
| // Calculate percent for swappinness. |
| mem_pressure = (mem_usage * 100) / memsw_usage; |
| |
| if (enable_pressure_upgrade && !is_critical) { |
| // We are swapping too much. |
| if (mem_pressure < upgrade_pressure) { |
| ALOGI("Event upgraded to critical."); |
| is_critical = true; |
| } |
| } |
| |
| // If the pressure is larger than downgrade_pressure lmk will not |
| // kill any process, since enough memory is available. |
| if (mem_pressure > downgrade_pressure) { |
| if (debug_process_killing) { |
| ALOGI("Ignore %s memory pressure", is_critical ? "critical" : "medium"); |
| } |
| return; |
| } else if (is_critical && mem_pressure > upgrade_pressure) { |
| if (debug_process_killing) { |
| ALOGI("Downgrade critical memory pressure"); |
| } |
| // Downgrade event to medium, since enough memory available. |
| is_critical = false; |
| } |
| |
| if (find_and_kill_process(is_critical) == 0) { |
| if (debug_process_killing) { |
| ALOGI("Nothing to kill"); |
| } |
| } |
| } |
| |
| static void mp_event(uint32_t events __unused) { |
| mp_event_common(false); |
| } |
| |
| static void mp_event_critical(uint32_t events __unused) { |
| mp_event_common(true); |
| } |
| |
| static int init_mp_common(char *levelstr, void *event_handler, bool is_critical) |
| { |
| int mpfd; |
| int evfd; |
| int evctlfd; |
| char buf[256]; |
| struct epoll_event epev; |
| int ret; |
| int mpevfd_index = is_critical ? CRITICAL_INDEX : MEDIUM_INDEX; |
| |
| mpfd = open(MEMCG_SYSFS_PATH "memory.pressure_level", O_RDONLY | O_CLOEXEC); |
| if (mpfd < 0) { |
| ALOGI("No kernel memory.pressure_level support (errno=%d)", errno); |
| goto err_open_mpfd; |
| } |
| |
| evctlfd = open(MEMCG_SYSFS_PATH "cgroup.event_control", O_WRONLY | O_CLOEXEC); |
| if (evctlfd < 0) { |
| ALOGI("No kernel memory cgroup event control (errno=%d)", errno); |
| goto err_open_evctlfd; |
| } |
| |
| evfd = eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC); |
| if (evfd < 0) { |
| ALOGE("eventfd failed for level %s; errno=%d", levelstr, errno); |
| goto err_eventfd; |
| } |
| |
| ret = snprintf(buf, sizeof(buf), "%d %d %s", evfd, mpfd, levelstr); |
| if (ret >= (ssize_t)sizeof(buf)) { |
| ALOGE("cgroup.event_control line overflow for level %s", levelstr); |
| goto err; |
| } |
| |
| ret = write(evctlfd, buf, strlen(buf) + 1); |
| if (ret == -1) { |
| ALOGE("cgroup.event_control write failed for level %s; errno=%d", |
| levelstr, errno); |
| goto err; |
| } |
| |
| epev.events = EPOLLIN; |
| epev.data.ptr = event_handler; |
| ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, evfd, &epev); |
| if (ret == -1) { |
| ALOGE("epoll_ctl for level %s failed; errno=%d", levelstr, errno); |
| goto err; |
| } |
| maxevents++; |
| mpevfd[mpevfd_index] = evfd; |
| return 0; |
| |
| err: |
| close(evfd); |
| err_eventfd: |
| close(evctlfd); |
| err_open_evctlfd: |
| close(mpfd); |
| err_open_mpfd: |
| return -1; |
| } |
| |
| static int init_mp_medium() |
| { |
| return init_mp_common(MEMPRESSURE_WATCH_MEDIUM_LEVEL, (void *)&mp_event, false); |
| } |
| |
| static int init_mp_critical() |
| { |
| return init_mp_common(MEMPRESSURE_WATCH_CRITICAL_LEVEL, (void *)&mp_event_critical, true); |
| } |
| |
| static int init(void) { |
| struct epoll_event epev; |
| int i; |
| int ret; |
| |
| page_k = sysconf(_SC_PAGESIZE); |
| if (page_k == -1) |
| page_k = PAGE_SIZE; |
| page_k /= 1024; |
| |
| epollfd = epoll_create(MAX_EPOLL_EVENTS); |
| if (epollfd == -1) { |
| ALOGE("epoll_create failed (errno=%d)", errno); |
| return -1; |
| } |
| |
| ctrl_lfd = android_get_control_socket("lmkd"); |
| if (ctrl_lfd < 0) { |
| ALOGE("get lmkd control socket failed"); |
| return -1; |
| } |
| |
| ret = listen(ctrl_lfd, 1); |
| if (ret < 0) { |
| ALOGE("lmkd control socket listen failed (errno=%d)", errno); |
| return -1; |
| } |
| |
| epev.events = EPOLLIN; |
| epev.data.ptr = (void *)ctrl_connect_handler; |
| if (epoll_ctl(epollfd, EPOLL_CTL_ADD, ctrl_lfd, &epev) == -1) { |
| ALOGE("epoll_ctl for lmkd control socket failed (errno=%d)", errno); |
| return -1; |
| } |
| maxevents++; |
| |
| has_inkernel_module = !access(INKERNEL_MINFREE_PATH, W_OK); |
| use_inkernel_interface = has_inkernel_module && !is_go_device; |
| |
| if (use_inkernel_interface) { |
| ALOGI("Using in-kernel low memory killer interface"); |
| } else { |
| ret = init_mp_medium(); |
| ret |= init_mp_critical(); |
| if (ret) |
| ALOGE("Kernel does not support memory pressure events or in-kernel low memory killer"); |
| } |
| |
| for (i = 0; i <= ADJTOSLOT(OOM_SCORE_ADJ_MAX); i++) { |
| procadjslot_list[i].next = &procadjslot_list[i]; |
| procadjslot_list[i].prev = &procadjslot_list[i]; |
| } |
| |
| return 0; |
| } |
| |
| static void mainloop(void) { |
| while (1) { |
| struct epoll_event events[maxevents]; |
| int nevents; |
| int i; |
| |
| ctrl_dfd_reopened = 0; |
| nevents = epoll_wait(epollfd, events, maxevents, -1); |
| |
| if (nevents == -1) { |
| if (errno == EINTR) |
| continue; |
| ALOGE("epoll_wait failed (errno=%d)", errno); |
| continue; |
| } |
| |
| for (i = 0; i < nevents; ++i) { |
| if (events[i].events & EPOLLERR) |
| ALOGD("EPOLLERR on event #%d", i); |
| if (events[i].data.ptr) |
| (*(void (*)(uint32_t))events[i].data.ptr)(events[i].events); |
| } |
| } |
| } |
| |
| int main(int argc __unused, char **argv __unused) { |
| struct sched_param param = { |
| .sched_priority = 1, |
| }; |
| |
| medium_oomadj = property_get_int32("ro.lmk.medium", 800); |
| critical_oomadj = property_get_int32("ro.lmk.critical", 0); |
| debug_process_killing = property_get_bool("ro.lmk.debug", false); |
| enable_pressure_upgrade = property_get_bool("ro.lmk.critical_upgrade", false); |
| upgrade_pressure = (int64_t)property_get_int32("ro.lmk.upgrade_pressure", 50); |
| downgrade_pressure = (int64_t)property_get_int32("ro.lmk.downgrade_pressure", 60); |
| is_go_device = property_get_bool("ro.config.low_ram", false); |
| |
| if (mlockall(MCL_CURRENT | MCL_FUTURE)) |
| ALOGW("mlockall failed: errno=%d", errno); |
| |
| sched_setscheduler(0, SCHED_FIFO, ¶m); |
| if (!init()) |
| mainloop(); |
| |
| ALOGI("exiting"); |
| return 0; |
| } |