blob: e404e448375e6df7a19b13e9dd654eea8228a291 [file] [log] [blame]
Todd Poynor3948f802013-07-09 19:35:14 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "lowmemorykiller"
18
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070019#include <arpa/inet.h>
Todd Poynor3948f802013-07-09 19:35:14 -070020#include <errno.h>
21#include <signal.h>
Todd Poynor3948f802013-07-09 19:35:14 -070022#include <stdlib.h>
23#include <string.h>
24#include <time.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070025#include <sys/cdefs.h>
Todd Poynor3948f802013-07-09 19:35:14 -070026#include <sys/epoll.h>
27#include <sys/eventfd.h>
Colin Crossb28ff912014-07-11 17:15:44 -070028#include <sys/mman.h>
Todd Poynor3948f802013-07-09 19:35:14 -070029#include <sys/socket.h>
30#include <sys/types.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070031#include <unistd.h>
32
Todd Poynor3948f802013-07-09 19:35:14 -070033#include <cutils/sockets.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070034#include <log/log.h>
Colin Crossfef95222014-06-11 14:53:41 -070035#include <processgroup/processgroup.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070036
37#ifndef __unused
38#define __unused __attribute__((__unused__))
39#endif
Todd Poynor3948f802013-07-09 19:35:14 -070040
41#define MEMCG_SYSFS_PATH "/dev/memcg/"
Martijn Coenen9010a232016-02-09 11:25:18 +010042#define MEMPRESSURE_WATCH_LEVEL "low"
Todd Poynor3948f802013-07-09 19:35:14 -070043#define ZONEINFO_PATH "/proc/zoneinfo"
44#define LINE_MAX 128
45
46#define INKERNEL_MINFREE_PATH "/sys/module/lowmemorykiller/parameters/minfree"
47#define INKERNEL_ADJ_PATH "/sys/module/lowmemorykiller/parameters/adj"
48
49#define ARRAY_SIZE(x) (sizeof(x) / sizeof(*(x)))
50
51enum lmk_cmd {
52 LMK_TARGET,
53 LMK_PROCPRIO,
54 LMK_PROCREMOVE,
55};
56
57#define MAX_TARGETS 6
58/*
59 * longest is LMK_TARGET followed by MAX_TARGETS each minfree and minkillprio
60 * values
61 */
62#define CTRL_PACKET_MAX (sizeof(int) * (MAX_TARGETS * 2 + 1))
63
64/* default to old in-kernel interface if no memory pressure events */
65static int use_inkernel_interface = 1;
66
67/* memory pressure level medium event */
68static int mpevfd;
69
70/* control socket listen and data */
71static int ctrl_lfd;
72static int ctrl_dfd = -1;
73static int ctrl_dfd_reopened; /* did we reopen ctrl conn on this loop? */
74
75/* 1 memory pressure level, 1 ctrl listen socket, 1 ctrl data socket */
76#define MAX_EPOLL_EVENTS 3
77static int epollfd;
78static int maxevents;
79
Chong Zhang0a4acdf2015-10-14 16:19:53 -070080/* OOM score values used by both kernel and framework */
Todd Poynor16b60992013-09-16 19:26:47 -070081#define OOM_SCORE_ADJ_MIN (-1000)
82#define OOM_SCORE_ADJ_MAX 1000
83
Todd Poynor3948f802013-07-09 19:35:14 -070084static int lowmem_adj[MAX_TARGETS];
85static int lowmem_minfree[MAX_TARGETS];
86static int lowmem_targets_size;
87
88struct sysmeminfo {
89 int nr_free_pages;
90 int nr_file_pages;
91 int nr_shmem;
92 int totalreserve_pages;
93};
94
95struct adjslot_list {
96 struct adjslot_list *next;
97 struct adjslot_list *prev;
98};
99
100struct proc {
101 struct adjslot_list asl;
102 int pid;
Colin Crossfbb78c62014-06-13 14:52:43 -0700103 uid_t uid;
Todd Poynor3948f802013-07-09 19:35:14 -0700104 int oomadj;
105 struct proc *pidhash_next;
106};
107
108#define PIDHASH_SZ 1024
109static struct proc *pidhash[PIDHASH_SZ];
110#define pid_hashfn(x) ((((x) >> 8) ^ (x)) & (PIDHASH_SZ - 1))
111
Chih-Hung Hsiehdaa13ea2016-05-19 16:02:22 -0700112#define ADJTOSLOT(adj) ((adj) + -OOM_SCORE_ADJ_MIN)
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700113static struct adjslot_list procadjslot_list[ADJTOSLOT(OOM_SCORE_ADJ_MAX) + 1];
Todd Poynor3948f802013-07-09 19:35:14 -0700114
115/*
116 * Wait 1-2 seconds for the death report of a killed process prior to
117 * considering killing more processes.
118 */
119#define KILL_TIMEOUT 2
120/* Time of last process kill we initiated, stop me before I kill again */
121static time_t kill_lasttime;
122
123/* PAGE_SIZE / 1024 */
124static long page_k;
125
Colin Crossce85d952014-07-11 17:53:27 -0700126static ssize_t read_all(int fd, char *buf, size_t max_len)
127{
128 ssize_t ret = 0;
129
130 while (max_len > 0) {
131 ssize_t r = read(fd, buf, max_len);
132 if (r == 0) {
133 break;
134 }
135 if (r == -1) {
136 return -1;
137 }
138 ret += r;
139 buf += r;
140 max_len -= r;
141 }
142
143 return ret;
144}
145
Todd Poynor3948f802013-07-09 19:35:14 -0700146static struct proc *pid_lookup(int pid) {
147 struct proc *procp;
148
149 for (procp = pidhash[pid_hashfn(pid)]; procp && procp->pid != pid;
150 procp = procp->pidhash_next)
151 ;
152
153 return procp;
154}
155
156static void adjslot_insert(struct adjslot_list *head, struct adjslot_list *new)
157{
158 struct adjslot_list *next = head->next;
159 new->prev = head;
160 new->next = next;
161 next->prev = new;
162 head->next = new;
163}
164
165static void adjslot_remove(struct adjslot_list *old)
166{
167 struct adjslot_list *prev = old->prev;
168 struct adjslot_list *next = old->next;
169 next->prev = prev;
170 prev->next = next;
171}
172
173static struct adjslot_list *adjslot_tail(struct adjslot_list *head) {
174 struct adjslot_list *asl = head->prev;
175
176 return asl == head ? NULL : asl;
177}
178
179static void proc_slot(struct proc *procp) {
180 int adjslot = ADJTOSLOT(procp->oomadj);
181
182 adjslot_insert(&procadjslot_list[adjslot], &procp->asl);
183}
184
185static void proc_unslot(struct proc *procp) {
186 adjslot_remove(&procp->asl);
187}
188
189static void proc_insert(struct proc *procp) {
190 int hval = pid_hashfn(procp->pid);
191
192 procp->pidhash_next = pidhash[hval];
193 pidhash[hval] = procp;
194 proc_slot(procp);
195}
196
197static int pid_remove(int pid) {
198 int hval = pid_hashfn(pid);
199 struct proc *procp;
200 struct proc *prevp;
201
202 for (procp = pidhash[hval], prevp = NULL; procp && procp->pid != pid;
203 procp = procp->pidhash_next)
204 prevp = procp;
205
206 if (!procp)
207 return -1;
208
209 if (!prevp)
210 pidhash[hval] = procp->pidhash_next;
211 else
212 prevp->pidhash_next = procp->pidhash_next;
213
214 proc_unslot(procp);
215 free(procp);
216 return 0;
217}
218
219static void writefilestring(char *path, char *s) {
Nick Kralevichc68c8862015-12-18 20:52:37 -0800220 int fd = open(path, O_WRONLY | O_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700221 int len = strlen(s);
222 int ret;
223
224 if (fd < 0) {
225 ALOGE("Error opening %s; errno=%d", path, errno);
226 return;
227 }
228
229 ret = write(fd, s, len);
230 if (ret < 0) {
231 ALOGE("Error writing %s; errno=%d", path, errno);
232 } else if (ret < len) {
233 ALOGE("Short write on %s; length=%d", path, ret);
234 }
235
236 close(fd);
237}
238
Colin Crossfbb78c62014-06-13 14:52:43 -0700239static void cmd_procprio(int pid, int uid, int oomadj) {
Todd Poynor3948f802013-07-09 19:35:14 -0700240 struct proc *procp;
241 char path[80];
242 char val[20];
243
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700244 if (oomadj < OOM_SCORE_ADJ_MIN || oomadj > OOM_SCORE_ADJ_MAX) {
Todd Poynor3948f802013-07-09 19:35:14 -0700245 ALOGE("Invalid PROCPRIO oomadj argument %d", oomadj);
246 return;
247 }
248
Todd Poynor16b60992013-09-16 19:26:47 -0700249 snprintf(path, sizeof(path), "/proc/%d/oom_score_adj", pid);
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700250 snprintf(val, sizeof(val), "%d", oomadj);
Todd Poynor3948f802013-07-09 19:35:14 -0700251 writefilestring(path, val);
252
253 if (use_inkernel_interface)
254 return;
255
256 procp = pid_lookup(pid);
257 if (!procp) {
258 procp = malloc(sizeof(struct proc));
259 if (!procp) {
260 // Oh, the irony. May need to rebuild our state.
261 return;
262 }
263
264 procp->pid = pid;
Colin Crossfbb78c62014-06-13 14:52:43 -0700265 procp->uid = uid;
Todd Poynor3948f802013-07-09 19:35:14 -0700266 procp->oomadj = oomadj;
267 proc_insert(procp);
268 } else {
269 proc_unslot(procp);
270 procp->oomadj = oomadj;
271 proc_slot(procp);
272 }
273}
274
275static void cmd_procremove(int pid) {
Todd Poynor3948f802013-07-09 19:35:14 -0700276 if (use_inkernel_interface)
277 return;
278
279 pid_remove(pid);
280 kill_lasttime = 0;
281}
282
283static void cmd_target(int ntargets, int *params) {
284 int i;
285
286 if (ntargets > (int)ARRAY_SIZE(lowmem_adj))
287 return;
288
289 for (i = 0; i < ntargets; i++) {
290 lowmem_minfree[i] = ntohl(*params++);
291 lowmem_adj[i] = ntohl(*params++);
292 }
293
294 lowmem_targets_size = ntargets;
295
296 if (use_inkernel_interface) {
297 char minfreestr[128];
298 char killpriostr[128];
299
300 minfreestr[0] = '\0';
301 killpriostr[0] = '\0';
302
303 for (i = 0; i < lowmem_targets_size; i++) {
304 char val[40];
305
306 if (i) {
307 strlcat(minfreestr, ",", sizeof(minfreestr));
308 strlcat(killpriostr, ",", sizeof(killpriostr));
309 }
310
311 snprintf(val, sizeof(val), "%d", lowmem_minfree[i]);
312 strlcat(minfreestr, val, sizeof(minfreestr));
313 snprintf(val, sizeof(val), "%d", lowmem_adj[i]);
314 strlcat(killpriostr, val, sizeof(killpriostr));
315 }
316
317 writefilestring(INKERNEL_MINFREE_PATH, minfreestr);
318 writefilestring(INKERNEL_ADJ_PATH, killpriostr);
319 }
320}
321
322static void ctrl_data_close(void) {
323 ALOGI("Closing Activity Manager data connection");
324 close(ctrl_dfd);
325 ctrl_dfd = -1;
326 maxevents--;
327}
328
329static int ctrl_data_read(char *buf, size_t bufsz) {
330 int ret = 0;
331
332 ret = read(ctrl_dfd, buf, bufsz);
333
334 if (ret == -1) {
335 ALOGE("control data socket read failed; errno=%d", errno);
336 } else if (ret == 0) {
337 ALOGE("Got EOF on control data socket");
338 ret = -1;
339 }
340
341 return ret;
342}
343
344static void ctrl_command_handler(void) {
345 int ibuf[CTRL_PACKET_MAX / sizeof(int)];
346 int len;
347 int cmd = -1;
348 int nargs;
349 int targets;
350
351 len = ctrl_data_read((char *)ibuf, CTRL_PACKET_MAX);
352 if (len <= 0)
353 return;
354
355 nargs = len / sizeof(int) - 1;
356 if (nargs < 0)
357 goto wronglen;
358
359 cmd = ntohl(ibuf[0]);
360
361 switch(cmd) {
362 case LMK_TARGET:
363 targets = nargs / 2;
364 if (nargs & 0x1 || targets > (int)ARRAY_SIZE(lowmem_adj))
365 goto wronglen;
366 cmd_target(targets, &ibuf[1]);
367 break;
368 case LMK_PROCPRIO:
Colin Crossfbb78c62014-06-13 14:52:43 -0700369 if (nargs != 3)
Todd Poynor3948f802013-07-09 19:35:14 -0700370 goto wronglen;
Colin Crossfbb78c62014-06-13 14:52:43 -0700371 cmd_procprio(ntohl(ibuf[1]), ntohl(ibuf[2]), ntohl(ibuf[3]));
Todd Poynor3948f802013-07-09 19:35:14 -0700372 break;
373 case LMK_PROCREMOVE:
374 if (nargs != 1)
375 goto wronglen;
376 cmd_procremove(ntohl(ibuf[1]));
377 break;
378 default:
379 ALOGE("Received unknown command code %d", cmd);
380 return;
381 }
382
383 return;
384
385wronglen:
386 ALOGE("Wrong control socket read length cmd=%d len=%d", cmd, len);
387}
388
389static void ctrl_data_handler(uint32_t events) {
390 if (events & EPOLLHUP) {
391 ALOGI("ActivityManager disconnected");
392 if (!ctrl_dfd_reopened)
393 ctrl_data_close();
394 } else if (events & EPOLLIN) {
395 ctrl_command_handler();
396 }
397}
398
Mark Salyzyne6ed68b2014-04-30 13:36:35 -0700399static void ctrl_connect_handler(uint32_t events __unused) {
Erik Kline7e16cc12015-12-01 17:27:59 +0900400 struct sockaddr_storage ss;
401 struct sockaddr *addrp = (struct sockaddr *)&ss;
Todd Poynor3948f802013-07-09 19:35:14 -0700402 socklen_t alen;
403 struct epoll_event epev;
404
405 if (ctrl_dfd >= 0) {
406 ctrl_data_close();
407 ctrl_dfd_reopened = 1;
408 }
409
Erik Kline7e16cc12015-12-01 17:27:59 +0900410 alen = sizeof(ss);
411 ctrl_dfd = accept(ctrl_lfd, addrp, &alen);
Todd Poynor3948f802013-07-09 19:35:14 -0700412
413 if (ctrl_dfd < 0) {
414 ALOGE("lmkd control socket accept failed; errno=%d", errno);
415 return;
416 }
417
418 ALOGI("ActivityManager connected");
419 maxevents++;
420 epev.events = EPOLLIN;
421 epev.data.ptr = (void *)ctrl_data_handler;
422 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, ctrl_dfd, &epev) == -1) {
423 ALOGE("epoll_ctl for data connection socket failed; errno=%d", errno);
424 ctrl_data_close();
425 return;
426 }
427}
428
429static int zoneinfo_parse_protection(char *cp) {
430 int max = 0;
431 int zoneval;
Colin Crossce85d952014-07-11 17:53:27 -0700432 char *save_ptr;
Todd Poynor3948f802013-07-09 19:35:14 -0700433
Colin Crossce85d952014-07-11 17:53:27 -0700434 for (cp = strtok_r(cp, "(), ", &save_ptr); cp; cp = strtok_r(NULL, "), ", &save_ptr)) {
Todd Poynor3948f802013-07-09 19:35:14 -0700435 zoneval = strtol(cp, &cp, 0);
Todd Poynor3948f802013-07-09 19:35:14 -0700436 if (zoneval > max)
437 max = zoneval;
Colin Crossce85d952014-07-11 17:53:27 -0700438 }
Todd Poynor3948f802013-07-09 19:35:14 -0700439
440 return max;
441}
442
443static void zoneinfo_parse_line(char *line, struct sysmeminfo *mip) {
444 char *cp = line;
445 char *ap;
Colin Crossce85d952014-07-11 17:53:27 -0700446 char *save_ptr;
Todd Poynor3948f802013-07-09 19:35:14 -0700447
Colin Crossce85d952014-07-11 17:53:27 -0700448 cp = strtok_r(line, " ", &save_ptr);
Todd Poynor3948f802013-07-09 19:35:14 -0700449 if (!cp)
450 return;
451
Colin Crossce85d952014-07-11 17:53:27 -0700452 ap = strtok_r(NULL, " ", &save_ptr);
Todd Poynor3948f802013-07-09 19:35:14 -0700453 if (!ap)
454 return;
455
456 if (!strcmp(cp, "nr_free_pages"))
457 mip->nr_free_pages += strtol(ap, NULL, 0);
458 else if (!strcmp(cp, "nr_file_pages"))
459 mip->nr_file_pages += strtol(ap, NULL, 0);
460 else if (!strcmp(cp, "nr_shmem"))
461 mip->nr_shmem += strtol(ap, NULL, 0);
462 else if (!strcmp(cp, "high"))
463 mip->totalreserve_pages += strtol(ap, NULL, 0);
464 else if (!strcmp(cp, "protection:"))
465 mip->totalreserve_pages += zoneinfo_parse_protection(ap);
466}
467
468static int zoneinfo_parse(struct sysmeminfo *mip) {
Colin Crossce85d952014-07-11 17:53:27 -0700469 int fd;
470 ssize_t size;
471 char buf[PAGE_SIZE];
472 char *save_ptr;
473 char *line;
Todd Poynor3948f802013-07-09 19:35:14 -0700474
475 memset(mip, 0, sizeof(struct sysmeminfo));
Colin Crossce85d952014-07-11 17:53:27 -0700476
Nick Kralevichc68c8862015-12-18 20:52:37 -0800477 fd = open(ZONEINFO_PATH, O_RDONLY | O_CLOEXEC);
Colin Crossce85d952014-07-11 17:53:27 -0700478 if (fd == -1) {
Todd Poynor3948f802013-07-09 19:35:14 -0700479 ALOGE("%s open: errno=%d", ZONEINFO_PATH, errno);
480 return -1;
481 }
482
Colin Crossce85d952014-07-11 17:53:27 -0700483 size = read_all(fd, buf, sizeof(buf) - 1);
484 if (size < 0) {
485 ALOGE("%s read: errno=%d", ZONEINFO_PATH, errno);
486 close(fd);
487 return -1;
488 }
489 ALOG_ASSERT((size_t)size < sizeof(buf) - 1, "/proc/zoneinfo too large");
490 buf[size] = 0;
491
492 for (line = strtok_r(buf, "\n", &save_ptr); line; line = strtok_r(NULL, "\n", &save_ptr))
Todd Poynor3948f802013-07-09 19:35:14 -0700493 zoneinfo_parse_line(line, mip);
494
Colin Crossce85d952014-07-11 17:53:27 -0700495 close(fd);
Todd Poynor3948f802013-07-09 19:35:14 -0700496 return 0;
497}
498
499static int proc_get_size(int pid) {
500 char path[PATH_MAX];
501 char line[LINE_MAX];
Colin Crossce85d952014-07-11 17:53:27 -0700502 int fd;
Todd Poynor3948f802013-07-09 19:35:14 -0700503 int rss = 0;
504 int total;
Colin Crossce85d952014-07-11 17:53:27 -0700505 ssize_t ret;
Todd Poynor3948f802013-07-09 19:35:14 -0700506
507 snprintf(path, PATH_MAX, "/proc/%d/statm", pid);
Nick Kralevichc68c8862015-12-18 20:52:37 -0800508 fd = open(path, O_RDONLY | O_CLOEXEC);
Colin Crossce85d952014-07-11 17:53:27 -0700509 if (fd == -1)
Todd Poynor3948f802013-07-09 19:35:14 -0700510 return -1;
Colin Crossce85d952014-07-11 17:53:27 -0700511
512 ret = read_all(fd, line, sizeof(line) - 1);
513 if (ret < 0) {
514 close(fd);
Todd Poynor3948f802013-07-09 19:35:14 -0700515 return -1;
516 }
517
518 sscanf(line, "%d %d ", &total, &rss);
Colin Crossce85d952014-07-11 17:53:27 -0700519 close(fd);
Todd Poynor3948f802013-07-09 19:35:14 -0700520 return rss;
521}
522
523static char *proc_get_name(int pid) {
524 char path[PATH_MAX];
525 static char line[LINE_MAX];
Colin Crossce85d952014-07-11 17:53:27 -0700526 int fd;
Todd Poynor3948f802013-07-09 19:35:14 -0700527 char *cp;
Colin Crossce85d952014-07-11 17:53:27 -0700528 ssize_t ret;
Todd Poynor3948f802013-07-09 19:35:14 -0700529
530 snprintf(path, PATH_MAX, "/proc/%d/cmdline", pid);
Nick Kralevichc68c8862015-12-18 20:52:37 -0800531 fd = open(path, O_RDONLY | O_CLOEXEC);
Colin Crossce85d952014-07-11 17:53:27 -0700532 if (fd == -1)
Todd Poynor3948f802013-07-09 19:35:14 -0700533 return NULL;
Colin Crossce85d952014-07-11 17:53:27 -0700534 ret = read_all(fd, line, sizeof(line) - 1);
535 close(fd);
536 if (ret < 0) {
Todd Poynor3948f802013-07-09 19:35:14 -0700537 return NULL;
538 }
539
540 cp = strchr(line, ' ');
541 if (cp)
542 *cp = '\0';
543
544 return line;
545}
546
547static struct proc *proc_adj_lru(int oomadj) {
548 return (struct proc *)adjslot_tail(&procadjslot_list[ADJTOSLOT(oomadj)]);
549}
550
Colin Cross16b09462014-07-14 12:39:56 -0700551/* Kill one process specified by procp. Returns the size of the process killed */
552static int kill_one_process(struct proc *procp, int other_free, int other_file,
553 int minfree, int min_score_adj, bool first)
554{
555 int pid = procp->pid;
556 uid_t uid = procp->uid;
557 char *taskname;
558 int tasksize;
559 int r;
560
561 taskname = proc_get_name(pid);
562 if (!taskname) {
563 pid_remove(pid);
564 return -1;
565 }
566
567 tasksize = proc_get_size(pid);
568 if (tasksize <= 0) {
569 pid_remove(pid);
570 return -1;
571 }
572
573 ALOGI("Killing '%s' (%d), uid %d, adj %d\n"
574 " to free %ldkB because cache %s%ldkB is below limit %ldkB for oom_adj %d\n"
575 " Free memory is %s%ldkB %s reserved",
576 taskname, pid, uid, procp->oomadj, tasksize * page_k,
577 first ? "" : "~", other_file * page_k, minfree * page_k, min_score_adj,
578 first ? "" : "~", other_free * page_k, other_free >= 0 ? "above" : "below");
579 r = kill(pid, SIGKILL);
580 killProcessGroup(uid, pid, SIGKILL);
581 pid_remove(pid);
582
583 if (r) {
584 ALOGE("kill(%d): errno=%d", procp->pid, errno);
585 return -1;
586 } else {
587 return tasksize;
588 }
589}
590
591/*
592 * Find a process to kill based on the current (possibly estimated) free memory
593 * and cached memory sizes. Returns the size of the killed processes.
594 */
595static int find_and_kill_process(int other_free, int other_file, bool first)
596{
597 int i;
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700598 int min_score_adj = OOM_SCORE_ADJ_MAX + 1;
Colin Cross16b09462014-07-14 12:39:56 -0700599 int minfree = 0;
600 int killed_size = 0;
601
602 for (i = 0; i < lowmem_targets_size; i++) {
603 minfree = lowmem_minfree[i];
604 if (other_free < minfree && other_file < minfree) {
605 min_score_adj = lowmem_adj[i];
606 break;
607 }
608 }
609
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700610 if (min_score_adj == OOM_SCORE_ADJ_MAX + 1)
Colin Cross16b09462014-07-14 12:39:56 -0700611 return 0;
612
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700613 for (i = OOM_SCORE_ADJ_MAX; i >= min_score_adj; i--) {
Colin Cross16b09462014-07-14 12:39:56 -0700614 struct proc *procp;
615
616retry:
617 procp = proc_adj_lru(i);
618
619 if (procp) {
620 killed_size = kill_one_process(procp, other_free, other_file, minfree, min_score_adj, first);
621 if (killed_size < 0) {
622 goto retry;
623 } else {
624 return killed_size;
625 }
626 }
627 }
628
629 return 0;
630}
631
Mark Salyzyne6ed68b2014-04-30 13:36:35 -0700632static void mp_event(uint32_t events __unused) {
Todd Poynor3948f802013-07-09 19:35:14 -0700633 int ret;
634 unsigned long long evcount;
635 struct sysmeminfo mi;
636 int other_free;
637 int other_file;
Colin Cross16b09462014-07-14 12:39:56 -0700638 int killed_size;
639 bool first = true;
Todd Poynor3948f802013-07-09 19:35:14 -0700640
641 ret = read(mpevfd, &evcount, sizeof(evcount));
642 if (ret < 0)
643 ALOGE("Error reading memory pressure event fd; errno=%d",
644 errno);
645
646 if (time(NULL) - kill_lasttime < KILL_TIMEOUT)
647 return;
648
Colin Crossf8857cc2014-07-11 17:16:56 -0700649 while (zoneinfo_parse(&mi) < 0) {
650 // Failed to read /proc/zoneinfo, assume ENOMEM and kill something
651 find_and_kill_process(0, 0, true);
652 }
Todd Poynor3948f802013-07-09 19:35:14 -0700653
654 other_free = mi.nr_free_pages - mi.totalreserve_pages;
655 other_file = mi.nr_file_pages - mi.nr_shmem;
656
Colin Cross16b09462014-07-14 12:39:56 -0700657 do {
658 killed_size = find_and_kill_process(other_free, other_file, first);
659 if (killed_size > 0) {
660 first = false;
661 other_free += killed_size;
662 other_file += killed_size;
Todd Poynor3948f802013-07-09 19:35:14 -0700663 }
Colin Cross16b09462014-07-14 12:39:56 -0700664 } while (killed_size > 0);
Todd Poynor3948f802013-07-09 19:35:14 -0700665}
666
667static int init_mp(char *levelstr, void *event_handler)
668{
669 int mpfd;
670 int evfd;
671 int evctlfd;
672 char buf[256];
673 struct epoll_event epev;
674 int ret;
675
Nick Kralevichc68c8862015-12-18 20:52:37 -0800676 mpfd = open(MEMCG_SYSFS_PATH "memory.pressure_level", O_RDONLY | O_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700677 if (mpfd < 0) {
678 ALOGI("No kernel memory.pressure_level support (errno=%d)", errno);
679 goto err_open_mpfd;
680 }
681
Nick Kralevichc68c8862015-12-18 20:52:37 -0800682 evctlfd = open(MEMCG_SYSFS_PATH "cgroup.event_control", O_WRONLY | O_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700683 if (evctlfd < 0) {
684 ALOGI("No kernel memory cgroup event control (errno=%d)", errno);
685 goto err_open_evctlfd;
686 }
687
Nick Kralevichc68c8862015-12-18 20:52:37 -0800688 evfd = eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700689 if (evfd < 0) {
690 ALOGE("eventfd failed for level %s; errno=%d", levelstr, errno);
691 goto err_eventfd;
692 }
693
694 ret = snprintf(buf, sizeof(buf), "%d %d %s", evfd, mpfd, levelstr);
695 if (ret >= (ssize_t)sizeof(buf)) {
696 ALOGE("cgroup.event_control line overflow for level %s", levelstr);
697 goto err;
698 }
699
700 ret = write(evctlfd, buf, strlen(buf) + 1);
701 if (ret == -1) {
702 ALOGE("cgroup.event_control write failed for level %s; errno=%d",
703 levelstr, errno);
704 goto err;
705 }
706
707 epev.events = EPOLLIN;
708 epev.data.ptr = event_handler;
709 ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, evfd, &epev);
710 if (ret == -1) {
711 ALOGE("epoll_ctl for level %s failed; errno=%d", levelstr, errno);
712 goto err;
713 }
714 maxevents++;
715 mpevfd = evfd;
716 return 0;
717
718err:
719 close(evfd);
720err_eventfd:
721 close(evctlfd);
722err_open_evctlfd:
723 close(mpfd);
724err_open_mpfd:
725 return -1;
726}
727
728static int init(void) {
729 struct epoll_event epev;
730 int i;
731 int ret;
732
733 page_k = sysconf(_SC_PAGESIZE);
734 if (page_k == -1)
735 page_k = PAGE_SIZE;
736 page_k /= 1024;
737
738 epollfd = epoll_create(MAX_EPOLL_EVENTS);
739 if (epollfd == -1) {
740 ALOGE("epoll_create failed (errno=%d)", errno);
741 return -1;
742 }
743
744 ctrl_lfd = android_get_control_socket("lmkd");
745 if (ctrl_lfd < 0) {
746 ALOGE("get lmkd control socket failed");
747 return -1;
748 }
749
750 ret = listen(ctrl_lfd, 1);
751 if (ret < 0) {
752 ALOGE("lmkd control socket listen failed (errno=%d)", errno);
753 return -1;
754 }
755
756 epev.events = EPOLLIN;
757 epev.data.ptr = (void *)ctrl_connect_handler;
758 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, ctrl_lfd, &epev) == -1) {
759 ALOGE("epoll_ctl for lmkd control socket failed (errno=%d)", errno);
760 return -1;
761 }
762 maxevents++;
763
764 use_inkernel_interface = !access(INKERNEL_MINFREE_PATH, W_OK);
765
766 if (use_inkernel_interface) {
767 ALOGI("Using in-kernel low memory killer interface");
768 } else {
769 ret = init_mp(MEMPRESSURE_WATCH_LEVEL, (void *)&mp_event);
770 if (ret)
771 ALOGE("Kernel does not support memory pressure events or in-kernel low memory killer");
772 }
773
Chong Zhang0a4acdf2015-10-14 16:19:53 -0700774 for (i = 0; i <= ADJTOSLOT(OOM_SCORE_ADJ_MAX); i++) {
Todd Poynor3948f802013-07-09 19:35:14 -0700775 procadjslot_list[i].next = &procadjslot_list[i];
776 procadjslot_list[i].prev = &procadjslot_list[i];
777 }
778
779 return 0;
780}
781
782static void mainloop(void) {
783 while (1) {
784 struct epoll_event events[maxevents];
785 int nevents;
786 int i;
787
788 ctrl_dfd_reopened = 0;
789 nevents = epoll_wait(epollfd, events, maxevents, -1);
790
791 if (nevents == -1) {
792 if (errno == EINTR)
793 continue;
794 ALOGE("epoll_wait failed (errno=%d)", errno);
795 continue;
796 }
797
798 for (i = 0; i < nevents; ++i) {
799 if (events[i].events & EPOLLERR)
800 ALOGD("EPOLLERR on event #%d", i);
801 if (events[i].data.ptr)
802 (*(void (*)(uint32_t))events[i].data.ptr)(events[i].events);
803 }
804 }
805}
806
Mark Salyzyne6ed68b2014-04-30 13:36:35 -0700807int main(int argc __unused, char **argv __unused) {
Colin Cross1a0d9be2014-07-14 14:31:15 -0700808 struct sched_param param = {
809 .sched_priority = 1,
810 };
811
Colin Crossb28ff912014-07-11 17:15:44 -0700812 mlockall(MCL_FUTURE);
Colin Cross1a0d9be2014-07-14 14:31:15 -0700813 sched_setscheduler(0, SCHED_FIFO, &param);
Todd Poynor3948f802013-07-09 19:35:14 -0700814 if (!init())
815 mainloop();
816
817 ALOGI("exiting");
818 return 0;
819}