blob: aa3db8a05f984a7e789c4e65c483b3403160692e [file] [log] [blame]
Todd Poynor3948f802013-07-09 19:35:14 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "lowmemorykiller"
18
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070019#include <arpa/inet.h>
Todd Poynor3948f802013-07-09 19:35:14 -070020#include <errno.h>
21#include <signal.h>
Todd Poynor3948f802013-07-09 19:35:14 -070022#include <stdlib.h>
23#include <string.h>
24#include <time.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070025#include <sys/cdefs.h>
Todd Poynor3948f802013-07-09 19:35:14 -070026#include <sys/epoll.h>
27#include <sys/eventfd.h>
Colin Crossb28ff912014-07-11 17:15:44 -070028#include <sys/mman.h>
Todd Poynor3948f802013-07-09 19:35:14 -070029#include <sys/socket.h>
30#include <sys/types.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070031#include <unistd.h>
32
Todd Poynor3948f802013-07-09 19:35:14 -070033#include <cutils/sockets.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070034#include <log/log.h>
Colin Crossfef95222014-06-11 14:53:41 -070035#include <processgroup/processgroup.h>
Mark Salyzyne6ed68b2014-04-30 13:36:35 -070036
37#ifndef __unused
38#define __unused __attribute__((__unused__))
39#endif
Todd Poynor3948f802013-07-09 19:35:14 -070040
41#define MEMCG_SYSFS_PATH "/dev/memcg/"
42#define MEMPRESSURE_WATCH_LEVEL "medium"
43#define ZONEINFO_PATH "/proc/zoneinfo"
44#define LINE_MAX 128
45
46#define INKERNEL_MINFREE_PATH "/sys/module/lowmemorykiller/parameters/minfree"
47#define INKERNEL_ADJ_PATH "/sys/module/lowmemorykiller/parameters/adj"
48
49#define ARRAY_SIZE(x) (sizeof(x) / sizeof(*(x)))
50
51enum lmk_cmd {
52 LMK_TARGET,
53 LMK_PROCPRIO,
54 LMK_PROCREMOVE,
55};
56
57#define MAX_TARGETS 6
58/*
59 * longest is LMK_TARGET followed by MAX_TARGETS each minfree and minkillprio
60 * values
61 */
62#define CTRL_PACKET_MAX (sizeof(int) * (MAX_TARGETS * 2 + 1))
63
64/* default to old in-kernel interface if no memory pressure events */
65static int use_inkernel_interface = 1;
66
67/* memory pressure level medium event */
68static int mpevfd;
69
70/* control socket listen and data */
71static int ctrl_lfd;
72static int ctrl_dfd = -1;
73static int ctrl_dfd_reopened; /* did we reopen ctrl conn on this loop? */
74
75/* 1 memory pressure level, 1 ctrl listen socket, 1 ctrl data socket */
76#define MAX_EPOLL_EVENTS 3
77static int epollfd;
78static int maxevents;
79
80#define OOM_DISABLE (-17)
81/* inclusive */
82#define OOM_ADJUST_MIN (-16)
83#define OOM_ADJUST_MAX 15
84
Todd Poynor16b60992013-09-16 19:26:47 -070085/* kernel OOM score values */
86#define OOM_SCORE_ADJ_MIN (-1000)
87#define OOM_SCORE_ADJ_MAX 1000
88
Todd Poynor3948f802013-07-09 19:35:14 -070089static int lowmem_adj[MAX_TARGETS];
90static int lowmem_minfree[MAX_TARGETS];
91static int lowmem_targets_size;
92
93struct sysmeminfo {
94 int nr_free_pages;
95 int nr_file_pages;
96 int nr_shmem;
97 int totalreserve_pages;
98};
99
100struct adjslot_list {
101 struct adjslot_list *next;
102 struct adjslot_list *prev;
103};
104
105struct proc {
106 struct adjslot_list asl;
107 int pid;
Colin Crossfbb78c62014-06-13 14:52:43 -0700108 uid_t uid;
Todd Poynor3948f802013-07-09 19:35:14 -0700109 int oomadj;
110 struct proc *pidhash_next;
111};
112
113#define PIDHASH_SZ 1024
114static struct proc *pidhash[PIDHASH_SZ];
115#define pid_hashfn(x) ((((x) >> 8) ^ (x)) & (PIDHASH_SZ - 1))
116
117#define ADJTOSLOT(adj) (adj + -OOM_ADJUST_MIN)
118static struct adjslot_list procadjslot_list[ADJTOSLOT(OOM_ADJUST_MAX) + 1];
119
120/*
121 * Wait 1-2 seconds for the death report of a killed process prior to
122 * considering killing more processes.
123 */
124#define KILL_TIMEOUT 2
125/* Time of last process kill we initiated, stop me before I kill again */
126static time_t kill_lasttime;
127
128/* PAGE_SIZE / 1024 */
129static long page_k;
130
Colin Crossce85d952014-07-11 17:53:27 -0700131static ssize_t read_all(int fd, char *buf, size_t max_len)
132{
133 ssize_t ret = 0;
134
135 while (max_len > 0) {
136 ssize_t r = read(fd, buf, max_len);
137 if (r == 0) {
138 break;
139 }
140 if (r == -1) {
141 return -1;
142 }
143 ret += r;
144 buf += r;
145 max_len -= r;
146 }
147
148 return ret;
149}
150
Todd Poynor16b60992013-09-16 19:26:47 -0700151static int lowmem_oom_adj_to_oom_score_adj(int oom_adj)
152{
153 if (oom_adj == OOM_ADJUST_MAX)
154 return OOM_SCORE_ADJ_MAX;
155 else
156 return (oom_adj * OOM_SCORE_ADJ_MAX) / -OOM_DISABLE;
157}
158
Todd Poynor3948f802013-07-09 19:35:14 -0700159static struct proc *pid_lookup(int pid) {
160 struct proc *procp;
161
162 for (procp = pidhash[pid_hashfn(pid)]; procp && procp->pid != pid;
163 procp = procp->pidhash_next)
164 ;
165
166 return procp;
167}
168
169static void adjslot_insert(struct adjslot_list *head, struct adjslot_list *new)
170{
171 struct adjslot_list *next = head->next;
172 new->prev = head;
173 new->next = next;
174 next->prev = new;
175 head->next = new;
176}
177
178static void adjslot_remove(struct adjslot_list *old)
179{
180 struct adjslot_list *prev = old->prev;
181 struct adjslot_list *next = old->next;
182 next->prev = prev;
183 prev->next = next;
184}
185
186static struct adjslot_list *adjslot_tail(struct adjslot_list *head) {
187 struct adjslot_list *asl = head->prev;
188
189 return asl == head ? NULL : asl;
190}
191
192static void proc_slot(struct proc *procp) {
193 int adjslot = ADJTOSLOT(procp->oomadj);
194
195 adjslot_insert(&procadjslot_list[adjslot], &procp->asl);
196}
197
198static void proc_unslot(struct proc *procp) {
199 adjslot_remove(&procp->asl);
200}
201
202static void proc_insert(struct proc *procp) {
203 int hval = pid_hashfn(procp->pid);
204
205 procp->pidhash_next = pidhash[hval];
206 pidhash[hval] = procp;
207 proc_slot(procp);
208}
209
210static int pid_remove(int pid) {
211 int hval = pid_hashfn(pid);
212 struct proc *procp;
213 struct proc *prevp;
214
215 for (procp = pidhash[hval], prevp = NULL; procp && procp->pid != pid;
216 procp = procp->pidhash_next)
217 prevp = procp;
218
219 if (!procp)
220 return -1;
221
222 if (!prevp)
223 pidhash[hval] = procp->pidhash_next;
224 else
225 prevp->pidhash_next = procp->pidhash_next;
226
227 proc_unslot(procp);
228 free(procp);
229 return 0;
230}
231
232static void writefilestring(char *path, char *s) {
Nick Kralevichc68c8862015-12-18 20:52:37 -0800233 int fd = open(path, O_WRONLY | O_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700234 int len = strlen(s);
235 int ret;
236
237 if (fd < 0) {
238 ALOGE("Error opening %s; errno=%d", path, errno);
239 return;
240 }
241
242 ret = write(fd, s, len);
243 if (ret < 0) {
244 ALOGE("Error writing %s; errno=%d", path, errno);
245 } else if (ret < len) {
246 ALOGE("Short write on %s; length=%d", path, ret);
247 }
248
249 close(fd);
250}
251
Colin Crossfbb78c62014-06-13 14:52:43 -0700252static void cmd_procprio(int pid, int uid, int oomadj) {
Todd Poynor3948f802013-07-09 19:35:14 -0700253 struct proc *procp;
254 char path[80];
255 char val[20];
256
257 if (oomadj < OOM_DISABLE || oomadj > OOM_ADJUST_MAX) {
258 ALOGE("Invalid PROCPRIO oomadj argument %d", oomadj);
259 return;
260 }
261
Todd Poynor16b60992013-09-16 19:26:47 -0700262 snprintf(path, sizeof(path), "/proc/%d/oom_score_adj", pid);
263 snprintf(val, sizeof(val), "%d", lowmem_oom_adj_to_oom_score_adj(oomadj));
Todd Poynor3948f802013-07-09 19:35:14 -0700264 writefilestring(path, val);
265
266 if (use_inkernel_interface)
267 return;
268
269 procp = pid_lookup(pid);
270 if (!procp) {
271 procp = malloc(sizeof(struct proc));
272 if (!procp) {
273 // Oh, the irony. May need to rebuild our state.
274 return;
275 }
276
277 procp->pid = pid;
Colin Crossfbb78c62014-06-13 14:52:43 -0700278 procp->uid = uid;
Todd Poynor3948f802013-07-09 19:35:14 -0700279 procp->oomadj = oomadj;
280 proc_insert(procp);
281 } else {
282 proc_unslot(procp);
283 procp->oomadj = oomadj;
284 proc_slot(procp);
285 }
286}
287
288static void cmd_procremove(int pid) {
Todd Poynor3948f802013-07-09 19:35:14 -0700289 if (use_inkernel_interface)
290 return;
291
292 pid_remove(pid);
293 kill_lasttime = 0;
294}
295
296static void cmd_target(int ntargets, int *params) {
297 int i;
298
299 if (ntargets > (int)ARRAY_SIZE(lowmem_adj))
300 return;
301
302 for (i = 0; i < ntargets; i++) {
303 lowmem_minfree[i] = ntohl(*params++);
304 lowmem_adj[i] = ntohl(*params++);
305 }
306
307 lowmem_targets_size = ntargets;
308
309 if (use_inkernel_interface) {
310 char minfreestr[128];
311 char killpriostr[128];
312
313 minfreestr[0] = '\0';
314 killpriostr[0] = '\0';
315
316 for (i = 0; i < lowmem_targets_size; i++) {
317 char val[40];
318
319 if (i) {
320 strlcat(minfreestr, ",", sizeof(minfreestr));
321 strlcat(killpriostr, ",", sizeof(killpriostr));
322 }
323
324 snprintf(val, sizeof(val), "%d", lowmem_minfree[i]);
325 strlcat(minfreestr, val, sizeof(minfreestr));
326 snprintf(val, sizeof(val), "%d", lowmem_adj[i]);
327 strlcat(killpriostr, val, sizeof(killpriostr));
328 }
329
330 writefilestring(INKERNEL_MINFREE_PATH, minfreestr);
331 writefilestring(INKERNEL_ADJ_PATH, killpriostr);
332 }
333}
334
335static void ctrl_data_close(void) {
336 ALOGI("Closing Activity Manager data connection");
337 close(ctrl_dfd);
338 ctrl_dfd = -1;
339 maxevents--;
340}
341
342static int ctrl_data_read(char *buf, size_t bufsz) {
343 int ret = 0;
344
345 ret = read(ctrl_dfd, buf, bufsz);
346
347 if (ret == -1) {
348 ALOGE("control data socket read failed; errno=%d", errno);
349 } else if (ret == 0) {
350 ALOGE("Got EOF on control data socket");
351 ret = -1;
352 }
353
354 return ret;
355}
356
357static void ctrl_command_handler(void) {
358 int ibuf[CTRL_PACKET_MAX / sizeof(int)];
359 int len;
360 int cmd = -1;
361 int nargs;
362 int targets;
363
364 len = ctrl_data_read((char *)ibuf, CTRL_PACKET_MAX);
365 if (len <= 0)
366 return;
367
368 nargs = len / sizeof(int) - 1;
369 if (nargs < 0)
370 goto wronglen;
371
372 cmd = ntohl(ibuf[0]);
373
374 switch(cmd) {
375 case LMK_TARGET:
376 targets = nargs / 2;
377 if (nargs & 0x1 || targets > (int)ARRAY_SIZE(lowmem_adj))
378 goto wronglen;
379 cmd_target(targets, &ibuf[1]);
380 break;
381 case LMK_PROCPRIO:
Colin Crossfbb78c62014-06-13 14:52:43 -0700382 if (nargs != 3)
Todd Poynor3948f802013-07-09 19:35:14 -0700383 goto wronglen;
Colin Crossfbb78c62014-06-13 14:52:43 -0700384 cmd_procprio(ntohl(ibuf[1]), ntohl(ibuf[2]), ntohl(ibuf[3]));
Todd Poynor3948f802013-07-09 19:35:14 -0700385 break;
386 case LMK_PROCREMOVE:
387 if (nargs != 1)
388 goto wronglen;
389 cmd_procremove(ntohl(ibuf[1]));
390 break;
391 default:
392 ALOGE("Received unknown command code %d", cmd);
393 return;
394 }
395
396 return;
397
398wronglen:
399 ALOGE("Wrong control socket read length cmd=%d len=%d", cmd, len);
400}
401
402static void ctrl_data_handler(uint32_t events) {
403 if (events & EPOLLHUP) {
404 ALOGI("ActivityManager disconnected");
405 if (!ctrl_dfd_reopened)
406 ctrl_data_close();
407 } else if (events & EPOLLIN) {
408 ctrl_command_handler();
409 }
410}
411
Mark Salyzyne6ed68b2014-04-30 13:36:35 -0700412static void ctrl_connect_handler(uint32_t events __unused) {
Erik Kline7e16cc12015-12-01 17:27:59 +0900413 struct sockaddr_storage ss;
414 struct sockaddr *addrp = (struct sockaddr *)&ss;
Todd Poynor3948f802013-07-09 19:35:14 -0700415 socklen_t alen;
416 struct epoll_event epev;
417
418 if (ctrl_dfd >= 0) {
419 ctrl_data_close();
420 ctrl_dfd_reopened = 1;
421 }
422
Erik Kline7e16cc12015-12-01 17:27:59 +0900423 alen = sizeof(ss);
424 ctrl_dfd = accept(ctrl_lfd, addrp, &alen);
Todd Poynor3948f802013-07-09 19:35:14 -0700425
426 if (ctrl_dfd < 0) {
427 ALOGE("lmkd control socket accept failed; errno=%d", errno);
428 return;
429 }
430
431 ALOGI("ActivityManager connected");
432 maxevents++;
433 epev.events = EPOLLIN;
434 epev.data.ptr = (void *)ctrl_data_handler;
435 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, ctrl_dfd, &epev) == -1) {
436 ALOGE("epoll_ctl for data connection socket failed; errno=%d", errno);
437 ctrl_data_close();
438 return;
439 }
440}
441
442static int zoneinfo_parse_protection(char *cp) {
443 int max = 0;
444 int zoneval;
Colin Crossce85d952014-07-11 17:53:27 -0700445 char *save_ptr;
Todd Poynor3948f802013-07-09 19:35:14 -0700446
Colin Crossce85d952014-07-11 17:53:27 -0700447 for (cp = strtok_r(cp, "(), ", &save_ptr); cp; cp = strtok_r(NULL, "), ", &save_ptr)) {
Todd Poynor3948f802013-07-09 19:35:14 -0700448 zoneval = strtol(cp, &cp, 0);
Todd Poynor3948f802013-07-09 19:35:14 -0700449 if (zoneval > max)
450 max = zoneval;
Colin Crossce85d952014-07-11 17:53:27 -0700451 }
Todd Poynor3948f802013-07-09 19:35:14 -0700452
453 return max;
454}
455
456static void zoneinfo_parse_line(char *line, struct sysmeminfo *mip) {
457 char *cp = line;
458 char *ap;
Colin Crossce85d952014-07-11 17:53:27 -0700459 char *save_ptr;
Todd Poynor3948f802013-07-09 19:35:14 -0700460
Colin Crossce85d952014-07-11 17:53:27 -0700461 cp = strtok_r(line, " ", &save_ptr);
Todd Poynor3948f802013-07-09 19:35:14 -0700462 if (!cp)
463 return;
464
Colin Crossce85d952014-07-11 17:53:27 -0700465 ap = strtok_r(NULL, " ", &save_ptr);
Todd Poynor3948f802013-07-09 19:35:14 -0700466 if (!ap)
467 return;
468
469 if (!strcmp(cp, "nr_free_pages"))
470 mip->nr_free_pages += strtol(ap, NULL, 0);
471 else if (!strcmp(cp, "nr_file_pages"))
472 mip->nr_file_pages += strtol(ap, NULL, 0);
473 else if (!strcmp(cp, "nr_shmem"))
474 mip->nr_shmem += strtol(ap, NULL, 0);
475 else if (!strcmp(cp, "high"))
476 mip->totalreserve_pages += strtol(ap, NULL, 0);
477 else if (!strcmp(cp, "protection:"))
478 mip->totalreserve_pages += zoneinfo_parse_protection(ap);
479}
480
481static int zoneinfo_parse(struct sysmeminfo *mip) {
Colin Crossce85d952014-07-11 17:53:27 -0700482 int fd;
483 ssize_t size;
484 char buf[PAGE_SIZE];
485 char *save_ptr;
486 char *line;
Todd Poynor3948f802013-07-09 19:35:14 -0700487
488 memset(mip, 0, sizeof(struct sysmeminfo));
Colin Crossce85d952014-07-11 17:53:27 -0700489
Nick Kralevichc68c8862015-12-18 20:52:37 -0800490 fd = open(ZONEINFO_PATH, O_RDONLY | O_CLOEXEC);
Colin Crossce85d952014-07-11 17:53:27 -0700491 if (fd == -1) {
Todd Poynor3948f802013-07-09 19:35:14 -0700492 ALOGE("%s open: errno=%d", ZONEINFO_PATH, errno);
493 return -1;
494 }
495
Colin Crossce85d952014-07-11 17:53:27 -0700496 size = read_all(fd, buf, sizeof(buf) - 1);
497 if (size < 0) {
498 ALOGE("%s read: errno=%d", ZONEINFO_PATH, errno);
499 close(fd);
500 return -1;
501 }
502 ALOG_ASSERT((size_t)size < sizeof(buf) - 1, "/proc/zoneinfo too large");
503 buf[size] = 0;
504
505 for (line = strtok_r(buf, "\n", &save_ptr); line; line = strtok_r(NULL, "\n", &save_ptr))
Todd Poynor3948f802013-07-09 19:35:14 -0700506 zoneinfo_parse_line(line, mip);
507
Colin Crossce85d952014-07-11 17:53:27 -0700508 close(fd);
Todd Poynor3948f802013-07-09 19:35:14 -0700509 return 0;
510}
511
512static int proc_get_size(int pid) {
513 char path[PATH_MAX];
514 char line[LINE_MAX];
Colin Crossce85d952014-07-11 17:53:27 -0700515 int fd;
Todd Poynor3948f802013-07-09 19:35:14 -0700516 int rss = 0;
517 int total;
Colin Crossce85d952014-07-11 17:53:27 -0700518 ssize_t ret;
Todd Poynor3948f802013-07-09 19:35:14 -0700519
520 snprintf(path, PATH_MAX, "/proc/%d/statm", pid);
Nick Kralevichc68c8862015-12-18 20:52:37 -0800521 fd = open(path, O_RDONLY | O_CLOEXEC);
Colin Crossce85d952014-07-11 17:53:27 -0700522 if (fd == -1)
Todd Poynor3948f802013-07-09 19:35:14 -0700523 return -1;
Colin Crossce85d952014-07-11 17:53:27 -0700524
525 ret = read_all(fd, line, sizeof(line) - 1);
526 if (ret < 0) {
527 close(fd);
Todd Poynor3948f802013-07-09 19:35:14 -0700528 return -1;
529 }
530
531 sscanf(line, "%d %d ", &total, &rss);
Colin Crossce85d952014-07-11 17:53:27 -0700532 close(fd);
Todd Poynor3948f802013-07-09 19:35:14 -0700533 return rss;
534}
535
536static char *proc_get_name(int pid) {
537 char path[PATH_MAX];
538 static char line[LINE_MAX];
Colin Crossce85d952014-07-11 17:53:27 -0700539 int fd;
Todd Poynor3948f802013-07-09 19:35:14 -0700540 char *cp;
Colin Crossce85d952014-07-11 17:53:27 -0700541 ssize_t ret;
Todd Poynor3948f802013-07-09 19:35:14 -0700542
543 snprintf(path, PATH_MAX, "/proc/%d/cmdline", pid);
Nick Kralevichc68c8862015-12-18 20:52:37 -0800544 fd = open(path, O_RDONLY | O_CLOEXEC);
Colin Crossce85d952014-07-11 17:53:27 -0700545 if (fd == -1)
Todd Poynor3948f802013-07-09 19:35:14 -0700546 return NULL;
Colin Crossce85d952014-07-11 17:53:27 -0700547 ret = read_all(fd, line, sizeof(line) - 1);
548 close(fd);
549 if (ret < 0) {
Todd Poynor3948f802013-07-09 19:35:14 -0700550 return NULL;
551 }
552
553 cp = strchr(line, ' ');
554 if (cp)
555 *cp = '\0';
556
557 return line;
558}
559
560static struct proc *proc_adj_lru(int oomadj) {
561 return (struct proc *)adjslot_tail(&procadjslot_list[ADJTOSLOT(oomadj)]);
562}
563
Colin Cross16b09462014-07-14 12:39:56 -0700564/* Kill one process specified by procp. Returns the size of the process killed */
565static int kill_one_process(struct proc *procp, int other_free, int other_file,
566 int minfree, int min_score_adj, bool first)
567{
568 int pid = procp->pid;
569 uid_t uid = procp->uid;
570 char *taskname;
571 int tasksize;
572 int r;
573
574 taskname = proc_get_name(pid);
575 if (!taskname) {
576 pid_remove(pid);
577 return -1;
578 }
579
580 tasksize = proc_get_size(pid);
581 if (tasksize <= 0) {
582 pid_remove(pid);
583 return -1;
584 }
585
586 ALOGI("Killing '%s' (%d), uid %d, adj %d\n"
587 " to free %ldkB because cache %s%ldkB is below limit %ldkB for oom_adj %d\n"
588 " Free memory is %s%ldkB %s reserved",
589 taskname, pid, uid, procp->oomadj, tasksize * page_k,
590 first ? "" : "~", other_file * page_k, minfree * page_k, min_score_adj,
591 first ? "" : "~", other_free * page_k, other_free >= 0 ? "above" : "below");
592 r = kill(pid, SIGKILL);
593 killProcessGroup(uid, pid, SIGKILL);
594 pid_remove(pid);
595
596 if (r) {
597 ALOGE("kill(%d): errno=%d", procp->pid, errno);
598 return -1;
599 } else {
600 return tasksize;
601 }
602}
603
604/*
605 * Find a process to kill based on the current (possibly estimated) free memory
606 * and cached memory sizes. Returns the size of the killed processes.
607 */
608static int find_and_kill_process(int other_free, int other_file, bool first)
609{
610 int i;
Colin Cross16b09462014-07-14 12:39:56 -0700611 int min_score_adj = OOM_ADJUST_MAX + 1;
612 int minfree = 0;
613 int killed_size = 0;
614
615 for (i = 0; i < lowmem_targets_size; i++) {
616 minfree = lowmem_minfree[i];
617 if (other_free < minfree && other_file < minfree) {
618 min_score_adj = lowmem_adj[i];
619 break;
620 }
621 }
622
623 if (min_score_adj == OOM_ADJUST_MAX + 1)
624 return 0;
625
626 for (i = OOM_ADJUST_MAX; i >= min_score_adj; i--) {
627 struct proc *procp;
628
629retry:
630 procp = proc_adj_lru(i);
631
632 if (procp) {
633 killed_size = kill_one_process(procp, other_free, other_file, minfree, min_score_adj, first);
634 if (killed_size < 0) {
635 goto retry;
636 } else {
637 return killed_size;
638 }
639 }
640 }
641
642 return 0;
643}
644
Mark Salyzyne6ed68b2014-04-30 13:36:35 -0700645static void mp_event(uint32_t events __unused) {
Todd Poynor3948f802013-07-09 19:35:14 -0700646 int ret;
647 unsigned long long evcount;
648 struct sysmeminfo mi;
649 int other_free;
650 int other_file;
Colin Cross16b09462014-07-14 12:39:56 -0700651 int killed_size;
652 bool first = true;
Todd Poynor3948f802013-07-09 19:35:14 -0700653
654 ret = read(mpevfd, &evcount, sizeof(evcount));
655 if (ret < 0)
656 ALOGE("Error reading memory pressure event fd; errno=%d",
657 errno);
658
659 if (time(NULL) - kill_lasttime < KILL_TIMEOUT)
660 return;
661
Colin Crossf8857cc2014-07-11 17:16:56 -0700662 while (zoneinfo_parse(&mi) < 0) {
663 // Failed to read /proc/zoneinfo, assume ENOMEM and kill something
664 find_and_kill_process(0, 0, true);
665 }
Todd Poynor3948f802013-07-09 19:35:14 -0700666
667 other_free = mi.nr_free_pages - mi.totalreserve_pages;
668 other_file = mi.nr_file_pages - mi.nr_shmem;
669
Colin Cross16b09462014-07-14 12:39:56 -0700670 do {
671 killed_size = find_and_kill_process(other_free, other_file, first);
672 if (killed_size > 0) {
673 first = false;
674 other_free += killed_size;
675 other_file += killed_size;
Todd Poynor3948f802013-07-09 19:35:14 -0700676 }
Colin Cross16b09462014-07-14 12:39:56 -0700677 } while (killed_size > 0);
Todd Poynor3948f802013-07-09 19:35:14 -0700678}
679
680static int init_mp(char *levelstr, void *event_handler)
681{
682 int mpfd;
683 int evfd;
684 int evctlfd;
685 char buf[256];
686 struct epoll_event epev;
687 int ret;
688
Nick Kralevichc68c8862015-12-18 20:52:37 -0800689 mpfd = open(MEMCG_SYSFS_PATH "memory.pressure_level", O_RDONLY | O_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700690 if (mpfd < 0) {
691 ALOGI("No kernel memory.pressure_level support (errno=%d)", errno);
692 goto err_open_mpfd;
693 }
694
Nick Kralevichc68c8862015-12-18 20:52:37 -0800695 evctlfd = open(MEMCG_SYSFS_PATH "cgroup.event_control", O_WRONLY | O_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700696 if (evctlfd < 0) {
697 ALOGI("No kernel memory cgroup event control (errno=%d)", errno);
698 goto err_open_evctlfd;
699 }
700
Nick Kralevichc68c8862015-12-18 20:52:37 -0800701 evfd = eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC);
Todd Poynor3948f802013-07-09 19:35:14 -0700702 if (evfd < 0) {
703 ALOGE("eventfd failed for level %s; errno=%d", levelstr, errno);
704 goto err_eventfd;
705 }
706
707 ret = snprintf(buf, sizeof(buf), "%d %d %s", evfd, mpfd, levelstr);
708 if (ret >= (ssize_t)sizeof(buf)) {
709 ALOGE("cgroup.event_control line overflow for level %s", levelstr);
710 goto err;
711 }
712
713 ret = write(evctlfd, buf, strlen(buf) + 1);
714 if (ret == -1) {
715 ALOGE("cgroup.event_control write failed for level %s; errno=%d",
716 levelstr, errno);
717 goto err;
718 }
719
720 epev.events = EPOLLIN;
721 epev.data.ptr = event_handler;
722 ret = epoll_ctl(epollfd, EPOLL_CTL_ADD, evfd, &epev);
723 if (ret == -1) {
724 ALOGE("epoll_ctl for level %s failed; errno=%d", levelstr, errno);
725 goto err;
726 }
727 maxevents++;
728 mpevfd = evfd;
729 return 0;
730
731err:
732 close(evfd);
733err_eventfd:
734 close(evctlfd);
735err_open_evctlfd:
736 close(mpfd);
737err_open_mpfd:
738 return -1;
739}
740
741static int init(void) {
742 struct epoll_event epev;
743 int i;
744 int ret;
745
746 page_k = sysconf(_SC_PAGESIZE);
747 if (page_k == -1)
748 page_k = PAGE_SIZE;
749 page_k /= 1024;
750
751 epollfd = epoll_create(MAX_EPOLL_EVENTS);
752 if (epollfd == -1) {
753 ALOGE("epoll_create failed (errno=%d)", errno);
754 return -1;
755 }
756
757 ctrl_lfd = android_get_control_socket("lmkd");
758 if (ctrl_lfd < 0) {
759 ALOGE("get lmkd control socket failed");
760 return -1;
761 }
762
763 ret = listen(ctrl_lfd, 1);
764 if (ret < 0) {
765 ALOGE("lmkd control socket listen failed (errno=%d)", errno);
766 return -1;
767 }
768
769 epev.events = EPOLLIN;
770 epev.data.ptr = (void *)ctrl_connect_handler;
771 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, ctrl_lfd, &epev) == -1) {
772 ALOGE("epoll_ctl for lmkd control socket failed (errno=%d)", errno);
773 return -1;
774 }
775 maxevents++;
776
777 use_inkernel_interface = !access(INKERNEL_MINFREE_PATH, W_OK);
778
779 if (use_inkernel_interface) {
780 ALOGI("Using in-kernel low memory killer interface");
781 } else {
782 ret = init_mp(MEMPRESSURE_WATCH_LEVEL, (void *)&mp_event);
783 if (ret)
784 ALOGE("Kernel does not support memory pressure events or in-kernel low memory killer");
785 }
786
787 for (i = 0; i <= ADJTOSLOT(OOM_ADJUST_MAX); i++) {
788 procadjslot_list[i].next = &procadjslot_list[i];
789 procadjslot_list[i].prev = &procadjslot_list[i];
790 }
791
792 return 0;
793}
794
795static void mainloop(void) {
796 while (1) {
797 struct epoll_event events[maxevents];
798 int nevents;
799 int i;
800
801 ctrl_dfd_reopened = 0;
802 nevents = epoll_wait(epollfd, events, maxevents, -1);
803
804 if (nevents == -1) {
805 if (errno == EINTR)
806 continue;
807 ALOGE("epoll_wait failed (errno=%d)", errno);
808 continue;
809 }
810
811 for (i = 0; i < nevents; ++i) {
812 if (events[i].events & EPOLLERR)
813 ALOGD("EPOLLERR on event #%d", i);
814 if (events[i].data.ptr)
815 (*(void (*)(uint32_t))events[i].data.ptr)(events[i].events);
816 }
817 }
818}
819
Mark Salyzyne6ed68b2014-04-30 13:36:35 -0700820int main(int argc __unused, char **argv __unused) {
Colin Cross1a0d9be2014-07-14 14:31:15 -0700821 struct sched_param param = {
822 .sched_priority = 1,
823 };
824
Colin Crossb28ff912014-07-11 17:15:44 -0700825 mlockall(MCL_FUTURE);
Colin Cross1a0d9be2014-07-14 14:31:15 -0700826 sched_setscheduler(0, SCHED_FIFO, &param);
Todd Poynor3948f802013-07-09 19:35:14 -0700827 if (!init())
828 mainloop();
829
830 ALOGI("exiting");
831 return 0;
832}