![]() |
![]() |
|||||||||||||||||||||||||||||||
Society | Products | Services | Training | Support | Partners | News | Downloads |
||||||||||||||||||||||||||||||||
Linux temps réel embarqué et outils de développements | Technique | |||||||||||||||||||||||||||||||
|
OOM Killer for embedded Linux systemsWhat is oom killer?It is a way for Linux 2.6 to recover memory when the system lacks of (memory). The way the kernel do this is by killing a process to recover its memory. A routine, oom_kill() is called from memory management system when no memory is available to choose and kill a process. A routine, badness(), is called from select_bad_process itself called from out_of_memory() inside oom_kill.c to determine the process ability to be killed Problem with embedded systemsOn embedded systems, as on real-time systems, we want to be deterministic and may want to implement some kind of degraded mode or reconfiguration.
The actual implementation of oom killer implements a way to reduce the
badness of a process by seting the value of oomkilladj which
is used to reduce the badness of a process.
Proposed solution for embedded systems
The solution I propose is to add a new /proc/pid/oom_ranking value which can be
modified by a reconfiguration process.
The implementation is triggered by CONFIG_OOM_EMBEDDED The kernel hook is installed at the begining of the selec_bad_process()
I implemented the change with:
The difference with the use of (p->oomkilladj == OOM_DISABLE) is for degradded mode managment and reconfiguration issue. One can define different kind of processes:
Another variable, oom_reconfigure_wanted is incremented
when the oom_killer has been invoked.
Another change is the change of the call to panic() when no memory could
be recoverd to a call to reboot triggered by CONFIG_OOM_EMBEDDED_REBOOT:
If you do not use this option you can use to set panic_timeout to reboot the
system, this let you reboot more cleanly (if possible) and analyse
the crash with screen information or crash handler.
Where to find the patch?You can find the patch here: /downloads/oomkiller_embeddedsys.patch You can browse the modified code here:
|
![]()
|
|