blob: e722c6877faf39e1d900eb9792ff2c3813021b3c [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/mm/oom_kill.c
4 *
5 * Copyright (C) 1998,2000 Rik van Riel
6 * Thanks go out to Claus Fischer for some serious inspiration and
7 * for goading me into coding this file...
David Rientjesa63d83f2010-08-09 17:19:46 -07008 * Copyright (C) 2010 Google, Inc.
9 * Rewritten by David Rientjes
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 *
11 * The routines in this file are used to kill a process when
Paul Jacksona49335c2005-09-06 15:18:09 -070012 * we're seriously out of memory. This gets called from __alloc_pages()
13 * in mm/page_alloc.c when we really run out of memory.
Linus Torvalds1da177e2005-04-16 15:20:36 -070014 *
15 * Since we won't call these routines often (on a well-configured
16 * machine) this file will double as a 'coding guide' and a signpost
17 * for newbie kernel hackers. It features several pointers to major
18 * kernel subsystems and hints as to where to find out what things do.
19 */
20
Alexey Dobriyan8ac773b2006-10-19 23:28:32 -070021#include <linux/oom.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022#include <linux/mm.h>
Alexey Dobriyan4e950f62007-07-30 02:36:13 +040023#include <linux/err.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090024#include <linux/gfp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#include <linux/sched.h>
Ingo Molnar6e84f312017-02-08 18:51:29 +010026#include <linux/sched/mm.h>
Ingo Molnarf7ccbae2017-02-08 18:51:30 +010027#include <linux/sched/coredump.h>
Ingo Molnar29930022017-02-08 18:51:36 +010028#include <linux/sched/task.h>
David Rientjes8a7ff022020-01-30 22:14:26 -080029#include <linux/sched/debug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/swap.h>
Suren Baghdasaryan7fc3ac42021-09-02 15:00:29 -070031#include <linux/syscalls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032#include <linux/timex.h>
33#include <linux/jiffies.h>
Paul Jacksonef08e3b2005-09-06 15:18:13 -070034#include <linux/cpuset.h>
Paul Gortmakerb95f1b312011-10-16 02:01:52 -040035#include <linux/export.h>
Martin Schwidefsky8bc719d2006-09-25 23:31:20 -070036#include <linux/notifier.h>
Pavel Emelianovc7ba5c92008-02-07 00:13:58 -080037#include <linux/memcontrol.h>
David Rientjes6f48d0eb2010-08-09 17:18:52 -070038#include <linux/mempolicy.h>
David Howells5cd9c582008-08-14 11:37:28 +010039#include <linux/security.h>
David Rientjesedd45542011-03-22 16:30:12 -070040#include <linux/ptrace.h>
David Rientjesf660daa2011-10-31 17:07:07 -070041#include <linux/freezer.h>
KAMEZAWA Hiroyuki43d2b112012-01-10 15:08:09 -080042#include <linux/ftrace.h>
David Rientjesdc3f21e2012-03-21 16:33:47 -070043#include <linux/ratelimit.h>
Michal Hockoaac45362016-03-25 14:20:24 -070044#include <linux/kthread.h>
45#include <linux/init.h>
Michal Hocko4d4bbd82017-10-03 16:14:50 -070046#include <linux/mmu_notifier.h>
Michal Hockoaac45362016-03-25 14:20:24 -070047
48#include <asm/tlb.h>
49#include "internal.h"
Yang Shi852d8be2017-11-15 17:32:07 -080050#include "slab.h"
KAMEZAWA Hiroyuki43d2b112012-01-10 15:08:09 -080051
52#define CREATE_TRACE_POINTS
53#include <trace/events/oom.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070054
Prakash Gupta72488b32021-04-22 19:33:23 +053055#undef CREATE_TRACE_POINTS
56#include <trace/hooks/mm.h>
57
KAMEZAWA Hiroyukifadd8fb2006-06-23 02:03:13 -070058int sysctl_panic_on_oom;
David Rientjesfe071d72007-10-16 23:25:56 -070059int sysctl_oom_kill_allocating_task;
David Rientjesad915c42010-08-09 17:18:53 -070060int sysctl_oom_dump_tasks = 1;
Johannes Weinerdc564012015-06-24 16:57:19 -070061
Michal Hockoa195d3f2018-08-17 15:49:10 -070062/*
63 * Serializes oom killer invocations (out_of_memory()) from all contexts to
64 * prevent from over eager oom killing (e.g. when the oom killer is invoked
65 * from different domains).
66 *
67 * oom_killer_disable() relies on this lock to stabilize oom_killer_disabled
68 * and mark_oom_victim
69 */
Johannes Weinerdc564012015-06-24 16:57:19 -070070DEFINE_MUTEX(oom_lock);
Suren Baghdasaryan67197a42020-10-13 16:58:35 -070071/* Serializes oom_score_adj and oom_score_adj_min updates */
72DEFINE_MUTEX(oom_adj_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -070073
Shakeel Buttac311a12019-07-11 21:00:31 -070074static inline bool is_memcg_oom(struct oom_control *oc)
75{
76 return oc->memcg != NULL;
77}
78
David Rientjes6f48d0eb2010-08-09 17:18:52 -070079#ifdef CONFIG_NUMA
80/**
Shakeel Buttac311a12019-07-11 21:00:31 -070081 * oom_cpuset_eligible() - check task eligiblity for kill
Oleg Nesterovad9624412014-01-21 15:50:00 -080082 * @start: task struct of which task to consider
Yi Wangf364f062019-09-23 15:37:14 -070083 * @oc: pointer to struct oom_control
David Rientjes6f48d0eb2010-08-09 17:18:52 -070084 *
85 * Task eligibility is determined by whether or not a candidate task, @tsk,
86 * shares the same mempolicy nodes as current if it is bound by such a policy
87 * and whether or not it has the same set of allowed cpuset nodes.
Shakeel Buttac311a12019-07-11 21:00:31 -070088 *
89 * This function is assuming oom-killer context and 'current' has triggered
90 * the oom-killer.
KOSAKI Motohiro495789a2009-09-21 17:03:14 -070091 */
Shakeel Buttac311a12019-07-11 21:00:31 -070092static bool oom_cpuset_eligible(struct task_struct *start,
93 struct oom_control *oc)
KOSAKI Motohiro495789a2009-09-21 17:03:14 -070094{
Oleg Nesterovad9624412014-01-21 15:50:00 -080095 struct task_struct *tsk;
96 bool ret = false;
Shakeel Buttac311a12019-07-11 21:00:31 -070097 const nodemask_t *mask = oc->nodemask;
98
99 if (is_memcg_oom(oc))
100 return true;
KOSAKI Motohiro495789a2009-09-21 17:03:14 -0700101
Oleg Nesterovad9624412014-01-21 15:50:00 -0800102 rcu_read_lock();
Oleg Nesterov1da4db02014-01-21 15:49:58 -0800103 for_each_thread(start, tsk) {
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700104 if (mask) {
105 /*
106 * If this is a mempolicy constrained oom, tsk's
107 * cpuset is irrelevant. Only return true if its
108 * mempolicy intersects current, otherwise it may be
109 * needlessly killed.
110 */
Oleg Nesterovad9624412014-01-21 15:50:00 -0800111 ret = mempolicy_nodemask_intersects(tsk, mask);
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700112 } else {
113 /*
114 * This is not a mempolicy constrained oom, so only
115 * check the mems of tsk's cpuset.
116 */
Oleg Nesterovad9624412014-01-21 15:50:00 -0800117 ret = cpuset_mems_allowed_intersects(current, tsk);
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700118 }
Oleg Nesterovad9624412014-01-21 15:50:00 -0800119 if (ret)
120 break;
Oleg Nesterov1da4db02014-01-21 15:49:58 -0800121 }
Oleg Nesterovad9624412014-01-21 15:50:00 -0800122 rcu_read_unlock();
KOSAKI Motohirodf1090a2010-08-09 17:19:39 -0700123
Oleg Nesterovad9624412014-01-21 15:50:00 -0800124 return ret;
KOSAKI Motohiro495789a2009-09-21 17:03:14 -0700125}
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700126#else
Shakeel Buttac311a12019-07-11 21:00:31 -0700127static bool oom_cpuset_eligible(struct task_struct *tsk, struct oom_control *oc)
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700128{
129 return true;
130}
131#endif /* CONFIG_NUMA */
KOSAKI Motohiro495789a2009-09-21 17:03:14 -0700132
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700133/*
134 * The process p may have detached its own ->mm while exiting or through
Christoph Hellwigf5678e72020-06-10 18:42:06 -0700135 * kthread_use_mm(), but one or more of its subthreads may still have a valid
David Rientjes6f48d0eb2010-08-09 17:18:52 -0700136 * pointer. Return p, or any of its subthreads with a valid ->mm, with
137 * task_lock() held.
138 */
KAMEZAWA Hiroyuki158e0a22010-08-10 18:03:00 -0700139struct task_struct *find_lock_task_mm(struct task_struct *p)
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700140{
Oleg Nesterov1da4db02014-01-21 15:49:58 -0800141 struct task_struct *t;
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700142
Oleg Nesterov4d4048b2014-01-21 15:50:01 -0800143 rcu_read_lock();
144
Oleg Nesterov1da4db02014-01-21 15:49:58 -0800145 for_each_thread(p, t) {
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700146 task_lock(t);
147 if (likely(t->mm))
Oleg Nesterov4d4048b2014-01-21 15:50:01 -0800148 goto found;
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700149 task_unlock(t);
Oleg Nesterov1da4db02014-01-21 15:49:58 -0800150 }
Oleg Nesterov4d4048b2014-01-21 15:50:01 -0800151 t = NULL;
152found:
153 rcu_read_unlock();
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700154
Oleg Nesterov4d4048b2014-01-21 15:50:01 -0800155 return t;
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700156}
157
Yaowei Baidb2a0dd2015-11-06 16:28:06 -0800158/*
159 * order == -1 means the oom kill is required by sysrq, otherwise only
160 * for display purposes.
161 */
162static inline bool is_sysrq_oom(struct oom_control *oc)
163{
164 return oc->order == -1;
165}
166
KOSAKI Motohiroab290ad2010-08-09 17:19:35 -0700167/* return true if the task is not adequate as candidate victim task. */
Shakeel Buttac311a12019-07-11 21:00:31 -0700168static bool oom_unkillable_task(struct task_struct *p)
KOSAKI Motohiroab290ad2010-08-09 17:19:35 -0700169{
170 if (is_global_init(p))
171 return true;
172 if (p->flags & PF_KTHREAD)
173 return true;
KOSAKI Motohiroab290ad2010-08-09 17:19:35 -0700174 return false;
175}
176
Yang Shi852d8be2017-11-15 17:32:07 -0800177/*
178 * Print out unreclaimble slabs info when unreclaimable slabs amount is greater
179 * than all user memory (LRU pages)
180 */
181static bool is_dump_unreclaim_slabs(void)
182{
183 unsigned long nr_lru;
184
185 nr_lru = global_node_page_state(NR_ACTIVE_ANON) +
186 global_node_page_state(NR_INACTIVE_ANON) +
187 global_node_page_state(NR_ACTIVE_FILE) +
188 global_node_page_state(NR_INACTIVE_FILE) +
189 global_node_page_state(NR_ISOLATED_ANON) +
190 global_node_page_state(NR_ISOLATED_FILE) +
191 global_node_page_state(NR_UNEVICTABLE);
192
Roman Gushchind42f3242020-08-06 23:20:39 -0700193 return (global_node_page_state_pages(NR_SLAB_UNRECLAIMABLE_B) > nr_lru);
Yang Shi852d8be2017-11-15 17:32:07 -0800194}
195
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196/**
David Rientjesa63d83f2010-08-09 17:19:46 -0700197 * oom_badness - heuristic function to determine which candidate task to kill
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 * @p: task struct of which task we should calculate
David Rientjesa63d83f2010-08-09 17:19:46 -0700199 * @totalpages: total present RAM allowed for page allocation
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200 *
David Rientjesa63d83f2010-08-09 17:19:46 -0700201 * The heuristic for determining which task to kill is made to be as simple and
202 * predictable as possible. The goal is to return the highest value for the
203 * task consuming the most memory to avoid subsequent oom failures.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204 */
Yafang Shao9066e5c2020-08-11 18:31:22 -0700205long oom_badness(struct task_struct *p, unsigned long totalpages)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206{
David Rientjes1e11ad82012-06-08 13:21:26 -0700207 long points;
David Rientjes61eafb02012-06-20 12:52:58 -0700208 long adj;
KOSAKI Motohiro28b83c52009-09-21 17:03:13 -0700209
Shakeel Buttac311a12019-07-11 21:00:31 -0700210 if (oom_unkillable_task(p))
Yafang Shao9066e5c2020-08-11 18:31:22 -0700211 return LONG_MIN;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212
Oleg Nesterovdd8e8f42010-08-09 17:18:45 -0700213 p = find_lock_task_mm(p);
214 if (!p)
Yafang Shao9066e5c2020-08-11 18:31:22 -0700215 return LONG_MIN;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216
Michal Hockobb8a4b72016-05-20 16:57:18 -0700217 /*
218 * Do not even consider tasks which are explicitly marked oom
Michal Hockob18dc5f2016-07-28 15:44:46 -0700219 * unkillable or have been already oom reaped or the are in
220 * the middle of vfork
Michal Hockobb8a4b72016-05-20 16:57:18 -0700221 */
David Rientjesa9c58b902012-12-11 16:02:54 -0800222 adj = (long)p->signal->oom_score_adj;
Michal Hockobb8a4b72016-05-20 16:57:18 -0700223 if (adj == OOM_SCORE_ADJ_MIN ||
Michal Hocko862e3072016-10-07 16:58:57 -0700224 test_bit(MMF_OOM_SKIP, &p->mm->flags) ||
Michal Hockob18dc5f2016-07-28 15:44:46 -0700225 in_vfork(p)) {
Michal Hocko5aecc852011-11-15 14:36:07 -0800226 task_unlock(p);
Yafang Shao9066e5c2020-08-11 18:31:22 -0700227 return LONG_MIN;
Michal Hocko5aecc852011-11-15 14:36:07 -0800228 }
229
Linus Torvalds1da177e2005-04-16 15:20:36 -0700230 /*
David Rientjesa63d83f2010-08-09 17:19:46 -0700231 * The baseline for the badness score is the proportion of RAM that each
KOSAKI Motohirof755a042011-04-27 15:26:50 -0700232 * task's rss, pagetable and swap space use.
David Rientjesa63d83f2010-08-09 17:19:46 -0700233 */
Kirill A. Shutemovdc6c9a32015-02-11 15:26:50 -0800234 points = get_mm_rss(p->mm) + get_mm_counter(p->mm, MM_SWAPENTS) +
Kirill A. Shutemovaf5b0f62017-11-15 17:35:40 -0800235 mm_pgtables_bytes(p->mm) / PAGE_SIZE;
Andrew Morton97c2c9b82006-04-18 22:20:38 -0700236 task_unlock(p);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700237
David Rientjes61eafb02012-06-20 12:52:58 -0700238 /* Normalize to oom_score_adj units */
239 adj *= totalpages / 1000;
240 points += adj;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700241
Yafang Shao9066e5c2020-08-11 18:31:22 -0700242 return points;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243}
244
yuzhoujianef8444e2018-12-28 00:36:07 -0800245static const char * const oom_constraint_text[] = {
246 [CONSTRAINT_NONE] = "CONSTRAINT_NONE",
247 [CONSTRAINT_CPUSET] = "CONSTRAINT_CPUSET",
248 [CONSTRAINT_MEMORY_POLICY] = "CONSTRAINT_MEMORY_POLICY",
249 [CONSTRAINT_MEMCG] = "CONSTRAINT_MEMCG",
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700250};
251
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252/*
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800253 * Determine the type of allocation constraint.
254 */
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700255static enum oom_constraint constrained_alloc(struct oom_control *oc)
KAMEZAWA Hiroyuki4365a562009-12-15 16:45:33 -0800256{
Mel Gorman54a6eb52008-04-28 02:12:16 -0700257 struct zone *zone;
Mel Gormandd1a2392008-04-28 02:12:17 -0700258 struct zoneref *z;
Joonsoo Kim97a225e2020-06-03 15:59:01 -0700259 enum zone_type highest_zoneidx = gfp_zone(oc->gfp_mask);
David Rientjesa63d83f2010-08-09 17:19:46 -0700260 bool cpuset_limited = false;
261 int nid;
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800262
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700263 if (is_memcg_oom(oc)) {
Roman Gushchinbbec2e12018-06-07 17:06:18 -0700264 oc->totalpages = mem_cgroup_get_max(oc->memcg) ?: 1;
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700265 return CONSTRAINT_MEMCG;
266 }
267
David Rientjesa63d83f2010-08-09 17:19:46 -0700268 /* Default to all available memory */
Arun KSca79b0c2018-12-28 00:34:29 -0800269 oc->totalpages = totalram_pages() + total_swap_pages;
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700270
271 if (!IS_ENABLED(CONFIG_NUMA))
272 return CONSTRAINT_NONE;
David Rientjesa63d83f2010-08-09 17:19:46 -0700273
David Rientjes6e0fc462015-09-08 15:00:36 -0700274 if (!oc->zonelist)
David Rientjesa63d83f2010-08-09 17:19:46 -0700275 return CONSTRAINT_NONE;
KAMEZAWA Hiroyuki4365a562009-12-15 16:45:33 -0800276 /*
277 * Reach here only when __GFP_NOFAIL is used. So, we should avoid
278 * to kill current.We have to random task kill in this case.
279 * Hopefully, CONSTRAINT_THISNODE...but no way to handle it, now.
280 */
David Rientjes6e0fc462015-09-08 15:00:36 -0700281 if (oc->gfp_mask & __GFP_THISNODE)
KAMEZAWA Hiroyuki4365a562009-12-15 16:45:33 -0800282 return CONSTRAINT_NONE;
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800283
KAMEZAWA Hiroyuki4365a562009-12-15 16:45:33 -0800284 /*
David Rientjesa63d83f2010-08-09 17:19:46 -0700285 * This is not a __GFP_THISNODE allocation, so a truncated nodemask in
286 * the page allocator means a mempolicy is in effect. Cpuset policy
287 * is enforced in get_page_from_freelist().
KAMEZAWA Hiroyuki4365a562009-12-15 16:45:33 -0800288 */
David Rientjes6e0fc462015-09-08 15:00:36 -0700289 if (oc->nodemask &&
290 !nodes_subset(node_states[N_MEMORY], *oc->nodemask)) {
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700291 oc->totalpages = total_swap_pages;
David Rientjes6e0fc462015-09-08 15:00:36 -0700292 for_each_node_mask(nid, *oc->nodemask)
Michal Hocko1eb41bb02019-09-23 15:37:16 -0700293 oc->totalpages += node_present_pages(nid);
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800294 return CONSTRAINT_MEMORY_POLICY;
David Rientjesa63d83f2010-08-09 17:19:46 -0700295 }
KAMEZAWA Hiroyuki4365a562009-12-15 16:45:33 -0800296
297 /* Check this allocation failure is caused by cpuset's wall function */
David Rientjes6e0fc462015-09-08 15:00:36 -0700298 for_each_zone_zonelist_nodemask(zone, z, oc->zonelist,
Joonsoo Kim97a225e2020-06-03 15:59:01 -0700299 highest_zoneidx, oc->nodemask)
David Rientjes6e0fc462015-09-08 15:00:36 -0700300 if (!cpuset_zone_allowed(zone, oc->gfp_mask))
David Rientjesa63d83f2010-08-09 17:19:46 -0700301 cpuset_limited = true;
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800302
David Rientjesa63d83f2010-08-09 17:19:46 -0700303 if (cpuset_limited) {
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700304 oc->totalpages = total_swap_pages;
David Rientjesa63d83f2010-08-09 17:19:46 -0700305 for_each_node_mask(nid, cpuset_current_mems_allowed)
Michal Hocko1eb41bb02019-09-23 15:37:16 -0700306 oc->totalpages += node_present_pages(nid);
David Rientjesa63d83f2010-08-09 17:19:46 -0700307 return CONSTRAINT_CPUSET;
308 }
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800309 return CONSTRAINT_NONE;
310}
311
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700312static int oom_evaluate_task(struct task_struct *task, void *arg)
David Rientjes462607e2012-07-31 16:43:40 -0700313{
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700314 struct oom_control *oc = arg;
Yafang Shao9066e5c2020-08-11 18:31:22 -0700315 long points;
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700316
Shakeel Buttac311a12019-07-11 21:00:31 -0700317 if (oom_unkillable_task(task))
318 goto next;
319
320 /* p may not have freeable memory in nodemask */
321 if (!is_memcg_oom(oc) && !oom_cpuset_eligible(task, oc))
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700322 goto next;
David Rientjes462607e2012-07-31 16:43:40 -0700323
324 /*
325 * This task already has access to memory reserves and is being killed.
Michal Hockoa3739662016-07-28 15:45:01 -0700326 * Don't allow any other task to have access to the reserves unless
Michal Hocko862e3072016-10-07 16:58:57 -0700327 * the task has MMF_OOM_SKIP because chances that it would release
Michal Hockoa3739662016-07-28 15:45:01 -0700328 * any memory is quite low.
David Rientjes462607e2012-07-31 16:43:40 -0700329 */
Michal Hocko862e3072016-10-07 16:58:57 -0700330 if (!is_sysrq_oom(oc) && tsk_is_oom_victim(task)) {
331 if (test_bit(MMF_OOM_SKIP, &task->signal->oom_mm->flags))
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700332 goto next;
333 goto abort;
Michal Hockoa3739662016-07-28 15:45:01 -0700334 }
David Rientjes462607e2012-07-31 16:43:40 -0700335
David Rientjese1e12d22012-12-11 16:02:56 -0800336 /*
337 * If task is allocating a lot of memory and has been marked to be
338 * killed first if it triggers an oom, then select it.
339 */
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700340 if (oom_task_origin(task)) {
Yafang Shao9066e5c2020-08-11 18:31:22 -0700341 points = LONG_MAX;
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700342 goto select;
343 }
David Rientjese1e12d22012-12-11 16:02:56 -0800344
Shakeel Buttac311a12019-07-11 21:00:31 -0700345 points = oom_badness(task, oc->totalpages);
Chris Goldsworthy91ce4822021-01-05 14:57:00 -0800346
347 if (points == LONG_MIN)
348 goto next;
349
350 /*
351 * Check to see if this is the worst task with a non-negative
352 * ADJ score seen so far
353 */
354 if (task->signal->oom_score_adj >= 0 &&
355 points > oc->chosen_non_negative_adj_points) {
356 if (oc->chosen_non_negative_adj)
357 put_task_struct(oc->chosen_non_negative_adj);
358 get_task_struct(task);
359 oc->chosen_non_negative_adj = task;
360 oc->chosen_non_negative_adj_points = points;
361 }
362
363 if (points < oc->chosen_points)
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700364 goto next;
365
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700366select:
367 if (oc->chosen)
368 put_task_struct(oc->chosen);
369 get_task_struct(task);
370 oc->chosen = task;
371 oc->chosen_points = points;
372next:
373 return 0;
374abort:
Chris Goldsworthy91ce4822021-01-05 14:57:00 -0800375 if (oc->chosen_non_negative_adj)
376 put_task_struct(oc->chosen_non_negative_adj);
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700377 if (oc->chosen)
378 put_task_struct(oc->chosen);
Suren Baghdasaryanb9b45822021-02-23 12:11:51 -0800379 oc->chosen_non_negative_adj = NULL;
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700380 oc->chosen = (void *)-1UL;
381 return 1;
David Rientjes462607e2012-07-31 16:43:40 -0700382}
383
Christoph Lameter9b0f8b02006-02-20 18:27:52 -0800384/*
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700385 * Simple selection loop. We choose the process with the highest number of
386 * 'points'. In case scan was aborted, oc->chosen is set to -1.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 */
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700388static void select_bad_process(struct oom_control *oc)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700389{
Yafang Shao9066e5c2020-08-11 18:31:22 -0700390 oc->chosen_points = LONG_MIN;
Chris Goldsworthy91ce4822021-01-05 14:57:00 -0800391 oc->chosen_non_negative_adj_points = LONG_MIN;
392 oc->chosen_non_negative_adj = NULL;
Yafang Shao9066e5c2020-08-11 18:31:22 -0700393
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700394 if (is_memcg_oom(oc))
395 mem_cgroup_scan_tasks(oc->memcg, oom_evaluate_task, oc);
396 else {
397 struct task_struct *p;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700399 rcu_read_lock();
400 for_each_process(p)
401 if (oom_evaluate_task(p, oc))
402 break;
403 rcu_read_unlock();
Oleg Nesterov1da4db02014-01-21 15:49:58 -0800404 }
Chris Goldsworthy91ce4822021-01-05 14:57:00 -0800405
406 if (oc->chosen_non_negative_adj) {
407 /*
408 * If oc->chosen has a negative ADJ, and we found a task with
409 * a postive ADJ to kill, kill the task with the positive ADJ
410 * instead.
411 */
Suren Baghdasaryanb9b45822021-02-23 12:11:51 -0800412 if (oc->chosen && oc->chosen->signal->oom_score_adj < 0) {
Chris Goldsworthy91ce4822021-01-05 14:57:00 -0800413 put_task_struct(oc->chosen);
414 oc->chosen = oc->chosen_non_negative_adj;
415 oc->chosen_points = oc->chosen_non_negative_adj_points;
416 } else
417 put_task_struct(oc->chosen_non_negative_adj);
418 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419}
420
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700421static int dump_task(struct task_struct *p, void *arg)
422{
423 struct oom_control *oc = arg;
424 struct task_struct *task;
425
Shakeel Buttac311a12019-07-11 21:00:31 -0700426 if (oom_unkillable_task(p))
427 return 0;
428
429 /* p may not have freeable memory in nodemask */
430 if (!is_memcg_oom(oc) && !oom_cpuset_eligible(p, oc))
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700431 return 0;
432
433 task = find_lock_task_mm(p);
434 if (!task) {
435 /*
436 * This is a kthread or all of p's threads have already
437 * detached their mm's. There's no need to report
438 * them; they can't be oom killed anyway.
439 */
440 return 0;
441 }
442
443 pr_info("[%7d] %5d %5d %8lu %8lu %8ld %8lu %5hd %s\n",
444 task->pid, from_kuid(&init_user_ns, task_uid(task)),
445 task->tgid, task->mm->total_vm, get_mm_rss(task->mm),
446 mm_pgtables_bytes(task->mm),
447 get_mm_counter(task->mm, MM_SWAPENTS),
448 task->signal->oom_score_adj, task->comm);
449 task_unlock(task);
450
451 return 0;
452}
453
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454/**
Randy Dunlap1b578df2008-03-19 17:00:42 -0700455 * dump_tasks - dump current memory state of all system tasks
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700456 * @oc: pointer to struct oom_control
Randy Dunlap1b578df2008-03-19 17:00:42 -0700457 *
David Rientjese85bfd32010-09-22 13:05:10 -0700458 * Dumps the current memory state of all eligible tasks. Tasks not in the same
459 * memcg, not in the same cpuset, or bound to a disjoint set of mempolicy nodes
460 * are not shown.
Kirill A. Shutemovaf5b0f62017-11-15 17:35:40 -0800461 * State information includes task's pid, uid, tgid, vm size, rss,
462 * pgtables_bytes, swapents, oom_score_adj value, and name.
David Rientjesfef1bdd2008-02-07 00:14:07 -0800463 */
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700464static void dump_tasks(struct oom_control *oc)
David Rientjesfef1bdd2008-02-07 00:14:07 -0800465{
Rodrigo Freirec3b78b12018-08-21 21:52:41 -0700466 pr_info("Tasks state (memory values in pages):\n");
467 pr_info("[ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name\n");
David Rientjesfef1bdd2008-02-07 00:14:07 -0800468
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700469 if (is_memcg_oom(oc))
470 mem_cgroup_scan_tasks(oc->memcg, dump_task, oc);
471 else {
472 struct task_struct *p;
KOSAKI Motohiroc55db952010-08-09 17:18:46 -0700473
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700474 rcu_read_lock();
475 for_each_process(p)
476 dump_task(p, oc);
477 rcu_read_unlock();
KOSAKI Motohiroc55db952010-08-09 17:18:46 -0700478 }
David Rientjesfef1bdd2008-02-07 00:14:07 -0800479}
480
yuzhoujianef8444e2018-12-28 00:36:07 -0800481static void dump_oom_summary(struct oom_control *oc, struct task_struct *victim)
482{
483 /* one line summary of the oom killer context. */
484 pr_info("oom-kill:constraint=%s,nodemask=%*pbl",
485 oom_constraint_text[oc->constraint],
486 nodemask_pr_args(oc->nodemask));
487 cpuset_print_current_mems_allowed();
yuzhoujianf0c867d2018-12-28 00:36:10 -0800488 mem_cgroup_print_oom_context(oc->memcg, victim);
yuzhoujianef8444e2018-12-28 00:36:07 -0800489 pr_cont(",task=%s,pid=%d,uid=%d\n", victim->comm, victim->pid,
490 from_kuid(&init_user_ns, task_uid(victim)));
491}
492
Vladimir Davydov2a966b72016-07-26 15:22:33 -0700493static void dump_header(struct oom_control *oc, struct task_struct *p)
David Rientjes1b604d72009-12-14 17:57:47 -0800494{
yuzhoujianef8444e2018-12-28 00:36:07 -0800495 pr_warn("%s invoked oom-killer: gfp_mask=%#x(%pGg), order=%d, oom_score_adj=%hd\n",
496 current->comm, oc->gfp_mask, &oc->gfp_mask, oc->order,
Michal Hocko0205f752017-11-15 17:39:14 -0800497 current->signal->oom_score_adj);
Michal Hocko92549902016-10-07 16:59:33 -0700498 if (!IS_ENABLED(CONFIG_COMPACTION) && oc->order)
499 pr_warn("COMPACTION is disabled!!!\n");
Vlastimil Babkaa0795cd2016-03-15 14:56:05 -0700500
David Rientjes1b604d72009-12-14 17:57:47 -0800501 dump_stack();
Yang Shi852d8be2017-11-15 17:32:07 -0800502 if (is_memcg_oom(oc))
yuzhoujianf0c867d2018-12-28 00:36:10 -0800503 mem_cgroup_print_oom_meminfo(oc->memcg);
Yang Shi852d8be2017-11-15 17:32:07 -0800504 else {
David Rientjes299c5172017-02-24 14:55:42 -0800505 show_mem(SHOW_MEM_FILTER_NODES, oc->nodemask);
Yang Shi852d8be2017-11-15 17:32:07 -0800506 if (is_dump_unreclaim_slabs())
507 dump_unreclaimable_slab();
508 }
David Rientjes1b604d72009-12-14 17:57:47 -0800509 if (sysctl_oom_dump_tasks)
Shakeel Butt5eee7e12019-07-11 21:00:23 -0700510 dump_tasks(oc);
yuzhoujianef8444e2018-12-28 00:36:07 -0800511 if (p)
512 dump_oom_summary(oc, p);
David Rientjes1b604d72009-12-14 17:57:47 -0800513}
514
Michal Hocko5695be12014-10-20 18:12:32 +0200515/*
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800516 * Number of OOM victims in flight
Michal Hocko5695be12014-10-20 18:12:32 +0200517 */
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800518static atomic_t oom_victims = ATOMIC_INIT(0);
519static DECLARE_WAIT_QUEUE_HEAD(oom_victims_wait);
Michal Hocko5695be12014-10-20 18:12:32 +0200520
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700521static bool oom_killer_disabled __read_mostly;
Michal Hocko5695be12014-10-20 18:12:32 +0200522
Michal Hockobc448e82016-03-25 14:20:30 -0700523#define K(x) ((x) << (PAGE_SHIFT-10))
524
Michal Hocko3ef22df2016-05-19 17:13:12 -0700525/*
526 * task->mm can be NULL if the task is the exited group leader. So to
527 * determine whether the task is using a particular mm, we examine all the
528 * task's threads: if one of those is using this mm then this task was also
529 * using it.
530 */
Michal Hocko44a70ade2016-07-28 15:44:43 -0700531bool process_shares_mm(struct task_struct *p, struct mm_struct *mm)
Michal Hocko3ef22df2016-05-19 17:13:12 -0700532{
533 struct task_struct *t;
534
535 for_each_thread(p, t) {
536 struct mm_struct *t_mm = READ_ONCE(t->mm);
537 if (t_mm)
538 return t_mm == mm;
539 }
540 return false;
541}
542
Michal Hockoaac45362016-03-25 14:20:24 -0700543#ifdef CONFIG_MMU
544/*
545 * OOM Reaper kernel thread which tries to reap the memory used by the OOM
546 * victim (if that is possible) to help the OOM killer to move on.
547 */
548static struct task_struct *oom_reaper_th;
Michal Hockoaac45362016-03-25 14:20:24 -0700549static DECLARE_WAIT_QUEUE_HEAD(oom_reaper_wait);
Vladimir Davydov29c696e2016-03-25 14:20:39 -0700550static struct task_struct *oom_reaper_list;
Michal Hocko03049262016-03-25 14:20:33 -0700551static DEFINE_SPINLOCK(oom_reaper_lock);
552
Michal Hocko93065ac2018-08-21 21:52:33 -0700553bool __oom_reap_task_mm(struct mm_struct *mm)
Michal Hockoaac45362016-03-25 14:20:24 -0700554{
Michal Hockoaac45362016-03-25 14:20:24 -0700555 struct vm_area_struct *vma;
Michal Hocko93065ac2018-08-21 21:52:33 -0700556 bool ret = true;
David Rientjes27ae3572018-05-11 16:02:04 -0700557
558 /*
559 * Tell all users of get_user/copy_from_user etc... that the content
560 * is no longer stable. No barriers really needed because unmapping
561 * should imply barriers already and the reader would hit a page fault
562 * if it stumbled over a reaped memory.
563 */
564 set_bit(MMF_UNSTABLE, &mm->flags);
565
566 for (vma = mm->mmap ; vma; vma = vma->vm_next) {
Minchan Kim9c276cc2019-09-25 16:49:08 -0700567 if (!can_madv_lru_vma(vma))
David Rientjes27ae3572018-05-11 16:02:04 -0700568 continue;
569
570 /*
571 * Only anonymous pages have a good chance to be dropped
572 * without additional steps which we cannot afford as we
573 * are OOM already.
574 *
575 * We do not even care about fs backed pages because all
576 * which are reclaimable have already been reclaimed and
577 * we do not want to block exit_mmap by keeping mm ref
578 * count elevated without a good reason.
579 */
580 if (vma_is_anonymous(vma) || !(vma->vm_flags & VM_SHARED)) {
Jérôme Glisseac46d4f2018-12-28 00:38:09 -0800581 struct mmu_notifier_range range;
David Rientjes27ae3572018-05-11 16:02:04 -0700582 struct mmu_gather tlb;
583
Jérôme Glisse6f4f13e2019-05-13 17:20:49 -0700584 mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0,
585 vma, mm, vma->vm_start,
Jérôme Glisseac46d4f2018-12-28 00:38:09 -0800586 vma->vm_end);
587 tlb_gather_mmu(&tlb, mm, range.start, range.end);
588 if (mmu_notifier_invalidate_range_start_nonblock(&range)) {
589 tlb_finish_mmu(&tlb, range.start, range.end);
Michal Hocko93065ac2018-08-21 21:52:33 -0700590 ret = false;
591 continue;
592 }
Jérôme Glisseac46d4f2018-12-28 00:38:09 -0800593 unmap_page_range(&tlb, vma, range.start, range.end, NULL);
594 mmu_notifier_invalidate_range_end(&range);
595 tlb_finish_mmu(&tlb, range.start, range.end);
David Rientjes27ae3572018-05-11 16:02:04 -0700596 }
597 }
Michal Hocko93065ac2018-08-21 21:52:33 -0700598
599 return ret;
David Rientjes27ae3572018-05-11 16:02:04 -0700600}
601
Michal Hocko431f42fd2018-08-21 21:52:45 -0700602/*
603 * Reaps the address space of the give task.
604 *
605 * Returns true on success and false if none or part of the address space
606 * has been reclaimed and the caller should retry later.
607 */
David Rientjes27ae3572018-05-11 16:02:04 -0700608static bool oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm)
609{
Michal Hockoaac45362016-03-25 14:20:24 -0700610 bool ret = true;
611
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700612 if (!mmap_read_trylock(mm)) {
Roman Gushchin422580c2017-07-10 15:49:05 -0700613 trace_skip_task_reaping(tsk->pid);
Michal Hockoaf5679f2018-08-21 21:52:37 -0700614 return false;
Michal Hocko4d4bbd82017-10-03 16:14:50 -0700615 }
616
617 /*
Andrea Arcangeli21292582017-09-06 16:25:00 -0700618 * MMF_OOM_SKIP is set by exit_mmap when the OOM reaper can't
619 * work on the mm anymore. The check for MMF_OOM_SKIP must run
Michel Lespinasse3e4e28c2020-06-08 21:33:51 -0700620 * under mmap_lock for reading because it serializes against the
621 * mmap_write_lock();mmap_write_unlock() cycle in exit_mmap().
Michal Hockoe5e3f4c2016-07-26 15:24:50 -0700622 */
Andrea Arcangeli21292582017-09-06 16:25:00 -0700623 if (test_bit(MMF_OOM_SKIP, &mm->flags)) {
Roman Gushchin422580c2017-07-10 15:49:05 -0700624 trace_skip_task_reaping(tsk->pid);
Michal Hocko431f42fd2018-08-21 21:52:45 -0700625 goto out_unlock;
Michal Hockoaac45362016-03-25 14:20:24 -0700626 }
627
Roman Gushchin422580c2017-07-10 15:49:05 -0700628 trace_start_task_reaping(tsk->pid);
629
Michal Hocko93065ac2018-08-21 21:52:33 -0700630 /* failed to reap part of the address space. Try again later */
Michal Hocko431f42fd2018-08-21 21:52:45 -0700631 ret = __oom_reap_task_mm(mm);
632 if (!ret)
633 goto out_finish;
Michal Hocko3f70dc32016-10-07 16:59:06 -0700634
Michal Hockobc448e82016-03-25 14:20:30 -0700635 pr_info("oom_reaper: reaped process %d (%s), now anon-rss:%lukB, file-rss:%lukB, shmem-rss:%lukB\n",
636 task_pid_nr(tsk), tsk->comm,
637 K(get_mm_counter(mm, MM_ANONPAGES)),
638 K(get_mm_counter(mm, MM_FILEPAGES)),
639 K(get_mm_counter(mm, MM_SHMEMPAGES)));
Michal Hocko431f42fd2018-08-21 21:52:45 -0700640out_finish:
641 trace_finish_task_reaping(tsk->pid);
642out_unlock:
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700643 mmap_read_unlock(mm);
Michal Hocko36324a92016-03-25 14:20:27 -0700644
Michal Hockoaac45362016-03-25 14:20:24 -0700645 return ret;
646}
647
Michal Hockobc448e82016-03-25 14:20:30 -0700648#define MAX_OOM_REAP_RETRIES 10
Michal Hocko36324a92016-03-25 14:20:27 -0700649static void oom_reap_task(struct task_struct *tsk)
Michal Hockoaac45362016-03-25 14:20:24 -0700650{
651 int attempts = 0;
Michal Hocko26db62f2016-10-07 16:58:51 -0700652 struct mm_struct *mm = tsk->signal->oom_mm;
Michal Hockoaac45362016-03-25 14:20:24 -0700653
Michel Lespinasse3e4e28c2020-06-08 21:33:51 -0700654 /* Retry the mmap_read_trylock(mm) a few times */
David Rientjes27ae3572018-05-11 16:02:04 -0700655 while (attempts++ < MAX_OOM_REAP_RETRIES && !oom_reap_task_mm(tsk, mm))
Michal Hockoaac45362016-03-25 14:20:24 -0700656 schedule_timeout_idle(HZ/10);
657
Tetsuo Handa97b12552018-04-05 16:25:45 -0700658 if (attempts <= MAX_OOM_REAP_RETRIES ||
659 test_bit(MMF_OOM_SKIP, &mm->flags))
Tetsuo Handa7ebffa42016-10-07 16:58:45 -0700660 goto done;
Michal Hocko11a410d2016-07-28 15:44:58 -0700661
Tetsuo Handa7ebffa42016-10-07 16:58:45 -0700662 pr_info("oom_reaper: unable to reap pid:%d (%s)\n",
663 task_pid_nr(tsk), tsk->comm);
David Rientjes8a7ff022020-01-30 22:14:26 -0800664 sched_show_task(tsk);
Tetsuo Handa7ebffa42016-10-07 16:58:45 -0700665 debug_show_all_locks();
Michal Hockobc448e82016-03-25 14:20:30 -0700666
Tetsuo Handa7ebffa42016-10-07 16:58:45 -0700667done:
Michal Hocko449d7772016-05-19 17:13:15 -0700668 tsk->oom_reaper_list = NULL;
Michal Hocko449d7772016-05-19 17:13:15 -0700669
Michal Hocko26db62f2016-10-07 16:58:51 -0700670 /*
671 * Hide this mm from OOM killer because it has been either reaped or
Michel Lespinasse3e4e28c2020-06-08 21:33:51 -0700672 * somebody can't call mmap_write_unlock(mm).
Michal Hocko26db62f2016-10-07 16:58:51 -0700673 */
Michal Hocko862e3072016-10-07 16:58:57 -0700674 set_bit(MMF_OOM_SKIP, &mm->flags);
Michal Hocko26db62f2016-10-07 16:58:51 -0700675
Michal Hockoaac45362016-03-25 14:20:24 -0700676 /* Drop a reference taken by wake_oom_reaper */
Michal Hocko36324a92016-03-25 14:20:27 -0700677 put_task_struct(tsk);
Michal Hockoaac45362016-03-25 14:20:24 -0700678}
679
680static int oom_reaper(void *unused)
681{
682 while (true) {
Michal Hocko03049262016-03-25 14:20:33 -0700683 struct task_struct *tsk = NULL;
Michal Hockoaac45362016-03-25 14:20:24 -0700684
Vladimir Davydov29c696e2016-03-25 14:20:39 -0700685 wait_event_freezable(oom_reaper_wait, oom_reaper_list != NULL);
Michal Hocko03049262016-03-25 14:20:33 -0700686 spin_lock(&oom_reaper_lock);
Vladimir Davydov29c696e2016-03-25 14:20:39 -0700687 if (oom_reaper_list != NULL) {
688 tsk = oom_reaper_list;
689 oom_reaper_list = tsk->oom_reaper_list;
Michal Hocko03049262016-03-25 14:20:33 -0700690 }
691 spin_unlock(&oom_reaper_lock);
692
693 if (tsk)
694 oom_reap_task(tsk);
Michal Hockoaac45362016-03-25 14:20:24 -0700695 }
696
697 return 0;
698}
699
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700700static void wake_oom_reaper(struct task_struct *tsk)
Michal Hockoaac45362016-03-25 14:20:24 -0700701{
Tetsuo Handa9bcdeb52019-02-01 14:20:31 -0800702 /* mm is already queued? */
703 if (test_and_set_bit(MMF_OOM_REAP_QUEUED, &tsk->signal->oom_mm->flags))
Michal Hockoaac45362016-03-25 14:20:24 -0700704 return;
705
Michal Hocko36324a92016-03-25 14:20:27 -0700706 get_task_struct(tsk);
Michal Hockoaac45362016-03-25 14:20:24 -0700707
Michal Hocko03049262016-03-25 14:20:33 -0700708 spin_lock(&oom_reaper_lock);
Vladimir Davydov29c696e2016-03-25 14:20:39 -0700709 tsk->oom_reaper_list = oom_reaper_list;
710 oom_reaper_list = tsk;
Michal Hocko03049262016-03-25 14:20:33 -0700711 spin_unlock(&oom_reaper_lock);
Roman Gushchin422580c2017-07-10 15:49:05 -0700712 trace_wake_reaper(tsk->pid);
Michal Hocko03049262016-03-25 14:20:33 -0700713 wake_up(&oom_reaper_wait);
Michal Hockoaac45362016-03-25 14:20:24 -0700714}
715
716static int __init oom_init(void)
717{
718 oom_reaper_th = kthread_run(oom_reaper, NULL, "oom_reaper");
Michal Hockoaac45362016-03-25 14:20:24 -0700719 return 0;
720}
721subsys_initcall(oom_init)
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700722#else
723static inline void wake_oom_reaper(struct task_struct *tsk)
724{
725}
726#endif /* CONFIG_MMU */
Michal Hockoaac45362016-03-25 14:20:24 -0700727
Michal Hocko49550b62015-02-11 15:26:12 -0800728/**
Charan Teja Reddy3bcdb492021-06-02 17:33:03 +0530729 * tsk->mm has to be non NULL and caller has to guarantee it is stable (either
730 * under task_lock or operate on the current).
731 */
732static void __mark_oom_victim(struct task_struct *tsk)
733{
734 struct mm_struct *mm = tsk->mm;
735
736 if (!cmpxchg(&tsk->signal->oom_mm, NULL, mm)) {
737 mmgrab(tsk->signal->oom_mm);
738 set_bit(MMF_OOM_VICTIM, &mm->flags);
739 }
740}
741
742/**
Johannes Weiner16e95192015-06-24 16:57:07 -0700743 * mark_oom_victim - mark the given task as OOM victim
Michal Hocko49550b62015-02-11 15:26:12 -0800744 * @tsk: task to mark
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800745 *
Johannes Weinerdc564012015-06-24 16:57:19 -0700746 * Has to be called with oom_lock held and never after
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800747 * oom has been disabled already.
Michal Hocko26db62f2016-10-07 16:58:51 -0700748 *
749 * tsk->mm has to be non NULL and caller has to guarantee it is stable (either
750 * under task_lock or operate on the current).
Michal Hocko49550b62015-02-11 15:26:12 -0800751 */
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700752static void mark_oom_victim(struct task_struct *tsk)
Michal Hocko49550b62015-02-11 15:26:12 -0800753{
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800754 WARN_ON(oom_killer_disabled);
755 /* OOM killer might race with memcg OOM */
756 if (test_and_set_tsk_thread_flag(tsk, TIF_MEMDIE))
757 return;
Michal Hocko26db62f2016-10-07 16:58:51 -0700758
Michal Hocko26db62f2016-10-07 16:58:51 -0700759 /* oom_mm is bound to the signal struct life time. */
Charan Teja Reddy3bcdb492021-06-02 17:33:03 +0530760 __mark_oom_victim(tsk);
Michal Hocko26db62f2016-10-07 16:58:51 -0700761
Michal Hocko63a8ca92015-02-11 15:26:15 -0800762 /*
763 * Make sure that the task is woken up from uninterruptible sleep
764 * if it is frozen because OOM killer wouldn't be able to free
765 * any memory and livelock. freezing_slow_path will tell the freezer
766 * that TIF_MEMDIE tasks should be ignored.
767 */
768 __thaw_task(tsk);
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800769 atomic_inc(&oom_victims);
Roman Gushchin422580c2017-07-10 15:49:05 -0700770 trace_mark_victim(tsk->pid);
Michal Hocko49550b62015-02-11 15:26:12 -0800771}
772
773/**
Johannes Weiner16e95192015-06-24 16:57:07 -0700774 * exit_oom_victim - note the exit of an OOM victim
Michal Hocko49550b62015-02-11 15:26:12 -0800775 */
Tetsuo Handa38531202016-10-07 16:59:03 -0700776void exit_oom_victim(void)
Michal Hocko49550b62015-02-11 15:26:12 -0800777{
Tetsuo Handa38531202016-10-07 16:59:03 -0700778 clear_thread_flag(TIF_MEMDIE);
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800779
Johannes Weinerc38f1022015-06-24 16:57:13 -0700780 if (!atomic_dec_return(&oom_victims))
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800781 wake_up_all(&oom_victims_wait);
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800782}
783
784/**
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700785 * oom_killer_enable - enable OOM killer
786 */
787void oom_killer_enable(void)
788{
789 oom_killer_disabled = false;
Michal Hockod75da002017-05-03 14:54:57 -0700790 pr_info("OOM killer enabled.\n");
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700791}
792
793/**
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800794 * oom_killer_disable - disable OOM killer
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700795 * @timeout: maximum timeout to wait for oom victims in jiffies
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800796 *
797 * Forces all page allocations to fail rather than trigger OOM killer.
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700798 * Will block and wait until all OOM victims are killed or the given
799 * timeout expires.
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800800 *
801 * The function cannot be called when there are runnable user tasks because
802 * the userspace would see unexpected allocation failures as a result. Any
803 * new usage of this function should be consulted with MM people.
804 *
805 * Returns true if successful and false if the OOM killer cannot be
806 * disabled.
807 */
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700808bool oom_killer_disable(signed long timeout)
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800809{
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700810 signed long ret;
811
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800812 /*
Tetsuo Handa6afcf282016-03-17 14:20:45 -0700813 * Make sure to not race with an ongoing OOM killer. Check that the
814 * current is not killed (possibly due to sharing the victim's memory).
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800815 */
Tetsuo Handa6afcf282016-03-17 14:20:45 -0700816 if (mutex_lock_killable(&oom_lock))
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800817 return false;
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800818 oom_killer_disabled = true;
Johannes Weinerdc564012015-06-24 16:57:19 -0700819 mutex_unlock(&oom_lock);
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800820
Michal Hocko7d2e7a22016-10-07 16:59:00 -0700821 ret = wait_event_interruptible_timeout(oom_victims_wait,
822 !atomic_read(&oom_victims), timeout);
823 if (ret <= 0) {
824 oom_killer_enable();
825 return false;
826 }
Michal Hockod75da002017-05-03 14:54:57 -0700827 pr_info("OOM killer disabled.\n");
Michal Hockoc32b3cb2015-02-11 15:26:24 -0800828
829 return true;
830}
831
Michal Hocko1af8bb42016-07-28 15:44:52 -0700832static inline bool __task_will_free_mem(struct task_struct *task)
833{
834 struct signal_struct *sig = task->signal;
835
836 /*
837 * A coredumping process may sleep for an extended period in exit_mm(),
838 * so the oom killer cannot assume that the process will promptly exit
839 * and release memory.
840 */
841 if (sig->flags & SIGNAL_GROUP_COREDUMP)
842 return false;
843
844 if (sig->flags & SIGNAL_GROUP_EXIT)
845 return true;
846
847 if (thread_group_empty(task) && (task->flags & PF_EXITING))
848 return true;
849
850 return false;
851}
852
853/*
854 * Checks whether the given task is dying or exiting and likely to
855 * release its address space. This means that all threads and processes
856 * sharing the same mm have to be killed or exiting.
Michal Hocko091f3622016-07-28 15:45:04 -0700857 * Caller has to make sure that task->mm is stable (hold task_lock or
858 * it operates on the current).
Michal Hocko1af8bb42016-07-28 15:44:52 -0700859 */
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -0700860static bool task_will_free_mem(struct task_struct *task)
Michal Hocko1af8bb42016-07-28 15:44:52 -0700861{
Michal Hocko091f3622016-07-28 15:45:04 -0700862 struct mm_struct *mm = task->mm;
Michal Hocko1af8bb42016-07-28 15:44:52 -0700863 struct task_struct *p;
Geert Uytterhoevenf33e6f02016-08-11 15:33:09 -0700864 bool ret = true;
Michal Hocko1af8bb42016-07-28 15:44:52 -0700865
Michal Hocko091f3622016-07-28 15:45:04 -0700866 /*
867 * Skip tasks without mm because it might have passed its exit_mm and
868 * exit_oom_victim. oom_reaper could have rescued that but do not rely
869 * on that for now. We can consider find_lock_task_mm in future.
870 */
871 if (!mm)
872 return false;
873
Michal Hocko1af8bb42016-07-28 15:44:52 -0700874 if (!__task_will_free_mem(task))
875 return false;
876
877 /*
Michal Hocko696453e2016-07-28 15:44:55 -0700878 * This task has already been drained by the oom reaper so there are
879 * only small chances it will free some more
880 */
Michal Hocko862e3072016-10-07 16:58:57 -0700881 if (test_bit(MMF_OOM_SKIP, &mm->flags))
Michal Hocko696453e2016-07-28 15:44:55 -0700882 return false;
Michal Hocko696453e2016-07-28 15:44:55 -0700883
Michal Hocko091f3622016-07-28 15:45:04 -0700884 if (atomic_read(&mm->mm_users) <= 1)
Michal Hocko1af8bb42016-07-28 15:44:52 -0700885 return true;
Michal Hocko1af8bb42016-07-28 15:44:52 -0700886
887 /*
Michal Hocko5870c2e2016-10-07 16:57:32 -0700888 * Make sure that all tasks which share the mm with the given tasks
889 * are dying as well to make sure that a) nobody pins its mm and
890 * b) the task is also reapable by the oom reaper.
Michal Hocko1af8bb42016-07-28 15:44:52 -0700891 */
892 rcu_read_lock();
893 for_each_process(p) {
894 if (!process_shares_mm(p, mm))
895 continue;
896 if (same_thread_group(task, p))
897 continue;
898 ret = __task_will_free_mem(p);
899 if (!ret)
900 break;
901 }
902 rcu_read_unlock();
Michal Hocko1af8bb42016-07-28 15:44:52 -0700903
904 return ret;
905}
906
Shakeel Buttbbbe4802019-03-05 15:46:12 -0800907static void __oom_kill_process(struct task_struct *victim, const char *message)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700908{
Roman Gushchin5989ad72018-08-21 21:53:50 -0700909 struct task_struct *p;
David Rientjes647f2bd2012-03-21 16:33:46 -0700910 struct mm_struct *mm;
Tetsuo Handabb299022016-03-25 14:20:44 -0700911 bool can_oom_reap = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700912
David Rientjes6b0c81b2012-07-31 16:43:45 -0700913 p = find_lock_task_mm(victim);
914 if (!p) {
Yafang Shao619b5b42020-08-11 18:31:32 -0700915 pr_info("%s: OOM victim %d (%s) is already exiting. Skip killing the task\n",
916 message, task_pid_nr(victim), victim->comm);
David Rientjes6b0c81b2012-07-31 16:43:45 -0700917 put_task_struct(victim);
David Rientjes647f2bd2012-03-21 16:33:46 -0700918 return;
David Rientjes6b0c81b2012-07-31 16:43:45 -0700919 } else if (victim != p) {
920 get_task_struct(p);
921 put_task_struct(victim);
922 victim = p;
923 }
David Rientjes647f2bd2012-03-21 16:33:46 -0700924
Tetsuo Handa880b7682015-11-05 18:47:51 -0800925 /* Get a reference to safely compare mm after task_unlock(victim) */
David Rientjes647f2bd2012-03-21 16:33:46 -0700926 mm = victim->mm;
Vegard Nossumf1f10072017-02-27 14:30:07 -0800927 mmgrab(mm);
Konstantin Khlebnikov8e675f72017-07-06 15:40:28 -0700928
929 /* Raise event before sending signal: task reaper must see this */
930 count_vm_event(OOM_KILL);
Roman Gushchinfe6bdfc2018-06-14 15:28:05 -0700931 memcg_memory_event_mm(mm, MEMCG_OOM_KILL);
Konstantin Khlebnikov8e675f72017-07-06 15:40:28 -0700932
Tetsuo Handa426fb5e2015-11-05 18:47:44 -0800933 /*
Michal Hockocd04ae12017-09-06 16:24:50 -0700934 * We should send SIGKILL before granting access to memory reserves
935 * in order to prevent the OOM victim from depleting the memory
936 * reserves from the user space under its control.
Tetsuo Handa426fb5e2015-11-05 18:47:44 -0800937 */
Eric W. Biederman079b22d2018-09-03 10:32:52 +0200938 do_send_sig_info(SIGKILL, SEND_SIG_PRIV, victim, PIDTYPE_TGID);
Johannes Weiner16e95192015-06-24 16:57:07 -0700939 mark_oom_victim(victim);
Edward Chron70cb6d22019-09-23 15:37:11 -0700940 pr_err("%s: Killed process %d (%s) total-vm:%lukB, anon-rss:%lukB, file-rss:%lukB, shmem-rss:%lukB, UID:%u pgtables:%lukB oom_score_adj:%hd\n",
941 message, task_pid_nr(victim), victim->comm, K(mm->total_vm),
942 K(get_mm_counter(mm, MM_ANONPAGES)),
943 K(get_mm_counter(mm, MM_FILEPAGES)),
944 K(get_mm_counter(mm, MM_SHMEMPAGES)),
945 from_kuid(&init_user_ns, task_uid(victim)),
Ilya Dryomov941f7622020-01-04 13:00:09 -0800946 mm_pgtables_bytes(mm) >> 10, victim->signal->oom_score_adj);
David Rientjes647f2bd2012-03-21 16:33:46 -0700947 task_unlock(victim);
948
949 /*
950 * Kill all user processes sharing victim->mm in other thread groups, if
951 * any. They don't get access to memory reserves, though, to avoid
Michel Lespinassec1e8d7c2020-06-08 21:33:54 -0700952 * depletion of all memory. This prevents mm->mmap_lock livelock when an
David Rientjes647f2bd2012-03-21 16:33:46 -0700953 * oom killed thread cannot exit because it requires the semaphore and
954 * its contended by another thread trying to allocate memory itself.
955 * That thread will now get access to memory reserves since it has a
956 * pending fatal signal.
957 */
Oleg Nesterov4d4048b2014-01-21 15:50:01 -0800958 rcu_read_lock();
Oleg Nesterovc3190252015-11-05 18:48:23 -0800959 for_each_process(p) {
Oleg Nesterov4d7b3392015-11-05 18:48:26 -0800960 if (!process_shares_mm(p, mm))
Oleg Nesterovc3190252015-11-05 18:48:23 -0800961 continue;
962 if (same_thread_group(p, victim))
963 continue;
Michal Hocko1b51e652016-10-07 16:59:09 -0700964 if (is_global_init(p)) {
Michal Hockoaac45362016-03-25 14:20:24 -0700965 can_oom_reap = false;
Michal Hocko862e3072016-10-07 16:58:57 -0700966 set_bit(MMF_OOM_SKIP, &mm->flags);
Michal Hockoa3739662016-07-28 15:45:01 -0700967 pr_info("oom killer %d (%s) has mm pinned by %d (%s)\n",
968 task_pid_nr(victim), victim->comm,
969 task_pid_nr(p), p->comm);
Oleg Nesterovc3190252015-11-05 18:48:23 -0800970 continue;
Michal Hockoaac45362016-03-25 14:20:24 -0700971 }
Michal Hocko1b51e652016-10-07 16:59:09 -0700972 /*
Christoph Hellwigf5678e72020-06-10 18:42:06 -0700973 * No kthead_use_mm() user needs to read from the userspace so
974 * we are ok to reap it.
Michal Hocko1b51e652016-10-07 16:59:09 -0700975 */
976 if (unlikely(p->flags & PF_KTHREAD))
977 continue;
Eric W. Biederman079b22d2018-09-03 10:32:52 +0200978 do_send_sig_info(SIGKILL, SEND_SIG_PRIV, p, PIDTYPE_TGID);
Oleg Nesterovc3190252015-11-05 18:48:23 -0800979 }
David Rientjes6b0c81b2012-07-31 16:43:45 -0700980 rcu_read_unlock();
David Rientjes647f2bd2012-03-21 16:33:46 -0700981
Michal Hockoaac45362016-03-25 14:20:24 -0700982 if (can_oom_reap)
Michal Hocko36324a92016-03-25 14:20:27 -0700983 wake_oom_reaper(victim);
Michal Hockoaac45362016-03-25 14:20:24 -0700984
Tetsuo Handa880b7682015-11-05 18:47:51 -0800985 mmdrop(mm);
David Rientjes6b0c81b2012-07-31 16:43:45 -0700986 put_task_struct(victim);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700987}
David Rientjes647f2bd2012-03-21 16:33:46 -0700988#undef K
Linus Torvalds1da177e2005-04-16 15:20:36 -0700989
David Rientjes309ed882010-08-09 17:18:54 -0700990/*
Roman Gushchin3d8b38e2018-08-21 21:53:54 -0700991 * Kill provided task unless it's secured by setting
992 * oom_score_adj to OOM_SCORE_ADJ_MIN.
993 */
Shakeel Buttbbbe4802019-03-05 15:46:12 -0800994static int oom_kill_memcg_member(struct task_struct *task, void *message)
Roman Gushchin3d8b38e2018-08-21 21:53:54 -0700995{
Tetsuo Handad342a0b2019-03-05 15:48:22 -0800996 if (task->signal->oom_score_adj != OOM_SCORE_ADJ_MIN &&
997 !is_global_init(task)) {
Roman Gushchin3d8b38e2018-08-21 21:53:54 -0700998 get_task_struct(task);
Shakeel Buttbbbe4802019-03-05 15:46:12 -0800999 __oom_kill_process(task, message);
Roman Gushchin3d8b38e2018-08-21 21:53:54 -07001000 }
1001 return 0;
1002}
1003
Roman Gushchin5989ad72018-08-21 21:53:50 -07001004static void oom_kill_process(struct oom_control *oc, const char *message)
1005{
Shakeel Buttbbbe4802019-03-05 15:46:12 -08001006 struct task_struct *victim = oc->chosen;
Roman Gushchin3d8b38e2018-08-21 21:53:54 -07001007 struct mem_cgroup *oom_group;
Roman Gushchin5989ad72018-08-21 21:53:50 -07001008 static DEFINE_RATELIMIT_STATE(oom_rs, DEFAULT_RATELIMIT_INTERVAL,
1009 DEFAULT_RATELIMIT_BURST);
1010
1011 /*
1012 * If the task is already exiting, don't alarm the sysadmin or kill
1013 * its children or threads, just give it access to memory reserves
1014 * so it can die quickly
1015 */
Shakeel Buttbbbe4802019-03-05 15:46:12 -08001016 task_lock(victim);
1017 if (task_will_free_mem(victim)) {
1018 mark_oom_victim(victim);
1019 wake_oom_reaper(victim);
1020 task_unlock(victim);
1021 put_task_struct(victim);
Roman Gushchin5989ad72018-08-21 21:53:50 -07001022 return;
1023 }
Shakeel Buttbbbe4802019-03-05 15:46:12 -08001024 task_unlock(victim);
Roman Gushchin5989ad72018-08-21 21:53:50 -07001025
1026 if (__ratelimit(&oom_rs))
Shakeel Buttbbbe4802019-03-05 15:46:12 -08001027 dump_header(oc, victim);
Roman Gushchin5989ad72018-08-21 21:53:50 -07001028
Roman Gushchin3d8b38e2018-08-21 21:53:54 -07001029 /*
1030 * Do we need to kill the entire memory cgroup?
1031 * Or even one of the ancestor memory cgroups?
1032 * Check this out before killing the victim task.
1033 */
1034 oom_group = mem_cgroup_get_oom_group(victim, oc->memcg);
1035
Shakeel Buttbbbe4802019-03-05 15:46:12 -08001036 __oom_kill_process(victim, message);
Roman Gushchin3d8b38e2018-08-21 21:53:54 -07001037
1038 /*
1039 * If necessary, kill all tasks in the selected memory cgroup.
1040 */
1041 if (oom_group) {
1042 mem_cgroup_print_oom_group(oom_group);
Shakeel Buttbbbe4802019-03-05 15:46:12 -08001043 mem_cgroup_scan_tasks(oom_group, oom_kill_memcg_member,
1044 (void*)message);
Roman Gushchin3d8b38e2018-08-21 21:53:54 -07001045 mem_cgroup_put(oom_group);
1046 }
Roman Gushchin5989ad72018-08-21 21:53:50 -07001047}
1048
David Rientjes309ed882010-08-09 17:18:54 -07001049/*
1050 * Determines whether the kernel must panic because of the panic_on_oom sysctl.
1051 */
Yafang Shao432b1de2019-06-28 12:06:59 -07001052static void check_panic_on_oom(struct oom_control *oc)
David Rientjes309ed882010-08-09 17:18:54 -07001053{
1054 if (likely(!sysctl_panic_on_oom))
1055 return;
1056 if (sysctl_panic_on_oom != 2) {
1057 /*
1058 * panic_on_oom == 1 only affects CONSTRAINT_NONE, the kernel
1059 * does not panic for cpuset, mempolicy, or memcg allocation
1060 * failures.
1061 */
Yafang Shao432b1de2019-06-28 12:06:59 -07001062 if (oc->constraint != CONSTRAINT_NONE)
David Rientjes309ed882010-08-09 17:18:54 -07001063 return;
1064 }
David Rientjes071a4be2015-09-08 15:00:42 -07001065 /* Do not panic for oom kills triggered by sysrq */
Yaowei Baidb2a0dd2015-11-06 16:28:06 -08001066 if (is_sysrq_oom(oc))
David Rientjes071a4be2015-09-08 15:00:42 -07001067 return;
Vladimir Davydov2a966b72016-07-26 15:22:33 -07001068 dump_header(oc, NULL);
David Rientjes309ed882010-08-09 17:18:54 -07001069 panic("Out of memory: %s panic_on_oom is enabled\n",
1070 sysctl_panic_on_oom == 2 ? "compulsory" : "system-wide");
1071}
1072
Martin Schwidefsky8bc719d2006-09-25 23:31:20 -07001073static BLOCKING_NOTIFIER_HEAD(oom_notify_list);
1074
1075int register_oom_notifier(struct notifier_block *nb)
1076{
1077 return blocking_notifier_chain_register(&oom_notify_list, nb);
1078}
1079EXPORT_SYMBOL_GPL(register_oom_notifier);
1080
1081int unregister_oom_notifier(struct notifier_block *nb)
1082{
1083 return blocking_notifier_chain_unregister(&oom_notify_list, nb);
1084}
1085EXPORT_SYMBOL_GPL(unregister_oom_notifier);
1086
Linus Torvalds1da177e2005-04-16 15:20:36 -07001087/**
David Rientjes6e0fc462015-09-08 15:00:36 -07001088 * out_of_memory - kill the "best" process when we run out of memory
1089 * @oc: pointer to struct oom_control
Linus Torvalds1da177e2005-04-16 15:20:36 -07001090 *
1091 * If we run out of memory, we have the choice between either
1092 * killing a random task (bad), letting the system crash (worse)
1093 * OR try to be smart about which process to kill. Note that we
1094 * don't have to be perfect here, we just have to be good.
1095 */
David Rientjes6e0fc462015-09-08 15:00:36 -07001096bool out_of_memory(struct oom_control *oc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001097{
Martin Schwidefsky8bc719d2006-09-25 23:31:20 -07001098 unsigned long freed = 0;
1099
Johannes Weinerdc564012015-06-24 16:57:19 -07001100 if (oom_killer_disabled)
1101 return false;
1102
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001103 if (!is_memcg_oom(oc)) {
1104 blocking_notifier_call_chain(&oom_notify_list, 0, &freed);
1105 if (freed > 0)
1106 /* Got some memory back in the last second. */
1107 return true;
1108 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001109
David Rientjes7b98c2e2010-08-09 17:18:48 -07001110 /*
David Rientjes9ff48682012-12-11 16:01:30 -08001111 * If current has a pending SIGKILL or is exiting, then automatically
1112 * select it. The goal is to allow it to allocate so that it may
1113 * quickly exit and free its memory.
David Rientjes7b98c2e2010-08-09 17:18:48 -07001114 */
Michal Hocko091f3622016-07-28 15:45:04 -07001115 if (task_will_free_mem(current)) {
Johannes Weiner16e95192015-06-24 16:57:07 -07001116 mark_oom_victim(current);
Michal Hocko1af8bb42016-07-28 15:44:52 -07001117 wake_oom_reaper(current);
David Rientjes75e8f8b2015-09-08 15:00:47 -07001118 return true;
David Rientjes7b98c2e2010-08-09 17:18:48 -07001119 }
1120
Christoph Lameter9b0f8b02006-02-20 18:27:52 -08001121 /*
Michal Hocko3da88fb32016-05-19 17:13:09 -07001122 * The OOM killer does not compensate for IO-less reclaim.
1123 * pagefault_out_of_memory lost its gfp context so we have to
1124 * make sure exclude 0 mask - all other users should have at least
Tetsuo Handaf9c64562019-09-23 15:37:08 -07001125 * ___GFP_DIRECT_RECLAIM to get here. But mem_cgroup_oom() has to
1126 * invoke the OOM killer even if it is a GFP_NOFS allocation.
Michal Hocko3da88fb32016-05-19 17:13:09 -07001127 */
Tetsuo Handaf9c64562019-09-23 15:37:08 -07001128 if (oc->gfp_mask && !(oc->gfp_mask & __GFP_FS) && !is_memcg_oom(oc))
Michal Hocko3da88fb32016-05-19 17:13:09 -07001129 return true;
1130
1131 /*
Christoph Lameter9b0f8b02006-02-20 18:27:52 -08001132 * Check if there were limitations on the allocation (only relevant for
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001133 * NUMA and memcg) that may require different handling.
Christoph Lameter9b0f8b02006-02-20 18:27:52 -08001134 */
Yafang Shao432b1de2019-06-28 12:06:59 -07001135 oc->constraint = constrained_alloc(oc);
1136 if (oc->constraint != CONSTRAINT_MEMORY_POLICY)
David Rientjes6e0fc462015-09-08 15:00:36 -07001137 oc->nodemask = NULL;
Yafang Shao432b1de2019-06-28 12:06:59 -07001138 check_panic_on_oom(oc);
David Rientjes0aad4b32010-08-09 17:18:59 -07001139
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001140 if (!is_memcg_oom(oc) && sysctl_oom_kill_allocating_task &&
Shakeel Buttac311a12019-07-11 21:00:31 -07001141 current->mm && !oom_unkillable_task(current) &&
1142 oom_cpuset_eligible(current, oc) &&
David Rientjes121d1ba2012-07-31 16:42:55 -07001143 current->signal->oom_score_adj != OOM_SCORE_ADJ_MIN) {
David Rientjes6b0c81b2012-07-31 16:43:45 -07001144 get_task_struct(current);
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001145 oc->chosen = current;
1146 oom_kill_process(oc, "Out of memory (oom_kill_allocating_task)");
David Rientjes75e8f8b2015-09-08 15:00:47 -07001147 return true;
David Rientjes0aad4b32010-08-09 17:18:59 -07001148 }
1149
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001150 select_bad_process(oc);
Johannes Weiner3100dab2018-09-04 15:45:34 -07001151 /* Found nothing?!?! */
1152 if (!oc->chosen) {
Prakash Gupta72488b32021-04-22 19:33:23 +05301153 int ret = false;
1154
1155 trace_android_vh_oom_check_panic(oc, &ret);
1156 if (ret)
1157 return true;
1158
Vladimir Davydov2a966b72016-07-26 15:22:33 -07001159 dump_header(oc, NULL);
Johannes Weiner3100dab2018-09-04 15:45:34 -07001160 pr_warn("Out of memory and no killable processes...\n");
1161 /*
1162 * If we got here due to an actual allocation at the
1163 * system level, we cannot survive this and will enter
1164 * an endless loop in the allocator. Bail out now.
1165 */
1166 if (!is_sysrq_oom(oc) && !is_memcg_oom(oc))
1167 panic("System is deadlocked on memory\n");
David Rientjes0aad4b32010-08-09 17:18:59 -07001168 }
Michal Hocko9bfe5de2018-08-17 15:49:04 -07001169 if (oc->chosen && oc->chosen != (void *)-1UL)
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001170 oom_kill_process(oc, !is_memcg_oom(oc) ? "Out of memory" :
1171 "Memory cgroup out of memory");
Vladimir Davydov7c5f64f2016-10-07 16:57:23 -07001172 return !!oc->chosen;
Michal Hockoc32b3cb2015-02-11 15:26:24 -08001173}
1174
David Rientjese3658932010-08-09 17:18:55 -07001175/*
Michal Hocko1d457982021-11-05 13:38:06 -07001176 * The pagefault handler calls here because some allocation has failed. We have
1177 * to take care of the memcg OOM here because this is the only safe context without
1178 * any locks held but let the oom killer triggered from the allocation context care
1179 * about the global OOM.
David Rientjese3658932010-08-09 17:18:55 -07001180 */
1181void pagefault_out_of_memory(void)
1182{
Michal Hocko1d457982021-11-05 13:38:06 -07001183 static DEFINE_RATELIMIT_STATE(pfoom_rs, DEFAULT_RATELIMIT_INTERVAL,
1184 DEFAULT_RATELIMIT_BURST);
David Rientjes6e0fc462015-09-08 15:00:36 -07001185
Johannes Weiner49426422013-10-16 13:46:59 -07001186 if (mem_cgroup_oom_synchronize(true))
Johannes Weinerdc564012015-06-24 16:57:19 -07001187 return;
Johannes Weiner3812c8c2013-09-12 15:13:44 -07001188
Vasily Averinac7f6be2021-11-05 13:38:02 -07001189 if (fatal_signal_pending(current))
Johannes Weinerdc564012015-06-24 16:57:19 -07001190 return;
Vasily Averinac7f6be2021-11-05 13:38:02 -07001191
Michal Hocko1d457982021-11-05 13:38:06 -07001192 if (__ratelimit(&pfoom_rs))
1193 pr_warn("Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF\n");
David Rientjese3658932010-08-09 17:18:55 -07001194}
Charan Teja Reddy3bcdb492021-06-02 17:33:03 +05301195
Suren Baghdasaryan7fc3ac42021-09-02 15:00:29 -07001196SYSCALL_DEFINE2(process_mrelease, int, pidfd, unsigned int, flags)
1197{
1198#ifdef CONFIG_MMU
1199 struct mm_struct *mm = NULL;
1200 struct task_struct *task;
1201 struct task_struct *p;
1202 unsigned int f_flags;
Suren Baghdasaryanfd7af952021-10-28 14:36:14 -07001203 bool reap = false;
Suren Baghdasaryan7fc3ac42021-09-02 15:00:29 -07001204 struct pid *pid;
1205 long ret = 0;
1206
1207 if (flags)
1208 return -EINVAL;
1209
1210 pid = pidfd_get_pid(pidfd, &f_flags);
1211 if (IS_ERR(pid))
1212 return PTR_ERR(pid);
1213
1214 task = get_pid_task(pid, PIDTYPE_TGID);
1215 if (!task) {
1216 ret = -ESRCH;
1217 goto put_pid;
1218 }
1219
1220 /*
1221 * Make sure to choose a thread which still has a reference to mm
1222 * during the group exit
1223 */
1224 p = find_lock_task_mm(task);
1225 if (!p) {
1226 ret = -ESRCH;
1227 goto put_task;
1228 }
1229
Suren Baghdasaryanf4f2c612021-11-19 14:51:26 -08001230 mm = p->mm;
1231 mmgrab(mm);
1232
Suren Baghdasaryane99926f2021-11-15 15:39:21 -08001233 /*
1234 * If we are too late and exit_mmap already checked mm_is_oom_victim
1235 * then will block on mmap_read_lock until exit_mmap releases mmap_lock
1236 */
1237 set_bit(MMF_OOM_VICTIM, &mm->flags);
1238
Suren Baghdasaryanf4f2c612021-11-19 14:51:26 -08001239 if (task_will_free_mem(p))
1240 reap = true;
1241 else {
1242 /* Error only if the work has not been done already */
1243 if (!test_bit(MMF_OOM_SKIP, &mm->flags))
1244 ret = -EINVAL;
Suren Baghdasaryan7fc3ac42021-09-02 15:00:29 -07001245 }
1246 task_unlock(p);
1247
1248 if (!reap)
1249 goto drop_mm;
1250
1251 if (mmap_read_lock_killable(mm)) {
1252 ret = -EINTR;
1253 goto drop_mm;
1254 }
Suren Baghdasaryanf4f2c612021-11-19 14:51:26 -08001255 /*
1256 * Check MMF_OOM_SKIP again under mmap_read_lock protection to ensure
1257 * possible change in exit_mmap is seen
1258 */
1259 if (!test_bit(MMF_OOM_SKIP, &mm->flags) && !__oom_reap_task_mm(mm))
Suren Baghdasaryan7fc3ac42021-09-02 15:00:29 -07001260 ret = -EAGAIN;
1261 mmap_read_unlock(mm);
1262
1263drop_mm:
Suren Baghdasaryanf4f2c612021-11-19 14:51:26 -08001264 mmdrop(mm);
Suren Baghdasaryan7fc3ac42021-09-02 15:00:29 -07001265put_task:
1266 put_task_struct(task);
1267put_pid:
1268 put_pid(pid);
1269 return ret;
1270#else
1271 return -ENOSYS;
1272#endif /* CONFIG_MMU */
1273}
1274
Charan Teja Reddy3bcdb492021-06-02 17:33:03 +05301275void add_to_oom_reaper(struct task_struct *p)
1276{
1277 p = find_lock_task_mm(p);
1278 if (!p)
1279 return;
1280
1281 get_task_struct(p);
1282 if (task_will_free_mem(p)) {
1283 __mark_oom_victim(p);
1284 wake_oom_reaper(p);
1285 }
1286 task_unlock(p);
1287 put_task_struct(p);
1288}