Blame view

kernel/linux-rt-4.4.41/include/linux/oom.h 3.17 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
  #ifndef __INCLUDE_LINUX_OOM_H
  #define __INCLUDE_LINUX_OOM_H
  
  
  #include <linux/sched.h>
  #include <linux/types.h>
  #include <linux/nodemask.h>
  #include <uapi/linux/oom.h>
  
  struct zonelist;
  struct notifier_block;
  struct mem_cgroup;
  struct task_struct;
  
  /*
   * Details of the page allocation that triggered the oom killer that are used to
   * determine what should be killed.
   */
  struct oom_control {
  	/* Used to determine cpuset */
  	struct zonelist *zonelist;
  
  	/* Used to determine mempolicy */
  	nodemask_t *nodemask;
  
  	/* Used to determine cpuset and node locality requirement */
  	const gfp_t gfp_mask;
  
  	/*
  	 * order == -1 means the oom kill is required by sysrq, otherwise only
  	 * for display purposes.
  	 */
  	const int order;
  };
  
  /*
   * Types of limitations to the nodes from which allocations may occur
   */
  enum oom_constraint {
  	CONSTRAINT_NONE,
  	CONSTRAINT_CPUSET,
  	CONSTRAINT_MEMORY_POLICY,
  	CONSTRAINT_MEMCG,
  };
  
  enum oom_scan_t {
  	OOM_SCAN_OK,		/* scan thread and find its badness */
  	OOM_SCAN_CONTINUE,	/* do not consider thread for oom kill */
  	OOM_SCAN_ABORT,		/* abort the iteration and return */
  	OOM_SCAN_SELECT,	/* always select this thread first */
  };
  
  /* Thread is the potential origin of an oom condition; kill first on oom */
  #define OOM_FLAG_ORIGIN		((__force oom_flags_t)0x1)
  
  extern struct mutex oom_lock;
  
  static inline void set_current_oom_origin(void)
  {
  	current->signal->oom_flags |= OOM_FLAG_ORIGIN;
  }
  
  static inline void clear_current_oom_origin(void)
  {
  	current->signal->oom_flags &= ~OOM_FLAG_ORIGIN;
  }
  
  static inline bool oom_task_origin(const struct task_struct *p)
  {
  	return !!(p->signal->oom_flags & OOM_FLAG_ORIGIN);
  }
  
  extern void mark_oom_victim(struct task_struct *tsk);
  
  extern unsigned long oom_badness(struct task_struct *p,
  		struct mem_cgroup *memcg, const nodemask_t *nodemask,
  		unsigned long totalpages);
  
  extern int oom_kills_count(void);
  extern void note_oom_kill(void);
  extern void oom_kill_process(struct oom_control *oc, struct task_struct *p,
  			     unsigned int points, unsigned long totalpages,
  			     struct mem_cgroup *memcg, const char *message);
  
  extern void check_panic_on_oom(struct oom_control *oc,
  			       enum oom_constraint constraint,
  			       struct mem_cgroup *memcg);
  
  extern enum oom_scan_t oom_scan_process_thread(struct oom_control *oc,
  		struct task_struct *task, unsigned long totalpages);
  
  extern bool out_of_memory(struct oom_control *oc);
  
  extern void exit_oom_victim(void);
  
  extern int register_oom_notifier(struct notifier_block *nb);
  extern int unregister_oom_notifier(struct notifier_block *nb);
  
  extern bool oom_killer_disabled;
  extern bool oom_killer_disable(void);
  extern void oom_killer_enable(void);
  
  extern struct task_struct *find_lock_task_mm(struct task_struct *p);
  
  static inline bool task_will_free_mem(struct task_struct *task)
  {
  	/*
  	 * A coredumping process may sleep for an extended period in exit_mm(),
  	 * so the oom killer cannot assume that the process will promptly exit
  	 * and release memory.
  	 */
  	return (task->flags & PF_EXITING) &&
  		!(task->signal->flags & SIGNAL_GROUP_COREDUMP);
  }
  
  /* sysctls */
  extern int sysctl_oom_dump_tasks;
  extern int sysctl_oom_kill_allocating_task;
  extern int sysctl_panic_on_oom;
  #endif /* _INCLUDE_LINUX_OOM_H */