Go to file
2018-08-09 02:43:22 +09:00
.gitignore add support white, black, avoid, prefer lists 2018-06-23 15:39:17 +09:00
default_values_backup.conf fix GUI notifications 2018-08-05 06:01:59 +09:00
LICENSE 1 2018-06-08 17:08:16 +09:00
Makefile Makefile 2018-08-01 02:59:02 +03:00
nohang improve GUI notifications 2018-08-07 15:03:01 +09:00
nohang.1 fix logging: flush stdout 2018-07-26 00:00:20 +09:00
nohang.conf fix config 2018-08-07 17:18:34 +09:00
nohang.service RestartSec=1 2018-08-03 07:54:16 +09:00
README.md update readme 2018-08-09 02:43:22 +09:00

Nohang

Nohang is a highly configurable daemon for Linux which is able to correctly prevent out of memory (OOM) and keep system responsiveness in low memory conditions.

What is the problem?

OOM conditions may cause freezes, livelocks, drop caches and processes to be killed (via sending SIGKILL) instead of trying to terminate them correctly (via sending SIGTERM or takes other corrective action). Some applications may crash if it's impossible to allocate memory.

Here are the statements of some users:

"How do I prevent Linux from freezing when out of memory? Today I (accidentally) ran some program on my Linux box that quickly used a lot of memory. My system froze, became unresponsive and thus I was unable to kill the offender. How can I prevent this in the future? Can't it at least keep a responsive core or something running?"

(serverfault)

"With or without swap it still freezes before the OOM killer gets run automatically. This is really a kernel bug that should be fixed (i.e. run OOM killer earlier, before dropping all disk cache). Unfortunately kernel developers and a lot of other folk fail to see the problem. Common suggestions such as disable/enable swap, buy more RAM, run less processes, set limits etc. do not address the underlying problem that the kernel's low memory handling sucks camel's balls."

(serverfault)

Also look at Why are low memory conditions handled so badly? (discussion with 480+ posts on r/linux).

Solution

  • Use of earlyoom. This is a simple and lightweight OOM preventer written in C.
  • Use of oomd. This is a userspace OOM killer for linux systems whitten in C++ and developed by Facebook.
  • Use of nohang.

Some features

  • SIGKILL and SIGTERM as signals that can be sent to the victim
  • impact on the badness of processes via matching their names with regular expressions
  • possibility of restarting processes via command like systemctl restart something if the process is selected as a victim
  • GUI notifications: OOM prevention results and low memory warnings
  • zram support (mem_used_total as a trigger)
  • customizable intensity of monitoring
  • convenient configuration with a well commented config file

Demo

Video: nohang prevents OOM after the command while true; do tail /dev/zero; done has been executed.

Requiements

For basic usage: - Linux 3.14+ - Python 3.4+ To show GUI notifications: - libnotify (Fedora, Arch) or libnotify-bin (Debian, Ubuntu) - sudo and procps if nohang started as root

Memory and CPU usage

  • VmRSS is 10 — 14 MiB depending on the settings (about 10 MiB by default)
  • CPU usage depends on the level of available memory (the frequency of memory status checks increases as the amount of available memory decreases) and monitoring intensity (can be changed by user via config)

Status

The program is unstable and some fixes are required before the first stable version will be released (need documentation, translation, review and some optimisation).

Download, install, uninstall

$ git clone https://github.com/hakavlad/nohang.git
$ cd nohang

To install:

$ sudo make install

To enable and start on systems with systemd:

$ sudo make systemd

To uninstall:

$ sudo make uninstall

Command line options

./nohang -h
usage: nohang [-h] [-c CONFIG]

optional arguments:
  -h, --help            show this help message and exit
  -c CONFIG, --config CONFIG
                        path to the config file, default values:
                        ./nohang.conf, /etc/nohang/nohang.conf

How to configure nohang

The program can be configured by editing the config file. The configuration includes the following sections:

  1. Memory levels to respond to as an OOM threat
  2. The frequency of checking the level of available memory (and CPU usage)
  3. The prevention of killing innocent victims
  4. Impact on the badness of processes via matching their names with regular expressions
  5. The execution of a specific command instead of sending the SIGTERM signal
  6. GUI notifications:
    • results of preventing OOM
    • low memory warnings
  7. Preventing the slowing down of the program
  8. Output verbosity

Just read the description of the parameters and edit the values. Please restart nohang to apply changes. Default path to the config after installing is /etc/nohang/nohang.conf.

Logging

If nohang is installed on a system that uses systemd, you can use the following command to view the log:

$ sudo journalctl -eu nohang

See also man journalctl.

Feedback

Please create issues. Use cases, feature requests and any questions are welcome.