Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982324
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of out of memory killer for embedded Linux environments

Abstract: When a swapless Linux system runs out of memory, the system reclaims memory by invoking Out of Memory (OOM) Killer. The OOM killer terminates arbitrary processes. The running time of selecting victim processes is proportional to the number of processes in the system. In this paper, we propose a novel selection scheme which runs in O(1) time. The experimental results showed that the proposed selection scheme outperformed the existing one in terms of the running time. General Terms Algorithms KeywordsMemory mana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The OS kernel is in charge of system management, by providing routines that are used by application processes. Nevertheless, the kernel is also able to manage this address space for various purposes, such as process swapping, free space reclamation [31], and exception handling. All virtualization models are exposed to this vulnerability.…”
Section: Vm Applicationsmentioning
confidence: 99%
“…The OS kernel is in charge of system management, by providing routines that are used by application processes. Nevertheless, the kernel is also able to manage this address space for various purposes, such as process swapping, free space reclamation [31], and exception handling. All virtualization models are exposed to this vulnerability.…”
Section: Vm Applicationsmentioning
confidence: 99%
“…Other moments of SFD monitoring are application loading and termination time. For implementation with minimum modifying of Android codes, we chained SFD monitoring code after low memory killer (LMK) of Android system [7] [8].…”
Section: Fig 1 Data Structures Of Sfdmentioning
confidence: 99%
“…The page reclamation mechanism [10]- [12] is useful to obtain the available memory space on the system. However, it finds target pages that are sacrificial in memory reclamation, based on the least recently used page (LRU) replacement algorithm [6], [13]. It blindly handles all processes without the platform level semantics, which are important system applications in a mobile platform.…”
Section: A Conventional Memory Managementmentioning
confidence: 99%
“…This section compares the experimental result of the number of execution frequencies of LMK/OOMK between the existing system (before) and proposed system (after). The proposed system dramatically removed the number of execution frequencies of naive memory reclamation [4]- [6] running the LMK operation and OOMK operation sequentially. The experimental result shows that untrusted applications do not increase the number of LMK operations by isolating the page reclamation of the untrusted applications executed only in the VNODE1 of the 1.5 GB memory node.…”
Section: B Number Of Execution Frequencies Of Lmk/oomkmentioning
confidence: 99%
See 1 more Smart Citation