[go: up one dir, main page]

Skip to content

KwaiAppTeam/KOOM

Repository files navigation

license Platform

KOOM

An OOM killer on mobile platform by Kwai.

中文版本请参看这里

Introduction

KOOM creates a mobile high performance online memory monitoring solution,which supplies a detailed report when OOM related problems are detected, and has solved a large number of OOM issues in the Kwai application. It's currently available on Android.

With the increasing complexity of mobile terminal business logic and the gradual popularity of scenarios with high memory requirements such as 4K codec and AR magic watch, the OOM problem has become the number one problem in the stability management of the Kuaishou client. In the daily version iteration process, OOM surges occasionally occur, and the online environment is very complicated. There are thousands of AB experiments. Pre-prevention and post-recovery cannot be achieved. Therefore, high-performance online memory monitoring solutions are urgently needed.

So how should OOM governance be built? At present, KOOM has the capability of monitoring leakage of Java Heap/Native Heap/Thread, and will build multi-dimensional and multi-business scenarios monitoring in the future.

Features

Java Leak Monitor

  • The koom-java-leak module is used for Java Heap leak monitoring: it uses the Copy-on-write mechanism to fork the child process dump Java Heap, which solves the problem. The app freezes for a long time during the dump. For details, please refer to here

Native Leak Monitor

  • The koom-native-leak module is a Native Heap leak monitoring solution: use the Tracing garbage collection mechanism to analyze the entire Native Heap, and directly output the leaked memory information like: size/Allocating stacks/etc.; greatly reduces the cost of analyzing and solving memory leaks for business students. For details, please refer to here

Thread Leak Monitor

  • The koom-thread-leak module is used for Thread leak monitoring: it hooks the life cycle function of the thread, and periodically reports the leaked thread information. For details, please refer to here

STL Support

All Native modules support two access modes, c++_shared and c++_static. For details, please refer to cpp-support.

  • Add dependency to the project build.gradle (take koom-java-leak as an example):
dependencies {
  // In shared mode, multiple modules share the same libc++_shared.so (STL), and the package 
  // size is small, but when multiple modules depend on different STL versions, the final 
  // compilation will conflict. For example, you might get "dlopen failed: cannot locate symbol
  // "__emutls_get_address" referenced by" errors.
  implementation "com.kuaishou.koom:koom-java-leak:${latest_version}"
  // Or in static mode, each module has its own STL, the package size is large, and there are no 
  // compilation and runtime problems.
  implementation "com.kuaishou.koom:koom-java-leak-static:${latest_version}"
  // If you depend on multiple modules, the shared and static modes cannot be mixed. 
  // The following way is wrong, remember!
  implementation "com.kuaishou.koom:koom-java-leak-static:${latest_version}"
  implementation "com.kuaishou.koom:koom-monitor-base:${latest_version}"
}
  • Introduce a way to resolve the conflict of shared mode, add pickFirst in the project root directory build.gradle:
packagingOptions {
  // Select the first libc++_shared.so when packaging apk, it may encounter unpredictable bugs 
  // at runtime, use it with caution!
  pickFirst 'lib/*/libc++_shared.so'
}

minSdk

  • The minSdk of all modules is 18. If the minSdk of your app is lower than that, it needs to be compatible with overrideLibrary in the manifest.
  <uses-sdk tools:overrideLibrary="com.kwai.koom.fastdump, com.kwai.android.base, com.kwai.koom.base" />

License

KOOM is under the Apache license 2.0. For details check out the LICENSE.

Change Log

Check out the CHANGELOG.md for details of change history.

Contributing

If you are interested in contributing, check out the CONTRIBUTING.md

Feedback

Welcome report issues or contact us in WeChat group.