|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v4] tools/xenconsoled: Increase file descriptor limit
XenServer's VM density testing uncovered a regression when moving from
sysvinit to systemd where the file descriptor limit dropped from 4096 to
1024. (XenServer had previously inserted a ulimit statement into its
initscripts.)
One solution is to use LimitNOFILE=4096 in xenconsoled.service to match the
lost ulimit, but that is only a stopgap solution.
As Xenconsoled genuinely needs a large number of file descriptors if a large
number of domains are running, attempt to increase the limit.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CC: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
CC: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
CC: Wei Liu <wei.liu2@xxxxxxxxxx>
---
v4:
* Calculate fd limit based on domid ABI - result is 132008 fds
* Warn if sufficient fds are not available.
v3:
* Hide Linux specific bits in #ifdef __linux__
v2:
* Always increase soft limit to hard limit
* Correct commment regarding number of file descriptors
* long -> unsigned long as that appears to be the underlying type of an rlim_t
---
tools/console/daemon/main.c | 78 +++++++++++++++++++++++++++++++++++++++++++
1 file changed, 78 insertions(+)
diff --git a/tools/console/daemon/main.c b/tools/console/daemon/main.c
index 92d2fc4..7e3b9a5 100644
--- a/tools/console/daemon/main.c
+++ b/tools/console/daemon/main.c
@@ -26,6 +26,7 @@
#include <string.h>
#include <signal.h>
#include <sys/types.h>
+#include <sys/resource.h>
#include "xenctrl.h"
@@ -55,6 +56,81 @@ static void version(char *name)
printf("Xen Console Daemon 3.0\n");
}
+static void increase_fd_limit(void)
+{
+ /*
+ * We require many file descriptors:
+ * - per domain: pty master, pty slave, logfile and evtchn
+ * - misc extra: hypervisor log, privcmd, gntdev, std...
+ *
+ * Allow a generous 1000 for misc, and calculate the maximum possible
+ * number of fds which could be used.
+ */
+ unsigned min_fds = (DOMID_FIRST_RESERVED * 4) + 1000;
+ struct rlimit lim;
+
+ if (getrlimit(RLIMIT_NOFILE, &lim) < 0) {
+ fprintf(stderr, "Failed to obtain fd limit: %s\n",
+ strerror(errno));
+ exit(1);
+ }
+
+ /* Do we already have sufficient? Great! */
+ if (lim.rlim_cur >= min_fds)
+ return;
+
+ /* Attempt to locate the system maximum. */
+#ifdef __linux__
+ {
+ FILE *fs_nr_open = fopen("/proc/sys/fs/nr_open", "r");
+ if (fs_nr_open) {
+ unsigned long nr;
+
+ if ((fscanf(fs_nr_open, "%lu", &nr) == 1) &&
+ (nr < min_fds)) {
+ syslog(LOG_WARNING,
+ "Max system fds (%lu) less than minimum "
+ "requried (%u) - May run out with lots
of domains",
+ nr, min_fds);
+ min_fds = nr;
+ }
+ fclose(fs_nr_open);
+ }
+ }
+#endif
+
+ /*
+ * Will min_fds fit within our current hard limit?
+ * (likely on *BSD, unlikely on Linux)
+ * If so, raise our soft limit.
+ */
+ if (min_fds <= lim.rlim_max) {
+ struct rlimit new = {
+ .rlim_cur = min_fds,
+ .rlim_max = lim.rlim_max,
+ };
+
+ if (setrlimit(RLIMIT_NOFILE, &new) < 0)
+ syslog(LOG_WARNING,
+ "Unable to increase fd soft limit: %lu -> %u, "
+ "hard %lu (%s) - May run out with lots of
domains",
+ lim.rlim_cur, min_fds, lim.rlim_max,
+ strerror(errno));
+ } else {
+ /*
+ * Lets hope that, as a root process, we have sufficient
+ * privilege to up the hard limit.
+ */
+ struct rlimit new = { .rlim_cur = min_fds, .rlim_max = min_fds
};
+
+ if (setrlimit(RLIMIT_NOFILE, &new) < 0)
+ syslog(LOG_WARNING,
+ "Unable to increase fd hard limit: %lu -> %u
(%s)"
+ " - May run out with lots of domains",
+ lim.rlim_max, min_fds, strerror(errno));
+ }
+}
+
int main(int argc, char **argv)
{
const char *sopts = "hVvit:o:";
@@ -154,6 +230,8 @@ int main(int argc, char **argv)
openlog("xenconsoled", syslog_option, LOG_DAEMON);
setlogmask(syslog_mask);
+ increase_fd_limit();
+
if (!is_interactive) {
daemonize(pidfile ? pidfile : "/var/run/xenconsoled.pid");
}
--
1.7.10.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |