[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2] tools/xenconsoled: Increase file descriptor limit
XenServer's VM density testing uncovered a regression when moving from sysvinit to systemd where the file descriptor limit dropped from 4096 to 1024. (XenServer had previously inserted a ulimit statement into its initscripts.) One solution is to use LimitNOFILE=4096 in xenconsoled.service to match the lost ulimit, but that is only a stopgap solution. As Xenconsoled genuinely needs a large number of file descriptors if a large number of domains are running, and is well behaved with its descriptors, attempt to up the limit to the system maximum. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CC: Ian Campbell <Ian.Campbell@xxxxxxxxxx> CC: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> CC: Wei Liu <wei.liu2@xxxxxxxxxx> --- v2: * Always increase soft limit to hard limit * Correct commment regarding number of file descriptors * long -> unsigned long as that appears to be the underlying type of an rlim_t --- tools/console/daemon/main.c | 45 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) diff --git a/tools/console/daemon/main.c b/tools/console/daemon/main.c index 92d2fc4..0bb9d8a 100644 --- a/tools/console/daemon/main.c +++ b/tools/console/daemon/main.c @@ -26,6 +26,7 @@ #include <string.h> #include <signal.h> #include <sys/types.h> +#include <sys/resource.h> #include "xenctrl.h" @@ -55,6 +56,48 @@ static void version(char *name) printf("Xen Console Daemon 3.0\n"); } +/* + * Xenconsoled requires two file descriptors for each PV console (pty and log + * file), which can easily exceed the default of 1024 if many guests are + * running. Try to set the fd limit to the system maximum, falling back to a + * default of 4096. + */ +static void increase_fd_limit(void) +{ + FILE *fs_nr_open; + struct rlimit lim; + unsigned long nr_open = 4096; + + if (getrlimit(RLIMIT_NOFILE, &lim) < 0) + return; + + /* Increase the soft limit to the current hard limit. */ + if (lim.rlim_cur < lim.rlim_max) { + lim.rlim_cur = lim.rlim_max; + if (setrlimit(RLIMIT_NOFILE, &lim) < 0) + return; + } + + /* Attempt to locate the system maximum. */ + fs_nr_open = fopen("/proc/sys/fs/nr_open", "r"); + if (fs_nr_open) { + unsigned long nr; + + if (fscanf(fs_nr_open, "%lu", &nr) == 1) + nr_open = nr; + fclose(fs_nr_open); + } + + /* + * In the likely case that we are a root process with + * CAP_SYS_RESOURCE, attempt to up our hard limit. + */ + if (nr_open > lim.rlim_max) { + lim.rlim_cur = lim.rlim_max = nr_open; + setrlimit(RLIMIT_NOFILE, &lim); + } +} + int main(int argc, char **argv) { const char *sopts = "hVvit:o:"; @@ -154,6 +197,8 @@ int main(int argc, char **argv) openlog("xenconsoled", syslog_option, LOG_DAEMON); setlogmask(syslog_mask); + increase_fd_limit(); + if (!is_interactive) { daemonize(pidfile ? pidfile : "/var/run/xenconsoled.pid"); } -- 1.7.10.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |