From nobody Sun May 5 16:34:29 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=quarantine dis=none) header.from=suse.com ARC-Seal: i=1; a=rsa-sha256; t=1620981716; cv=none; d=zohomail.com; s=zohoarc; b=AvC1rABMjzVAHCBNtxmeawtplJhTUwAdx1NYnKDZKzqZcwhwY2iEDIulozZOsoI1QL2SNqvCABeCckIR2foPbzKLzXHVSBwfwwO9x8cTnvjsZnV7VOq8kuo824luT5TVRbQcZqolyGgNYpPjoqBuayOcIeEyH24RGS6Vv8TE3lw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1620981716; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=i5kvPLZ5qhDTjMIfcwzywnthE6OAXMQX2NmMcx+mJdk=; b=AeVTsjn75bFwLK445KnNvetOi9ZMuyyPMweLxIH+/2bDLQXxQ4wtaegMKuRtq6OA4vJKkHq4RIPJYVa7u795S2/9h2vk5cJR80FmWjtbLfCTbqjvHW4EO+soPn+RWpX+ZuYiZmD3N/udlD88yenFjdOxTyAA6ffyOqCv00mh6vc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=quarantine dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1620981715953863.0251539788553; Fri, 14 May 2021 01:41:55 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.127263.239144 (Exim 4.92) (envelope-from ) id 1lhTO6-0000cy-Gt; Fri, 14 May 2021 08:41:38 +0000 Received: by outflank-mailman (output) from mailman id 127263.239144; Fri, 14 May 2021 08:41:38 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lhTO6-0000cr-CZ; Fri, 14 May 2021 08:41:38 +0000 Received: by outflank-mailman (input) for mailman id 127263; Fri, 14 May 2021 08:41:36 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lhTO4-0000cg-SX for xen-devel@lists.xenproject.org; Fri, 14 May 2021 08:41:36 +0000 Received: from mx2.suse.de (unknown [195.135.220.15]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id 04b490e1-07ca-42fe-b757-3b75b7893ed9; Fri, 14 May 2021 08:41:36 +0000 (UTC) Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 5AC31AF35; Fri, 14 May 2021 08:41:35 +0000 (UTC) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 04b490e1-07ca-42fe-b757-3b75b7893ed9 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1620981695; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=i5kvPLZ5qhDTjMIfcwzywnthE6OAXMQX2NmMcx+mJdk=; b=bxgvp8Fe1e42kLgWOViOxSzxxNi00O23Vtt0Y9O1rvoUbVK3dybwrRLOlL6WU0VwDxdBDU 63iq67Tdkn4zIk+gX//v66KiE614Oprk4t6yf1tzU0biD6TphhpCOQQTWlt+Jr7VDWor6V PCm4FSgNJ7giz+nqabxtCAblxOkuC4Y= From: Juergen Gross To: xen-devel@lists.xenproject.org Cc: Juergen Gross , Ian Jackson , Wei Liu Subject: [PATCH] tools/xenstore: claim resources when running as daemon Date: Fri, 14 May 2021 10:41:33 +0200 Message-Id: <20210514084133.18658-1-jgross@suse.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @suse.com) Content-Type: text/plain; charset="utf-8" Xenstored is absolutely mandatory for a Xen host and it can't be restarted, so being killed by OOM-killer in case of memory shortage is to be avoided. Set /proc/$pid/oom_score_adj (if available) to -500 in order to allow xenstored to use large amounts of memory without being killed. In order to support large numbers of domains the limit for open file descriptors might need to be raised. Each domain needs 2 file descriptors (one for the event channel and one for the xl per-domain daemon to connect to xenstored). Try to raise ulimit for open files to 65536. First the hard limit if needed, and then the soft limit. Signed-off-by: Juergen Gross --- tools/xenstore/xenstored_core.c | 2 ++ tools/xenstore/xenstored_core.h | 3 ++ tools/xenstore/xenstored_minios.c | 4 +++ tools/xenstore/xenstored_posix.c | 46 +++++++++++++++++++++++++++++++ 4 files changed, 55 insertions(+) diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_cor= e.c index b66d119a98..964e693450 100644 --- a/tools/xenstore/xenstored_core.c +++ b/tools/xenstore/xenstored_core.c @@ -2243,6 +2243,8 @@ int main(int argc, char *argv[]) xprintf =3D trace; #endif =20 + claim_resources(); + signal(SIGHUP, trigger_reopen_log); if (tracefile) tracefile =3D talloc_strdup(NULL, tracefile); diff --git a/tools/xenstore/xenstored_core.h b/tools/xenstore/xenstored_cor= e.h index 1467270476..ac26973648 100644 --- a/tools/xenstore/xenstored_core.h +++ b/tools/xenstore/xenstored_core.h @@ -255,6 +255,9 @@ void daemonize(void); /* Close stdin/stdout/stderr to complete daemonize */ void finish_daemonize(void); =20 +/* Set OOM-killer score and raise ulimit. */ +void claim_resources(void); + /* Open a pipe for signal handling */ void init_pipe(int reopen_log_pipe[2]); =20 diff --git a/tools/xenstore/xenstored_minios.c b/tools/xenstore/xenstored_m= inios.c index c94493e52a..df8ff580b0 100644 --- a/tools/xenstore/xenstored_minios.c +++ b/tools/xenstore/xenstored_minios.c @@ -32,6 +32,10 @@ void finish_daemonize(void) { } =20 +void claim_resources(void) +{ +} + void init_pipe(int reopen_log_pipe[2]) { reopen_log_pipe[0] =3D -1; diff --git a/tools/xenstore/xenstored_posix.c b/tools/xenstore/xenstored_po= six.c index 48c37ffe3e..0074fbd8b2 100644 --- a/tools/xenstore/xenstored_posix.c +++ b/tools/xenstore/xenstored_posix.c @@ -22,6 +22,7 @@ #include #include #include +#include =20 #include "utils.h" #include "xenstored_core.h" @@ -87,6 +88,51 @@ void finish_daemonize(void) close(devnull); } =20 +static void avoid_oom_killer(void) +{ + char path[32]; + char val[] =3D "-500"; + int fd; + + snprintf(path, sizeof(path), "/proc/%d/oom_score_adj", (int)getpid()); + + fd =3D open(path, O_WRONLY); + /* Do nothing if file doesn't exist. */ + if (fd < 0) + return; + /* Ignore errors. */ + write(fd, val, sizeof(val)); + close(fd); +} + +/* Max. 32752 domains with 2 open files per domain, plus some spare. */ +#define MAX_FILES 65536 +static void raise_ulimit(void) +{ + struct rlimit rlim; + + if (getrlimit(RLIMIT_NOFILE, &rlim)) + return; + if (rlim.rlim_max !=3D RLIM_INFINITY && rlim.rlim_max < MAX_FILES) + { + rlim.rlim_max =3D MAX_FILES; + setrlimit(RLIMIT_NOFILE, &rlim); + } + if (getrlimit(RLIMIT_NOFILE, &rlim)) + return; + if (rlim.rlim_max =3D=3D RLIM_INFINITY || rlim.rlim_max > MAX_FILES) + rlim.rlim_cur =3D MAX_FILES; + else + rlim.rlim_cur =3D rlim.rlim_max; + setrlimit(RLIMIT_NOFILE, &rlim); +} + +void claim_resources(void) +{ + avoid_oom_killer(); + raise_ulimit(); +} + void init_pipe(int reopen_log_pipe[2]) { int flags; --=20 2.26.2