// Copyright 2014 The Bazel Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // // blaze.cc: bootstrap and client code for Blaze server. // // Responsible for: // - extracting the Python, C++ and Java components. // - starting the server or finding the existing one. // - client options parsing. // - passing the argv array, and printing the out/err streams. // - signal handling. // - exiting with the right error/WTERMSIG code. // - debugger + profiler support. // - mutual exclusion between batch invocations. #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include // NOLINT (gRPC requires this) #include // NOLINT #include #include #include // NOLINT #include #include #include "src/main/cpp/blaze_abrupt_exit.h" #include "src/main/cpp/blaze_globals.h" #include "src/main/cpp/blaze_startup_options.h" #include "src/main/cpp/blaze_util.h" #include "src/main/cpp/blaze_util_platform.h" #include "src/main/cpp/option_processor.h" #include "src/main/cpp/util/errors.h" #include "src/main/cpp/util/exit_code.h" #include "src/main/cpp/util/file.h" #include "src/main/cpp/util/md5.h" #include "src/main/cpp/util/numbers.h" #include "src/main/cpp/util/port.h" #include "src/main/cpp/util/strings.h" #include "third_party/ijar/zip.h" #include "src/main/protobuf/command_server.grpc.pb.h" using blaze_util::Md5Digest; using blaze_util::die; using blaze_util::pdie; using std::set; using std::vector; // This should already be defined in sched.h, but it's not. #ifndef SCHED_BATCH #define SCHED_BATCH 3 #endif namespace blaze { static void WriteFileToStreamOrDie(FILE *stream, const char *file_name); static string BuildServerRequest(); static int GetServerPid(const string &server_dir); // The following is a treatise on how the interaction between the client and the // server works. // // First, the client unconditionally acquires an flock() lock on // $OUTPUT_BASE/lock then verifies if it has already extracted itself by // checking if the directory it extracts itself to (install base + a checksum) // is present. If not, then it does the extraction. Care is taken that this // process is atomic so that Blazen in multiple output bases do not clash. // // Then the client tries to connect to the currently executing server and kills // it if at least one of the following conditions is true: // // - The server is of the wrong version (as determined by the // $OUTPUT_BASE/install symlink) // - The server has different startup options than the client wants // - The client wants to run the command in batch mode // // Then, if needed, the client adjusts the install link to indicate which // version of the server it is running. // // In batch mode, the client then simply executes the server while taking care // that the output base lock is kept until it finishes. // // If in server mode, the client starts up a server if needed then sends the // command to the client and streams back stdout and stderr. If an AF_UNIX // socket is used, the output base lock is held until the command finishes. If // gRPC is used, the lock is released after the command is sent to the server // (the server implements its own locking mechanism) // Synchronization between the client and the server is a little precarious // because the client needs to know the PID of the server and it is not // available using a Java API and we don't have JNI on Windows at the moment, // so the server can't just communicate this over the communication channel. // Thus, a PID file is used, but care needs to be taken that the contents of // this PID file are right. // // Upon server startup, the PID file is written before the client spawns the // server. Thus, when the client can connect, it can be certain that the PID // file is up to date. // // Upon server shutdown, the PID file is deleted using a server shutdown hook. // However, this happens *after* the server stopped listening, so it's possible // that a client has already started up a server and written a new PID file. // In order to avoid this, when the client starts up a new server, it reads the // contents of the PID file and kills the process indicated in it (it could do // with a bit more care, since PIDs can be reused, but for now, we just believe // the PID file) // // Some more interesting scenarios: // // - The server receives a kill signal and it does not have a chance to delete // the PID file: the client cannot connect, reads the PID file, kills the // process indicated in it and starts up a new server. // // - The server stopped accepting connections but hasn't quit yet and a new // client comes around: the new client will kill the server based on the // PID file before a new server is started up. // // Alternative implementations: // // - Don't deal with PIDs at all. This would make it impossible for the client // to deliver a SIGKILL to the server after three SIGINTs. It would only be // possible with gRPC anyway. // // - Have the server check that the PID file containts the correct things // before deleting them: there is a window of time between checking the file // and deleting it in which a new server can overwrite the PID file. The // output base lock cannot be acquired, either, because when starting up a // new server, the client already holds it. // // - Delete the PID file before stopping to accept connections: then a client // could come about after deleting the PID file but before stopping accepting // connections. It would also not be resilient against a dead server that // left a PID file around. // // - The communication method is changed between AF_UNIX and gRPC: the client // will find that the server is not responsive and will kill it based on its // PID. class BlazeServer { protected: BlazeLock blaze_lock_; bool connected_; public: virtual ~BlazeServer() {} // Acquire a lock for the server running in this output base. Returns the // number of milliseconds spent waiting for the lock. uint64_t AcquireLock(); // Whether there is an active connection to a server. bool Connected() const { return connected_; } // Connect to the server. Returns if the connection was successful. Only // call this when this object is in disconnected state. If it returns true, // this object will be in connected state. virtual bool Connect() = 0; // Disconnects from an existing server. Only call this when this object is in // connected state. After this call returns, the object will be in connected // state. virtual void Disconnect() = 0; // Send the command line to the server and forward whatever it says to stdout // and stderr. Returns the desired exit code. Only call this when the server // is in connected state. virtual unsigned int Communicate() = 0; // Disconnects and kills an existing server. Only call this when this object // is in connected state. virtual void KillRunningServer() = 0; // Cancel the currently running command. If there is no command currently // running, the result is unspecified. When called, this object must be in // connected state. virtual void Cancel() = 0; }; //////////////////////////////////////////////////////////////////////// // Global Variables static GlobalVariables *globals; static BlazeServer *blaze_server; static void InitGlobals() { globals = new GlobalVariables; globals->server_pid = -1; globals->sigint_count = 0; globals->received_signal = 0; globals->startup_time = 0; globals->extract_data_time = 0; globals->command_wait_time = 0; globals->restart_reason = NO_RESTART; } uint64_t BlazeServer::AcquireLock() { return blaze::AcquireLock( globals->options.output_base, globals->options.batch, globals->options.block_for_lock, &blaze_lock_); } // Communication method that uses an AF_UNIX socket and a custom protocol. class AfUnixBlazeServer : public BlazeServer { public: AfUnixBlazeServer(); virtual ~AfUnixBlazeServer() {} bool Connect() override; void Disconnect() override; unsigned int Communicate() override; void KillRunningServer() override; void Cancel() override; private: int server_socket_; }; // Communication method that uses gRPC on a socket bound to localhost. More // documentation is in command_server.proto . class GrpcBlazeServer : public BlazeServer { public: GrpcBlazeServer(); virtual ~GrpcBlazeServer() {} bool Connect() override; void Disconnect() override; unsigned int Communicate() override; void KillRunningServer() override; void Cancel() override; private: enum CancelThreadAction { NOTHING, JOIN, CANCEL }; std::unique_ptr client_; std::string request_cookie_; std::string response_cookie_; std::string command_id_; // The mutex is locked only once in the cancel thread (the only place where // we call .wait()), so it's okay to use a condition variable with a // recursive mutex. std::condition_variable_any cancel_thread_signal_; // protects command_id_ and cancel_thread_action_ Needs to be recursive so // that there is no deadlock if the main thread receives a SIGINT while the // mutex is locked. std::recursive_mutex cancel_thread_mutex_; CancelThreadAction cancel_thread_action_; void CancelThread(); }; //////////////////////////////////////////////////////////////////////// // Logic #if !defined(__CYGWIN__) // Returns the canonical form of the base dir given a root and a hashable // string. The resulting dir is composed of the root + md5(hashable) static string GetHashedBaseDir(const string &root, const string &hashable) { unsigned char buf[Md5Digest::kDigestLength]; Md5Digest digest; digest.Update(hashable.data(), hashable.size()); digest.Finish(buf); return root + "/" + digest.String(); } #else // Builds a shorter output base dir name for Windows. // This MD5s together user name and workspace directory, // and only uses 1/3 of the bits to get 8-char alphanumeric // file name. static string GetHashedBaseDirForWindows(const string &root, const string &product_name, const string &user_name, const string &workspace_directory) { static const char* alphabet // Exactly 64 characters. = "abcdefghigklmnopqrstuvwxyzABCDEFGHIGKLMNOPQRSTUVWXYZ0123456789$-"; // The length of the resulting filename (8 characters). static const int filename_length = Md5Digest::kDigestLength / 2; unsigned char buf[Md5Digest::kDigestLength]; char coded_name[filename_length + 1]; Md5Digest digest; digest.Update(user_name.data(), user_name.size()); digest.Update(workspace_directory.data(), workspace_directory.size()); digest.Finish(buf); for (int i = 0; i < filename_length; i++) { coded_name[i] = alphabet[buf[i] & 0x3F]; } coded_name[filename_length] = '\0'; return root + "/" + product_name + "/" + string(coded_name); } #endif // A devtools_ijar::ZipExtractorProcessor to extract the InstallKeyFile class GetInstallKeyFileProcessor : public devtools_ijar::ZipExtractorProcessor { public: explicit GetInstallKeyFileProcessor(string *install_base_key) : install_base_key_(install_base_key) {} virtual bool Accept(const char *filename, const devtools_ijar::u4 attr) { globals->extracted_binaries.push_back(filename); return strcmp(filename, "install_base_key") == 0; } virtual void Process(const char *filename, const devtools_ijar::u4 attr, const devtools_ijar::u1 *data, const size_t size) { string str(reinterpret_cast(data), size); blaze_util::StripWhitespace(&str); if (str.size() != 32) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to extract install_base_key: file size mismatch " "(should be 32, is %zd)", str.size()); } *install_base_key_ = str; } private: string *install_base_key_; }; // Returns the install base (the root concatenated with the contents of the file // 'install_base_key' contained as a ZIP entry in the Blaze binary); as a side // effect, it also populates the extracted_binaries global variable. static string GetInstallBase(const string &root, const string &self_path) { GetInstallKeyFileProcessor processor(&globals->install_md5); std::unique_ptr extractor( devtools_ijar::ZipExtractor::Create(self_path.c_str(), &processor)); if (extractor.get() == NULL) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to open %s as a zip file: (%d) %s", globals->options.GetProductName().c_str(), errno, strerror(errno)); } if (extractor->ProcessAll() < 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to extract install_base_key: %s", extractor->GetError()); } if (globals->install_md5.empty()) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to find install_base_key's in zip file"); } return root + "/" + globals->install_md5; } // Escapes colons by replacing them with '_C' and underscores by replacing them // with '_U'. E.g. "name:foo_bar" becomes "name_Cfoo_Ubar" static string EscapeForOptionSource(const string& input) { string result = input; blaze_util::Replace("_", "_U", &result); blaze_util::Replace(":", "_C", &result); return result; } // Returns the JVM command argument array. static vector GetArgumentArray() { vector result; // e.g. A Blaze server process running in ~/src/build_root (where there's a // ~/src/build_root/WORKSPACE file) will appear in ps(1) as "blaze(src)". string workspace = blaze_util::Basename(blaze_util::Dirname(globals->workspace)); string product = globals->options.GetProductName(); blaze_util::ToLower(&product); result.push_back(product + "(" + workspace + ")"); if (globals->options.batch) { result.push_back("-client"); result.push_back("-Xms256m"); result.push_back("-XX:NewRatio=4"); } else { result.push_back("-server"); } result.push_back("-XX:+HeapDumpOnOutOfMemoryError"); string heap_crash_path = globals->options.output_base; result.push_back("-XX:HeapDumpPath=" + heap_crash_path); result.push_back("-Xverify:none"); vector user_options; user_options.insert(user_options.begin(), globals->options.host_jvm_args.begin(), globals->options.host_jvm_args.end()); // Add JVM arguments particular to building blaze64 and particular JVM // versions. string error; blaze_exit_code::ExitCode jvm_args_exit_code = globals->options.AddJVMArguments(globals->options.GetHostJavabase(), &result, user_options, &error); if (jvm_args_exit_code != blaze_exit_code::SUCCESS) { die(jvm_args_exit_code, "%s", error.c_str()); } if (globals->options.batch && globals->options.oom_more_eagerly) { // Put this OOM trigger with kill after --host_jvm_args, in case // --host_jvm_args contains user-specified OOM triggers since we want those // to execute first. result.push_back("-XX:OnOutOfMemoryError=kill -USR2 %p"); } // We put all directories on the java.library.path that contain .so files. string java_library_path = "-Djava.library.path="; string real_install_dir = blaze_util::JoinPath(globals->options.install_base, "_embedded_binaries"); bool first = true; for (const auto& it : globals->extracted_binaries) { if (IsSharedLibrary(it)) { if (!first) { java_library_path += blaze::ListSeparator(); } first = false; java_library_path += blaze::ConvertPath( blaze_util::JoinPath(real_install_dir, blaze_util::Dirname(it))); } } result.push_back(java_library_path); // Force use of latin1 for file names. result.push_back("-Dfile.encoding=ISO-8859-1"); if (globals->options.host_jvm_debug) { fprintf(stderr, "Running host JVM under debugger (listening on TCP port 5005).\n"); // Start JVM so that it listens for a connection from a // JDWP-compliant debugger: result.push_back("-Xdebug"); result.push_back("-Xrunjdwp:transport=dt_socket,server=y,address=5005"); } result.insert(result.end(), user_options.begin(), user_options.end()); result.push_back("-jar"); result.push_back(blaze::ConvertPath( blaze_util::JoinPath(real_install_dir, globals->extracted_binaries[0]))); if (!globals->options.batch) { result.push_back("--max_idle_secs"); result.push_back(ToString(globals->options.max_idle_secs)); } else { // --batch must come first in the arguments to Java main() because // the code expects it to be at args[0] if it's been set. result.push_back("--batch"); } if (globals->options.command_port != -1) { result.push_back( "--command_port=" + ToString(globals->options.command_port)); } result.push_back("--install_base=" + blaze::ConvertPath(globals->options.install_base)); result.push_back("--install_md5=" + globals->install_md5); result.push_back("--output_base=" + blaze::ConvertPath(globals->options.output_base)); result.push_back("--workspace_directory=" + blaze::ConvertPath(globals->workspace)); if (globals->options.allow_configurable_attributes) { result.push_back("--allow_configurable_attributes"); } if (globals->options.deep_execroot) { result.push_back("--deep_execroot"); } else { result.push_back("--nodeep_execroot"); } if (globals->options.oom_more_eagerly) { result.push_back("--experimental_oom_more_eagerly"); result.push_back("--experimental_oom_more_eagerly_threshold=" + ToString(globals->options.oom_more_eagerly_threshold)); } if (globals->options.watchfs) { result.push_back("--watchfs"); } if (globals->options.fatal_event_bus_exceptions) { result.push_back("--fatal_event_bus_exceptions"); } else { result.push_back("--nofatal_event_bus_exceptions"); } // This is only for Blaze reporting purposes; the real interpretation of the // jvm flags occurs when we set up the java command line. if (globals->options.host_jvm_debug) { result.push_back("--host_jvm_debug"); } if (!globals->options.host_jvm_profile.empty()) { result.push_back("--host_jvm_profile=" + globals->options.host_jvm_profile); } if (!globals->options.host_jvm_args.empty()) { for (const auto &arg : globals->options.host_jvm_args) { result.push_back("--host_jvm_args=" + arg); } } if (globals->options.invocation_policy != NULL && strlen(globals->options.invocation_policy) > 0) { result.push_back(string("--invocation_policy=") + globals->options.invocation_policy); } globals->options.AddExtraOptions(&result); // The option sources are transmitted in the following format: // --option_sources=option1:source1:option2:source2:... string option_sources = "--option_sources="; first = true; for (const auto& it : globals->options.option_sources) { if (!first) { option_sources += ":"; } first = false; option_sources += EscapeForOptionSource(it.first) + ":" + EscapeForOptionSource(it.second); } result.push_back(option_sources); return result; } // Add common command options for logging to the given argument array. static void AddLoggingArgs(vector* args) { args->push_back("--startup_time=" + ToString(globals->startup_time)); if (globals->command_wait_time != 0) { args->push_back("--command_wait_time=" + ToString(globals->command_wait_time)); } if (globals->extract_data_time != 0) { args->push_back("--extract_data_time=" + ToString(globals->extract_data_time)); } if (globals->restart_reason != NO_RESTART) { const char *reasons[] = { "no_restart", "no_daemon", "new_version", "new_options" }; args->push_back( string("--restart_reason=") + reasons[globals->restart_reason]); } args->push_back( string("--binary_path=") + globals->binary_path); } // Join the elements of the specified array with NUL's (\0's), akin to the // format of /proc/$PID/cmdline. static string GetArgumentString(const vector& argument_array) { string result; blaze_util::JoinStrings(argument_array, '\0', &result); return result; } // Do a chdir into the workspace, and die if it fails. static void GoToWorkspace() { if (BlazeStartupOptions::InWorkspace(globals->workspace) && chdir(globals->workspace.c_str()) != 0) { pdie(blaze_exit_code::INTERNAL_ERROR, "chdir() into %s failed", globals->workspace.c_str()); } } // Check the java version if a java version specification is bundled. On // success, returns the executable path of the java command. static string VerifyJavaVersionAndGetJvm() { string exe = globals->options.GetJvm(); string version_spec_file = blaze_util::JoinPath( blaze_util::JoinPath(globals->options.install_base, "_embedded_binaries"), "java.version"); string version_spec = ""; if (ReadFile(version_spec_file, &version_spec)) { blaze_util::StripWhitespace(&version_spec); // A version specification is given, get version of java. string jvm_version = GetJvmVersion(exe); // Compare that jvm_version is found and at least the one specified. if (jvm_version.size() == 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Java version not detected while at least %s is needed.\n" "Please set JAVA_HOME.", version_spec.c_str()); } else if (!CheckJavaVersionIsAtLeast(jvm_version, version_spec)) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Java version is %s while at least %s is needed.\n" "Please set JAVA_HOME.", jvm_version.c_str(), version_spec.c_str()); } } return exe; } // Starts the Blaze server. Returns a readable fd connected to the server. // This is currently used only to detect liveness. static void StartServer(BlazeServerStartup** server_startup) { vector jvm_args_vector = GetArgumentArray(); string argument_string = GetArgumentString(jvm_args_vector); string server_dir = globals->options.output_base + "/server"; // Write the cmdline argument string to the server dir. If we get to this // point, there is no server running, so we don't overwrite the cmdline file // for the existing server. If might be that the server dies and the cmdline // file stays there, but that is not a problem, since we always check the // server, too. WriteFile(argument_string, server_dir + "/cmdline"); // unless we restarted for a new-version, mark this as initial start if (globals->restart_reason == NO_RESTART) { globals->restart_reason = NO_DAEMON; } // Computing this path may report a fatal error, so do it before forking. string exe = VerifyJavaVersionAndGetJvm(); // Go to the workspace before we daemonize, so // we can still print errors to the terminal. GoToWorkspace(); ExecuteDaemon(exe, jvm_args_vector, globals->jvm_log_file.c_str(), server_dir, server_startup); } // Replace this process with blaze in standalone/batch mode. // The batch mode blaze process handles the command and exits. // // This function passes the commands array to the blaze process. // This array should start with a command ("build", "info", etc.). static void StartStandalone(BlazeServer* server) { if (server->Connected()) { server->KillRunningServer(); } // Wall clock time since process startup. globals->startup_time = ProcessClock() / 1000000LL; if (VerboseLogging()) { fprintf(stderr, "Starting %s in batch mode.\n", globals->options.GetProductName().c_str()); } string command = globals->option_processor.GetCommand(); vector command_arguments; globals->option_processor.GetCommandArguments(&command_arguments); if (!command_arguments.empty() && command == "shutdown") { string product = globals->options.GetProductName(); blaze_util::ToLower(&product); fprintf(stderr, "WARNING: Running command \"shutdown\" in batch mode. Batch mode " "is triggered\nwhen not running %s within a workspace. If you " "intend to shutdown an\nexisting %s server, run \"%s " "shutdown\" from the directory where\nit was started.\n", globals->options.GetProductName().c_str(), globals->options.GetProductName().c_str(), product.c_str()); } vector jvm_args_vector = GetArgumentArray(); if (command != "") { jvm_args_vector.push_back(command); AddLoggingArgs(&jvm_args_vector); } jvm_args_vector.insert(jvm_args_vector.end(), command_arguments.begin(), command_arguments.end()); GoToWorkspace(); string exe = VerifyJavaVersionAndGetJvm(); ExecuteProgram(exe, jvm_args_vector); pdie(blaze_exit_code::INTERNAL_ERROR, "execv of '%s' failed", exe.c_str()); } AfUnixBlazeServer::AfUnixBlazeServer() { server_socket_ = -1; connected_ = false; } bool AfUnixBlazeServer::Connect() { assert(!connected_); if (server_socket_ == -1) { server_socket_ = socket(PF_UNIX, SOCK_STREAM, 0); if (server_socket_ == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "can't create AF_UNIX socket"); } if (fcntl(server_socket_, F_SETFD, FD_CLOEXEC) == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "fcntl(F_SETFD, FD_CLOEXEC) failed"); } } struct sockaddr_un addr; addr.sun_family = AF_UNIX; string socket_file = globals->options.output_base + "/server/server.socket"; char *resolved_path = realpath(socket_file.c_str(), NULL); if (resolved_path != NULL) { strncpy(addr.sun_path, resolved_path, sizeof addr.sun_path); addr.sun_path[sizeof addr.sun_path - 1] = '\0'; free(resolved_path); sockaddr *paddr = reinterpret_cast(&addr); int result = connect(server_socket_, paddr, sizeof addr); connected_ = result == 0; if (connected_) { string server_dir = globals->options.output_base + "/server"; globals->server_pid = GetServerPid(server_dir); if (globals->server_pid <= 0) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "can't get PID of existing server (server dir=%s)", server_dir.c_str()); } } return connected_; } else if (errno == ENOENT) { // No socket means no server to connect to errno = ECONNREFUSED; return false; } else { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "realpath('%s') failed", socket_file.c_str()); return false; } } void AfUnixBlazeServer::Disconnect() { assert(connected_); close(server_socket_); connected_ = false; server_socket_ = -1; } static int ServerEof() { // e.g. external SIGKILL of server, misplaced System.exit() in the server, // or a JVM crash. Print out the jvm.out file in case there's something // useful. fprintf(stderr, "Error: unexpected EOF from %s server.\n" "Contents of '%s':\n", globals->options.GetProductName().c_str(), globals->jvm_log_file.c_str()); WriteFileToStreamOrDie(stderr, globals->jvm_log_file.c_str()); return GetExitCodeForAbruptExit(*globals); } // Reads a single char from the specified stream. static int ReadServerChar(int fd, unsigned char *result) { if (read(fd, result, 1) != 1) { return ServerEof(); } return 0; } static int ReadServerInt(int fd, unsigned int *result) { unsigned char buffer[4]; unsigned char *p = buffer; int remaining = 4; while (remaining > 0) { int bytes_read = read(fd, p, remaining); if (bytes_read <= 0) { return ServerEof(); } remaining -= bytes_read; p += bytes_read; } *result = (buffer[0] << 24) + (buffer[1] << 16) + (buffer[2] << 8) + buffer[3]; return 0; } static char server_output_buffer[8192]; // Forwards the output of the server to the specified file handle. static int ForwardServerOutput(int socket, int output) { unsigned int remaining; int exit_code = ReadServerInt(socket, &remaining); if (exit_code != 0) { return exit_code; } while (remaining > 0) { int bytes = remaining > 8192 ? 8192 : remaining; bytes = read(socket, server_output_buffer, bytes); if (bytes <= 0) { return ServerEof(); } remaining -= bytes; // Not much we can do if this doesn't work write(output, server_output_buffer, bytes); } return 0; } unsigned int AfUnixBlazeServer::Communicate() { assert(connected_); const string request = BuildServerRequest(); // Send request (Request is written in a single chunk.) char request_size[4]; request_size[0] = (request.size() >> 24) & 0xff; request_size[1] = (request.size() >> 16) & 0xff; request_size[2] = (request.size() >> 8) & 0xff; request_size[3] = (request.size()) & 0xff; if (write(server_socket_, request_size, 4) != 4) { pdie(blaze_exit_code::INTERNAL_ERROR, "write() to server failed"); } if (write(server_socket_, request.data(), request.size()) != request.size()) { pdie(blaze_exit_code::INTERNAL_ERROR, "write() to server failed"); } // Wait until we receive some response from the server. // (We do this by calling select() with a timeout.) // If we don't receive a response within 3 seconds, print a message, // so that the user has some idea what is going on. while (true) { fd_set fdset; FD_ZERO(&fdset); FD_SET(server_socket_, &fdset); struct timeval timeout; timeout.tv_sec = 3; timeout.tv_usec = 0; int result = select(server_socket_ + 1, &fdset, NULL, &fdset, &timeout); if (result > 0) { // Data is ready on socket. Go ahead and read it. break; } else if (result == 0) { // Timeout. Print a message, then go ahead and read from // the socket (the read will usually block). fprintf(stderr, "INFO: Waiting for response from %s server (pid %d)...\n", globals->options.GetProductName().c_str(), globals->server_pid); break; } else { // result < 0 // Error. For EINTR we try again, all other errors are fatal. if (errno != EINTR) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "select() on server socket failed"); } } } // Read and demux the response. const int TAG_STDOUT = 1; const int TAG_STDERR = 2; const int TAG_CONTROL = 3; unsigned int exit_code; for (;;) { // Read the tag unsigned char tag; exit_code = ReadServerChar(server_socket_, &tag); if (exit_code != 0) { return exit_code; } switch (tag) { // stdout case TAG_STDOUT: exit_code = ForwardServerOutput(server_socket_, STDOUT_FILENO); if (exit_code != 0) { return exit_code; } break; // stderr case TAG_STDERR: exit_code = ForwardServerOutput(server_socket_, STDERR_FILENO); if (exit_code != 0) { return exit_code; } break; // Control stream. Currently only used for reporting the exit code. case TAG_CONTROL: unsigned int length; exit_code = ReadServerInt(server_socket_, &length); if (exit_code != 0) { // We cannot read the length field. The return value of ReadSeverInt() // is the result of ServerEof(), so we bail out early so that we don't // call ServerEof() twice. return exit_code; } if (length != 4) { return ServerEof(); } unsigned int server_exit_code; exit_code = ReadServerInt(server_socket_, &server_exit_code); return exit_code != 0 ? exit_code : server_exit_code; default: fprintf(stderr, "bad tag %d\n", tag); return ServerEof(); } } } void AfUnixBlazeServer::Cancel() { assert(connected_); kill(globals->server_pid, SIGINT); } // Write the contents of file_name to stream. static void WriteFileToStreamOrDie(FILE *stream, const char *file_name) { FILE *fp = fopen(file_name, "r"); if (fp == NULL) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "opening %s failed", file_name); } char buffer[255]; int num_read; while ((num_read = fread(buffer, 1, sizeof buffer, fp)) > 0) { if (ferror(fp)) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "failed to read from '%s'", file_name); } fwrite(buffer, 1, num_read, stream); } fclose(fp); } // After connecting to the Blaze server, initialize server_pid. Return -1 if // there was an error. static int GetServerPid(const string &server_dir) { // Note: there is no race here on startup since the server creates // the pid file strictly before it binds the socket. char buf[33]; // The server writes a file, but we need to handle old servers that still // write a symlink. // TODO(lberki): Remove the readlink() call when there is no chance of an old // server lingering around. Probably safe after 2016.06.01. int len; string pid_file = blaze_util::JoinPath(server_dir, ServerPidFile()); string pid_symlink = blaze_util::JoinPath(server_dir, ServerPidSymlink()); len = readlink(pid_symlink.c_str(), buf, sizeof(buf) - 1); if (len < 0) { int fd = open(pid_file.c_str(), O_RDONLY); if (fd < 0) { return -1; } len = read(fd, buf, 32); close(fd); if (len < 0) { return -1; } } int result; buf[len] = 0; if (!blaze_util::safe_strto32(string(buf), &result)) { return -1; } return result; } // Starts up a new server and connects to it. Exits if it didn't work not. static void StartServerAndConnect(BlazeServer *server) { string server_dir = globals->options.output_base + "/server"; // The server dir has the socket, so we don't allow access by other // users. if (MakeDirectories(server_dir, 0700) == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "server directory '%s' could not be created", server_dir.c_str()); } string socket_file = blaze_util::JoinPath(server_dir, "server.socket"); // If we couldn't connect to the server check if there is still a PID file // and if so, kill the server that wrote it. This can happen e.g. if the // server is in a GC pause and therefore cannot respond to ping requests and // having two server instances running in the same output base is a // disaster. int server_pid = GetServerPid(server_dir); if (server_pid > 0) { fprintf(stderr, "Found non-responsive server process (pid=%d). Killing it.\n", server_pid); KillServerProcess(server_pid, globals->options.output_base, globals->options.install_base); } SetScheduling(globals->options.batch_cpu_scheduling, globals->options.io_nice_level); BlazeServerStartup* server_startup; StartServer(&server_startup); // Give the server one minute to start up. for (int ii = 0; ii < 600; ++ii) { // 60s; enough time to connect with debugger if (server->Connect()) { if (ii) { fputc('\n', stderr); fflush(stderr); } delete server_startup; return; } fputc('.', stderr); fflush(stderr); poll(NULL, 0, 1000); // sleep 100ms. (usleep(3) is obsolete.) if (!server_startup->IsStillAlive()) { fprintf(stderr, "\nunexpected pipe read status: %s\n" "Server presumed dead. Now printing '%s':\n", strerror(errno), globals->jvm_log_file.c_str()); WriteFileToStreamOrDie(stderr, globals->jvm_log_file.c_str()); exit(blaze_exit_code::INTERNAL_ERROR); } } die(blaze_exit_code::INTERNAL_ERROR, "\nError: couldn't connect to server at '%s' after 60 seconds.", socket_file.c_str()); } // Poll until the given process denoted by pid goes away. Return false if this // does not occur within wait_time_secs. static bool WaitForServerDeath(pid_t pid, int wait_time_secs) { for (int ii = 0; ii < wait_time_secs * 10; ++ii) { if (kill(pid, 0) == -1) { if (errno == ESRCH) { return true; } pdie(blaze_exit_code::INTERNAL_ERROR, "could not be killed"); } poll(NULL, 0, 100); // sleep 100ms. (usleep(3) is obsolete.) } return false; } // Kills the specified running Blaze server. First we send a SIGTERM, and if // that does not kill the process, a SIGKILL. void AfUnixBlazeServer::KillRunningServer() { assert(connected_); assert(globals->server_pid > 0); close(server_socket_); server_socket_ = -1; fprintf(stderr, "Sending SIGTERM to previous %s server (pid=%d)... ", globals->options.GetProductName().c_str(), globals->server_pid); fflush(stderr); kill(globals->server_pid, SIGTERM); if (WaitForServerDeath(globals->server_pid, 10)) { fprintf(stderr, "done.\n"); connected_ = false; return; } // If the previous attempt did not suceeded, kill the whole group. fprintf(stderr, "Sending SIGKILL to previous %s server process group (pid=%d)... ", globals->options.GetProductName().c_str(), globals->server_pid); fflush(stderr); killpg(globals->server_pid, SIGKILL); if (WaitForServerDeath(globals->server_pid, 10)) { fprintf(stderr, "killed.\n"); connected_ = false; return; } // Process did not go away 10s after SIGKILL. Stuck in state 'Z' or 'D'? pdie(blaze_exit_code::INTERNAL_ERROR, "SIGKILL unsuccessful after 10s"); } // Calls fsync() on the file (or directory) specified in 'file_path'. // pdie()'s if syncing fails. static void SyncFile(const char *file_path) { // fsync always fails on Cygwin with "Permission denied" for some reason. #ifndef __CYGWIN__ int fd = open(file_path, O_RDONLY); if (fd < 0) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "failed to open '%s' for syncing", file_path); } if (fsync(fd) < 0) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "failed to sync '%s'", file_path); } close(fd); #endif } // Walks the temporary directory recursively and collects full file paths. static void CollectExtractedFiles(const string &dir_path, vector &files) { DIR *dir; struct dirent *ent; if ((dir = opendir(dir_path.c_str())) == NULL) { die(blaze_exit_code::INTERNAL_ERROR, "opendir failed"); } while ((ent = readdir(dir)) != NULL) { if (!strcmp(ent->d_name, ".") || !strcmp(ent->d_name, "..")) { continue; } string filename(blaze_util::JoinPath(dir_path, ent->d_name)); bool is_directory; if (ent->d_type == DT_UNKNOWN) { struct stat buf; if (lstat(filename.c_str(), &buf) == -1) { die(blaze_exit_code::INTERNAL_ERROR, "stat failed"); } is_directory = S_ISDIR(buf.st_mode); } else { is_directory = (ent->d_type == DT_DIR); } if (is_directory) { CollectExtractedFiles(filename, files); } else { files.push_back(filename); } } closedir(dir); } // A devtools_ijar::ZipExtractorProcessor to extract the files from the blaze // zip. class ExtractBlazeZipProcessor : public devtools_ijar::ZipExtractorProcessor { public: explicit ExtractBlazeZipProcessor(const string &embedded_binaries) : embedded_binaries_(embedded_binaries) {} virtual bool Accept(const char *filename, const devtools_ijar::u4 attr) { return !devtools_ijar::zipattr_is_dir(attr); } virtual void Process(const char *filename, const devtools_ijar::u4 attr, const devtools_ijar::u1 *data, const size_t size) { string path = blaze_util::JoinPath(embedded_binaries_, filename); if (MakeDirectories(blaze_util::Dirname(path), 0777) == -1) { pdie(blaze_exit_code::INTERNAL_ERROR, "couldn't create '%s'", path.c_str()); } int fd = open(path.c_str(), O_CREAT | O_WRONLY, 0755); if (fd < 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to open extraction file: %s", strerror(errno)); } if (write(fd, data, size) != size) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nError writing zipped file to %s", path.c_str()); } if (close(fd) != 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nCould not close file %s", path.c_str()); } } private: const string embedded_binaries_; }; // Actually extracts the embedded data files into the tree whose root // is 'embedded_binaries'. static void ActuallyExtractData(const string &argv0, const string &embedded_binaries) { ExtractBlazeZipProcessor processor(embedded_binaries); if (MakeDirectories(embedded_binaries, 0777) == -1) { pdie(blaze_exit_code::INTERNAL_ERROR, "couldn't create '%s'", embedded_binaries.c_str()); } fprintf(stderr, "Extracting %s installation...\n", globals->options.GetProductName().c_str()); std::unique_ptr extractor( devtools_ijar::ZipExtractor::Create(argv0.c_str(), &processor)); if (extractor.get() == NULL) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to open %s as a zip file: (%d) %s", globals->options.GetProductName().c_str(), errno, strerror(errno)); } if (extractor->ProcessAll() < 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "\nFailed to extract %s as a zip file: %s", globals->options.GetProductName().c_str(), extractor->GetError()); } const time_t TEN_YEARS_IN_SEC = 3600 * 24 * 365 * 10; time_t future_time = time(NULL) + TEN_YEARS_IN_SEC; // Set the timestamps of the extracted files to the future and make sure (or // at least as sure as we can...) that the files we have written are actually // on the disk. vector extracted_files; CollectExtractedFiles(embedded_binaries, extracted_files); set synced_directories; for (vector::iterator it = extracted_files.begin(); it != extracted_files.end(); it++) { const char *extracted_path = it->c_str(); // Set the time to a distantly futuristic value so we can observe tampering. // Note that keeping the default timestamp set by unzip (1970-01-01) and using // that to detect tampering is not enough, because we also need the timestamp // to change between Blaze releases so that the metadata cache knows that // the files may have changed. This is important for actions that use // embedded binaries as artifacts. struct utimbuf times = { future_time, future_time }; if (utime(extracted_path, ×) == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "failed to set timestamp on '%s'", extracted_path); } SyncFile(extracted_path); string directory = blaze_util::Dirname(extracted_path); // Now walk up until embedded_binaries and sync every directory in between. // synced_directories is used to avoid syncing the same directory twice. // The !directory.empty() and directory != "/" conditions are not strictly // needed, but it makes this loop more robust, because otherwise, if due to // some glitch, directory was not under embedded_binaries, it would get // into an infinite loop. while (directory != embedded_binaries && synced_directories.count(directory) == 0 && !directory.empty() && directory != "/") { SyncFile(directory.c_str()); synced_directories.insert(directory); directory = blaze_util::Dirname(directory); } } SyncFile(embedded_binaries.c_str()); } // Installs Blaze by extracting the embedded data files, iff necessary. // The MD5-named install_base directory on disk is trusted; we assume // no-one has modified the extracted files beneath this directory once // it is in place. Concurrency during extraction is handled by // extracting in a tmp dir and then renaming it into place where it // becomes visible automically at the new path. // Populates globals->extracted_binaries with their extracted locations. static void ExtractData(const string &self_path) { // If the install dir doesn't exist, create it, if it does, we know it's good. struct stat buf; if (stat(globals->options.install_base.c_str(), &buf) == -1) { uint64_t st = MonotonicClock(); // Work in a temp dir to avoid races. string tmp_install = globals->options.install_base + ".tmp." + ToString(getpid()); string tmp_binaries = tmp_install + "/_embedded_binaries"; ActuallyExtractData(self_path, tmp_binaries); uint64_t et = MonotonicClock(); globals->extract_data_time = (et - st) / 1000000LL; // Now rename the completed installation to its final name. If this // fails due to an ENOTEMPTY then we assume another good // installation snuck in before us. if (rename(tmp_install.c_str(), globals->options.install_base.c_str()) == -1 && errno != ENOTEMPTY) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "install base directory '%s' could not be renamed into place", tmp_install.c_str()); } } else { if (!S_ISDIR(buf.st_mode)) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Error: Install base directory '%s' could not be created. " "It exists but is not a directory.", globals->options.install_base.c_str()); } const time_t time_now = time(NULL); string real_install_dir = blaze_util::JoinPath( globals->options.install_base, "_embedded_binaries"); for (const auto& it : globals->extracted_binaries) { string path = blaze_util::JoinPath(real_install_dir, it); // Check that the file exists and is readable. if (stat(path.c_str(), &buf) == -1) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Error: corrupt installation: file '%s' missing." " Please remove '%s' and try again.", path.c_str(), globals->options.install_base.c_str()); } // Check that the timestamp is in the future. A past timestamp would indicate // that the file has been tampered with. See ActuallyExtractData(). if (!S_ISDIR(buf.st_mode) && buf.st_mtime <= time_now) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Error: corrupt installation: file '%s' " "modified. Please remove '%s' and try again.", path.c_str(), globals->options.install_base.c_str()); } } } } // Returns true if the server needs to be restarted to accommodate changes // between the two argument lists. static bool ServerNeedsToBeKilled(const vector& args1, const vector& args2) { // We need not worry about one side missing an argument and the other side // having the default value, since this command line is already the // canonicalized one that always contains every switch (with default values // if it was not present on the real command line). Same applies for argument // ordering. if (args1.size() != args2.size()) { return true; } for (int i = 0; i < args1.size(); i++) { string option_sources = "--option_sources="; if (args1[i].substr(0, option_sources.size()) == option_sources && args2[i].substr(0, option_sources.size()) == option_sources) { continue; } if (args1[i] != args2[i]) { return true; } if (args1[i] == "--max_idle_secs") { // Skip the argument of --max_idle_secs. i++; } } return false; } // Kills the running Blaze server, if any, if the startup options do not match. static void KillRunningServerIfDifferentStartupOptions(BlazeServer* server) { if (!server->Connected()) { return; } string cmdline_path = globals->options.output_base + "/server/cmdline"; string joined_arguments; // No, /proc/$PID/cmdline does not work, because it is limited to 4K. Even // worse, its behavior differs slightly between kernels (in some, when longer // command lines are truncated, the last 4 bytes are replaced with // "..." + NUL. ReadFile(cmdline_path, &joined_arguments); vector arguments = blaze_util::Split(joined_arguments, '\0'); // These strings contain null-separated command line arguments. If they are // the same, the server can stay alive, otherwise, it needs shuffle off this // mortal coil. if (ServerNeedsToBeKilled(arguments, GetArgumentArray())) { globals->restart_reason = NEW_OPTIONS; fprintf(stderr, "WARNING: Running %s server needs to be killed, because the " "startup options are different.\n", globals->options.GetProductName().c_str()); server->KillRunningServer(); } } // Kills the old running server if it is not the same version as us, // dealing with various combinations of installation scheme // (installation symlink and older MD5_MANIFEST contents). // This function requires that the installation be complete, and the // server lock acquired. static void EnsureCorrectRunningVersion(BlazeServer* server) { // Read the previous installation's semaphore symlink in output_base. If the // target dirs don't match, or if the symlink was not present, then kill any // running servers. Lastly, symlink to our installation so others know which // installation is running. string installation_path = globals->options.output_base + "/install"; string prev_installation; bool ok = ReadDirectorySymlink(installation_path.c_str(), &prev_installation); if (!ok || !CompareAbsolutePaths( prev_installation, globals->options.install_base)) { if (server->Connected()) { server->KillRunningServer(); } globals->restart_reason = NEW_VERSION; UnlinkPath(installation_path.c_str()); if (!SymlinkDirectories(globals->options.install_base.c_str(), installation_path.c_str())) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "failed to create installation symlink '%s'", installation_path.c_str()); } const time_t time_now = time(NULL); struct utimbuf times = { time_now, time_now }; if (utime(globals->options.install_base.c_str(), ×) == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "failed to set timestamp on '%s'", globals->options.install_base.c_str()); } } } // A signal-safe version of fprintf(stderr, ...). // // WARNING: any output from the blaze client may be interleaved // with output from the blaze server. In --curses mode, // the Blaze server often erases the previous line of output. // So, be sure to end each such message with TWO newlines, // otherwise it may be erased by the next message from the // Blaze server. // Also, it's a good idea to start each message with a newline, // in case the Blaze server has written a partial line. static void sigprintf(const char *format, ...) { char buf[1024]; va_list ap; va_start(ap, format); int r = vsnprintf(buf, sizeof buf, format, ap); va_end(ap); write(STDERR_FILENO, buf, r); } // Signal handler. static void handler(int signum) { // A defensive measure: if (kill(globals->server_pid, 0) == -1 && errno == ESRCH) { sigprintf("\n%s server has died; client exiting.\n\n", globals->options.GetProductName().c_str()); _exit(1); } switch (signum) { case SIGINT: if (++globals->sigint_count >= 3) { sigprintf("\n%s caught third interrupt signal; killed.\n\n", globals->options.GetProductName().c_str()); killpg(globals->server_pid, SIGKILL); _exit(1); } sigprintf("\n%s caught interrupt signal; shutting down.\n\n", globals->options.GetProductName().c_str()); blaze_server->Cancel(); break; case SIGTERM: sigprintf("\n%s caught terminate signal; shutting down.\n\n", globals->options.GetProductName().c_str()); blaze_server->Cancel(); break; case SIGPIPE: // Don't bother the user with a message in this case; they're // probably using head(1) or more(1). blaze_server->Cancel(); globals->received_signal = SIGPIPE; break; case SIGQUIT: sigprintf("\nSending SIGQUIT to JVM process %d (see %s).\n\n", globals->server_pid, globals->jvm_log_file.c_str()); kill(globals->server_pid, SIGQUIT); break; } } // Constructs the command line for a server request. static string BuildServerRequest() { vector arg_vector; string command = globals->option_processor.GetCommand(); if (command != "") { arg_vector.push_back(command); AddLoggingArgs(&arg_vector); } globals->option_processor.GetCommandArguments(&arg_vector); string request("blaze"); for (vector::iterator it = arg_vector.begin(); it != arg_vector.end(); it++) { request.push_back('\0'); request.append(*it); } return request; } // Performs all I/O for a single client request to the server, and // shuts down the client (by exit or signal). static ATTRIBUTE_NORETURN void SendServerRequest(BlazeServer* server) { while (true) { if (!server->Connected()) { StartServerAndConnect(server); } // Check for deleted server cwd: string server_cwd = GetProcessCWD(globals->server_pid); // TODO(bazel-team): Is this check even necessary? If someone deletes or // moves the server directory, the client cannot connect to the server // anymore. IOW, the client finds the server based on the output base, // so if a server is found, it should be by definition at the correct output // base. // // If server_cwd is empty, GetProcessCWD failed. This notably occurs when // running under Docker because then readlink(/proc/[pid]/cwd) returns // EPERM. // Docker issue #6687 (https://github.com/docker/docker/issues/6687) fixed // this, but one still needs the --cap-add SYS_PTRACE command line flag, at // least according to the discussion on Docker issue #6800 // (https://github.com/docker/docker/issues/6687), and even then, it's a // non-default Docker flag. Given that this occurs only in very weird // cases, it's better to assume that everything is alright if we can't get // the cwd. if (!server_cwd.empty() && (server_cwd != globals->workspace || // changed server_cwd.find(" (deleted)") != string::npos)) { // deleted. // There's a distant possibility that the two paths look the same yet are // actually different because the two processes have different mount // tables. if (VerboseLogging()) { fprintf(stderr, "Server's cwd moved or deleted (%s).\n", server_cwd.c_str()); } server->KillRunningServer(); } else { break; } } if (VerboseLogging()) { fprintf(stderr, "Connected (server pid=%d).\n", globals->server_pid); } // Wall clock time since process startup. globals->startup_time = ProcessClock() / 1000000LL; // Unblock all signals. sigset_t sigset; sigemptyset(&sigset); sigprocmask(SIG_SETMASK, &sigset, NULL); signal(SIGINT, handler); signal(SIGTERM, handler); signal(SIGPIPE, handler); signal(SIGQUIT, handler); int exit_code = server->Communicate(); if (globals->received_signal) { // Kill ourselves with the same signal, so that callers see the // right WTERMSIG value. signal(globals->received_signal, SIG_DFL); raise(globals->received_signal); exit(1); // (in case raise didn't kill us for some reason) } else { exit(exit_code); } } // Parse the options, storing parsed values in globals. static void ParseOptions(int argc, const char *argv[]) { string error; blaze_exit_code::ExitCode parse_exit_code = globals->option_processor.ParseOptions(argc, argv, globals->workspace, globals->cwd, &error); if (parse_exit_code != blaze_exit_code::SUCCESS) { die(parse_exit_code, "%s", error.c_str()); } globals->options = globals->option_processor.GetParsedStartupOptions(); } // Returns the canonical form of a path. static string MakeCanonical(const char *path) { char *resolved_path = realpath(path, NULL); if (resolved_path == NULL) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "realpath('%s') failed", path); } string ret = resolved_path; free(resolved_path); return ret; } // Compute the globals globals->cwd and globals->workspace. static void ComputeWorkspace() { char cwdbuf[PATH_MAX]; if (getcwd(cwdbuf, sizeof cwdbuf) == NULL) { pdie(blaze_exit_code::INTERNAL_ERROR, "getcwd() failed"); } globals->cwd = MakeCanonical(cwdbuf); globals->workspace = BlazeStartupOptions::GetWorkspace(globals->cwd); } // Figure out the base directories based on embedded data, username, cwd, etc. // Sets globals->options.install_base, globals->options.output_base, // globals->lockfile, globals->jvm_log_file. static void ComputeBaseDirectories(const string &self_path) { // Only start a server when in a workspace because otherwise we won't do more // than emit a help message. if (!BlazeStartupOptions::InWorkspace(globals->workspace)) { globals->options.batch = true; } // The default install_base is /install/ // but if an install_base is specified on the command line, we use that as // the base instead. if (globals->options.install_base.empty()) { string install_user_root = globals->options.output_user_root + "/install"; globals->options.install_base = GetInstallBase(install_user_root, self_path); } else { // We call GetInstallBase anyway to populate extracted_binaries and // install_md5. GetInstallBase("", self_path); } if (globals->options.output_base.empty()) { #if !defined(__CYGWIN__) globals->options.output_base = GetHashedBaseDir( globals->options.output_user_root, globals->workspace); #else globals->options.output_base = GetHashedBaseDirForWindows( blaze::GetOutputRoot(), globals->options.GetProductName(), blaze::GetUserName(), globals->workspace); #endif } struct stat buf; if (stat(globals->options.output_base.c_str(), &buf) == -1) { if (MakeDirectories(globals->options.output_base, 0777) == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Output base directory '%s' could not be created", globals->options.output_base.c_str()); } } else { if (!S_ISDIR(buf.st_mode)) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Error: Output base directory '%s' could not be created. " "It exists but is not a directory.", globals->options.output_base.c_str()); } } if (access(globals->options.output_base.c_str(), R_OK | W_OK | X_OK) != 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "Error: Output base directory '%s' must be readable and writable.", globals->options.output_base.c_str()); } globals->options.output_base = MakeCanonical(globals->options.output_base.c_str()); globals->lockfile = globals->options.output_base + "/lock"; globals->jvm_log_file = globals->options.output_base + "/server/jvm.out"; } static void CheckEnvironment() { if (getenv("LD_ASSUME_KERNEL") != NULL) { // Fix for bug: if ulimit -s and LD_ASSUME_KERNEL are both // specified, the JVM fails to create threads. See thread_stack_regtest. // This is also provoked by LD_LIBRARY_PATH=/usr/lib/debug, // or anything else that causes the JVM to use LinuxThreads. fprintf(stderr, "Warning: ignoring LD_ASSUME_KERNEL in environment.\n"); unsetenv("LD_ASSUME_KERNEL"); } if (getenv("LD_PRELOAD") != NULL) { fprintf(stderr, "Warning: ignoring LD_PRELOAD in environment.\n"); unsetenv("LD_PRELOAD"); } if (getenv("_JAVA_OPTIONS") != NULL) { // This would override --host_jvm_args fprintf(stderr, "Warning: ignoring _JAVA_OPTIONS in environment.\n"); unsetenv("_JAVA_OPTIONS"); } if (getenv("TEST_TMPDIR") != NULL) { fprintf(stderr, "INFO: $TEST_TMPDIR defined: output root default is " "'%s'.\n", globals->options.output_root.c_str()); } // TODO(bazel-team): We've also seen a failure during loading (creating // threads?) when ulimit -Hs 8192. Characterize that and check for it here. // Make the JVM use ISO-8859-1 for parsing its command line because "blaze // run" doesn't handle non-ASCII command line arguments. This is apparently // the most reliable way to select the platform default encoding. setenv("LANG", "en_US.ISO-8859-1", 1); setenv("LANGUAGE", "en_US.ISO-8859-1", 1); setenv("LC_ALL", "en_US.ISO-8859-1", 1); setenv("LC_CTYPE", "en_US.ISO-8859-1", 1); } static void SetupStreams() { // Line-buffer stderr, since we always flush at the end of a server // message. This saves lots of single-char calls to write(2). // This doesn't work if any writes to stderr have already occurred! setlinebuf(stderr); // Ensure we have three open fds. Otherwise we can end up with // bizarre things like stdout going to the lock file, etc. if (fcntl(0, F_GETFL) == -1) open("/dev/null", O_RDONLY); if (fcntl(1, F_GETFL) == -1) open("/dev/null", O_WRONLY); if (fcntl(2, F_GETFL) == -1) open("/dev/null", O_WRONLY); } // Set an 8MB stack for Blaze. When the stack max is unbounded, it changes the // layout in the JVM's address space, and we are unable to instantiate the // default 3000MB heap. static void EnsureFiniteStackLimit() { struct rlimit limit; const int default_stack = 8 * 1024 * 1024; // 8MB. if (getrlimit(RLIMIT_STACK, &limit)) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "getrlimit() failed"); } if (default_stack < limit.rlim_cur) { limit.rlim_cur = default_stack; if (setrlimit(RLIMIT_STACK, &limit)) { perror("setrlimit() failed: If the stack limit is too high, " "this can cause the JVM to be unable to allocate enough " "contiguous address space for its heap"); } } } static void CheckBinaryPath(const string& argv0) { if (argv0[0] == '/') { globals->binary_path = argv0; } else { string abs_path = globals->cwd + '/' + argv0; char *resolved_path = realpath(abs_path.c_str(), NULL); if (resolved_path) { globals->binary_path = resolved_path; free(resolved_path); } else { // This happens during our integration tests, but thats okay, as we won't // log the invocation anyway. globals->binary_path = abs_path; } } } // Create the user's directory where we keep state, installations etc. // Typically, this happens inside a temp directory, so we have to be // careful about symlink attacks. static void CreateSecureOutputRoot() { const char* root = globals->options.output_user_root.c_str(); struct stat fileinfo = {}; if (MakeDirectories(root, 0755) == -1) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "mkdir('%s')", root); } // The path already exists. // Check ownership and mode, and verify that it is a directory. if (lstat(root, &fileinfo) < 0) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "lstat('%s')", root); } if (fileinfo.st_uid != geteuid()) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "'%s' is not owned by me", root); } if ((fileinfo.st_mode & 022) != 0) { int new_mode = fileinfo.st_mode & (~022); if (chmod(root, new_mode) < 0) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "'%s' has mode %o, chmod to %o failed", root, fileinfo.st_mode & 07777, new_mode); } } if (stat(root, &fileinfo) < 0) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "stat('%s')", root); } if (!S_ISDIR(fileinfo.st_mode)) { die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "'%s' is not a directory", root); } } // TODO(bazel-team): Execute the server as a child process and write its exit // code to a file. In case the server becomes unresonsive or terminates // unexpectedly (in a way that isn't already handled), we can observe the file, // if it exists. (If it doesn't, then we know something went horribly wrong.) int main(int argc, const char *argv[]) { InitGlobals(); SetupStreams(); // Must be done before command line parsing. ComputeWorkspace(); CheckBinaryPath(argv[0]); ParseOptions(argc, argv); #ifdef __CYGWIN__ if (globals->options.command_port == -1) { // AF_UNIX does not work on Windows, so use gRPC instead. globals->options.command_port = 0; } #endif string error; blaze_exit_code::ExitCode reexec_options_exit_code = globals->options.CheckForReExecuteOptions(argc, argv, &error); if (reexec_options_exit_code != blaze_exit_code::SUCCESS) { die(reexec_options_exit_code, "%s", error.c_str()); } CheckEnvironment(); CreateSecureOutputRoot(); const string self_path = GetSelfPath(); ComputeBaseDirectories(self_path); blaze_server = globals->options.command_port >= 0 ? static_cast(new GrpcBlazeServer()) : static_cast(new AfUnixBlazeServer()); globals->command_wait_time = blaze_server->AcquireLock(); WarnFilesystemType(globals->options.output_base); EnsureFiniteStackLimit(); ExtractData(self_path); blaze_server->Connect(); EnsureCorrectRunningVersion(blaze_server); KillRunningServerIfDifferentStartupOptions(blaze_server); if (globals->options.batch) { SetScheduling(globals->options.batch_cpu_scheduling, globals->options.io_nice_level); StartStandalone(blaze_server); } else { SendServerRequest(blaze_server); } return 0; } static void null_grpc_log_function(gpr_log_func_args *args) { } GrpcBlazeServer::GrpcBlazeServer() { gpr_set_log_function(null_grpc_log_function); connected_ = false; } bool GrpcBlazeServer::Connect() { assert(!connected_); std::string server_dir = globals->options.output_base + "/server"; std::string port; std::string ipv4_prefix = "127.0.0.1:"; std::string ipv6_prefix_1 = "[0:0:0:0:0:0:0:1]:"; std::string ipv6_prefix_2 = "[::1]:"; if (!ReadFile(server_dir + "/command_port", &port)) { return false; } // Make sure that we are being directed to localhost if (port.compare(0, ipv4_prefix.size(), ipv4_prefix) && port.compare(0, ipv6_prefix_1.size(), ipv6_prefix_1) && port.compare(0, ipv6_prefix_2.size(), ipv6_prefix_2)) { return false; } if (!ReadFile(server_dir + "/request_cookie", &request_cookie_)) { return false; } if (!ReadFile(server_dir + "/response_cookie", &response_cookie_)) { return false; } std::shared_ptr channel(grpc::CreateChannel( port, grpc::InsecureChannelCredentials())); std::unique_ptr client( command_server::CommandServer::NewStub(channel)); grpc::ClientContext context; context.set_deadline( std::chrono::system_clock::now() + std::chrono::seconds(1)); command_server::PingRequest request; command_server::PingResponse response; request.set_cookie(request_cookie_); grpc::Status status = client->Ping(&context, request, &response); if (!status.ok() || response.cookie() != response_cookie_) { return false; } globals->server_pid = GetServerPid(server_dir); if (globals->server_pid <= 0) { pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "can't get PID of existing server (server dir=%s)", server_dir.c_str()); } this->client_ = std::move(client); connected_ = true; return true; } // Cancellation works as follows: // // When the user presses Ctrl-C, a SIGINT is delivered to the client, which is // translated into a BlazeServer::Cancel() call. Since it's not a good idea to // do significant work in signal handlers, all it does is to set a flag and wake // up the cancellation thread. // // That thread in turn issues the CancelRequest RPC to the server if the command // ID is known. If not, it goes to sleep again until the server tells the client // the command ID, at which point it wakes up again and delivers the // cancellation request. // // In every case, the cancellation thread is joined at the end of the execution // of the command. The main thread wakes it up just so that it can finish // (using the JOIN action) // // It's conceivable that the server is busy and thus it cannot service the // cancellation request. In that case, we simply ignore the failure and the both // the server and the client go on as if nothing had happened (except that this // Ctrl-C still counts as a SIGINT, three of which result in a SIGKILL being // delivered to the server) void GrpcBlazeServer::CancelThread() { bool running = true; std::unique_lock lock(cancel_thread_mutex_); while (running) { cancel_thread_signal_.wait(lock); switch (cancel_thread_action_) { case JOIN: running = false; cancel_thread_action_ = NOTHING; break; case CANCEL: // If we don't know the command ID yet, we'll be woken up when it // becomes known. if (command_id_.size() > 0) { command_server::CancelRequest request; request.set_cookie(request_cookie_); request.set_command_id(command_id_); grpc::ClientContext context; context.set_deadline(std::chrono::system_clock::now() + std::chrono::milliseconds(100)); command_server::CancelResponse response; // There isn't a lot we can do if this request fails client_->Cancel(&context, request, &response); cancel_thread_action_ = NOTHING; } break; case NOTHING: break; } } } // This will wait indefinitely until the server shuts down void GrpcBlazeServer::KillRunningServer() { assert(connected_); assert(globals->server_pid > 0); grpc::ClientContext context; command_server::RunRequest request; command_server::RunResponse response; request.set_cookie(request_cookie_); request.set_block_for_lock(globals->options.block_for_lock); request.set_client_description( "pid=" + ToString(getpid()) + " (for shutdown)"); request.add_arg("shutdown"); std::unique_ptr> reader( client_->Run(&context, request)); while (reader->Read(&response)) {} // Kill the server process for good measure. KillServerProcess(globals->server_pid, globals->options.output_base, globals->options.install_base); connected_ = false; } unsigned int GrpcBlazeServer::Communicate() { assert(connected_); vector arg_vector; string command = globals->option_processor.GetCommand(); if (command != "") { arg_vector.push_back(command); AddLoggingArgs(&arg_vector); } globals->option_processor.GetCommandArguments(&arg_vector); command_server::RunRequest request; request.set_cookie(request_cookie_); request.set_block_for_lock(globals->options.block_for_lock); request.set_client_description("pid=" + ToString(getpid())); for (const string& arg : arg_vector) { request.add_arg(arg); } grpc::ClientContext context; command_server::RunResponse response; std::unique_ptr> reader( client_->Run(&context, request)); // Release the server lock because the gRPC handles concurrent clients just // fine. Note that this may result in two "waiting for other client" messages // (one during server startup and one emitted by the server) blaze::ReleaseLock(&blaze_lock_); { std::unique_lock lock(cancel_thread_mutex_); cancel_thread_action_ = NOTHING; } std::thread cancel_thread(&GrpcBlazeServer::CancelThread, this); bool command_id_set = false; while (reader->Read(&response)) { if (response.cookie() != response_cookie_) { fprintf(stderr, "\nServer response cookie invalid, exiting\n"); return blaze_exit_code::INTERNAL_ERROR; } if (response.standard_output().size() > 0) { write(1, response.standard_output().c_str(), response.standard_output().size()); } if (response.standard_error().size() > 0) { write(2, response.standard_error().c_str(), response.standard_error().size()); } if (!command_id_set && response.command_id().size() > 0) { std::unique_lock lock(cancel_thread_mutex_); command_id_ = response.command_id(); command_id_set = true; // Wake up the cancellation thread in case there is a pending cancellation cancel_thread_signal_.notify_one(); } } { // Wake up the cancellation thread so that it can finish std::unique_lock lock(cancel_thread_mutex_); cancel_thread_action_ = JOIN; cancel_thread_signal_.notify_one(); } cancel_thread.join(); if (!response.finished()) { fprintf(stderr, "\nServer finished RPC without an explicit exit code\n"); exit(blaze_exit_code::INTERNAL_ERROR); } return response.exit_code(); } void GrpcBlazeServer::Disconnect() { assert(connected_); client_.reset(); request_cookie_ = ""; response_cookie_ = ""; connected_ = false; } void GrpcBlazeServer::Cancel() { assert(connected_); std::unique_lock lock(cancel_thread_mutex_); // Wake up the cancellation thread and tell it to issue its RPC cancel_thread_action_ = CANCEL; cancel_thread_signal_.notify_one(); } } // namespace blaze int main(int argc, const char *argv[]) { return blaze::main(argc, argv); }