// Copyright 2014 The Bazel Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "src/main/cpp/blaze_util_platform.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include "src/main/cpp/blaze_util.h" #include "src/main/cpp/util/errors.h" #include "src/main/cpp/util/exit_code.h" #include "src/main/cpp/util/file.h" #include "src/main/cpp/util/logging.h" #include "src/main/cpp/util/strings.h" namespace blaze { using blaze_util::GetLastErrorString; using std::string; using std::vector; // A stack based class for RAII type handling of CF based types that need // CFRelease called on them. Checks for NULL before calling release. template class CFScopedReleaser { public: explicit CFScopedReleaser(T value) : value_(value) { } ~CFScopedReleaser() { if (isValid()) { CFRelease(value_); } } T get() { return value_; } operator T() { return value_; } bool isValid() { return value_ != NULL; } private: T value_; CFScopedReleaser() { } CFScopedReleaser(const CFScopedReleaser&); CFScopedReleaser& operator=(CFScopedReleaser&); }; // Convert a CFStringRef to a UTF8 encoded c string static string UTF8StringFromCFStringRef(CFStringRef cf_string) { std::string utf8_string; if (cf_string) { CFIndex length = CFStringGetLength(cf_string); CFIndex max_size = CFStringGetMaximumSizeForEncoding(length, kCFStringEncodingUTF8) + 1; vector buffer(max_size); if (CFStringGetCString(cf_string, &buffer[0], max_size, kCFStringEncodingUTF8)) { utf8_string = &buffer[0]; } } return utf8_string; } // Extract description from a CFError. static string DescriptionFromCFError(CFErrorRef cf_err) { if (!cf_err) { return ""; } CFScopedReleaser cf_err_string(CFErrorCopyDescription(cf_err)); return UTF8StringFromCFStringRef(cf_err_string); } string GetOutputRoot() { return "/var/tmp"; } void WarnFilesystemType(const string& output_base) { // Check to see if we are on a non-local drive. CFScopedReleaser cf_url(CFURLCreateFromFileSystemRepresentation( kCFAllocatorDefault, reinterpret_cast(output_base.c_str()), output_base.length(), true)); CFBooleanRef cf_local = NULL; CFErrorRef cf_error = NULL; if (!cf_url.isValid() || !CFURLCopyResourcePropertyForKey(cf_url, kCFURLVolumeIsLocalKey, &cf_local, &cf_error)) { CFScopedReleaser cf_error_releaser(cf_error); BAZEL_LOG(WARNING) << "couldn't get file system type information for '" << output_base << "': " << DescriptionFromCFError(cf_error_releaser); return; } CFScopedReleaser cf_local_releaser(cf_local); if (!CFBooleanGetValue(cf_local_releaser)) { BAZEL_LOG(WARNING) << "Output base '" << output_base << "' is on a non-local drive. This may lead to " "surprising failures and undetermined behavior."; } } string GetSelfPath() { char pathbuf[PROC_PIDPATHINFO_MAXSIZE] = {}; int len = proc_pidpath(getpid(), pathbuf, sizeof(pathbuf)); if (len == 0) { BAZEL_DIE(blaze_exit_code::INTERNAL_ERROR) << "error calling proc_pidpath: " << GetLastErrorString(); } return string(pathbuf, len); } uint64_t GetMillisecondsMonotonic() { struct timeval ts = {}; if (gettimeofday(&ts, NULL) < 0) { BAZEL_DIE(blaze_exit_code::INTERNAL_ERROR) << "error calling gettimeofday: " << GetLastErrorString(); } return ts.tv_sec * 1000LL + ts.tv_usec / 1000LL; } uint64_t GetMillisecondsSinceProcessStart() { return (clock() * 1000LL) / CLOCKS_PER_SEC; } void SetScheduling(bool batch_cpu_scheduling, int io_nice_level) { // stubbed out so we can compile for Darwin. } string GetProcessCWD(int pid) { struct proc_vnodepathinfo info = {}; if (proc_pidinfo( pid, PROC_PIDVNODEPATHINFO, 0, &info, sizeof(info)) != sizeof(info)) { return ""; } return string(info.pvi_cdir.vip_path); } bool IsSharedLibrary(const string &filename) { return blaze_util::ends_with(filename, ".dylib"); } string GetSystemJavabase() { string java_home = GetEnv("JAVA_HOME"); if (!java_home.empty()) { return java_home; } FILE *output = popen("/usr/libexec/java_home -v 1.7+", "r"); if (output == NULL) { return ""; } char buf[512]; char *result = fgets(buf, sizeof(buf), output); pclose(output); if (result == NULL) { return ""; } string javabase = buf; if (javabase.empty()) { return ""; } // The output ends with a \n, trim it off. return javabase.substr(0, javabase.length()-1); } void WriteSystemSpecificProcessIdentifier( const string& server_dir, pid_t server_pid) { } bool VerifyServerProcess(int pid, const string &output_base) { // TODO(lberki): This only checks for the process's existence, not whether // its start time matches. Therefore this might accidentally kill an // unrelated process if the server died and the PID got reused. return killpg(pid, 0) == 0; } // Sets a flag on path to exclude the path from Apple's automatic backup service // (Time Machine) void ExcludePathFromBackup(const string &path) { CFScopedReleaser cf_url(CFURLCreateFromFileSystemRepresentation( kCFAllocatorDefault, reinterpret_cast(path.c_str()), path.length(), true)); if (!cf_url.isValid()) { BAZEL_LOG(WARNING) << "unable to exclude '" << path << "' from backups"; return; } CFErrorRef cf_error = NULL; if (!CFURLSetResourcePropertyForKey(cf_url, kCFURLIsExcludedFromBackupKey, kCFBooleanTrue, &cf_error)) { CFScopedReleaser cf_error_releaser(cf_error); BAZEL_LOG(WARNING) << "unable to exclude '" << path << "' from backups: " << DescriptionFromCFError(cf_error_releaser); return; } } int32_t GetExplicitSystemLimit(const int resource) { const char* sysctl_name; switch (resource) { case RLIMIT_NOFILE: sysctl_name = "kern.maxfilesperproc"; break; case RLIMIT_NPROC: sysctl_name = "kern.maxprocperuid"; break; default: return 0; } int32_t limit; size_t len = sizeof(limit); if (sysctlbyname(sysctl_name, &limit, &len, nullptr, 0) == -1) { BAZEL_LOG(WARNING) << "failed to get value of sysctl " << sysctl_name << ": " << std::strerror(errno); return 0; } if (len != sizeof(limit)) { BAZEL_LOG(WARNING) << "failed to get value of sysctl " << sysctl_name << ": returned data length " << len << " did not match expected size " << sizeof(limit); return 0; } return limit; } } // namespace blaze.