// Berkeley Open Infrastructure for Network Computing // http://boinc.berkeley.edu // Copyright (C) 2005 University of California // // This is free software; you can redistribute it and/or // modify it under the terms of the GNU Lesser General Public // License as published by the Free Software Foundation; // either version 2.1 of the License, or (at your option) any later version. // // This software is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. // See the GNU Lesser General Public License for more details. // // To view the GNU Lesser General Public License visit // http://www.gnu.org/copyleft/lesser.html // or write to the Free Software Foundation, Inc., // 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA // The BOINC scheduling server. // // command-line options: // --batch // stdin contains a catenated sequence of request messages. Do them all. // // Note: use_files is a debugging option (see below). // But it's a compile setting, not a cmdline flag #include "config.h" #include #include #include #include using namespace std; #include #include #include #include #include #include #include #include "boinc_db.h" #include "parse.h" #include "filesys.h" #include "error_numbers.h" #include "shmem.h" #include "util.h" #include "sched_config.h" #include "server_types.h" #include "handle_request.h" #include "sched_util.h" #include "sched_msgs.h" #include "main.h" #ifdef _USING_FCGI_ #include "fcgi_stdio.h" #endif // Useful for debugging, if your cgi script keeps crashing. This // makes it dump a core file that you can load into a debugger to see // where the problem is. #define DUMP_CORE_ON_SEGV 0 #define DEBUG_LEVEL 999 #define MAX_FCGI_COUNT 20 #define REQ_FILE_PREFIX "/tmp/boinc_req_" #define REPLY_FILE_PREFIX "/tmp/boinc_reply_" bool use_files = false; // use disk files for req/reply msgs (for debugging) SCHED_CONFIG config; GUI_URLS gui_urls; PROJECT_FILES project_files; key_t sema_key; int g_pid; static bool db_opened=false; bool shmem_failed = false; void send_message(const char* msg, int delay, bool send_header) { if (send_header) { printf("Content-type: text/plain\n\n"); } printf( "\n" " %s\n" " %d\n" " \n" "\n", msg, delay ); } int open_database() { int retval; if (db_opened) return 0; retval = boinc_db.open(config.db_name, config.db_host, config.db_user, config.db_passwd); if (retval) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "can't open database\n"); return retval; } db_opened = true; return 0; } void debug_sched(SCHEDULER_REQUEST& sreq, SCHEDULER_REPLY& sreply, const char *trigger); // If the scheduler 'hangs', which it can do if a request is not fully processed // or some other process arises, then Apache will send a SIGTERM to the cgi. // This signal handler ensures that rather than dying silently, the cgi process // will leave behind some record in the log file. // void sigterm_handler(int signo) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "Caught signal %d [scheduler ran %f seconds]. Exit(1)ing\n", signo, elapsed_wallclock_time() ); fflush(NULL); exit(1); return; } void log_request_info(int& length) { char *cl=getenv("CONTENT_LENGTH"); char *ri=getenv("REMOTE_ADDR"); char *rm=getenv("REQUEST_METHOD"); char *ct=getenv("CONTENT_TYPE"); char *ha=getenv("HTTP_ACCEPT"); char *hu=getenv("HTTP_USER_AGENT"); log_messages.printf(SCHED_MSG_LOG::MSG_DEBUG, "\n"); log_messages.printf(SCHED_MSG_LOG::MSG_DEBUG, "REQUEST_METHOD=%s " "CONTENT_TYPE=%s " "HTTP_ACCEPT=%s " "HTTP_USER_AGENT=%s\n", rm?rm:"" , ct?ct:"", ha?ha:"", hu?hu:"" ); if (!cl) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "CONTENT_LENGTH environment variable not set\n"); } else { length=atoi(cl); log_messages.printf(SCHED_MSG_LOG::MSG_DEBUG, "CONTENT_LENGTH=%d from %s\n", length, ri?ri:"[Unknown]"); } } #if DUMP_CORE_ON_SEGV void set_core_dump_size_limit() { struct rlimit limit; if (getrlimit(RLIMIT_CORE, &limit)) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "Unable to read resource limit for core dump size.\n" ); } else { char short_string[256], *short_message=short_string; short_message += sprintf(short_message,"Default resource limit for core dump size curr="); if (limit.rlim_cur == RLIM_INFINITY) short_message += sprintf(short_message,"Inf max="); else short_message += sprintf(short_message,"%d max=", (int)limit.rlim_cur); if (limit.rlim_max == RLIM_INFINITY) short_message += sprintf(short_message,"Inf\n"); else short_message += sprintf(short_message,"%d\n", (int)limit.rlim_max); log_messages.printf(SCHED_MSG_LOG::MSG_DEBUG, "%s", short_string); // now set limit to the maximum allowed value limit.rlim_cur=limit.rlim_max; if (setrlimit(RLIMIT_CORE, &limit)) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "Unable to set current resource limit for core dump size to max value.\n" ); } else { log_messages.printf(SCHED_MSG_LOG::MSG_DEBUG, "Set limit for core dump size to max value.\n" ); } } } #endif SCHED_SHMEM* attach_to_feeder_shmem() { char path[256]; get_project_dir(path, sizeof(path)); get_key(path, 'a', sema_key); SCHED_SHMEM* ssp = 0; int i, retval; void* p; retval = attach_shmem(config.shmem_key, &p); if (retval || p==0) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "Can't attach shmem: %d (feeder not running?)\n", retval ); shmem_failed = true; } else { ssp = (SCHED_SHMEM*)p; retval = ssp->verify(); if (retval) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "shmem has wrong struct sizes - recompile\n" ); send_message("Server has software problem", 3600, true); exit(0); } for (i=0; i<10; i++) { if (ssp->ready) break; log_messages.printf(SCHED_MSG_LOG::MSG_DEBUG, "waiting for ready flag\n" ); sleep(1); } if (!ssp->ready) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "feeder doesn't seem to be running\n" ); send_message("Project encountered internal error: feeder not running", 3600, true); exit(0); } } return ssp; } int main(int argc, char** argv) { FILE* fin, *fout; int i, retval; char req_path[256], reply_path[256], path[256]; SCHED_SHMEM* ssp=0; unsigned int counter=0; char* code_sign_key; int length=-1; log_messages.pid = getpid(); bool batch = false; for (i=1; i= 0 && counter < MAX_FCGI_COUNT) { while(FCGI_Accept() >= 0) { counter++; #endif if (shmem_failed) { send_message("Project encountered internal error: shared memory", 3600, true); goto done; } log_request_info(length); if (use_files) { struct stat statbuf; // the code below is convoluted because, // instead of going from stdin to stdout directly, // we go via a pair of disk files // (this makes it easy to save the input, // and to know the length of the output). // sprintf(req_path, "%s%d_%u", REQ_FILE_PREFIX, g_pid, counter); sprintf(reply_path, "%s%d_%u", REPLY_FILE_PREFIX, g_pid, counter); fout = fopen(req_path, "w"); if (!fout) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "can't write request file\n" ); exit(1); } copy_stream(stdin, fout); fclose(fout); stat(req_path, &statbuf); if (length>=0 && (statbuf.st_size != length)) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "Request length %d != CONTENT_LENGTH %d\n", (int)statbuf.st_size, length ); } fin = fopen(req_path, "r"); if (!fin) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "can't read request file\n" ); exit(1); } fout = fopen(reply_path, "w"); if (!fout) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "can't write reply file\n" ); exit(1); } handle_request(fin, fout, *ssp, code_sign_key); fclose(fin); fclose(fout); fin = fopen(reply_path, "r"); if (!fin) { log_messages.printf(SCHED_MSG_LOG::MSG_CRITICAL, "can't read reply file\n" ); exit(1); } copy_stream(fin, stdout); fclose(fin); #ifdef EINSTEIN_AT_HOME if (getenv("CONTENT_LENGTH")) unlink(req_path); if (getenv("CONTENT_LENGTH")) unlink(reply_path); #else // unlink(req_path); // unlink(reply_path); #endif #ifndef _USING_FCGI_ } else if (batch) { while (!feof(stdin)) { handle_request(stdin, stdout, *ssp, code_sign_key); fflush(stdout); } #endif } else { handle_request(stdin, stdout, *ssp, code_sign_key); } done: #ifdef _USING_FCGI_ fprintf(stderr, "FCGI: counter: %d\n", counter); continue; } if (counter == MAX_FCGI_COUNT) { fprintf(stderr, "FCGI: counter passed MAX_FCGI_COUNT - exiting..\n"); } else { fprintf(stderr, "FCGI: FCGI_Accept failed - exiting..\n"); } // when exiting, write headers back to apache so it won't complain // about "incomplete headers" fprintf(stdout,"Content-type: text/plain\n\n"); #endif if (db_opened) { boinc_db.close(); } } const char *BOINC_RCSID_0ebdf5d770 = "$Id$";