Installation of the judgehosts
A DOMjudge installation requires one or more judgehosts which will perform the actual compilation and evaluation of submissions.
Requirements
System requirements
The operating system is a Linux variant. DOMjudge has mostly been tested with Debian and Ubuntu on AMD64, but should work on other environments. See our wiki for information about DOMjudge and WSLv2.
It is necessary that you have root access.
A TCP/IP network which connects the DOMserver and the judgehosts. The machines only need HTTP(S) access to the DOMserver.
Software requirements
Sudo
Debootstrap
PHP command line interface with the
curl
,json
,xml
,zip
extensions.A C/C++ compiler, the instructions below suggest
gcc
/g++
but something else such asclang
will also work.
For Debian:
sudo apt install make pkg-config sudo debootstrap libcgroup-dev \
php-cli php-curl php-json php-xml php-zip lsof procps gcc g++
For RHEL 7/Fedora [*]:
sudo dnf install make pkgconfig sudo libcgroup-devel lsof \
php-cli php-mbstring php-xml php-process procps-ng gcc g++ \
glibc-static libstdc++-static
Removing apport
Some systems (like Ubuntu) ship with apport
, which conflicts with judging.
To uninstall it, run:
sudo apt remove apport
Building and installing
These instructions assume a release tarball, see this section for instructions to build from git sources.
After installing the software listed above, run configure. In this
example to install DOMjudge in the directory domjudge
under /opt:
./configure --prefix=/opt/domjudge
make judgehost
sudo make install-judgehost
Example service files for the judgehost and the judgedaemon are provided in
judge/create-cgroups.service
and judge/domjudge-judgedaemon@.service
. The rest of the manual assumes you install those
in a location which is picked up by systemd
, for example /etc/systemd/system
.
cp judge/domjudge-judgedaemon@.service /etc/systemd/system/
cp judge/create-cgroups.service /etc/systemd/system/
The judgedaemon can be run on various hardware configurations;
A virtual machine, typically these have 1 or 2 cores and no hyperthreading, because the kernel will schedule its own tasks on CPU 0, we advice CPU 1,
A default office machine, these sometimes have hyperthreading. Verify if the machine has hyperthreading and consider turning it off and as a rule of thumb pick CPU 2 as CPU 1 could be a hyperthreading core, be on the same die as CPU 0 and therefore share memory with that CPU. If more cores available as a rule of thumb moving to the highest CPU should be considered.
Multiple on a single high-grade server with multiple CPUs or a CPU with multiple cores. Check for hyperthreading and if possible run the judgedaemons on separate CPU packages/dies both from each other and when possible different from CPU 0. See the section Multiple judgedaemons per machine for running multiple judgedaemons on a single host.
For the next section we assume a machine with possibly hyperthreading and 3 or more CPUs. This can be checked with:
lscpu | grep "Thread(s) per core"
having a value above 1 indicates hyperthreading or:
cat /sys/devices/system/cpu/smt/active
a value of 1 or on. The target CPU core to restrict the judgedaemon to below should be in the range of:
cat /sys/devices/system/cpu/online
For running solution programs under a non-privileged user, a user and group have
to be added to the system that acts as judgehost. This user does not
need a home-directory or password, so the following command would
suffice to add a user and group domjudge-run-2
with minimal privileges
with the judgedaemon restricted to CPU core 2:
sudo groupadd domjudge-run
sudo useradd -d /nonexistent -g domjudge-run -M -s /bin/false domjudge-run-2
The -2
suffix corresponds to a judgedaemon bound to CPU core 2
with the option -n 2
, see Starting the judgedaemon. If you do not
want to bind the judgedaemon to a core, create a user domjudge-run
and start the judgedaemon without -n
option.
See the section Multiple judgedaemons per machine for running multiple
judgedaemons on a single host.
Sudo permissions
The judgedaemon uses a wrapper to isolate programs when compiling
or running the submissions called runguard
. This wrapper needs
to be able to become root for certain operations like changing to the
runuser and performing a chroot. Also, the default
chroot-startstop.sh
script uses sudo to gain privileges for
certain operations. There’s a pregenerated snippet
in etc/sudoers-domjudge
that contains all required rules. You can
put this snippet in /etc/sudoers.d/
.
If you change the user you start the judgedaemon as, or the installation paths, be sure to update the sudoers rules accordingly.
Creating a chroot environment
The judgedaemon compiles and executes submissions inside a chroot
environment for security reasons. By default it mounts parts of a
prebuilt chroot tree read-only during this judging process (using
the script lib/judge/chroot-startstop.sh
). The chroot needs
to contain the compilers, interpreters and support libraries that
are needed at compile- and at runtime for the supported languages.
This chroot tree can be built using the script
bin/dj_make_chroot
. On Debian and Ubuntu the same
distribution and version as the host system are used, on other Linux
distributions the latest stable Debian release will be used to build
the chroot. Any extra packages to support languages (compilers and
runtime environments) can be passed with the option -i
or be
added to the INSTALLDEBS
variable in the script. The script
bin/dj_run_chroot
runs an interactive shell or a command inside
the chroot. This can be used for example to install new or upgrade
existing packages inside the chroot.
Run these scripts with option -h
for more information.
Finally, if necessary edit the script lib/judge/chroot-startstop.sh
and adapt it to work with your local system. In case you changed the
default pre-built chroot directory, make sure to also update the sudo
rules and the CHROOTORIGINAL
variable in chroot-startstop.sh
.
Linux Control Groups
DOMjudge uses Linux Control Groups or cgroups for process isolation in the judgedaemon. Linux cgroups give more accurate measurement of actually allocated memory than traditional resource limits (which is helpful with interpreters like Java that reserve but do not actually use lots of memory). Also, cgroups are used to restrict network access so no separate measures are necessary, and they allow running multiple judgedaemons on a multi-core machine by using CPU binding.
The judgedaemon needs to run a recent Linux kernel (at least 3.2.0). The following steps configure cgroups on Debian. Instructions for other distributions may be different (send us your feedback!).
Edit grub config to add cgroup memory and swap accounting to the boot
options. Edit /etc/default/grub
and change the default
commandline to
GRUB_CMDLINE_LINUX_DEFAULT="quiet cgroup_enable=memory swapaccount=1"
Optionally the timings can be made more stable by not letting the OS schedule
any other tasks on the same CPU core the judgedaemon is using:
GRUB_CMDLINE_LINUX_DEFAULT="quiet cgroup_enable=memory swapaccount=1 isolcpus=2"
On modern systems where cgroup v2 is available, DOMjudge will try to
use that. This requires kernel versions 5.19 or 6.0 or later to
support reporting peak memory usage. If not found, the system will try
to fall back to cgroup v1, but this might require you to add
systemd.unified_cgroup_hierarchy=0
to the boot options as well.
You have now configured the system to use cgroups. To create the actual cgroups that DOMjudge will use you need to run:
sudo systemctl enable create-cgroups --now
Note that this service will automatically be started if you use the
domjudge-judgehost
service, see below. Alternatively, you can
customize the script judge/create_cgroups
as required and run it
after each boot.
The script jvm_footprint can be used to measure the memory overhead of the JVM for languages such as Kotlin and Java.
REST API credentials
The judgehost connects to the domserver via a REST API. You need to create an account in the DOMjudge web interface for the judgedaemons to use (this may be a shared account between all judgedaemons) with a difficult, random password and the ‘judgehost’ role.
On each judgehost, copy from the domserver (or create) a file
etc/restapi.secret
containing the id, URL,
username and password whitespace-separated on one line, for example:
default http://example.edu/domjudge/api/ judgehost MzfJYWF5agSlUfmiGEy5mgkfqU
The exact URL to use can be found in the Config Checker in the
admin web interface; the password here must be identical to that of the
judgehost
user. Multiple lines may be specified to allow a
judgedaemon to work for multiple domservers. The id in the first column
is used to differentiate between multiple domservers, and should be
unique within the restapi.secret
file.
Starting the judgedaemon
Finally start the judgedaemon:
bin/judgedaemon -n 2
Upon its first connection to the domserver API, the judgehost will be auto-registered and will be by default enabled. If you wish to add a new judgehost but have it initially disabled, you can change the config setting to automatically pause judges on first connection or manually add it through the DOMjudge web interface and set it to disabled before starting the judgedaemon.
The judgedaemon can also be run as a service by running:
sudo systemctl enable --now domjudge-judgehost.target