X-Git-Url: http://info.iut-bm.univ-fcomte.fr/pub/gitweb/simgrid.git/blobdiff_plain/0a82e90d4cfdd7e27e1b946d22aff74a5abdda99..1fc042e8bc9c51f9267fa1936deaebe59ae01ee7:/src/mc/Session.cpp diff --git a/src/mc/Session.cpp b/src/mc/Session.cpp index 99696652ab..b88f98dd72 100644 --- a/src/mc/Session.cpp +++ b/src/mc/Session.cpp @@ -1,24 +1,26 @@ -/* Copyright (c) 2015-2016. The SimGrid Team. +/* Copyright (c) 2015-2017. The SimGrid Team. * All rights reserved. */ /* This program is free software; you can redistribute it and/or modify it * under the terms of the license (GNU LGPL) which comes with this package. */ +#include #include -#include #include -#include -#include -#include -#include +#include "xbt/log.h" +#include "xbt/system_error.hpp" #include +#include +#include #include "src/mc/Session.hpp" -#include "src/mc/mc_state.h" -#include "src/mc/mc_private.h" -#include "src/mc/Checker.hpp" +#include "src/mc/checker/Checker.hpp" +#include "src/mc/mc_private.hpp" +#include "src/mc/mc_state.hpp" + +#include "src/smpi/include/private.hpp" XBT_LOG_NEW_DEFAULT_SUBCATEGORY(mc_Session, mc, "Model-checker session"); @@ -32,9 +34,9 @@ static void setup_child_environment(int socket) sigset_t mask; sigemptyset (&mask); if (sigprocmask(SIG_SETMASK, &mask, nullptr) < 0) - throw simgrid::xbt::errno_error(errno, "Could not unblock signals"); + throw simgrid::xbt::errno_error("Could not unblock signals"); if (prctl(PR_SET_PDEATHSIG, SIGHUP) != 0) - throw simgrid::xbt::errno_error(errno, "Could not PR_SET_PDEATHSIG"); + throw simgrid::xbt::errno_error("Could not PR_SET_PDEATHSIG"); #endif int res; @@ -42,7 +44,7 @@ static void setup_child_environment(int socket) // Remove CLOEXEC in order to pass the socket to the exec-ed program: int fdflags = fcntl(socket, F_GETFD, 0); if (fdflags == -1 || fcntl(socket, F_SETFD, fdflags & ~FD_CLOEXEC) == -1) - throw simgrid::xbt::errno_error(errno, "Could not remove CLOEXEC for socket"); + throw simgrid::xbt::errno_error("Could not remove CLOEXEC for socket"); // Set environment: setenv(MC_ENV_VARIABLE, "1", 1); @@ -66,7 +68,7 @@ pid_t do_fork(F code) { pid_t pid = fork(); if (pid < 0) - throw simgrid::xbt::errno_error(errno, "Could not fork model-checked process"); + throw simgrid::xbt::errno_error("Could not fork model-checked process"); if (pid != 0) return pid; @@ -83,10 +85,9 @@ pid_t do_fork(F code) Session::Session(pid_t pid, int socket) { - std::unique_ptr process(new simgrid::mc::Process(pid, socket)); + std::unique_ptr process(new simgrid::mc::RemoteClient(pid, socket)); // TODO, automatic detection of the config from the process - process->privatized( - xbt_cfg_get_boolean("smpi/privatize_global_variables")); + process->privatized(smpi_privatize_global_variables != SMPI_PRIVATIZE_NONE); modelChecker_ = std::unique_ptr( new simgrid::mc::ModelChecker(std::move(process))); xbt_assert(mc_model_checker == nullptr); @@ -132,18 +133,18 @@ void Session::logState() } // static -Session* Session::fork(std::function code) +Session* Session::fork(std::function code) { // Create a AF_LOCAL socketpair used for exchanging messages - // bewteen the model-checker process (ourselves) and the model-checked + // between the model-checker process (ourselves) and the model-checked // process: int res; int sockets[2]; - res = socketpair(AF_LOCAL, SOCK_DGRAM | SOCK_CLOEXEC, 0, sockets); + res = socketpair(AF_LOCAL, SOCK_SEQPACKET | SOCK_CLOEXEC, 0, sockets); if (res == -1) - throw simgrid::xbt::errno_error(errno, "Could not create socketpair"); + throw simgrid::xbt::errno_error("Could not create socketpair"); - pid_t pid = do_fork([&] { + pid_t pid = do_fork([sockets, &code] { ::close(sockets[1]); setup_child_environment(sockets[0]); code(); @@ -159,16 +160,16 @@ Session* Session::fork(std::function code) // static Session* Session::spawnv(const char *path, char *const argv[]) { - return Session::fork([&] { + return Session::fork([path, argv] { execv(path, argv); }); } // static -Session* Session::spawnvp(const char *path, char *const argv[]) +Session* Session::spawnvp(const char *file, char *const argv[]) { - return Session::fork([&] { - execvp(path, argv); + return Session::fork([file, argv] { + execvp(file, argv); }); }