X-Git-Url: http://info.iut-bm.univ-fcomte.fr/pub/gitweb/simgrid.git/blobdiff_plain/bbf8aab8704722fb68397b9b1c15251e79efac6a..a0c5b1ab11469128ad826610f54b1f0f332bd172:/src/mc/Session.cpp diff --git a/src/mc/Session.cpp b/src/mc/Session.cpp index 99696652ab..13f3d72b3e 100644 --- a/src/mc/Session.cpp +++ b/src/mc/Session.cpp @@ -9,16 +9,16 @@ #include -#include -#include -#include -#include +#include "xbt/log.h" +#include "xbt/system_error.hpp" #include +#include +#include #include "src/mc/Session.hpp" #include "src/mc/mc_state.h" #include "src/mc/mc_private.h" -#include "src/mc/Checker.hpp" +#include "src/mc/checker/Checker.hpp" XBT_LOG_NEW_DEFAULT_SUBCATEGORY(mc_Session, mc, "Model-checker session"); @@ -32,9 +32,9 @@ static void setup_child_environment(int socket) sigset_t mask; sigemptyset (&mask); if (sigprocmask(SIG_SETMASK, &mask, nullptr) < 0) - throw simgrid::xbt::errno_error(errno, "Could not unblock signals"); + throw simgrid::xbt::errno_error("Could not unblock signals"); if (prctl(PR_SET_PDEATHSIG, SIGHUP) != 0) - throw simgrid::xbt::errno_error(errno, "Could not PR_SET_PDEATHSIG"); + throw simgrid::xbt::errno_error("Could not PR_SET_PDEATHSIG"); #endif int res; @@ -42,7 +42,7 @@ static void setup_child_environment(int socket) // Remove CLOEXEC in order to pass the socket to the exec-ed program: int fdflags = fcntl(socket, F_GETFD, 0); if (fdflags == -1 || fcntl(socket, F_SETFD, fdflags & ~FD_CLOEXEC) == -1) - throw simgrid::xbt::errno_error(errno, "Could not remove CLOEXEC for socket"); + throw simgrid::xbt::errno_error("Could not remove CLOEXEC for socket"); // Set environment: setenv(MC_ENV_VARIABLE, "1", 1); @@ -66,7 +66,7 @@ pid_t do_fork(F code) { pid_t pid = fork(); if (pid < 0) - throw simgrid::xbt::errno_error(errno, "Could not fork model-checked process"); + throw simgrid::xbt::errno_error("Could not fork model-checked process"); if (pid != 0) return pid; @@ -85,8 +85,7 @@ Session::Session(pid_t pid, int socket) { std::unique_ptr process(new simgrid::mc::Process(pid, socket)); // TODO, automatic detection of the config from the process - process->privatized( - xbt_cfg_get_boolean("smpi/privatize_global_variables")); + process->privatized(smpi_privatize_global_variables != SMPI_PRIVATIZE_NONE); modelChecker_ = std::unique_ptr( new simgrid::mc::ModelChecker(std::move(process))); xbt_assert(mc_model_checker == nullptr); @@ -132,7 +131,7 @@ void Session::logState() } // static -Session* Session::fork(std::function code) +Session* Session::fork(std::function code) { // Create a AF_LOCAL socketpair used for exchanging messages // bewteen the model-checker process (ourselves) and the model-checked @@ -141,9 +140,9 @@ Session* Session::fork(std::function code) int sockets[2]; res = socketpair(AF_LOCAL, SOCK_DGRAM | SOCK_CLOEXEC, 0, sockets); if (res == -1) - throw simgrid::xbt::errno_error(errno, "Could not create socketpair"); + throw simgrid::xbt::errno_error("Could not create socketpair"); - pid_t pid = do_fork([&] { + pid_t pid = do_fork([sockets, &code] { ::close(sockets[1]); setup_child_environment(sockets[0]); code(); @@ -159,16 +158,16 @@ Session* Session::fork(std::function code) // static Session* Session::spawnv(const char *path, char *const argv[]) { - return Session::fork([&] { + return Session::fork([path, argv] { execv(path, argv); }); } // static -Session* Session::spawnvp(const char *path, char *const argv[]) +Session* Session::spawnvp(const char *file, char *const argv[]) { - return Session::fork([&] { - execvp(path, argv); + return Session::fork([file, argv] { + execvp(file, argv); }); }