X-Git-Url: http://info.iut-bm.univ-fcomte.fr/pub/gitweb/simgrid.git/blobdiff_plain/c00d9de77c55596919956e198769dee003776c71..fe304706848f0a64477d4687b3ea97d5b9a0c35c:/src/mc/Session.cpp diff --git a/src/mc/Session.cpp b/src/mc/Session.cpp index 63c0c7483b..faaf181cf9 100644 --- a/src/mc/Session.cpp +++ b/src/mc/Session.cpp @@ -1,19 +1,20 @@ -/* Copyright (c) 2015-2016. The SimGrid Team. - * All rights reserved. */ +/* Copyright (c) 2015-2019. The SimGrid Team. All rights reserved. */ /* This program is free software; you can redistribute it and/or modify it * under the terms of the license (GNU LGPL) which comes with this package. */ -#include -#include - -#include - -#include -#include -#include - #include "src/mc/Session.hpp" +#include "src/mc/checker/Checker.hpp" +#include "src/mc/mc_config.hpp" +#include "src/mc/mc_private.hpp" +#include "src/mc/mc_state.hpp" +#include "xbt/log.h" +#include "xbt/system_error.hpp" + +#include +#ifdef __linux__ +#include +#endif XBT_LOG_NEW_DEFAULT_SUBCATEGORY(mc_Session, mc, "Model-checker session"); @@ -27,9 +28,9 @@ static void setup_child_environment(int socket) sigset_t mask; sigemptyset (&mask); if (sigprocmask(SIG_SETMASK, &mask, nullptr) < 0) - throw simgrid::xbt::errno_error(errno, "Could not unblock signals"); + throw simgrid::xbt::errno_error("Could not unblock signals"); if (prctl(PR_SET_PDEATHSIG, SIGHUP) != 0) - throw simgrid::xbt::errno_error(errno, "Could not PR_SET_PDEATHSIG"); + throw simgrid::xbt::errno_error("Could not PR_SET_PDEATHSIG"); #endif int res; @@ -37,7 +38,7 @@ static void setup_child_environment(int socket) // Remove CLOEXEC in order to pass the socket to the exec-ed program: int fdflags = fcntl(socket, F_GETFD, 0); if (fdflags == -1 || fcntl(socket, F_SETFD, fdflags & ~FD_CLOEXEC) == -1) - throw simgrid::xbt::errno_error(errno, "Could not remove CLOEXEC for socket"); + throw simgrid::xbt::errno_error("Could not remove CLOEXEC for socket"); // Set environment: setenv(MC_ENV_VARIABLE, "1", 1); @@ -61,7 +62,7 @@ pid_t do_fork(F code) { pid_t pid = fork(); if (pid < 0) - throw simgrid::xbt::errno_error(errno, "Could not fork model-checked process"); + throw simgrid::xbt::errno_error("Could not fork model-checked process"); if (pid != 0) return pid; @@ -78,14 +79,16 @@ pid_t do_fork(F code) Session::Session(pid_t pid, int socket) { - std::unique_ptr process(new simgrid::mc::Process(pid, socket)); - // TODO, automatic detection of the config from the process - process->privatized( - xbt_cfg_get_boolean("smpi/privatize_global_variables")); - modelChecker_ = std::unique_ptr( - new simgrid::mc::ModelChecker(std::move(process))); + std::unique_ptr process(new simgrid::mc::RemoteClient(pid, socket)); + +#if HAVE_SMPI + xbt_assert(smpi_privatize_global_variables != SmpiPrivStrategies::MMAP, + "Please use the dlopen privatization schema when model-checking SMPI code"); +#endif + + model_checker_.reset(new simgrid::mc::ModelChecker(std::move(process))); xbt_assert(mc_model_checker == nullptr); - mc_model_checker = modelChecker_.get(); + mc_model_checker = model_checker_.get(); mc_model_checker->start(); } @@ -94,19 +97,51 @@ Session::~Session() this->close(); } +void Session::initialize() +{ + xbt_assert(initial_snapshot_ == nullptr); + mc_model_checker->wait_for_requests(); + initial_snapshot_ = simgrid::mc::take_snapshot(0); +} + +void Session::execute(Transition const& transition) +{ + model_checker_->handle_simcall(transition); + model_checker_->wait_for_requests(); +} + +void Session::restore_initial_state() +{ + this->initial_snapshot_->restore(&mc_model_checker->process()); +} + +void Session::log_state() +{ + mc_model_checker->getChecker()->log_state(); + + if (not _sg_mc_dot_output_file.get().empty()) { + fprintf(dot_output, "}\n"); + fclose(dot_output); + } + if (getenv("SIMGRID_MC_SYSTEM_STATISTICS")){ + int ret=system("free"); + if(ret!=0)XBT_WARN("system call did not return 0, but %d",ret); + } +} + // static -Session* Session::fork(std::function code) +Session* Session::fork(const std::function& code) { // Create a AF_LOCAL socketpair used for exchanging messages - // bewteen the model-checker process (ourselves) and the model-checked + // between the model-checker process (ourselves) and the model-checked // process: int res; int sockets[2]; - res = socketpair(AF_LOCAL, SOCK_DGRAM | SOCK_CLOEXEC, 0, sockets); + res = socketpair(AF_LOCAL, SOCK_SEQPACKET | SOCK_CLOEXEC, 0, sockets); if (res == -1) - throw simgrid::xbt::errno_error(errno, "Could not create socketpair"); + throw simgrid::xbt::errno_error("Could not create socketpair"); - pid_t pid = do_fork([&] { + pid_t pid = do_fork([sockets, &code] { ::close(sockets[1]); setup_child_environment(sockets[0]); code(); @@ -122,24 +157,25 @@ Session* Session::fork(std::function code) // static Session* Session::spawnv(const char *path, char *const argv[]) { - return Session::fork([&] { + return Session::fork([path, argv] { execv(path, argv); }); } // static -Session* Session::spawnvp(const char *path, char *const argv[]) +Session* Session::spawnvp(const char *file, char *const argv[]) { - return Session::fork([&] { - execvp(path, argv); + return Session::fork([file, argv] { + execvp(file, argv); }); } void Session::close() { - if (modelChecker_) { - modelChecker_->shutdown(); - modelChecker_ = nullptr; + initial_snapshot_ = nullptr; + if (model_checker_) { + model_checker_->shutdown(); + model_checker_ = nullptr; mc_model_checker = nullptr; } }