ATLAS Offline Software
Namespaces | Classes | Typedefs | Enumerations | Functions | Variables
Athena Namespace Reference

Some weak symbol referencing magic... More...

Namespaces

 AlgorithmTimerHandler
 
 detail
 
 details
 
 DsoUtils
 
 Options
 
 Units
 

Classes

class  AlgorithmTimer
 Timer that invokes a user callback once the time is reached. More...
 
struct  BitTraits
 Describe the bit features of an integral type T. More...
 
class  Callback1
 
class  Callback1Rep
 
class  CallbackImpF11
 
class  Chrono
 Exception-safe IChronoSvc caller. More...
 
class  ConditionsCleanerSvc
 Facade class for conditions garbage collection. More...
 
class  CondObjDeleter
 Deletion object for conditions payloads. More...
 
class  DataBucketBranch
 
class  DBLock
 Common database lock. More...
 
class  DebugAids
 Utilities for debugging support. More...
 
class  DelayedConditionsCleanerSvc
 Clean conditions containers after a delay. More...
 
class  DelayedConditionsCleanerSvcProps
 
class  DvThinningHdlr
 Handle DataProxy holding DataVector. This class defines a (type-safe) protocol to pack and unpack thinned DataVector. More...
 
struct  get_thinning_handler
 metafunction to automagically dispatch on the type of a container and fetch the right thinning handler More...
 
class  IConditionsCleanerSvc
 Interface for doing garbage collection of conditions objects. More...
 
class  IdcThinningHdlr
 Handle DataProxy holding IdentifiableContainer This class defines a (type-safe) protocol to pack and unpack thinned IdentifiableContainer. More...
 
class  IInputRename
 Interface to retrieve input rename map. More...
 
class  IMessageSvcHolder
 get a IMessageSvc* on 1st use (if not set) and release it on ~ More...
 
class  IRCUObject
 Base object class for RCU-style synchronization for Athena. More...
 
class  IRCUSvc
 Interface for RCU service. More...
 
class  ISlimmingHdlr
 This class defines a protocol to slim objects (removing parts of that object) More...
 
class  IThinningHdlr
 This class defines a protocol to pack and unpack thinned collections. More...
 
class  LeafCnv
 
class  NtupleCnvSvc
 
class  PerfMonAuditor
 
class  RCUObject
 Wrapper object controlled by RCU synchonization. More...
 
class  RCURead
 Helper to read data from a RCUObject. More...
 
class  RCUReadQuiesce
 Helper to read data from a RCUObject. More...
 
class  RCUSvc
 Service to allow cleaning up RCU objects at the EndEvent. More...
 
class  RCUUpdate
 Helper to update data in a RCUObject. More...
 
class  RCUUpdater
 Implementation of Updater for RCUSvc. More...
 
class  RecyclableDataObject
 Helper for recycling objects from event to event. More...
 
class  RecyclableDataQueue
 Holder for recyclable objects. More...
 
class  RootAsciiDumperAlg
 
class  RootAsciiDumperAlgHandle
 
class  RootBranchAddress
 
class  RootCnv
 This class provides the abstract converter to translate an object to/from its persistent ROOT representation. More...
 
class  RootCnvSvc
 This class provides the interface between Athena and RootSvc. More...
 
class  RootConnection
 This class provides the implementation of Athena::RootConnection class, similar to Gaudi IDataConnection. More...
 
class  RootGlobalsRestore
 
class  RootNtupleEventContext
 
class  RootNtupleEventSelector
 Class implementing the GAUDI IEvtSelector interface using ROOT TTree as a backend. More...
 
class  RootNtupleOutputMetadataTool
 This is the AthenaRoot version of AthenaServices/AthenaOutputStreamTool. More...
 
class  RootNtupleOutputStream
 algorithm that marks for write data objects in SG More...
 
class  RootOutputStreamTool
 This is the AthenaRoot version of AthenaServices/AthenaOutputStreamTool. More...
 
class  RootSvc
 This class provides the interface to the ROOT software. More...
 
class  ScopedTimer
 Helper class to create a "scoped cook timer" without having to declare the CookTimer itself within the scope (see CookTimer documentation) More...
 
class  SharedLibrary
 Shared library services. More...
 
class  SharedLibraryError
 Error in a shared library operation. More...
 
class  Signal
 Utilities for handling signals and fatal errors. More...
 
struct  StatusCategory
 
class  StdThinningHdlr
 Handle DataProxy holding std::vector<T> This class defines a (type-safe) protocol to pack and unpack thinned DataVector. More...
 
class  ThinningCacheTool
 Create ThinningCache for a given stream. More...
 
class  Timeout
 Singleton to access the timeout flag. More...
 
class  TimeoutMaster
 Class to modify timeout flag. More...
 
class  ToolLock
 RAII helper for acquiring the lock of an ILockableTool. More...
 
struct  TPCnvType
 
struct  TPCnvVers
 
class  xAODBranchAddress
 
class  xAODCnv
 
class  xAODCnvSvc
 
class  xAODEventContext
 
class  xAODEventSelector
 Class implementing the GAUDI IEvtSelector interface using ROOT TTree as a backend. More...
 

Typedefs

typedef void(* DummyHandlerType) (int)
 Dummy handler type for standard signal() function. More...
 
typedef RootNtupleEventContext::FileNames_t FileNames_t
 

Enumerations

enum  Status : StatusCode::code_t { Status::TIMEOUT = 10, Status::MISSING_DATA = 11 }
 Athena specific StatusCode values. More...
 

Functions

IMessageSvc * getMessageSvc (bool quiet=false)
 
IMessageSvc * getMessageSvc (const Options::CreateOptions o, bool quiet=false)
 
void reportMessage (IMessageSvc *ims, const std::string &source, int type, const std::string &message)
 Wrappers for some of the IMessageSvc methods These can be used from libraries without explicit Gaudi dependency via weak linking. More...
 
int outputLevel (const IMessageSvc *ims, const std::string &source)
 
void setOutputLevel (IMessageSvc *ims, const std::string &source, int level)
 
int ubsan_boost_suppress ()
 
template<class T1 , class T2 >
Callback1Rep< T1 > * CreateCallback (void(*function)(T1, T2), const T2 &fill_2)
 
void DebugAids::stacktraceLine ATLAS_NOT_THREAD_SAFE (IOFD fd, unsigned long addr)
 Write out stack trace line to FD. More...
 
void DebugAids::setStackTraceAddr2Line ATLAS_NOT_THREAD_SAFE (const char *path)
 
void DebugAids::stacktrace ATLAS_NOT_THREAD_SAFE (IOFD fd)
 Produce a stack trace. More...
 
void SharedLibrary::path ATLAS_NOT_THREAD_SAFE (const std::string &path)
 
void Signal::handleQuit ATLAS_NOT_THREAD_SAFE (QuitHook hook)
 
void Signal::handleFatal ATLAS_NOT_THREAD_SAFE (const char *applicationName, IOFD fd, FatalHook hook, FatalReturn mainreturn, unsigned options)
 Install default handler for fatal signals. More...
 
void Signal::quit ATLAS_NOT_THREAD_SAFE (int sig, siginfo_t *info, void *x)
 The quit signal handler. More...
 
bool Signal::fatalDump ATLAS_NOT_THREAD_SAFE (int sig, siginfo_t *info, void *extra, IOFD fd, unsigned options)
 
IOFD Signal::handleFatalFd ATLAS_NOT_THREAD_SAFE (void)
 Return the file descriptor #fataldump() uses for output. More...
 

Variables

std::atomic< bool > getMessageSvcQuiet
 Set this to force off the warning messages from getMessageSvc (in unit tests, for example). More...
 
int ubsan_boost_suppress_ = ubsan_boost_suppress()
 

Detailed Description

Some weak symbol referencing magic...

These are declared in AthenaKernel/getMessageSvc.h and will be non-nullptr in case the GaudiSvc/AthenaKernel shared libraries have been loaded.

Typedef Documentation

◆ DummyHandlerType

typedef void(* Athena::DummyHandlerType) (int)

Dummy handler type for standard signal() function.


Definition at line 109 of file SealSignal.cxx.

◆ FileNames_t

Definition at line 213 of file RootNtupleEventSelector.cxx.

Enumeration Type Documentation

◆ Status

enum Athena::Status : StatusCode::code_t
strong

Athena specific StatusCode values.

These can be used in place of Gaudi's StatusCode::XYZ if additional information should be returned. Some of these codes will result in special treatment of the event (e.g. sending them to the debug stream in the HLT).

Only generic return codes should be defined here. Algorithm-specific return values should be encoded in separate enums in the respective packages.

Enumerator
TIMEOUT 

Timeout during event processing.

MISSING_DATA 

Missing/corrupted input data.

Definition at line 22 of file AthStatusCode.h.

22  : StatusCode::code_t {
23  TIMEOUT = 10,
24  MISSING_DATA = 11
25 };

Function Documentation

◆ ATLAS_NOT_THREAD_SAFE() [1/9]

void Signal::handleFatal Athena::ATLAS_NOT_THREAD_SAFE ( const char *  applicationName,
IOFD  fd,
FatalHook  hook,
FatalReturn  mainreturn,
unsigned  options 
)

Install default handler for fatal signals.

This method installs a handler for fatal signals such as floating point exceptions, illegal instructions, and memory violations. The behaviour is more precisely determined by options, a bitwise or of the option constants defined in the class declaration.

applicationName sets the application name to be used to report the signal in #fatalDump(). fd sets the file descriptor to which the fatal signal message is written; by default this will be the standard error output. hook sets the pre-exit application hook to invoke, mainreturn sets the hook to return to back to the application "main loop" (i.e. ignore the signal by jumping out of the signal back to the somewhere higher up in the application).

Options left to default values will not change the current state. This allows one to re-install signal handlers without disturbing already registered information. Use this to restore handlers after some other library has meddled with the handlers.

This installs #fatal() as the handler for fatal signals and on Windows for otherwise unhandled fatal structured exceptions. If #FATAL_ON_QUIT is included in options, quitting related signals (see #quit()) are also considered fatal. If #FATAL_ON_INT is set, SIGINT is considered fatal—but see also #fatal() documentation. If #USR1_DUMP_CORE is set, #DebugAids::coredump is registered as a handler for SIGUSR1 (please note the security risks of this option in its documentation).

A multi-threaded application should call this method in each thread. (FIXME: Calling this in one thread and blocking signals in others won't work on Linux, and in any case will probably produce nonsense stack traces (unless stacktrace can be fixed to dump the stacks of all the threads). Since the handler is always the same, I am not sure it will make the slightest difference which thread catches the signals, and on the other hand, it is best to dump the problems in the faulting thread if possible.)

Definition at line 646 of file SealSignal.cxx.

651 {
652  // FIXME: Provide means to install handlers for fatal signals that
653  // an application has requested and app was supposed to register a
654  // handler before making the request? (So that if the app handler
655  // is not installed for some reason, an internal error hook can
656  // run?) Such fatal signals include:
657  // - SIGPIPE: read or write to broken pipe; child died
658  // (read or write to socket with ASYNC io?)
659  // - SIGLOST: lost a resource (e.g., lock on nfs server reboot)
660  // - SIGALRM: interval timer elapsed
661  // - SIGUSR1, SIGUSR2
662  // - SIGPOLL: pollable streams device events
663  // - SIGIO: i/o possible (from async i/o)
664  // - SIGVTALRM: virtual timer expired
665  // - SIGPROF: profiling timer expired
666  // - SIGRTMIN - SIGRTMAX: POSIX real-time signals
667  //
668  // Some of these the application should probably just #block()
669  // (e.g. SIGPIPE). Some of them the app should block and then
670  // wait or poll for events (SIGPOLL, SIGIO, possibly SIGALRM, the
671  // real-time signals if they are used).
672 
673  static const int hups [] = {
674 #ifdef SIGHUP
675  SIGHUP, // hang up (lost terminal or process group leader)
676 #endif
677 #ifdef SIGTERM
678  SIGTERM, // terminate (e.g. system going down)
679 #endif
680 #ifdef SIGQUIT
681  SIGQUIT, /* user request to quit and leave debuggable
682  state (from quit key on controlling
683  terminal) */
684 
685 #endif
686  -1
687  };
688 
689  static int fatals [] = {
690 #ifdef SIGFPE
691  SIGFPE, // arithmetic exception
692 #endif
693 #ifdef SIGILL
694  SIGILL, // illegal instruction
695 #endif
696 #ifdef SIGSEGV
697  SIGSEGV, // illegal address
698 #endif
699 #ifdef SIGBUS
700  SIGBUS, // hardware exception
701 #endif
702 #ifdef SIGIOT
703  SIGIOT, /* IOT trap. Before SIGABRT so that if SIGIOT
704  == SIGABRT then SIGABRT overrides SIGIOT;
705  SIGABRT is in ISO C and POSIX.1, SIGIOT is
706  not. */
707 #endif
708 #ifdef SIGABRT
709  SIGABRT, // abort
710 
711 #endif
712 #ifdef SIGTRAP
713  SIGTRAP, // trace/breakpoint reached
714 #endif
715 #ifdef SIGEMT
716  SIGEMT, // emulation trap (may be used by profiler?)
717 #endif
718 #ifdef SIGSYS
719  SIGSYS, // invalid system call
720 #endif
721 #ifdef SIGXCPU
722  SIGXCPU, // cpu time limit exceeded
723 #endif
724 #ifdef SIGXFSZ
725  SIGXFSZ, // file size limit exceeded
726 #endif
727  -1
728  };
729 
730  // Make sure `strsignal' is properly initialised.
731  name (1);
732 
733  // Remember app name if specified
734  if (applicationName && *applicationName)
735  s_applicationName = applicationName;
736 
737  // Automatically initialise s_fatalFd on first access
738  if (s_fatalFd == IOFD_INVALID)
739  s_fatalFd = STDERR_HANDLE;
740 
741  // Remember the fatal output fd if defined
742  if (fd != IOFD_INVALID)
743  s_fatalFd = fd;
744 
745  // Now that we know the fd, setup a callback for dumping shared
746  // libraries via #SignalDumpLibs. This avoids having to allocate
747  // memory for the callback implementation in the middle of a fatal
748  // signal, and on the other hand avoids a global object which
749  // might not be initialised yet.
750  delete SignalDumpCallback;
751  SignalDumpCallback = new SharedLibrary::InfoHandler
752  (CreateCallback (&SignalDumpLibs, s_fatalFd));
753 
754  // Remember the hooks if specified
755  if (hook)
756  s_fatalHook = hook;
757 
758  if (mainreturn)
759  s_fatalReturn = mainreturn;
760 
761  // Remember the new options
762  s_fatalOptions = options;
763 
764  // Signal::fatal() requires this, otherwise weird things can happen.
765  // Programs not wanting to return to main should set FATAL_AUTO_EXIT.
766  assert (s_fatalReturn || (s_fatalOptions & FATAL_AUTO_EXIT));
767 
768  // Install signal handlers.
769  if (options & FATAL_ON_QUIT)
770  for (unsigned sig = 0; hups [sig] != -1; ++sig)
771  handle (hups [sig], fatal);
772 
773  for (unsigned sig = 0; fatals [sig] != -1; ++sig)
774  handle (fatals [sig], fatal);
775 
776 #ifdef SIGINT
777  // interrupt key from controlling terminal
778  if (options & FATAL_ON_INT)
779  handle (SIGINT, fatal);
780 #endif
781 
782 #ifdef SIGUSR1
783  // program-defined signals SIGUSR1 and SIGUSR2
784  if (options & USR1_DUMP_CORE)
785  handle (SIGUSR1, (HandlerType) DebugAids::coredump);
786 #endif
787 
788 #ifdef _WIN32
789  SetUnhandledExceptionFilter (&SEHFatal);
790 #endif
791 }

◆ ATLAS_NOT_THREAD_SAFE() [2/9]

void DebugAids::setStackTraceAddr2Line Athena::ATLAS_NOT_THREAD_SAFE ( const char *  path)

Definition at line 578 of file SealDebug.cxx.

579 {
580  addr2LinePath = path;
581 }

◆ ATLAS_NOT_THREAD_SAFE() [3/9]

void SharedLibrary::path Athena::ATLAS_NOT_THREAD_SAFE ( const std::string &  path)

Definition at line 164 of file SealSharedLib.cxx.

165 {
166  /* Do not free `var'; most implementations of `putenv' use the
167  string without copying it. On systems where `putenv' copies,
168  you'll see leaks from this routine. It would be possible to
169  check for this, but only by killing cross-compilation.
170 
171  NB: `HAVE_COPYING_PUTENV' will never be set as we are not
172  checking for it :-) */
173 
174  const char *pathvar = PATH;
175  if (pathvar) {
176  const int path_size = strlen(pathvar) + 1 + path.length () + 1;
177  char *var = (char *) malloc (path_size);
178  snprintf (var, path_size, "%s=%s", pathvar, path.c_str ());
179  putenv (var);
180 #if HAVE_COPYING_PUTENV
181  free (var);
182 #endif
183  }
184 }

◆ ATLAS_NOT_THREAD_SAFE() [4/9]

bool Signal::fatalDump Athena::ATLAS_NOT_THREAD_SAFE ( int  sig,
siginfo_t info,
void *  extra,
IOFD  fd,
unsigned  options 
)

Definition at line 1515 of file SealSignal.cxx.

1518 {
1519  const unsigned int buf_size = sizeof (buf);
1520  bool haveCore = false;
1521  if (sig < 0)
1522  {
1523  sig = -sig;
1524  haveCore = true;
1525  }
1526 
1527  if (options & FATAL_DUMP_SIG)
1528  {
1529  MYWRITE (fd, "\n", 1);
1530  if (s_applicationName)
1531  {
1532  MYWRITE (fd, s_applicationName,
1533  STDC::strlen (s_applicationName));
1534  MYWRITE (fd, " ", 1);
1535  }
1536 
1537  MYWRITE (fd, buf,
1538  snprintf (buf, SIGNAL_MESSAGE_BUFSIZE, "(pid=%ld ppid=%ld) received fatal signal %d"
1539  " (%.100s)%s\n",
1540  (long) ProcessInfo__pid (), (long) ProcessInfo__ppid (), // wlav :: -> __ (x2)
1541  sig, name (sig), haveCore ? " (core dumped)" : ""));
1542 
1543  MYWRITE (fd, buf, snprintf(buf, buf_size, "signal context:\n"));
1544  dumpInfo (fd, buf, buf_size, sig, info);
1545  }
1546 
1547  unsigned long sp = 0;
1548  if (options & FATAL_DUMP_CONTEXT)
1549  sp = dumpContext (fd, buf, buf_size, extra);
1550 
1551  if (options & FATAL_DUMP_STACK)
1552  {
1553  MYWRITE (fd, buf, snprintf(buf, buf_size, "\nstack trace:\n"));
1554  if (s_lastSP) {
1555  MYWRITE (fd, buf, snprintf(buf, buf_size, "\n(backtrace failed; raw dump follows)\n"));
1556  MYWRITE (fd, buf, snprintf(buf, buf_size, "%016lx:", s_lastSP.load()));
1557  dumpMemory (fd, buf, buf_size, reinterpret_cast<void*>(s_lastSP.load()), 1024);
1558  MYWRITE (fd, buf, snprintf(buf, buf_size, "\n\n"));
1559  }
1560  else {
1561  s_lastSP = sp;
1562  DebugAids::stacktrace (fd);
1563  }
1564  s_lastSP = 0;
1565  }
1566 
1567  if (options & FATAL_DUMP_LIBS)
1568  {
1569  MYWRITE (fd, buf, snprintf(buf, buf_size, "\nshared libraries present:\n"));
1570  try { SharedLibrary::loaded (*SignalDumpCallback); }
1571  catch (...) { ; }
1572  }
1573 
1574  return true;
1575 }

◆ ATLAS_NOT_THREAD_SAFE() [5/9]

bool Signal::fatalDump Athena::ATLAS_NOT_THREAD_SAFE ( int  sig,
siginfo_t info,
void *  x 
)

The quit signal handler.

The fatal signal handler.

This is the handler installed by #handleQuit(). Please use #handleQuit() and this method instead of installing your own handlers with #handle().

This handler first invokes the application hook if one was given to #handleQuit(). If the hook returns true, the signal handler for this signal (number sig) is reset to its default handler, and the signal is re-raised. This causes the program to exit via the signal and have a the correct exit status.

The application should do whatever is necessary for a graceful shutdown. Note however that this signal may arrive asynchronously at any time, hence it probably isn't safe to allocate memory, use the standard output streams, and so forth. What you can do is to set a flag, return false to return back to your application, detect the flag setting and drain your current event loop, and then quit. But do note that if #FATAL_AUTO_EXIT was set in call to #handleFatal(), #fatal() will call #quit() which in turn calls the application hook. Thus the hook should make sure it returns true if the application has crashed as noted in the documentation for <<QuitHook>>.

This is the handler installed by #handleFatal(). Please use #handleFatal() and this method instead of installing your handlers with #handle(). You should be able use the handler options to specify all the control you need.

The first thing this handler does is to reinstall itself for the benefit of platforms with single-delivery signals. Immediately after that it unblocks the delivery of that signal again, in case the signal handler itself gets in trouble. The next step is to check if the current crash level (the recursion of calls to #fatal(), see #fatalLevel()) exceeds the predefined limit of 4; if so, we give up and let the application die with this this signal. The handler then determines whether the signal is fatal: everything except SIGINT is, and SIGINT is fatal if #FATAL_ON_INT was set. If the signal is fatal, crash indicator is set (see #crashed()).

If this is not a nested fatal signal, the signal is fatal, and #FATAL_DUMP_CORE is set, the handler tries dump a core file. Then the handler will either attempt to quit or to return to the main program depending on #FATAL_AUTO_EXIT option setting. If it is set or this is a nested fatal signal, the handler will attempt to exit as follows: the application hook (or #fatalDump() in its absence) is invoked. If the hook returns true, #quit() is called; otherwise the signal handler will return (and crash or get an infinite sequence of fatal signals). Note that if an application hook is registered, #fataldump() is not called by default; the application hook must invoke it itself to get the dump.

If #FATAL_AUTO_EXIT is not set, the application must have registered a main return hook, which will be invoked. The hook must not return, but do a siglongjmp back to the main program (it should not throw unless all code is built with options that allow exceptions to be thrown from signal handlers). Note that the fatal signal may be asynchronous and may have arisen in code left in unsafe state, so returning back to the main program may not buy you much. It may make sense for a few things like rogue null pointer dereferences or floating point exceptions.

An interactive application using a main return hook should do something like this when the sigsetjmp in the main loop returns:

  • disable "main loop entered" status
  • inform the user about the fatal error (e.g. with a popup); the popup window should be precreated for best stability
  • reset any locks the application holds, especially for user interface, including status bars, wait icons etc.
  • suggest to run a debugger against the program right there
  • in a windowing system ungrab pointer, keyboard and the server
  • unblock the signal via #block(sig, false) as the operating system may think the signal is still being processed
  • add an idle processor to re-return the "main loop entered" once all pending event queue events have been drained
  • go onto processing gui events

Using a main return will most likely leak memory like a sieve, but in balance, the application just got a fatal signal and the leak is unlikely to be the greatest concern.

Definition at line 817 of file SealSignal.cxx.

818 {
819  // Quit if no hook has been registered: we are coming in via
820  // FATAL_AUTO_EXIT in fatal and the application did not call
821  // handleQuit.
822  if (! s_quitHook || (*s_quitHook) (sig, info, x))
823  {
824  // Reactivate the default signal handling behaviour for this
825  // signal, which is to terminate the application one way or
826  // the other. Then exit through the signal. This makes the
827  // process exit status correct.
828  revert (sig);
829  raise (sig);
830  }
831 }

◆ ATLAS_NOT_THREAD_SAFE() [6/9]

void DebugAids::stacktrace Athena::ATLAS_NOT_THREAD_SAFE ( IOFD  fd)

Produce a stack trace.

Prints the current stack trace to file descriptor fd or if the default invalid descriptor, the currently registered stack trace descriptor as registered with #stacktraceFd(). Avoids unnecessary memory allocation so it should be safe to call this function even in dire situations. On some systems the implementation always outputs to the standard error and has no means for redirection. On these systems an attempt is made to redirect standard error momentarily elsewhere and then redirect standard error to the desired file descriptor, invoke the output, and redirect standard error back to its original location. If the redirection fails or the system has no stack tracing support, no stack trace is produced.

Definition at line 633 of file SealDebug.cxx.

634 {
635  if (fd == IOFD_INVALID)
636  fd = stacktraceFd();
637 
638  std::cerr.flush ();
639  fflush (stderr);
640 
641 #ifdef _WIN32
642  // FIXME: Autoload all these functions so users don't need to
643  // link in imagehlp.dll.
644  if (! SymInitialize (GetCurrentProcess (), NULL, TRUE))
645  {
646  MYWRITELIT (fd, ("failed to dump stack trace:"
647  " cannot get symbolic information\n"));
648  return;
649  }
650 
651  union SYMBUFFER {
652  IMAGEHLP_SYMBOL sym;
653  BYTE buffer [ sizeof (IMAGEHLP_SYMBOL) + 512 ];
654  };
655 
656  unsigned level = 0;
657  CONTEXT context;
658  STACKFRAME frame;
659  SYMBUFFER symbol;
660  IMAGEHLP_MODULE module;
661  char modulename [MAX_PATH];
662  DWORD section;
663  DWORD offset;
664  const int buf_size = 2*40+6; // ample for two 128+ bit numbers
665  char buf [buf_size];
666  // DWORD exceptargs [] = { (DWORD) &context };
667 
668  // FIXME: XP 64-bit adds: RtlCaptureContext (&context);
669  // This is documented to *not* work, but apparently it does.
670  context.ContextFlags = CONTEXT_FULL;
671  if (! GetThreadContext (GetCurrentThread (), &context))
672  return;
673 
674  // LPTOP_LEVEL_EXCEPTION_FILTER oldseh
675  // = SetUnhandledExceptionFilter (&GrabExceptionContext);
676  // RaiseException (0, 0, 1, exceptargs);
677  // SetUnhandledExceptionFilter (oldseh);
678 
679  memset (&module, 0, sizeof (module));
680  memset (&frame, 0, sizeof (frame));
681 
682  module.SizeOfStruct = sizeof (module);
683 
684  frame.AddrPC.Offset = context.Eip;
685  frame.AddrPC.Mode = AddrModeFlat;
686  frame.AddrStack.Offset = context.Esp;
687  frame.AddrStack.Mode = AddrModeFlat;
688  frame.AddrFrame.Offset = context.Ebp;
689  frame.AddrFrame.Mode = AddrModeFlat;
690 
691  while (true)
692  {
693  if (! StackWalk (IMAGE_FILE_MACHINE_I386,
694  GetCurrentProcess (),
695  GetCurrentThread (),
696  &frame,
697  &context,
698  NULL,
699  SymFunctionTableAccess,
700  SymGetModuleBase,
701  NULL)
702  || frame.AddrFrame.Offset == 0)
703  break;
704 
705  // FIXME: Throw away everything above stacktrace? Keep looping
706  // below until the name includes something we understand?
707 
708  // Print stack frame too? If we know how many arguments there
709  // are (from demangling function name -- see below, could count
710  // commas), args are: *((ULONG *)frame.AddrFrame.Offset+2+ARG).
711  MYWRITE (fd, buf, snprintf (buf, buf_size, "(%2u) 0x%08lx 0x%08lx ",
712  level, frame.AddrPC.Offset,
713  frame.AddrFrame.Offset));
714 
715  memset (&symbol, 0, sizeof (symbol));
716  symbol.sym.SizeOfStruct = sizeof (symbol);
717  symbol.sym.MaxNameLength = sizeof (symbol) - sizeof (symbol.sym);
718 
719  offset = 0;
720  if (SymGetSymFromAddr (GetCurrentProcess (), frame.AddrPC.Offset,
721  &offset, &symbol.sym))
722  {
723  // FIXME: Demangle name with:
724  // UnDecorateSymbolName (name, undecname, sizeof (undecname),
725  // UNDNAME_COMPLETE
726  // | UNDNAME_NO_THISTYPE
727  // | UNDNAME_NO_SPECIAL_SYMS
728  // | UNDNAME_NO_MEMBER_TYPE
729  // | UNDNAME_NO_MS_KEYWORDS
730  // | UNDNAME_NO_ACCESS_SPECIFIERS);
731  MYWRITE (fd, symbol.sym.Name, STDC::strlen (symbol.sym.Name));
732  MYWRITE (fd, buf, snprintf (buf, buf_size, " + %lx", offset));
733 
734  if (SymGetModuleInfo (GetCurrentProcess(), frame.AddrPC.Offset,
735  &module))
736  {
737  MYWRITELIT (fd, " [");
738  MYWRITE (fd, module.ImageName,
739  STDC::strlen (module.ImageName));
740  MYWRITELIT (fd, "]");
741  }
742  }
743  else
744  {
745  GetLogicalAddress ((PVOID) frame.AddrPC.Offset,
746  modulename, sizeof (modulename),
747  section, offset);
748  MYWRITE (fd, buf, snprintf (buf, buf_size, "%04lx:%08lx [", section, offset));
749  MYWRITE (fd, modulename, STDC::strlen (modulename));
750  MYWRITELIT (fd, "]");
751  }
752  MYWRITELIT (fd, "\n");
753  ++level;
754  }
755  SymCleanup (GetCurrentProcess ());
756 
757 #elif (HAVE_U_STACK_TRACE || HAVE_XL_TRBK) // hp-ux, aix
758  // FIXME: deal with inability to duplicate the file handle
759  int stderrfd = dup (STDERR_FILENO);
760  if (stderrfd == -1)
761  return;
762 
763  int newfd = dup2 (fd, STDERR_FILENO);
764  if (newfd == -1)
765  {
766  close (stderrfd);
767  return;
768  }
769 
770 # if HAVE_U_STACK_TRACE // hp-ux
771  U_STACK_TRACE ();
772 # elif HAVE_XL_TRBK // aix
773  xl__trbk ();
774 # else
775 # error "oops, you shouldn't have gotten here!"
776 # endif
777 
778  fflush (stderr);
779  dup2 (stderrfd, STDERR_FILENO);
780  close (newfd);
781 #elif HAVE_LINUX_UNWIND_BACKTRACE
782  CxxUtils::backtraceByUnwind (stacktraceLine, fd);
783 
784 #elif HAVE_BACKTRACE_SYMBOLS_FD && HAVE_DLADDR // linux
785  // we could have used backtrace_symbols_fd, except its output
786  // format is pretty bad, so recode that here :-(
787  void *trace [MAX_BACKTRACE_DEPTH];
788  int depth = backtrace (trace, MAX_BACKTRACE_DEPTH);
789 
790  for (int n = 0; n < depth; ++n/*, nbufs = 0*/)
791  {
792  unsigned long addr = (unsigned long) trace [n];
793  stacktraceLine (fd, addr);
794  }
795 
796 #elif HAVE_EXCPT_H && HAVE_PDSC_H && HAVE_RLD_INTERFACE_H // tru64
797  // Tru64 stack walk. Uses the exception handling library and the
798  // run-time linker's core functions (loader(5)). FIXME: Tru64
799  // should have _RLD_DLADDR like IRIX below. Verify and update.
800 
801  const int buffer_size = 100 + BitTraits<unsigned long>::HexDigits * 2 + 11;
802  char buffer [buffer_size];
803  sigcontext context;
804  int rc = 0;
805 
806  exc_capture_context (&context);
807  while (!rc && context.sc_pc)
808  {
809  // FIXME: Elf32?
810  pdsc_crd *func, *base, *crd
811  = exc_remote_lookup_function_entry(0, 0, context.sc_pc, 0, &func, &base);
812  Elf32_Addr addr = PDSC_CRD_BEGIN_ADDRESS(base, func);
813  // const char *name = _rld_address_to_name(addr);
814  const char *name = "<unknown function>";
815  snprintf (buffer, buffer_size, " 0x%012lx %.100s + 0x%lx\n",
816  context.sc_pc, name, context.sc_pc - addr);
817  write (fd, buffer, STDC::strlen(buffer));
818  rc = exc_virtual_unwind(0, &context);
819  }
820 
821 #elif HAVE_EXCEPTION_H && defined __sgi // irix
822  // IRIX stack walk -- like Tru64 but with a little different names.
823  // NB: The guard above is to protect against unrelated <exception.h>
824  // provided by some compilers (e.g. KCC 4.0f).
825  // NB: libexc.h has trace_back_stack and trace_back_stack_and_print
826  // but their output isn't pretty and nowhere as complete as ours.
827  char buffer [340];
828  sigcontext context;
829 
830  exc_setjmp (&context);
831  while (context.sc_pc >= 4)
832  {
833  // Do two lookups, one using exception handling tables and
834  // another using _RLD_DLADDR, and use the one with a smaller
835  // offset. For signal handlers we seem to get things wrong:
836  // _sigtramp's exception range is huge while based on Dl_info
837  // the offset is small -- but both supposedly describe the
838  // same thing. Go figure.
839  char *name = 0;
840  const char *libname = 0;
841  const char *symname = 0;
842  Elf32_Addr offset = ~0L;
843 
844  // Do the exception/dwarf lookup
845  Elf32_Addr pc = context.sc_pc;
846  Dwarf_Fde fde = find_fde_name (&pc, &name);
847  Dwarf_Addr low_pc = context.sc_pc;
848  Dwarf_Unsigned udummy;
849  Dwarf_Signed sdummy;
850  Dwarf_Ptr pdummy;
851  Dwarf_Off odummy;
852  Dwarf_Error err;
853 
854  symname = name;
855 
856  // Determine offset using exception descriptor range information.
857  if (dwarf_get_fde_range (fde, &low_pc, &udummy, &pdummy, &udummy,
858  &odummy, &sdummy, &odummy, &err) == DW_DLV_OK)
859  offset = context.sc_pc - low_pc;
860 
861  // Now do a dladdr() lookup. If the found symbol has the same
862  // address, trust the more accurate offset from dladdr();
863  // ignore the looked up mangled symbol name and prefer the
864  // demangled name produced by find_fde_name(). If we find a
865  // smaller offset, trust the dynamic symbol as well. Always
866  // trust the library name even if we can't match it with an
867  // exact symbol.
868  Elf32_Addr addr = context.sc_pc;
869  Dl_info info;
870 
871  if (_rld_new_interface (_RLD_DLADDR, addr, &info))
872  {
873  if (info.dli_fname && info.dli_fname [0])
874  libname = info.dli_fname;
875 
876  Elf32_Addr symaddr = (Elf32_Addr) info.dli_saddr;
877  if (symaddr == low_pc)
878  offset = addr - symaddr;
879  else if (info.dli_sname
880  && info.dli_sname [0]
881  && addr - symaddr < offset)
882  {
883  offset = addr - symaddr;
884  symname = info.dli_sname;
885  }
886  }
887 
888  // Print out the result
889  if (libname && symname)
890  write (fd, buffer, snprintf
891  (buffer, buffer_size, " 0x%012lx %.100s + 0x%lx [%.200s]\n",
892  addr, symname, offset, libname));
893  else if (symname)
894  write (fd, buffer, snprintf
895  (buffer, buffer_size, " 0x%012lx %.100s + 0x%lx\n",
896  addr, symname, offset));
897  else
898  write (fd, buffer, snprintf
899  (buffer, buffer_size, " 0x%012lx <unknown function>\n", addr));
900 
901  // Free name from find_fde_name().
902  free (name);
903 
904  // Check for termination. exc_unwind() sets context.sc_pc to
905  // 0 or an error (< 4). However it seems we can't unwind
906  // through signal stack frames though this is not mentioned in
907  // the docs; it seems that for those we need to check for
908  // changed pc after find_fde_name(). That seems to indicate
909  // end of the post-signal stack frame. (FIXME: Figure out how
910  // to unwind through signal stack frame, e.g. perhaps using
911  // sigcontext_t's old pc? Or perhaps we can keep on going
912  // down without doing the symbol lookup?)
913  if (pc != context.sc_pc)
914  break;
915 
916  exc_unwind (&context, fde);
917  }
918 
919 #elif defined PROG_PSTACK // solaris
920 # ifdef PROG_CXXFILT
921 # define CXXFILTER " | " PROG_CXXFILT
922 # else
923 # define CXXFILTER
924 # endif
925  // 64 should more than plenty for a space and a pid.
926  const int buffer_size = sizeof(PROG_PSTACK) + 1 + BitTraits<unsigned long>::Digits
927  + 3 + sizeof(PROG_CXXFILT) + BitTraits<int>::Digits + 1;
928  char buffer [buffer_size];
929  snprintf (buffer, buffer_size, "%s %lu%s 1>&%d", PROG_PSTACK, (unsigned long) getpid (),
930  "" CXXFILTER, fd);
931  system (buffer);
932 # undef CXXFILTER
933 
934 #elif __GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)
935  // FIXME: Check for _Unwind*, compilers other than GCC support this API
936  _Unwind_Backtrace (unwindWalkStack, &fd);
937 #endif
938 
939  // FIXME: mpatrol has some generic unix unwind code.
940  // FIXME: from unix faq: ask debugger to dump stack trace
941  // with something like:
942  // - gdb: echo "thread apply all where\nwhere\ndetach" | gdb $prog $pid
943  // - dbx: echo "where\ndetach" | dbx -a $program_path $pid
944  // - dbx (aix): echo "where\ndetach" | dbx -p $program_path $pid
945 }

◆ ATLAS_NOT_THREAD_SAFE() [7/9]

void DebugAids::stacktraceLine Athena::ATLAS_NOT_THREAD_SAFE ( IOFD  fd,
unsigned long  addr 
)

Write out stack trace line to FD.

IP is the instruction pointer. (sss)

Definition at line 328 of file SealDebug.cxx.

330 {
331  iovec bufs [7];
332  int nbufs = 0;
333  const int addrbuf_size = 5 + BitTraits<unsigned long>::HexDigits;
334  char addrbuf [addrbuf_size];
335 
336 #if HAVE_BACKTRACE_SYMBOLS_FD && HAVE_DLADDR
337  const int diffbuf_size = 15 + BitTraits<unsigned long>::HexDigits;
338  char diffbuf [diffbuf_size];
339  static const char trailer [] = "]\n";
340  Dl_info info;
341 
342  if (dladdr ((void*)addr, &info) && info.dli_fname && info.dli_fname[0])
343  {
344  const char *libname = info.dli_fname;
345 
346  unsigned long symaddr = (unsigned long) info.dli_saddr;
347  bool gte = (addr >= symaddr);
348  unsigned long diff = (gte ? addr - symaddr : symaddr - addr);
349 
350  // RS start
351  int length = 0;
352 
353  const int relbuf_size = 7 + BitTraits<unsigned long>::HexDigits;
354  char relbuf [relbuf_size];
355 
356  // difference of two pointers
357  unsigned long libaddr = (unsigned long) info.dli_fbase;
358  unsigned long relative_address = (addr >= libaddr) ? addr - libaddr : libaddr - addr;
359  // ELF executables are usually not relocatable, and on 64-bit platforms
360  // are usually loaded starting at 0x400000. In that case, we should _not_
361  // subtract the base address. But clang15 by default appears to produce
362  // position-independent executables (PIE) by default. In that case,
363  // we do need to subtract the offset.
364  // I'm not sure how to reliably tell the difference short of parsing
365  // the object headers. For now, just assume that something
366  // that doesn't have .so in the name and is loaded at 0x400000
367  // is not relocatable. This is not really portable, though.
368  if (strstr (info.dli_fname, ".so") == 0 && libaddr == 0x400000)
369  relative_address = addr;
370 
371  // need popen for addr2line ...
372  int pfd;
373  pid_t child_pid;
374  char line[ LINE_MAX ];
375  char dembuf[ LINE_MAX ];
376  const char* symname = dembuf;
377  size_t demlen = 0;
378 
379  // did we find valid entry ?
380  size_t len = strlen(info.dli_fname);
381  if ( len > 0 && len + 80 < LINE_MAX)
382  {
383  if (getenv ("LD_PRELOAD"))
384  unsetenv ("LD_PRELOAD");
385 
386  if ( addr2LinePath == "/usr/bin/eu-addr2line" )
387  {
388  snprintf (line, LINE_MAX, "%s -f -e %s %p | /usr/bin/c++filt | /usr/bin/tr \\\\012 \\\\040 ",
389  addr2LinePath.c_str(),
390  info.dli_fname,
391  (void*)relative_address);
392  }
393  else
394  {
395  snprintf (line, LINE_MAX, "%s -f -C -e %s %p",
396  addr2LinePath.c_str(),
397  info.dli_fname,
398  (void*)relative_address);
399  }
400 
401  pfd = stacktracePopenFD( line, child_pid );
402 
403  length = 1;
404  line[0] = ' ';
405 
406  // did we succeed to open the pipe?
407  if ( pfd >= 0 )
408  {
409  demlen = stacktraceReadline (pfd, dembuf, sizeof(dembuf));
410 
411  length = stacktraceReadline (pfd, line+1, sizeof(line)-1);
412  if (length >= 0) ++length;
413 
414  int stat = stacktracePcloseFD (pfd, child_pid);
415 
416  // don't print anything, if nothing is found
417  if ( stat || line[1] == '?' || length < 0)
418  {
419  line[1] = '\0';
420  length = 0;
421  }
422 
423  if ( stat || demlen <= 0 || dembuf[0] == '?') {
424  symname = info.dli_sname;
425  if (!symname) symname = "???";
426  demlen = strlen (symname);
427  }
428 
429  }
430  }
431  // RS end
432 
433  bufs [nbufs].iov_base = addrbuf;
434  bufs [nbufs].iov_len = snprintf (addrbuf, addrbuf_size, " 0x%08lx ", addr);
435  ++nbufs;
436 
437  bufs [nbufs].iov_base = (void *) symname; // discard const
438  bufs [nbufs].iov_len = demlen;
439  ++nbufs;
440 
441  // RS start
442  bufs [nbufs].iov_base = line;
443  bufs [nbufs].iov_len = length;
444  ++nbufs;
445  // RS end
446 
447  bufs [nbufs].iov_base = diffbuf;
448  bufs [nbufs].iov_len = snprintf (diffbuf, diffbuf_size, " %c 0x%lx [",
449  gte ? '+' : '-', diff);
450  ++nbufs;
451 
452  bufs [nbufs].iov_base = (void *) libname; // discard const
453  bufs [nbufs].iov_len = strlen (libname);
454  ++nbufs;
455 
456  // RS start
457  bufs [nbufs].iov_base = relbuf;
458  bufs [nbufs].iov_len = snprintf( relbuf, relbuf_size, " D[%p]", (void*)relative_address );
459  ++nbufs;
460  // RS end
461 
462  bufs [nbufs].iov_base = (void *) trailer; // discard const
463  bufs [nbufs].iov_len = 2;
464  ++nbufs;
465 
466  }
467  else
468 #endif
469  {
470  bufs [nbufs].iov_base = addrbuf;
471  bufs [nbufs].iov_len = snprintf (addrbuf, addrbuf_size, " 0x%08lx ", addr);
472  ++nbufs;
473 
474  bufs [nbufs].iov_base = (void *) "<unknown function>\n"; //no const
475  bufs [nbufs].iov_len = 19;
476  ++nbufs;
477  }
478 
479  writev (fd, bufs, nbufs);
480 }

◆ ATLAS_NOT_THREAD_SAFE() [8/9]

void Signal::handleQuit Athena::ATLAS_NOT_THREAD_SAFE ( QuitHook  hook)

Definition at line 581 of file SealSignal.cxx.

582 {
583  static int hups [] = {
584 #ifdef SIGHUP
585  // hang up (lost terminal or process group leader)
586  SIGHUP,
587 #endif
588 #ifdef SIGTERM
589  // terminate (e.g. system going down)
590  SIGTERM,
591 #endif
592 #ifdef SIGQUIT
593  // user request to quit and leave debuggable state (from quit
594  // key on controlling terminal)
595  SIGQUIT,
596 #endif
597  -1
598  };
599 
600  if (hook)
601  s_quitHook = hook;
602 
603  for (unsigned sig = 0; hups [sig] != -1; ++sig)
604  handle (hups [sig], quit);
605 }

◆ ATLAS_NOT_THREAD_SAFE() [9/9]

bool Signal::crashed Athena::ATLAS_NOT_THREAD_SAFE ( void  )

Return the file descriptor #fataldump() uses for output.

Return the crash status indicator: true if a fatal signal has been received since the program started.

Return the depth to which #fatal() is currently recursively entered, or zero if #fatal() is not currently active.

Return the current application quit signal hook.

Return the current fatal signal handling options.

Return the application fatal signal return hook.

Return the application fatal signal hook.

Registered through #handleFatal().

Registered through #handleFatal().

See also
#fatal()

Registered through #handleFatal().

See also
#fatal().

Set on invocation to #handleFatal().

Registered through #handleQuit().

Use this method in application fatal hook to decide which operations are safe to perform. For example, if the attempts to notify the user result in further signals, it is best to avoid such attempts at deeper recursion levels. Currently #fatal() ceases to call the application's hooks and forces termination if the nesting level reaches 4.

Set if #fatal() is entered with a fatal signal.

Definition at line 1580 of file SealSignal.cxx.

1581 {
1582  // Automatically initialise on first access.
1583  if (s_fatalFd == IOFD_INVALID)
1584  s_fatalFd = STDERR_HANDLE;
1585 
1586  return s_fatalFd;
1587 }

◆ CreateCallback()

template<class T1 , class T2 >
Callback1Rep<T1>* Athena::CreateCallback ( void(*)(T1, T2)  function,
const T2 &  fill_2 
)
inline

Definition at line 136 of file SealSharedLib.h.

138 { return new CallbackImpF11<T1,T2> (function, fill_2); }

◆ getMessageSvc() [1/2]

IMessageSvc * Athena::getMessageSvc ( bool  quiet = false)

Definition at line 20 of file getMessageSvc.cxx.

20 { return getMessageSvc( Options::Lazy, quiet ); }

◆ getMessageSvc() [2/2]

IMessageSvc * Athena::getMessageSvc ( const Options::CreateOptions  o,
bool  quiet = false 
)

Definition at line 21 of file getMessageSvc.cxx.

21  {
22 
23  // We cache the MessageSvc, but only once it has been found. This ensures that an
24  // early call to this method (before MessageSvc is available) does not prevent
25  // from finding it in subsequent calls. The limited use of ServiceHandle for this
26  // purpose should be thread-safe:
27  static ServiceHandle<IMessageSvc> msgSvc ATLAS_THREAD_SAFE ("MessageSvc", "getMessageSvc");
28 
29  if (msgSvc.get()) {
30  msgSvc->addRef(); // even if cached, maintain correct ref-count
31  }
32  else {
33  const bool warn = !(quiet || Athena::getMessageSvcQuiet);
34  if ( ((opt==Athena::Options::Lazy && !Gaudi::svcLocator()->existsService("MessageSvc")) ||
35  msgSvc.retrieve().isFailure()) && warn ) {
36  std::cerr << "Athena::getMessageSvc: WARNING MessageSvc not found, will use std::cout" << std::endl;
37  }
38  }
39 
40  return msgSvc.get();
41 }

◆ outputLevel()

int Athena::outputLevel ( const IMessageSvc *  ims,
const std::string &  source 
)

Definition at line 47 of file getMessageSvc.cxx.

47  {
48  if (ims) return ims->outputLevel(source);
49  else return MSG::INFO;
50 }

◆ reportMessage()

void Athena::reportMessage ( IMessageSvc *  ims,
const std::string &  source,
int  type,
const std::string &  message 
)

Wrappers for some of the IMessageSvc methods These can be used from libraries without explicit Gaudi dependency via weak linking.

(see e.g. TrigConf::MsgStream in TrigConfBase)

DO NOT MODIFY THE SIGNATURE OF THESE METHODS WITHOUT UPDATING THE TRIGCONF SIDE !!!

Definition at line 43 of file getMessageSvc.cxx.

43  {
44  if (ims) ims->reportMessage(source, type, message);
45 }

◆ setOutputLevel()

void Athena::setOutputLevel ( IMessageSvc *  ims,
const std::string &  source,
int  level 
)

Definition at line 52 of file getMessageSvc.cxx.

52  {
53  if(ims) ims->setOutputLevel(source, level);
54 }

◆ ubsan_boost_suppress()

int Athena::ubsan_boost_suppress ( )

Definition at line 21 of file ubsan_boost_suppress.cxx.

22 {
23  // See <https://svn.boost.org/trac/boost/ticket/11632>
24  CxxUtils::ubsan_suppress ([]() { boost::format("%1%") % "asd"; });
25  return 0;
26 }

Variable Documentation

◆ getMessageSvcQuiet

std::atomic< bool > Athena::getMessageSvcQuiet

Set this to force off the warning messages from getMessageSvc (in unit tests, for example).

Definition at line 18 of file getMessageSvc.cxx.

◆ ubsan_boost_suppress_

int Athena::ubsan_boost_suppress_ = ubsan_boost_suppress()

Definition at line 29 of file ubsan_boost_suppress.cxx.

grepfile.info
info
Definition: grepfile.py:38
Athena::Options::Lazy
@ Lazy
Definition: getMessageSvc.h:23
pid_t
int32_t pid_t
Definition: FPGATrackSimTypes.h:19
base
std::string base
Definition: hcg.cxx:78
beamspotnt.var
var
Definition: bin/beamspotnt.py:1394
checkFileSG.line
line
Definition: checkFileSG.py:75
egammaParameters::depth
@ depth
pointing depth of the shower as calculated in egammaqgcld
Definition: egammaParamDefs.h:276
athena.path
path
python interpreter configuration --------------------------------------—
Definition: athena.py:126
vtune_athena.format
format
Definition: vtune_athena.py:14
Athena::getMessageSvcQuiet
std::atomic< bool > getMessageSvcQuiet
Set this to force off the warning messages from getMessageSvc (in unit tests, for example).
Definition: getMessageSvc.cxx:18
quiet
bool quiet
Definition: TrigGlobEffCorrValidation.cxx:170
mc.diff
diff
Definition: mc.SFGenPy8_MuMu_DD.py:14
get_generator_info.stderr
stderr
Definition: get_generator_info.py:40
x
#define x
ReweightUtils.message
message
Definition: ReweightUtils.py:15
Athena::getMessageSvc
IMessageSvc * getMessageSvc(bool quiet=false)
Definition: getMessageSvc.cxx:20
python.iconfTool.models.loaders.level
level
Definition: loaders.py:20
Athena::Status::MISSING_DATA
@ MISSING_DATA
Missing/corrupted input data.
python.PyAthena.module
module
Definition: PyAthena.py:134
PlotCalibFromCool.modulename
modulename
Definition: PlotCalibFromCool.py:81
createCoolChannelIdFile.buffer
buffer
Definition: createCoolChannelIdFile.py:12
dqt_zlumi_pandas.err
err
Definition: dqt_zlumi_pandas.py:193
StdJOSetup.msgSvc
msgSvc
Provide convenience handles for various services.
Definition: StdJOSetup.py:35
python.DecayParser.buf
buf
print ("=> [%s]"cmd)
Definition: DecayParser.py:27
beamspotman.n
n
Definition: beamspotman.py:731
python.ByteStreamConfig.write
def write
Definition: Event/ByteStreamCnvSvc/python/ByteStreamConfig.py:248
python.BuildSignatureFlags.sig
sig
Definition: BuildSignatureFlags.py:215
python.Constants.TRUE
bool TRUE
for job options legacy (TODO: get rid of these!) ----------------------—
Definition: Control/AthenaCommon/python/Constants.py:22
TrigInDetValidation_Base.malloc
malloc
Definition: TrigInDetValidation_Base.py:124
python.AtlRunQueryLib.options
options
Definition: AtlRunQueryLib.py:379
beamspotman.stat
stat
Definition: beamspotman.py:266
python.handimod.extra
int extra
Definition: handimod.py:522
ReadFromCoolCompare.fd
fd
Definition: ReadFromCoolCompare.py:196
name
std::string name
Definition: Control/AthContainers/Root/debug.cxx:192
pmontree.opt
opt
Definition: pmontree.py:16
IOFD_INVALID
#define IOFD_INVALID
Invalid channel descriptor constant.
Definition: SealCommon.h:20
ReadBadBitsFromCool.warn
warn
Definition: ReadBadBitsFromCool.py:43
Athena::Status::TIMEOUT
@ TIMEOUT
Timeout during event processing.
SCT_ConditionsAlgorithms::CoveritySafe::getenv
std::string getenv(const std::string &variableName)
get an environment variable
Definition: SCT_ConditionsUtilities.cxx:17
MYWRITE
#define MYWRITE(fd, data, n)
Definition: SealDebug.cxx:93
PATH
TString PATH
Definition: run_EoverP.cxx:91
python.CaloScaleNoiseConfig.type
type
Definition: CaloScaleNoiseConfig.py:78
if
if(febId1==febId2)
Definition: LArRodBlockPhysicsV0.cxx:569
convertTimingResiduals.offset
offset
Definition: convertTimingResiduals.py:71
ATLAS_THREAD_SAFE
#define ATLAS_THREAD_SAFE
Definition: checker_macros.h:211
section
void section(const std::string &sec)
Definition: TestTriggerMenuAccess.cxx:22
MYWRITELIT
#define MYWRITELIT(fd, str)
Definition: SealDebug.cxx:97
CxxUtils::ubsan_suppress
void ubsan_suppress(void(*func)())
Helper for suppressing ubsan warnings.
Definition: ubsan_suppress.cxx:69
length
double length(const pvec &v)
Definition: FPGATrackSimLLPDoubletHoughTransformTool.cxx:26
python.SystemOfUnits.pc
float pc
Definition: SystemOfUnits.py:99
Athena::CreateCallback
Callback1Rep< T1 > * CreateCallback(void(*function)(T1, T2), const T2 &fill_2)
Definition: SealSharedLib.h:136
STDERR_HANDLE
#define STDERR_HANDLE
Definition: SealDebug.h:34
python.trfValidateRootFile.rc
rc
Definition: trfValidateRootFile.py:301
MYWRITE
#define MYWRITE(fd, data, n)
Definition: SealDebug.h:44
ServiceHandle< IMessageSvc >