This is proof of concept toy, with the sole intent of updating the bug report on WLS (and to get something working on my system in the mean time). This seems to work for me, but I'm not a developer of either project and while you are free to use it you do so at your own risk.
There are plenty of regression tests failing on the WLS even after this change indicating there are further discrepancies between WLS and true Linux to be fixed. This does at least make valgrind begin to be useful... Build instructions
(I assume you have gcc and valgrind's runtime dependencies installed already since you've got here having had the package valgrind explode on you already...)
- sudo apt-get install autoconf
- git clone --recursive https://github.com/Grauniad/valgrind.git
- cd valgrind
- ./autogen.sh
- ./configure
- make
The latest release of valgrind (3.12.0) crashes out when run on "bash for windows". When running almost any non-trivial binary valgrind will crash out with the following error:
lhumphreys@DESKTOP-V1UODOU:~/Call-Graph-Viewer$ valgrind ./publisherSpeed
==2183== Memcheck, a memory error detector
==2183== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==2183== Using Valgrind-3.12.0 and LibVEX; rerun with -h for copyright info
==2183== Command: ./publisherSpeed
==2183==
==2183==
==2183== Process terminating with default action of signal 11 (SIGSEGV): dumping core
==2183== General Protection Fault
==2183== at 0x400967: main (publisherSpeed.cpp:8)
==2183==
==2183== HEAP SUMMARY:
==2183== in use at exit: 0 bytes in 0 blocks
==2183== total heap usage: 1 allocs, 1 frees, 72,704 bytes allocated
==2183==
==2183== All heap blocks were freed -- no leaks are possible
==2183==
==2183== For counts of detected and suppressed errors, rerun with: -v
==2183== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
Segmentation fault (core dumped)
lhumphreys@DESKTOP-V1UODOU:~/Call-Graph-Viewer$
Example code and logs can be found in: /logs (https://github.com/Grauniad/valgrind/tree/master/logs)
we can repro the issue even from a binary that doesn't actually execute anything of any note, e.g:
int main (int argc, char** argv) {
if (argc == -1 ) {
// Some boring irrelevant code
}
return 0;
}
Running valgrind under strace:
// ... lots of boring stuff ...
mmap(0x5a2a000, 4194304, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, 0, 0) = 0x5a2a000
mmap(0x802bf9000, 16384, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, 0, 0) = 0x802bf9000
--- SIGSEGV {si_signo=SIGSEGV, si_code=SI_KERNEL, si_addr=0xffeffc9ec} ---
gettid() = 4328
getrlimit(RLIMIT_CORE, {rlim_cur=9999999*1024, rlim_max=9999999*1024}) = 0
getpid() = 4328
getpid() = 4328
write(2039, "==4328== \n==4328== Process termi"..., 96==4328==
// ... more boring stuff ...
Sure enough there's the SIGSEV. Now if we run the same binary under valgrind on a true Ubuntu system we get:
// ... lots of boring stuff ...
mmap(0x5cc1000, 4194304, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, 0, 0) = 0x5cc1000
mmap(0x802ac0000, 16384, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, 0, 0) = 0x802ac0000
mmap(0x802ac4000, 65536, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, 0, 0) = 0x802ac4000
--- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0xffeff882c} ---
gettid() = 3891
mmap(0xffeff8000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, 0, 0) = 0xffeff8000
rt_sigreturn() = 8715
rt_sigprocmask(SIG_BLOCK, NULL, ~[ILL TRAP BUS FPE KILL SEGV STOP], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[ILL TRAP BUS FPE KILL SEGV STOP], NULL, 8) = 0
munmap(0, 0) = -1 EINVAL (Invalid argument)
gettid()
// ... more boring stuff ...
Interestingly the SIGSEGV is raised on a standard Linux system as well, except that it has a different code.
Having a poke around we quickly end up in m_signals.c and discover that valgrind is intercepting the SEGV_MAPER event to determine that the binary it is instrumenting is attempting to extend its stack.
If we hack valgrind to accept the KERNEL signal (@d4cd19b - the consequences of which require someone with far more domain expertise than the author possesses) we find that this does indeed fix our bug, and valgrind appears to be working.
Running the regression suite we still get some errors, but we are in much better shape than before. Running the memcheck tests we get:
== 225 tests, 9 stderr failures, 1 stdout failure, 0 stderrB failures, 0 stdoutB failures, 0 post failures ==
memcheck/tests/addressable (stderr)
memcheck/tests/deep-backtrace (stderr)
memcheck/tests/file_locking (stderr)
memcheck/tests/leak_cpp_interior (stderr)
memcheck/tests/linux/getregset (stdout)
memcheck/tests/linux/getregset (stderr)
memcheck/tests/linux/stack_switch (stderr)
memcheck/tests/linux/timerfd-syscall (stderr)
memcheck/tests/pointer-trace (stderr)
memcheck/tests/sem (stderr