程序代写代做代考 c/c++ compiler chain flex go html cache C c++ Java _This is not a lab, nor is it anything specific to writing compilers, but rather a guide to help you debug programs. You should not spend too much time going through this document in a lab session._

_This is not a lab, nor is it anything specific to writing compilers, but rather a guide to help you debug programs. You should not spend too much time going through this document in a lab session._

It is inevitable that you will bump into bugs in your code (eg: random segmentation faults). It is thus helpful to know what tools exist that can help you in debugging your programs.

This document is by no means a thorough guideline, but rather, a introductory document to the arsenal of tools available to you. This document therefore does not expect for you to fully understand the intricacies of using these tools, but rather aims to help you develop a better understanding of what is available and provide a preview of some of the simpler things that can be done to help debug your code. As with learning any programming skills, there are many resources online to help you on the way so long as you know what you’re searching for.

Note: It is likely for you to spend at least an hour or two to go through this entire document, but doing so will likely save you many more hours down the line.

For simplicity, I will be assuming that you are in a Unix-based environment.

In the case that the tools here will not fit your problems / needs, it _does_ help to simply lookup “How to fix XXXX” in a search engine. You might be surprised by the results (This is how I found out about valgrind, one of the tools presented below).

Debuggers

If you have programmed in languages like Python or Java, you will be familiar with backtraces when your program crashes.

fyquah@olaf$ python3 example-backtrace-1.py
# in python (example-1.py)
Traceback (most recent call last):
File “example-1.py”, line 9, in
main()
File “example-1.py”, line 5, in main
x += a[i]
IndexError: list index out of range

# in Java (Example2.java)
fyquah@olaf$ java Example2
Exception in thread “main” java.lang.StackOverflowError
at Example2.fibonaci(Example2.java:5)
at Example2.fibonaci(Example2.java:5)
at Example2.fibonaci(Example2.java:5)
….
at Example2.fibonaci(Example2.java:5)
at Example2.fibonaci(Example2.java:5)

# In C++, however … 🙁 <-- this is a sad emoji fyquah@olaf: debugging $ ./example-backtrace-3 Segmentation fault Having a backtraces is incredibly helpful, as it helps you pinpoint where in the code did the program crash. To get something similar in C/C++: - Make sure you compile your object files with the -g flag. Read the g++’s manual pages (man g++) to see what this flag does. There are many ways to encode source information within binaries, one of the most popular ways is to use DWARF (You are not required to understand how DWARF works, but nevertheless, this introduction on DWARF is quite an entertaining read) - Compilers allow you to compile your code with different levels of optimisation, e.g. -O0 for fast compilation or -O3 for agressive optimisation. When debugging, DO NOT compile with -O3. While debuggers may still work, they will most likely not yield much useful information. - Execute your binary with a debugger Your choice of debuggers are as follows: - On Linux, the GNU debugger (commonly referred to as gdb) should work out of the box. The EE lab machines are setup with gdb. However, should you need to install it yourself, most Linux distributions will have gdb as part of their package managers and can easily be installed using apt-get. - On MacOS, you can either use lldb, using this command translation table OR you can also try installing gdb and code signing it. It is recommended to stick with lldb as code signing gdb can be a troublesome process. _The following text will assume you are using gdb._ There is a little program called example-backtrace-3.cpp which takes a list of numbers as its input arguments sorts them, and outputs the last element of the list. There is a bug in the program that will result in a segmentaion fault (Exercise: Spot the bug). To view a backtrace when running a program, fyquah@olaf: debugging $ gdb --args ./example-3 GNU gdb (GDB) 8.0 Copyright (C) 2017 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type “show copying”
and “show warranty” for details.
This GDB was configured as “x86_64-slackware-linux”.
Type “show configuration” for configuration details.
For bug reporting instructions, please see:
.
Find the GDB manual and other documentation resources online at:
.
For help, type “help”.
Type “apropos word” to search for commands related to “word”…
Reading symbols from ./example-3…done.
(gdb) run
Starting program: /home/fyquah/dev/eie/langproc-2017-cw/debugging/example-3
Running computationally heavy process!

Program received signal SIGSEGV, Segmentation fault.
0x0000000000400d14 in process_arguments (argc=1, argv=0x7fffffffd8e8) at example-3.cpp:12
12 return *(numbers.end() – 1);
(gdb) bt
#0 0x0000000000400d14 in process_arguments (argc=1, argv=0x7fffffffd8e8) at example-3.cpp:12
#1 0x0000000000400d90 in main (argc=1, argv=0x7fffffffd8e8) at example-3.cpp:19
(gdb)

This follows the following steps:

– Start gdb whilst specifying the target binary (and optionally command line arguments)
– Call run to execute the program
– Your program crashes (or suceededs, in which it you don’t need to do anything)
– Call bt
– Marvel in the abilities of debuggers – “You can do that in C++??”
– (Optional) Print some variables to figure out the source of the problem
– To exit gdb, call kill then quit

In your compiler, you are most likely going to pass your compilation source from stdin. To run with a file as stdin, call run >> = {_M_impl = {> = {<__gnu_cxx::new_allocator> = {}, }, _M_start = 0x0, _M_finish = 0x0,
_M_end_of_storage = 0x0}}, }
(gdb) call (int) process_arguments(3, ARRAY_OF_NUMBERS)
$1 = 99

I hope this convinces you that figuring out how to use GDB is better than writing random print statements in your program.

– It saves you a lot of time because you don’t have to insert random print statements until you find the source of the bug. (Think O(log N) vs O(1))
– It saves you a lot of time because you don’t have to remove the print statements later
– It saves you a lot of time because you can thoroughly examine the problem at the crash site.
– It saves you a lot of time because you don’t have to add print statements at the crash site to figure out the variables’ values.
– It saves you a lot of time because you don’t have to remove those print statements too.

GDB is an extremely powerful tool, that you can use to debug embedded applications over USB or running applications over the network. One of the most interesting “inception-like” use cases I have heard of is getting the values of registers in a coprocessor, in a VM, nested within 3 ssh sessions.

Valgrind

Valgrind is a dynamic analysis tool to help with various issues, such as threading bugs, memory management issues, cache-profiling and heap-profiling. We are primarily interested in memory checking (Memcheck) using dynamic analysis that helps us detect memory errors. Valgrind is available in most linux distributions.

Valgrind, unfortunately, is not available in EEE lab machines. However, it is available with package managers in most linux distribution. You should be able to install valgrind from package managers, eg: sudo apt-get install valgrind. You can also download valgrind and compile it from source.

Consider the example in example-leak.c. There are two two problems with the code: (1) n5->left and n5->right are not assigned appropriately and (2) n5 is not allocated enough memory (as sizeof(int) < sizeof(struct tree_t). Surprisingly enough, the code doesn’t always crash. fyquah@olaf: debugging $ make example-leak cc -Wall -g example-leak.c -o example-leak fyquah@olaf: debugging $ ./example-leak 6 5 8 10 9 7 There are various explainations you can give as to why this program doesn’t crash, but this is not a behaviour you should not rely upon. This stackoverflow post gives insight as to why the values are zero-ed out and why there wasn’t a segmentation fault, which explains why the program the pointer didn’t end up derefencing a jiberrish pointer. As to why the memory access didn’t result in a segmentation fault due to accessing unallocated memory, try to recall how memory and page tables are organised in an operating system). To rectify this memory problem, we can use valgrind to diagnose the source of the problem: fyquah@olaf: debugging $ valgrind ./example-leak ==7177== Memcheck, a memory error detector ==7177== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==7177== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info ==7177== Command: ./example-leak ==7177== 6 5 8 10 ==7177== Invalid read of size 8 ==7177== at 0x400830: inorder_print (example-leak.c:54) ==7177== by 0x400843: inorder_print (example-leak.c:54) ==7177== by 0x400894: inorder_print (example-leak.c:59) ==7177== by 0x4008C7: main (example-leak.c:67) ==7177== Address 0x5203228 is 4 bytes after a block of size 4 alloc'd ==7177== at 0x4C2CB5F: malloc (vg_replace_malloc.c:299) ==7177== by 0x400757: build_binary_tree (example-leak.c:20) ==7177== by 0x4008B2: main (example-leak.c:66) ==7177== 9 ==7177== Invalid read of size 8 ==7177== at 0x400881: inorder_print (example-leak.c:59) ==7177== by 0x400843: inorder_print (example-leak.c:54) ==7177== by 0x400894: inorder_print (example-leak.c:59) ==7177== by 0x4008C7: main (example-leak.c:67) ==7177== Address 0x5203230 is 12 bytes after a block of size 4 alloc'd ==7177== at 0x4C2CB5F: malloc (vg_replace_malloc.c:299) ==7177== by 0x400757: build_binary_tree (example-leak.c:20) ==7177== by 0x4008B2: main (example-leak.c:66) ==7177== 7 ==7177== ==7177== HEAP SUMMARY: ==7177== in use at exit: 124 bytes in 6 blocks ==7177== total heap usage: 7 allocs, 1 frees, 1,148 bytes allocated ==7177== ==7177== LEAK SUMMARY: ==7177== definitely lost: 24 bytes in 1 blocks ==7177== indirectly lost: 100 bytes in 5 blocks ==7177== possibly lost: 0 bytes in 0 blocks ==7177== still reachable: 0 bytes in 0 blocks ==7177== suppressed: 0 bytes in 0 blocks ==7177== Rerun with --leak-check=full to see details of leaked memory ==7177== ==7177== For counts of detected and suppressed errors, rerun with: -v ==7177== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) There are two main things happening: 1. There are two error messages about the addresses with an incorrect amount of memory allocated. This is an extremely good demonstration of the power of valgrind - (a) It tells you when. (Thought exercise: Where did the numbers, “Address 0x5203228 is 4 bytes” and “Address 0x5203230 is 12 bytes” come from?) 2. Memory leak (as expected), as we are not de-allocating memory ourselves. Let’s fix the malloc call and set the argument to the right size, then see what happens: fyquah@olaf: debugging $ make example-leak fyquah@olaf: debugging $ valgrind ./example-leak ==7892== Memcheck, a memory error detector ==7892== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==7892== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info ==7892== Command: ./example-leak ==7892== 6 5 8 10 ==7892== Conditional jump or move depends on uninitialised value(s) ==7892== at 0x40082A: inorder_print (example-leak.c:50) ==7892== by 0x400843: inorder_print (example-leak.c:54) ==7892== by 0x400843: inorder_print (example-leak.c:54) ==7892== by 0x400894: inorder_print (example-leak.c:59) ==7892== by 0x4008C7: main (example-leak.c:67) ==7892== 9 ==7892== Conditional jump or move depends on uninitialised value(s) ==7892== at 0x40082A: inorder_print (example-leak.c:50) ==7892== by 0x400894: inorder_print (example-leak.c:59) ==7892== by 0x400843: inorder_print (example-leak.c:54) ==7892== by 0x400894: inorder_print (example-leak.c:59) ==7892== by 0x4008C7: main (example-leak.c:67) ==7892== 7 ==7892== ==7892== HEAP SUMMARY: ==7892== in use at exit: 144 bytes in 6 blocks ==7892== total heap usage: 7 allocs, 1 frees, 1,168 bytes allocated ==7892== ==7892== LEAK SUMMARY: ==7892== definitely lost: 24 bytes in 1 blocks ==7892== indirectly lost: 120 bytes in 5 blocks ==7892== possibly lost: 0 bytes in 0 blocks ==7892== still reachable: 0 bytes in 0 blocks ==7892== suppressed: 0 bytes in 0 blocks ==7892== Rerun with --leak-check=full to see details of leaked memory ==7892== ==7892== For counts of detected and suppressed errors, rerun with: -v ==7892== Use --track-origins=yes to see where uninitialised values come from ==7892== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) Here, the conditional statement in line 50 of example-leak.c is dependent on an uninitialised value. This problem is admitedly harder to debug with valgrind alone and it is more likely that gdb will be more useful (when it crashes). Anyways, if we fix the assignments (by assigning n5->left and n5->right to NULL), we are left with:

fyquah@olaf: debugging $ make example-leak
fyquah@olaf: debugging $ valgrind ./example-leak
==8192== Memcheck, a memory error detector
==8192== Copyright (C) 2002-2017, and GNU GPL’d, by Julian Seward et al.
==8192== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==8192== Command: ./example-leak
==8192==
6
5
8
10
9
7
==8192==
==8192== HEAP SUMMARY:
==8192== in use at exit: 144 bytes in 6 blocks
==8192== total heap usage: 7 allocs, 1 frees, 1,168 bytes allocated
==8192==
==8192== LEAK SUMMARY:
==8192== definitely lost: 24 bytes in 1 blocks
==8192== indirectly lost: 120 bytes in 5 blocks
==8192== possibly lost: 0 bytes in 0 blocks
==8192== still reachable: 0 bytes in 0 blocks
==8192== suppressed: 0 bytes in 0 blocks
==8192== Rerun with –leak-check=full to see details of leaked memory
==8192==
==8192== For counts of detected and suppressed errors, rerun with: -v
==8192== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)

The only problem left will be memory leaks. It is not reported as an error because it is often the case that heap memory freed simply by program termination is sufficient.

Unless you are writing your compiler in C (or C++ that looks like C), the main avenue in which you will bump into the memory block size issue is in the following type of code:

class Statement : public Node {

}

static void
some_function()
{
Node *node = node;
Statement *stmt = (Staement*) node; // This is an invariant: I know what I am doing
}

In most cases, you actually don’t know what you are doing. For that reason, you really should avoid such casts when you can. Unfortunately, compiler authors, inevitably, write compilers with a lot of hand-maintained invariants. When you see yourself writing a type-cast as such in your code, it is worth asking yourself whether it is possible to modify your code slightly to avoid this cast altogether. If that’s not trivially possible and you have to perform type-casting, use static_cast<> or dynamic_cast<> (See this stackoverflow post for an explaination on their differences).

Static Analysis

Valgrind and GDB falls under the category of dynamic analysis, where the program is run and information gained at runtime is used to search for errors. Another common form of program analysis is static analysis, where the analysers checks for problems in your code without executing it. There are a lot of tools available (for free!) to perform such types of analysis. Some are built into modern IDEs such as XCode, while others require some form of setup. We will limit our discussion to one specific tool, the clang static analyser.

The clang static analyser generates a really nice web UI for you to navigate through errors. Static analyser tools in general have very low false positive rates. That is, they may not necessarily report all errors, but all errors they report are very likely to be genuine errors.

Similar to valgrind, the clang static analyser is not setup in the EEE lab machines. To install the clang static analyser, you should install clang using your package manager. In Ubuntu, it ought to be as simple as sudo apt-get install clang. (Compiling clang from source is a bit tricky, and not recommended).

Setting up the clang static analyser is surprisingly simple:

0. Install the clang and llvm toolchains on your local setup.
1. Run scan-build make your_make_target
2. Wait for compilation. You will notice that compilation is noticeably slower due to the static analyser running simultaneously to the compiler.
3. You will get a message telling you how many errors were found and how to view them.
4. You can either call scan-view as instructed, or simply navigate to /tmp/scan-build-XXXXXXX/index.html on your web browser.

fyquah@olaf: project $ scan-build make
scan-build: Using ‘/usr/bin/clang-4.0’ for static analysis
flex -o src/c_lexer.yy.c src/c_lexer.lex
…. (snip) …
scan-build: 9 bugs found.
scan-build: Run ‘scan-view /tmp/scan-build-2018-02-14-024355-359-1’ to examine bug reports.
fyquah@olaf: project $

Try compiling with scan-build make example-leak. The static analyser should have managed to some errors in the memory leak example (You might need to run make clean to force the static analyser to recompile the binaries whilist running static analysis). Try compiling the backtrace example with scan-build make example-backtrace-3. What do you observe? Why?

————————————————————————

To fully understand the amount of analysis that static analysers can do in code analysis, here are some really pretty screenshots.

[alt text]

_The Clang static analysis tool generates a really nice table to display the list of errors. You will notice some errors from the parsers, which you may safely ignore if it is due to code generated by bison._

[alt text]

_When you click on the links, it displays a thorough analysis on the code path that can lead to errors. In this case, it found some code that tries to deference a null pointer._

[alt text]

_Here is another example of an invalid pointer derefence it has found. In this case, there is code that dereferences a freed pointer._

And if you have not guessed, this _was_ from my compiler for this very course a few years ago. I hope this is sufficient to convince you to at least consider using static analysis.

Static analysis tools are usually not included in compilers:

– Compilers and static analysis are really a decoupled products. You can use the clang static analyser with gcc, clang, MSVC or your very own compiler!
– Running static analysis takes time, and it is sometimes undesirable to have compilation time increase just because of static analysis. (Settings where you _don’t_ want to run thorough static analysis)
– Compiler authors usually have a long list of issues and features to work on.

More Resources

There are endless amount of tools that are available for checking your code and making sure they work and a lot of resources online to help you do that. Unfortunately, it is unlikely that you have time to go through all of it. Feel free to dig around the resources given below, should you have time or wish to learn more about the subject, but you do not feel the need to do so

– GDB User Manual
– A GDB Tutorial from UMD
– A GDB Tutorial from UMich
– A simple example in using breakpoints with GDB
– Valgrind User Manual – There is a lot in this manual, for our use cases, we are interested in chapters 1 – 3 (for introductory material) and chapter 4 (Memcheck).
– cppcheck – A tool for C++ static analysis.
– And the most useful tool of all, a search engine (Now that you know what you need to search).

Acknowledgement

– Fu Yong Quah (@fyquah95) for writing this document
– Andrew Li (@al2114) for reading through initial drafts