> I want to observe the binary translation and instrumentation progress, which 
> translate machine code to tree IR first, then translate tree IR to flat IR 
> and do instrumentation, finally rebuild tree IR and output machine code, just 
> like section 3.7 of "Valgrind: A Framework for Heavyweight Dynamic
> Binary Instrumentation". I have try --help-debug but I cannot find any 
> relevant option. Is it possible to dump these information by any option?


Errr, did you read the output?  "valgrind --help-debug /bin/date"
 [[snip]]
  Vex options for all Valgrind tools:
    --vex-iropt-verbosity=<0..9>           [0]
    --vex-iropt-level=<0..2>               [2]
    --vex-iropt-register-updates=unwindregs-at-mem-access
                                |allregs-at-mem-access
                                |allregs-at-each-insn  
[unwindregs-at-mem-access]
    --vex-iropt-unroll-thresh=<0..400>     [120]
    --vex-guest-max-insns=<1..100>         [50]
    --vex-guest-chase-thresh=<0..99>       [10]
    --vex-guest-chase-cond=no|yes          [no]
    --trace-flags and --profile-flags values (omit the middle space):
       1000 0000   show conversion into IR     <<<<< RIGHT HERE  (etc.)
       0100 0000   show after initial opt
       0010 0000   show after instrumentation
       0001 0000   show after second opt
       0000 1000   show after tree building
       0000 0100   show selecting insns
       0000 0010   show after reg-alloc
       0000 0001   show final assembly
      (Nb: you need --trace-notbelow and/or --trace-notabove with --trace-flags 
for full details)

  debugging options for Valgrind tools that report errors
    --dump-error=<number>     show translation for basic block associated
                              with <number>'th error context [0=show none]
 [[snip]]


------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to