diff --git a/coregrind/docs/coregrind_core.html b/coregrind/docs/coregrind_core.html index 34edcf242..0a01661b0 100644 --- a/coregrind/docs/coregrind_core.html +++ b/coregrind/docs/coregrind_core.html @@ -779,58 +779,6 @@ the Valgrind core. Most people won't need to use these. are enabled. Use with caution! Currently known hacks are:
ioctl-VTIME Use this if you have a program
- which sets readable file descriptors to have a timeout by
- doing ioctl on them with a
- TCSETA-style command and a non-zero
- VTIME timeout value. This is considered
- potentially dangerous and therefore is not engaged by
- default, because it is (remotely) conceivable that it could
- cause threads doing read to incorrectly block
- the entire process.
-
- You probably want to try this one if you have a program
- which unexpectedly blocks in a read from a file
- descriptor which you know to have been messed with by
- ioctl. This could happen, for example, if the
- descriptor is used to read input from some kind of screen
- handling library.
-
- To find out if your program is blocking unexpectedly in the
- read system call, run with
- --trace-syscalls=yes flag.
-
-
truncate-writes Use this if you have a threaded
- program which appears to unexpectedly block whilst writing
- into a pipe. The effect is to modify all calls to
- write() so that requests to write more than
- 4096 bytes are treated as if they only requested a write of
- 4096 bytes. Valgrind does this by changing the
- count argument of write(), as
- passed to the kernel, so that it is at most 4096. The
- amount of data written will then be less than the client
- program asked for, but the client should have a loop around
- its write() call to check whether the requested
- number of bytes have been written. If not, it should issue
- further write() calls until all the data is
- written.
- - This all sounds pretty dodgy to me, which is why I've made - this behaviour only happen on request. It is not the - default behaviour. At the time of writing this (30 June - 2002) I have only seen one example where this is necessary, - so either the problem is extremely rare or nobody is using - Valgrind :-) -
- On experimentation I see that truncate-writes
- doesn't interact well with ioctl-VTIME, so you
- probably don't want to try both at once.
-
- As above, to find out if your program is blocking
- unexpectedly in the write() system call, you
- may find the --trace-syscalls=yes
- --trace-sched=yes flags useful.
-
lax-ioctls Be very lax about ioctl handling; the only
assumption is that the size is correct. Doesn't require the full
buffer to be initialized when writing. Without this, using some
diff --git a/coregrind/vg_main.c b/coregrind/vg_main.c
index a02b93000..a9181a6ba 100644
--- a/coregrind/vg_main.c
+++ b/coregrind/vg_main.c
@@ -1520,7 +1520,7 @@ void usage ( Bool debug_help )
" uncommon user options for all Valgrind tools:\n"
" --run-libc-freeres=no|yes Free up glibc memory at exit? [yes]\n"
" --weird-hacks=hack1,hack2,... [none]\n"
-" recognised hacks are: ioctl-VTIME truncate-writes lax-ioctls\n"
+" recognised hacks are: lax-ioctls\n"
" --signal-polltime=