On Sun, Jun 13, 2010 at 11:47 AM, Satya V. Gupta <guptasa...@netzero.net> wrote: > I have a supervisory process that is kicked off by an ELF executable which > in turn invokes some ELF/ python script/ executables based child processes. > I wish to run valgrind with --tool=callgrind and be able to inject valgrind > into all processes. So far I have tried to run the supervisory process with > --trace-children=yes and of course --tool=callgrind switches. > > Any ELF based executable process stays up but valgrind receives a SIGSEGV > from all the others. It leaves behind an identical call stack strace with a > bunch of exception handlers that pass through the main python executable and > a bunch of boost libraries. > > Does anyone have recommendations on how to run python/ boost based > executable?
Instead of asking the same question twice, you should try the suggestion that was posted in reply to your message on the valgrind-developers mailing list (see also http://sourceforge.net/mailarchive/forum.php?thread_name=201006122144.03178.jseward%40acm.org&forum_name=valgrind-developers). Bart. ------------------------------------------------------------------------------ ThinkGeek and WIRED's GeekDad team up for the Ultimate GeekDad Father's Day Giveaway. ONE MASSIVE PRIZE to the lucky parental unit. See the prize list and enter to win: http://p.sf.net/sfu/thinkgeek-promo _______________________________________________ Valgrind-users mailing list Valgrind-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/valgrind-users