On Sun, Jun 13, 2010 at 11:47 AM, Satya V. Gupta <guptasa...@netzero.net> wrote:
> I have a supervisory process that is kicked off by an ELF executable which
> in turn invokes some ELF/ python script/ executables based child processes.
> I wish to run valgrind with --tool=callgrind and be able to inject valgrind
> into all processes. So far I have tried to run the supervisory process with
> --trace-children=yes and of course --tool=callgrind switches.
>
> Any ELF based executable process stays up but valgrind receives a SIGSEGV
> from all the others. It leaves behind an identical call stack strace with a
> bunch of exception handlers that pass through the main python executable and
> a bunch of boost libraries.
>
> Does anyone have recommendations on how to run python/ boost based
> executable?

Instead of asking the same question twice, you should try the
suggestion that was posted in reply to your message on the
valgrind-developers mailing list (see also
http://sourceforge.net/mailarchive/forum.php?thread_name=201006122144.03178.jseward%40acm.org&forum_name=valgrind-developers).

Bart.

------------------------------------------------------------------------------
ThinkGeek and WIRED's GeekDad team up for the Ultimate 
GeekDad Father's Day Giveaway. ONE MASSIVE PRIZE to the 
lucky parental unit.  See the prize list and enter to win: 
http://p.sf.net/sfu/thinkgeek-promo
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to