> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 ./restactivator
> 
> while restactivator is my application.
> 
> How to perform dynamic analysis using Valgrind in this case? I tried several 
> thing, none of them works.
> 
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 "valgrind --leak-check=yes 
> ./restactivator > memoryCheck.txt"   // spawn-fcgi: child exited with: 2
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 valgrind --leak-check=yes 
> ./restactivator // spawn can't recognize the parameters
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 "valgrind --leak-check=yes 
> ./restactivator" // child exit 2
> 
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 /usr/local/bin/valgrind --leak-check=yes 
> /root/nxtcore-yshi/nxtcore/nxtrestfwk/restactivator
> // parameter not recognized
> 
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 "/usr/local/bin/valgrind 
> --leak-check=yes /root/nxtcore-yshi/nxtcore/nxtrestfwk/restactivator"
> // exit 2

_If_ the problem is that spawn-fcgi expects exactly one argument
[what is the meaning of "-F 1", anyway?]
then make an executable shell script that invokes valgrind:
        -----my-script.sh; chmod +x   (r-xr-xr-x)
        #!/bin/sh
        exec /usr/local/bin/valgrind --leak-check=yes 
/root/nxtcore-yshi/nxtcore/nxtrestfwk/restactivator
        -----
Invoke as (for example):
        spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 ./my-script.sh

-- 

------------------------------------------------------------------------------
Achieve Improved Network Security with IP and DNS Reputation.
Defend against bad network traffic, including botnets, malware, 
phishing sites, and compromised hosts - saving your company time, 
money, and embarrassment.   Learn More! 
http://p.sf.net/sfu/hpdev2dev-nov
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to