Dear valgrind users:    I want to ask a question about the memory access 
interception, we all know that valgrind can intercept the dynamic memory access 
error
        We just need to modify  a little bit  code of memcheck, then we can 
intercept each dynamic memory access, however, how about static memory access 
and local variable?
        which part of valgrind can help me to catch the static memory access 
and local variable? does anybody know the exact way? Please help me!
        Thanks for reading!                                       
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to