Re: [C++-sig] profiling python extension

2010-02-28 Thread Ralf W. Grosse-Kunstleve
> The only inconvenience is that I need to start and finish it only being a > root. This means > I either have to switch back and forth oftenly or do all profiling (and > development as a root). I'm in an environment with relatively few users which I fully trust. To get around the inconvenienc

Re: [C++-sig] profiling python extension

2010-02-28 Thread troy d. straszheim
Alexey Akimov wrote: 2) valgrind - also is pretty convenient tool and produces a lot of information (the raw output loooks quite difficult to understand, but i guess there is a play around options). It gives you many options of profiling. use kcachegrind to inspect the call graph. __

Re: [C++-sig] profiling python extension

2010-02-28 Thread Alexey Akimov
Thank you John, I just installed the tool you suggested and tried to use it. However I do not see any output. Could you give some more detailes of how the profiling process with the google-profiler should look like? What I do is: 1) bjam variant=profile toolset=gcc cxxflags=-fno-for-scope linkfla

Re: [C++-sig] profiling python extension

2010-02-28 Thread John Reid
Alexey Akimov wrote: Does anyone know how one may profile a python extention? I've used the google profiler on Linux successfully in the past. It is quite straightforward to set up inside an extension. http://goog-perftools.sourceforge.net/doc/cpu_profiler.html John. __

Re: [C++-sig] profiling python extension

2010-02-28 Thread Alexey Akimov
Thank you, Troy I'll try the valgrind tool as well (in addition to oprofile). Best wishes Alexey 2010/2/28 troy d. straszheim > Alexey Akimov wrote: > >> Thank you, Amos >> I forget to mention - I am working Linux, so the shark tool probably will >> not be suitable for me. But anyway thanks fo

Re: [C++-sig] profiling python extension

2010-02-28 Thread troy d. straszheim
Alexey Akimov wrote: Thank you, Amos I forget to mention - I am working Linux, so the shark tool probably will not be suitable for me. But anyway thanks for you reply. Or this: valgrind --tool=callgrind mypythonscript.py kcachegrind -t ___ Cplusp

Re: [C++-sig] profiling python extension

2010-02-28 Thread Alexey Akimov
Thank you, Amos I forget to mention - I am working Linux, so the shark tool probably will not be suitable for me. But anyway thanks for you reply. Best wishes Alexey 2010/2/28 Amos Anderson > > Date: Sat, 27 Feb 2010 21:52:17 -0600 > > From: Alexey Akimov > > To: "Development of Python/C++ int

Re: [C++-sig] profiling python extension

2010-02-28 Thread Amos Anderson
> Date: Sat, 27 Feb 2010 21:52:17 -0600 > From: Alexey Akimov > To: "Development of Python/C++ integration" > Subject: [C++-sig] profiling python extension > Message-ID: >        <382d227f1002271952p25858f1eyeb1c495bd282...@mail.gmail.com> > Content-Type: text/plain; charset="iso-8859-1" > > Dear

Re: [C++-sig] profiling python extension

2010-02-28 Thread Alexey Akimov
Thank you, Ralf. All that sounds pretty promising. I took a look on their web-site - indeed it does what I whant. However, I am still woundering if there any options to do this with bjam? Moreover I was successful to compile and run the extension with variant=profile option and I suspect that there