> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 ./restactivator
>
> while restactivator is my application.
>
> How to perform dynamic analysis using Valgrind in this case? I tried several
> thing, none of them works.
>
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 "valgrind --leak-check=yes
> ./restactivator > memoryCheck.txt" // spawn-fcgi: child exited with: 2
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 valgrind --leak-check=yes
> ./restactivator // spawn can't recognize the parameters
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 "valgrind --leak-check=yes
> ./restactivator" // child exit 2
>
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 /usr/local/bin/valgrind --leak-check=yes
> /root/nxtcore-yshi/nxtcore/nxtrestfwk/restactivator
> // parameter not recognized
>
> spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 "/usr/local/bin/valgrind
> --leak-check=yes /root/nxtcore-yshi/nxtcore/nxtrestfwk/restactivator"
> // exit 2
_If_ the problem is that spawn-fcgi expects exactly one argument
[what is the meaning of "-F 1", anyway?]
then make an executable shell script that invokes valgrind:
-----my-script.sh; chmod +x (r-xr-xr-x)
#!/bin/sh
exec /usr/local/bin/valgrind --leak-check=yes
/root/nxtcore-yshi/nxtcore/nxtrestfwk/restactivator
-----
Invoke as (for example):
spawn-fcgi -p 9001 -a 127.0.0.1 -F 1 ./my-script.sh
--
------------------------------------------------------------------------------
Achieve Improved Network Security with IP and DNS Reputation.
Defend against bad network traffic, including botnets, malware,
phishing sites, and compromised hosts - saving your company time,
money, and embarrassment. Learn More!
http://p.sf.net/sfu/hpdev2dev-nov
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users