https://bugs.kde.org/show_bug.cgi?id=365208
--- Comment #4 from Philippe Waroquiers <philippe.waroqui...@skynet.be> --- Effectively, there is not a lot more info. It looks however that (some) user level code is being executed, as the user stack is being extended. So, you might try to attach to the valgrind gdb server by doing gdb <your executable> and then (gdb) target remote | /usr/lib/valgrind/../../bin/vgdb --pid=XXXXX (as instructed by gdb). Assuming the above does not work or give any info, you might try with the none tool: --tool=none Also maybe try with the smallest simplest executable you have (maybe and "hello world" program, or date, or similar). Other possible options to trace are --trace-signals=yes --trace-syscalls=yes --trace-flags=00100000 --trace-notbelow=1 Just to see if something happens. But for sure, we shoot in the dark with the above -- You are receiving this mail because: You are watching all bug changes.