https://bugs.kde.org/show_bug.cgi?id=365208

--- Comment #4 from Philippe Waroquiers <philippe.waroqui...@skynet.be> ---
Effectively, there is not a lot more info.
It looks however that (some) user level code is being executed, as the user
stack
is being extended.

So, you might try to attach to the valgrind gdb server by doing
   gdb <your executable>
and then
  (gdb) target remote  | /usr/lib/valgrind/../../bin/vgdb --pid=XXXXX
(as instructed by gdb).

Assuming the above does not work or give any info, you might try
with the none tool:   --tool=none

Also maybe try with the smallest simplest executable you have
(maybe and "hello world" program, or date, or similar).

Other possible options to trace are --trace-signals=yes --trace-syscalls=yes
--trace-flags=00100000 --trace-notbelow=1

Just to see if something happens.

But for sure, we shoot in the dark with the above

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to