Hello.. I'm building what is a small app in APE.. I'm using the package provided via:
Version: 1.0-1 Priority: extra Section: web Maintainer: efyx <[email protected]> --- It's a small app using the spidermonkey server side scripting.. It starts, connects to mysql, and starts a recurring event to poll the db and if it find some data related to the users connected to ape, sends some raw messages down their pipes.. Should be relatively simply.. but I'm getting some crashes. I started it with valgrind and got some output. Any have any ideas where to start? or should I first update to latest GIT version? Could there be any diff between the 32 and 64 bit versions? I'm running on ubuntu 10.4 64bit. Thanks. Quite a bit of this output: ==11444== Conditional jump or move depends on uninitialised value(s) ==11444== at 0x9B97B60: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B83578: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9C5ADD6: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B8DE17: js_Invoke (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B82E89: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9C5BD09: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B8DE17: js_Invoke (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B8E377: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B444F9: JS_CallFunctionValue (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B3D8BE: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x4108A0: process_tick (in /usr/bin/aped) ==11444== by 0x4070A4: sockroutine (in /usr/bin/aped) ==11444== ==11444== Conditional jump or move depends on uninitialised value(s) ==11444== at 0x9B89B18: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B9B4E9: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B9B7B8: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B3E48E: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x406C4D: sockroutine (in /usr/bin/aped) ==11444== by 0x4061C6: main (in /usr/bin/aped) And then the final farewell: [Wed Oct 20 13:21:20 2010] Checking status [Wed Oct 20 13:21:20 2010] Users in channel: 2 [Wed Oct 20 13:21:25 2010] Checking status [Wed Oct 20 13:21:25 2010] Users in channel: 2 [Wed Oct 20 13:21:30 2010] Checking status [Wed Oct 20 13:21:30 2010] Users in channel: 2 [Wed Oct 20 13:21:35 2010] Checking status [Wed Oct 20 13:21:35 2010] Users in channel: 2 ==11444== Invalid read of size 1 ==11444== at 0x9BF0380: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B43C16: JS_NewStringCopyN (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B3E519: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x406C4D: sockroutine (in /usr/bin/aped) ==11444== by 0x4061C6: main (in /usr/bin/aped) ==11444== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==11444== ==11444== ==11444== Process terminating with default action of signal 11 (SIGSEGV) ==11444== Access not within mapped region at address 0x0 ==11444== at 0x9BF0380: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B43C16: JS_NewStringCopyN (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x9B3E519: ??? (in /usr/lib/ape/ libmod_spidermonkey.so) ==11444== by 0x406C4D: sockroutine (in /usr/bin/aped) ==11444== by 0x4061C6: main (in /usr/bin/aped) ==11444== If you believe this happened as a result of a stack ==11444== overflow in your program's main thread (unlikely but ==11444== possible), you can try to increase the size of the ==11444== main thread stack using the --main-stacksize= flag. ==11444== The main thread stack size used in this run was 8388608. ==11444== ==11444== HEAP SUMMARY: ==11444== in use at exit: 70,089,304 bytes in 51,934 blocks ==11444== total heap usage: 177,628 allocs, 125,694 frees, 1,441,759,239 bytes allocated ==11444== ==11444== LEAK SUMMARY: ==11444== definitely lost: 49,181 bytes in 1,829 blocks ==11444== indirectly lost: 768 bytes in 32 blocks ==11444== possibly lost: 288,616 bytes in 5,597 blocks ==11444== still reachable: 69,750,739 bytes in 44,476 blocks ==11444== suppressed: 0 bytes in 0 blocks ==11444== Rerun with --leak-check=full to see details of leaked memory ==11444== ==11444== For counts of detected and suppressed errors, rerun with: -v ==11444== Use --track-origins=yes to see where uninitialised values come from ==11444== ERROR SUMMARY: 49949 errors from 63 contexts (suppressed: 4 from 4) Segmentation fault -- You received this message because you are subscribed to the Google Groups "APE Project" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/ape-project?hl=en --- APE Project (Ajax Push Engine) Official website : http://www.ape-project.org/ Git Hub : http://github.com/APE-Project/
