It's the only project of it's kind .. I was able to build it and install it, it compiles fine but when I launch it I get a useless "Aborted" message .. I've seen on the developer's site ( which is only accessible via google cache ) to run it with valgrind to get any useful debugging information but it's not useful to ME .. and with the developer seemingly gone from the planet.. I'm not sure how to proceed..
I might just see if I can use perl instead.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Anonymous
-
2012-09-20
But for what it's worth..
Platform: Debian Lenny
PHP: 5.2.6
Libpurple: I've tried the version that comes in the lenny repositories and I've downloaded & compiled the latest.. no change
The valgrind output is as such:
==12785== Memcheck, a memory error detector.
==12785== Copyright (C) 2002-2007, and GNU GPL'd, by Julian Seward et al.
==12785== Using LibVEX rev 1854, a library for dynamic binary translation.
==12785== Copyright (C) 2004-2007, and GNU GPL'd, by OpenWorks LLP.
==12785== Using valgrind-3.3.1-Debian, a dynamic binary instrumentation framework.
==12785== Copyright (C) 2000-2007, and GNU GPL'd, by Julian Seward et al.
==12785== For more details, rerun with: -v
==12785==
==12785== Invalid read of size 4
==12785== at 0x4015767: (within /lib/ld-2.7.so)
==12785== by 0x45F32A1: (within /lib/i686/cmov/libc-2.7.so)
==12785== by 0x400DA35: (within /lib/ld-2.7.so)
==12785== by 0x45F3464: __libc_dlopen_mode (in /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45CB84F: __nss_lookup_function (in /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45CB93F: (within /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45CD645: (within /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45D3B60: getprotobyname_r (in /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45D3956: getprotobyname (in /lib/i686/cmov/libc-2.7.so)
==12785== by 0x81D43A9: zm_startup_sockets (in /usr/bin/php5)
==12785== by 0x82DB5ED: zend_startup_module_ex (in /usr/bin/php5)
==12785== by 0x82E05CC: zend_hash_apply (in /usr/bin/php5)
==12785== Address 0x48d6ea4 is 44 bytes inside a block of size 46 alloc'd
==12785== at 0x4023D6E: malloc (vg_replace_malloc.c:207)
==12785== by 0x400DB43: (within /lib/ld-2.7.so)
==12785== by 0x4008558: (within /lib/ld-2.7.so)
==12785== by 0x4011B4E: (within /lib/ld-2.7.so)
==12785== by 0x400DA35: (within /lib/ld-2.7.so)
==12785== by 0x401156D: (within /lib/ld-2.7.so)
==12785== by 0x45F32A1: (within /lib/i686/cmov/libc-2.7.so)
==12785== by 0x400DA35: (within /lib/ld-2.7.so)
==12785== by 0x45F3464: __libc_dlopen_mode (in /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45CB84F: __nss_lookup_function (in /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45CB93F: (within /lib/i686/cmov/libc-2.7.so)
==12785== by 0x45CD645: (within /lib/i686/cmov/libc-2.7.so)
==12785==
==12785== Conditional jump or move depends on uninitialised value(s)
==12785== at 0x82C80C3: zend_call_function (in /usr/bin/php5)
==12785== by 0x5507B1E: call_custom_method (phurple.c:730)
==12785== by 0x5509C55: zim_PhurpleClient_getInstance (client.c:407)
==12785== by 0x830F6C2: (within /usr/bin/php5)
==12785== by 0x82FAB4F: execute (in /usr/bin/php5)
==12785== by 0x82D528F: zend_execute_scripts (in /usr/bin/php5)
==12785== by 0x828B0A2: php_execute_script (in /usr/bin/php5)
==12785== by 0x8358710: main (in /usr/bin/php5)
==12785==
==12785== Use of uninitialised value of size 4
==12785== at 0x82C80C5: zend_call_function (in /usr/bin/php5)
==12785== by 0x5507B1E: call_custom_method (phurple.c:730)
==12785== by 0x5509C55: zim_PhurpleClient_getInstance (client.c:407)
==12785== by 0x830F6C2: (within /usr/bin/php5)
==12785== by 0x82FAB4F: execute (in /usr/bin/php5)
==12785== by 0x82D528F: zend_execute_scripts (in /usr/bin/php5)
==12785== by 0x828B0A2: php_execute_script (in /usr/bin/php5)
==12785== by 0x8358710: main (in /usr/bin/php5)
==12785==
==12785== Conditional jump or move depends on uninitialised value(s)
==12785== at 0x82C80D2: zend_call_function (in /usr/bin/php5)
==12785== by 0x5507B1E: call_custom_method (phurple.c:730)
==12785== by 0x5509C55: zim_PhurpleClient_getInstance (client.c:407)
==12785== by 0x830F6C2: (within /usr/bin/php5)
==12785== by 0x82FAB4F: execute (in /usr/bin/php5)
==12785== by 0x82D528F: zend_execute_scripts (in /usr/bin/php5)
==12785== by 0x828B0A2: php_execute_script (in /usr/bin/php5)
==12785== by 0x8358710: main (in /usr/bin/php5)
==12785==
==12785== Use of uninitialised value of size 4
==12785== at 0x82C80D4: zend_call_function (in /usr/bin/php5)
==12785== by 0x5507B1E: call_custom_method (phurple.c:730)
==12785== by 0x5509C55: zim_PhurpleClient_getInstance (client.c:407)
==12785== by 0x830F6C2: (within /usr/bin/php5)
==12785== by 0x82FAB4F: execute (in /usr/bin/php5)
==12785== by 0x82D528F: zend_execute_scripts (in /usr/bin/php5)
==12785== by 0x828B0A2: php_execute_script (in /usr/bin/php5)
==12785== by 0x8358710: main (in /usr/bin/php5)
==12785==
==12785== Invalid read of size 1
==12785== at 0x82C80DA: zend_call_function (in /usr/bin/php5)
==12785== by 0x5507B1E: call_custom_method (phurple.c:730)
==12785== by 0x5509C55: zim_PhurpleClient_getInstance (client.c:407)
==12785== by 0x830F6C2: (within /usr/bin/php5)
==12785== by 0x82FAB4F: execute (in /usr/bin/php5)
==12785== by 0x82D528F: zend_execute_scripts (in /usr/bin/php5)
==12785== by 0x828B0A2: php_execute_script (in /usr/bin/php5)
==12785== by 0x8358710: main (in /usr/bin/php5)
==12785== Address 0x240c8b66 is not stack'd, malloc'd or (recently) free'd
==12785==
==12785== ERROR SUMMARY: 6 errors from 6 contexts (suppressed: 590 from 3)
==12785== malloc/free: in use at exit: 1,565,987 bytes in 25,045 blocks.
==12785== malloc/free: 29,159 allocs, 4,114 frees, 2,316,281 bytes allocated.
==12785== For counts of detected errors, rerun with: -v
==12785== searching for pointers to 25,045 not-freed blocks.
==12785== checked 2,760,828 bytes.
==12785==
==12785== LEAK SUMMARY:
==12785== definitely lost: 2,220 bytes in 12 blocks.
==12785== possibly lost: 3,056 bytes in 26 blocks.
==12785== still reachable: 1,560,711 bytes in 25,007 blocks.
==12785== suppressed: 0 bytes in 0 blocks.
==12785== Rerun with --leak-check=full to see details of leaked memory.
Aborted
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
It's the only project of it's kind .. I was able to build it and install it, it compiles fine but when I launch it I get a useless "Aborted" message .. I've seen on the developer's site ( which is only accessible via google cache ) to run it with valgrind to get any useful debugging information but it's not useful to ME .. and with the developer seemingly gone from the planet.. I'm not sure how to proceed..
I might just see if I can use perl instead.
But for what it's worth..
Platform: Debian Lenny
PHP: 5.2.6
Libpurple: I've tried the version that comes in the lenny repositories and I've downloaded & compiled the latest.. no change
The valgrind output is as such: