Title: Debugging mod_perl with gdb

Hey there -

I've successfully built apache/mod_perl with full debugging.  In addition, I'm running the whole setup through insure, a commercial memory leak/corruption tool. 

I've found a "write to a dangling pointer" when apache/mod_perl evaluates a <perl> section of the apache config file.

My question:  How do I go about attacking this problem?  I only know that I'm in a <Perl> section due to printing out some variables somewhere at ap_read_config() to invoke_cmd().  I guess I'm trying to find out what the perl script is doing when the memory corruption occurs.  Obviously if I could narrow the offending line of code (if possible) I might be able to better understand where the real bug is.

Shane


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, January 30, 2001 5:25 PM
To: AxKit Users Mailing List
Cc: [EMAIL PROTECTED]
Subject: (Correction) Re: Object->XML serialization [was Re: AxKit
Users?]


On Tue, 30 Jan 2001 [EMAIL PROTECTED] wrote:

> Castor (for Java, from www.exolab.com), uses an actual XML Schema for
> this. The advantage is that you can leverage off the fairly rich existing
> set of defined datatypes.

Sorry, it's www.exolab.org, don't you hate that?

--Chris

Reply via email to