Hi, It works fine for me on Ubuntu 12.04 64-bit with my packages (taken from the Wt PPA). I've compiled with:
g++-4.4 -o rutger main.cpp -lwt -lwthttp -lboost_system It's using Boost 1.46.1, Asio 1.4.9 (bundled with Boost) and gcc 4.4.7-1ubuntu2 That being said, we have seen weird problems with C++ applications and libraries in the past in Debian and Ubuntu: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605402 https://bugs.launchpad.net/gcc-linaro/+bug/647597/ https://bugs.launchpad.net/ubuntu/+source/witty/+bug/886456 On Fri, Jun 1, 2012 at 4:07 PM, Rutger ter Borg <[email protected]> wrote: > > compiling with > > -DBOOST_ASIO_DISABLE_MOVE > > fixes it for me; so apparently the added move support in Asio may have > something to do with this. > > Regards, > > Rutger > > > > On 2012-06-01 13:43, Rutger ter Borg wrote: >> >> Hello Wim, >> >> thanks for checking. I rebuilt the debian wt packages, installed those, >> and removed all other boost packages from my system (I had some 1.42 and >> 1.46 lib files present). So now the system is pure boost-1.49 and wt-3.2.1. >> >> As I kind of expected (normally the linker warns when symbols do not >> match), this does not solve the situation. >> >> Asio did introduce some hefty changes in recent boost versions, so I am >> betting on the multiple io_service classes. >> >> I am able to reproduce this behaviour on two different debian sid >> systems. Would be good if someone with a similar setup is able to >> reproduce this, though. >> >> Cheers, >> >> Rutger >> >> >> >> >> >> On 2012-06-01 11:26, Wim Dumon wrote: >>> Rutger, >>> >>> That code works for me on Windows with boost 1.47 (assuming that wthttpd >>> config file contains docroot, http-address and http-port, otherwise an >>> uncaught exception is thrown in server_.setConfiguration()). >>> >>> It looks to me that your compilation is broken. The this pointer in your >>> topmost stack is 0x2a, which does not seem right. Make sure that both Wt >>> and your application use the same boost version and that you don't mix >>> up headers from different installed versions on your system. Compile >>> with VERBOSE=1 and double-check that the same boost version is used as >>> when you compiled Wt. >>> >>> My next suspect would be a bug in boost.asio when using multiple >>> io_service classes - but really check your compilation first. You can >>> also use the WIOService class as suggested before in this thread instead >>> of creating your own io_service class. >>> >>> And finally, it could also be a bug in Wt... ;-) >>> >>> Best regards, >>> Wim. >>> >>> 2012/5/31 Rutger ter Borg<[email protected] >>> <mailto:[email protected]>> >>> >>> >>> I had trouble reproducing the testcase on an other system; please >>> find attached a slightly modified main.cpp which guarantees a >>> segfault (on this system, at least). >>> >>> Thanks, >>> >>> Rutger >>> >>> >>> Backtrace: >>> >>> #0 0x0000000000412da3 in >>> boost::asio::detail::reactive___socket_service_base::destroy >>> (this=0x2a, impl=...) >>> at >>> >>> /usr/include/boost/asio/__detail/impl/reactive_socket___service_base.ipp:87 >>> #1 0x0000000000414cdb in >>> boost::asio::socket_acceptor___service<boost::asio::ip::tcp>:__:destroy >>> (this=0x2, impl=...) >>> at /usr/include/boost/asio/__socket_acceptor_service.hpp:__119 >>> #2 0x00000000004145f5 in >>> >>> boost::asio::basic_io_object<__boost::asio::socket_acceptor___service<boost::asio::ip::tcp>, >>> true>::~basic_io_object (this=0x6541a0, >>> >>> __in_chrg=<optimized out>) >>> at /usr/include/boost/asio/basic___io_object.hpp:196 >>> #3 0x00000000004132ea in >>> boost::asio::basic_socket___acceptor<boost::asio::ip::tcp, >>> boost::asio::socket_acceptor___service<boost::asio::ip::tcp> >>> >::~basic_socket_acceptor (this=0x6541a0, __in_chrg=<optimized out>) >>> at /usr/include/boost/asio/basic___socket_acceptor.hpp:54 >>> #4 0x00007ffff730cbcd in http::server::Server::Server (this=0x654050, >>> >>> config=..., wtServer=...) >>> at /home/pgquiles/wt/b/witty-3.2.__1/src/http/Server.C:65 >>> #5 0x00007ffff732171e in Wt::WServer::start (this=0x7fffffffe110) >>> at /home/pgquiles/wt/b/witty-3.2.__1/src/http/WServer.C:147 >>> #6 0x0000000000413436 in server::run (this=0x7fffffffe0e0) >>> at /home/rutger/.../main.cpp:17 >>> #7 0x000000000040f373 in main (argc=1, argv=0x7fffffffe298) >>> at /home/rutger/.../main.cpp:36 >>> >>> >>> >>> >>> ------------------------------------------------------------------------------ >>> Live Security Virtual Conference >>> Exclusive live event will cover all the ways today's security and >>> threat landscape has changed and how IT managers can respond. >>> Discussions >>> will include endpoint security, mobile security and the latest in >>> malware >>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>> _______________________________________________ >>> witty-interest mailing list >>> [email protected] >>> <mailto:[email protected]> >>> https://lists.sourceforge.net/lists/listinfo/witty-interest >>> >>> >>> >>> >>> ------------------------------------------------------------------------------ >>> Live Security Virtual Conference >>> Exclusive live event will cover all the ways today's security and >>> threat landscape has changed and how IT managers can respond. Discussions >>> will include endpoint security, mobile security and the latest in malware >>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>> >>> >>> >>> _______________________________________________ >>> witty-interest mailing list >>> [email protected] >>> https://lists.sourceforge.net/lists/listinfo/witty-interest >> >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > witty-interest mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/witty-interest -- Pau Garcia i Quiles http://www.elpauer.org (Due to my workload, I may need 10 days to answer) ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ witty-interest mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/witty-interest
