Edit report at http://bugs.php.net/bug.php?id=49893&edit=1
ID: 49893 Updated by: dmi...@php.net Reported by: greubel at nkey dot de Summary: Apache 2.2 Child crash while creating an instance of Zend_Mail_Storage_Pop3 -Status: Bogus +Status: Assigned Type: Bug Package: Reproducible crash -Operating System: Windows Vista +Operating System: * PHP Version: 5.3.0 -Assigned To: +Assigned To: dmitry New Comment: The bug occurs when exception is caught in destructor during another exception processing Reproduce code: --------------- <?php class A { function __destruct() { try { throw new Exception("2"); } catch (Exception $e) { echo $e->getMessage() . "\n"; } } } class B { function __construct() { $this->a = new A(); throw new Exception("1"); } } try { $b = new B(); } catch(Exception $e) { echo $e->getMessage() . "\n";; } ?> Expected result: ---------------- 2 1 Actual result: -------------- 2 valgrind -------- ==26823== Invalid read of size 4 ==26823== at 0x856480A: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER (zend.h:385) ==26823== by 0x84D7B98: execute (zend_vm_execute.h:104) ==26823== by 0x84ACA44: zend_execute_scripts (zend.c:1194) ==26823== by 0x844186E: php_execute_script (main.c:2260) ==26823== by 0x8572CDE: main (php_cli.c:1192) ==26823== Address 0x51f1428 is 8 bytes inside a block of size 20 free'd ==26823== at 0x4B8C90A: free (vg_replace_malloc.c:323) ==26823== by 0x848B079: _efree (zend_alloc.c:2348) ==26823== by 0x849C3E3: _zval_ptr_dtor (zend_execute_API.c:444) ==26823== by 0x84D8156: zend_leave_helper_SPEC (zend_vm_execute.h:226) ==26823== by 0x84DA521: ZEND_HANDLE_EXCEPTION_SPEC_HANDLER (zend_vm_execute.h:680) ==26823== by 0x84D7B98: execute (zend_vm_execute.h:104) ==26823== by 0x84ACA44: zend_execute_scripts (zend.c:1194) ==26823== by 0x844186E: php_execute_script (main.c:2260) ==26823== by 0x8572CDE: main (php_cli.c:1192) Previous Comments: ------------------------------------------------------------------------ [2009-10-20 20:57:38] paj...@php.net not a bug > bogus. ------------------------------------------------------------------------ [2009-10-20 20:13:15] greubel at nkey dot de Not reproducable ------------------------------------------------------------------------ [2009-10-20 20:11:41] greubel at nkey dot de Please close. I'm not able to reproduce the problem with a small script. I tried to strip down the code from ZF to provide the same functionality but provoke the bug. This seems to be not possible on this circumstances. This code works well: <?php class foo { private $sock; private $errno; private $error; public function __construct() { $this->sock = fsockopen('pop.gmx.net', 110, $this->errno, $this->error); $r = fgets($this->sock); echo "$r<br/>"; fputs($this->sock, "USER mike.greu...@gmx.de\r\n"); $r = fgets($this->sock); echo "$r<br/>"; fputs($this->sock, "PASS \r\n"); $r = fgets($this->sock); echo "$r<br/>"; fputs($this->sock, "QUIT\r\n"); $r = fgets($this->sock); echo "$r<br/>"; } public function close() { fclose($this->sock); $this->sock = null; } } $bar = new foo(); $bar->close(); ?> So please close. ------------------------------------------------------------------------ [2009-10-20 19:53:24] paj...@php.net We *still* need a way to reproduce your problem. that means a small script as described already in one of my comments. ------------------------------------------------------------------------ [2009-10-20 18:54:33] greubel at nkey dot de The access violation has now moved to another place: php5ts!gc_zobj_possible_root+57 038ffbc0 0273b270 038fe608 php5ts!gc_zval_possible_root+74 038ffbc0 0273b270 00000000 php5ts!ZEND_ASSIGN_SPEC_CV_VAR_HANDLER+69 0094fbc0 0273b270 0094fe3c php5ts!execute+2fb 039310b0 0273b200 00000000 php5ts!zend_execute_scripts+f6 00000008 0273b270 00000000 php5ts!php_execute_script+233 0094fe3c 0273b270 00000004 php5apache2_2!php_handler+5d0 0275ead8 00a24208 0275ead8 libhttpd!ap_run_handler+21 0275ead8 0275ead8 0275ead8 libhttpd!ap_invoke_handler+ae 00000000 02847fc0 0094ff00 libhttpd!ap_die+29e 0275ead8 00000000 021b51c0 libhttpd!ap_get_request_note+1ccc 02847fc0 02847fc0 02847fc0 libhttpd!ap_run_process_connection+21 02847fc0 00974f20 0094ff48 libhttpd!ap_process_connection+33 02847fc0 021c81a8 00000000 libhttpd!ap_regkey_value_remove+c7c 02847fb8 a899cc42 00000000 msvcrt!_endthreadex+44 0094ff94 76bdd0e9 02746848 msvcrt!_endthreadex+ce 02746848 0094ffd4 775919bb kernel32!BaseThreadInitThunk+e 02746848 7383fe36 00000000 ntdll!__RtlUserThreadStart+23 76b02670 02746848 00000000 ntdll!_RtlUserThreadStart+1b 76b02670 02746848 00000000 ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/bug.php?id=49893 -- Edit this bug report at http://bugs.php.net/bug.php?id=49893&edit=1