ID: 38525
Updated by: [EMAIL PROTECTED]
Reported By: judas dot iscariote at gmail dot com
Status: Feedback
Bug Type: Reproducible crash
Operating System: linux
PHP Version: 5.2.0RC2
New Comment:
Christian, what version of SquirrelMail did you use?
Previous Comments:
------------------------------------------------------------------------
[2006-08-28 01:19:15] james at digisys dot net
FWIW, I'm seeing these same random seg faults with PHP 5.1.4 and
Squirrelmail 1.4.8 with an external IMAP server. Switching to the
development branch of Squirrelmail (1.5.2) cleared things up.
According to the Squirrelmail site the current stable releases (1.4.x)
do not work with PHP5, but the CVS version contains fixes which get it
working. Not that PHP should fault either way :)
------------------------------------------------------------------------
[2006-08-26 09:35:25] poeml at suse dot de
Hi,
on my machine it happens with IMAP server _on localhost_.
A how-to-reproduce procedure here is:
- open inbox in browser
- open first mail
- click "next mail"
- proceed with clicking "next mail" (thereby stepping
through mailbox mail by mail), until segfault happens.
Sometimes it takes a while, but il WILL happen sooner or
later.
- now, reloading will trigger the segfault again and again.
- viewing the next mail and going back shows the mail
without segfault. This also allows to continue to use
squirrelmail until the next segfault is encountered.
------------------------------------------------------------------------
[2006-08-23 23:06:11] [EMAIL PROTECTED]
Well, we still need a reproduce case..
------------------------------------------------------------------------
[2006-08-23 22:52:46] judas dot iscariote at gmail dot com
Tony :
Sadly I still get a segfault with a fresh CVS copy :-(
=32459== Process terminating with default action of signal 11
(SIGSEGV)
==32459== Bad permissions for mapped region at address 0x18
==32459== at 0x7BEC108: zend_mm_add_to_free_list (zend_alloc.c:465)
==32459== by 0x7BEDC23: _zend_mm_alloc_int (zend_alloc.c:1233)
==32459== by 0x7BEEB7D: _zend_mm_realloc_int (zend_alloc.c:1543)
==32459== by 0x7BEEE9D: _erealloc (zend_alloc.c:1633)
==32459== by 0x7B84771: php_var_serialize_string (var.c:538)
==32459== by 0x7B86607: php_var_serialize_intern (var.c:701)
==32459== by 0x7B88679: php_var_serialize_intern (var.c:827)
==32459== by 0x7B88679: php_var_serialize_intern (var.c:827)
==32459== by 0x7B89295: php_var_serialize (var.c:845)
==32459== by 0x7B00700: ps_srlzr_encode_php (session.c:479)
==32459== by 0x7B01268: php_session_encode (session.c:581)
==32459== by 0x7B01DDD: php_session_save_current_state
(session.c:860)
==32459==
==32459== ERROR SUMMARY: 26 errors from 8 contexts (suppressed: 149
from 1)
==32459== malloc/free: in use at exit: 21,210,557 bytes in 5,186
blocks.
==32459== malloc/free: 169,756 allocs, 164,570 frees, 216,925,409 bytes
allocated.
==32459== For counts of detected errors, rerun with: -v
==32459== searching for pointers to 5,186 not-freed blocks.
==32459== checked 19,498,696 bytes.
------------------------------------------------------------------------
[2006-08-23 13:04:57] [EMAIL PROTECTED]
This seems to be a duplicate of bug #38265.
Dmitry has committed a patch for it several minutes ago, please try the
next snapshot (or CVS sources).
Thanks.
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/38525
--
Edit this bug report at http://bugs.php.net/?id=38525&edit=1