[PHP-BUG] Req #65577 [NEW]: session_start() file:line of call just like header()

2013-08-28 Thread ly...@php.net
From: ly...@php.net
Operating system: N/A
PHP version:  Irrelevant
Package:  Unknown/Other Function
Bug Type: Feature/Change Request
Bug description:session_start() file:line of call just like header()

Description:

When the first output happens, there is a record of that in PHP core.

Then, the error message for the header() that follows output can tell the
programmer exactly where in their mass of code the output started.

While not quite the same scope, in a large code base, even grepping for
session_start() is going to have a lot of hits.

Would it be hard to notate where session_start() got called, and include in
the error message...


-- 
Edit bug report at https://bugs.php.net/bug.php?id=65577&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=65577&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=65577&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=65577&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=65577&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=65577&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=65577&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=65577&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=65577&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=65577&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=65577&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=65577&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=65577&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=65577&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=65577&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=65577&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=65577&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=65577&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=65577&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=65577&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=65577&r=mysqlcfg



Req #60075 [Com]: using -t /myPath does not add /myPath to include_path

2012-03-13 Thread ly...@php.net
Edit report at https://bugs.php.net/bug.php?id=60075&edit=1

 ID: 60075
 Comment by:     ly...@php.net
 Reported by:paul dot a dot norman at gmail dot com
 Summary:using -t /myPath does not add /myPath to
 include_path
 Status: Assigned
 Type:   Feature/Change Request
 Package:Built-in web server
 Operating System:   Win32
 PHP Version:5.4.0beta1
 Assigned To:moriyoshi
 Block user comment: N
 Private report: N

 New Comment:

You don't need a new flag.

php -B ini_set('include_path', get_include_path() . PATH_SEPARATOR . '/myPath')

NOTE:
Never used -B, so maybe you need "" around it or whatever, but you get the 
point.


Previous Comments:

[2012-03-08 05:09:14] reeze dot xia at gmail dot com

Hi, Stuart

I think add doc-root to include_path may impact the behavior of your 
application, because this changes the include path of your application too. 
maybe some application didn't add docroot to it's include_path , but the server 
add it. (include require autoload etc.).

if you just want to set router script easily, I don't think it deserve the 
change.  And this behavior different with the way we use cli tools:
ie:
$ ls -l file.php
just print the information of  $PWD's file.php but not some other folder's 
file.php. This is confusing

If we want to add include path maybe a new option like -I /new/include/path 
maybe useful.

so -1 for me ;-)

Thanks.
reeze


[2012-03-04 18:04:05] stuart at 3ft9 dot com

This is my first patch so I may have missed something. This patch simply 
prepends 
the document root to include_path for each request.


[2011-10-17 07:59:21] paul dot a dot norman at gmail dot com

Description:

If the php internal server is launched using php -S localhost:8001 -t /myPath 
server_process.php

and server_process.php is in /myPath the following would result

Warning: Unknown: failed to open stream: No such file or directory in Unknown 
on 
line 0

Fatal error: Unknown: Failed opening required 'server_process.php' 
(include_path='.;C:\php\pear') in Unknown on line 0

Obviously using: ... -t /myPath /myPath/server_process.php
works as expected, 

but it would seem intuitive that when using: 

php -S localhost:8001 -t something

that "something" would be automatically added to the include_path ?

P.S. the php internal server is a brilliant addition, facilitates making 
virtual 
desktop applications in the browser a cinch! Allows the leveraging of browser 
technology jQuery and all the rest with php on the client -- very powerful!!!

Add in http://gluescript.sourceforge.net/ http://gtk.php.net/ or simillar for 
local wxWdiget dialogues called as necessary from php 
http://php.net/manual/en/function.system.php and an almost complete powerful  
solution is available.

Paul








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=60075&edit=1


[PHP-BUG] Bug #65193 [NEW]: openssl_private_encrypt OAEP only works AFTER PKCS1

2013-07-03 Thread ly...@php.net
From: ly...@php.net
Operating system: CentOS 2.6.18
PHP version:  5.3.26
Package:  OpenSSL related
Bug Type: Bug
Bug description:openssl_private_encrypt OAEP only works AFTER PKCS1

Description:

A call to openssl_private_encrypt(..., OPENSSL_PKCS1_OAEP_PADDING) fails
unless you call it AFTER openssl_private_encrypt(...,
OPENSSL_PKCS1_PADDING)


Test script:
---
$private_key_text = file_get_contents('private.pem');

openssl_private_encrypt($decrypted_message, $encrypted_message,
$private_key_text, OPENSSL_PKCS1_OAEP_PADDING);
echo "PKCS1_OAEP fails:\n";
var_dump(base64_encode($encrypted_message));
echo "\n";


openssl_private_encrypt($decrypted_message, $encrypted_message,
$private_key_text, OPENSSL_PKCS1_PADDING);
echo "PKCS1 works:\n";
var_dump(base64_encode($encrypted_message));
echo "\n";


openssl_private_encrypt($decrypted_message, $encrypted_message,
$private_key_text, OPENSSL_PKCS1_OAEP_PADDING);
echo "PKCS1_OAEP works only AFTER PKCS1:\n";
var_dump(base64_encode($encrypted_message));
echo "\n";



Expected result:

All three outputs the same.

Actual result:
--
First output is blank string.

-- 
Edit bug report at https://bugs.php.net/bug.php?id=65193&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=65193&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=65193&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=65193&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=65193&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=65193&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=65193&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=65193&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=65193&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=65193&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=65193&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=65193&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=65193&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=65193&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=65193&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=65193&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=65193&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=65193&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=65193&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=65193&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=65193&r=mysqlcfg



Bug #65193 [Opn]: openssl_private_encrypt OAEP only works AFTER PKCS1

2013-07-03 Thread ly...@php.net
Edit report at https://bugs.php.net/bug.php?id=65193&edit=1

 ID: 65193
 User updated by:    ly...@php.net
 Reported by:    ly...@php.net
 Summary:openssl_private_encrypt OAEP only works AFTER PKCS1
 Status: Open
 Type:   Bug
 Package:OpenSSL related
 Operating System:   CentOS 2.6.18
-PHP Version:5.3.26
+PHP Version:5.4.11
 Block user comment: N
 Private report: N

 New Comment:

The PHP Version popup in report form was in a time warp... Corrected here.

OpenSSL version: 0.9.8b

Actual output:

PKCS1_OAEP fails:
string(0) ""

PKCS1 works:
string(172) 
"gVJcDQJnKJG7PX3+axZMyjph5xi3TFMLWXY2OLD4d62YYhlAmCUnr+WQP/F6//ykx3L/rXS7zfjXFPoyzn5v7dwysM107fS0tXwzngZ1fRjH5iU+1Dv4TJf4dXRZXzYKClDSSiQ0ZrmoGhVo5wx3PY61mEkBLNbS5IvZ75rCLSo="

PKCS1_OAEP works only AFTER PKCS1:
string(172) 
"gVJcDQJnKJG7PX3+axZMyjph5xi3TFMLWXY2OLD4d62YYhlAmCUnr+WQP/F6//ykx3L/rXS7zfjXFPoyzn5v7dwysM107fS0tXwzngZ1fRjH5iU+1Dv4TJf4dXRZXzYKClDSSiQ0ZrmoGhVo5wx3PY61mEkBLNbS5IvZ75rCLSo="


Previous Comments:
----
[2013-07-03 15:04:47] ly...@php.net

Description:

A call to openssl_private_encrypt(..., OPENSSL_PKCS1_OAEP_PADDING) fails
unless you call it AFTER openssl_private_encrypt(..., OPENSSL_PKCS1_PADDING)


Test script:
---
$private_key_text = file_get_contents('private.pem');

openssl_private_encrypt($decrypted_message, $encrypted_message, 
$private_key_text, OPENSSL_PKCS1_OAEP_PADDING);
echo "PKCS1_OAEP fails:\n";
var_dump(base64_encode($encrypted_message));
echo "\n";


openssl_private_encrypt($decrypted_message, $encrypted_message, 
$private_key_text, OPENSSL_PKCS1_PADDING);
echo "PKCS1 works:\n";
var_dump(base64_encode($encrypted_message));
echo "\n";


openssl_private_encrypt($decrypted_message, $encrypted_message, 
$private_key_text, OPENSSL_PKCS1_OAEP_PADDING);
echo "PKCS1_OAEP works only AFTER PKCS1:\n";
var_dump(base64_encode($encrypted_message));
echo "\n";



Expected result:

All three outputs the same.

Actual result:
--
First output is blank string.






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65193&edit=1


[PHP-BUG] Bug #61947 [NEW]: curl Segmentation fault

2012-05-04 Thread ly...@php.net
From: 
Operating system: Linux
PHP version:  Irrelevant
Package:  cURL related
Bug Type: Bug
Bug description:curl Segmentation fault

Description:

libcurl/7.15.5 OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.5

It's PHP 5.1.3, so you may not care, but that's what was handed to me on
the GoDaddy server by my client, and I hesitate to upgrade until we take
the issue up with GoDaddy first.

In the meantime, since I have a stacktrace with at least some debugging
symbols in it, and it specifically mentions Curl_cookie_cleanup, I thought
it might be something useful, even if it's an older PHP version.

curl with CURLOPT_COOKIEJAR and CURLOPT_COOKIE file.

I'm using curl_multi functions, so I guess it could be a factor.

I'm hitting the same URL with different cookie files and log files, create
with tempnam.

I would assume that using two curl handles with the same cookie file and/or
log file would be a Bad Idea.

I have tail all the /tmp/curllog* files.  Some are just empty.  Others have
nothing interesting at the end.

I suppose the empty one could be the ones that correspond to the segfaults,
but don't quite see how that info would be useful... Unless it narrows down
a portion of the code.


Test script:
---
Could be this one:
curl_setopt($curl, CURLOPT_RETURNTRANSFER, TRUE) or
($errors[] = 'RETURNTRANSFER');
curl_setopt($curl, CURLOPT_FOLLOWLOCATION, TRUE) or
($errors[] = 'FOLLOWLOCATION');
curl_setopt($curl, CURLOPT_HEADER, FALSE) or ($errors[] =
'HEADER');
curl_setopt($curl, CURLOPT_HTTPGET, TRUE) or ($errors[] =
'HTTPGET');
curl_setopt($curl, CURLOPT_TIMEOUT, 60) or ($errors[] =
'TIMEOUT');
curl_setopt($curl, CURLOPT_COOKIEFILE, $depart_cookies) or
($errors[] = 'COOKIEFILE');
curl_setopt($curl, CURLOPT_COOKIEJAR, dirname(__FILE__) .
"/$direction.txt") or ($errors[] = 'COOKIEJAR');
curl_setopt($curl, CURLOPT_VERBOSE, TRUE) or ($errors[] =
'VERBOSE');
$log = fopen($curllog, 'a+') or ($errors[] = "FOPEN
$curllog");
curl_setopt($curl, CURLOPT_STDERR, $log) or ($errors[] =
'STDERR');

Or it could be that one above with the following changes to the $curl
handle:
curl_setopt($curl, CURLOPT_POST, TRUE);
curl_setopt($curl, CURLOPT_POSTFIELDS, $post_data);

I will try to error_log something in between to narrow it down.


Expected result:

PHP to not crash.

Actual result:
--
*** glibc detected *** /usr/sbin/httpd: free(): corrupted unsorted chunks:
0xb87a8508 ***
=== Backtrace: =
/lib/libc.so.6[0xb7bbd5a5]
/lib/libc.so.6(cfree+0x59)[0xb7bbd9e9]
/usr/lib/libcurl.so.3[0xb72e37ae]
/usr/lib/libcurl.so.3(Curl_cookie_cleanup+0x3a)[0xb72e391a]
/usr/lib/libcurl.so.3(Curl_close+0x127)[0xb72f44e7]
/usr/lib/libcurl.so.3(curl_easy_cleanup+0x21)[0xb72ff421]
/usr/lib/httpd/modules/libphp5.so[0xb7478e77]
/usr/lib/httpd/modules/libphp5.so(list_entry_destructor+0xa3)[0xb75dd2c3]
/usr/lib/httpd/modules/libphp5.so(zend_hash_del_key_or_index+0x221)[0xb75dc751]
/usr/lib/httpd/modules/libphp5.so(_zend_list_delete+0x8a)[0xb75dd55a]
/usr/lib/httpd/modules/libphp5.so(_zval_dtor_func+0x9a)[0xb75cfefa]
/usr/lib/httpd/modules/libphp5.so(_zval_ptr_dtor+0x78)[0xb75c4598]
/usr/lib/httpd/modules/libphp5.so(zend_hash_destroy+0x47)[0xb75da697]
/usr/lib/httpd/modules/libphp5.so(_zval_dtor_func+0x50)[0xb75cfeb0]
/usr/lib/httpd/modules/libphp5.so(_zval_ptr_dtor+0x78)[0xb75c4598]
/usr/lib/httpd/modules/libphp5.so(zend_hash_destroy+0x47)[0xb75da697]
/usr/lib/httpd/modules/libphp5.so(_zval_dtor_func+0x50)[0xb75cfeb0]
/usr/lib/httpd/modules/libphp5.so(_zval_ptr_dtor+0x78)[0xb75c4598]
/usr/lib/httpd/modules/libphp5.so[0xb75da339]
/usr/lib/httpd/modules/libphp5.so(zend_hash_graceful_reverse_destroy+0x27)[0xb75da5b7]
/usr/lib/httpd/modules/libphp5.so(shutdown_executor+0x485)[0xb75c4d35]
/usr/lib/httpd/modules/libphp5.so(zend_deactivate+0xb3)[0xb75d07b3]
/usr/lib/httpd/modules/libphp5.so(php_request_shutdown+0x243)[0xb758d1e3]
/usr/lib/httpd/modules/libphp5.so[0xb76532dc]
/usr/sbin/httpd(ap_run_handler+0x6d)[0xb7f47a4d]
/usr/sbin/httpd(ap_invoke_handler+0x73)[0xb7f4b413]
/usr/sbin/httpd(ap_process_request+0x1ae)[0xb7f5752e]
/usr/sbin/httpd[0xb7f542cf]
/usr/sbin/httpd(ap_run_process_connection+0x6d)[0xb7f4f94d]
/usr/sbin/httpd(ap_process_connection+0x4c)[0xb7f4fa4c]
/usr/sbin/httpd[0xb7f5be14]
/usr/sbin/httpd[0xb7f5c121]
/usr/sbin/httpd(ap_mpm_run+0x913)[0xb7f5cb23]
/usr/sbin/httpd(main+0x8c7)[0xb7f33157]
/lib/libc.so.6(__libc_start_main+0xdc)[0xb7b69e9c]
/usr/sbin/httpd[0xb7f32221]
=== Memory map: 
b3f78000-b3ff6000 rw-s  00:86 1055943031 
b3ff6000-b4037000 rw-p b3ff6000 00:00 0 
b4038000-b40ba000 rw-p b4038000 00:00 0 
b40bb000-b413d000 rw-p b40bb000 00:00 0 
b413e000-b41c rw-p b413e000 00:00 0 
b41c1000-b4243000 rw-p b41c1000 00:00 0 

Bug #61947 [Opn]: curl Segmentation fault

2012-05-04 Thread ly...@php.net
Edit report at https://bugs.php.net/bug.php?id=61947&edit=1

 ID: 61947
 User updated by:    ly...@php.net
 Reported by:    ly...@php.net
 Summary:curl Segmentation fault
 Status: Open
 Type:   Bug
 Package:cURL related
 Operating System:   Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

It is definitely the second one, with the POST that is crashing.

Repeatable.


Previous Comments:

[2012-05-05 05:00:00] ceo at l-i-e dot com

I've got 9 more of these backtraces if you want them.

And about 8 of these with no backtrace or anything at all:
[Fri May 04 10:59:37 2012] [notice] child pid 24011 exit signal Segmentation 
fault (11)
[Fri May 04 11:10:00 2012] [notice] child pid 24050 exit signal Segmentation 
fault (11)
[Fri May 04 11:10:03 2012] [notice] child pid 24044 exit signal Segmentation 
fault (11)
[Fri May 04 18:23:31 2012] [notice] child pid 27659 exit signal Segmentation 
fault (11)
[Fri May 04 19:15:25 2012] [notice] child pid 27830 exit signal Segmentation 
fault (11)
[Fri May 04 19:15:34 2012] [notice] child pid 27832 exit signal Segmentation 
fault (11)
[Fri May 04 19:17:53 2012] [notice] child pid 26396 exit signal Segmentation 
fault (11)
[Fri May 04 20:17:11 2012] [notice] child pid 28059 exit signal Segmentation 
fault (11)

Those look more like apache crashes, I presume... PHP may have been the root 
cause, however, if something is scrambling RAM.


[2012-05-05 04:52:36] ly...@php.net

Description:

libcurl/7.15.5 OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.5

It's PHP 5.1.3, so you may not care, but that's what was handed to me on the 
GoDaddy server by my client, and I hesitate to upgrade until we take the issue 
up with GoDaddy first.

In the meantime, since I have a stacktrace with at least some debugging symbols 
in it, and it specifically mentions Curl_cookie_cleanup, I thought it might be 
something useful, even if it's an older PHP version.

curl with CURLOPT_COOKIEJAR and CURLOPT_COOKIE file.

I'm using curl_multi functions, so I guess it could be a factor.

I'm hitting the same URL with different cookie files and log files, create with 
tempnam.

I would assume that using two curl handles with the same cookie file and/or log 
file would be a Bad Idea.

I have tail all the /tmp/curllog* files.  Some are just empty.  Others have 
nothing interesting at the end.

I suppose the empty one could be the ones that correspond to the segfaults, but 
don't quite see how that info would be useful... Unless it narrows down a 
portion of the code.


Test script:
---
Could be this one:
curl_setopt($curl, CURLOPT_RETURNTRANSFER, TRUE) or ($errors[] 
= 'RETURNTRANSFER');
curl_setopt($curl, CURLOPT_FOLLOWLOCATION, TRUE) or ($errors[] 
= 'FOLLOWLOCATION');
curl_setopt($curl, CURLOPT_HEADER, FALSE) or ($errors[] = 
'HEADER');
curl_setopt($curl, CURLOPT_HTTPGET, TRUE) or ($errors[] = 
'HTTPGET');
curl_setopt($curl, CURLOPT_TIMEOUT, 60) or ($errors[] = 
'TIMEOUT');
curl_setopt($curl, CURLOPT_COOKIEFILE, $depart_cookies) or 
($errors[] = 'COOKIEFILE');
curl_setopt($curl, CURLOPT_COOKIEJAR, dirname(__FILE__) . 
"/$direction.txt") or ($errors[] = 'COOKIEJAR');
curl_setopt($curl, CURLOPT_VERBOSE, TRUE) or ($errors[] = 
'VERBOSE');
$log = fopen($curllog, 'a+') or ($errors[] = "FOPEN $curllog");
curl_setopt($curl, CURLOPT_STDERR, $log) or ($errors[] = 
'STDERR');

Or it could be that one above with the following changes to the $curl handle:
curl_setopt($curl, CURLOPT_POST, TRUE);
curl_setopt($curl, CURLOPT_POSTFIELDS, $post_data);

I will try to error_log something in between to narrow it down.


Expected result:

PHP to not crash.

Actual result:
--
*** glibc detected *** /usr/sbin/httpd: free(): corrupted unsorted chunks: 
0xb87a8508 ***
=== Backtrace: =
/lib/libc.so.6[0xb7bbd5a5]
/lib/libc.so.6(cfree+0x59)[0xb7bbd9e9]
/usr/lib/libcurl.so.3[0xb72e37ae]
/usr/lib/libcurl.so.3(Curl_cookie_cleanup+0x3a)[0xb72e391a]
/usr/lib/libcurl.so.3(Curl_close+0x127)[0xb72f44e7]
/usr/lib/libcurl.so.3(curl_easy_cleanup+0x21)[0xb72ff421]
/usr/lib/httpd/modules/libphp5.so[0xb7478e77]
/usr/lib/httpd/modules/libphp5.so(list_entry_destructor+0xa3)[0xb75dd2c3]
/usr/lib/httpd/modules/libphp5.so(zend_hash_del_key_or_index+0x221)[0xb75dc751]
/usr/lib/httpd/modules/libphp5.so(_zend_list_delete+0x8a)[0xb75dd55a]
/usr/lib/httpd/modules/libphp5.so(_zval_dtor_func+0x9a)[0xb7

Bug #61947 [Com]: curl Segmentation fault

2012-05-07 Thread ly...@php.net
Edit report at https://bugs.php.net/bug.php?id=61947&edit=1

 ID: 61947
 Comment by:     ly...@php.net
 Reported by:    ly...@php.net
 Summary:curl Segmentation fault
 Status: Feedback
 Type:   Bug
 Package:cURL related
 Operating System:   Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

I have reproduced this on an RHEL5.7 box with PHP 5.3.3

Still not supported, but getting closer...


Previous Comments:

[2012-05-05 15:28:01] ras...@php.net

There were known libcurl+curl_multi crashes in curl 7.15-7.19. See bug #47773


[2012-05-05 11:16:58] paj...@php.net

Please do it already, the shorter script we get, the easier it will be to work 
on 
a fix.


[2012-05-05 11:12:57] ly...@php.net

If it helps, I now have a script that crashes every time, with a similar 
backtrace.

Not a short script, mind you, but the libcurl bits aren't all that long either.

If I hear back from somebody that wants to look at it, I'll strip out the 
non-curl parts, see if it crashes, and put here.

Might just do that anyway, since I'm kind of stalled right now...


[2012-05-05 05:39:24] ly...@php.net

It is definitely the second one, with the POST that is crashing.

Repeatable.


[2012-05-05 05:00:00] ceo at l-i-e dot com

I've got 9 more of these backtraces if you want them.

And about 8 of these with no backtrace or anything at all:
[Fri May 04 10:59:37 2012] [notice] child pid 24011 exit signal Segmentation 
fault (11)
[Fri May 04 11:10:00 2012] [notice] child pid 24050 exit signal Segmentation 
fault (11)
[Fri May 04 11:10:03 2012] [notice] child pid 24044 exit signal Segmentation 
fault (11)
[Fri May 04 18:23:31 2012] [notice] child pid 27659 exit signal Segmentation 
fault (11)
[Fri May 04 19:15:25 2012] [notice] child pid 27830 exit signal Segmentation 
fault (11)
[Fri May 04 19:15:34 2012] [notice] child pid 27832 exit signal Segmentation 
fault (11)
[Fri May 04 19:17:53 2012] [notice] child pid 26396 exit signal Segmentation 
fault (11)
[Fri May 04 20:17:11 2012] [notice] child pid 28059 exit signal Segmentation 
fault (11)

Those look more like apache crashes, I presume... PHP may have been the root 
cause, however, if something is scrambling RAM.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61947


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61947&edit=1


Bug #61947 [Com]: curl Segmentation fault

2012-05-07 Thread ly...@php.net
Edit report at https://bugs.php.net/bug.php?id=61947&edit=1

 ID: 61947
 Comment by:     ly...@php.net
 Reported by:    ly...@php.net
 Summary:curl Segmentation fault
 Status: Feedback
 Type:   Bug
 Package:cURL related
 Operating System:   Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

Short test script, for what its' worth:

http://www.6112northwolcott.com/curl_bug/test.phps

libcurl is 7.15.5 on both boxes.

I'll close this out.

SORRY!

I did search, but missed the other bug somehow.


Previous Comments:

[2012-05-07 16:05:04] ras...@php.net

The PHP version is less important than the libcurl version on this one.


[2012-05-07 16:03:19] ly...@php.net

I have reproduced this on an RHEL5.7 box with PHP 5.3.3

Still not supported, but getting closer...


[2012-05-05 15:28:01] ras...@php.net

There were known libcurl+curl_multi crashes in curl 7.15-7.19. See bug #47773


[2012-05-05 11:16:58] paj...@php.net

Please do it already, the shorter script we get, the easier it will be to work 
on 
a fix.


[2012-05-05 11:12:57] ly...@php.net

If it helps, I now have a script that crashes every time, with a similar 
backtrace.

Not a short script, mind you, but the libcurl bits aren't all that long either.

If I hear back from somebody that wants to look at it, I'll strip out the 
non-curl parts, see if it crashes, and put here.

Might just do that anyway, since I'm kind of stalled right now...




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61947


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61947&edit=1


Bug #61947 [Fbk->Csd]: curl Segmentation fault

2012-05-07 Thread ly...@php.net
Edit report at https://bugs.php.net/bug.php?id=61947&edit=1

 ID: 61947
 User updated by:    ly...@php.net
 Reported by:    ly...@php.net
 Summary:curl Segmentation fault
-Status: Feedback
+Status: Closed
 Type:   Bug
 Package:cURL related
 Operating System:   Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

libcurl 7.15.5 known non-php issue

https://bugs.php.net/bug.php?id=47773


Previous Comments:

[2012-05-07 16:06:59] ly...@php.net

Short test script, for what its' worth:

http://www.6112northwolcott.com/curl_bug/test.phps

libcurl is 7.15.5 on both boxes.

I'll close this out.

SORRY!

I did search, but missed the other bug somehow.


[2012-05-07 16:05:04] ras...@php.net

The PHP version is less important than the libcurl version on this one.


[2012-05-07 16:03:19] ly...@php.net

I have reproduced this on an RHEL5.7 box with PHP 5.3.3

Still not supported, but getting closer...


[2012-05-05 15:28:01] ras...@php.net

There were known libcurl+curl_multi crashes in curl 7.15-7.19. See bug #47773


[2012-05-05 11:16:58] paj...@php.net

Please do it already, the shorter script we get, the easier it will be to work 
on 
a fix.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=61947


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61947&edit=1