Bugs item #460338, was opened at 2001-09-11 01:18
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=403611&aid=460338&group_id=31885
Category: None
Group: None
>Status: Closed
>Resolution: Fixed
Priority: 1
Submitted By: Sebastien Delaire (pes)
>Assigned to: Richard Archer (richardarcher)
Summary: Session Expiration (Billionth second bug
Initial Comment:
Hi,
there's a problem in the file ct_shm.inc when using
sessions (this bug is probably here in other session
containers)
If the current date is below the billionth (1 000 000
000) second, and the expiration date is upper.
The garbage collector thinks that it should remove the
session because the comparison used is a string cmp ..
(not an integer one)
A patch could be to replace the strcmp on these lines :
67 sas 1.2 $dat =
explode(";", $val);
68 if($name ==
$dat[1] && strcmp($dat[3], $cmp) < 0)
by a $dat[3] < $cmp .
This bug will not exist for a long time, but will occur
each billion seconds :)
----------------------------------------------------------------------
>Comment By: Richard Archer (richardarcher)
Date: 2002-08-10 10:56
Message:
Logged In: YES
user_id=279311
OK, fixed that, even though it will never happen again --
the integer value will wrap to be negative before an extra
digit is added.
Should be a performance improvement doing an integer
comparison rather than a strcmp also. Woot!
----------------------------------------------------------------------
Comment By: nathan hruby (nhruby)
Date: 2002-07-02 07:43
Message:
Logged In: YES
user_id=19736
Hmmm.. will look into this. not a really high priority ,
but I can't fathom why it's doing what it's doing
Changing Priority to Lowest - 1 we have soem time before we
need to deal with thsi again :)
----------------------------------------------------------------------
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=403611&aid=460338&group_id=31885
|