ID: 42491 Updated by: [EMAIL PROTECTED] Reported By: bernard dot prevosto at ifremer dot fr Status: Open Bug Type: Reproducible crash Operating System: solaris 5.8 PHP Version: 5.2.4 New Comment:
Possibly related to bug #42597 Previous Comments: ------------------------------------------------------------------------ [2007-09-07 10:40:27] bernard dot prevosto at ifremer dot fr with gdb 6.6: gdb --arg sapi/cli/php -n -dshort_open_tag=0 -dsafe_mode=0 -dopen_basedir= -derror_reporting=E_ALL -dmemory_limit=-1 -ddetect_unicode=0 pear/install-pear-nozlib.phar GNU gdb 6.6 Copyright (C) 2006 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "sparc-sun-solaris2.8"... (gdb) run Starting program: /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/sapi/cli/php -n -dshort_open_tag=0 -dsafe_mode=0 -dopen_basedir= -derror_reporting=E_ALL -dmemory_limit=-1 -ddetect_unicode=0 pear/install-pear-nozlib.phar [New LWP 1] [New LWP 2] [New LWP 3] [New LWP 4] Program received signal SIGSEGV, Segmentation fault. 0x002723a0 in _zval_ptr_dtor (zval_ptr=0xffbedb4c) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend_execute_API.c:412 412 (*zval_ptr)->refcount--; (gdb) bt #0 0x002723a0 in _zval_ptr_dtor (zval_ptr=0xffbedb4c) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend_execute_API.c:412 #1 0x0029eb5c in zend_do_fcall_common_helper_SPEC (execute_data=0xffbee8a0) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend_execute.h:155 #2 0x0029cc60 in execute (op_array=0x5d2c80) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend_vm_execute.h:92 #3 0x00281010 in zend_execute_scripts (type=8, retval=<value optimized out>, file_count=3) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend.c:1134 #4 0x002411ec in php_execute_script (primary_file=0xffbeefcc) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/main/main.c:1982 #5 0x003152cc in main (argc=9, argv=0xffbef07c) at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/sapi/cli/php_cli.c:1140 (gdb) ------------------------------------------------------------------------ [2007-09-06 10:49:46] [EMAIL PROTECTED] The same way you get it with it: # wget http://pear.php.net/install-pear-nozlib.phar -nd -P pear/ # gdb --arg sapi/cli/php \ -n -dshort_open_tag=0 -dsafe_mode=0 -dopen_basedir= \ -derror_reporting=E_ALL -dmemory_limit=-1 -ddetect_unicode=0 \ pear/install-pear-nozlib.phar (gdb) run <crash> (gdb) bt ------------------------------------------------------------------------ [2007-09-05 13:46:04] [EMAIL PROTECTED] Then can you try getting some kind of backtrace without using --enable-debug ? That's better than nothing. ------------------------------------------------------------------------ [2007-09-05 13:31:38] [EMAIL PROTECTED] I can not reproduce this on linux (32bit). ------------------------------------------------------------------------ [2007-09-05 11:05:01] bernard dot prevosto at ifremer dot fr but with the PEAR generated with --enble-debug I've: louet>74% pear install HTTP_Request downloading HTTP_Request-1.4.1.tgz ... Starting to download HTTP_Request-1.4.1.tgz (15,927 bytes) ......done: 15,927 bytes Fatal error: Allowed memory size of 8388608 bytes exhausted at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend_opcode.c:48 (tried to allocate 98304 bytes) in /home/services/logiciels/compilateurs/php-5.2.4/lib/php/PEAR/PackageFile/v2/Validator.php on line 908 /home/services/logiciels/compilateurs/php-5.2.4/lib/php/PEAR/PackageFile/v2/Validator.php(908) : Fatal error - Allowed memory size of 8388608 bytes exhausted at /home1/balanec/perso/bpre/anonymous/apache/php-5.2.4/Zend/zend_opcode.c:48 (tried to allocate 98304 bytes) louet> ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/42491 -- Edit this bug report at http://bugs.php.net/?id=42491&edit=1