ID: 44913 Updated by: [EMAIL PROTECTED] Reported By: dz at bitxtender dot com -Status: Open +Status: Assigned Bug Type: Reproducible crash Operating System: irrelevant PHP Version: 5.2.6 Assigned To: dmitry New Comment:
It does not crash for me but PHP claims that array(1, 2) is not array here. [EMAIL PROTECTED] ~ % USE_ZEND_ALLOC=0 valgrind php -n crash.php ==9030== Memcheck, a memory error detector. ==9030== Copyright (C) 2002-2007, and GNU GPL'd, by Julian Seward et al. ==9030== Using LibVEX rev 1804, a library for dynamic binary translation. ==9030== Copyright (C) 2004-2007, and GNU GPL'd, by OpenWorks LLP. ==9030== Using valgrind-3.3.0-Debian, a dynamic binary instrumentation framework. ==9030== Copyright (C) 2000-2007, and GNU GPL'd, by Julian Seward et al. ==9030== For more details, rerun with: -v ==9030== ==9030== Invalid read of size 4 ==9030== at 0x844F126: zend_pzval_unlock_func (zend_execute.c:69) ==9030== by 0x8452225: _get_zval_ptr_var (zend_execute.c:172) ==9030== by 0x8467765: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8008) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e70 is 8 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid write of size 4 ==9030== at 0x844F12F: zend_pzval_unlock_func (zend_execute.c:69) ==9030== by 0x8452225: _get_zval_ptr_var (zend_execute.c:172) ==9030== by 0x8467765: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8008) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e70 is 8 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x844F135: zend_pzval_unlock_func (zend_execute.c:69) ==9030== by 0x8452225: _get_zval_ptr_var (zend_execute.c:172) ==9030== by 0x8467765: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8008) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e70 is 8 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 1 ==9030== at 0x844F169: zend_pzval_unlock_func (zend_execute.c:76) ==9030== by 0x8452225: _get_zval_ptr_var (zend_execute.c:172) ==9030== by 0x8467765: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8008) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e75 is 13 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x8467786: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8018) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e70 is 8 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid write of size 4 ==9030== at 0x846778C: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8018) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e70 is 8 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 1 ==9030== at 0x843E2D9: zend_iterator_unwrap (zend_iterators.c:79) ==9030== by 0x84677A7: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8020) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e74 is 12 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 1 ==9030== at 0x843E39B: zend_iterator_unwrap (zend_iterators.c:91) ==9030== by 0x84677A7: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8020) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e74 is 12 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x843E3A6: zend_iterator_unwrap (zend_iterators.c:91) ==9030== by 0x84677A7: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8020) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e68 is 0 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 1 ==9030== at 0x8467A61: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8054) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e74 is 12 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x8467A6C: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8054) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02e68 is 0 bytes inside a block of size 16 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x84131E8: safe_free_zval_ptr_rel (zend_execute.h:70) ==9030== by 0x8413127: _zval_ptr_dtor (zend_execute_API.c:415) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x8432996: zend_hash_set_pointer (zend_hash.c:1037) ==9030== by 0x8467AD0: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8055) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02c98 is 16 bytes inside a block of size 44 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x8421B1B: _zval_dtor_func (zend_variables.c:44) ==9030== by 0x8412E5C: _zval_dtor (zend_variables.h:35) ==9030== by 0x84130FC: _zval_ptr_dtor (zend_execute_API.c:414) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x8432CE3: zend_hash_get_current_data_ex (zend_hash.c:1158) ==9030== by 0x8467AEA: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8056) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02c98 is 16 bytes inside a block of size 44 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x8421B1B: _zval_dtor_func (zend_variables.c:44) ==9030== by 0x8412E5C: _zval_dtor (zend_variables.h:35) ==9030== by 0x84130FC: _zval_ptr_dtor (zend_execute_API.c:414) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x842FCBD: _zend_is_inconsistent (zend_hash.c:53) ==9030== by 0x8432D09: zend_hash_get_current_data_ex (zend_hash.c:1160) ==9030== by 0x8467AEA: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8056) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02cb0 is 40 bytes inside a block of size 44 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x8421B1B: _zval_dtor_func (zend_variables.c:44) ==9030== by 0x8412E5C: _zval_dtor (zend_variables.h:35) ==9030== by 0x84130FC: _zval_ptr_dtor (zend_execute_API.c:414) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== ==9030== Invalid read of size 4 ==9030== at 0x842FCCB: _zend_is_inconsistent (zend_hash.c:56) ==9030== by 0x8432D09: zend_hash_get_current_data_ex (zend_hash.c:1160) ==9030== by 0x8467AEA: ZEND_FE_FETCH_SPEC_VAR_HANDLER (zend_vm_execute.h:8056) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x8424F72: zend_execute_scripts (zend.c:1134) ==9030== by 0x83BFDE9: php_execute_script (main.c:2005) ==9030== by 0x84AD23C: main (php_cli.c:1140) ==9030== Address 0x4d02cb0 is 40 bytes inside a block of size 44 free'd ==9030== at 0x402265C: free (vg_replace_malloc.c:323) ==9030== by 0x840104A: _efree (zend_alloc.c:2290) ==9030== by 0x8421B1B: _zval_dtor_func (zend_variables.c:44) ==9030== by 0x8412E5C: _zval_dtor (zend_variables.h:35) ==9030== by 0x84130FC: _zval_ptr_dtor (zend_execute_API.c:414) ==9030== by 0x8450153: zend_switch_free (zend_execute.c:372) ==9030== by 0x84518D4: zend_brk_cont (zend_execute.c:1328) ==9030== by 0x845195D: ZEND_CONT_SPEC_CONST_HANDLER (zend_vm_execute.h:825) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) ==9030== by 0x844DB22: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:234) ==9030== by 0x8454339: ZEND_DO_FCALL_SPEC_CONST_HANDLER (zend_vm_execute.h:1679) ==9030== by 0x844D36F: execute (zend_vm_execute.h:92) /usr/local/src/php/php-5.2/Zend/zend_hash.c(1160) : ht=0x4d02c88 is already destroyed ==9030== ==9030== ERROR SUMMARY: 15 errors from 15 contexts (suppressed: 71 from 1) ==9030== malloc/free: in use at exit: 23,229 bytes in 1,518 blocks. ==9030== malloc/free: 22,297 allocs, 20,779 frees, 2,113,468 bytes allocated. ==9030== For counts of detected errors, rerun with: -v ==9030== searching for pointers to 1,518 not-freed blocks. ==9030== checked 1,224,640 bytes. ==9030== ==9030== LEAK SUMMARY: ==9030== definitely lost: 801 bytes in 12 blocks. ==9030== possibly lost: 0 bytes in 0 blocks. ==9030== still reachable: 22,428 bytes in 1,506 blocks. ==9030== suppressed: 0 bytes in 0 blocks. ==9030== Rerun with --leak-check=full to see details of leaked memory. Previous Comments: ------------------------------------------------------------------------ [2008-05-05 08:55:42] dz at bitxtender dot com Description: ------------ The code below crashes reproducibly on different PHP versions and different OS (tried OS X, Linux, Windows) including 5.2.6 and 5.3-dev I am suspecting a problem in the bytecode generation, as the crash does not occur if a) XDebug is enabled or b) any statement is put right before the return;, like $foo = 'bar'; c) the return; is not there at all And it only happens in this foreach() / for() combination... two foreach()es, two for()s or a foreach() in a for() works just fine. Also note that on many PHP versions, no segfault will occur right away with just array(1) in the foreach - instead, warnings will pop up saying "invalid argument supplied for foreach()" for this line. Other code may then crash much later due to memory corruption. In more complex test cases, we get random memory output on screen when var_dump()ing variables, or strange undefined index warnings for variables that then, suddenly, are of "unknown type" etc. I also got heap overflow warnings etc once. In any case, something goes wrong deep inside the belly of the beast :) Can provide additional, more complex reproduce cases if needed. Obviously, the code below doesn't make much sense per se; in our "real-life" code, the continue 2; is run only when certain conditions are met. Here, the return is never reached, but still seems to be the cause of the problem. Reproduce code: --------------- --TEST-- continue/return/loop-related segfault test case for Bug #44913 --FILE-- <?php function something() { foreach(array(1, 2) as $value) { for($i = 0; $i < 1; $i++) { continue 2; } return; } } something(); echo 'hi'; ?> --EXPECT-- hi Expected result: ---------------- hi Actual result: -------------- "Segmentation fault" or "Bus error" ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=44913&edit=1