ID:               36013
 Comment by:       alexdg at gmail dot com
 Reported By:      xenon54 at generationphp dot net
 Status:           No Feedback
 Bug Type:         Session related
 Operating System: Centos 4.2
 PHP Version:      5.1.1
 New Comment:

I think I know what the issue is, bad user/passwd login configuration
for the cacti mysql account in include/config.php. When running thru
Apache the error_log will only output "segmentation fault" but if you
run the poller.php script on its own, you'll get the typical error msg
of a failed mysql login (some 10 times?), until it crashs.


Previous Comments:
------------------------------------------------------------------------

[2006-01-23 01:00:03] php-bugs at lists dot php dot net

No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".

------------------------------------------------------------------------

[2006-01-15 00:38:19] xenon54 at generationphp dot net

Fixed without any reasons.
But still cause segmentation fault with cli.

Will come back if I can reproduce this bug.

------------------------------------------------------------------------

[2006-01-14 22:48:50] [EMAIL PROTECTED]

Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc.

If possible, make the script source available online and provide
an URL to it here. Try to avoid embedding huge scripts into the report.



------------------------------------------------------------------------

[2006-01-14 20:58:24] xenon54 at generationphp dot net

It was initially on PHP5.1.1.
But the problem persists on PHP5.1.2

------------------------------------------------------------------------

[2006-01-14 20:52:52] xenon54 at generationphp dot net

Description:
------------
I'm receiving a Segmentation Fault when accessing index.php from cacti.
I recompiled PHP without sessions support and the segmentation fault was
not happening anymore.

httpd-2.0.52-22.ent.centos4
glibc-2.3.4-2.13
cacti-0.8.6h

Thanks for any help

Reproduce code:
---------------
I tried to locate the source of the segmentation fault.
I located the line by using exit; to see where the fault is caused.
To me, it makes no sense but giving it to you anyway. 

/cacti/lib/functions.php:137

if (isset($_SESSION["sess_config_array"])) {
    $config_array = $_SESSION["sess_config_array"];
}


Expected result:
----------------
Segmentation fault

Actual result:
--------------
Backtrace

#0  0x00345d30 in vfprintf () from /lib/tls/libc.so.6
#1  0x0036114b in vsprintf () from /lib/tls/libc.so.6
#2  0x0034e4cb in sprintf () from /lib/tls/libc.so.6
#3  0x0137cdfa in _convert_to_string (op=0xbf4006a0,
    __zend_filename=0x15cfcf0
"/usr/src/php-5.1.1/Zend/zend_vm_execute.h",
    __zend_lineno=4607) at
/usr/src/php-5.1.1/Zend/zend_operators.c:544
#4  0x013b7ffd in ZEND_END_SILENCE_SPEC_TMP_HANDLER
(execute_data=0xbf400cc0)
    at /usr/src/php-5.1.1/Zend/zend_vm_execute.h:4607


Frames
#3  0x0137cdfa in _convert_to_string (op=0xbf4006a0,
    __zend_filename=0x15cfcf0
"/usr/src/php-5.1.1/Zend/zend_vm_execute.h",
    __zend_lineno=4607) at
/usr/src/php-5.1.1/Zend/zend_operators.c:544
544                             op->value.str.len =
zend_sprintf(op->value.str.val, "%ld", lval);  /* SAFE */

#4  0x013b7ffd in ZEND_END_SILENCE_SPEC_TMP_HANDLER
(execute_data=0xbf400cc0)
    at /usr/src/php-5.1.1/Zend/zend_vm_execute.h:4607
4607                    convert_to_string(&restored_error_reporting);


error_log from Apache
[Sat Jan 14 09:28:35 2006] [notice] child pid 2125 exit signal
Segmentation fault (11)


------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=36013&edit=1

Reply via email to