ID: 10379
Updated by: andi
Reported By: [EMAIL PROTECTED]
Status: Open
Bug Type: iPlanet related
PHP Version: 4.0.4pl1
Assigned To: 
Comments:

Can you please try the latest snapshot available at snaps.php.net or even better the 
latest CVS (make sure you grab the latest CVS of TSRM if you use CVS).


Previous Comments:
---------------------------------------------------------------------------

[2001-04-19 13:58:13] [EMAIL PROTECTED]
Was able to get some output from gdb.  This is not the debug build, but built with -g 
to gcc.

(gdb) cont
Continuing.
[New Thread 12 (LWP 4)]
[Switching to Thread 12 (LWP 4)]

Program received signal SIGSEGV, Segmentation fault.
0xfed34434 in thr_getspecific () from /usr/lib/libthread.so.1
(gdb) bt
#0  0xfed34434 in thr_getspecific () from /usr/lib/libthread.so.1
Cannot access memory at address 0xfde41f44

---------------------------------------------------------------------------

[2001-04-19 11:33:49] [EMAIL PROTECTED]
Was able to get some output from gdb.  This is not the debug build, but built with -g 
to gcc.

(gdb) cont
Continuing.
[New Thread 12 (LWP 4)]
[Switching to Thread 12 (LWP 4)]

Program received signal SIGSEGV, Segmentation fault.
0xfed34434 in thr_getspecific () from /usr/lib/libthread.so.1
(gdb) bt
#0  0xfed34434 in thr_getspecific () from /usr/lib/libthread.so.1
Cannot access memory at address 0xfde41f44

---------------------------------------------------------------------------

[2001-04-18 09:54:16] [EMAIL PROTECTED]
The configure line:
./configure --with-nsapi=/opt/NetScape/server4 --with-oci8=/oracle/OraHome1 
--prefix=/usr/local/php --mandir=/usr/man --srcdir=/usr/src/php-4.0.4pl1 --with-exec
-dir --enable-track-vars --enable-force-cgi-redirect --enable-discard-path 
--with-config-file-path=/opt/NetScape/server4

Using Iplanet 4.1sp6 on Sun 420R, single proc, 1GB ram

We were seeing large numbers of watchdog restarts, whenever php was enabled, as many 
as 100 in 5 minutes.  After much testing, we started to realize larger php files 
appeared to be causing the problem.  We have been able to create a php file that is 
3812 lines long, that will crash the ns-httpd service _every_ time.  It is too long to 
attach here, but I can email it, once I have an address.  It simply consists of the 
following:
===========
<?php
        <HTML><HEAD><TITLE>bombs.php</TITLE></HEAD>";
        print "<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF"";
        print "VLINK="#840084" ALINK="#0000FF">";
        print "There is a file in this directory called BigBigGame.php";
<*REPEAT ABOVE LINE 3805 TIMES*>
 print "</BODY></HTML>";
 ?>
============

I am unable to obtain a backtrace, as netscape won't start with debug version.


---------------------------------------------------------------------------



ATTENTION! Do NOT reply to this email!
To reply, use the web interface found at http://bugs.php.net/?id=10379&edit=2


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to