ID: 13034
Updated by: sniper
Old Status: Open
Status: Feedback
Bug Type: Reproducible crash
Operating System: RedHat Linux 7.0.
PHP Version: 4.0.6
New Comment:

You didn't say with what version this backtrace was generated with, also is it with 
that script you said
you could NOT get the crash? Please be clear about these things.

Previous Comments:

[2001-08-30 13:28:19] [EMAIL PROTECTED]


please read the whole thread - i have included the script AND i have also tried it 
with the latest development snapshot. i really have included all i have :)
for me it looks like a bug in the echo function (vfprintf.c). the script doesn't crash 
without the echo funtions. it also crashes with "print".




[2001-08-30 10:05:38] [EMAIL PROTECTED]

What was the script used to generate that backtrace?
Also, could you try and check if this happens with
latest CVS snapshot:


[2001-08-29 12:11:09] [EMAIL PROTECTED]

here is the core dump (i managed it with the cgi version):
so the error isn't anymore apache related i guess - i'll move the type...

/*note: this error comes while loading the symbols --- 

(before i started the actual backtrace

#0  0x40362c2c in _IO_vfprintf (s=0xbf800500, format=0x816a2f3 "%ld", ap=0xbf8005e8) 
at vfprintf.c:231
231     vfprintf.c: No such file or directory.

/*after the bt command it follows endlessly...

#0  0x40362c2c in _IO_vfprintf (s=0xbf800500, format=0x816a2f3 "%ld", ap=0xbf8005e8) 
at vfprintf.c:231
#1  0x40380432 in _IO_vsprintf (string=0x8cd4bb4 'Z' <repeats 19 times>, 
"\204\217**", format=0x816a2f3 "%ld", args=0xbf8005e8)
    at iovsprintf.c:47
#2  0x4036ccb7 in sprintf (s=0x8cd4bb4 'Z' <repeats 19 times>, "\204\217**", 
format=0x816a2f3 "%ld") at sprintf.c:38
#3  0x810f7e5 in _convert_to_string (op=0xbf800980, __zend_filename=0x816a51d 
"zend.c", __zend_lineno=154) at zend_operators.c:442
#4  0x8115517 in zend_make_printable_zval (expr=0x8cd4b14, expr_copy=0xbf800980, 
use_copy=0xbf800998) at zend.c:154
#5  0x814fe98 in execute (op_array=0x8295b08) at ./zend_execute.c:1365
#6  0x815082f in execute (op_array=0x8295ff0) at ./zend_execute.c:1544
#7  0x815082f in execute (op_array=0x8295b08) at ./zend_execute.c:1544
#8  0x815082f in execute (op_array=0x8295ff0) at ./zend_execute.c:1544
#9  0x815082f in execute (op_array=0x8295b08) at ./zend_execute.c:1544
#10 0x815082f in execute (op_array=0x8295ff0) at ./zend_execute.c:1544
#11 0x815082f in execute (op_array=0x8295b08) at ./zend_execute.c:1544
#12 0x815082f in execute (op_array=0x8295ff0) at ./zend_execute.c:1544
#13 0x815082f in execute (op_array=0x8295b08) at ./zend_execute.c:1544




[2001-08-29 11:43:48] [EMAIL PROTECTED]


i am using apache 1.3.20 with php-4.0.6
since my update to the 1.3.20 i have strange segmentation faults when i access some 
[notice] child pid 9707 exit signal Segmentation fault (11)

i have also tryed it with the latest development snapshot - the same

here is my configuration: 
'./configure' '--prefix=/usr' '--with-config-file-path=/etc' '--enable-debug' 
'--with-apxs' '--disable-debug' '--enable-discard-path' '--with-exec-dir=/usr/bin' 
'--with-regex=system' '--with-gettext' '--with-gd=shared' '--with-jpeg-dir=/usr' 
'--with-png' '--with-zlib' '--with-db2' '--with-db3' '--with-gdbm' 
'--enable-magic-quotes' '--enable-safe-mode' '--enable-sysvsem' '--enable-sysvshm' 
'--enable-track-vars' '--enable-yp' '--enable-ftp' '--with-mysql=/usr' 
'--without-oracle' '--without-oci8' '--with-recode' '--with-xml'

i have allready tryed to disable things like xml or regex or recode - the same...

here is a short demo script to reproduce the error:

$ar = array("hund","katze","schwein","kuh","kamel");

function ar1($ar)
        foreach($ar as $key => $val)
                if($val != "kuh")
                        echo "f1 $key => $val<br>";

function ar2($ar)
        foreach($ar as $key=>$val)
                        echo "f2 $key => $val<br>";


infortunately apache refuses to produce a core dump in this case

please help


Edit this bug report at

PHP Development Mailing List <>
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to