[PHP-DEV] Bug #12578 Updated: Segfault with vanilla php in apache

2001-10-03 Thread sniper

ID: 12578
Updated by: sniper
Reported By: [EMAIL PROTECTED]
Status: Closed
Bug Type: Reproducible crash
Operating System: Linux
PHP Version: 4.0.6
New Comment:

User feedback:

I did spend some some time on providing a reproducable
example to Andi some weeks ago, and the indications are
that this may have been fixed in 4.0.7RC2 - at least 
repeated crashes on Solaris with some tests I was doing
the other day went away with the latest version.

So let's keep this closed. If you get this problem
again, reopen this bug report.

--Jani



Previous Comments:


[2001-10-02 18:33:09] [EMAIL PROTECTED]

No feedback and not enough information to reproduce this.
Reopen if problem still exists with latest CVS snapshot
from http://snaps.php.net/




[2001-08-05 14:03:58] [EMAIL PROTECTED]

Can you provide a simple script that causes this?



[2001-08-05 11:18:11] [EMAIL PROTECTED]

With vanilla php (rasmus take note please), here's a b/t
from the latest segfaults. Actually looks like possibly the same problem that I 
reported when the optimiser was enabled. Since this is in vanilla php, I trust that 
this *is* the right place to report the crash.

Now I understand the use for the apache MaxRequestsPerChild :-)

GNU gdb 4.18
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type show copying to see the conditions.
There is absolutely no warranty for GDB.  Type show warranty for details.
This GDB was configured as i386-suse-linux...
(gdb) run -X
Starting program: /usr/local/builds/apache-1.3.12/bin/httpd -X

Program received signal SIGSEGV, Segmentation fault.
0x80f5b39 in php_if_array_reduce (ht=3, return_value=0x8347944, this_ptr=0x0, 
return_value_used=1) at array.c:2886
2886zend_hash_move_forward_ex(Z_ARRVAL_PP(input), pos);
(gdb) where
#0  0x80f5b39 in php_if_array_reduce (ht=3, return_value=0x8347944, this_ptr=0x0, 
return_value_used=1) at array.c:2886
#1  0x81067ff in execute (op_array=0x8281858) at ./zend_execute.c:1504
#2  0x81069fd in execute (op_array=0x82815b8) at ./zend_execute.c:1544
#3  0x81069fd in execute (op_array=0x827bcf0) at ./zend_execute.c:1544
#4  0x81069fd in execute (op_array=0x8275bd8) at ./zend_execute.c:1544
#5  0x81069fd in execute (op_array=0x829969c) at ./zend_execute.c:1544
#6  0x81069fd in execute (op_array=0x82988c4) at ./zend_execute.c:1544
#7  0x81069fd in execute (op_array=0x82b846c) at ./zend_execute.c:1544
#8  0x81069fd in execute (op_array=0x82abf9c) at ./zend_execute.c:1544
#9  0x81069fd in execute (op_array=0x82ac0c4) at ./zend_execute.c:1544
#10 0x81069fd in execute (op_array=0x82a2834) at ./zend_execute.c:1544
#11 0x81069fd in execute (op_array=0x82a2d0c) at ./zend_execute.c:1544
#12 0x81069fd in execute (op_array=0x82a4c6c) at ./zend_execute.c:1544
#13 0x81069fd in execute (op_array=0x82ac964) at ./zend_execute.c:1544
#14 0x81069fd in execute (op_array=0x8285a2c) at ./zend_execute.c:1544
#15 0x81069fd in execute (op_array=0x8262934) at ./zend_execute.c:1544
#16 0x80dde0b in zend_execute_scripts (type=8, file_count=3) at zend.c:752
#17 0x806a6fb in php_execute_script (primary_file=0xb748) at main.c:1206
#18 0x80eaa1b in apache_php_module_main (r=0x8245fa4, display_source_mode=0) at 
sapi_apache.c:89
#19 0x8067bee in send_php ()
#20 0x8067c36 in send_parsed_php ()
#21 0x8111609 in ap_invoke_handler ()
#22 0x8126a1f in process_request_internal ()
#23 0x8126a92 in ap_process_request ()
#24 0x811d8a6 in child_main ()
#25 0x811da85 in make_child ()
#26 0x811dc06 in startup_children ()
---Type return to continue, or q return to quit---
#27 0x811e27d in standalone_main ()
#28 0x811eacc in main ()
#29 0x400c4a5e in __libc_start_main () at ../sysdeps/generic/libc-start.c:93
(gdb)






Edit this bug report at http://bugs.php.net/?id=12578edit=1


-- 
PHP Development Mailing List http://www.php.net/
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]




[PHP-DEV] Bug #12578 Updated: Segfault with vanilla php in apache

2001-10-02 Thread sniper

ID: 12578
Updated by: sniper
Reported By: [EMAIL PROTECTED]
Old Status: Feedback
Status: Closed
Bug Type: Reproducible crash
Operating System: Linux
PHP Version: 4.0.6
New Comment:

No feedback and not enough information to reproduce this.
Reopen if problem still exists with latest CVS snapshot
from http://snaps.php.net/


Previous Comments:


[2001-08-05 14:03:58] [EMAIL PROTECTED]

Can you provide a simple script that causes this?



[2001-08-05 11:18:11] [EMAIL PROTECTED]

With vanilla php (rasmus take note please), here's a b/t
from the latest segfaults. Actually looks like possibly the same problem that I 
reported when the optimiser was enabled. Since this is in vanilla php, I trust that 
this *is* the right place to report the crash.

Now I understand the use for the apache MaxRequestsPerChild :-)

GNU gdb 4.18
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type show copying to see the conditions.
There is absolutely no warranty for GDB.  Type show warranty for details.
This GDB was configured as i386-suse-linux...
(gdb) run -X
Starting program: /usr/local/builds/apache-1.3.12/bin/httpd -X

Program received signal SIGSEGV, Segmentation fault.
0x80f5b39 in php_if_array_reduce (ht=3, return_value=0x8347944, this_ptr=0x0, 
return_value_used=1) at array.c:2886
2886zend_hash_move_forward_ex(Z_ARRVAL_PP(input), pos);
(gdb) where
#0  0x80f5b39 in php_if_array_reduce (ht=3, return_value=0x8347944, this_ptr=0x0, 
return_value_used=1) at array.c:2886
#1  0x81067ff in execute (op_array=0x8281858) at ./zend_execute.c:1504
#2  0x81069fd in execute (op_array=0x82815b8) at ./zend_execute.c:1544
#3  0x81069fd in execute (op_array=0x827bcf0) at ./zend_execute.c:1544
#4  0x81069fd in execute (op_array=0x8275bd8) at ./zend_execute.c:1544
#5  0x81069fd in execute (op_array=0x829969c) at ./zend_execute.c:1544
#6  0x81069fd in execute (op_array=0x82988c4) at ./zend_execute.c:1544
#7  0x81069fd in execute (op_array=0x82b846c) at ./zend_execute.c:1544
#8  0x81069fd in execute (op_array=0x82abf9c) at ./zend_execute.c:1544
#9  0x81069fd in execute (op_array=0x82ac0c4) at ./zend_execute.c:1544
#10 0x81069fd in execute (op_array=0x82a2834) at ./zend_execute.c:1544
#11 0x81069fd in execute (op_array=0x82a2d0c) at ./zend_execute.c:1544
#12 0x81069fd in execute (op_array=0x82a4c6c) at ./zend_execute.c:1544
#13 0x81069fd in execute (op_array=0x82ac964) at ./zend_execute.c:1544
#14 0x81069fd in execute (op_array=0x8285a2c) at ./zend_execute.c:1544
#15 0x81069fd in execute (op_array=0x8262934) at ./zend_execute.c:1544
#16 0x80dde0b in zend_execute_scripts (type=8, file_count=3) at zend.c:752
#17 0x806a6fb in php_execute_script (primary_file=0xb748) at main.c:1206
#18 0x80eaa1b in apache_php_module_main (r=0x8245fa4, display_source_mode=0) at 
sapi_apache.c:89
#19 0x8067bee in send_php ()
#20 0x8067c36 in send_parsed_php ()
#21 0x8111609 in ap_invoke_handler ()
#22 0x8126a1f in process_request_internal ()
#23 0x8126a92 in ap_process_request ()
#24 0x811d8a6 in child_main ()
#25 0x811da85 in make_child ()
#26 0x811dc06 in startup_children ()
---Type return to continue, or q return to quit---
#27 0x811e27d in standalone_main ()
#28 0x811eacc in main ()
#29 0x400c4a5e in __libc_start_main () at ../sysdeps/generic/libc-start.c:93
(gdb)






Edit this bug report at http://bugs.php.net/?id=12578edit=1


-- 
PHP Development Mailing List http://www.php.net/
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]




[PHP-DEV] Bug #12578 Updated: Segfault with vanilla php in apache

2001-08-05 Thread rasmus

ID: 12578
Updated by: rasmus
Reported By: [EMAIL PROTECTED]
Old Status: Open
Status: Feedback
Bug Type: Reproducible crash
Operating System: Linux
PHP Version: 4.0.6
New Comment:

Can you provide a simple script that causes this?

Previous Comments:


[2001-08-05 11:18:11] [EMAIL PROTECTED]

With vanilla php (rasmus take note please), here's a b/t
from the latest segfaults. Actually looks like possibly the same problem that I 
reported when the optimiser was enabled. Since this is in vanilla php, I trust that 
this *is* the right place to report the crash.

Now I understand the use for the apache MaxRequestsPerChild :-)

GNU gdb 4.18
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type show copying to see the conditions.
There is absolutely no warranty for GDB.  Type show warranty for details.
This GDB was configured as i386-suse-linux...
(gdb) run -X
Starting program: /usr/local/builds/apache-1.3.12/bin/httpd -X

Program received signal SIGSEGV, Segmentation fault.
0x80f5b39 in php_if_array_reduce (ht=3, return_value=0x8347944, this_ptr=0x0, 
return_value_used=1) at array.c:2886
2886zend_hash_move_forward_ex(Z_ARRVAL_PP(input), pos);
(gdb) where
#0  0x80f5b39 in php_if_array_reduce (ht=3, return_value=0x8347944, this_ptr=0x0, 
return_value_used=1) at array.c:2886
#1  0x81067ff in execute (op_array=0x8281858) at ./zend_execute.c:1504
#2  0x81069fd in execute (op_array=0x82815b8) at ./zend_execute.c:1544
#3  0x81069fd in execute (op_array=0x827bcf0) at ./zend_execute.c:1544
#4  0x81069fd in execute (op_array=0x8275bd8) at ./zend_execute.c:1544
#5  0x81069fd in execute (op_array=0x829969c) at ./zend_execute.c:1544
#6  0x81069fd in execute (op_array=0x82988c4) at ./zend_execute.c:1544
#7  0x81069fd in execute (op_array=0x82b846c) at ./zend_execute.c:1544
#8  0x81069fd in execute (op_array=0x82abf9c) at ./zend_execute.c:1544
#9  0x81069fd in execute (op_array=0x82ac0c4) at ./zend_execute.c:1544
#10 0x81069fd in execute (op_array=0x82a2834) at ./zend_execute.c:1544
#11 0x81069fd in execute (op_array=0x82a2d0c) at ./zend_execute.c:1544
#12 0x81069fd in execute (op_array=0x82a4c6c) at ./zend_execute.c:1544
#13 0x81069fd in execute (op_array=0x82ac964) at ./zend_execute.c:1544
#14 0x81069fd in execute (op_array=0x8285a2c) at ./zend_execute.c:1544
#15 0x81069fd in execute (op_array=0x8262934) at ./zend_execute.c:1544
#16 0x80dde0b in zend_execute_scripts (type=8, file_count=3) at zend.c:752
#17 0x806a6fb in php_execute_script (primary_file=0xb748) at main.c:1206
#18 0x80eaa1b in apache_php_module_main (r=0x8245fa4, display_source_mode=0) at 
sapi_apache.c:89
#19 0x8067bee in send_php ()
#20 0x8067c36 in send_parsed_php ()
#21 0x8111609 in ap_invoke_handler ()
#22 0x8126a1f in process_request_internal ()
#23 0x8126a92 in ap_process_request ()
#24 0x811d8a6 in child_main ()
#25 0x811da85 in make_child ()
#26 0x811dc06 in startup_children ()
---Type return to continue, or q return to quit---
#27 0x811e27d in standalone_main ()
#28 0x811eacc in main ()
#29 0x400c4a5e in __libc_start_main () at ../sysdeps/generic/libc-start.c:93
(gdb)






Edit this bug report at http://bugs.php.net/?id=12578edit=1


-- 
PHP Development Mailing List http://www.php.net/
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]