ID: 25190 Updated by: [EMAIL PROTECTED] Reported By: gabor at netway dot hu -Status: Open +Status: Bogus Bug Type: Unknown/Other Function Operating System: Debian Linux PHP Version: 4.3.3RC4 New Comment:
So by the looks of it, this is using ADOdb, which means this is a third-party application and isn't necessarily a PHP problem. You'll have to contact the ADOdb developers and see what they say. I don't know what OVS, but if it's another third-party application, contact them as well. J Previous Comments: ------------------------------------------------------------------------ [2003-08-21 11:05:23] gabor at netway dot hu Thank you :-). ------------------------------------------------------------------------ [2003-08-21 10:58:59] gabor at netway dot hu the code is: function OVS_Z050($ORA_SESS_ID){ global $conn; $Z050_query=" BEGIN msie_logout_session_proc (:sessid,:ipaddr,:result_rc); END; "; $stmt = $conn->PrepareSP($Z050_query); $conn->Parameter($stmt,$ORA_SESS_ID,"sessid",27); $conn->Parameter($stmt,getenv("REMOTE_ADDR"),"ipaddr",15); $conn->Parameter($stmt,$rc, "result_rc",12); $conn->Execute($stmt); if ($rc==500) $msg = 'Logoff succeeded'; else { $msg="ERROR(".$rc."): "; if ($rc==(-501)){ $msg.="Logoff ok, but session timed out!"; echo "<script> alert('".$msg."'); </script> "; } if ($rc==(-550)){ $msg.="LOGGING ERROR!"; echo "<script> alert('".$msg."'); </script> "; } } return $msg; } ------------------------------------------------------------------------ [2003-08-21 10:47:36] [EMAIL PROTECTED] Is this caused by some sort of third-party application? What is OVS? Do you have a self-contained example that can actually be reproduced? What does the function OVS_Z050() do? Unless you can answer these questions, this is likely bogus. J ------------------------------------------------------------------------ [2003-08-21 09:28:53] gabor at netway dot hu Description: ------------ apache crash, and no more request. Reproduce code: --------------- include("head.php"); OVS_Z050($_SESSION["ovs_session"]); sleep(5); session_destroy(); ?> Expected result: ---------------- [Mon Aug 18 08:24:55 2003] [notice] Apache/1.3.26 Ben-SSL/1.48 (Unix) Debian GNU/Linux PHP/4.3.3RC4-dev configured -- resuming normal operations [Mon Aug 18 08:24:55 2003] [notice] suEXEC mechanism enabled (wrapper: /usr/lib/apache-ssl/suexec) [Mon Aug 18 08:24:55 2003] [notice] Accept mutex: sysvsem (Default: sysvsem) [Mon Aug 18 10:48:18 2003] [notice] child pid 344 exit signal Segmentation fault (11) [Mon Aug 18 10:48:54 2003] [notice] child pid 341 exit signal Segmentation fault (11) [Mon Aug 18 10:49:37 2003] [notice] child pid 366 exit signal Segmentation fault (11) /usr/src/php4-STABLE-200308080930/Zend/zend_execute.c(1611) : Freeing 0x08151FAC (12 bytes), script=/var/www/ovs/ovs.members/php/Z050.php /usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(295) : Freeing 0x0814CE14 (14520 bytes), script=/var/www/ovs/ovs.members/php/xx.php Last leak repeated 2 times Zend/zend_language_scanner.c(4619) : Freeing 0x08151EF4 (11 bytes), script=/var/www/xx.php Last leak repeated 118 times Zend/zend_language_scanner.c(4484) : Freeing 0x08151EB4 (9 bytes), script=/var/www/xx.php Last leak repeated 80 times Zend/zend_language_scanner.c(4492) : Freeing 0x08151D2C (20 bytes), script=/var/www/xx.php Last leak repeated 80 times Zend/zend_language_scanner.c(3072) : Freeing 0x0814AA24 (84 bytes), script=/var/www/xx.php Last leak repeated 2 times /usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(65) : Freeing 0x0814B5A4 (4 bytes), script=/var/www/ovs/ovs.members/php/xx.php Last leak repeated 2 times Zend/zend_language_scanner.c(3911) : Freeing 0x0814B564 (16 bytes), script=/var/www/ovs/ovs.members/php/xx.php Last leak repeated 5 times /usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(854) : Freeing 0x0814B474 (13 bytes), script=/var/www/ovs/ovs.members/php/xx.php /usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed) Last leak repeated 1 time /usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(230) : Freeing 0x081464D4 (12 bytes), script=/var/www/ovs/ovs.members/php/xx.php /usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1761) : Freeing 0x08145E84 (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php /usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed) /usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1745) : Freeing 0x08145D2C (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php /usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed) /usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(2025) : Freeing 0x0814597C (8 bytes), script=/var/www/ovs/ovs.members/php/xx.php /usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed) Last leak repeated 5 times Zend/zend_language_scanner.c(4399) : Freeing 0x0814617C (3 bytes), script=/var/www/ovs/ovs.members/php/xx.php Last leak repeated 1 time Zend/zend_language_scanner.c(4710) : Freeing 0x081410AC (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php [Mon Aug 18 10:50:32 2003] [notice] child pid 342 exit signal Segmentation fault (11) [Mon Aug 18 10:51:52 2003] [notice] child pid 340 exit signal Segmentation fault (11) [Mon Aug 18 10:53:22 2003] [notice] child pid 339 exit signal Segmentation fault (11) [Mon Aug 18 14:03:12 2003] [notice] child pid 472 exit signal Segmentation fault (11) [Mon Aug 18 14:11:22 2003] [notice] child pid 433 exit signal Segmentation fault (11) [Mon Aug 18 14:12:32 2003] [notice] child pid 338 exit signal Segmentation fault (11) [Mon Aug 18 14:13:23 2003] [notice] child pid 434 exit signal Segmentation fault (11) [Mon Aug 18 14:15:11 2003] [notice] child pid 473 exit signal Segmentation fault (11) [Mon Aug 18 14:15:30 2003] [notice] child pid 443 exit signal Segmentation fault (11) [Mon Aug 18 14:15:57 2003] [notice] child pid 474 exit signal Segmentation fault (11) ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=25190&edit=1