ID: 27611
Updated by: [EMAIL PROTECTED]
Reported By: jan at horde dot org
-Status: Closed
+Status: Bogus
Bug Type: Zend Engine 2 problem
Operating System: Linux
PHP Version: 5CVS-2004-03-15 (dev)
Previous Comments:
------------------------------------------------------------------------
[2004-03-29 03:18:09] jan at horde dot org
Looks like this was rather a userland error. End endless loop due to an
object not being cloned in PHP 5 anymore (as it was in PHP 4) seems to
have causes the segfault.
------------------------------------------------------------------------
[2004-03-15 23:04:32] [EMAIL PROTECTED]
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves.
A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external
resources such as databases, etc.
If possible, make the script source available online and provide
an URL to it here. Try avoid embedding huge scripts into the report.
------------------------------------------------------------------------
[2004-03-15 18:24:48] jan at horde dot org
No, because the instructions how to find out where the crash happens
don't work anymore with php 5.
------------------------------------------------------------------------
[2004-03-15 18:08:33] [EMAIL PROTECTED]
Please provide a short script that can be used to replicate
the problem.
------------------------------------------------------------------------
[2004-03-15 17:09:27] jan at horde dot org
The line that appeared in the backtrace looks like:
if (is_a($date, 'Kronolith_Date')) {
If I comment it out, it still segfaults, but with a different bt:
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 16384 (LWP 20318)]
0x406b31c7 in xbuf_format_converter (xbuf=0xbfe010b0,
fmt=0x40892d27 "%sobject(%s)#%d (%d) {\n",
---Type <return> to continue, or q <return> to quit---
ap=0xbfe01104 "É,[EMAIL PROTECTED]")
at /home/jan/cvs/php5/main/spprintf.c:179
179 {
(gdb) bt
#0 0x406b31c7 in xbuf_format_converter (xbuf=0xbfe010b0,
fmt=0x40892d27 "%sobject(%s)#%d (%d) {\n",
ap=0xbfe01104 "É,[EMAIL PROTECTED]")
at /home/jan/cvs/php5/main/spprintf.c:179
#1 0x406b45c9 in vspprintf (pbuf=0xbfe010e8, max_len=0,
format=0x40892d27 "%sobject(%s)#%d (%d) {\n",
ap=0xbfe01104 "É,[EMAIL PROTECTED]")
at /home/jan/cvs/php5/main/spprintf.c:725
#2 0x406af365 in php_printf (format=0x40892d27 "%sobject(%s)#%d (%d)
{\n")
at /home/jan/cvs/php5/main/main.c:397
#3 0x4067ccc0 in php_var_dump (struc=0x41cde8bc, level=1)
at /home/jan/cvs/php5/ext/standard/var.c:111
#4 0x4067cea6 in zif_var_dump (ht=1, return_value=0x41d32a28,
this_ptr=0x0,
return_value_used=0) at /home/jan/cvs/php5/ext/standard/var.c:156
#5 0x4071eb2d in zend_do_fcall_common_helper
(execute_data=0xbfe01270,
opline=0x80d6db8, op_array=0x81daba0)
at /home/jan/cvs/php5/Zend/zend_execute.c:2648
#6 0x4071f27d in zend_do_fcall_handler (execute_data=0xbfe01270,
opline=0x80d6db8, op_array=0x81daba0)
at /home/jan/cvs/php5/Zend/zend_execute.c:2777
#7 0x4071af4a in execute (op_array=0x81daba0)
at /home/jan/cvs/php5/Zend/zend_execute.c:1339
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/27611
--
Edit this bug report at http://bugs.php.net/?id=27611&edit=1