ID:               34186
 User updated by:  ljanda at checkstop dot com
 Reported By:      ljanda at checkstop dot com
-Status:           No Feedback
+Status:           Open
 Bug Type:         Program Execution
 Operating System: SCO 5.0.5
 PHP Version:      4.4.0
 New Comment:

Any ideas where I can put statements to log, and try to narrow down
where the problem is occuring.

I think it is in exec.c.


Previous Comments:
------------------------------------------------------------------------

[2005-08-26 01:00:05] php-bugs at lists dot php dot net

No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".

------------------------------------------------------------------------

[2005-08-18 20:58:30] [EMAIL PROTECTED]

Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc.

If possible, make the script source available online and provide
an URL to it here. Try to avoid embedding huge scripts into the report.



------------------------------------------------------------------------

[2005-08-18 20:48:54] ljanda at checkstop dot com

Probably this may be the area which is causing this.

/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c: In function
`proc_open_rsrc_dtor':
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c:611: warning:
cast from pointer to integer of different size
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c: In function
`zif_proc_open':
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c:1030: warning:
cast to pointer from integer of different size

------------------------------------------------------------------------

[2005-08-18 19:55:00] ljanda at checkstop dot com

(dbx) run -X

Segmentation violation in (noname) at 0x806936d
0x0806936d ((noname)+0x806936d)mov       DWord Ptr [edx],eax
(dbx) bt
Syntax error

this is dbx, was able to get the segment violation. Dbx has a trace,
but nowhere says how to get at the information.

------------------------------------------------------------------------

[2005-08-18 16:53:55] [EMAIL PROTECTED]

Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php

Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PHP better.



------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/34186

-- 
Edit this bug report at http://bugs.php.net/?id=34186&edit=1

Reply via email to