ID: 34186
User updated by: ljanda at checkstop dot com
Reported By: ljanda at checkstop dot com
Status: Open
Bug Type: Program Execution
Operating System: SCO 5.0.5
PHP Version: 4.4.0
New Comment:
Ok, got gdb for SCO and compile it.
Compile PHP --enable-debug, and now it is working.
Something in the optimizer.
Previous Comments:
------------------------------------------------------------------------
[2005-09-01 20:58:16] ljanda at checkstop dot com
Any ideas where I can put statements to log, and try to narrow down
where the problem is occuring.
I think it is in exec.c.
------------------------------------------------------------------------
[2005-08-26 01:00:05] php-bugs at lists dot php dot net
No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".
------------------------------------------------------------------------
[2005-08-18 20:58:30] [EMAIL PROTECTED]
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves.
A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external
resources such as databases, etc.
If possible, make the script source available online and provide
an URL to it here. Try to avoid embedding huge scripts into the report.
------------------------------------------------------------------------
[2005-08-18 20:48:54] ljanda at checkstop dot com
Probably this may be the area which is causing this.
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c: In function
`proc_open_rsrc_dtor':
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c:611: warning:
cast from pointer to integer of different size
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c: In function
`zif_proc_open':
/u/leroy/php4-STABLE-200508081638/ext/standard/exec.c:1030: warning:
cast to pointer from integer of different size
------------------------------------------------------------------------
[2005-08-18 19:55:00] ljanda at checkstop dot com
(dbx) run -X
Segmentation violation in (noname) at 0x806936d
0x0806936d ((noname)+0x806936d)mov DWord Ptr [edx],eax
(dbx) bt
Syntax error
this is dbx, was able to get the segment violation. Dbx has a trace,
but nowhere says how to get at the information.
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/34186
--
Edit this bug report at http://bugs.php.net/?id=34186&edit=1