ID: 27611 Updated by: [EMAIL PROTECTED] Reported By: jan at horde dot org -Status: Closed +Status: Bogus Bug Type: Zend Engine 2 problem Operating System: Linux PHP Version: 5CVS-2004-03-15 (dev)
Previous Comments: ------------------------------------------------------------------------ [2004-03-29 03:18:09] jan at horde dot org Looks like this was rather a userland error. End endless loop due to an object not being cloned in PHP 5 anymore (as it was in PHP 4) seems to have causes the segfault. ------------------------------------------------------------------------ [2004-03-15 23:04:32] [EMAIL PROTECTED] Thank you for this bug report. To properly diagnose the problem, we need a short but complete example script to be able to reproduce this bug ourselves. A proper reproducing script starts with <?php and ends with ?>, is max. 10-20 lines long and does not require any external resources such as databases, etc. If possible, make the script source available online and provide an URL to it here. Try avoid embedding huge scripts into the report. ------------------------------------------------------------------------ [2004-03-15 18:24:48] jan at horde dot org No, because the instructions how to find out where the crash happens don't work anymore with php 5. ------------------------------------------------------------------------ [2004-03-15 18:08:33] [EMAIL PROTECTED] Please provide a short script that can be used to replicate the problem. ------------------------------------------------------------------------ [2004-03-15 17:09:27] jan at horde dot org The line that appeared in the backtrace looks like: if (is_a($date, 'Kronolith_Date')) { If I comment it out, it still segfaults, but with a different bt: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 16384 (LWP 20318)] 0x406b31c7 in xbuf_format_converter (xbuf=0xbfe010b0, fmt=0x40892d27 "%sobject(%s)#%d (%d) {\n", ---Type <return> to continue, or q <return> to quit--- ap=0xbfe01104 "É,[EMAIL PROTECTED]") at /home/jan/cvs/php5/main/spprintf.c:179 179 { (gdb) bt #0 0x406b31c7 in xbuf_format_converter (xbuf=0xbfe010b0, fmt=0x40892d27 "%sobject(%s)#%d (%d) {\n", ap=0xbfe01104 "É,[EMAIL PROTECTED]") at /home/jan/cvs/php5/main/spprintf.c:179 #1 0x406b45c9 in vspprintf (pbuf=0xbfe010e8, max_len=0, format=0x40892d27 "%sobject(%s)#%d (%d) {\n", ap=0xbfe01104 "É,[EMAIL PROTECTED]") at /home/jan/cvs/php5/main/spprintf.c:725 #2 0x406af365 in php_printf (format=0x40892d27 "%sobject(%s)#%d (%d) {\n") at /home/jan/cvs/php5/main/main.c:397 #3 0x4067ccc0 in php_var_dump (struc=0x41cde8bc, level=1) at /home/jan/cvs/php5/ext/standard/var.c:111 #4 0x4067cea6 in zif_var_dump (ht=1, return_value=0x41d32a28, this_ptr=0x0, return_value_used=0) at /home/jan/cvs/php5/ext/standard/var.c:156 #5 0x4071eb2d in zend_do_fcall_common_helper (execute_data=0xbfe01270, opline=0x80d6db8, op_array=0x81daba0) at /home/jan/cvs/php5/Zend/zend_execute.c:2648 #6 0x4071f27d in zend_do_fcall_handler (execute_data=0xbfe01270, opline=0x80d6db8, op_array=0x81daba0) at /home/jan/cvs/php5/Zend/zend_execute.c:2777 #7 0x4071af4a in execute (op_array=0x81daba0) at /home/jan/cvs/php5/Zend/zend_execute.c:1339 ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/27611 -- Edit this bug report at http://bugs.php.net/?id=27611&edit=1