#49145 [Opn]: php command line segmentation fault

2009-10-06 Thread dhathorn at uchicago dot edu
 ID:   49145
 User updated by:  dhathorn at uchicago dot edu
 Reported By:  dhathorn at uchicago dot edu
 Status:   Open
 Bug Type: Reproducible crash
 Operating System: Linux (RedHat RHEL4)
 PHP Version:  5.3SVN-2009-08-03 (snap)
 New Comment:

Upgrading the following rpms:

MySQL-client-standard-5.0.27-0.rhel4.i386.rpm
MySQL-devel-standard-5.0.27-0.rhel4.i386.rpm
MySQL-shared-standard-5.0.27-0.rhel4.i386.rpm

to:

MySQL-client-community-5.0.84-0.rhel4.i386.rpm
MySQL-devel-community-5.0.84-0.rhel4.i386.rpm
MySQL-shared-community-5.0.84-0.rhel4.i386.rpm

...made this issue go away.


Previous Comments:


[2009-08-10 15:22:02] dhathorn at uchicago dot edu

Is there any further information that I can provide or anything else I

can do to help resolve this?



[2009-08-03 22:44:19] dhathorn at uchicago dot edu

OpenSSL 0.9.7a Feb 19 2003



[2009-08-03 22:02:06] j...@php.net

And what is your openssl version?



[2009-08-03 21:41:05] dhathorn at uchicago dot edu

Description:

PHP builds and installs alright, but seg faults when installing a pear

channel.  

Reproduce code:
---
~/local/php/bin/pear install
channel://pear.php.net/XML_Feed_Parser-1.0.0RC1


Expected result:

successful pear install

Actual result:
--
Backtrace:

#0  0x008c924c in ASN1_STRING_free () from /lib/libcrypto.so.4
#1  0x008c1f31 in ASN1_primitive_free () from /lib/libcrypto.so.4
#2  0x008c1f8a in ASN1_primitive_free () from /lib/libcrypto.so.4
#3  0x008c201d in ASN1_primitive_free () from /lib/libcrypto.so.4
#4  0x008c225d in ASN1_template_free () from /lib/libcrypto.so.4
#5  0x008c2183 in ASN1_primitive_free () from /lib/libcrypto.so.4
#6  0x008c225d in ASN1_template_free () from /lib/libcrypto.so.4
#7  0x008c2183 in ASN1_primitive_free () from /lib/libcrypto.so.4
#8  0x008c2293 in ASN1_item_free () from /lib/libcrypto.so.4
#9  0x008bd3d1 in X509_free () from /lib/libcrypto.so.4
#10 0x008a800b in sk_pop_free () from /lib/libcrypto.so.4
#11 0x00943767 in ssl_sess_cert_free () from /lib/libssl.so.4
#12 0x009444d9 in SSL_SESSION_free () from /lib/libssl.so.4
#13 0x0094227b in SSL_free () from /lib/libssl.so.4
#14 0x080d0e41 in php_openssl_sockop_close (stream=0xb7f1ef24, 
close_handle=1) at /home/dhathorn/src/php-5.3-
200908031430/ext/openssl/xp_ssl.c:254
#15 0x082f6a6b in _php_stream_free (stream=0xb7f1ef24, 
close_options=11)
at /home/dhathorn/src/php-5.3-
200908031430/main/streams/streams.c:356
#16 0x082f7142 in stream_resource_regular_dtor (rsrc=0x51)
at /home/dhathorn/src/php-5.3-
200908031430/main/streams/streams.c:1426
#17 0x08336a81 in list_entry_destructor (ptr=0xb7897958) at 
/home/dhathorn/src/php-5.3-200908031430/Zend/zend_list.c:184
#18 0x08334351 in zend_hash_del_key_or_index (ht=0x8808c24, arKey=0x0,

nKeyLength=0, h=113, flag=1)
at /home/dhathorn/src/php-5.3-200908031430/Zend/zend_hash.c:497
#19 0x0833681c in _zend_list_delete (id=113) at 
/home/dhathorn/src/php-5.3-200908031430/Zend/zend_list.c:58
#20 0x0831e0d1 in _zval_ptr_dtor (zval_ptr=0xb78e0dfc)
at /home/dhathorn/src/php-5.3-
200908031430/Zend/zend_variables.h:35
#21 0x08335928 in zend_hash_clean (ht=0xb7b891e0) at 
/home/dhathorn/src/php-5.3-200908031430/Zend/zend_hash.c:552
#22 0x0834807f in zend_leave_helper_SPEC (execute_data=0xb7c8afd0)
at /home/dhathorn/src/php-5.3-
200908031430/Zend/zend_vm_execute.h:208
#23 0x08347cf0 in execute (op_array=0xb7bf61b8) at 
/home/dhathorn/src/php-5.3-200908031430/Zend/zend_vm_execute.h:104
#24 0x0832b9e7 in zend_execute_scripts (type=8, retval=0x0, 
file_count=3)
at /home/dhathorn/src/php-5.3-200908031430/Zend/zend.c:1188
#25 0x082e52b7 in php_execute_script (primary_file=0xbfe2d350)
at /home/dhathorn/src/php-5.3-200908031430/main/main.c:2212
#26 0x083a23d8 in main (argc=22, argv=0xbfe2d444) at 
/home/dhathorn/src/php-5.3-200908031430/sapi/cli/php_cli.c:1188
(gdb) frame 23
#23 0x08347cf0 in execute (op_array=0xb7bf61b8) at 
/home/dhathorn/src/php-5.3-200908031430/Zend/zend_vm_execute.h:104
104 if ((ret = EX(opline)-handler(execute_data 
TSRMLS_CC))  0) {






-- 
Edit this bug report at http://bugs.php.net/?id=49145edit=1



#49145 [Opn]: php command line segmentation fault

2009-08-13 Thread derick
 ID:   49145
 Updated by:   der...@php.net
 Reported By:  dhathorn at uchicago dot edu
 Status:   Open
 Bug Type: Reproducible crash
 Operating System: Linux (RedHat RHEL4)
 PHP Version:  5.3SVN-2009-08-03 (snap)
 New Comment:

The reason why it was closed as no feedback: You used Add a comment
and not Edit submission... that could be phrased better though.


Previous Comments:


[2009-08-12 15:23:03] dhathorn at uchicago dot edu

[re-opening] Again, the openssl version is:

OpenSSL 0.9.7a Feb 19 2003



[2009-08-12 15:15:55] dhathorn at uchicago dot edu

HEY!  Why was this being set to No Feedback?  I provided all of the 
feedback that was requested, almost immediately.



[2009-08-11 01:00:01] php-bugs at lists dot php dot net

No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to Open.



[2009-08-10 15:22:02] dhathorn at uchicago dot edu

Is there any further information that I can provide or anything else I

can do to help resolve this?



[2009-08-03 22:44:19] dhathorn at uchicago dot edu

OpenSSL 0.9.7a Feb 19 2003



The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/49145

-- 
Edit this bug report at http://bugs.php.net/?id=49145edit=1