ID: 32231 User updated by: bugs at niluje dot net Reported By: bugs at niluje dot net Status: Bogus Bug Type: Reproducible crash Operating System: Debian linux x86 PHP Version: 5.0.3 New Comment:
you have the expertise to do so, i don't. don't get me wrong i have spent a considerable amount of time trying to find the bug, i can't do much more. i have enough trouble explaining my boss why php crashes as it is supposed to be production ready. Previous Comments: ------------------------------------------------------------------------ [2005-03-29 11:41:03] [EMAIL PROTECTED] And we don't have time to come up with simple reproducing scripts either. ------------------------------------------------------------------------ [2005-03-29 11:33:51] bugs at niluje dot net i do not have the time or the expertise to compile php with debug options. the segfault happends in PEAR.php (PEAR 1.3.5) line 863 eval('$e = new Exception($this->message, $this->code);$e->PEAR_Error = $this;throw($e);'); it appears that $e->PEAR_Error = $this causes the segfault. ------------------------------------------------------------------------ [2005-03-24 18:41:15] [EMAIL PROTECTED] Please read the above 2 comments I added. Read them very carefully.. ------------------------------------------------------------------------ [2005-03-24 18:40:25] [EMAIL PROTECTED] Thank you for this bug report. To properly diagnose the problem, we need a backtrace to see what is happening behind the scenes. To find out how to generate a backtrace, please read http://bugs.php.net/bugs-generating-backtrace.php Once you have generated a backtrace, please submit it to this bug report and change the status back to "Open". Thank you for helping us make PHP better. ------------------------------------------------------------------------ [2005-03-24 18:40:14] [EMAIL PROTECTED] Thank you for this bug report. To properly diagnose the problem, we need a short but complete example script to be able to reproduce this bug ourselves. A proper reproducing script starts with <?php and ends with ?>, is max. 10-20 lines long and does not require any external resources such as databases, etc. If possible, make the script source available online and provide an URL to it here. Try to avoid embedding huge scripts into the report. ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/32231 -- Edit this bug report at http://bugs.php.net/?id=32231&edit=1