ID:               47870
 Updated by:       mbecc...@php.net
 Reported By:      mbecc...@php.net
-Status:           Feedback
+Status:           Closed
 Bug Type:         Arrays related
 Operating System: FreeBSD 6.2
 PHP Version:      5.3CVS-2009-04-01 (CVS)
 New Comment:

Retested with latest CVS. Looks like the GCC optimizer bugfix also
fixed this issue. Well done!


Previous Comments:
------------------------------------------------------------------------

[2009-04-26 15:43:00] j...@php.net

Try latest CVS just in case that GCC optimizer bugfix was the cause for

this bug as well.

------------------------------------------------------------------------

[2009-04-06 13:05:25] mbecc...@php.net

Nope. Latest 5.1 and 5.2 work perfectly fine.

------------------------------------------------------------------------

[2009-04-06 12:59:18] j...@php.net

Can you reproduce this with PHP_5_2 branch?

------------------------------------------------------------------------

[2009-04-02 09:11:25] mbecc...@php.net

I've tried to reduce the affected test to a smaller test case with no
luck. As soon as I remove something from it. It suddenly starts to pass
with no segfault.

------------------------------------------------------------------------

[2009-04-02 00:36:03] mbecc...@php.net

mat...@phenom-ubuntu:~/OX-trunk/tests$ valgrind --tool=memcheck
--num-callers=30 --log-file=php.log /usr/local/bin/php run.php
--type=unit --level=file --layer=dal --folder=lib/OA/Dal/Maintenance
--file=Priority_getZoneImpressionForecasts.dal.test.php --format=text
--host=test Priority_getZoneImpressionForecasts.dal.test.php
Segmentation fault
mat...@phenom-ubuntu:~/OX-trunk/tests$ cat php.log
==11808== Memcheck, a memory error detector.
==11808== Copyright (C) 2002-2007, and GNU GPL'd, by Julian Seward et
al.
==11808== Using LibVEX rev 1854, a library for dynamic binary
translation.
==11808== Copyright (C) 2004-2007, and GNU GPL'd, by OpenWorks LLP.
==11808== Using valgrind-3.3.1-Debian, a dynamic binary instrumentation
framework.
==11808== Copyright (C) 2000-2007, and GNU GPL'd, by Julian Seward et
al.
==11808== For more details, rerun with: -v
==11808== 
==11808== My PID = 11808, parent PID = 10101.  Prog and args are:
==11808==    /usr/local/bin/php
==11808==    run.php
==11808==    --type=unit
==11808==    --level=file
==11808==    --layer=dal
==11808==    --folder=lib/OA/Dal/Maintenance
==11808==    --file=Priority_getZoneImpressionForecasts.dal.test.php
==11808==    --format=text
==11808==    --host=test
==11808==    Priority_getZoneImpressionForecasts.dal.test.php
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x7FF79D: _zval_ptr_dtor (zend_execute_API.c:430)
==11808==    by 0x824537: zend_hash_clean (zend_hash.c:552)
==11808==    by 0x849231: zend_leave_helper_SPEC
(zend_vm_execute.h:208)
==11808==    by 0x8DC019: ZEND_RETURN_SPEC_CV_HANDLER
(zend_vm_execute.h:22098)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x7FF861: _zval_ptr_dtor (zend_execute_API.c:441)
==11808==    by 0x824537: zend_hash_clean (zend_hash.c:552)
==11808==    by 0x849231: zend_leave_helper_SPEC
(zend_vm_execute.h:208)
==11808==    by 0x8DC019: ZEND_RETURN_SPEC_CV_HANDLER
(zend_vm_execute.h:22098)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881939: zend_assign_to_variable (zend_execute.c:664)
==11808==    by 0x8FCC90: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27359)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881991: zend_assign_to_variable (zend_execute.c:669)
==11808==    by 0x8FCC90: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27359)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881A77: zend_assign_to_variable (zend_execute.c:684)
==11808==    by 0x8FCC90: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27359)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881939: zend_assign_to_variable (zend_execute.c:664)
==11808==    by 0x8EF8A8: ZEND_ASSIGN_SPEC_CV_TMP_HANDLER
(zend_vm_execute.h:25711)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881991: zend_assign_to_variable (zend_execute.c:669)
==11808==    by 0x8EF8A8: ZEND_ASSIGN_SPEC_CV_TMP_HANDLER
(zend_vm_execute.h:25711)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881A77: zend_assign_to_variable (zend_execute.c:684)
==11808==    by 0x8EF8A8: ZEND_ASSIGN_SPEC_CV_TMP_HANDLER
(zend_vm_execute.h:25711)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881939: zend_assign_to_variable (zend_execute.c:664)
==11808==    by 0x8E6422: ZEND_ASSIGN_SPEC_CV_CONST_HANDLER
(zend_vm_execute.h:24065)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881991: zend_assign_to_variable (zend_execute.c:669)
==11808==    by 0x8E6422: ZEND_ASSIGN_SPEC_CV_CONST_HANDLER
(zend_vm_execute.h:24065)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x881A77: zend_assign_to_variable (zend_execute.c:684)
==11808==    by 0x8E6422: ZEND_ASSIGN_SPEC_CV_CONST_HANDLER
(zend_vm_execute.h:24065)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x7FF79D: _zval_ptr_dtor (zend_execute_API.c:430)
==11808==    by 0x845F0A: zend_assign_to_variable_reference
(zend_execute.c:410)
==11808==    by 0x8FD31A: ZEND_ASSIGN_REF_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27405)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x7FF861: _zval_ptr_dtor (zend_execute_API.c:441)
==11808==    by 0x845F0A: zend_assign_to_variable_reference
(zend_execute.c:410)
==11808==    by 0x8FD31A: ZEND_ASSIGN_REF_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27405)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x7FF893: _zval_ptr_dtor (zend_gc.h:182)
==11808==    by 0x845F0A: zend_assign_to_variable_reference
(zend_execute.c:410)
==11808==    by 0x8FD31A: ZEND_ASSIGN_REF_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27405)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x7FF89F: _zval_ptr_dtor (zend_gc.h:182)
==11808==    by 0x845F0A: zend_assign_to_variable_reference
(zend_execute.c:410)
==11808==    by 0x8FD31A: ZEND_ASSIGN_REF_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27405)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Conditional jump or move depends on uninitialised value(s)
==11808==    at 0x8818D4: zend_assign_to_variable (zend_execute.c:657)
==11808==    by 0x8FCC90: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27359)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Use of uninitialised value of size 8
==11808==    at 0x881933: zend_assign_to_variable (zend_execute.c:664)
==11808==    by 0x8FCC90: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27359)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== Process terminating with default action of signal 11
(SIGSEGV)
==11808==  Bad permissions for mapped region at address 0x8000015
==11808==    at 0x881933: zend_assign_to_variable (zend_execute.c:664)
==11808==    by 0x8FCC90: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER
(zend_vm_execute.h:27359)
==11808==    by 0x848774: execute (zend_vm_execute.h:104)
==11808==    by 0x814198: zend_execute_scripts (zend.c:1188)
==11808==    by 0x768884: php_execute_script (main.c:2157)
==11808==    by 0x9125CE: main (php_cli.c:1159)
==11808== 
==11808== ERROR SUMMARY: 42 errors from 17 contexts (suppressed: 18
from 2)
==11808== malloc/free: in use at exit: 29,165,534 bytes in 170,630
blocks.
==11808== malloc/free: 1,826,083 allocs, 1,655,453 frees, 157,087,187
bytes allocated.
==11808== For counts of detected errors, rerun with: -v
==11808== searching for pointers to 170,630 not-freed blocks.
==11808== checked 22,615,176 bytes.
==11808== 
==11808== LEAK SUMMARY:
==11808==    definitely lost: 388 bytes in 14 blocks.
==11808==      possibly lost: 0 bytes in 0 blocks.
==11808==    still reachable: 29,165,146 bytes in 170,616 blocks.
==11808==         suppressed: 0 bytes in 0 blocks.
==11808== Rerun with --leak-check=full to see details of leaked
memory.


------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/47870

-- 
Edit this bug report at http://bugs.php.net/?id=47870&edit=1

Reply via email to