Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:52245 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 41273 invoked from network); 10 May 2011 18:52:01 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 10 May 2011 18:52:01 -0000 Authentication-Results: pb1.pair.com header.from=tbrasta@gmail.com; sender-id=pass; domainkeys=bad Authentication-Results: pb1.pair.com smtp.mail=tbrasta@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 74.125.82.54 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: tbrasta@gmail.com X-Host-Fingerprint: 74.125.82.54 mail-ww0-f54.google.com Received: from [74.125.82.54] ([74.125.82.54:44550] helo=mail-ww0-f54.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 00/3D-04851-F4989CD4 for ; Tue, 10 May 2011 14:52:00 -0400 Received: by wwd20 with SMTP id 20so6837673wwd.11 for ; Tue, 10 May 2011 11:51:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:from:to:content-type:date:message-id :mime-version:x-mailer:content-transfer-encoding; bh=Ir66PG9dVKGpewmjfBEQbOjVk7tP1akw+C4cvyWU2yc=; b=K6vdUibHxD0Yd8HEAY1963HszXebn00EIUONif9IEqX3cJAk5J7dcH9MJDu34EhRID T61vhKofP6/69WOTEzm+I5IP8pciGYavQaqJ+5GVU025BF60jfXJAw5zIv6yls7QGhSs lWDvOIS2Lswk7YLsh1r9dumWprT4SRxU+lx80= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:from:to:content-type:date:message-id:mime-version:x-mailer :content-transfer-encoding; b=PM7qBupFIhBA4F0UJ6uyc7SE1e7TbWrJCz3gsChLOmNxJ4VDlsoWXeMwOgRet03BsH GtPFvQCxrswCmyv/7eXjzD0Sboijp+Hqm/CqWPlp8Pnt9ArFAtE3pIsCbxqIVHJq7Qcb LGP8G4EBdW3joXsSX7WXR0RW8RRjjCq7nYZzc= Received: by 10.227.200.206 with SMTP id ex14mr1959736wbb.12.1305053516631; Tue, 10 May 2011 11:51:56 -0700 (PDT) Received: from [84.240.14.136] (lan-84-240-14-136.vln.skynet.lt [84.240.14.136]) by mx.google.com with ESMTPS id bs4sm4573877wbb.35.2011.05.10.11.51.55 (version=SSLv3 cipher=OTHER); Tue, 10 May 2011 11:51:55 -0700 (PDT) To: internals@lists.php.net Content-Type: text/plain; charset="UTF-8" Date: Tue, 10 May 2011 21:51:54 +0300 Message-ID: <1305053514.2083.34.camel@tomas-ubuntu> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 Content-Transfer-Encoding: 8bit Subject: segmentation fault From: tbrasta@gmail.com (Tomas =?UTF-8?Q?Brastavi=C4=8Dius?=) Hi, I would like to ask if the following backtrace contains enough information to identify the bug ? Perhaps someone may identify from the backtrace a PHP function/code that causes the segfault and I am able to provide more info in a bug report ? Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0xb77fe700 (LWP 17893)] 0xb725fa25 in zend_switch_free (T=0x83798b8, extended_value=1) at /home/tomasb/php-5.3.5/Zend/zend.h:385 385 return --pz->refcount__gc; (gdb) bt #0 0xb725fa25 in zend_switch_free (T=0x83798b8, extended_value=1) at /home/tomasb/php-5.3.5/Zend/zend.h:385 #1 0xb727ad61 in ZEND_SWITCH_FREE_SPEC_VAR_HANDLER (execute_data=0x83785d8) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:8414 #2 0xb725ce68 in execute (op_array=0x85f4cdc) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:107 #3 0xb72236c2 in zend_call_function (fci=0xbfa55864, fci_cache=0xbfa55794) at /home/tomasb/php-5.3.5/Zend/zend_execute_API.c:964 #4 0xb7222a1c in call_user_function_ex (function_table=0x81f5948, object_pp=0x0, function_name=0x8346180, retval_ptr_ptr=0xbfa558ec, param_count=5, params=0x85cfa78, no_separation=1, symbol_table=0x0) at /home/tomasb/php-5.3.5/Zend/zend_execute_API.c:754 #5 0xb723181e in zend_error (type=8192, format=0xb779b600 "Call-time pass-by-reference has been deprecated") at /home/tomasb/php-5.3.5/Zend/zend.c:1101 #6 0xb7216529 in zend_do_pass_param (param=0xbfa55f5c, op=67 'C', offset=2) at /home/tomasb/php-5.3.5/Zend/zend_compile.c:2092 #7 0xb71f39e0 in zendparse () at /home/tomasb/php-5.3.5/Zend/zend_language_parser.c:4027 #8 0xb71f847b in compile_file (file_handle=0xbfa56dac, type=2) at /home/tomasb/php-5.3.5/Zend/zend_language_scanner.c:359 #9 0xb72d01fb in ZEND_INCLUDE_OR_EVAL_SPEC_CV_HANDLER (execute_data=0x8376cd8) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:22455 #10 0xb725ce68 in execute (op_array=0x83b4310) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:107 #11 0xb72236c2 in zend_call_function (fci=0xbfa57034, fci_cache=0xbfa57058) at /home/tomasb/php-5.3.5/Zend/zend_execute_API.c:964 #12 0xb724acdc in zend_call_method (object_pp=0xbfa5713c, obj_ce=0x846d9b4, fn_proxy=0x846dad0, function_name=0xb77a1ef8 "__call", function_name_len=6, retval_ptr_ptr=0xbfa57110, param_count=2, arg1=0x85be28c, arg2=0x85be31c) at /home/tomasb/php-5.3.5/Zend/zend_interfaces.c:97 #13 0xb72583d3 in zend_std_call_user_call (ht=2, return_value=0x85beb08, return_value_ptr=0x0, this_ptr=0x85c24c0, return_value_used=0) at /home/tomasb/php-5.3.5/Zend/zend_object_handlers.c:713 #14 0xb725da98 in zend_do_fcall_common_helper_SPEC (execute_data=0x83747d0) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:316 #15 0xb725e6d3 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0x83747d0) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:421 #16 0xb725ce68 in execute (op_array=0x83b4240) at /home/tomasb/php-5.3.5/Zend/zend_vm_execute.h:107 #17 0xb7231b01 in zend_execute_scripts (type=8, retval=0x0, file_count=3) at /home/tomasb/php-5.3.5/Zend/zend.c:1194 #18 0xb71c658e in php_execute_script (primary_file=0xbfa594e4) at /home/tomasb/php-5.3.5/main/main.c:2265 #19 0xb72f5487 in php_handler (r=0x836c7e8) at /home/tomasb/php-5.3.5/sapi/apache2handler/sapi_apache2.c:669 #20 0x08079529 in ap_run_handler () #21 0x0807c937 in ap_invoke_handler () #22 0x08089e1a in ap_internal_redirect () #23 0xb6845c60 in ?? () from /usr/lib/apache2/modules/mod_rewrite.so #24 0x08079529 in ap_run_handler () #25 0x0807c937 in ap_invoke_handler () #26 0x08089fa0 in ap_process_request () #27 0x080872ab in ?? () #28 0x08080b29 in ap_run_process_connection () #29 0x0808e3c9 in ?? () #30 0x0808e673 in ?? () #31 0x0808f450 in ap_mpm_run () #32 0x08066dd5 in main () PHP application runs without segfault on PHP 5.2.14 (Ubuntu 8.4 repository install), but the same application produces above segfault on 5.3.2, 5.3.3 and 5.3.5 releases. The following configuration was used to compile PHP: ./configure \ --with-apxs2=/usr/bin/apxs2 \ --enable-debug \ --enable-mbstring \ --with-curl \ --with-mysql \ --with-mysqli \ --with-pdo-mysql \ --with-openssl \ --enable-soap \ --with-mcrypt \ --with-bz2 \ --enable-calendar \ --enable-exif \ --with-gd \ --with-gettext \ --with-zlib \ --enable-shmop \ --disable-phar \ --enable-zip The application is running on Ubuntu 8.04 (64 bits) server as an Apache module. Apache/2.2.8 is running in prefork mode. Regards, Tomas Brastavičius