php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #37612 Segfault - infinite recursion
Submitted: 2006-05-27 11:16 UTC Modified: 2006-05-27 12:27 UTC
From: kevin at oceania dot net Assigned:
Status: Not a bug Package: Reproducible crash
PHP Version: 6, 5.2.0-cvs OS: Linux
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: kevin at oceania dot net
New email:
PHP Version: OS:

 

 [2006-05-27 11:16 UTC] kevin at oceania dot net
Description:
------------
... infinite recursion
[Sat May 27 21:42:49 2006] [notice] child pid 10096 exit signal Segmentation fault (11)
[Sat May 27 21:42:49 2006] [notice] child pid 10097 exit signal Segmentation fault (11)



Reproduce code:
---------------
http://phpro.org/segfault.phps

Expected result:
----------------
output html table

Actual result:
--------------
(gdb) bt
#0 0x00bd5f1f in _int_malloc () from /lib/tls/libc.so.6
#1 0x00bd7f81 in malloc () from /lib/tls/libc.so.6
#2 0xf61f206b in _emalloc (size=44, __zend_filename=0xf634e1a0 "/home/kevin/html/php/dev/php5.2-200605230630/Zend/zend_vm_execute.h", __zend_lineno=225, __zend_orig_filename=0x0, __zend_orig_lineno=0) at /home/kevin/html/php/dev/php5.2-200605230630/Zend/zend_alloc.c:182
#3 0xf622947b in zend_do_fcall_common_helper_SPEC (execute_data=0xfe34a200) at zend_vm_execute.h:225
#4 0xf6229fa0 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0xfe34a200) at zend_vm_execute.h:322
#5 0xf6228fd2 in execute (op_array=0xa157704) at zend_vm_execute.h:92
#6 0xf62294e8 in zend_do_fcall_common_helper_SPEC (execute_data=0xfe34a350) at zend_vm_execute.h:234
#7 0xf6229fa0 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0xfe34a350) at zend_vm_execute.h:322
#8 0xf6228fd2 in execute (op_array=0xa157704) at zend_vm_execute.h:92
#9 0xf62294e8 in zend_do_fcall_common_helper_SPEC (execute_data=0xfe34a4a0) at zend_vm_execute.h:234

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2006-05-27 12:14 UTC] bjori@php.net
Shorter reproducible code:
<?php
class foo {
 public function bar() {
  return $this->bar();
 }
}
$foo = new foo();
$foo->bar();
?>
 [2006-05-27 12:27 UTC] tony2001@php.net
Yes, smashing the stack produces segfault and this is expected.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Wed Nov 27 16:01:29 2024 UTC