php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #25190 Segmentation fault
Submitted: 2003-08-21 09:28 UTC Modified: 2003-08-21 11:13 UTC
From: gabor at netway dot hu Assigned:
Status: Not a bug Package: Unknown/Other Function
PHP Version: 4.3.3RC4 OS: Debian Linux
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: gabor at netway dot hu
New email:
PHP Version: OS:

 

 [2003-08-21 09:28 UTC] gabor at netway dot hu
Description:
------------
apache crash, and no more request. 

Reproduce code:
---------------
include("head.php");

OVS_Z050($_SESSION["ovs_session"]);
sleep(5);
session_destroy();
?>


Expected result:
----------------
[Mon Aug 18 08:24:55 2003] [notice] Apache/1.3.26 Ben-SSL/1.48 (Unix) Debian GNU/Linux PHP/4.3.3RC4-dev configured -- resuming normal operations
[Mon Aug 18 08:24:55 2003] [notice] suEXEC mechanism enabled (wrapper: /usr/lib/apache-ssl/suexec)
[Mon Aug 18 08:24:55 2003] [notice] Accept mutex: sysvsem (Default: sysvsem)
[Mon Aug 18 10:48:18 2003] [notice] child pid 344 exit signal Segmentation fault (11)
[Mon Aug 18 10:48:54 2003] [notice] child pid 341 exit signal Segmentation fault (11)
[Mon Aug 18 10:49:37 2003] [notice] child pid 366 exit signal Segmentation fault (11)
/usr/src/php4-STABLE-200308080930/Zend/zend_execute.c(1611) :  Freeing 0x08151FAC (12 bytes), script=/var/www/ovs/ovs.members/php/Z050.php
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(295) :  Freeing 0x0814CE14 (14520 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 2 times
Zend/zend_language_scanner.c(4619) :  Freeing 0x08151EF4 (11 bytes), script=/var/www/xx.php
Last leak repeated 118 times
Zend/zend_language_scanner.c(4484) :  Freeing 0x08151EB4 (9 bytes), script=/var/www/xx.php
Last leak repeated 80 times
Zend/zend_language_scanner.c(4492) :  Freeing 0x08151D2C (20 bytes), script=/var/www/xx.php
Last leak repeated 80 times
Zend/zend_language_scanner.c(3072) :  Freeing 0x0814AA24 (84 bytes), script=/var/www/xx.php
Last leak repeated 2 times
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(65) :  Freeing 0x0814B5A4 (4 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 2 times
Zend/zend_language_scanner.c(3911) :  Freeing 0x0814B564 (16 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 5 times
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(854) :  Freeing 0x0814B474 (13 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
Last leak repeated 1 time
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(230) :  Freeing 0x081464D4 (12 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1761) :  Freeing 0x08145E84 (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1745) :  Freeing 0x08145D2C (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(2025) :  Freeing 0x0814597C (8 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual location (location was relayed)
Last leak repeated 5 times
Zend/zend_language_scanner.c(4399) :  Freeing 0x0814617C (3 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 1 time
Zend/zend_language_scanner.c(4710) :  Freeing 0x081410AC (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
[Mon Aug 18 10:50:32 2003] [notice] child pid 342 exit signal Segmentation fault (11)
[Mon Aug 18 10:51:52 2003] [notice] child pid 340 exit signal Segmentation fault (11)
[Mon Aug 18 10:53:22 2003] [notice] child pid 339 exit signal Segmentation fault (11)
[Mon Aug 18 14:03:12 2003] [notice] child pid 472 exit signal Segmentation fault (11)
[Mon Aug 18 14:11:22 2003] [notice] child pid 433 exit signal Segmentation fault (11)
[Mon Aug 18 14:12:32 2003] [notice] child pid 338 exit signal Segmentation fault (11)
[Mon Aug 18 14:13:23 2003] [notice] child pid 434 exit signal Segmentation fault (11)
[Mon Aug 18 14:15:11 2003] [notice] child pid 473 exit signal Segmentation fault (11)
[Mon Aug 18 14:15:30 2003] [notice] child pid 443 exit signal Segmentation fault (11)
[Mon Aug 18 14:15:57 2003] [notice] child pid 474 exit signal Segmentation fault (11)



Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2003-08-21 10:47 UTC] jay@php.net
Is this caused by some sort of third-party application? 
What is OVS? Do you have a self-contained example that can 
actually be reproduced? What does the function OVS_Z050() 
do? 
 
Unless you can answer these questions, this is likely 
bogus. 
 
J 
 [2003-08-21 10:58 UTC] gabor at netway dot hu
the code is:

  function OVS_Z050($ORA_SESS_ID){  
   global $conn;
   $Z050_query="
                BEGIN
		     msie_logout_session_proc (:sessid,:ipaddr,:result_rc);
                END;
                 ";
    $stmt = $conn->PrepareSP($Z050_query);
    $conn->Parameter($stmt,$ORA_SESS_ID,"sessid",27);
    $conn->Parameter($stmt,getenv("REMOTE_ADDR"),"ipaddr",15);
    $conn->Parameter($stmt,$rc, "result_rc",12);
    $conn->Execute($stmt);
    if ($rc==500)
     $msg = 'Logoff succeeded';
    else {
     $msg="ERROR(".$rc."): ";
     if ($rc==(-501)){
      $msg.="Logoff ok, but session timed out!";
      echo "<script>
              alert('".$msg."');	      
            </script> 
           ";      
      
     }
     if ($rc==(-550)){
      $msg.="LOGGING ERROR!";      
      echo "<script>
             alert('".$msg."');	      
            </script> 
           ";      
 
     }
    }       
     return $msg; 		 
  }
 [2003-08-21 11:05 UTC] gabor at netway dot hu
Thank you :-).
 [2003-08-21 11:13 UTC] jay@php.net
So by the looks of it, this is using ADOdb, which means 
this is a third-party application and isn't necessarily a 
PHP problem. You'll have to contact the ADOdb developers 
and see what they say. 
 
I don't know what OVS, but if it's another third-party 
application, contact them as well.  
 
J 
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat Oct 05 06:01:28 2024 UTC