php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #65118 Building with IBM xlc phar enabled or make test results in segmentation fault
Submitted: 2013-06-25 06:45 UTC Modified: 2021-03-07 04:22 UTC
From: howard dot allison at chello dot at Assigned: cmb (profile)
Status: No Feedback Package: Compile Failure
PHP Version: 5.4.16 OS: AIX 6.1
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: howard dot allison at chello dot at
New email:
PHP Version: OS:

 

 [2013-06-25 06:45 UTC] howard dot allison at chello dot at
Description:
------------
Using IBM xlc with the following environment:
LDFLAGS=-L/opt/pware/lib -Wl,-blibpath:/opt/pware/lib:/usr/lib -Wl,-bmaxdata:0x80000000
CFLAGS=-qmaxmem=-1 -DSYSV -D_AIX -D_AIX32 -D_AIX41 -D_AIX43 -D_AIX51 -D_AIX52 -D_AIX53 -D_AIX61 -D_ALL_SOURCE -DFUNCPROTO=15 -O -I/opt/pware/include

on AIX 6.1 cannot build PHP with phar , and even if built without phar generates a core dump on make test.

Test script:
---------------
./configure --with-iconv=/opt/pware --with-libxml-dir=/opt/pware --enable-debug
make

Expected result:
----------------
successful make

Actual result:
--------------
Segmentation fault in zend_mm_panic at line 92 in file "/app/RpmBuild/Work/php-5.4.16/Zend/zend_alloc.c" ($t1)
   92           kill(getpid(), SIGSEGV);
(dbx) where
zend_mm_panic(message = "\200A"), line 92 in "zend_alloc.c"
_zend_mm_alloc_int(heap = (nil), size = 297, __zend_filename = (nil), __zend_lineno = 273675100, __zend_orig_filename = warning: Unable to access address 0x178 from core
(invalid char ptr (0x00000178)), __zend_orig_lineno = 0), line 2014 in "zend_alloc.c"
_emalloc(size = 273743976, __zend_filename = warning: Unable to access address 0x185 from core
(invalid char ptr (0x00000185)), __zend_lineno = 1, __zend_orig_filename = "", __zend_orig_lineno = 273743976), line 2425 in "zend_alloc.c"
_zend_hash_index_update_or_next_insert(ht = (nil), h = 805991784, pData = 0x2ff20660, nDataSize = 273727512, pDest = 0x100231b4, flag = 805816404, __zend_filename = "/\362^G^P0^G\244\324^P^Q^H ", __zend_lineno = 805807316), line 412 in "zend_hash.c"
ZEND_ADD_ARRAY_ELEMENT_SPEC_CONST_UNUSED_HANDLER(execute_data = 0x0000017c), line 5633 in "zend_vm_execute.h"
ZEND_INIT_ARRAY_SPEC_CONST_UNUSED_HANDLER(execute_data = (nil)), line 5653 in "zend_vm_execute.h"
unnamed block in zend_execute.execute(op_array = 0x2ff21e60), line 409 in "zend_vm_execute.h"
zend_execute.execute(op_array = 0x2ff21e60), line 409 in "zend_vm_execute.h"
zend_execute_scripts(type = 8, retval = (nil), file_count = 3, ... = 0x0, 0x2ff21e60, 0x0, 0x75696c64, 0x5f707265), line 1315 in "zend.c"
unnamed block in php_execute_script(primary_file = 0x2ff21e60), line 2494 in "main.c"
unnamed block in php_execute_script(primary_file = 0x2ff21e60), line 2494 in "main.c"
php_execute_script(primary_file = 0x2ff21e60), line 2494 in "main.c"
unnamed block in do_cli(argc = 13, argv = 0x2ff22690), line 988 in "php_cli.c"
do_cli(argc = 13, argv = 0x2ff22690), line 988 in "php_cli.c"
unnamed block in php_cli.main(argc = 13, argv = 0x2ff22690), line 1364 in "php_cli.c"
php_cli.main(argc = 13, argv = 0x2ff22690), line 1364 in "php_cli.c"


Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2013-09-08 08:37 UTC] howard dot allison at pva dot sozvers dot at
try changing your optimizer flag from -O to -O1
 [2021-02-23 13:24 UTC] cmb@php.net
-Status: Open +Status: Feedback -Assigned To: +Assigned To: cmb
 [2021-02-23 13:24 UTC] cmb@php.net
Is this still an issue with any of the actively supported PHP
versions[1]?

[1] <https://www.php.net/supported-versions.php>
 [2021-03-07 04:22 UTC] php-bugs at lists dot php dot net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Re-Opened". Thank you.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue Mar 19 11:01:28 2024 UTC