|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #80131 Random Segmentation Fault running php cli
Submitted: 2020-09-21 23:07 UTC Modified: 2020-10-04 04:22 UTC
From: carlos_eduardo309 at hotmail dot com Assigned:
Status: No Feedback Package: Unknown/Other Function
PHP Version: 7.4.10 OS: linux
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Bug Type:
From: carlos_eduardo309 at hotmail dot com
New email:
PHP Version: OS:


 [2020-09-21 23:07 UTC] carlos_eduardo309 at hotmail dot com
i was running codeception unit tests and randomly since 7.3 im getting this segmentation error

root@5a71577a17f0:/tmp# gdb php core.5a71577a17f0.php.1600676425 
GNU gdb (Debian 8.2.1-2+b3) 8.2.1
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
Find the GDB manual and other documentation resources online at:

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from php...(no debugging symbols found)...done.
[New LWP 559]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/".
Core was generated by `php ../../vendor/bin/codecept run unit ./tests/unit/modules/forms/models/mongo/'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x0000556fd6d831a1 in _emalloc ()
(gdb) bt
#0  0x0000556fd6d831a1 in _emalloc ()
#1  0x0000556fd6bfb968 in ?? ()
#2  0x0000556fd6bfa1e7 in ?? ()
#3  0x0000556fd6bf7206 in php_json_decode_ex ()
#4  0x0000556fd6bf73b6 in ?? ()
#5  0x0000556fd6e28901 in execute_ex ()
#6  0x0000556fd6e2da53 in zend_execute ()
#7  0x0000556fd6da80f3 in zend_execute_scripts ()
#8  0x0000556fd6d47ee0 in php_execute_script ()
#9  0x0000556fd6e2fb36 in ?? ()
#10 0x0000556fd6ae492b in ?? ()
#11 0x00007f870cbcd09b in __libc_start_main (main=0x556fd6ae44e0, argc=5, argv=0x7fff9736de48, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff9736de38)
    at ../csu/libc-start.c:308
#12 0x0000556fd6ae506a in _start ()


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2020-09-21 23:19 UTC]
-Status: Open +Status: Feedback
 [2020-09-21 23:19 UTC]
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves.

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external
resources such as databases, etc. If the script requires a
database to demonstrate the issue, please make sure it creates
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.

 [2020-10-04 04:22 UTC] php-bugs at lists dot php dot net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Re-Opened". Thank you.
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue Apr 16 12:01:29 2024 UTC