|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #81311 Segfault running test suite with JIT enabled
Submitted: 2021-07-29 19:30 UTC Modified: 2021-07-29 21:17 UTC
From: smokey101stair at gmail dot com Assigned:
Status: Open Package: JIT
PHP Version: 8.0.9 OS: Windows + Linux
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Bug Type:
From: smokey101stair at gmail dot com
New email:
PHP Version: OS:


 [2021-07-29 19:30 UTC] smokey101stair at gmail dot com
Getting a segfault when running a specific test in my test suite. It happens on both PHP 8.0.8 and 8.0.9, as well as Ubuntu. Unfortunately, I don't have a reduced test case, but have provided a core dump and backtrace. I was unable to reproduce in a debug build on Ubuntu, but was able to on Windows with debug symbols. VisualStudio says "execute_data->opline is nullptr". I can publish a branch with the test suite if needed.

PHP 8.0.8 (cli) (built: Jun 29 2021 16:03:59) ( NTS Visual C++ 2019 x64 )
Copyright (c) The PHP Group
Zend Engine v4.0.8, Copyright (c) Zend Technologies
    with Zend OPcache v8.0.8, Copyright (c), by Zend Technologies


Core dumps:

Actual result:

[0x7ffd53677e86]	php8!execute_ex+26 [D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_vm_execute.h @ 54335 + 6]	  D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_vm_execute.h @ 54335 + 6
[0x7ffd53666136]	php8!zend_call_function+2c6 [D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_execute_API.c @ 896]	  D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_execute_API.c @ 896
[0x7ffd53665e3b]	php8!zend_call_known_function+6b [D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_execute_API.c @ 986]	  D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_execute_API.c @ 986
[0x7ffd53b62ec8]	php8!zend_std_call_getter+50 [D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_object_handlers.c @ 183]	  D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_object_handlers.c @ 183
[0x7ffd53a8c0d6]	php8!zend_std_read_property+40fdb6 [D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_object_handlers.c @ 646]	  D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\Zend\zend_object_handlers.c @ 646
[0x7ffd7d7bd8fc]	php_opcache!zend_jit_fetch_obj_r_slow+4c [D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\ext\opcache\jit\zend_jit_helpers.c @ 1550 + 1a]	  D:\a\php-ftw\php-ftw\php\vs16\x64\php-8.0.8\ext\opcache\jit\zend_jit_helpers.c @ 1550 + 1a
[0x10001004c063]	0x00001000`1004c063	  
[0x00000001]	0x00000001


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2021-07-29 21:17 UTC]
-Operating System: Windows 10 +Operating System: Windows + Linux
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Wed Apr 24 04:01:30 2024 UTC