ID: 25190
Updated by: [email]jayphp.net[/email]
Reported By: gabor at netway dot hu
-Status: Open
+Status: Bogus
Bug Type: Unknown/Other Function
Operating System: Debian Linux
PHP Version: 4.3.3RC4
New Comment:

So by the looks of it, this is using ADOdb, which means
this is a third-party application and isn't necessarily a
PHP problem. You'll have to contact the ADOdb developers
and see what they say.

I don't know what OVS, but if it's another third-party
application, contact them as well.

J


Previous Comments:
------------------------------------------------------------------------

[2003-08-21 11:05:23] gabor at netway dot hu

Thank you :-).

------------------------------------------------------------------------

[2003-08-21 10:58:59] gabor at netway dot hu

the code is:

function OVS_Z050($ORA_SESS_ID){
global $conn;
$Z050_query="
BEGIN
msie_logout_session_proc (:sessid,:ipaddr,:result_rc);
END;
";
$stmt = $conn->PrepareSP($Z050_query);
$conn->Parameter($stmt,$ORA_SESS_ID,"sessid",27);
$conn->Parameter($stmt,getenv("REMOTE_ADDR"),"ipaddr",15 );
$conn->Parameter($stmt,$rc, "result_rc",12);
$conn->Execute($stmt);
if ($rc==500)
$msg = 'Logoff succeeded';
else {
$msg="ERROR(".$rc."): ";
if ($rc==(-501)){
$msg.="Logoff ok, but session timed out!";
echo "<script>
alert('".$msg."');
</script>
";

}
if ($rc==(-550)){
$msg.="LOGGING ERROR!";
echo "<script>
alert('".$msg."');
</script>
";

}
}
return $msg;
}

------------------------------------------------------------------------

[2003-08-21 10:47:36] [email]jayphp.net[/email]

Is this caused by some sort of third-party application?
What is OVS? Do you have a self-contained example that can
actually be reproduced? What does the function OVS_Z050()
do?

Unless you can answer these questions, this is likely
bogus.

J

------------------------------------------------------------------------

[2003-08-21 09:28:53] gabor at netway dot hu

Description:
------------
apache crash, and no more request.

Reproduce code:
---------------
include("head.php");

OVS_Z050($_SESSION["ovs_session"]);
sleep(5);
session_destroy();
?>


Expected result:
----------------
[Mon Aug 18 08:24:55 2003] [notice] Apache/1.3.26 Ben-SSL/1.48 (Unix)
Debian GNU/Linux PHP/4.3.3RC4-dev configured -- resuming normal
operations
[Mon Aug 18 08:24:55 2003] [notice] suEXEC mechanism enabled (wrapper:
/usr/lib/apache-ssl/suexec)
[Mon Aug 18 08:24:55 2003] [notice] Accept mutex: sysvsem (Default:
sysvsem)
[Mon Aug 18 10:48:18 2003] [notice] child pid 344 exit signal
Segmentation fault (11)
[Mon Aug 18 10:48:54 2003] [notice] child pid 341 exit signal
Segmentation fault (11)
[Mon Aug 18 10:49:37 2003] [notice] child pid 366 exit signal
Segmentation fault (11)
/usr/src/php4-STABLE-200308080930/Zend/zend_execute.c(1611) : Freeing
0x08151FAC (12 bytes), script=/var/www/ovs/ovs.members/php/Z050.php
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(295) : Freeing
0x0814CE14 (14520 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 2 times
Zend/zend_language_scanner.c(4619) : Freeing 0x08151EF4 (11 bytes),
script=/var/www/xx.php
Last leak repeated 118 times
Zend/zend_language_scanner.c(4484) : Freeing 0x08151EB4 (9 bytes),
script=/var/www/xx.php
Last leak repeated 80 times
Zend/zend_language_scanner.c(4492) : Freeing 0x08151D2C (20 bytes),
script=/var/www/xx.php
Last leak repeated 80 times
Zend/zend_language_scanner.c(3072) : Freeing 0x0814AA24 (84 bytes),
script=/var/www/xx.php
Last leak repeated 2 times
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(65) : Freeing
0x0814B5A4 (4 bytes), script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 2 times
Zend/zend_language_scanner.c(3911) : Freeing 0x0814B564 (16 bytes),
script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 5 times
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(854) : Freeing
0x0814B474 (13 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual
location (location was relayed)
Last leak repeated 1 time
/usr/src/php4-STABLE-200308080930/Zend/zend_opcode.c(230) : Freeing
0x081464D4 (12 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1761) : Freeing
0x08145E84 (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual
location (location was relayed)
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(1745) : Freeing
0x08145D2C (9 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual
location (location was relayed)
/usr/src/php4-STABLE-200308080930/Zend/zend_compile.c(2025) : Freeing
0x0814597C (8 bytes), script=/var/www/ovs/ovs.members/php/xx.php
/usr/src/php4-STABLE-200308080930/Zend/zend_variables.c(111) : Actual
location (location was relayed)
Last leak repeated 5 times
Zend/zend_language_scanner.c(4399) : Freeing 0x0814617C (3 bytes),
script=/var/www/ovs/ovs.members/php/xx.php
Last leak repeated 1 time
Zend/zend_language_scanner.c(4710) : Freeing 0x081410AC (9 bytes),
script=/var/www/ovs/ovs.members/php/xx.php
[Mon Aug 18 10:50:32 2003] [notice] child pid 342 exit signal
Segmentation fault (11)
[Mon Aug 18 10:51:52 2003] [notice] child pid 340 exit signal
Segmentation fault (11)
[Mon Aug 18 10:53:22 2003] [notice] child pid 339 exit signal
Segmentation fault (11)
[Mon Aug 18 14:03:12 2003] [notice] child pid 472 exit signal
Segmentation fault (11)
[Mon Aug 18 14:11:22 2003] [notice] child pid 433 exit signal
Segmentation fault (11)
[Mon Aug 18 14:12:32 2003] [notice] child pid 338 exit signal
Segmentation fault (11)
[Mon Aug 18 14:13:23 2003] [notice] child pid 434 exit signal
Segmentation fault (11)
[Mon Aug 18 14:15:11 2003] [notice] child pid 473 exit signal
Segmentation fault (11)
[Mon Aug 18 14:15:30 2003] [notice] child pid 443 exit signal
Segmentation fault (11)
[Mon Aug 18 14:15:57 2003] [notice] child pid 474 exit signal
Segmentation fault (11)




------------------------------------------------------------------------


--
Edit this bug report at [url]http://bugs.php.net/?id=25190&edit=1[/url]