ID: 46029 Updated by: [EMAIL PROTECTED] Reported By: [EMAIL PROTECTED] -Status: Open +Status: Closed Bug Type: DOM XML related Operating System: * PHP Version: 5.2CVS, 5.3CVS, 6CVS New Comment:
This bug has been fixed in CVS. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. Thank you for the report, and for helping us make PHP better. Previous Comments: ------------------------------------------------------------------------ [2008-09-09 14:22:56] [EMAIL PROTECTED] See also: $x = new ReflectionMethod('domcomment', '__construct'); $x->invoke(new domcomment); ------------------------------------------------------------------------ [2008-09-09 14:11:54] [EMAIL PROTECTED] Description: ------------ See below. Reproduce code: --------------- <?php new domtext; print "ok!\n"; $x = new ReflectionMethod('domtext', '__construct'); $x->invoke(new domtext); print "ok!\n"; Expected result: ---------------- ok ok Actual result: -------------- ==7575== Process terminating with default action of signal 11 (SIGSEGV) ==7575== Bad permissions for mapped region at address 0x41BFAB4 ==7575== at 0x808B987: php_libxml_clear_object (libxml.c:147) ==7575== by 0x808B9E8: php_libxml_unregister_node (libxml.c:162) ==7575== by 0x808DDEB: php_libxml_node_free_resource (libxml.c:1008) ==7575== by 0x80F55FC: zim_domtext___construct (text.c:96) ==7575== by 0x83402CD: zend_call_function (zend_execute_API.c:1027) ==7575== by 0x819DE85: zim_reflection_method_invoke (php_reflection.c:2376) ==7575== by 0x8378AF9: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:200) ==7575== by 0x8379AE7: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:322) ==7575== by 0x8378593: execute (zend_vm_execute.h:92) ==7575== by 0x834F898: zend_execute_scripts (zend.c:1134) ==7575== by 0x82E8D09: php_execute_script (main.c:2011) ==7575== by 0x83D8C82: main (php_cli.c:1134) ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=46029&edit=1
