ID: 48638 Updated by: [email protected] Reported By: Dessa at gmake dot de -Status: Open +Status: Feedback Bug Type: SQLite related Operating System: Gentoo Linux PHP Version: 5.2.10 New Comment:
Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows: http://windows.php.net/snapshots/ Previous Comments: ------------------------------------------------------------------------ [2009-06-22 10:11:17] Dessa at gmake dot de Description: ------------ looks like bug 38759 got regressed, im getting sqlite related segfaults here, that was working fine with 5.2.9 Reproduce code: --------------- http://cvs.php.net/viewvc.cgi/php-src/ext/sqlite/tests/bug38759.phpt?view=co&pathrev=PHP_5_2 Expected result: ---------------- it should work and not segfault: --TEST-- Bug #38759 (sqlite2 empty query causes segfault) --SKIPIF-- --FILE-- Segmentation fault Actual result: -------------- #0 sqlite_step (pVm=0x0, pN=0x28a59e8, pazValue=0x28a59d8, pazColName=0x28a59e0) at ./src/vdbe.c:117 db = <value optimized out> rc = <value optimized out> #1 0x000000000063825f in pdo_sqlite2_stmt_execute (stmt=0x28a5618, tsrm_ls=0x256c0c0) at /var/tmp/portage/dev- S = (pdo_sqlite2_stmt *) 0x28a59c8 errmsg = 0x0 tail = 0x28a43c1 "" #2 0x00000000005d5a1d in zim_PDO_query (ht=1, return_value=0x28a1918, return_value_ptr=0x0, this_ptr=0x28a1a08, return_value_used=1, tsrm_ls=0x256c0c0) at /var/tmp/portage/dev- dbh = (pdo_dbh_t *) 0x28a45d0 stmt = (pdo_stmt_t *) 0x28a5618 statement = 0x28a4360 " " statement_len = 1 #3 0x00000000007b8f08 in zend_do_fcall_common_helper_SPEC (execute_data=0x7fffb80e2ac0, tsrm_ls=0x256c0c0) at /var/tmp/portage/dev- return_reference = 0 '\0' opline = (zend_op *) 0x28a3cf8 original_return_value = (zval **) 0x7b685e current_scope = (zend_class_entry *) 0x0 current_this = (zval *) 0x0 return_value_used = 1 should_change_scope = 1 '\001' ---Type <return> to continue, or q <return> to quit--- ctor_opline = (zend_op *) 0x2570898 #4 0x00000000007ba4a6 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0x7fffb80e2ac0, tsrm_ls=0x256c0c0) at /var/tmp/portage/dev- No locals. #5 0x00000000007b880d in execute (op_array=0x28a2770, tsrm_ls=0x256c0c0) at /var/tmp/portage/dev- execute_data = {opline = 0x28a3cf8, function_state = {function_symbol_table = 0x0, function = 0x26e3b00, reserved = {0x256c0c0, 0x7fffb80e2b20, 0x778fcc, 0x0}}, fbc = 0x26e3b00, op_array = 0x28a2770, object = 0x28a1a08, Ts = 0x7fffb80e2880, CVs = 0x7fffb80e2860, original_in_execution = 0 '\0', symbol_table = 0x2570708, prev_execute_data = 0x0, old_error_reporting = 0x0} #6 0x0000000000788093 in zend_execute_scripts (type=8, tsrm_ls=0x256c0c0, retval=0x0, file_count=3) at /var/tmp/portage/dev- files = {{gp_offset = 48, fp_offset = 48, overflow_arg_area = 0x7fffb80e2cf0, reg_save_area = 0x7fffb80e2c20}} i = 1 file_handle = (zend_file_handle *) 0x7fffb80e5150 orig_op_array = (zend_op_array *) 0x0 orig_retval_ptr_ptr = (zval **) 0x0 local_retval = (zval *) 0x0 #7 0x0000000000706b5e in php_execute_script (primary_file=0x7fffb80e5150, tsrm_ls=0x256c0c0) at /var/tmp/portage/dev- realfile = "/root/bug38759.phpt?revision=1.1.2.2", '\0' <repeats 28 times>, "\b\224^�\b\177\000\000� times>, "`\237z\002\000\000\000\000\200�\223� 0\000\000\000/root/bug38759.phpt?revision=1.1.2.2\000\000\000\000A times>, "��V\002", '\0' <repeats 1812 times>... __orig_bailout = (jmp_buf *) 0x7fffb80e4fb0 __bailout = {{__jmpbuf = {9011888, -7503417721723515127, 4678928, 140736281334688, 0, 0, -7503417718615535863, 7503544168444235529}, __mask_was_saved = 0, __saved_mask = {__val = { 2455514271280, 11398456, 42605064, 42759856, 39239872, 140736281333520, 8582469, 11398456, 524, 0, 0, 39239872, 7356436, 0, 39239872, 3}}}} prepend_file_p = (zend_file_handle *) 0x0 append_file_p = (zend_file_handle *) 0x0 prepend_file = {type = 0 '\0', filename = 0x0, opened_path = 0x0, handle = {fd = 0, fp = 0x0, stream = {handle = 0x0, reader = 0, closer = 0, fteller = 0, interactive = 0}}, free_filename = 0 '\0'} append_file = {type = 0 '\0', filename = 0x0, opened_path = 0x0, handle = {fd = 0, fp = 0x0, stream = {handle = 0x0, reader = 0, closer = 0, fteller = 0, interactive = 0}}, free_filename = 0 '\0'} old_cwd = 0x7fffb80e2d10 "" retval = 0 #8 0x0000000000830f7f in main (argc=3, argv=0x7fffb80e53a8) at /var/tmp/portage/dev- __orig_bailout = (jmp_buf *) 0x0 __bailout = {{__jmpbuf = {9011888, -7503417722704982263, 4678928, 140736281334688, 0, 0, -7503417721725612279, 7503542677798948617}, __mask_was_saved = 0, __saved_mask = {__val = { 139675223866362, 139675211617624, 139675223859464, 4294967296, 4294967453, 4456561, 139675288026563, 140736281334128, 139675290077576, 30, 139675288026563, 3309007967, 139675290077576, 30, 36, 4287062190}}}} exit_status = 0 ---Type <return> to continue, or q <return> to quit--- c = -1 file_handle = {type = 2 '\002', filename = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2", opened_path = 0x0, handle = { fd = 42758960, fp = 0x28c7330, stream = {handle = 0x28c7330, reader = 0x7a5b34 <zend_stream_stdio_reader>, closer = 0x7a5b64 <zend_stream_stdio_closer>, fteller = 0x7a5b92 <zend_stream_stdio_fteller>, interactive = 0}}, free_filename = 0 '\0'} behavior = 1 reflection_what = 0x0 orig_optind = 1 orig_optarg = 0x0 arg_free = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2" arg_excp = (char **) 0x7fffb80e53b8 script_file = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2" interactive = 0 module_started = 1 request_started = 1 lineno = 1 exec_direct = 0x0 exec_run = 0x0 exec_begin = 0x0 exec_end = 0x0 param_error = 0x0 hide_argv = 0 tsrm_ls = (void ***) 0x256c0c0 ini_entries_len = 110 ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=48638&edit=1
