ID: 38054
User updated by: john dot enevoldson at pulsen dot se
Reported By: john dot enevoldson at pulsen dot se
Status: Open
Bug Type: PDO related
Operating System: SLES 9.3 64 bit
PHP Version: 5.1.4
New Comment:
Hi,
Have done some more digging around and find bug 32800 and 32830
relating to odbc (not pdo) which is very similar to our original
problem - may give some clues...
Regards,
John.
Previous Comments:
------------------------------------------------------------------------
[2006-07-10 12:17:19] john dot enevoldson at pulsen dot se
missed this bit :
(gdb) frame 3
#3 0x000000008027e936 in execute (op_array=0x805139e8) at
zend_vm_execute.h:92
92 if (EX(opline)->handler(&execute_data
TSRMLS_CC) > 0) {
/John
------------------------------------------------------------------------
[2006-07-10 12:12:26] john dot enevoldson at pulsen dot se
Hi,
backtrace genereated for the segmentation fault using the 5.2 cvs:
(gdb) bt
#0 _zval_ptr_dtor (zval_ptr=0x3ffffffc280) at
/home/tje/php/php5.2-200607100830/Zend/zend_execute_API.c:393
#1 0x000000008021a356 in zend_do_fcall_common_helper_SPEC
(execute_data=0x3ffffffc750) at zend_execute.h:148
#2 0x000000008021a7e6 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER
(execute_data=<value optimized out>) at zend_vm_execute.h:322
#3 0x000000008027e936 in execute (op_array=0x805139e8) at
zend_vm_execute.h:92
#4 0x00000000801f5514 in zend_execute_scripts (type=8, retval=0x0,
file_count=3)
at /home/tje/php/php5.2-200607100830/Zend/zend.c:1110
#5 0x00000000801b1f18 in php_execute_script
(primary_file=0x3ffffffece8)
at /home/tje/php/php5.2-200607100830/main/main.c:1748
#6 0x0000000080280140 in main (argc=2, argv=0x3fffffff388) at
/home/tje/php/php5.2-200607100830/sapi/cli/php_cli.c:1097
(gdb)
Best regards,
John.
------------------------------------------------------------------------
[2006-07-10 11:45:38] [EMAIL PROTECTED]
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php for *NIX and
http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32
Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PHP better.
------------------------------------------------------------------------
[2006-07-10 11:24:50] john dot enevoldson at pulsen dot se
Hi,
Have installed php5.2-latest.tar.gz but now get a segmentation fault
during the connect processing,
Regards,
John.
------------------------------------------------------------------------
[2006-07-10 09:41:59] [EMAIL PROTECTED]
Please try using this CVS snapshot:
http://snaps.php.net/php5.2-latest.tar.gz
For Windows:
http://snaps.php.net/win32/php5.2-win32-latest.zip
What does var_dump($row); show, btw?
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/38054
--
Edit this bug report at http://bugs.php.net/?id=38054&edit=1