ID: 38054 User updated by: john dot enevoldson at pulsen dot se Reported By: john dot enevoldson at pulsen dot se Status: Open Bug Type: PDO related Operating System: SLES 9.3 64 bit PHP Version: 5.1.4 New Comment:
Hi, Have done some more digging around and find bug 32800 and 32830 relating to odbc (not pdo) which is very similar to our original problem - may give some clues... Regards, John. Previous Comments: ------------------------------------------------------------------------ [2006-07-10 12:17:19] john dot enevoldson at pulsen dot se missed this bit : (gdb) frame 3 #3 0x000000008027e936 in execute (op_array=0x805139e8) at zend_vm_execute.h:92 92 if (EX(opline)->handler(&execute_data TSRMLS_CC) > 0) { /John ------------------------------------------------------------------------ [2006-07-10 12:12:26] john dot enevoldson at pulsen dot se Hi, backtrace genereated for the segmentation fault using the 5.2 cvs: (gdb) bt #0 _zval_ptr_dtor (zval_ptr=0x3ffffffc280) at /home/tje/php/php5.2-200607100830/Zend/zend_execute_API.c:393 #1 0x000000008021a356 in zend_do_fcall_common_helper_SPEC (execute_data=0x3ffffffc750) at zend_execute.h:148 #2 0x000000008021a7e6 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=<value optimized out>) at zend_vm_execute.h:322 #3 0x000000008027e936 in execute (op_array=0x805139e8) at zend_vm_execute.h:92 #4 0x00000000801f5514 in zend_execute_scripts (type=8, retval=0x0, file_count=3) at /home/tje/php/php5.2-200607100830/Zend/zend.c:1110 #5 0x00000000801b1f18 in php_execute_script (primary_file=0x3ffffffece8) at /home/tje/php/php5.2-200607100830/main/main.c:1748 #6 0x0000000080280140 in main (argc=2, argv=0x3fffffff388) at /home/tje/php/php5.2-200607100830/sapi/cli/php_cli.c:1097 (gdb) Best regards, John. ------------------------------------------------------------------------ [2006-07-10 11:45:38] [EMAIL PROTECTED] Thank you for this bug report. To properly diagnose the problem, we need a backtrace to see what is happening behind the scenes. To find out how to generate a backtrace, please read http://bugs.php.net/bugs-generating-backtrace.php for *NIX and http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32 Once you have generated a backtrace, please submit it to this bug report and change the status back to "Open". Thank you for helping us make PHP better. ------------------------------------------------------------------------ [2006-07-10 11:24:50] john dot enevoldson at pulsen dot se Hi, Have installed php5.2-latest.tar.gz but now get a segmentation fault during the connect processing, Regards, John. ------------------------------------------------------------------------ [2006-07-10 09:41:59] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows: http://snaps.php.net/win32/php5.2-win32-latest.zip What does var_dump($row); show, btw? ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/38054 -- Edit this bug report at http://bugs.php.net/?id=38054&edit=1