php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #4171 Re: PHP 4 Bug id #4131
Submitted: 2000-04-18 03:58 UTC Modified: 2000-07-25 22:28 UTC
From: mjb at ihug dot co dot nz Assigned:
Status: Closed Package: ODBC related
PHP Version: 4.0 Release Candidate 1 OS: winnt
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: mjb at ihug dot co dot nz
New email:
PHP Version: OS:

 

 [2000-04-18 03:58 UTC] mjb at ihug dot co dot nz
Re: PHP 4 Bug id #4131

Hi,
 
I have also encountered an Access Violation error, using ODBC + PHP4 RC1 + Win NT4 workstation SP5
 
In my case the error is occuring at the odbc_close call, after the odbc_result_all has finished printing the table. 
Dr Watson output is attached below
 
In this case I am using SQL Server 7 + Microsoft ODBC drivers, DAC version 2.5
However a similar problem occurs using Access .mdb files, so the problems are not limited to Oracle 
 
Hope this helps. If you would like more info, please email. 
 
Regards
Mike Beamish
mjb@ihug.co.nz 

Application exception occurred:
        App:  (pid=359)
        When: 4/18/2000 @ 17:54:9.134
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: MJB
        User Name: mjb
        Number of Processors: 1
        Processor Type: x86 Family 5 Model 4 Stepping 4
        Windows Version: 4.0
        Current Build: 1381
        Service Pack: 5
        Current Type: Uniprocessor Free
        Registered Organization: Beca Group
        Registered Owner: M J Beamish

*----> Task List <----*
   0 Idle.exe
   2 System.exe
  20 SMSS.exe
  24 CSRSS.exe
  34 WINLOGON.exe
  40 SERVICES.exe
  43 LSASS.exe
  65 SPOOLSS.exe
  77 Hls32svc.exe
  79 NAVAPSVC.exe
  97 NSSRVICE.exe
 106 NPSSVC.exe
 114 RPCSS.exe
 112 esserver.exe
 129 PSTORES.exe
 133 mstask.exe
 141 sens.exe
 167 alertsvc.exe
 110 NDDEAGNT.exe
 108 EXPLORER.exe
  94 systray.exe
  57 CPBrWtch.exe
 194 nwtray.exe
 205 AcroTray.exe
 199 navapw32.exe
 208 PGPTray.exe
 211 Deskmenu.exe
 216 MSOFFICE.exe
 371 mysqld.exe
 393 IEXPLORE.exe
 384 CPal.exe
 385 MDM.exe
 397 OUTLOOK.exe
 266 mapisp32.exe
 269 notepad.exe
 278 Apache.exe
 237 Apache.exe
 286 IEXPLORE.exe
 359 php.exe
 363 DRWTSN32.exe
   0 _Total.exe

(00400000 - 00400000) 
(77f60000 - 77fbe000) dll\ntdll.dbg
(10000000 - 10000000) 
(77f00000 - 77f5e000) dll\kernel32.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78040000) 
(77e70000 - 77ec4000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776a0000 - 776a7000) dll\ws2help.dbg
(77b20000 - 77bd6000) dll\ole32.dbg
(65340000 - 653d2000) oleaut32.dbg
(1f7d0000 - 1f804000) dll\ODBC32.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(77c40000 - 77d7c000) dll\shell32.dbg
(715a0000 - 71629000) COMCTL32.dbg
(780a0000 - 780b2000) 
(1f8c0000 - 1f8c0000) 
(00da0000 - 00da0000) 
(00db0000 - 00db0000) 
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(1f820000 - 1f83a000) dll\ODBCCP32.dbg
(55600000 - 55629000) dll\wspwsp.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(76e70000 - 76e82000) dll\secur128.dbg
(71730000 - 71741000) dll\msapsspc.dbg
(10200000 - 10200000) 
(77400000 - 77421000) dll\sch128c.dbg
(5e380000 - 5e3a5000) dll\msoss.dbg
(71300000 - 7135e000) dll\crypt32.dbg
(71700000 - 7171f000) dll\msnsspc.dbg
(60900000 - 6090e000) dll\digest.dbg

State Dump for Thread Id 0x166

eax=00ca13c4 ebx=00ca16b8 ecx=00ca1be0 edx=00ca1f5c esi=00ca1be0 edi=00000001
eip=41249623 esp=0012fdac ebp=0012fdcc iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202


function: <nosymbols>

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012fda8 1f7d7a57 00000003 010fa788 1f800000 00325ba0 <nosymbols> 
0012fdcc 1f7d7866 00ca1be0 00000001 00000010 00000000 ODBC32!SQLFreeStmt 
00000002 00000000 00000000 00000000 00000000 00000000 ODBC32!SQLFreeStmt 

*----> Raw Stack Dump <----*
0012fdac  57 7a 7d 1f 03 00 00 00 - 88 a7 0f 01 00 00 80 1f  Wz}.............
0012fdbc  a0 5b 32 00 20 78 32 00 - 00 00 00 00 00 00 00 00  .[2. x2.........
0012fdcc  02 00 00 00 66 78 7d 1f - e0 1b ca 00 01 00 00 00  ....fx}.........
0012fddc  10 00 00 00 00 00 00 00 - a0 5b 32 00 bf c9 02 10  .........[2.....
0012fdec  e0 1b ca 00 01 00 00 00 - 30 70 32 00 ce 51 07 10  ........0p2..Q..
0012fdfc  a0 5b 32 00 94 15 30 00 - 1b 89 06 10 50 f0 30 00  .[2...0.....P.0.
0012fe0c  02 00 00 00 94 15 30 00 - 90 13 00 78 d8 14 30 00  ......0....x..0.
0012fe1c  9e 4f 07 10 94 15 30 00 - 00 00 00 00 00 00 00 00  .O....0.........
0012fe2c  02 00 00 00 02 00 00 00 - c0 8f 32 00 a0 76 32 00  ..........2..v2.
0012fe3c  30 70 32 00 4b 4f 07 10 - 94 15 30 00 02 00 00 00  0p2.KO....0.....
0012fe4c  04 00 00 00 a5 c3 06 10 - 02 00 00 00 cc 8f 32 00  ..............2.
0012fe5c  5c 05 07 10 a0 76 32 00 - a0 8d 32 00 a7 89 06 10  \....v2...2.....
0012fe6c  cc 8f 32 00 48 14 30 00 - e0 13 30 00 4c ff 12 00  ..2.H.0...0.L...
0012fe7c  e0 13 30 00 c0 03 07 10 - d8 14 30 00 20 03 0c 10  ..0.......0. ...
0012fe8c  60 04 07 10 10 02 30 00 - d0 19 30 00 84 e1 06 10  `.....0...0.....
0012fe9c  e0 13 30 00 d0 19 30 00 - e0 02 0c 10 40 00 07 10  ..0...0.....@...
0012feac  d0 19 30 00 5d 50 00 10 - d0 19 30 00 e0 13 30 00  ..0.]P....0...0.
0012febc  01 00 00 00 05 00 00 00 - 00 00 00 00 04 00 00 00  ................
0012fecc  03 00 00 00 24 20 02 78 - 10 02 30 00 d0 19 30 00  ....$ .x..0...0.
0012fedc  c0 18 40 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ..@.............

State Dump for Thread Id 0x168

eax=1f7f480b ebx=010eff3c ecx=00000000 edx=00000000 esi=7ffdf000 edi=00000001
eip=77f6828b esp=010eff18 ebp=010eff6c iopl=0         nv up ei pl nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000213


function: NtWaitForMultipleObjects
        77f68280 b8c4000000       mov     eax,0xc4
        77f68285 8d542404         lea     edx,[esp+0x4]          ss:01ffe91f=????????
        77f68289 cd2e             int     2e
        77f6828b c21400           ret     0x14
        77f6828e 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
010eff6c 77f1cd92 00000004 1f800668 00000000 ffffffff ntdll!NtWaitForMultipleObjects 
010eff88 1f7f4838 00000004 1f800668 00000000 ffffffff kernel32!WaitForMultipleObjects 
1f7d8a28 00430042 0049002e 0049004e 00000000 00000000 ODBC32!ODBCSetTryWaitValue 

 

 

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2000-07-25 22:28 UTC] zak@php.net
I cannot reproduce this bug using NT 4 and php 4.0.0 connecting to an access db.

Please try a new release of PHP.  If the problem still occurs, please submit a new bug report.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Wed Dec 04 18:01:31 2024 UTC