php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #48638 sqlite2 tests/bug38759.phpt fails
Submitted: 2009-06-22 10:11 UTC Modified: 2009-07-06 01:00 UTC
From: Dessa at gmake dot de Assigned:
Status: No Feedback Package: SQLite related
PHP Version: 5.2.10 OS: Gentoo Linux
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: Dessa at gmake dot de
New email:
PHP Version: OS:

 

 [2009-06-22 10:11 UTC] Dessa at gmake dot de
Description:
------------
looks like bug 38759 got regressed, im getting sqlite related
segfaults here, that was working fine with 5.2.9

Reproduce code:
---------------
http://cvs.php.net/viewvc.cgi/php-src/ext/sqlite/tests/bug38759.phpt?view=co&pathrev=PHP_5_2

Expected result:
----------------
it should work and not segfault:
--TEST--
Bug #38759 (sqlite2 empty query causes segfault)
--SKIPIF--
--FILE--
Segmentation fault

Actual result:
--------------
#0  sqlite_step (pVm=0x0, pN=0x28a59e8, pazValue=0x28a59d8,
pazColName=0x28a59e0)                
    at ./src/vdbe.c:117                                                                          
        db = <value optimized out>                                                               
        rc = <value optimized out>                                                               
#1  0x000000000063825f in pdo_sqlite2_stmt_execute (stmt=0x28a5618,
tsrm_ls=0x256c0c0)           
    at /var/tmp/portage/dev-
        S = (pdo_sqlite2_stmt *) 0x28a59c8                                                       
        errmsg = 0x0                                                                             
        tail = 0x28a43c1 ""                                                                      
#2  0x00000000005d5a1d in zim_PDO_query (ht=1,
return_value=0x28a1918, return_value_ptr=0x0,     
    this_ptr=0x28a1a08, return_value_used=1, tsrm_ls=0x256c0c0)                                  
    at /var/tmp/portage/dev-
        dbh = (pdo_dbh_t *) 0x28a45d0                                                            
        stmt = (pdo_stmt_t *) 0x28a5618                                                          
        statement = 0x28a4360 " "                                                                
        statement_len = 1                                                                        
#3  0x00000000007b8f08 in zend_do_fcall_common_helper_SPEC
(execute_data=0x7fffb80e2ac0,         
    tsrm_ls=0x256c0c0)                                                                           
    at /var/tmp/portage/dev-
        return_reference = 0 '\0'                                                                
        opline = (zend_op *) 0x28a3cf8                                                           
        original_return_value = (zval **) 0x7b685e                                               
        current_scope = (zend_class_entry *) 0x0                                                 
        current_this = (zval *) 0x0                                                              
        return_value_used = 1                                                                    
        should_change_scope = 1 '\001'                                                           
---Type <return> to continue, or q <return> to quit---                                           
        ctor_opline = (zend_op *) 0x2570898                                                      
#4  0x00000000007ba4a6 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER
(execute_data=0x7fffb80e2ac0,       
    tsrm_ls=0x256c0c0)                                                                           
    at /var/tmp/portage/dev-
No locals.                                                                                       
#5  0x00000000007b880d in execute (op_array=0x28a2770,
tsrm_ls=0x256c0c0)                        
    at /var/tmp/portage/dev-
        execute_data = {opline = 0x28a3cf8, function_state =
{function_symbol_table = 0x0,       
    function = 0x26e3b00, reserved = {0x256c0c0, 0x7fffb80e2b20,
0x778fcc, 0x0}}, fbc = 0x26e3b00, 
  op_array = 0x28a2770, object = 0x28a1a08, Ts = 0x7fffb80e2880, CVs
= 0x7fffb80e2860,             
  original_in_execution = 0 '\0', symbol_table = 0x2570708,
prev_execute_data = 0x0,               
  old_error_reporting = 0x0}                                                                       
#6  0x0000000000788093 in zend_execute_scripts (type=8,
tsrm_ls=0x256c0c0, retval=0x0,             
    file_count=3) at /var/tmp/portage/dev-
        files = {{gp_offset = 48, fp_offset = 48, overflow_arg_area =
0x7fffb80e2cf0,              
    reg_save_area = 0x7fffb80e2c20}}                                                               
        i = 1                                                                                      
        file_handle = (zend_file_handle *) 0x7fffb80e5150                                          
        orig_op_array = (zend_op_array *) 0x0                                                      
        orig_retval_ptr_ptr = (zval **) 0x0                                                        
        local_retval = (zval *) 0x0                                                                
#7  0x0000000000706b5e in php_execute_script
(primary_file=0x7fffb80e5150, tsrm_ls=0x256c0c0)      
    at /var/tmp/portage/dev-
        realfile = "/root/bug38759.phpt?revision=1.1.2.2", '\0'
<repeats 28 times>,
"\b\224^&#65533;\b\177\000\000&#65533;
times>,
"`\237z\002\000\000\000\000\200&#65533;\223&#65533;
0\000\000\000/root/bug38759.phpt?revision=1.1.2.2\000\000\000\000&#65
times>, "&#65533;&#65533;V\002", '\0' <repeats 1812 times>...                   
        __orig_bailout = (jmp_buf *) 0x7fffb80e4fb0                                                 
        __bailout = {{__jmpbuf = {9011888, -7503417721723515127,
4678928, 140736281334688, 0, 0,    
      -7503417718615535863, 7503544168444235529}, __mask_was_saved =
0, __saved_mask = {__val = {   
        2455514271280, 11398456, 42605064, 42759856, 39239872,
140736281333520, 8582469, 11398456,  
        524, 0, 0, 39239872, 7356436, 0, 39239872, 3}}}}                                            
        prepend_file_p = (zend_file_handle *) 0x0                                                   
        append_file_p = (zend_file_handle *) 0x0                                                    
        prepend_file = {type = 0 '\0', filename = 0x0, opened_path =
0x0, handle = {fd = 0,         
    fp = 0x0, stream = {handle = 0x0, reader = 0, closer = 0, fteller
= 0, interactive = 0}},       
  free_filename = 0 '\0'}                                                                           
        append_file = {type = 0 '\0', filename = 0x0, opened_path =
0x0, handle = {fd = 0,          
    fp = 0x0, stream = {handle = 0x0, reader = 0, closer = 0, fteller
= 0, interactive = 0}},       
  free_filename = 0 '\0'}                                                                           
        old_cwd = 0x7fffb80e2d10 ""                                                                 
        retval = 0                                                                                  
#8  0x0000000000830f7f in main (argc=3, argv=0x7fffb80e53a8)                                        
    at /var/tmp/portage/dev-
        __orig_bailout = (jmp_buf *) 0x0                                                            
        __bailout = {{__jmpbuf = {9011888, -7503417722704982263,
4678928, 140736281334688, 0, 0,    
      -7503417721725612279, 7503542677798948617}, __mask_was_saved =
0, __saved_mask = {__val = {   
        139675223866362, 139675211617624, 139675223859464,
4294967296, 4294967453, 4456561,         
        139675288026563, 140736281334128, 139675290077576, 30,
139675288026563, 3309007967,         
        139675290077576, 30, 36, 4287062190}}}}                                                     
        exit_status = 0                                                                             
---Type <return> to continue, or q <return> to quit---
        c = -1
        file_handle = {type = 2 '\002',
  filename = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2",
opened_path = 0x0, handle = {
    fd = 42758960, fp = 0x28c7330, stream = {handle = 0x28c7330,
      reader = 0x7a5b34 <zend_stream_stdio_reader>, closer = 0x7a5b64
<zend_stream_stdio_closer>,
      fteller = 0x7a5b92 <zend_stream_stdio_fteller>, interactive =
0}}, free_filename = 0 '\0'}
        behavior = 1
        reflection_what = 0x0
        orig_optind = 1
        orig_optarg = 0x0
        arg_free = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2"
        arg_excp = (char **) 0x7fffb80e53b8
        script_file = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2"
        interactive = 0
        module_started = 1
        request_started = 1
        lineno = 1
        exec_direct = 0x0
        exec_run = 0x0
        exec_begin = 0x0
        exec_end = 0x0
        param_error = 0x0
        hide_argv = 0
        tsrm_ls = (void ***) 0x256c0c0
        ini_entries_len = 110


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2009-06-28 02:48 UTC] felipe@php.net
Please try using this CVS snapshot:

  http://snaps.php.net/php5.2-latest.tar.gz
 
For Windows:

  http://windows.php.net/snapshots/


 [2009-07-06 01:00 UTC] php-bugs at lists dot php dot net
No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Thu Mar 13 20:01:30 2025 UTC