|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[2000-07-25 22:28 UTC] zak@php.net
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Mon Nov 03 23:00:01 2025 UTC |
Re: PHP 4 Bug id #4131 Hi, I have also encountered an Access Violation error, using ODBC + PHP4 RC1 + Win NT4 workstation SP5 In my case the error is occuring at the odbc_close call, after the odbc_result_all has finished printing the table. Dr Watson output is attached below In this case I am using SQL Server 7 + Microsoft ODBC drivers, DAC version 2.5 However a similar problem occurs using Access .mdb files, so the problems are not limited to Oracle Hope this helps. If you would like more info, please email. Regards Mike Beamish mjb@ihug.co.nz Application exception occurred: App: (pid=359) When: 4/18/2000 @ 17:54:9.134 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: MJB User Name: mjb Number of Processors: 1 Processor Type: x86 Family 5 Model 4 Stepping 4 Windows Version: 4.0 Current Build: 1381 Service Pack: 5 Current Type: Uniprocessor Free Registered Organization: Beca Group Registered Owner: M J Beamish *----> Task List <----* 0 Idle.exe 2 System.exe 20 SMSS.exe 24 CSRSS.exe 34 WINLOGON.exe 40 SERVICES.exe 43 LSASS.exe 65 SPOOLSS.exe 77 Hls32svc.exe 79 NAVAPSVC.exe 97 NSSRVICE.exe 106 NPSSVC.exe 114 RPCSS.exe 112 esserver.exe 129 PSTORES.exe 133 mstask.exe 141 sens.exe 167 alertsvc.exe 110 NDDEAGNT.exe 108 EXPLORER.exe 94 systray.exe 57 CPBrWtch.exe 194 nwtray.exe 205 AcroTray.exe 199 navapw32.exe 208 PGPTray.exe 211 Deskmenu.exe 216 MSOFFICE.exe 371 mysqld.exe 393 IEXPLORE.exe 384 CPal.exe 385 MDM.exe 397 OUTLOOK.exe 266 mapisp32.exe 269 notepad.exe 278 Apache.exe 237 Apache.exe 286 IEXPLORE.exe 359 php.exe 363 DRWTSN32.exe 0 _Total.exe (00400000 - 00400000) (77f60000 - 77fbe000) dll\ntdll.dbg (10000000 - 10000000) (77f00000 - 77f5e000) dll\kernel32.dbg (776d0000 - 776d8000) dll\wsock32.dbg (776b0000 - 776c4000) dll\ws2_32.dbg (78000000 - 78040000) (77e70000 - 77ec4000) dll\user32.dbg (77ed0000 - 77efc000) dll\gdi32.dbg (77dc0000 - 77dff000) dll\advapi32.dbg (77e10000 - 77e67000) dll\rpcrt4.dbg (776a0000 - 776a7000) dll\ws2help.dbg (77b20000 - 77bd6000) dll\ole32.dbg (65340000 - 653d2000) oleaut32.dbg (1f7d0000 - 1f804000) dll\ODBC32.dbg (77d80000 - 77db2000) dll\comdlg32.dbg (77c40000 - 77d7c000) dll\shell32.dbg (715a0000 - 71629000) COMCTL32.dbg (780a0000 - 780b2000) (1f8c0000 - 1f8c0000) (00da0000 - 00da0000) (00db0000 - 00db0000) (77a90000 - 77a9b000) dll\version.dbg (779c0000 - 779c8000) dll\lz32.dbg (77bf0000 - 77bf7000) dll\rpcltc1.dbg (1f820000 - 1f83a000) dll\ODBCCP32.dbg (55600000 - 55629000) dll\wspwsp.dbg (77660000 - 7766f000) dll\msafd.dbg (77690000 - 77699000) dll\wshtcpip.dbg (76e70000 - 76e82000) dll\secur128.dbg (71730000 - 71741000) dll\msapsspc.dbg (10200000 - 10200000) (77400000 - 77421000) dll\sch128c.dbg (5e380000 - 5e3a5000) dll\msoss.dbg (71300000 - 7135e000) dll\crypt32.dbg (71700000 - 7171f000) dll\msnsspc.dbg (60900000 - 6090e000) dll\digest.dbg State Dump for Thread Id 0x166 eax=00ca13c4 ebx=00ca16b8 ecx=00ca1be0 edx=00ca1f5c esi=00ca1be0 edi=00000001 eip=41249623 esp=0012fdac ebp=0012fdcc iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: <nosymbols> *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012fda8 1f7d7a57 00000003 010fa788 1f800000 00325ba0 <nosymbols> 0012fdcc 1f7d7866 00ca1be0 00000001 00000010 00000000 ODBC32!SQLFreeStmt 00000002 00000000 00000000 00000000 00000000 00000000 ODBC32!SQLFreeStmt *----> Raw Stack Dump <----* 0012fdac 57 7a 7d 1f 03 00 00 00 - 88 a7 0f 01 00 00 80 1f Wz}............. 0012fdbc a0 5b 32 00 20 78 32 00 - 00 00 00 00 00 00 00 00 .[2. x2......... 0012fdcc 02 00 00 00 66 78 7d 1f - e0 1b ca 00 01 00 00 00 ....fx}......... 0012fddc 10 00 00 00 00 00 00 00 - a0 5b 32 00 bf c9 02 10 .........[2..... 0012fdec e0 1b ca 00 01 00 00 00 - 30 70 32 00 ce 51 07 10 ........0p2..Q.. 0012fdfc a0 5b 32 00 94 15 30 00 - 1b 89 06 10 50 f0 30 00 .[2...0.....P.0. 0012fe0c 02 00 00 00 94 15 30 00 - 90 13 00 78 d8 14 30 00 ......0....x..0. 0012fe1c 9e 4f 07 10 94 15 30 00 - 00 00 00 00 00 00 00 00 .O....0......... 0012fe2c 02 00 00 00 02 00 00 00 - c0 8f 32 00 a0 76 32 00 ..........2..v2. 0012fe3c 30 70 32 00 4b 4f 07 10 - 94 15 30 00 02 00 00 00 0p2.KO....0..... 0012fe4c 04 00 00 00 a5 c3 06 10 - 02 00 00 00 cc 8f 32 00 ..............2. 0012fe5c 5c 05 07 10 a0 76 32 00 - a0 8d 32 00 a7 89 06 10 \....v2...2..... 0012fe6c cc 8f 32 00 48 14 30 00 - e0 13 30 00 4c ff 12 00 ..2.H.0...0.L... 0012fe7c e0 13 30 00 c0 03 07 10 - d8 14 30 00 20 03 0c 10 ..0.......0. ... 0012fe8c 60 04 07 10 10 02 30 00 - d0 19 30 00 84 e1 06 10 `.....0...0..... 0012fe9c e0 13 30 00 d0 19 30 00 - e0 02 0c 10 40 00 07 10 ..0...0.....@... 0012feac d0 19 30 00 5d 50 00 10 - d0 19 30 00 e0 13 30 00 ..0.]P....0...0. 0012febc 01 00 00 00 05 00 00 00 - 00 00 00 00 04 00 00 00 ................ 0012fecc 03 00 00 00 24 20 02 78 - 10 02 30 00 d0 19 30 00 ....$ .x..0...0. 0012fedc c0 18 40 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ..@............. State Dump for Thread Id 0x168 eax=1f7f480b ebx=010eff3c ecx=00000000 edx=00000000 esi=7ffdf000 edi=00000001 eip=77f6828b esp=010eff18 ebp=010eff6c iopl=0 nv up ei pl nz ac pe cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000213 function: NtWaitForMultipleObjects 77f68280 b8c4000000 mov eax,0xc4 77f68285 8d542404 lea edx,[esp+0x4] ss:01ffe91f=???????? 77f68289 cd2e int 2e 77f6828b c21400 ret 0x14 77f6828e 8bc0 mov eax,eax *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 010eff6c 77f1cd92 00000004 1f800668 00000000 ffffffff ntdll!NtWaitForMultipleObjects 010eff88 1f7f4838 00000004 1f800668 00000000 ffffffff kernel32!WaitForMultipleObjects 1f7d8a28 00430042 0049002e 0049004e 00000000 00000000 ODBC32!ODBCSetTryWaitValue