php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #48638 sqlite2 tests/bug38759.phpt fails
Submitted: 2009-06-22 10:11 UTC Modified: 2009-07-06 01:00 UTC
From: Dessa at gmake dot de Assigned:
Status: No Feedback Package: SQLite related
PHP Version: 5.2.10 OS: Gentoo Linux
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: Dessa at gmake dot de
New email:
PHP Version: OS:

 

 [2009-06-22 10:11 UTC] Dessa at gmake dot de
Description:
------------
looks like bug 38759 got regressed, im getting sqlite related
segfaults here, that was working fine with 5.2.9

Reproduce code:
---------------
http://cvs.php.net/viewvc.cgi/php-src/ext/sqlite/tests/bug38759.phpt?view=co&pathrev=PHP_5_2

Expected result:
----------------
it should work and not segfault:
--TEST--
Bug #38759 (sqlite2 empty query causes segfault)
--SKIPIF--
--FILE--
Segmentation fault

Actual result:
--------------
#0  sqlite_step (pVm=0x0, pN=0x28a59e8, pazValue=0x28a59d8,
pazColName=0x28a59e0)                
    at ./src/vdbe.c:117                                                                          
        db = <value optimized out>                                                               
        rc = <value optimized out>                                                               
#1  0x000000000063825f in pdo_sqlite2_stmt_execute (stmt=0x28a5618,
tsrm_ls=0x256c0c0)           
    at /var/tmp/portage/dev-
        S = (pdo_sqlite2_stmt *) 0x28a59c8                                                       
        errmsg = 0x0                                                                             
        tail = 0x28a43c1 ""                                                                      
#2  0x00000000005d5a1d in zim_PDO_query (ht=1,
return_value=0x28a1918, return_value_ptr=0x0,     
    this_ptr=0x28a1a08, return_value_used=1, tsrm_ls=0x256c0c0)                                  
    at /var/tmp/portage/dev-
        dbh = (pdo_dbh_t *) 0x28a45d0                                                            
        stmt = (pdo_stmt_t *) 0x28a5618                                                          
        statement = 0x28a4360 " "                                                                
        statement_len = 1                                                                        
#3  0x00000000007b8f08 in zend_do_fcall_common_helper_SPEC
(execute_data=0x7fffb80e2ac0,         
    tsrm_ls=0x256c0c0)                                                                           
    at /var/tmp/portage/dev-
        return_reference = 0 '\0'                                                                
        opline = (zend_op *) 0x28a3cf8                                                           
        original_return_value = (zval **) 0x7b685e                                               
        current_scope = (zend_class_entry *) 0x0                                                 
        current_this = (zval *) 0x0                                                              
        return_value_used = 1                                                                    
        should_change_scope = 1 '\001'                                                           
---Type <return> to continue, or q <return> to quit---                                           
        ctor_opline = (zend_op *) 0x2570898                                                      
#4  0x00000000007ba4a6 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER
(execute_data=0x7fffb80e2ac0,       
    tsrm_ls=0x256c0c0)                                                                           
    at /var/tmp/portage/dev-
No locals.                                                                                       
#5  0x00000000007b880d in execute (op_array=0x28a2770,
tsrm_ls=0x256c0c0)                        
    at /var/tmp/portage/dev-
        execute_data = {opline = 0x28a3cf8, function_state =
{function_symbol_table = 0x0,       
    function = 0x26e3b00, reserved = {0x256c0c0, 0x7fffb80e2b20,
0x778fcc, 0x0}}, fbc = 0x26e3b00, 
  op_array = 0x28a2770, object = 0x28a1a08, Ts = 0x7fffb80e2880, CVs
= 0x7fffb80e2860,             
  original_in_execution = 0 '\0', symbol_table = 0x2570708,
prev_execute_data = 0x0,               
  old_error_reporting = 0x0}                                                                       
#6  0x0000000000788093 in zend_execute_scripts (type=8,
tsrm_ls=0x256c0c0, retval=0x0,             
    file_count=3) at /var/tmp/portage/dev-
        files = {{gp_offset = 48, fp_offset = 48, overflow_arg_area =
0x7fffb80e2cf0,              
    reg_save_area = 0x7fffb80e2c20}}                                                               
        i = 1                                                                                      
        file_handle = (zend_file_handle *) 0x7fffb80e5150                                          
        orig_op_array = (zend_op_array *) 0x0                                                      
        orig_retval_ptr_ptr = (zval **) 0x0                                                        
        local_retval = (zval *) 0x0                                                                
#7  0x0000000000706b5e in php_execute_script
(primary_file=0x7fffb80e5150, tsrm_ls=0x256c0c0)      
    at /var/tmp/portage/dev-
        realfile = "/root/bug38759.phpt?revision=1.1.2.2", '\0'
<repeats 28 times>,
"\b\224^&#65533;\b\177\000\000&#65533;
times>,
"`\237z\002\000\000\000\000\200&#65533;\223&#65533;
0\000\000\000/root/bug38759.phpt?revision=1.1.2.2\000\000\000\000&#65
times>, "&#65533;&#65533;V\002", '\0' <repeats 1812 times>...                   
        __orig_bailout = (jmp_buf *) 0x7fffb80e4fb0                                                 
        __bailout = {{__jmpbuf = {9011888, -7503417721723515127,
4678928, 140736281334688, 0, 0,    
      -7503417718615535863, 7503544168444235529}, __mask_was_saved =
0, __saved_mask = {__val = {   
        2455514271280, 11398456, 42605064, 42759856, 39239872,
140736281333520, 8582469, 11398456,  
        524, 0, 0, 39239872, 7356436, 0, 39239872, 3}}}}                                            
        prepend_file_p = (zend_file_handle *) 0x0                                                   
        append_file_p = (zend_file_handle *) 0x0                                                    
        prepend_file = {type = 0 '\0', filename = 0x0, opened_path =
0x0, handle = {fd = 0,         
    fp = 0x0, stream = {handle = 0x0, reader = 0, closer = 0, fteller
= 0, interactive = 0}},       
  free_filename = 0 '\0'}                                                                           
        append_file = {type = 0 '\0', filename = 0x0, opened_path =
0x0, handle = {fd = 0,          
    fp = 0x0, stream = {handle = 0x0, reader = 0, closer = 0, fteller
= 0, interactive = 0}},       
  free_filename = 0 '\0'}                                                                           
        old_cwd = 0x7fffb80e2d10 ""                                                                 
        retval = 0                                                                                  
#8  0x0000000000830f7f in main (argc=3, argv=0x7fffb80e53a8)                                        
    at /var/tmp/portage/dev-
        __orig_bailout = (jmp_buf *) 0x0                                                            
        __bailout = {{__jmpbuf = {9011888, -7503417722704982263,
4678928, 140736281334688, 0, 0,    
      -7503417721725612279, 7503542677798948617}, __mask_was_saved =
0, __saved_mask = {__val = {   
        139675223866362, 139675211617624, 139675223859464,
4294967296, 4294967453, 4456561,         
        139675288026563, 140736281334128, 139675290077576, 30,
139675288026563, 3309007967,         
        139675290077576, 30, 36, 4287062190}}}}                                                     
        exit_status = 0                                                                             
---Type <return> to continue, or q <return> to quit---
        c = -1
        file_handle = {type = 2 '\002',
  filename = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2",
opened_path = 0x0, handle = {
    fd = 42758960, fp = 0x28c7330, stream = {handle = 0x28c7330,
      reader = 0x7a5b34 <zend_stream_stdio_reader>, closer = 0x7a5b64
<zend_stream_stdio_closer>,
      fteller = 0x7a5b92 <zend_stream_stdio_fteller>, interactive =
0}}, free_filename = 0 '\0'}
        behavior = 1
        reflection_what = 0x0
        orig_optind = 1
        orig_optarg = 0x0
        arg_free = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2"
        arg_excp = (char **) 0x7fffb80e53b8
        script_file = 0x7fffb80e754c "bug38759.phpt?revision=1.1.2.2"
        interactive = 0
        module_started = 1
        request_started = 1
        lineno = 1
        exec_direct = 0x0
        exec_run = 0x0
        exec_begin = 0x0
        exec_end = 0x0
        param_error = 0x0
        hide_argv = 0
        tsrm_ls = (void ***) 0x256c0c0
        ini_entries_len = 110


Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2009-06-28 02:48 UTC] felipe@php.net
Please try using this CVS snapshot:

  http://snaps.php.net/php5.2-latest.tar.gz
 
For Windows:

  http://windows.php.net/snapshots/


 [2009-07-06 01:00 UTC] php-bugs at lists dot php dot net
No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".
 
PHP Copyright © 2001-2021 The PHP Group
All rights reserved.
Last updated: Mon Sep 20 02:03:37 2021 UTC