ID: 49262 Updated by: u...@php.net Reported By: grzegorz at heex dot pl Status: Open Bug Type: PDO related Operating System: Win XP Sp3 PHP Version: 5.3.0 New Comment:
Ok, great. Your character set is uft8 (uft8_general_ci is the collation). Can you paste "SHOW VARIABLES LIKE '%character%'" to give details about your MySQL settings? Thanks! Previous Comments: ------------------------------------------------------------------------ [2009-09-20 22:44:06] grzegorz at heex dot pl Column lng_name and a whole table they have utf8_general_ci charset. ------------------------------------------------------------------------ [2009-09-18 08:39:34] u...@php.net Can you say anything about the character sets you are using? ------------------------------------------------------------------------ [2009-08-25 07:57:54] grzegorz at heex dot pl Function Arg 1 Arg 2 Arg 3 Source php5ts!mysqlnd_cset_escape_slashes+30 00000000 05652000 0565fb58 php_pdo_mysql!_pdo_mysql_error+6f7 0565f588 0565fb58 00000006 php5ts!pdo_parse_params+394 05662d50 05662e78 00000026 php5ts!pdo_stmt_describe_columns+772 00000000 0565f638 00000000 php5ts!execute+10b9 05690070 015e5801 007f66b8 php5ts!execute+156d 015e5858 03e8fbe0 00000000 php5ts!execute+298 0565dbf0 015e5800 015e5858 php5ts!zend_execute_scripts+fe 00000008 015e5858 00000000 php5ts!php_execute_script+231 03e8fe6c 015e5858 00000005 php5apache2_2!zm_info_apache+1744 007aa760 0073a400 007aa760 libhttpd!ap_run_handler+21 007aa760 007aa760 007aa760 libhttpd!ap_invoke_handler+ae 00000000 007a7718 03e8ff38 libhttpd!ap_die+24e 007aa760 00000000 0073aac8 libhttpd!ap_get_request_note+1c6c 007a7718 007a7718 007a7718 libhttpd!ap_run_process_connection+21 007a7718 0074a198 03e8ff80 libhttpd!ap_process_connection+33 007a7718 007a26d8 0006fb80 libhttpd!ap_regkey_value_remove+c0c 007a7710 0006fb80 00eb0650 msvcrt!_endthreadex+a9 0079ef88 0006fb80 00eb0650 kernel32!BaseThreadStart+37 77c2a341 0079ef88 00000000 PHP5TS!MYSQLND_CSET_ESCAPE_SLASHES+30In httpd__PID__4604__Date__08_25_2009__Time_09_37_39AM__46__Second_Chance_Exception_C0000005.dmp the assembly instruction at php5ts!mysqlnd_cset_escape_slashes+30 in C:\php5\php5ts.dll from The PHP Group has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00000010 on thread 157 ------------------------------------------------------------------------ [2009-08-24 19:55:42] sjo...@php.net Thank you for this bug report. To properly diagnose the problem, we need a backtrace to see what is happening behind the scenes. To find out how to generate a backtrace, please read http://bugs.php.net/bugs-generating-backtrace.php for *NIX and http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32 Once you have generated a backtrace, please submit it to this bug report and change the status back to "Open". Thank you for helping us make PHP better. ------------------------------------------------------------------------ [2009-08-14 20:23:43] grzegorz at heex dot pl Description: ------------ Now, PDO in PHP 5.3 is usless. Reproduce code: --------------- $name = 'same_name'; $pdo= new PDO("mysql:host=localhost;dbname=[base];",'[user]','[pass]'); $sth = $pdo->prepare("SELECT * FROM lng WHERE lng_name=:Name"); $sth->bindValue(':Name',$name,PDO::PARAM_STR); $sth->execute(); die('OK'); Expected result: ---------------- OK Actual result: -------------- PHP CGI / FastCGI crash ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=49262&edit=1