|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
[2018-01-21 19:12 UTC] shamardin74 at rambler dot ru
Description: ------------ The name of the event of the problem: APPCRASH; The name of application: php.exe; (also httpd.exe) The version of application: 7.0.27.0; The name of the module with mistake: php7ts.dll; The version of the module with mistake: 7.0.27.0; The code of the exception: c000001d; The offset of the exception: 000dd820; The version OS: 6.1 (Windows 7 x86) This mistake occurs when php executes in command line (php -i; php -v), so and when executes by apache web-server. In case of "php -?" available options list are displayed. PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Sun Nov 02 20:00:01 2025 UTC |
When run php-7.0.27 on windows 7 32-bit occurs the error in module php7ts.dll. This occurs in step of initialization of application. call_stack: -> php7ts.dll!sapi_activate() line 457 + 0x11 bytes php7ts.dll!php_module_startup(_sapi_module_struct * sf, _zend_module_entry * additional_modules, unsigned int num_additional_modules) line 2072 php.exe!php_cli_startup(_sapi_module_struct * sapi_module) line 426 + 0xe bytes php.exe!main(int argc, char * * argv) line 1327 + 0x2 bytes php.exe!__scrt_common_main_seh() line 253 + 0x1d bytes kernel32.dll!775aed6c() [Specified below frames can be invalid and (or) be absent, symbols for kernel32.dll not loaded] ntdll.dll!77b637eb() ntdll.dll!77b637be() disassembled_source: 456: SG(request_info).proto_num = 1000; /* Default to HTTP 1.0 */ 6A0B8E8D 8B 47 04 mov eax,dword ptr [edi+4] 6A0B8E90 8B 08 mov ecx,dword ptr [eax] 6A0B8E92 A1 58 DB 78 6A mov eax,dword ptr [_sapi_globals_id (6A78DB58h)] 6A0B8E97 8B 44 81 FC mov eax,dword ptr [ecx+eax*4-4] 6A0B8E9B C7 40 50 E8 03 00 00 mov dword ptr [eax+50h],3E8h 457: SG(global_request_time) = 0; 6A0B8EA2 8B 47 04 mov eax,dword ptr [edi+4] 6A0B8EA5 8B 08 mov ecx,dword ptr [eax] 6A0B8EA7 0F 57 C0 xorps xmm0,xmm0 6A0B8EAA A1 58 DB 78 6A mov eax,dword ptr [_sapi_globals_id (6A78DB58h)] 6A0B8EAF 8B 44 81 FC mov eax,dword ptr [ecx+eax*4-4] -> 6A0B8EB3 F2 0F 11 80 C8 00 00 00 movsd mmword ptr [eax+0C8h],xmm0 458: SG(post_read) = 0; 6A0B8EBB 8B 47 04 mov eax,dword ptr [edi+4] 6A0B8EBE 8B 08 mov ecx,dword ptr [eax] 6A0B8EC0 A1 58 DB 78 6A mov eax,dword ptr [_sapi_globals_id (6A78DB58h)] 6A0B8EC5 8B 44 81 FC mov eax,dword ptr [ecx+eax*4-4] 6A0B8EC9 88 98 88 00 00 00 mov byte ptr [eax+88h],bl 459: /* It's possible to override this general case in the activate() callback, if necessary. */ 460: if (SG(request_info).request_method && !strcmp(SG(request_info).request_method, "HEAD")) { registers_content: (intel) eax 0x0021afa0 ebx 0x00000000 ecx 0x00212560 edx 0x00212c30 esi 0x00d95020 edi 0x00212c30 mm0 0x0000000000000000 mm1 0x0000000000000000 mm2 0x0000000000000000 Perhaps that is instruction SSE2 which is not supported by 32-bit processor.