php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #49888 Access Violation error
Submitted: 2009-10-15 10:09 UTC Modified: 2009-10-22 08:31 UTC
From: RQuadling at GMail dot com Assigned:
Status: Not a bug Package: Reproducible crash
PHP Version: 5.3SVN-2009-10-15 (snap) OS: Windows XP SP3
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: RQuadling at GMail dot com
New email:
PHP Version: OS:

 

 [2009-10-15 10:09 UTC] RQuadling at GMail dot com
Description:
------------
Just upgraded to the latest 5.3 snapshot. Getting an Access Violation 
for one of my bigger command line scripts.

The backtrace shows the issue is in zend_gc.c

I'm working on trying to cut down the code to a usable example, but I 
don't know how successful I'll be.



Reproduce code:
---------------
Thread 0 - System ID 4572
Entry point   php!mainCRTStartup 
Create time   2009/10/15 10:49:27 
Time spent in user mode   0 Days 0:0:33.671 
Time spent in kernel mode   0 Days 0:0:2.468 






Function     Arg 1     Arg 2     Arg 3   Source 
php5!gc_zval_possible_root+4c     0bcb9ae0     0bcb8d98     10081d37   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_gc.c @ 143 + 12 
php5!_zval_ptr_dtor+65     0bcb8d64     1053ea74     0bc854f8   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_execute_api.c @ 445 + 13 
php5!zend_hash_destroy+27     0bc84d18     00000020     10098eb4   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_hash.c @ 526 + 6 
php5!zend_objects_free_object_storage+2b     0bc854f8     00000000     00000000   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_objects.c @ 114 + 2a 
php5!zend_objects_store_free_object_storage+74     1053ea74     78583b4e     1008160d   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_objects_api.c @ 92 + 6 
php5!shutdown_executor+1ac     012ed608     00000000     00c0fa74   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_execute_api.c @ 298 + a 
php5!zend_deactivate+53     003d31dc     003d31d0     00000000   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend.c @ 892 
php5!php_request_shutdown+1b5     00000000     0040642c     00000001   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\main\main.c @ 1604 
php!main+108c     00000004     003d31d0     003d34b8   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\sapi\cli\php_cli.c @ 1371 + 8 
php!memcpy+160     0013ed44     00000000     7ffdc000   f:\dd\vctools\crt_bld\self_x86\crt\src\crtexe.c @ 586 + 17 
kernel32!BaseProcessStart+23     00402dda     00000000     000000c8    




PHP5!GC_ZVAL_POSSIBLE_ROOT+4CIn PHP__PID__5460__Date__10_15_2009__Time_10_54_22AM__957__Second_Chance_Exception_C0000005.dmp the assembly instruction at php5!gc_zval_possible_root+4c in C:\PHP5\php5.dll from The PHP Group has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00000000 on thread 0



Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2009-10-15 10:16 UTC] pajoye@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.


 [2009-10-22 08:31 UTC] rquadling@php.net
Seems to have been related to a mismatch of dlls for enchant.
 [2009-10-22 08:31 UTC] rquadling@php.net
Seems to have been related to a mismatch of dlls for enchant.
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Thu Jul 03 08:01:34 2025 UTC