php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #20111 IIS crashes
Submitted: 2002-10-26 16:24 UTC Modified: 2003-01-02 18:38 UTC
From: paulr@php.net Assigned:
Status: No Feedback Package: IIS related
PHP Version: 4CVS-2002-10-26 OS: win2k
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: paulr@php.net
New email:
PHP Version: OS:

 

 [2002-10-26 16:24 UTC] paulr@php.net
Latest cvs debug build + iis.

Occurs with 2 simultaneous requests. Occurs with 
<?phpinfo();?> as script, and also attempting to request a non-existent php file. 

Further (differing) stack traces/information are in logs at :
http://stats.distributed.net/~paul/php/crash1.log
http://stats.distributed.net/~paul/php/crash2.log
http://stats.distributed.net/~paul/php/crash3.log
http://stats.distributed.net/~paul/php/crash4.log

------------------
C:\php\src420\php4\ext\bcmath\libbcmath\src\init.c(72) :  Freeing 0x02267198 (1 bytes), script=c:\inetpub\wwwroot\php\index4.php
Last leak repeated 2 times
C:\php\src420\php4\ext\bcmath\libbcmath\src\init.c(57) :  Freeing 0x02267140 (29 bytes), script=c:\inetpub\wwwroot\php\index4.php
Last leak repeated 2 times
First chance exception c0000005 (Access Violation) occurred
Thread stopped.
> !emdbg.tag DEFAULT ACCESS VIOLATION SCRIPT LOADED
DEFAULT ACCESS VIOLATION SCRIPT LOADED


#   FramePtr          RetAddr           Param1   Param2   Param3   Function Name
00  0000000000ddebc0  0000000001b651b5  0000000002260000 0000000000000001 000000000000004c NTDLL!0x0000000077FCB032 (No FPO)
01  0000000000ddec34  0000000001b65627  0000000000000020 0000000001d724d8 00000000000000b2 PHP4TS_DEBUG!emalloc+0x215(0x00000020, 0x01D724D8, 0x000000B2, 0x00000000, 0x00000000) (No FPO) [ zend_alloc.c @ 154 ]
02  0000000000ddeca4  0000000001b54866  0000000000000008 0000000000000004 0000000001d724d8 PHP4TS_DEBUG!ecalloc+0x87(0x00000008, 0x00000004, 0x01D724D8, 0x000000B2, 0x00000000, 0x00000000) (No FPO) [ zend_alloc.c @ 254 ]
03  0000000000dded18  0000000001b77a5d  0000000002018c90 0000000000000000 0000000000000000 PHP4TS_DEBUG!zend_hash_init+0xa6(0x02018C90, 0x00000000, 0x00000000, 0x01B77880, 0x00000000) (No FPO) [ zend_hash.c @ 178 ]
04  0000000000dded80  0000000001b5cb3d  0000000001fe7d80 0000000000ddee30 0000000000ddeedc PHP4TS_DEBUG!zend_init_rsrc_list+0x3d(0x01FE7D80) (No FPO) [ zend_list.c @ 216 ]
05  0000000000ddedd8  0000000001b67f21  0000000001fe7d80 0000000000ddeed0 0000000000ddeedc PHP4TS_DEBUG!init_compiler+0x2d(0x01FE7D80) (No FPO) [ zend_compile.c @ 101 ]
06  0000000000ddee30  00000000019c9afc  0000000001fe7d80 0000000000ddf3d8 0000000000ddeedc PHP4TS_DEBUG!zend_activate+0x21(0x01FE7D80) (No FPO) [ zend.c @ 593 ]
07  0000000000ddeed0  00000000019a27da  0000000001fe7d80 0000000000b8532c 0000000000b85260 PHP4TS_DEBUG!php_request_startup+0x10c(0x01FE7D80) (No FPO) [ main.c @ 833 ]
08  0000000000ddf3f0  0000000065d82b06  0000000000b85260 0000000000b8532c 0000000000b85260 PHP4ISAPI!HttpExtensionProc+0x15a(0x00B85260) (No FPO) [ php4isapi.c @ 756 ]
09  0000000000ddf438  0000000065d823a2  0000000000abe698 0000000000b853f3 0000000000b85260 wam!0x0000000065D82B06 (No FPO)

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2002-10-26 16:32 UTC] paulr@php.net
forgot to add, no other php extensions loaded.

Also added crash5.log url.
 [2002-12-08 22:34 UTC] iliaa@php.net
Please try using this CVS snapshot:

  http://snaps.php.net/php4-latest.tar.gz
 
For Windows:
 
  http://snaps.php.net/win32/php4-win32-latest.zip


 [2003-01-02 18:38 UTC] sniper@php.net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Open". Thank you.


 
PHP Copyright © 2001-2021 The PHP Group
All rights reserved.
Last updated: Tue Nov 30 01:03:16 2021 UTC