php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #49888 Access Violation error
Submitted: 2009-10-15 10:09 UTC Modified: 2009-10-22 08:31 UTC
From: RQuadling at GMail dot com Assigned:
Status: Not a bug Package: Reproducible crash
PHP Version: 5.3SVN-2009-10-15 (snap) OS: Windows XP SP3
Private report: No CVE-ID: None
View Add Comment Developer Edit
Anyone can comment on a bug. Have a simpler test case? Does it work for you on a different platform? Let us know!
Just going to say 'Me too!'? Don't clutter the database with that please !
Your email address:
MUST BE VALID
Solve the problem:
43 + 11 = ?
Subscribe to this entry?

 
 [2009-10-15 10:09 UTC] RQuadling at GMail dot com
Description:
------------
Just upgraded to the latest 5.3 snapshot. Getting an Access Violation 
for one of my bigger command line scripts.

The backtrace shows the issue is in zend_gc.c

I'm working on trying to cut down the code to a usable example, but I 
don't know how successful I'll be.



Reproduce code:
---------------
Thread 0 - System ID 4572
Entry point   php!mainCRTStartup 
Create time   2009/10/15 10:49:27 
Time spent in user mode   0 Days 0:0:33.671 
Time spent in kernel mode   0 Days 0:0:2.468 






Function     Arg 1     Arg 2     Arg 3   Source 
php5!gc_zval_possible_root+4c     0bcb9ae0     0bcb8d98     10081d37   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_gc.c @ 143 + 12 
php5!_zval_ptr_dtor+65     0bcb8d64     1053ea74     0bc854f8   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_execute_api.c @ 445 + 13 
php5!zend_hash_destroy+27     0bc84d18     00000020     10098eb4   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_hash.c @ 526 + 6 
php5!zend_objects_free_object_storage+2b     0bc854f8     00000000     00000000   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_objects.c @ 114 + 2a 
php5!zend_objects_store_free_object_storage+74     1053ea74     78583b4e     1008160d   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_objects_api.c @ 92 + 6 
php5!shutdown_executor+1ac     012ed608     00000000     00c0fa74   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend_execute_api.c @ 298 + a 
php5!zend_deactivate+53     003d31dc     003d31d0     00000000   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\zend\zend.c @ 892 
php5!php_request_shutdown+1b5     00000000     0040642c     00000001   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\main\main.c @ 1604 
php!main+108c     00000004     003d31d0     003d34b8   d:\php-sdk\snap_5_3\vc9\x86\snap53_vc9\sapi\cli\php_cli.c @ 1371 + 8 
php!memcpy+160     0013ed44     00000000     7ffdc000   f:\dd\vctools\crt_bld\self_x86\crt\src\crtexe.c @ 586 + 17 
kernel32!BaseProcessStart+23     00402dda     00000000     000000c8    




PHP5!GC_ZVAL_POSSIBLE_ROOT+4CIn PHP__PID__5460__Date__10_15_2009__Time_10_54_22AM__957__Second_Chance_Exception_C0000005.dmp the assembly instruction at php5!gc_zval_possible_root+4c in C:\PHP5\php5.dll from The PHP Group has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00000000 on thread 0



Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2009-10-15 10:16 UTC] pajoye@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.


 [2009-10-22 08:31 UTC] rquadling@php.net
Seems to have been related to a mismatch of dlls for enchant.
 [2009-10-22 08:31 UTC] rquadling@php.net
Seems to have been related to a mismatch of dlls for enchant.
 
PHP Copyright © 2001-2020 The PHP Group
All rights reserved.
Last updated: Sun May 24 21:01:25 2020 UTC