php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #51069 garbage collector crash
Submitted: 2010-02-17 15:17 UTC Modified: 2013-02-18 00:34 UTC
From: dziastinux at gmail dot com Assigned:
Status: No Feedback Package: Reproducible crash
PHP Version: 5.3.1 OS: Windows 7, CentOS 5.4
Private report: No CVE-ID: None
Have you experienced this issue?
Rate the importance of this bug to you:

 [2010-02-17 15:17 UTC] dziastinux at gmail dot com
Description:
------------
PHP crashes in the middle of the script with no error in any logs (php, apache(thread-safe), cherokee(fcgi)).

The sad thing is that I can't provide a sample code to reproduce the problem. The crash occurs on script with huge arrays filled with objects. A lot of references exists between objects and arrays. (Memory usage ~200mb).

Actual result:
--------------
php5ts!zval_mark_grey+4	    0330d0f0	    01af39f8	    035c9eb8	
...
Several thousand sequential calls to php5ts!zval_mark_grey+ff
...
php5ts!zval_mark_grey+ff	    039a3148	    01af39f8	    01af39f8	 
php5ts!gc_mark_roots+95	    01af39f8	    01af39f8	    01af39f8	  
php5ts!gc_collect_cycles+64	    01af39f8	    01af39f8	    04757b00	  
php5ts!gc_zobj_possible_root+a6	    04757b00	    01af39f8	    03223718	  
php5ts!gc_zval_possible_root+74	    04757b00	    01af39f8	    00000000	  
php5ts!ZEND_ASSIGN_SPEC_CV_VAR_HANDLER+69	    0146fbc0	    01af39f8	    0146fe3c	  
php5ts!execute+2fe	    030f2568	    01af3900	    00000000	  
php5ts!zend_execute_scripts+f6	    00000008	    01af39f8	    00000000	  
php5ts!php_execute_script+233	    0146fe3c	    01af39f8	    00000005	  
php5apache2_2!php_handler+5d0	    01a5bcc0	    00926648	    01a5bcc0	  
libhttpd!ap_run_handler+21	    01a5bcc0	    01a5bcc0	    01a5bcc0	  
libhttpd!ap_invoke_handler+ae	    00000000	    01b3f098	    0146ff00	  
libhttpd!ap_die+29e	    01a5bcc0	    00000000	    01188f28	  
libhttpd!ap_get_request_note+1c9c	    01b3f098	    01b3f098	    01b3f098	  
libhttpd!ap_run_process_connection+21	    01b3f098	    00874f58	    0146ff48	  
libhttpd!ap_process_connection+33	    01b3f098	    01a57cc0	    00000000	  
libhttpd!ap_regkey_value_remove+c7c	    01b3f090	    9bbc9b34	    00000000	  
msvcrt!_endthreadex+44	    0146ff94	    776b1194	    012c2148	  
msvcrt!_endthreadex+ce	    012c2148	    0146ffd4	    77ceb3f5	  
kernel32!BaseThreadInitThunk+e	    012c2148	    761dac2c	    00000000	  
ntdll!__RtlUserThreadStart+70	    76ed12e5	    012c2148	    00000000	  
ntdll!_RtlUserThreadStart+1b	    76ed12e5	    012c2148	    00000000

PHP5TS!ZVAL_MARK_GREY+4In httpd__PID__4532__Date__02_17_2010__Time_04_17_56PM__779__Second_Chance_Exception_C00000FD.dmp the assembly instruction at php5ts!zval_mark_grey+4 in D:\wamp\bin\apache\apache2.2.11\bin\php5ts.dll from The PHP Group has caused a stack overflow exception (0xC00000FD) when trying to write to memory location 0x01432ffc on thread 2	  

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2010-02-17 15:18 UTC] pajoye@php.net
Please try using this snapshot:

  http://snaps.php.net/php5.3-latest.tar.gz
 
For Windows:

  http://windows.php.net/snapshots/


 [2010-02-25 01:00 UTC] php-bugs at lists dot php dot net
No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".
 [2010-04-25 20:00 UTC] felipe@php.net
-Status: No Feedback +Status: Feedback
 [2010-04-25 20:00 UTC] felipe@php.net
Please try using this snapshot:

  http://snaps.php.net/php5.3-latest.tar.gz
 
For Windows:

  http://windows.php.net/snapshots/


 [2013-02-18 00:34 UTC] php-bugs at lists dot php dot net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Open". Thank you.
 
PHP Copyright © 2001-2022 The PHP Group
All rights reserved.
Last updated: Wed Nov 30 16:05:52 2022 UTC