ID: 42712 Updated by: [EMAIL PROTECTED] Reported By: markjwiltshire at yahoo dot com -Status: Open +Status: Feedback Bug Type: Apache2 related Operating System: Windows 2003 SP2 PHP Version: 5.2.4 New Comment:
Thank you for this bug report. To properly diagnose the problem, we need a short but complete example script to be able to reproduce this bug ourselves. A proper reproducing script starts with <?php and ends with ?>, is max. 10-20 lines long and does not require any external resources such as databases, etc. If the script requires a database to demonstrate the issue, please make sure it creates all necessary tables, stored procedures etc. Please avoid embedding huge scripts into the report. Previous Comments: ------------------------------------------------------------------------ [2007-09-19 14:24:48] markjwiltshire at yahoo dot com Description: ------------ http.exe crashes when running mediawiki 1.9.2 running backtrace can see it is caused by In httpd__PID__844__Date__09_19_2007__Time_03_07_32PM__0__Second_Chance_Exception_C00000FD.dmp the assembly instruction at ntdll!_SEH_prolog+1a in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused a stack overflow exception (0xC00000FD) when trying to write to memory location 0x059a2f7c on thread 249 Type of Analysis Performed Crash Analysis Machine Name WKUKWIKI Operating System Windows Server 2003 Service Pack 2 Number Of Processors 1 Process ID 844 Process Image C:\Apache2.2\bin\httpd.exe System Up-Time 00:04:11 Process Up-Time 00:00:25 Thread 249 - System ID 2712 Entry point msvcrt!_endthreadex+2f Create time 19/09/2007 15:07:08 Time spent in user mode 0 Days 0:0:1.31 Time spent in kernel mode 0 Days 0:0:0.625 Function Arg 1 Arg 2 Arg 3 Source ntdll!_SEH_prolog+1a 00260000 00000000 00000144 msvcrt!malloc+6c 00000144 00000000 075de6e3 php5ts!php_pcre_exec+a52 06d50da8 059a32b8 7c829f3d ntdll!RtlpFreeToHeapLookaside+22 00260000 00000000 00000000 ntdll!RtlFreeHeap+20e 00000000 00000000 ffffffff 0x075de5d0 059a3354 00000000 00000000 NTDLL!_SEH_PROLOG+1AIn httpd__PID__844__Date__09_19_2007__Time_03_07_32PM__0__Second_Chance_Exception_C00000FD.dmp the assembly instruction at ntdll!_SEH_prolog+1a in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused a stack overflow exception (0xC00000FD) when trying to write to memory location 0x059a2f7c on thread 249 Module Information Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB Base address: 0x7c800000 Time Stamp: Sat Feb 17 14:02:00 2007 Checksum: 0x000bd6f9 Comments: COM DLL: False Company Name: Microsoft Corporation ISAPIExtension: False File Description: NT Layer DLL ISAPIFilter: False File Version: 5.2.3790.3959 (srv03_sp2_rtm.070216-1710) Managed DLL: False Internal Name: ntdll.dll VB DLL: False Legal Copyright: © Microsoft Corporation. All rights reserved. Loaded Image Name: ntdll.dll Legal Trademarks: Mapped Image Name: Original filename: ntdll.dll Module name: ntdll Private Build: Single Threaded: False Product Name: Microsoft® Windows® Operating System Module Size: 768.00 KBytes Product Version: 5.2.3790.3959 Symbol File Name: c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb Special Build: & No php error info Reproduce code: --------------- Editing mediawiki page, normal pages are displayed correctly, when I click on edit, httpd.exe crashes Apache (2.2.4) Error log shows... [Wed Sep 19 14:27:26 2007] [notice] Parent: child process exited with status 128 -- Restarting. [Wed Sep 19 14:27:26 2007] [notice] Apache/2.2.4 (Win32) PHP/5.2.4 configured -- resuming normal operations [Wed Sep 19 14:27:26 2007] [notice] Server built: Jan 9 2007 23:17:20 [Wed Sep 19 14:27:26 2007] [notice] Parent: Created child process 1080 [Wed Sep 19 14:27:27 2007] [notice] Child 1080: Child process is running [Wed Sep 19 14:27:27 2007] [notice] Child 1080: Acquired the start mutex. [Wed Sep 19 14:27:27 2007] [notice] Child 1080: Starting 250 worker threads. [Wed Sep 19 14:27:27 2007] [notice] Child 1080: Starting thread to listen on port 80. Expected result: ---------------- No crash ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=42712&edit=1