ID: 20111 Updated by: [EMAIL PROTECTED] Reported By: [EMAIL PROTECTED] -Status: Open +Status: Feedback Bug Type: IIS related Operating System: win2k PHP Version: 4CVS-2002-10-26 New Comment:
Please try using this CVS snapshot: http://snaps.php.net/php4-latest.tar.gz For Windows: http://snaps.php.net/win32/php4-win32-latest.zip Previous Comments: ------------------------------------------------------------------------ [2002-10-26 16:32:25] [EMAIL PROTECTED] forgot to add, no other php extensions loaded. Also added crash5.log url. ------------------------------------------------------------------------ [2002-10-26 16:24:03] [EMAIL PROTECTED] Latest cvs debug build + iis. Occurs with 2 simultaneous requests. Occurs with <?phpinfo();?> as script, and also attempting to request a non-existent php file. Further (differing) stack traces/information are in logs at : http://stats.distributed.net/~paul/php/crash1.log http://stats.distributed.net/~paul/php/crash2.log http://stats.distributed.net/~paul/php/crash3.log http://stats.distributed.net/~paul/php/crash4.log ------------------ C:\php\src420\php4\ext\bcmath\libbcmath\src\init.c(72) : Freeing 0x02267198 (1 bytes), script=c:\inetpub\wwwroot\php\index4.php Last leak repeated 2 times C:\php\src420\php4\ext\bcmath\libbcmath\src\init.c(57) : Freeing 0x02267140 (29 bytes), script=c:\inetpub\wwwroot\php\index4.php Last leak repeated 2 times First chance exception c0000005 (Access Violation) occurred Thread stopped. > !emdbg.tag DEFAULT ACCESS VIOLATION SCRIPT LOADED DEFAULT ACCESS VIOLATION SCRIPT LOADED # FramePtr RetAddr Param1 Param2 Param3 Function Name 00 0000000000ddebc0 0000000001b651b5 0000000002260000 0000000000000001 000000000000004c NTDLL!0x0000000077FCB032 (No FPO) 01 0000000000ddec34 0000000001b65627 0000000000000020 0000000001d724d8 00000000000000b2 PHP4TS_DEBUG!emalloc+0x215(0x00000020, 0x01D724D8, 0x000000B2, 0x00000000, 0x00000000) (No FPO) [ zend_alloc.c @ 154 ] 02 0000000000ddeca4 0000000001b54866 0000000000000008 0000000000000004 0000000001d724d8 PHP4TS_DEBUG!ecalloc+0x87(0x00000008, 0x00000004, 0x01D724D8, 0x000000B2, 0x00000000, 0x00000000) (No FPO) [ zend_alloc.c @ 254 ] 03 0000000000dded18 0000000001b77a5d 0000000002018c90 0000000000000000 0000000000000000 PHP4TS_DEBUG!zend_hash_init+0xa6(0x02018C90, 0x00000000, 0x00000000, 0x01B77880, 0x00000000) (No FPO) [ zend_hash.c @ 178 ] 04 0000000000dded80 0000000001b5cb3d 0000000001fe7d80 0000000000ddee30 0000000000ddeedc PHP4TS_DEBUG!zend_init_rsrc_list+0x3d(0x01FE7D80) (No FPO) [ zend_list.c @ 216 ] 05 0000000000ddedd8 0000000001b67f21 0000000001fe7d80 0000000000ddeed0 0000000000ddeedc PHP4TS_DEBUG!init_compiler+0x2d(0x01FE7D80) (No FPO) [ zend_compile.c @ 101 ] 06 0000000000ddee30 00000000019c9afc 0000000001fe7d80 0000000000ddf3d8 0000000000ddeedc PHP4TS_DEBUG!zend_activate+0x21(0x01FE7D80) (No FPO) [ zend.c @ 593 ] 07 0000000000ddeed0 00000000019a27da 0000000001fe7d80 0000000000b8532c 0000000000b85260 PHP4TS_DEBUG!php_request_startup+0x10c(0x01FE7D80) (No FPO) [ main.c @ 833 ] 08 0000000000ddf3f0 0000000065d82b06 0000000000b85260 0000000000b8532c 0000000000b85260 PHP4ISAPI!HttpExtensionProc+0x15a(0x00B85260) (No FPO) [ php4isapi.c @ 756 ] 09 0000000000ddf438 0000000065d823a2 0000000000abe698 0000000000b853f3 0000000000b85260 wam!0x0000000065D82B06 (No FPO) ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=20111&edit=1