DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24879>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24879 Access violation when shutting down Apache service Summary: Access violation when shutting down Apache service Product: Apache httpd-2.0 Version: 2.0.44 Platform: PC OS/Version: Windows NT/2K Status: NEW Severity: Normal Priority: Other Component: Platform AssignedTo: [email protected] ReportedBy: [EMAIL PROTECTED] When shutting down Apache service (net stop Apache or Apache.exe -n Apache -k stop or Apache.exe -n Apache -k restart) I sometimes (randomly) get an Access Violation. Maybe its the same problem described in BugReport No. 17986 Had the same Problem with Apache 1.3.26, but only at Windows shutdown (again, only sometimes). That's what Dr.Watson said (german): Die Anwendung "" hat einen Programmfehler verursacht. Datum und Zeit des Fehlers: 20.11.2003 um 16:51:17.171 Ausnahme: c0000005 an Adresse 77885C41 (RtlpWaitForCriticalSection) Log: Microsoft (R) Windows 2000 (R) Version 5.00 DrWtsn32 Copyright (C) 1985-1999 Microsoft Corp. Alle Rechte vorbehalten. Anwendungsausnahme aufgetreten: Anwendung: (pid=1664) Wann: 20.11.2003 @ 16:51:17.171 Ausnahmenummer: c0000005 (Zugriffsverletzung) *----> Systeminformationen <----* Computername: lumpi Benutzername: SYSTEM Prozessoranzahl: 1 Prozessortyp: x86 Family 15 Model 1 Stepping 2 Windows 2000-Version: 5.0 Aktuelles Build: 2195 Service Pack: 3 Aktueller Typ: Uniprocessor Free Firma: Besitzer: Joseph Smith *----> Taskliste <----* 0 Idle.exe 8 System.exe 140 SMSS.exe 164 CSRSS.exe 184 WINLOGON.exe 212 SERVICES.exe 224 LSASS.exe 388 svchost.exe 420 spoolsv.exe 492 defwatch.exe 548 svchost.exe 592 rtvscan.exe 680 regsvc.exe 696 mstask.exe 748 WinMgmt.exe 1240 explorer.exe 1276 MSGSYS.exe 1592 vptray.exe 944 jusched.exe 940 internat.exe 1212 taskmgr.exe 1620 SSEXP.exe 1736 Compil32.exe 1004 mmc.exe 1612 MAPISP32.exe 1952 CMD.exe 2172 DRWTSN32.exe 0 _Total.exe (00400000 - 00405000) (77880000 - 77901000) (6EEC0000 - 6EEDE000) (77E70000 - 77F33000) (77DA0000 - 77DFD000) (77D20000 - 77D8E000) (74FA0000 - 74FB3000) (78000000 - 78046000) (74F90000 - 74F98000) (74F60000 - 74F73000) (77E00000 - 77E65000) (77F40000 - 77F7C000) (77970000 - 77994000) (74FC0000 - 74FC9000) (6EE60000 - 6EE88000) (6EE50000 - 6EE59000) (6FF00000 - 6FF40000) (77580000 - 777CC000) (70BD0000 - 70C34000) (71780000 - 7180A000) (74F40000 - 74F5D000) (74F80000 - 74F87000) (77830000 - 7783C000) (77310000 - 77323000) (774F0000 - 774F5000) (772F0000 - 77307000) (750C0000 - 750D0000) (750E0000 - 7512F000) (77BD0000 - 77BDF000) (75130000 - 75136000) (77940000 - 7796B000) (77A40000 - 77B2C000) (779A0000 - 77A3B000) (77380000 - 773AF000) (77350000 - 77372000) (77820000 - 7782E000) (78310000 - 783A0000) (77C00000 - 77C5F000) (774B0000 - 774E2000) (77490000 - 774A1000) (77500000 - 77522000) (77330000 - 77349000) (777D0000 - 777D8000) (777E0000 - 777E5000) (7CA00000 - 7CA23000) (77410000 - 77487000) (77400000 - 77410000) (6FCF0000 - 6FCF6000) (6FCD0000 - 6FCD6000) (6FCE0000 - 6FCE6000) (6FC90000 - 6FC97000) (6FC80000 - 6FC86000) (6FC20000 - 6FC27000) (6FC30000 - 6FC37000) (6FE70000 - 6FE7D000) (6FDA0000 - 6FDAA000) (6FD90000 - 6FD95000) (6FD70000 - 6FD76000) (10000000 - 10014000) (6FC50000 - 6FC55000) (6FD00000 - 6FD1F000) (00AA0000 - 00AC7000) (00AD0000 - 00BA8000) Statusabbild für Threadkennung 0x7f8 eax=00000000 ebx=00000000 ecx=00446694 edx=0000017c esi=00446684 edi=00000000 eip=77885c41 esp=0006dcc8 ebp=0006dd28 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 Funktion: RtlpWaitForCriticalSection 77885c1d 0f85307f0100 jne RtlEnableEarlyCriticalSectionEventCreation+0x151 (7789db53) 77885c23 a0d0f18c77 mov al,[RtlZeroHeap+0xa90 (778cf1d0)] ds: 778cf1d0=01 77885c28 f6d8 neg al 77885c2a 1bc0 sbb eax,eax 77885c2c f7d0 not eax 77885c2e 2580f48c77 and eax,0x778cf480 77885c33 395e10 cmp [esi+0x10],ebx ds:00ec3c56=??? ????? 77885c36 8945fc mov [ebp+0xfc],eax ss: 00aeb2fa=8d000000 77885c39 0f84b3350000 je RtlFreeSid+0x9c (778891f2) 77885c3f 8b06 mov eax,[esi] ds: 00446684=00000000 FEHLER ->77885c41 ff4010 inc dword ptr [eax+0x10] ds:00a7d5d2=?? ?????? 77885c44 ff75fc push dword ptr [ebp+0xfc] ss: 00aeb2fa=8d000000 77885c47 8b06 mov eax,[esi] ds: 00446684=00000000 77885c49 ff4014 inc dword ptr [eax+0x14] ds:00a7d5d2=??? ????? 77885c4c 53 push ebx 77885c4d ff7610 push dword ptr [esi+0x10] ds:00ec3c56=??? ????? 77885c50 e826dbffff call NtWaitForSingleObject (7788377b) 77885c55 3d02010000 cmp eax,0x102 77885c5a 0f84237f0100 je RtlEnableEarlyCriticalSectionEventCreation+0x181 (7789db83) 77885c60 3bc3 cmp eax,ebx 77885c62 0f8cc87f0100 jl RtlEnableEarlyCriticalSectionEventCreation+0x22e (7789dc30) 77885c68 385d08 cmp [ebp+0x8],bl ss: 00aeb2fa=00 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0006DD28 77885BD1 00446600 6EEC6905 00446684 6EEC597E ntdll! RtlpWaitForCriticalSection 004465F8 FFFFFFFF 00000000 00000000 FFFFFFFF FFFFFFFF ntdll! RtlIntegerToUnicodeString 004460F8 00000000 004440F0 00237F1C 00000000 00233A18 <nosymbols> *----> Raw Stack Dump <----* 0006dcc8 00 00 00 00 67 00 00 00 - f8 65 44 00 c8 9e 08 00 ....g....eD..... 0006dcd8 01 00 00 00 04 dd 06 00 - 68 dc 06 00 1a 00 00 00 ........h....... 0006dce8 b0 ff 06 00 95 2b 88 77 - 18 36 88 77 ff ff ff ff .....+.w.6.w.... 0006dcf8 2c dd 06 00 86 2e e7 77 - 00 00 07 00 00 00 00 00 ,......w........ 0006dd08 d0 9e 08 00 b8 dd 06 00 - b8 dd 06 00 d8 1f 00 00 ................ 0006dd18 1a 00 d8 1f b8 dd 06 00 - 34 00 36 00 00 00 00 00 ........4.6..... 0006dd28 f8 65 44 00 d1 5b 88 77 - 00 66 44 00 05 69 ec 6e .eD..[.w.fD..i.n 0006dd38 84 66 44 00 7e 59 ec 6e - 78 66 44 00 fa dd 06 00 .fD.~Y.nxfD..... 0006dd48 67 00 00 00 86 fc 0a 00 - f8 65 44 00 00 00 00 00 g........eD..... 0006dd58 00 00 00 00 65 5c ec 6e - f8 65 44 00 90 dd 06 00 ....e\.n.eD..... 0006dd68 74 dd 06 00 d4 dd 06 00 - 4e da f0 6f 69 00 00 00 t.......N..oi... 0006dd78 f8 65 44 00 20 00 00 00 - d8 80 23 00 00 9a 46 00 .eD. .....#...F. 0006dd88 10 6f 4b 00 f8 65 44 00 - 5b 54 68 75 20 4e 6f 76 .oK..eD.[Thu Nov 0006dd98 20 32 30 20 31 36 3a 35 - 31 3a 31 33 20 32 30 30 20 16:51:13 200 0006dda8 33 5d 20 5b 77 61 72 6e - 5d 20 28 4f 53 20 36 29 3] [warn] (OS 6) 0006ddb8 44 61 73 20 48 61 6e 64 - 6c 65 20 69 73 74 20 75 Das Handle ist u 0006ddc8 6e 67 fc 6c 74 69 67 2e - 20 20 3a 20 46 61 69 6c ng.ltig. : Fail 0006ddd8 65 64 20 74 6f 20 61 63 - 71 75 69 72 65 20 67 6c ed to acquire gl 0006dde8 6f 62 61 6c 20 6d 75 74 - 65 78 20 6c 6f 63 6b 0d obal mutex lock. 0006ddf8 0a 00 06 00 0c de 06 00 - 01 00 00 00 00 00 00 00 ................ Statusabbild für Threadkennung 0x568 eax=778221fe ebx=00000004 ecx=77da0260 edx=00000000 esi=778837a7 edi=00000004 eip=778837b2 esp=00a8fd24 ebp=00a8fd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 Funktion: NtWaitForMultipleObjects 778837a7 b8e9000000 mov eax,0xe9 778837ac 8d542404 lea edx,[esp+0x4] ss:0150d2f7=??? ????? 778837b0 cd2e int 2e 778837b2 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00A8FD70 77E7A31D 00A8FD48 00000001 00000000 00000000 ntdll! NtWaitForMultipleObjects 00A8FFB4 77E787DD 00000005 00000000 000B000A 00072680 kernel32! WaitForMultipleObjects 00A8FFEC 00000000 778221FE 00072680 00000000 000000C8 kernel32! GetModuleFileNameA *----> Raw Stack Dump <----* 00a8fd24 b7 7a e7 77 04 00 00 00 - 48 fd a8 00 01 00 00 00 .z.w....H....... 00a8fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 80 26 07 00 .............&.. 00a8fd44 01 00 00 00 d4 00 00 00 - d8 00 00 00 f0 00 00 00 ................ 00a8fd54 5c 01 00 00 00 00 00 00 - 00 00 00 00 48 54 8a 81 \...........HT.. 00a8fd64 04 00 00 00 01 00 00 00 - 20 54 8a 81 b4 ff a8 00 ........ T...... 00a8fd74 1d a3 e7 77 48 fd a8 00 - 01 00 00 00 00 00 00 00 ...wH........... 00a8fd84 00 00 00 00 00 00 00 00 - b2 22 82 77 04 00 00 00 .........".w.... 00a8fd94 b0 fe a8 00 00 00 00 00 - ff ff ff ff 80 26 07 00 .............&.. 00a8fda4 0a 00 0b 00 00 00 00 00 - 64 ff 44 80 58 c3 76 e2 ........d.D.X.v. 00a8fdb4 23 fc 44 80 00 00 00 00 - 01 00 00 00 38 00 00 00 #.D.........8... 00a8fdc4 23 00 00 00 23 00 00 00 - 00 00 00 00 0a 00 0b 00 #...#........... 00a8fdd4 80 26 07 00 00 6c 88 77 - 60 02 da 77 fe 21 82 77 .&...l.w`..w.!.w 00a8fde4 00 00 00 00 85 87 e7 77 - 1b 00 00 00 00 02 00 00 .......w........ 00a8fdf4 fc ff a8 00 23 00 00 00 - 0c 2b 32 b7 04 00 00 00 ....#....+2..... 00a8fe04 05 00 00 00 98 00 00 00 - f8 00 00 00 98 00 00 00 ................ 00a8fe14 74 2b 32 b7 00 08 45 80 - 05 00 00 00 24 00 01 e1 t+2...E.....$... 00a8fe24 05 00 00 00 fe ff f8 00 - b8 e6 1f 81 34 00 00 c0 ............4... 00a8fe34 88 4b 16 e3 02 00 00 00 - 49 03 00 00 88 4b 16 e3 .K......I....K.. 00a8fe44 60 2b 32 b7 d0 87 8a 81 - b4 2b 32 b7 0c 11 45 80 `+2......+2...E. 00a8fe54 88 87 00 e1 e0 49 8a 81 - bc 2c 32 b7 68 87 8a 81 .....I...,2.h... --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
