ID: 43410
User updated by: andy_wolk at mail dot ru
Reported By: andy_wolk at mail dot ru
-Status: Feedback
+Status: Open
Bug Type: SNMP related
Operating System: Windows 2003 Server Enterprise
PHP Version: 5.2.5
New Comment:
Analysis Summary
Type Description Recommendation
Error In
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x20657355 on thread 10
Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.
Current NTGlobalFlags value: 0x0 An access violation exception thrown
by a heap memory manager function indicates heap corruption. Please
follow the steps outlined in the following Knowledge Base article:
300966 Howto debug heap corruption issues in Internet Information
Services (IIS)
Error In
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!RtlAllocateHeap+579 in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x00000000 on thread 54
Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.
Current NTGlobalFlags value: 0x0 An access violation exception thrown
by a heap memory manager function indicates heap corruption. Please
follow the steps outlined in the following Knowledge Base article:
300966 Howto debug heap corruption issues in Internet Information
Services (IIS)
Error In
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x64006f00 on thread 2
Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.
Current NTGlobalFlags value: 0x0 An access violation exception thrown
by a heap memory manager function indicates heap corruption. Please
follow the steps outlined in the following Knowledge Base article:
300966 Howto debug heap corruption issues in Internet Information
Services (IIS)
Information DebugDiag determined that this dump file
(w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.
Information DebugDiag determined that this dump file
(w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.
Information DebugDiag determined that this dump file
(w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.
Analysis Details
Your browser settings are currently prohibiting this report's scripts
from running.
This is preventing some features of this analysis report from
displaying properly. To enable scripts to run, right-click the security
warning above and choose "Allow Blocked Content..." or enable the "Allow
active content to run in files on My Computer*" setting on the Advanced
tab of your "Internet Options" dialog to avoid being prompted in the
future
Table Of Contents
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
Faulting Thread
Faulting Module Information
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
Faulting Thread
Faulting Module Information
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
Faulting Thread
Faulting Module Information
Report for
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
Report for
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed Crash Analysis
Machine Name INETVPNSERVER
Operating System Windows Server 2003 Service Pack 2
Number Of Processors 8
Process ID 3460
Process Image c:\WINDOWS\system32\inetsrv\w3wp.exe
System Up-Time 61 day(s) 11:20:36
Process Up-Time 01:03:30
Thread 2 - System ID 4592
Entry point ntdll!RtlpWorkerThread
Create time 20.02.2008 15:53:09
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0
Function Arg 1 Arg 2 Arg 3 Source
ntdll!ExpInterlockedPopEntrySListFault 00030718 00d0fde4
7c82a0b8
ntdll!RtlpAllocateFromHeapLookaside+13 00030718 00000010
000392b8
ntdll!RtlAllocateHeap+1dd 00030000 00000000 00000010
msvcrt!_heap_alloc+26 00000010 00000010 000392b8
msvcrt!operator new+24 00000010 00000000 000392b8
iisutil!IPM_MESSAGE_IMP::AllocateDataLength+12 00000010
000391d8 00000000
iisutil!IPM_MESSAGE_PIPE::ReadMessage+9b 00000010 000392b8
64710045
iisutil!IPM_MESSAGE_PIPE::MessagePipeCompletion+31d 000392b8
000e1b00 000e1b90
ntdll!RtlpWaitOrTimerCallout+74 64710045 000392b8 000e1b00
ntdll!RtlpAsyncWaitCallbackCompletion+37 000e1b90 7c889080
00093d20
ntdll!RtlpWorkerCallout+71 7c83ca2b 000e1b90 00000000
ntdll!RtlpExecuteWorkerRequest+4f 00000000 000e1b90
00093d20
ntdll!RtlpApcCallout+11 7c83a9ca 00000000 000e1b90
ntdll!RtlpWorkerThread+61 00000000 00000000 00000000
kernel32!BaseThreadStart+34 7c839efb 00000000 00000000
NTDLL!EXPINTERLOCKEDPOPENTRYSLISTFAULT
Detailed Info For Corrupt Heap
Heap 3 - 0x00030000
Heap Name msvcrt!_crtheap
Heap Description This heap is used by msvcrt
Reserved memory 7,06 MBytes
Committed memory 4,75 MBytes (67,26% of reserved)
Uncommitted memory 2,31 MBytes (32,74% of reserved)
Number of heap segments 4 segments
Number of uncommitted ranges 1 range(s)
Size of largest uncommitted range 2,31 MBytes
Calculated heap fragmentation 0,00%
Segment Information
Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation
0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00%
0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00%
0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00%
0x03510000 4,00 MBytes 1,69 MBytes 2,31 MBytes 1 2,31 MBytes 0,00%
Top 5 allocations by size
Allocation Size - 140
Allocation Size - 32
Allocation Size - 584
Allocation Size - 56
Allocation Size - 308
1,61 MBytes
253,09 KBytes
187,06 KBytes
125,89 KBytes
99,56 KBytes
Top 5 allocations by count
Allocation Size - 140
Allocation Size - 32
Allocation Size - 56
Allocation Size - 12
Allocation Size - 47
12064 allocation(s)
8099 allocation(s)
2302 allocation(s)
1757 allocation(s)
1756 allocation(s)
Back to Top
In
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x64006f00 on thread 2
Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.
Current NTGlobalFlags value: 0x0 Module Information
Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB
Base address: 0x7c800000 Time Stamp: Sat Feb 17 17:02:00 2007
Checksum: 0x000bd6f9 Comments:
COM DLL: False Company Name: Microsoft Corporation
ISAPIExtension: False File Description: NT Layer DLL
ISAPIFilter: False File Version: 5.2.3790.3959
(srv03_sp2_rtm.070216-1710)
Managed DLL: False Internal Name: ntdll.dll
VB DLL: False Legal Copyright: © Microsoft Corporation. All rights
reserved.
Loaded Image Name: ntdll.dll Legal Trademarks:
Mapped Image Name: Original filename: ntdll.dll
Module name: ntdll Private Build:
Single Threaded: False Product Name: Microsoft® Windows® Operating
System
Module Size: 768,00 KBytes Product Version: 5.2.3790.3959
Symbol File Name:
c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb
Special Build: &
Report for
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
Report for
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed Crash Analysis
Machine Name INETVPNSERVER
Operating System Windows Server 2003 Service Pack 2
Number Of Processors 8
Process ID 7844
Process Image c:\WINDOWS\system32\inetsrv\w3wp.exe
System Up-Time 59 day(s) 14:12:49
Process Up-Time 08:38:49
Thread 54 - System ID 1536
Entry point w3tp!THREAD_MANAGER::ThreadManagerThread
Create time 18.02.2008 19:37:07
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:2.515
Function Arg 1 Arg 2 Arg 3 Source
ntdll!RtlAllocateHeap+579 00030000 00000000 00000084
msvcrt!malloc+6c 00000084 00000010 083bf910
php5ts!ts_resource_ex+103 056359ec 00000600 1093f9c8
php5ts!ts_resource_ex+c4 00000000 00000600 083bf910
php5isapi!HttpFilterProc+b 1093fa1c 00004000 083bf910
w3core!W3_MAIN_CONTEXT::NotifyFilters+e0 a1000001 5a3de000
145d8b53
0x28ec81ec 8bfc4589 8b571045 8589087d
0x0c758b56 8b571045 8589087d fffffed8
0x80000000`00000000 8589087d fffffed8 00008068
0x80000000`00000000 fffffed8 00008068 3c858d00
0x80000000`00000000 00008068 3c858d00 50ffffff
0x80000000`00000000 3c858d00 50ffffff ff0c8d8d
NTDLL!RTLALLOCATEHEAP+579
Detailed Info For Corrupt Heap
Heap 3 - 0x00030000
Heap Name msvcrt!_crtheap
Heap Description This heap is used by msvcrt
Reserved memory 63,06 MBytes
Committed memory 39,68 MBytes (62,92% of reserved)
Uncommitted memory 23,39 MBytes (37,08% of reserved)
Number of heap segments 7 segments
Number of uncommitted ranges 1 range(s)
Size of largest uncommitted range 23,39 MBytes
Calculated heap fragmentation 0,00%
Segment Information
Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation
0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00%
0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00%
0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00%
0x03640000 4,00 MBytes 4,00 MBytes 0 Bytes 0 0 Bytes 0,00%
0x055a0000 8,00 MBytes 8,00 MBytes 0 Bytes 0 0 Bytes 0,00%
0x08680000 16,00 MBytes 16,00 MBytes 0 Bytes 0 0 Bytes 0,00%
0x0d430000 32,00 MBytes 8,61 MBytes 23,39 MBytes 1 23,39 MBytes 0,00%
Top 5 allocations by size
Allocation Size - 584
Allocation Size - 308
Allocation Size - 140
Allocation Size - 32
Allocation Size - 56
13,24 MBytes
7,60 MBytes
6,74 MBytes
1,08 MBytes
568,42 KBytes
Top 5 allocations by count
Allocation Size - 140
Allocation Size - 32
Allocation Size - 12
Allocation Size - 308
Allocation Size - 584
50503 allocation(s)
35387 allocation(s)
26779 allocation(s)
25874 allocation(s)
23765 allocation(s)
Back to Top
In
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!RtlAllocateHeap+579 in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x00000000 on thread 54
Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.
Current NTGlobalFlags value: 0x0 Module Information
Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB
Base address: 0x7c800000 Time Stamp: Sat Feb 17 17:02:00 2007
Checksum: 0x000bd6f9 Comments:
COM DLL: False Company Name: Microsoft Corporation
ISAPIExtension: False File Description: NT Layer DLL
ISAPIFilter: False File Version: 5.2.3790.3959
(srv03_sp2_rtm.070216-1710)
Managed DLL: False Internal Name: ntdll.dll
VB DLL: False Legal Copyright: © Microsoft Corporation. All rights
reserved.
Loaded Image Name: ntdll.dll Legal Trademarks:
Mapped Image Name: Original filename: ntdll.dll
Module name: ntdll Private Build:
Single Threaded: False Product Name: Microsoft® Windows® Operating
System
Module Size: 768,00 KBytes Product Version: 5.2.3790.3959
Symbol File Name:
c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb
Special Build: &
Report for
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
Report for
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed Crash Analysis
Machine Name INETVPNSERVER
Operating System Windows Server 2003 Service Pack 2
Number Of Processors 8
Process ID 4516
Process Image c:\WINDOWS\system32\inetsrv\w3wp.exe
System Up-Time 59 day(s) 15:52:24
Process Up-Time 01:38:30
Thread 10 - System ID 3228
Entry point w3tp!THREAD_MANAGER::ThreadManagerThread
Create time 18.02.2008 19:49:57
Time spent in user mode 0 Days 0:0:0.281
Time spent in kernel mode 0 Days 0:0:0.171
Function Arg 1 Arg 2 Arg 3 Source
ntdll!ExpInterlockedPopEntrySListFault 00030838 0124fed0
7c82a0b8
ntdll!RtlpAllocateFromHeapLookaside+13 00030838 0000003c
00000000
ntdll!RtlAllocateHeap+1dd 00030000 00000000 0000003c
msvcrt!_heap_alloc+26 0000003c 00000000 00000000
msvcrt!operator new+24 0000003c 5a361d28 00000008
iisutil!IPM_MESSAGE_IMP::CreateMessage+1c 0124ff34 00039238
5a361d28
iisutil!IPM_MESSAGE_PIPE::WriteMessage+5e 00000002 00000000
00000000
w3dt!WP_IPM::HandlePing+59 00000000 00000000 00038bb8
w3tp!THREAD_POOL_DATA::ThreadPoolThread+73 00000000 00038b78
5a300000
w3tp!THREAD_POOL_DATA::ThreadPoolThread+24 00000102 00000000
00000000
w3tp!THREAD_MANAGER::ThreadManagerThread+39 00038b78 00000000
00000000
kernel32!BaseThreadStart+34 5a301d70 00038b78 00000000
NTDLL!EXPINTERLOCKEDPOPENTRYSLISTFAULT
Detailed Info For Corrupt Heap
Heap 3 - 0x00030000
Heap Name msvcrt!_crtheap
Heap Description This heap is used by msvcrt
Reserved memory 7,06 MBytes
Committed memory 3,89 MBytes (55,14% of reserved)
Uncommitted memory 3,17 MBytes (44,86% of reserved)
Number of heap segments 4 segments
Number of uncommitted ranges 1 range(s)
Size of largest uncommitted range 3,17 MBytes
Calculated heap fragmentation 0,00%
Segment Information
Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation
0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00%
0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00%
0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00%
0x03920000 4,00 MBytes 852,00 KBytes 3,17 MBytes 1 3,17 MBytes 0,00%
Top 5 allocations by size
Allocation Size - 140
Allocation Size - 32
Allocation Size - 56
Allocation Size - 584
Allocation Size - 8192
1,32 MBytes
205,84 KBytes
101,12 KBytes
97,52 KBytes
80,00 KBytes
Top 5 allocations by count
Allocation Size - 140
Allocation Size - 32
Allocation Size - 56
Allocation Size - 12
Allocation Size - 47
9895 allocation(s)
6587 allocation(s)
1849 allocation(s)
1498 allocation(s)
1462 allocation(s)
Back to Top
In
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x20657355 on thread 10
Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.
Current NTGlobalFlags value: 0x0 Module Information
Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB
Base address: 0x7c800000 Time Stamp: Sat Feb 17 17:02:00 2007
Checksum: 0x000bd6f9 Comments:
COM DLL: False Company Name: Microsoft Corporation
ISAPIExtension: False File Description: NT Layer DLL
ISAPIFilter: False File Version: 5.2.3790.3959
(srv03_sp2_rtm.070216-1710)
Managed DLL: False Internal Name: ntdll.dll
VB DLL: False Legal Copyright: © Microsoft Corporation. All rights
reserved.
Loaded Image Name: ntdll.dll Legal Trademarks:
Mapped Image Name: Original filename: ntdll.dll
Module name: ntdll Private Build:
Single Threaded: False Product Name: Microsoft® Windows® Operating
System
Module Size: 768,00 KBytes Product Version: 5.2.3790.3959
Symbol File Name:
c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb
Special Build: &
Script Summary
Script Name Status Error Code Error Source Error Description Source
Line
CrashHangAnalysis.asp Completed
Previous Comments:
------------------------------------------------------------------------
[2008-02-17 11:56:45] [EMAIL PROTECTED]
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php for *NIX and
http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32
Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PHP better.
------------------------------------------------------------------------
[2007-11-26 11:50:45] andy_wolk at mail dot ru
Description:
------------
SNMP functions cause "PHP has encountered an Access Violation" when
wrong IP or Community String.
IIS 6 + PHP5.2.2dev isapi module.
PHP_snmp.dll (ver 5.2.2.2)
All next php versions has the same problem.
After this error, IIS does not can operate with snmp module and needs
to be restarted.
Event viewer: Faulting application w3wp.exe, version 6.0.3790.3959,
faulting module unknown, version 0.0.0.0, fault address 0x010cfdf4.
No errors in php_error.log
Reproduce code:
---------------
<html>
<head>
<title></title>
</head>
<body>
<?php
echo "Start...";
flush();
$communitystring=''; // Your device must have this string no empty!
$ip='10.200.202.97'; // Sometimes this error occured, when there is no
Device in a network with this IP.
for ($i=1;$i<14;$i++)
{
$port=100+$i;
$oid='.1.3.6.1.2.1.26.2.1.1.5.${port}.1';
@snmpget($ip,$communitystring,$oid);
$oid='.1.3.6.1.2.1.26.2.1.1.5.${port}.1';
@snmpwalk($ip,$communitystring,$oid);
$oid='.1.3.6.1.2.1.2.2.1.7.${port}';
@snmpget($ip,$communitystring,$oid);
$oid='.1.3.6.1.2.1.2.2.1.7.${port}';
@snmpwalk($ip,$communitystring,$oid);
$oid='.1.3.6.1.4.1.43.10.22.1.1.3.1.$i';
@snmpget($ip,$communitystring,$oid);
$oid='.1.3.6.1.4.1.43.10.22.1.1.3.1.$i';
@snmpwalk($ip,$communitystring,$oid);
$oid='.1.3.6.1.4.1.43.10.22.1.1.5.1.$i';
@snmpget($ip,$communitystring,$oid);
$oid='.1.3.6.1.4.1.43.10.22.1.1.5.1.$i';
@snmpwalk($ip,$communitystring,$oid);
$oid='.1.3.6.1.2.1.26.2.1.1.3.${port}.1';
@snmpget($ip,$communitystring,$oid);
$oid='.1.3.6.1.2.1.26.2.1.1.3.${port}.1';
@snmpwalk($ip,$communitystring,$oid);
}
echo "Finish";
?>
</body>
</html>
Expected result:
----------------
Start...Finish
Actual result:
--------------
Start...PHP has encountered an Access Violation at xxxxxxxx
------------------------------------------------------------------------
--
Edit this bug report at http://bugs.php.net/?id=43410&edit=1