ID:               43410
 Updated by:       [EMAIL PROTECTED]
 Reported By:      andy_wolk at mail dot ru
-Status:           Open
+Status:           Feedback
 Bug Type:         SNMP related
 Operating System: Windows 2003 Server Enterprise
 PHP Version:      5.2.5
 New Comment:

Please try using this CVS snapshot:

  http://snaps.php.net/php5.2-latest.tar.gz
 
For Windows:

  http://windows.php.net/snapshots/

Do not paste such huge texts here. Put them somewhere in net (like
http://phpfi.com/) where we can check them out.



Previous Comments:
------------------------------------------------------------------------

[2008-02-20 14:04:36] andy_wolk at mail dot ru

Analysis Summary  
  Type Description Recommendation 
  Error In
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x20657355 on thread 10

Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.

Current NTGlobalFlags value: 0x0 An access violation exception thrown
by a heap memory manager function indicates heap corruption. Please
follow the steps outlined in the following Knowledge Base article: 
300966 Howto debug heap corruption issues in Internet Information
Services (IIS)  
  Error In
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!RtlAllocateHeap+579 in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x00000000 on thread 54

Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.

Current NTGlobalFlags value: 0x0 An access violation exception thrown
by a heap memory manager function indicates heap corruption. Please
follow the steps outlined in the following Knowledge Base article: 
300966 Howto debug heap corruption issues in Internet Information
Services (IIS)  
  Error In
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x64006f00 on thread 2

Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.

Current NTGlobalFlags value: 0x0 An access violation exception thrown
by a heap memory manager function indicates heap corruption. Please
follow the steps outlined in the following Knowledge Base article: 
300966 Howto debug heap corruption issues in Internet Information
Services (IIS)  
  Information DebugDiag determined that this dump file
(w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.   
  Information DebugDiag determined that this dump file
(w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.   
  Information DebugDiag determined that this dump file
(w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.   
 
 

 
 Analysis Details  
  


 Your browser settings are currently prohibiting this report's scripts
from running.
This is preventing some features of this analysis report from
displaying properly. To enable scripts to run, right-click the security
warning above and choose "Allow Blocked Content..." or enable the "Allow
active content to run in files on My Computer*" setting on the Advanced
tab of your "Internet Options" dialog to avoid being prompted in the
future 



Table Of Contents
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
   Faulting Thread
   Faulting Module Information

w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
   Faulting Thread
   Faulting Module Information

w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
   Faulting Thread
   Faulting Module Information

 Report for
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp



Report for
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   INETVPNSERVER 
Operating System   Windows Server 2003 Service Pack 2 
Number Of Processors   8 
Process ID   3460 
Process Image   c:\WINDOWS\system32\inetsrv\w3wp.exe 
System Up-Time   61 day(s) 11:20:36 
Process Up-Time   01:03:30 


Thread 2 - System ID 4592
Entry point   ntdll!RtlpWorkerThread 
Create time   20.02.2008 15:53:09 
Time spent in user mode   0 Days 0:0:0.0 
Time spent in kernel mode   0 Days 0:0:0.0 




Function     Arg 1     Arg 2     Arg 3   Source 
ntdll!ExpInterlockedPopEntrySListFault     00030718     00d0fde4    
7c82a0b8    
ntdll!RtlpAllocateFromHeapLookaside+13     00030718     00000010    
000392b8    
ntdll!RtlAllocateHeap+1dd     00030000     00000000     00000010    
msvcrt!_heap_alloc+26     00000010     00000010     000392b8    
msvcrt!operator new+24     00000010     00000000     000392b8    
iisutil!IPM_MESSAGE_IMP::AllocateDataLength+12     00000010    
000391d8     00000000    
iisutil!IPM_MESSAGE_PIPE::ReadMessage+9b     00000010     000392b8    
64710045    
iisutil!IPM_MESSAGE_PIPE::MessagePipeCompletion+31d     000392b8    
000e1b00     000e1b90    
ntdll!RtlpWaitOrTimerCallout+74     64710045     000392b8     000e1b00 
  
ntdll!RtlpAsyncWaitCallbackCompletion+37     000e1b90     7c889080    
00093d20    
ntdll!RtlpWorkerCallout+71     7c83ca2b     000e1b90     00000000    
ntdll!RtlpExecuteWorkerRequest+4f     00000000     000e1b90    
00093d20    
ntdll!RtlpApcCallout+11     7c83a9ca     00000000     000e1b90    
ntdll!RtlpWorkerThread+61     00000000     00000000     00000000    
kernel32!BaseThreadStart+34     7c839efb     00000000     00000000    


NTDLL!EXPINTERLOCKEDPOPENTRYSLISTFAULT 


Detailed Info For Corrupt Heap
Heap 3 - 0x00030000 
Heap Name   msvcrt!_crtheap 
Heap Description   This heap is used by msvcrt 
Reserved memory   7,06 MBytes 
Committed memory   4,75 MBytes (67,26% of reserved)  
Uncommitted memory   2,31 MBytes (32,74% of reserved)  
Number of heap segments   4 segments 
Number of uncommitted ranges   1 range(s) 
Size of largest uncommitted range   2,31 MBytes 
Calculated heap fragmentation   0,00% 



Segment Information
Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation 
0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00% 
0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00% 
0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00% 
0x03510000 4,00 MBytes 1,69 MBytes 2,31 MBytes 1 2,31 MBytes 0,00% 



Top 5 allocations by size

Allocation Size - 140 
Allocation Size - 32 
Allocation Size - 584 
Allocation Size - 56 
Allocation Size - 308 
   
    
    
    
    
 1,61 MBytes 
253,09 KBytes 
187,06 KBytes 
125,89 KBytes 
99,56 KBytes 
 

Top 5 allocations by count

Allocation Size - 140 
Allocation Size - 32 
Allocation Size - 56 
Allocation Size - 12 
Allocation Size - 47 
   
    
    
    
    
 12064 allocation(s) 
8099 allocation(s) 
2302 allocation(s) 
1757 allocation(s) 
1756 allocation(s) 
 
Back to Top 



In
w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x64006f00 on thread 2

Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.

Current NTGlobalFlags value: 0x0 Module Information 
Image Name: C:\WINDOWS\system32\ntdll.dll   Symbol Type:  PDB 
Base address: 0x7c800000   Time Stamp:  Sat Feb 17 17:02:00 2007  
Checksum: 0x000bd6f9   Comments:   
COM DLL: False   Company Name:  Microsoft Corporation 
ISAPIExtension: False   File Description:  NT Layer DLL 
ISAPIFilter: False   File Version:  5.2.3790.3959
(srv03_sp2_rtm.070216-1710) 
Managed DLL: False   Internal Name:  ntdll.dll 
VB DLL: False   Legal Copyright:  © Microsoft Corporation. All rights
reserved. 
Loaded Image Name:  ntdll.dll   Legal Trademarks:   
Mapped Image Name:     Original filename:  ntdll.dll 
Module name:  ntdll   Private Build:   
Single Threaded:  False   Product Name:  Microsoft® Windows® Operating
System 
Module Size:  768,00 KBytes   Product Version:  5.2.3790.3959 
Symbol File Name: 
c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb  
Special Build:  & 



 Report for
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp



Report for
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   INETVPNSERVER 
Operating System   Windows Server 2003 Service Pack 2 
Number Of Processors   8 
Process ID   7844 
Process Image   c:\WINDOWS\system32\inetsrv\w3wp.exe 
System Up-Time   59 day(s) 14:12:49 
Process Up-Time   08:38:49 


Thread 54 - System ID 1536
Entry point   w3tp!THREAD_MANAGER::ThreadManagerThread 
Create time   18.02.2008 19:37:07 
Time spent in user mode   0 Days 0:0:0.0 
Time spent in kernel mode   0 Days 0:0:2.515 




Function     Arg 1     Arg 2     Arg 3   Source 
ntdll!RtlAllocateHeap+579     00030000     00000000     00000084    
msvcrt!malloc+6c     00000084     00000010     083bf910    
php5ts!ts_resource_ex+103     056359ec     00000600     1093f9c8    
php5ts!ts_resource_ex+c4     00000000     00000600     083bf910    
php5isapi!HttpFilterProc+b     1093fa1c     00004000     083bf910    
w3core!W3_MAIN_CONTEXT::NotifyFilters+e0     a1000001     5a3de000    
145d8b53    
0x28ec81ec     8bfc4589     8b571045     8589087d    
0x0c758b56     8b571045     8589087d     fffffed8    
0x80000000`00000000     8589087d     fffffed8     00008068    
0x80000000`00000000     fffffed8     00008068     3c858d00    
0x80000000`00000000     00008068     3c858d00     50ffffff    
0x80000000`00000000     3c858d00     50ffffff     ff0c8d8d    


NTDLL!RTLALLOCATEHEAP+579 


Detailed Info For Corrupt Heap
Heap 3 - 0x00030000 
Heap Name   msvcrt!_crtheap 
Heap Description   This heap is used by msvcrt 
Reserved memory   63,06 MBytes 
Committed memory   39,68 MBytes (62,92% of reserved)  
Uncommitted memory   23,39 MBytes (37,08% of reserved)  
Number of heap segments   7 segments 
Number of uncommitted ranges   1 range(s) 
Size of largest uncommitted range   23,39 MBytes 
Calculated heap fragmentation   0,00% 



Segment Information
Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation 
0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00% 
0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00% 
0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00% 
0x03640000 4,00 MBytes 4,00 MBytes 0 Bytes 0 0 Bytes 0,00% 
0x055a0000 8,00 MBytes 8,00 MBytes 0 Bytes 0 0 Bytes 0,00% 
0x08680000 16,00 MBytes 16,00 MBytes 0 Bytes 0 0 Bytes 0,00% 
0x0d430000 32,00 MBytes 8,61 MBytes 23,39 MBytes 1 23,39 MBytes 0,00% 



Top 5 allocations by size

Allocation Size - 584 
Allocation Size - 308 
Allocation Size - 140 
Allocation Size - 32 
Allocation Size - 56 
   
    
    
    
    
 13,24 MBytes 
7,60 MBytes 
6,74 MBytes 
1,08 MBytes 
568,42 KBytes 
 

Top 5 allocations by count

Allocation Size - 140 
Allocation Size - 32 
Allocation Size - 12 
Allocation Size - 308 
Allocation Size - 584 
   
    
    
    
    
 50503 allocation(s) 
35387 allocation(s) 
26779 allocation(s) 
25874 allocation(s) 
23765 allocation(s) 
 
Back to Top 



In
w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!RtlAllocateHeap+579 in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x00000000 on thread 54

Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.

Current NTGlobalFlags value: 0x0 Module Information 
Image Name: C:\WINDOWS\system32\ntdll.dll   Symbol Type:  PDB 
Base address: 0x7c800000   Time Stamp:  Sat Feb 17 17:02:00 2007  
Checksum: 0x000bd6f9   Comments:   
COM DLL: False   Company Name:  Microsoft Corporation 
ISAPIExtension: False   File Description:  NT Layer DLL 
ISAPIFilter: False   File Version:  5.2.3790.3959
(srv03_sp2_rtm.070216-1710) 
Managed DLL: False   Internal Name:  ntdll.dll 
VB DLL: False   Legal Copyright:  © Microsoft Corporation. All rights
reserved. 
Loaded Image Name:  ntdll.dll   Legal Trademarks:   
Mapped Image Name:     Original filename:  ntdll.dll 
Module name:  ntdll   Private Build:   
Single Threaded:  False   Product Name:  Microsoft® Windows® Operating
System 
Module Size:  768,00 KBytes   Product Version:  5.2.3790.3959 
Symbol File Name: 
c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb  
Special Build:  & 



 Report for
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp



Report for
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   INETVPNSERVER 
Operating System   Windows Server 2003 Service Pack 2 
Number Of Processors   8 
Process ID   4516 
Process Image   c:\WINDOWS\system32\inetsrv\w3wp.exe 
System Up-Time   59 day(s) 15:52:24 
Process Up-Time   01:38:30 


Thread 10 - System ID 3228
Entry point   w3tp!THREAD_MANAGER::ThreadManagerThread 
Create time   18.02.2008 19:49:57 
Time spent in user mode   0 Days 0:0:0.281 
Time spent in kernel mode   0 Days 0:0:0.171 




Function     Arg 1     Arg 2     Arg 3   Source 
ntdll!ExpInterlockedPopEntrySListFault     00030838     0124fed0    
7c82a0b8    
ntdll!RtlpAllocateFromHeapLookaside+13     00030838     0000003c    
00000000    
ntdll!RtlAllocateHeap+1dd     00030000     00000000     0000003c    
msvcrt!_heap_alloc+26     0000003c     00000000     00000000    
msvcrt!operator new+24     0000003c     5a361d28     00000008    
iisutil!IPM_MESSAGE_IMP::CreateMessage+1c     0124ff34     00039238    
5a361d28    
iisutil!IPM_MESSAGE_PIPE::WriteMessage+5e     00000002     00000000    
00000000    
w3dt!WP_IPM::HandlePing+59     00000000     00000000     00038bb8    
w3tp!THREAD_POOL_DATA::ThreadPoolThread+73     00000000     00038b78   
 5a300000    
w3tp!THREAD_POOL_DATA::ThreadPoolThread+24     00000102     00000000   
 00000000    
w3tp!THREAD_MANAGER::ThreadManagerThread+39     00038b78     00000000  
  00000000    
kernel32!BaseThreadStart+34     5a301d70     00038b78     00000000    


NTDLL!EXPINTERLOCKEDPOPENTRYSLISTFAULT 


Detailed Info For Corrupt Heap
Heap 3 - 0x00030000 
Heap Name   msvcrt!_crtheap 
Heap Description   This heap is used by msvcrt 
Reserved memory   7,06 MBytes 
Committed memory   3,89 MBytes (55,14% of reserved)  
Uncommitted memory   3,17 MBytes (44,86% of reserved)  
Number of heap segments   4 segments 
Number of uncommitted ranges   1 range(s) 
Size of largest uncommitted range   3,17 MBytes 
Calculated heap fragmentation   0,00% 



Segment Information
Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation 
0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00% 
0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00% 
0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00% 
0x03920000 4,00 MBytes 852,00 KBytes 3,17 MBytes 1 3,17 MBytes 0,00% 



Top 5 allocations by size

Allocation Size - 140 
Allocation Size - 32 
Allocation Size - 56 
Allocation Size - 584 
Allocation Size - 8192 
   
    
    
    
    
 1,32 MBytes 
205,84 KBytes 
101,12 KBytes 
97,52 KBytes 
80,00 KBytes 
 

Top 5 allocations by count

Allocation Size - 140 
Allocation Size - 32 
Allocation Size - 56 
Allocation Size - 12 
Allocation Size - 47 
   
    
    
    
    
 9895 allocation(s) 
6587 allocation(s) 
1849 allocation(s) 
1498 allocation(s) 
1462 allocation(s) 
 
Back to Top 



In
w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in
C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x20657355 on thread 10

Heap corruption was detected in heap 0x00030000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.

Current NTGlobalFlags value: 0x0 Module Information 
Image Name: C:\WINDOWS\system32\ntdll.dll   Symbol Type:  PDB 
Base address: 0x7c800000   Time Stamp:  Sat Feb 17 17:02:00 2007  
Checksum: 0x000bd6f9   Comments:   
COM DLL: False   Company Name:  Microsoft Corporation 
ISAPIExtension: False   File Description:  NT Layer DLL 
ISAPIFilter: False   File Version:  5.2.3790.3959
(srv03_sp2_rtm.070216-1710) 
Managed DLL: False   Internal Name:  ntdll.dll 
VB DLL: False   Legal Copyright:  © Microsoft Corporation. All rights
reserved. 
Loaded Image Name:  ntdll.dll   Legal Trademarks:   
Mapped Image Name:     Original filename:  ntdll.dll 
Module name:  ntdll   Private Build:   
Single Threaded:  False   Product Name:  Microsoft® Windows® Operating
System 
Module Size:  768,00 KBytes   Product Version:  5.2.3790.3959 
Symbol File Name: 
c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb  
Special Build:  & 


 
 

 
 Script Summary  
  Script Name Status Error Code Error Source Error Description Source
Line 
CrashHangAnalysis.asp Completed

------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/43410

-- 
Edit this bug report at http://bugs.php.net/?id=43410&edit=1

Reply via email to