ID: 43410 Updated by: [EMAIL PROTECTED] Reported By: andy_wolk at mail dot ru -Status: Open +Status: Feedback Bug Type: SNMP related Operating System: Windows 2003 Server Enterprise PHP Version: 5.2.5 New Comment:
Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows: http://windows.php.net/snapshots/ Do not paste such huge texts here. Put them somewhere in net (like http://phpfi.com/) where we can check them out. Previous Comments: ------------------------------------------------------------------------ [2008-02-20 14:04:36] andy_wolk at mail dot ru Analysis Summary Type Description Recommendation Error In w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x20657355 on thread 10 Heap corruption was detected in heap 0x00030000, however pageheap was not enabled in this dump. Please follow the instructions in the recommendation section for troubleshooting heap corruption issues. Current NTGlobalFlags value: 0x0 An access violation exception thrown by a heap memory manager function indicates heap corruption. Please follow the steps outlined in the following Knowledge Base article: 300966 Howto debug heap corruption issues in Internet Information Services (IIS) Error In w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp the assembly instruction at ntdll!RtlAllocateHeap+579 in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00000000 on thread 54 Heap corruption was detected in heap 0x00030000, however pageheap was not enabled in this dump. Please follow the instructions in the recommendation section for troubleshooting heap corruption issues. Current NTGlobalFlags value: 0x0 An access violation exception thrown by a heap memory manager function indicates heap corruption. Please follow the steps outlined in the following Knowledge Base article: 300966 Howto debug heap corruption issues in Internet Information Services (IIS) Error In w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x64006f00 on thread 2 Heap corruption was detected in heap 0x00030000, however pageheap was not enabled in this dump. Please follow the instructions in the recommendation section for troubleshooting heap corruption issues. Current NTGlobalFlags value: 0x0 An access violation exception thrown by a heap memory manager function indicates heap corruption. Please follow the steps outlined in the following Knowledge Base article: 300966 Howto debug heap corruption issues in Internet Information Services (IIS) Information DebugDiag determined that this dump file (w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp) is a crash dump and did not perform any hang analysis. If you wish to enable combined crash and hang analysis for crash dumps, edit the CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder) and set the g_DoCombinedAnalysis constant to True. Information DebugDiag determined that this dump file (w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp) is a crash dump and did not perform any hang analysis. If you wish to enable combined crash and hang analysis for crash dumps, edit the CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder) and set the g_DoCombinedAnalysis constant to True. Information DebugDiag determined that this dump file (w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp) is a crash dump and did not perform any hang analysis. If you wish to enable combined crash and hang analysis for crash dumps, edit the CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder) and set the g_DoCombinedAnalysis constant to True. Analysis Details Your browser settings are currently prohibiting this report's scripts from running. This is preventing some features of this analysis report from displaying properly. To enable scripts to run, right-click the security warning above and choose "Allow Blocked Content..." or enable the "Allow active content to run in files on My Computer*" setting on the Advanced tab of your "Internet Options" dialog to avoid being prompted in the future Table Of Contents w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp Faulting Thread Faulting Module Information w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp Faulting Thread Faulting Module Information w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp Faulting Thread Faulting Module Information Report for w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp Report for w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp Type of Analysis Performed Crash Analysis Machine Name INETVPNSERVER Operating System Windows Server 2003 Service Pack 2 Number Of Processors 8 Process ID 3460 Process Image c:\WINDOWS\system32\inetsrv\w3wp.exe System Up-Time 61 day(s) 11:20:36 Process Up-Time 01:03:30 Thread 2 - System ID 4592 Entry point ntdll!RtlpWorkerThread Create time 20.02.2008 15:53:09 Time spent in user mode 0 Days 0:0:0.0 Time spent in kernel mode 0 Days 0:0:0.0 Function Arg 1 Arg 2 Arg 3 Source ntdll!ExpInterlockedPopEntrySListFault 00030718 00d0fde4 7c82a0b8 ntdll!RtlpAllocateFromHeapLookaside+13 00030718 00000010 000392b8 ntdll!RtlAllocateHeap+1dd 00030000 00000000 00000010 msvcrt!_heap_alloc+26 00000010 00000010 000392b8 msvcrt!operator new+24 00000010 00000000 000392b8 iisutil!IPM_MESSAGE_IMP::AllocateDataLength+12 00000010 000391d8 00000000 iisutil!IPM_MESSAGE_PIPE::ReadMessage+9b 00000010 000392b8 64710045 iisutil!IPM_MESSAGE_PIPE::MessagePipeCompletion+31d 000392b8 000e1b00 000e1b90 ntdll!RtlpWaitOrTimerCallout+74 64710045 000392b8 000e1b00 ntdll!RtlpAsyncWaitCallbackCompletion+37 000e1b90 7c889080 00093d20 ntdll!RtlpWorkerCallout+71 7c83ca2b 000e1b90 00000000 ntdll!RtlpExecuteWorkerRequest+4f 00000000 000e1b90 00093d20 ntdll!RtlpApcCallout+11 7c83a9ca 00000000 000e1b90 ntdll!RtlpWorkerThread+61 00000000 00000000 00000000 kernel32!BaseThreadStart+34 7c839efb 00000000 00000000 NTDLL!EXPINTERLOCKEDPOPENTRYSLISTFAULT Detailed Info For Corrupt Heap Heap 3 - 0x00030000 Heap Name msvcrt!_crtheap Heap Description This heap is used by msvcrt Reserved memory 7,06 MBytes Committed memory 4,75 MBytes (67,26% of reserved) Uncommitted memory 2,31 MBytes (32,74% of reserved) Number of heap segments 4 segments Number of uncommitted ranges 1 range(s) Size of largest uncommitted range 2,31 MBytes Calculated heap fragmentation 0,00% Segment Information Base Address Reserved Size Committed Size Uncommitted Size Number of uncommitted ranges Largest uncommitted block Calculated heap fragmentation 0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00% 0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00% 0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00% 0x03510000 4,00 MBytes 1,69 MBytes 2,31 MBytes 1 2,31 MBytes 0,00% Top 5 allocations by size Allocation Size - 140 Allocation Size - 32 Allocation Size - 584 Allocation Size - 56 Allocation Size - 308 1,61 MBytes 253,09 KBytes 187,06 KBytes 125,89 KBytes 99,56 KBytes Top 5 allocations by count Allocation Size - 140 Allocation Size - 32 Allocation Size - 56 Allocation Size - 12 Allocation Size - 47 12064 allocation(s) 8099 allocation(s) 2302 allocation(s) 1757 allocation(s) 1756 allocation(s) Back to Top In w3wp__PID__3460__Date__02_20_2008__Time_04_56_39PM__556__Second_Chance_Exception_C0000005.dmp the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x64006f00 on thread 2 Heap corruption was detected in heap 0x00030000, however pageheap was not enabled in this dump. Please follow the instructions in the recommendation section for troubleshooting heap corruption issues. Current NTGlobalFlags value: 0x0 Module Information Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB Base address: 0x7c800000 Time Stamp: Sat Feb 17 17:02:00 2007 Checksum: 0x000bd6f9 Comments: COM DLL: False Company Name: Microsoft Corporation ISAPIExtension: False File Description: NT Layer DLL ISAPIFilter: False File Version: 5.2.3790.3959 (srv03_sp2_rtm.070216-1710) Managed DLL: False Internal Name: ntdll.dll VB DLL: False Legal Copyright: © Microsoft Corporation. All rights reserved. Loaded Image Name: ntdll.dll Legal Trademarks: Mapped Image Name: Original filename: ntdll.dll Module name: ntdll Private Build: Single Threaded: False Product Name: Microsoft® Windows® Operating System Module Size: 768,00 KBytes Product Version: 5.2.3790.3959 Symbol File Name: c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb Special Build: & Report for w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp Report for w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp Type of Analysis Performed Crash Analysis Machine Name INETVPNSERVER Operating System Windows Server 2003 Service Pack 2 Number Of Processors 8 Process ID 7844 Process Image c:\WINDOWS\system32\inetsrv\w3wp.exe System Up-Time 59 day(s) 14:12:49 Process Up-Time 08:38:49 Thread 54 - System ID 1536 Entry point w3tp!THREAD_MANAGER::ThreadManagerThread Create time 18.02.2008 19:37:07 Time spent in user mode 0 Days 0:0:0.0 Time spent in kernel mode 0 Days 0:0:2.515 Function Arg 1 Arg 2 Arg 3 Source ntdll!RtlAllocateHeap+579 00030000 00000000 00000084 msvcrt!malloc+6c 00000084 00000010 083bf910 php5ts!ts_resource_ex+103 056359ec 00000600 1093f9c8 php5ts!ts_resource_ex+c4 00000000 00000600 083bf910 php5isapi!HttpFilterProc+b 1093fa1c 00004000 083bf910 w3core!W3_MAIN_CONTEXT::NotifyFilters+e0 a1000001 5a3de000 145d8b53 0x28ec81ec 8bfc4589 8b571045 8589087d 0x0c758b56 8b571045 8589087d fffffed8 0x80000000`00000000 8589087d fffffed8 00008068 0x80000000`00000000 fffffed8 00008068 3c858d00 0x80000000`00000000 00008068 3c858d00 50ffffff 0x80000000`00000000 3c858d00 50ffffff ff0c8d8d NTDLL!RTLALLOCATEHEAP+579 Detailed Info For Corrupt Heap Heap 3 - 0x00030000 Heap Name msvcrt!_crtheap Heap Description This heap is used by msvcrt Reserved memory 63,06 MBytes Committed memory 39,68 MBytes (62,92% of reserved) Uncommitted memory 23,39 MBytes (37,08% of reserved) Number of heap segments 7 segments Number of uncommitted ranges 1 range(s) Size of largest uncommitted range 23,39 MBytes Calculated heap fragmentation 0,00% Segment Information Base Address Reserved Size Committed Size Uncommitted Size Number of uncommitted ranges Largest uncommitted block Calculated heap fragmentation 0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00% 0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00% 0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00% 0x03640000 4,00 MBytes 4,00 MBytes 0 Bytes 0 0 Bytes 0,00% 0x055a0000 8,00 MBytes 8,00 MBytes 0 Bytes 0 0 Bytes 0,00% 0x08680000 16,00 MBytes 16,00 MBytes 0 Bytes 0 0 Bytes 0,00% 0x0d430000 32,00 MBytes 8,61 MBytes 23,39 MBytes 1 23,39 MBytes 0,00% Top 5 allocations by size Allocation Size - 584 Allocation Size - 308 Allocation Size - 140 Allocation Size - 32 Allocation Size - 56 13,24 MBytes 7,60 MBytes 6,74 MBytes 1,08 MBytes 568,42 KBytes Top 5 allocations by count Allocation Size - 140 Allocation Size - 32 Allocation Size - 12 Allocation Size - 308 Allocation Size - 584 50503 allocation(s) 35387 allocation(s) 26779 allocation(s) 25874 allocation(s) 23765 allocation(s) Back to Top In w3wp__PID__7844__Date__02_18_2008__Time_07_48_46PM__213__Second_Chance_Exception_C0000005.dmp the assembly instruction at ntdll!RtlAllocateHeap+579 in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00000000 on thread 54 Heap corruption was detected in heap 0x00030000, however pageheap was not enabled in this dump. Please follow the instructions in the recommendation section for troubleshooting heap corruption issues. Current NTGlobalFlags value: 0x0 Module Information Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB Base address: 0x7c800000 Time Stamp: Sat Feb 17 17:02:00 2007 Checksum: 0x000bd6f9 Comments: COM DLL: False Company Name: Microsoft Corporation ISAPIExtension: False File Description: NT Layer DLL ISAPIFilter: False File Version: 5.2.3790.3959 (srv03_sp2_rtm.070216-1710) Managed DLL: False Internal Name: ntdll.dll VB DLL: False Legal Copyright: © Microsoft Corporation. All rights reserved. Loaded Image Name: ntdll.dll Legal Trademarks: Mapped Image Name: Original filename: ntdll.dll Module name: ntdll Private Build: Single Threaded: False Product Name: Microsoft® Windows® Operating System Module Size: 768,00 KBytes Product Version: 5.2.3790.3959 Symbol File Name: c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb Special Build: & Report for w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp Report for w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp Type of Analysis Performed Crash Analysis Machine Name INETVPNSERVER Operating System Windows Server 2003 Service Pack 2 Number Of Processors 8 Process ID 4516 Process Image c:\WINDOWS\system32\inetsrv\w3wp.exe System Up-Time 59 day(s) 15:52:24 Process Up-Time 01:38:30 Thread 10 - System ID 3228 Entry point w3tp!THREAD_MANAGER::ThreadManagerThread Create time 18.02.2008 19:49:57 Time spent in user mode 0 Days 0:0:0.281 Time spent in kernel mode 0 Days 0:0:0.171 Function Arg 1 Arg 2 Arg 3 Source ntdll!ExpInterlockedPopEntrySListFault 00030838 0124fed0 7c82a0b8 ntdll!RtlpAllocateFromHeapLookaside+13 00030838 0000003c 00000000 ntdll!RtlAllocateHeap+1dd 00030000 00000000 0000003c msvcrt!_heap_alloc+26 0000003c 00000000 00000000 msvcrt!operator new+24 0000003c 5a361d28 00000008 iisutil!IPM_MESSAGE_IMP::CreateMessage+1c 0124ff34 00039238 5a361d28 iisutil!IPM_MESSAGE_PIPE::WriteMessage+5e 00000002 00000000 00000000 w3dt!WP_IPM::HandlePing+59 00000000 00000000 00038bb8 w3tp!THREAD_POOL_DATA::ThreadPoolThread+73 00000000 00038b78 5a300000 w3tp!THREAD_POOL_DATA::ThreadPoolThread+24 00000102 00000000 00000000 w3tp!THREAD_MANAGER::ThreadManagerThread+39 00038b78 00000000 00000000 kernel32!BaseThreadStart+34 5a301d70 00038b78 00000000 NTDLL!EXPINTERLOCKEDPOPENTRYSLISTFAULT Detailed Info For Corrupt Heap Heap 3 - 0x00030000 Heap Name msvcrt!_crtheap Heap Description This heap is used by msvcrt Reserved memory 7,06 MBytes Committed memory 3,89 MBytes (55,14% of reserved) Uncommitted memory 3,17 MBytes (44,86% of reserved) Number of heap segments 4 segments Number of uncommitted ranges 1 range(s) Size of largest uncommitted range 3,17 MBytes Calculated heap fragmentation 0,00% Segment Information Base Address Reserved Size Committed Size Uncommitted Size Number of uncommitted ranges Largest uncommitted block Calculated heap fragmentation 0x00030640 64,00 KBytes 64,00 KBytes 0 Bytes 0 0 Bytes 0,00% 0x01c80000 1 024,00 KBytes 1 024,00 KBytes 0 Bytes 0 0 Bytes 0,00% 0x02c00000 2,00 MBytes 2,00 MBytes 0 Bytes 0 0 Bytes 0,00% 0x03920000 4,00 MBytes 852,00 KBytes 3,17 MBytes 1 3,17 MBytes 0,00% Top 5 allocations by size Allocation Size - 140 Allocation Size - 32 Allocation Size - 56 Allocation Size - 584 Allocation Size - 8192 1,32 MBytes 205,84 KBytes 101,12 KBytes 97,52 KBytes 80,00 KBytes Top 5 allocations by count Allocation Size - 140 Allocation Size - 32 Allocation Size - 56 Allocation Size - 12 Allocation Size - 47 9895 allocation(s) 6587 allocation(s) 1849 allocation(s) 1498 allocation(s) 1462 allocation(s) Back to Top In w3wp__PID__4516__Date__02_18_2008__Time_09_28_27PM__338__Second_Chance_Exception_C0000005.dmp the assembly instruction at ntdll!ExpInterlockedPopEntrySListFault in C:\WINDOWS\system32\ntdll.dll from Microsoft Corporation has caused an access violation exception (0xC0000005) when trying to read from memory location 0x20657355 on thread 10 Heap corruption was detected in heap 0x00030000, however pageheap was not enabled in this dump. Please follow the instructions in the recommendation section for troubleshooting heap corruption issues. Current NTGlobalFlags value: 0x0 Module Information Image Name: C:\WINDOWS\system32\ntdll.dll Symbol Type: PDB Base address: 0x7c800000 Time Stamp: Sat Feb 17 17:02:00 2007 Checksum: 0x000bd6f9 Comments: COM DLL: False Company Name: Microsoft Corporation ISAPIExtension: False File Description: NT Layer DLL ISAPIFilter: False File Version: 5.2.3790.3959 (srv03_sp2_rtm.070216-1710) Managed DLL: False Internal Name: ntdll.dll VB DLL: False Legal Copyright: © Microsoft Corporation. All rights reserved. Loaded Image Name: ntdll.dll Legal Trademarks: Mapped Image Name: Original filename: ntdll.dll Module name: ntdll Private Build: Single Threaded: False Product Name: Microsoft® Windows® Operating System Module Size: 768,00 KBytes Product Version: 5.2.3790.3959 Symbol File Name: c:\symcache\ntdll.pdb\93E72E109DC84F16AA54797E4DA8C1682\ntdll.pdb Special Build: & Script Summary Script Name Status Error Code Error Source Error Description Source Line CrashHangAnalysis.asp Completed ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/43410 -- Edit this bug report at http://bugs.php.net/?id=43410&edit=1
