ID: 43150 Updated by: [EMAIL PROTECTED] Reported By: jeff dot orrok at reedbusiness dot com -Status: Open +Status: Feedback Bug Type: Reproducible crash Operating System: windows xp sp2 PHP Version: 5.2.4 New Comment:
Thank you for this bug report. To properly diagnose the problem, we need a short but complete example script to be able to reproduce this bug ourselves. A proper reproducing script starts with <?php and ends with ?>, is max. 10-20 lines long and does not require any external resources such as databases, etc. If the script requires a database to demonstrate the issue, please make sure it creates all necessary tables, stored procedures etc. Please avoid embedding huge scripts into the report. Previous Comments: ------------------------------------------------------------------------ [2007-10-30 19:56:01] jeff dot orrok at reedbusiness dot com Description: ------------ Invoking a non-existent method on a SOAP service crashes apache. Although PEAR's SOAP module is involved in the problem, I thought y'all should know about it in case there was something you could do to make your code more robust. C:\wamp\logs\apache_error.log: [Tue Oct 30 11:58:42 2007] [notice] Parent: child process exited with status 3221225477 -- Restarting. Analysys Summary from Debug Diagnostic Tool: In httpd__PID__5256__Date__10_29_2007__Time_07_05_58PM__48__Second_Chance_Exception_C00000FD.dmp the assembly instruction at php5ts!xbuf_format_converter+5b in C:\wamp\Apache2\bin\php5ts.dll from The PHP Group has caused a stack overflow exception (0xC00000FD) when trying to write to memory location 0x01b82ffc on thread 15 Reproduce code: --------------- This is merely to demonstrate what I'm doing. I was hoping it might be reproducible with any kind of "hello world" service. I am behind on my deadline and need to get caught up before I can spend a lot of time on this. I will try to pare down the amount of code to the smallest necessary to reproduce, if it turns out to be a very specific circumstance. require_once ('SOAP/Client.php'); // pear soap-0.11.0 define('RBI_COMMON_AUTH_WS_URL', 'http://localhost/WebServices/AuthenticationWS/service.php?wsdl'); define('RBICA_APP', 'BLOG'); define('RBICA_APP_TOKEN_ID', 'PERM_BLOG'); $wsdl_ca = new SOAP_WSDL (RBI_COMMON_AUTH_WS_URL,array('timeout' => 30)); $client_ca = $wsdl_ca->getProxy(); $wpUserId = $login->ID; $result = $client_ca->GetMasterID(RBICA_APP_TOKEN_ID, RBICA_APP, (integer)$wpUserId); // GetMasterID happens to not exist in the current version of the service. Expected result: ---------------- (be automatically logged in to WordPress via our in-house common authentication service) Actual result: -------------- Report for httpd__PID__5256__Date__10_29_2007__Time_07_05_58PM__48__Second_Chance_Exception_C00000FD.dmp Type of Analysis Performed Crash Analysis Machine Name HRAORROCKJ1D Operating System Windows XP Service Pack 2 Number Of Processors 2 Process ID 5256 Process Image C:\wamp\Apache2\bin\httpd.exe System Up-Time 10 day(s) 08:39:57 Process Up-Time 00:03:23 Thread 15 - System ID 784 Entry point msvcrt!_endthreadex+3a Create time 10/29/2007 7:02:35 PM Time spent in user mode 0 Days 0:0:0.500 Time spent in kernel mode 0 Days 0:0:0.62 Function Arg 1 Arg 2 Arg 3 Source php5ts!xbuf_format_converter+5b 01b83280 00a359ac 01b8332c php5ts!vspprintf+29 01b832b8 00000400 00a359ac php5ts!php_error_cb+3a 00000800 07da1180 0000015f php5ts!zend_error+43e 00000800 00a359ac 0079ca49 php5ts!zif_is_a+f 00000002 08f9a0f0 00000000 php5ts!zend_do_fcall_common_helper_SPEC+7d9 01b833b8 05cab000 07dd7fd8 php5ts!ZEND_DO_FCALL_SPEC_CONST_HANDLER+e5 00000000 05cab000 08f96944 php5ts!execute+1c5 07d95490 05cab000 05cab000 php5ts!zend_do_fcall_common_helper_SPEC+8f8 01b83460 05cab000 0079c1e5 php5ts!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER+15 01b83460 05cab000 08f94b84 php5ts!execute+1c5 07dcf3e8 05cab000 05cab000 ... followed by hundreds of lines similar to the following: php5ts!zend_do_fcall_common_helper_SPEC+8f8 01b835b0 05cab000 0079c1e5 php5ts!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER+15 01b835b0 05cab000 08f8ea8c php5ts!execute+1c5 07dcf3e8 05cab000 05cab000 ... followed by: php5ts!zend_do_fcall_common_helper_SPEC+8f8 01bbfbb0 05cab000 0079c1e5 php5ts!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER+15 01bbfbb0 05cab000 05cab000 php5ts!execute+1c5 07d7e2e0 05cab000 00000000 php5ts!zend_execute_scripts+107 00000008 05cab000 00000000 php5ts!php_execute_script+20d 01bbfea0 05cab000 00000005 php5apache2_2!php_handler+5cd 05d40e70 0074c4c0 05d40e70 libhttpd!ap_run_handler+21 05d40e70 05d40e70 05d40e70 libhttpd!ap_invoke_handler+ae 00000000 05d3e128 01bbff38 libhttpd!ap_die+24e 05d40e70 00000000 0068e510 libhttpd!ap_get_request_note+1c6c 05d3e128 05d3e128 05d3e128 libhttpd!ap_run_process_connection+21 05d3e128 00716300 01bbff80 libhttpd!ap_process_connection+33 05d3e128 05cb9050 00000000 libhttpd!ap_regkey_value_remove+c0c 05d3e120 00000000 00e10050 msvcrt!_endthreadex+a9 01018b08 00000000 00e10050 kernel32!BaseThreadStart+37 77c3a341 01018b08 00000000 PHP5TS!XBUF_FORMAT_CONVERTER+5BIn httpd__PID__5256__Date__10_29_2007__Time_07_05_58PM__48__Second_Chance_Exception_C00000FD.dmp the assembly instruction at php5ts!xbuf_format_converter+5b in C:\wamp\Apache2\bin\php5ts.dll from The PHP Group has caused a stack overflow exception (0xC00000FD) when trying to write to memory location 0x01b82ffc on thread 15 Module Information Image Name: C:\wamp\Apache2\bin\php5ts.dll Symbol Type: PDB Base address: 0x00780000 Time Stamp: Thu Aug 30 05:06:12 2007 Checksum: 0x00000000 Comments: COM DLL: False Company Name: The PHP Group ISAPIExtension: False File Description: PHP Script Interpreter ISAPIFilter: False File Version: 5.2.4.4 Managed DLL: False Internal Name: php5ts.dll VB DLL: False Legal Copyright: Copyright © 1997-2007 The PHP Group Loaded Image Name: php5ts.dll Legal Trademarks: PHP Mapped Image Name: C:\wamp\Apache2\bin\php5ts.dll Original filename: php5ts.dll Module name: php5ts Private Build: Single Threaded: False Product Name: PHP Script Interpreter Module Size: 4.86 MBytes Product Version: 5.2.4 Symbol File Name: C:\xampp\php\debug\php5ts.pdb Special Build: & ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=43150&edit=1