ID:               44645
 Comment by:       neil dot smith at coull dot com
 Reported By:      gary dot wilson at coull dot biz
 Status:           Open
 Bug Type:         Reproducible crash
 Operating System: Windows Server 2003
 PHP Version:      5.2.5
 New Comment:

Correction to last statement : 

"Adding memcache caching of DB response resulted in non-repro"

DB requests were not fully removed in the test harness code. With DB
requests prevented, this bug is still repro under high request loads (so
it not specifically MySQL / DB connection dependent).

Fault address remains at 0x0000926a in php5ts.dll


Previous Comments:
------------------------------------------------------------------------

[2008-06-03 16:11:02] neil dot smith at coull dot com

The following should be a crash dump illustrating the problem.

It was generated as per instructions "Generating backtrace without
compiler" at http://bugs.php.net/bugs-generating-backtrace-win32.php


Configuration : Apache/2.2.3 (Win32) PHP/5.2.5, WinXP SP3


The isue occurred during load testing using JMeter on a script which
made moderate MySQL use and medium-heavy XML DOM node creation.

Adding memcache caching of DB response resulted in non-repro, which IMO
may indicate some involvement of number of DB connections or similar
(running script threads between them had around 876 instances of DB
connections in
TCP   192.168.2.38:3061    192.168.2.15:3306   TIME_WAIT state)



======================  Follows  =====================================


 
 Analysis Summary  
  Type Description Recommendation 
  Error WARNING - DebugDiag was not able to locate debug symbols for
php5ts.dll, so the information below may be incomplete.



In
httpd__PID__3584__Date__06_03_2008__Time_04_57_08PM__928__Second_Chance_Exception_C0000005.dmp
the assembly instruction at php5ts!zend_mm_shutdown+f49 in
C:\Applications\php5\php5ts.dll from The PHP Group has caused an access
violation exception (0xC0000005) when trying to read from memory
location 0x0000000c on thread 246
 Please follow up with the vendor The PHP Group for
C:\Applications\php5\php5ts.dll
 
  Information DebugDiag determined that this dump file
(httpd__PID__3584__Date__06_03_2008__Time_04_57_08PM__928__Second_Chance_Exception_C0000005.dmp)
is a crash dump and did not perform any hang analysis. If you wish to
enable combined crash and hang analysis for crash dumps, edit the
CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder)
and set the g_DoCombinedAnalysis constant to True.   
 
 


 
 Analysis Details  
  


 Your browser settings are currently prohibiting this report's scripts
from running.

This is preventing some features of this analysis report from
displaying properly. To enable scripts to run, right-click the security
warning above and choose "Allow Blocked Content..." or enable the "Allow
active content to run in files on My Computer*" setting on the Advanced
tab of your "Internet Options" dialog to avoid being prompted in the
future 





Table Of Contents
httpd__PID__3584__Date__06_03_2008__Time_04_57_08PM__928__Second_Chance_Exception_C0000005.dmp

   Faulting Thread

   Faulting Module Information



 Report for
httpd__PID__3584__Date__06_03_2008__Time_04_57_08PM__928__Second_Chance_Exception_C0000005.dmp




Report for
httpd__PID__3584__Date__06_03_2008__Time_04_57_08PM__928__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   DEVBOX_NS 
Operating System   Windows XP Service Pack 2 
Number Of Processors   2 
Process ID   3584 
Process Image   C:\Applications\Apache2.2\bin\httpd.exe 
System Up-Time   06:41:14 
Process Up-Time   00:00:05 


Thread 246 - System ID 3348
Entry point   msvcrt!_endthreadex+3a 
Create time   03/06/2008 16:57:04 
Time spent in user mode   0 Days 0:0:0.187 
Time spent in kernel mode   0 Days 0:0:0.78 






Function     Arg 1     Arg 2     Arg 3   Source 
php5ts!zend_mm_shutdown+f49     058ab930     00030000     100b5f17    
php5ts!efree+39     008ca860     069f8c4c     10095f13    
php5ts!zval_dtor_func+27     008ca848     069f8c65     100993d3    
php5ts!zval_ptr_dtor+23     069f8c4c     069f8a38     069f8bc0    
php5ts!zend_hash_add_or_update+1b3     069f8be8     102c6940    
00000005    
php5ts!zend_reflection_class_factory+215d     06977098     05f72178    
00000000    
php5ts!zend_reflection_class_factory+204d     00000000     069f89d8    
00000000    
php5ts!execute_internal+37     0530f674     00000001     058aa688    
php_xdebug_2_0_3_5_2_5!get_module+367c     0530f674     00000001    
00000000    
php5ts!execute+a37     0530f674     058aa688     1001c3e5    
php5ts!execute+245     069d96d0     058aa688     0530f748    
php_xdebug_2_0_3_5_2_5!get_module+27ff     069d96d0     058aa688    
05f89340    
php5ts!execute+b48     0530f748     058aa688     1001c3e5    
php5ts!execute+245     05f89340     058aa688     0530f81c    
php_xdebug_2_0_3_5_2_5!get_module+27ff     05f89340     058aa688    
05f8aea0    
php5ts!execute+b48     0530f81c     058aa688     1001c3e5    
php5ts!execute+245     05f8aea0     058aa688     0530f8f0    
php_xdebug_2_0_3_5_2_5!get_module+27ff     05f8aea0     058aa688    
05edebb0    
php5ts!execute+b48     0530f8f0     058aa688     1001c3e5    
php5ts!execute+245     05edebb0     058aa688     05f65d10    
php_xdebug_2_0_3_5_2_5!get_module+27ff     05edebb0     058aa688    
05a10d50    
php5ts!execute+e3a8     104b4ce0     1001e005     05f61d78    
php5ts!execute+1e33     05f43cb0     058aa688     0530faa8    
php_xdebug_2_0_3_5_2_5!get_module+27ff     05f43cb0     058aa688    
05ede848    
php5ts!execute+b48     0530faa8     058aa688     1001c3e5    
php5ts!execute+245     05ede848     058aa688     05ede5d0    
php_xdebug_2_0_3_5_2_5!get_module+27ff     05ede848     058aa688    
05a10ee0    
php5ts!execute+7880     104b4ce0     1001e070     05ede2e0    
php5ts!execute+1e33     05ede2e0     058aa688     00000000    
php_xdebug_2_0_3_5_2_5!get_module+27ff     05ede2e0     058aa688    
00000000    
php5ts!zend_execute_scripts+107     00000000     00000000     00000000 
  




PHP5TS!ZEND_MM_SHUTDOWN+F49WARNING - DebugDiag was not able to locate
debug symbols for php5ts.dll, so the information below may be
incomplete.



In
httpd__PID__3584__Date__06_03_2008__Time_04_57_08PM__928__Second_Chance_Exception_C0000005.dmp
the assembly instruction at php5ts!zend_mm_shutdown+f49 in
C:\Applications\php5\php5ts.dll from The PHP Group has caused an access
violation exception (0xC0000005) when trying to read from memory
location 0x0000000c on thread 246

Module Information 
Image Name: C:\Applications\php5\php5ts.dll   Symbol Type:  Export 
Base address: 0x10000000   Time Stamp:  Fri Nov 09 04:18:32 2007  
Checksum: 0x00000000   Comments:   
COM DLL: False   Company Name:  The PHP Group 
ISAPIExtension: False   File Description:  PHP Script Interpreter 
ISAPIFilter: False   File Version:  5.2.5.5 
Managed DLL: False   Internal Name:  php5ts.dll 
VB DLL: False   Legal Copyright:  Copyright © 1997-2007 The PHP Group 
Loaded Image Name:  php5ts.dll   Legal Trademarks:  PHP 
Mapped Image Name:  C:\Applications\php5\php5ts.dll   Original
filename:  php5ts.dll 
Module name:  php5ts   Private Build:   
Single Threaded:  False   Product Name:  PHP Script Interpreter 
Module Size:  4.86 MBytes   Product Version:  5.2.5 
Symbol File Name:  php5ts.dll   Special Build:  & 




 
 


 
 Script Summary  
  Script Name Status Error Code Error Source Error Description Source
Line 
CrashHangAnalysis.asp Completed   
 
 

======================  Ends  ======================================

------------------------------------------------------------------------

[2008-05-26 14:16:35] gary dot wilson at coull dot biz

Glad someone else found it, I have not gotten any feedback from our
developers, hence php closed this bug.  Interesting to see that you get
this on a php connect to MySQL.

Currently, having a wonderful time compiling php 5.2.6 on an CentOS 5.1
x86_64... grrr I hate working at the bleeding edge.  Maybe that is why
it is called the bleeding edge because you have to bleed to make it
work.

------------------------------------------------------------------------

[2008-05-26 12:01:20] capsx at team dot lv

edit:

backtrace - Windows XP, Apache/2.2.8 (Win32), PHP/5.2.7-dev, mysql 
Ver
14.14 Distrib 5.1.24-rc, for Win32 (ia32)
when calling: 
$this-> sql_db    = mysql_select_db($this->database) ;

http://manaspiezimes.lv/upload/66b75756905ec2ca33bf2cb92d2c6057.png

------------------------------------------------------------------------

[2008-05-26 11:53:56] capsx at team dot lv

backtrace - Windows XP, Apache/2.2.8 (Win32), PHP/5.2.7-dev, mysql  Ver
14.14 Distrib 5.1.24-rc, for Win32 (ia32)
when calling: 
$this-> sql_db    = mysql_select_db($this->database) ;

http://manaspiezimes.lv/upload/2711733a396c7a305c84a5a38bdf623a.png

------------------------------------------------------------------------

[2008-05-26 01:00:02] php-bugs at lists dot php dot net

No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".

------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/44645

-- 
Edit this bug report at http://bugs.php.net/?id=44645&edit=1

Reply via email to