Usually under Windows when you get a Memory Access Violation its a good indication that your power supply or RAM is on its way out.  Is this happening to all apps or only PHP ?
    Unfortunately I don't know how to debug using a Dr. Watson dump but I do know of a free memory testing utility called MemTest86 (http://www.memtest86.com/).  Sorry if I wasn't too much of a help.

-Pete

On Sat, 2004-01-10 at 17:06, Gunter Sammet wrote:
I have 4.3.5-dev (Build Dec-22-2003) installed on a W2K Dell Inspiron 7500
and I am getting an error which I don't get with 4.1.1 and 4.3.4. Would like
to learn how to debug things like that. Here is a dump of Dr. Watson:

Application exception occurred:
        App:  (pid=2228)
        When: 1/10/2004 @ 14:51:33.711
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: DELL
        User Name: Administrator
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 8 Stepping 3
        Windows 2000 Version: 5.0
        Current Build: 2195
        Service Pack: 4
        Current Type: Uniprocessor Free
        Registered Organization: SammySolutions.com ltd.
        Registered Owner: Gunter Sammet

*----> Task List <----*
   0 Idle.exe
   8 System.exe
 148 smss.exe
 172 csrss.exe
 168 winlogon.exe
 220 services.exe
 232 lsass.exe
 384 svchost.exe
 436 svchost.exe
 488 spoolsv.exe
 512 ati2plab.exe
 536 ibserver.exe
 580 APACHE.exe
 708 regsvc.exe
 728 MSTask.exe
 732 APACHE.exe
 968 snmp.exe
1028 stisvc.exe
1060 vsmon.exe
1112 WinMgmt.exe
1136 svchost.exe
1164 svchost.exe
 120 Explorer.exe
1460 jusched.exe
1448 interserver.exe
1440 Atiptaxx.exe
1420 EM_EXEC.exe
1392 zapro.exe
 640 internat.exe
1512 AirPlus.exe
1520 trillian.exe
1760 mysqld-nt.exe
1796 PostCastServer..exe
1820 gcdnssrv.exe
1860 OUTLOOK.exe
 996 IEXPLORE.exe
1916 IEXPLORE.exe
1980 IEXPLORE.exe
2020 IEXPLORE.exe
2060 IEXPLORE.exe
2100 IEXPLORE.exe
2184 PHPEdit.exe
2200 DBGLIS~1.exe
2168 IEXPLORE.exe
2280 IEXPLORE.exe
2192 IEXPLORE.exe
1084 APACHE.exe
1020 APACHE.exe
2228 php.exe
1532 drwtsn32.exe
   0 _Total.exe

(00400000 - 0040D000)
(77F80000 - 77FFB000)
(10000000 - 10150000)
(7C4E0000 - 7C599000)
(77E10000 - 77E75000)
(77F40000 - 77F7C000)
(75050000 - 75058000)
(75030000 - 75044000)
(78000000 - 78045000)
(7C2D0000 - 7C332000)
(77D30000 - 77D9E000)
(75020000 - 75028000)
(77A50000 - 77B3C000)
(779B0000 - 77A4B000)
(1F7C0000 - 1F7F4000)
(76B30000 - 76B6E000)
(63180000 - 631E5000)
(71710000 - 71794000)
(782F0000 - 78538000)
(00CC0000 - 00CD6000)
(6E420000 - 6E426000)
(75E60000 - 75E7A000)
(782C0000 - 782CC000)
(77980000 - 779A4000)
(77340000 - 77353000)
(77520000 - 77525000)
(77320000 - 77337000)
(75150000 - 7515F000)
(75170000 - 751BF000)
(7C340000 - 7C34F000)
(751C0000 - 751C6000)
(77950000 - 7797A000)
(773B0000 - 773DF000)
(77380000 - 773A3000)
(77830000 - 7783E000)
(77880000 - 7790E000)
(7C0F0000 - 7C152000)
(774E0000 - 77513000)
(774C0000 - 774D1000)
(77530000 - 77552000)
(77360000 - 77379000)
(777E0000 - 777E8000)
(777F0000 - 777F5000)
(74FD0000 - 74FEE000)
(75010000 - 75017000)

State Dump for Thread Id 0x738

eax=00000001 ebx=00000005 ecx=00000098 edx=00794010 esi=0012fd18
edi=00ce0000
eip=77fcc2e2 esp=0012fb0c ebp=0012fca4 iopl=0         nv up ei pl zr na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
efl=00000246


function: RtlAllocateHeap
        77fcc2ca 51               push    ecx
        77fcc2cb 51               push    ecx
        77fcc2cc 81ec74010000     sub     esp,0x174
        77fcc2d2 53               push    ebx
        77fcc2d3 56               push    esi
        77fcc2d4 57               push    edi
        77fcc2d5 8b7d08           mov     edi,[ebp+0x8]
ss:00bd9b8a=????????
        77fcc2d8 897da4           mov     [ebp+0xa4],edi
ss:00bd9b8a=????????
        77fcc2db 8065b800         and     byte ptr [ebp+0xb8],0x0
ss:00bd9b8a=??
        77fcc2df 8b450c           mov     eax,[ebp+0xc]
ss:00bd9b8a=????????
FAULT ->77fcc2e2 0b4710           or      eax,[edi+0x10]
ds:01789ee6=????????
        77fcc2e5 89450c           mov     [ebp+0xc],eax
ss:00bd9b8a=????????
        77fcc2e8 a9600f037d       test    eax,0x7d030f60
        77fcc2ed 0f856aeeffff     jne     _eFSQRT+0xe93 (77fcb15d)
        77fcc2f3 817d1000000080
ss:00bd9b8a=????????
                                  cmp     dword ptr [ebp+0x10],0x80000000
        77fcc2fa 0f835deeffff     jnb     _eFSQRT+0xe93 (77fcb15d)
        77fcc300 837d1000         cmp   dword ptr [ebp+0x10],0x0
ss:00bd9b8a=????????
        77fcc304 0f8424f8ffff     je      RtlSizeHeap+0x228 (77fcbb2e)
        77fcc30a 8b4510           mov     eax,[ebp+0x10]
ss:00bd9b8a=????????
        77fcc30d 83c00f           add     eax,0xf
        77fcc310 24f8             and     al,0xf8
        77fcc312 8945e0           mov     [ebp+0xe0],eax
ss:00bd9b8a=????????

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012FCA4 100C03A2 00CE0000 00000001 00000098 00000080 ntdll!RtlAllocateHeap
00000081 00000000 00000000 00000000 00000000 00000000 !emalloc

*----> Raw Stack Dump <----*
0012fb0c  b8 3e 79 00 18 fd 12 00 - 05 00 00 00 80 7d 13 00
.>y..........}..
0012fb1c  00 00 00 00 c8 fb 12 00 - d7 c8 fc 77 00 00 13 00
...........w....
0012fb2c  c0 c9 fc 77 08 06 13 00 - 25 c9 fc 77 8c 7d 13 00
...w....%..w.}..
0012fb3c  e8 b6 b2 77 00 00 00 00 - ce 47 f8 77 28 b3 b2 77
...w.....G.w(..w
0012fb4c  00 00 00 00 00 00 00 00 - 00 00 00 00 28 ba b2 77
............(..w
0012fb5c  70 a3 15 00 b0 fa 12 00 - 58 a3 15 00 78 01 13 00
p.......X...x...
0012fb6c  70 d3 15 00 78 01 13 00 - 78 01 13 00 68 d3 15 00
p...x...x...h...
0012fb7c  88 01 13 00 88 01 13 00 - 00 00 00 00 04 00 00 00
................
0012fb8c  88 01 13 00 54 57 f9 77 - f8 7b f8 77 90 f1 fc 77
....TW.w.{.w...w
0012fb9c  dd 7b f8 77 18 69 13 00 - f8 68 13 00 38 c1 b2 77
.{.w.i...h..8..w
0012fbac  00 00 00 00 00 00 00 00 - f4 fb 12 00 91 81 f9 77
...............w
0012fbbc  00 90 00 00 00 00 d2 00 - 04 fc 12 00 74 7c f8 77
............t|.w
0012fbcc  06 00 00 00 e8 fb 12 00 - 21 cf fc 77 01 00 00 00
........!..w....
0012fbdc  00 f0 d5 00 01 00 00 00 - 00 f0 d5 00 00 00 79 00
..............y.
0012fbec  78 01 79 00 f8 c0 fc 77 - 00 00 79 00 00 f0 d5 00
x.y....w..y.....
0012fbfc  00 30 00 00 00 00 d2 00 - 00 00 37 01 c0 0f 00 00
.0........7.....
0012fc0c  f8 01 00 00 28 fc 12 00 - 21 cf fc 77 01 00 00 00
....(...!..w....
0012fc1c  00 60 d7 00 01 00 00 00 - 00 60 d7 00 00 00 79 00
.`.......`....y.
0012fc2c  78 01 79 00 f8 c0 fc 77 - 00 00 79 00 00 60 d7 00
x.y....w..y..`..
0012fc3c  00 00 37 01 90 fc 12 00 - 78 01 79 00 00 00 ce 00
..7.....x.y.....

State Dump for Thread Id 0x560

eax=0113fc9c ebx=00000004 ecx=0113ffdc edx=00000000 esi=77f93233
edi=00000004
eip=77f9323e esp=0113fd24 ebp=0113fd70 iopl=0         nv up ei pl zr na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
efl=00000246


function: NtWaitForMultipleObjects
        77f93233 b8e9000000       mov     eax,0xe9
        77f93238 8d542404         lea     edx,[esp+0x4]
ss:01be9c0b=????????
        77f9323c cd2e             int     2e
        77f9323e c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0113FD70 7C4FABFB 0113FD48 00000001 00000000 00000000
ntdll!NtWaitForMultipleObjects
0113FFB4 7C4E987C 00000005 000B000A 7C2D02A7 00158B10
kernel32!WaitForMultipleObjects
0113FFEC 00000000 778321FE 00158B10 00000000 000000C8
kernel32!SetThreadExecutionState

*----> Raw Stack Dump <----*
0113fd24  d7 bd 4e 7c 04 00 00 00 - 48 fd 13 01 01 00 00 00
..N|....H.......
0113fd34  00 00 00 00 00 00 00 00 - 01 00 00 00 10 8b 15 00
................
0113fd44  01 00 00 00 24 03 00 00 - 20 03 00 00 10 03 00 00  ....$...
.......
0113fd54  a4 02 00 00 ff ff ff ff - d0 fa f9 be 3d 16 45 80
............=.E.
0113fd64  30 90 74 82 00 00 00 00 - 00 e4 46 80 b4 ff 13 01
0.t.......F.....
0113fd74  fb ab 4f 7c 48 fd 13 01 - 01 00 00 00 00 00 00 00
..O|H...........
0113fd84  00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 00
.........".w....
0113fd94  b0 fe 13 01 00 00 00 00 - ff ff ff ff 10 8b 15 00
................
0113fda4  a7 02 2d 7c 0a 00 0b 00 - 18 90 74 82 68 55 7c 82
..-|......t.hU|.
0113fdb4  00 00 00 00 00 00 00 00 - 01 00 00 00 38 00 00 00
............8...
0113fdc4  23 00 00 00 23 00 00 00 - 0a 00 0b 00 a7 02 2d 7c
#...#.........-|
0113fdd4  10 8b 15 00 68 02 2d 7c - 4c 00 00 00 fe 21 83 77
....h.-|L....!.w
0113fde4  f8 eb fd 7f 24 98 4e 7c - 1b 00 00 00 00 02 00 00
....$.N|........
0113fdf4  fc ff 13 01 23 00 00 00 - c0 00 00 00 48 de 12 82
....#.......H...
0113fe04  3f 1a 01 00 e8 95 99 82 - 00 07 00 00 4c d1 44 80
?...........L.D.
0113fe14  3f 1a 01 00 e8 95 99 82 - 3f 1a 01 00 e8 95 99 82
?.......?.......
0113fe24  01 c2 fd 7f 37 04 00 00 - f1 da 44 80 37 04 00 00
....7.....D.7...
0113fe34  30 fa 0d 82 00 c0 fd 7f - fc 07 30 c0 00 00 00 00
0.........0.....
0113fe44  08 7c 74 82 37 04 00 00 - 98 fb f9 be 00 00 00 00
.|t.7...........
0113fe54  01 00 00 00 00 00 00 00 - 00 d0 fd 7f fc 07 30 c0
..............0.


Somebody else out there who had this problem? What's the best way to debug
something like that? Any pointers are appreciated.
TIA

Gunter
-- 
perl -e 'print pack("H*", "70766572746573406E79632E72722E636F6D0A")'

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to