Edit report at http://bugs.php.net/bug.php?id=53837&edit=1

 ID:                 53837
 Updated by:         paj...@php.net
 Reported by:        elacunza at binovo dot es
 Summary:            Gettext extension crashes PHP/Apache
 Status:             Feedback
 Type:               Bug
 Package:            Gettext related
 Operating System:   Windows
 PHP Version:        5.3.5
 Assigned To:        pajoye
 Block user comment: N
 Private report:     N

 New Comment:

I uploaded the wrong one, pls re fetch them (if you already got them).


Previous Comments:
------------------------------------------------------------------------
[2011-01-26 13:42:35] paj...@php.net

Please try using:



http://www.php.net/~pierre/php_gettext-5.3.6-nts-vc9-x86.zip

or

http://www.php.net/~pierre/php_gettext-5.3.6-ts-vc9-x86.zip

------------------------------------------------------------------------
[2011-01-26 12:53:39] elacunza at binovo dot es

Thanks to you for your fast replies! :)

------------------------------------------------------------------------
[2011-01-26 12:49:08] paj...@php.net

Let me check and fix if necessary, but that's in libintl not in php :)



Thanks for the feedback!

------------------------------------------------------------------------
[2011-01-26 12:47:32] elacunza at binovo dot es

Ok, I checked the LANG environment variable, and it is unset.



If I do set it (set LANG=esp), then test script doesn't crash. If I
unset it again (set LANG=) then it crashes again.



I think that in out application we could be trying to translate some
string before gettext environment is set up, so this could be the reason
to our application crashing.



Anyway, seems PHP should not crash if no LANG is set? :-)

------------------------------------------------------------------------
[2011-01-26 12:41:51] elacunza at binovo dot es

Sorry, I copied the wrong backtrace (it is a yesterday backtrace). 

There is no translation for the string.



Backtrace for VC9:

Report for
php__PID__3208__Date__01_26_2011__Time_12_16_00PM__355__Second_Chance_Exception_C0000005.dmp



Type of Analysis Performed   Crash Analysis 



Machine Name   WIN2008 



Operating System   Windows Vista Service Pack 2 



Number Of Processors   2 



Process ID   3208 



Process Image   c:\php535vc9\php.exe 



System Up-Time   2 day(s) 00:20:11 



Process Up-Time   00:00:20 











Thread 0 - System ID 4316



Entry point   php+2fa2 



Create time   26/01/2011 12:15:40 



Time spent in user mode   0 Days 0:0:0.125 



Time spent in kernel mode   0 Days 0:0:0.140 



























Function     Arg 1     Arg 2     Arg 3   Source 



ntdll!RtlpCoalesceFreeBlocks+35     021b0000     000ba750     00c0f968  
 



ntdll!RtlpFreeHeap+1e2     000ba750     000ba758     000ba758    



ntdll!RtlFreeHeap+14e     021b0000     00000000     000ba750    



kernel32!HeapFree+14     021b0000     00000000     000ba758    



msvcr90!free+cd     000ba758     455f7365     6f6d4053    



php_gettext!get_module+49a0     000b8904     0280fab0     00000000    



php_gettext!get_module+6417     0280fab0     0280e2b8     00000007    



php_gettext!get_module+1ba     00000001     0280cb58     00000000    



php5ts!execute+1110     02840080     021b1300     021b1378    



php5ts!execute+583a     021b1378     00c0fbe4     00000000    



php5ts!execute+2e8     00000000     00000000     00000000    



















NTDLL!RTLPCOALESCEFREEBLOCKS+35 



















Detailed Info For Corrupt Heap



Heap 1 - 0x00100000 



Heap Name   Default process heap 



Heap Description   This heap is created by default and shared by all
modules in the process 



Reserved memory   5.244.720,03 TBytes 



Committed memory   2.097.264,00 TBytes (39,99% of reserved)  



Uncommitted memory   3.147.456,03 TBytes (60,01% of reserved)  



Number of heap segments   1 segments 



Number of uncommitted ranges   996432412722 range(s) 



Size of largest uncommitted range   29.440,41 TBytes 



Calculated heap fragmentation   99,06% 























Segment Information



Base Address Reserved Size Committed Size Uncommitted Size Number of
uncommitted ranges Largest uncommitted block Calculated heap
fragmentation 



0x601c8127 105.908.016,03 TBytes 52.428.912,00 TBytes 53.479.104,03
TBytes 996432412722 29.440,41 TBytes 99,94% 



















Back to Top 































In
php__PID__3208__Date__01_26_2011__Time_12_16_00PM__355__Second_Chance_Exception_C0000005.dmp
the assembly instruction at ntdll!RtlpCoalesceFreeBlocks+35 in
C:\Windows\System32\ntdll.dll from Microsoft Corporation has caused an
access violation exception (0xC0000005) when trying to read from memory
location 0x0003dbca on thread 0















Heap corruption was detected in heap 0x00100000, however pageheap was
not enabled in this dump. Please follow the instructions in the
recommendation section for troubleshooting heap corruption issues.















Current NTGlobalFlags value: 0x0 Module Information 



Image Name: C:\Windows\System32\ntdll.dll   Symbol Type:  PDB 



Base address: 0x775e0000   Time Stamp:  Sat Apr 11 08:26:41 2009  



Checksum: 0x0012c163   Comments:   



COM DLL: False   Company Name:  Microsoft Corporation 



ISAPIExtension: False   File Description:  NT Layer DLL 



ISAPIFilter: False   File Version:  6.0.6002.18005
(lh_sp2rtm.090410-1830) 



Managed DLL: False   Internal Name:  ntdll.dll 



VB DLL: False   Legal Copyright:  © Microsoft Corporation. All rights
reserved. 



Loaded Image Name:  ntdll.dll   Legal Trademarks:   



Mapped Image Name:     Original filename:  ntdll.dll 



Module name:  ntdll   Private Build:   



Single Threaded:  False   Product Name:  Microsoft® Windows® Operating
System 



Module Size:  1,15 MBytes   Product Version:  6.0.6002.18005 



Symbol File Name: 
c:\symcache\ntdll.pdb\2A581B1A8A244C51992668A826BF4FBB2\ntdll.pdb  
Special Build:  & 























 Report for
php__PID__1636__Date__01_25_2011__Time_06_32_55PM__913__Second_Chance_Exception_C0000005.dmp

------------------------------------------------------------------------


The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

    http://bugs.php.net/bug.php?id=53837


-- 
Edit this bug report at http://bugs.php.net/bug.php?id=53837&edit=1

Reply via email to