Edit report at https://bugs.php.net/bug.php?id=62837&edit=1
ID: 62837 Updated by: a...@php.net Reported by: 175384354 at qq dot com Summary: ISAPIæ¹å¼ä½¿ç¨PHP,ä¼å¯¼è´webæå¡å¨å´©æº. -Status: Open +Status: Feedback Type: Bug Package: *General Issues Operating System: windows server 2003 PHP Version: 5.3.15 Block user comment: N Private report: N New Comment: Besides I don't see any php related information, do you experience the same with 5.4? Please get the debug symbols as well to produce a useful BT. Previous Comments: ------------------------------------------------------------------------ [2012-08-17 08:05:35] 175384354 at qq dot com Analysis Summary Type Description Recommendation Error In IOCP_HTTP_SERVER__PID__2468__Date__08_17_2012__Time_03_45_11PM__582__Second_Chance_Exception_C0000008.dmp the assembly instruction at ntdll!KiRaiseUserExceptionDispatcher+37 in C:\WINDOWS\system32\ntdll.dll has caused an unknown exception (0xc0000008) on thread 2 This exception originated from IOCP_HTTP_SERVER+ce93. This exception occured as a result of an invalid handle passed to KERNEL32!CLOSEHANDLE by the following function: IOCP_HTTP_SERVER+ce93 Please follow up with the vendor of this module for further assistance with this issue. Information DebugDiag determined that this dump file (IOCP_HTTP_SERVER__PID__2468__Date__08_17_2012__Time_03_45_11PM__582__Second_Chance_Exception_C0000008.dmp) is a crash dump and did not perform any hang analysis. If you wish to enable combined crash and hang analysis for crash dumps, edit the CrashHangAnalysis.asp script (located in the DebugDiag\Scripts folder) and set the g_DoCombinedAnalysis constant to True. Analysis Details Your browser settings are currently prohibiting this report's scripts from running. This is preventing some features of this analysis report from displaying properly. To enable scripts to run, right-click the security warning above and choose "Allow Blocked Content..." or enable the "Allow active content to run in files on My Computer*" setting on the Advanced tab of your "Internet Options" dialog to avoid being prompted in the future Table Of Contents IOCP_HTTP_SERVER__PID__2468__Date__08_17_2012__Time_03_45_11PM__582__Second_Chance_Exception_C0000008.dmp Faulting Thread Faulting Module Information Report for IOCP_HTTP_SERVER__PID__2468__Date__08_17_2012__Time_03_45_11PM__582__Second_Chance_Exception_C0000008.dmp Report for IOCP_HTTP_SERVER__PID__2468__Date__08_17_2012__Time_03_45_11PM__582__Second_Chance_Exception_C0000008.dmp Type of Analysis Performed Crash Analysis Machine Name WS-YY-WEB Operating System Windows Server 2003 Service Pack 2 Number Of Processors 4 Process ID 2468 Process Image D:\I\IOCP_HTTP_SERVER.exe System Up-Time 31 day(s) 16:44:41 Process Up-Time 00:00:06 Thread 2 - System ID 3992 Entry point IOCP_HTTP_SERVER+8407 Create time 2012-8-17 15:45:06 Time spent in user mode 0 Days 0:0:0.15 Time spent in kernel mode 0 Days 0:0:0.15 Function Arg 1 Arg 2 Arg 3 Source ntdll!KiRaiseUserExceptionDispatcher+37 7c956d49 7c823eb3 01c00000 ntdll!KiFastSystemCall+3 7c823eb3 01c00000 0124fd4c ntdll!ZwClose+c 01c00000 0124fd4c 0040ce93 kernel32!CloseHandle+59 01c00000 00000000 01c00000 IOCP_HTTP_SERVER+ce93 0124fd58 00ae2cc4 00000000 IOCP_HTTP_SERVER+a6ed 0000019c 00ae2724 0124ff08 IOCP_HTTP_SERVER+8871 00ae260c 00000261 00000000 IOCP_HTTP_SERVER+853c 0000017c 00000000 00000000 kernel32!BaseThreadStart+34 00408407 0000017c 00000000 In IOCP_HTTP_SERVER__PID__2468__Date__08_17_2012__Time_03_45_11PM__582__Second_Chance_Exception_C0000008.dmp the assembly instruction at ntdll!KiRaiseUserExceptionDispatcher+37 in C:\WINDOWS\system32\ntdll.dll has caused an unknown exception (0xc0000008) on thread 2 This exception originated from IOCP_HTTP_SERVER+ce93. Module Information Image Name: D:\I\IOCP_HTTP_SERVER.exe Symbol Type: None Base address: 0x00400000 Time Stamp: Thu Jan 01 11:25:45 1970 Checksum: 0x00000000 Comments: COM DLL: False Company Name: ISAPIExtension: False File Description: ISAPIFilter: False File Version: Managed DLL: False Internal Name: VB DLL: False Legal Copyright: Loaded Image Name: IOCP_HTTP_SERVER.exe Legal Trademarks: Mapped Image Name: Original filename: Module name: IOCP_HTTP_SERVER Private Build: Single Threaded: False Product Name: Module Size: 128.00 KBytes Product Version: Symbol File Name: IOCP_HTTP_SERVER.exe Special Build: & Script Summary Script Name Status Error Code Error Source Error Description Source Line CrashHangAnalysis.asp Completed ------------------------------------------------------------------------ [2012-08-16 10:27:53] larue...@php.net Thank you for this bug report. To properly diagnose the problem, we need a backtrace to see what is happening behind the scenes. To find out how to generate a backtrace, please read http://bugs.php.net/bugs-generating-backtrace.php for *NIX and http://bugs.php.net/bugs-generating-backtrace-win32.php for Win32 Once you have generated a backtrace, please submit it to this bug report and change the status back to "Open". Thank you for helping us make PHP better. ------------------------------------------------------------------------ [2012-08-16 09:09:16] 175384354 at qq dot com å ¶å®çæ¬çPHPæ²¡ææµè¯è¿,ä¼°è®¡ä¹æè¿ä¸ªé®é¢ ------------------------------------------------------------------------ [2012-08-16 09:02:11] 175384354 at qq dot com Description: ------------ php post Test script: --------------- <?php setcookie("myup","tgy_cookie_up",time()+3600); ?> <form action="" method="post" enctype="multipart/form-data"> <input type="hidden" name="MAX_FILE_SIZE" value=""> <input type="file" name="pic" /><br> <input type="file" name="text" /><br> <input type="file" name="doc" /><br> <input type="file" name="pdf" /><br> <input type="submit" value="å¼å§ä¸ä¼ "/> </form> <? $up_info=$_FILES; $upload_dir="upload/"; $typelist=array("image/gif","image/jpeg","image/pjpeg","image/png"); if (!is_dir( $upload_dir)) { if (!mkdir($upload_dir)) die ("upload_files directory doesn't exist and creation failed"); if (!chmod($upload_dir,0755)) die ("change permission to 755 failed."); } $handle=opendir($upload_dir); $filelist = ""; foreach($up_info as $k_name=>$value){ //ç¨foreachå¾ªç¯ å¤çå¤ä¸ªæä»¶çä¸ä¼ //2.夿æä»¶æ¯å¦ä¸ä¼ é误 if($up_info[$k_name]['error']>0){ switch($up_info['error'][$i]){ case 1: $err_info="ä¸ä¼ çæä»¶è¶ è¿äº php.ini ä¸ upload_max_filesize é项éå¶çå¼"; break; case 2: $err_info="ä¸ä¼ æä»¶ç大å°è¶ è¿äº HTML 表åä¸ MAX_FILE_SIZE é项æå®çå¼"; break; case 3: $err_info="æä»¶åªæé¨å被ä¸ä¼ "; break; case 4: $err_info="没ææä»¶è¢«ä¸ä¼ "; break; case 6: $err_info="æ¾ä¸å°ä¸´æ¶æä»¶å¤¹"; break; case 7: $err_info="æä»¶åå ¥å¤±è´¥"; break; default: $err_info="æªç¥çä¸ä¼ é误"; break; } continue($err_info); } $exten_name=pathinfo($up_info[$k_name]['name'],PATHINFO_EXTENSION); do{ $main_name=date('YmHis'.'--'.rand(100,999)); $new_name=$main_name.'.'.$exten_name; }while(file_exists($to_path.'/'.$new_name)); //6.夿æ¯å¦æ¯ä¸ä¼ çæä»¶ï¼å¹¶æ§è¡ä¸ä¼ if(is_uploaded_file($up_info[$k_name]['tmp_name'])){ if(move_uploaded_file($up_info[$k_name]['tmp_name'],$upload_dir.'/'.$new_name)){ echo 'ä¸ä¼ æå!<br>'; }else{ echo 'ä¸ä¼ æä»¶ç§»å¨å¤±è´¥!'; } }else{ echo 'æä»¶ä¸æ¯ä¸ä¼ çæä»¶'; } } //for循ç¯çæ¬å· while ($file = readdir($handle)) { if(!is_dir($file) && !is_link($file)) { $filelist .= "<a href='$upload_dir$file'>".$file."</a>"; if ($DELETABLE) $filelist .= " <a href='?del=$upload_dir$file' title='delete'>x</a>"; $filelist .= "<sub><small><small><font color=grey> ".date("d-m H:i", filemtime($upload_dir.$file))."</font></small></small></sub>"; $filelist .="<br>"; } } echo "COOKIE:".$HTTP_COOKIE_VARS['myup']."<br>"; echo $filelist; ?> Expected result: ---------------- PHPä»PHP5.2.17å°5.3.15 é½åå¨ä¸ä¸ªé®é¢,ä¼å¯¼è´WEBæå¡å¨ç¨åºå´©æºã BUGæè¿°: æå¡å¨æä½ç³»ç»ï¼windows server 2003 æµè§å¨ï¼MS IE 7.0 PHPä½¿ç¨æ¹å¼:isapi æå¼ä¸ä¸ªPOSTä¸ä¼ æä»¶çPHP页é¢å¹¶ä¸ä¼ ä¸ä¸ªæä»¶,å¦æè®©è¿ä¸ªä¸ä¼ 页é¢é²ç½®åå åé以ä¸ï¼å次æäº¤ä¸ä¼ ï¼ä¼å¯¼è´WEBæå¡å¨å´©æºï¼è䏿²¡æä»»ä½æç¤ºã ------------------------------------------------------------------------ -- Edit this bug report at https://bugs.php.net/bug.php?id=62837&edit=1