Showing paste #xifk:

Loading Dump File [C:\Windows\System32\config\systemprofile\AppData\Local\CrashDumps\httpd.exe.25476.dmp]
User Mini Dump File with Full Memory: Only application data is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Version 19042 MP (12 procs) Free x64
Product: WinNt, suite: SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Debug session time: Thu Mar 18 12:45:46.000 2021 (UTC + 3:00)
System Uptime: 1 days 14:08:44.298
Process Uptime: 0 days 0:00:24.000
................................................................
.........................
Loading unloaded module list
.......................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(6384.4628): Access violation - code c0000005 (first/second chance not available)
ntdll!NtWaitForMultipleObjects+0x14:
00007ffd`d5ecd764 c3              ret
0:228> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for php8apache2_4.dll - 
*** WARNING: Unable to verify checksum for libhttpd.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for libhttpd.dll - 
*** WARNING: Unable to verify checksum for mod_http2.so
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for mod_http2.so - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for httpd.exe - 
*** WARNING: Unable to verify checksum for libapr-1.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for libapr-1.dll - 
GetUrlPageData2 (WinHttp) failed: 12002.

DUMP_CLASS: 2

DUMP_QUALIFIER: 400

CONTEXT:  (.ecxr)
rax=000002364a20a000 rbx=0000023649a51680 rcx=000002364a20a000
rdx=0000000000000000 rsi=0000009e8dffc720 rdi=0000009e8dffbf20
rip=00007ffdd24c1404 rsp=0000009e8dffb658 rbp=0000009e8dffbfd0
 r8=0000000000000001  r9=00007ffdd24c1404 r10=00007ffdd24c0000
r11=000000000000000b r12=0000000000000020 r13=0000000000000000
r14=00000000000007ff r15=000002364a209000
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
VCRUNTIME140!memcpy+0x114:
00007ffd`d24c1404 0fb60a          movzx   ecx,byte ptr [rdx] ds:00000000`00000000=??
Resetting default scope

FAULTING_IP: 
VCRUNTIME140!memcpy+114 [D:\a01\_work\9\s\src\vctools\crt\vcruntime\src\string\amd64\memcpy.asm @ 203]
00007ffd`d24c1404 0fb60a          movzx   ecx,byte ptr [rdx]

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007ffdd24c1404 (VCRUNTIME140!memcpy+0x0000000000000114)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

DEFAULT_BUCKET_ID:  NULL_POINTER_READ

PROCESS_NAME:  httpd.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS:  0000000000000000 

FOLLOWUP_IP: 
VCRUNTIME140!memcpy+114 [D:\a01\_work\9\s\src\vctools\crt\vcruntime\src\string\amd64\memcpy.asm @ 203]
00007ffd`d24c1404 0fb60a          movzx   ecx,byte ptr [rdx]

BUGCHECK_STR:  NULL_POINTER_READ

WATSON_BKT_PROCSTAMP:  602d081d

WATSON_BKT_PROCVER:  2.4.46.0

PROCESS_VER_PRODUCT:  Apache HTTP Server

WATSON_BKT_MODULE:  VCRUNTIME140.dll

WATSON_BKT_MODSTAMP:  602478b9

WATSON_BKT_MODOFFSET:  1404

WATSON_BKT_MODVER:  14.28.29910.0

MODULE_VER_PRODUCT:  Microsoft® Visual Studio®

BUILD_VERSION_STRING:  10.0.19041.804 (WinBuild.160101.0800)

MODLIST_WITH_TSCHKSUM_HASH:  7da92a83edd688ae3922be73d3aa9d0e3a2d3193

MODLIST_SHA1_HASH:  3e5a874480ba9f0f613a647916f428e40c33bc74

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

PRODUCT_TYPE:  1

SUITE_MASK:  272

DUMP_FLAGS:  8000c07

DUMP_TYPE:  0

APP:  httpd.exe

ANALYSIS_SESSION_HOST:  SIMBIAT-PC

ANALYSIS_SESSION_TIME:  03-18-2021 12:46:39.0016

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

THREAD_ATTRIBUTES: 
OS_LOCALE:  RUS

PROBLEM_CLASSES: 



NULL_POINTER_READ
    Tid    [0x4628]
    Frame  [0x00]: vcruntime140!memcpy


LAST_CONTROL_TRANSFER:  from 00007ffdbb9d48fa to 00007ffdd24c1404

STACK_TEXT:  
0000009e`8dffb658 00007ffd`bb9d48fa : 00000236`4a20b000 00000000`0000000a 00000000`0000005c 00000236`49d41dd8 : VCRUNTIME140!memcpy+0x114
0000009e`8dffb660 00007ffd`bb9de563 : 00000000`00000000 00000000`00000007 00000236`4a208018 00007ffd`d353fde6 : php8ts!virtual_realpath+0x19a
0000009e`8dffbed0 00007ffd`bb9de3bb : 00000236`4a208000 00000236`4a208018 00000236`4a208018 00000000`00000000 : php8ts!php_check_specific_open_basedir+0x113
0000009e`8dfff770 00007ffd`bb9e3622 : 00000236`4a208000 00000000`00000058 00000000`00000020 00000236`49da5d60 : php8ts!php_check_open_basedir_ex+0xfb
0000009e`8dfff7c0 00007ffd`bb99ab7a : 00000236`49da6f30 00000000`00000000 00000000`00000007 00000236`4a208000 : php8ts!OnUpdateErrorLog+0xd2
0000009e`8dfff800 00007ffd`bb99aca5 : 00000236`4a208000 0000009e`8dfffa00 00000000`0000000b 00000000`00000020 : php8ts!zend_alter_ini_entry_ex+0x16a
0000009e`8dfff870 00007ffd`ce0e1296 : 00000236`49dcd8d0 00000000`00000020 00000236`49dcd8f0 00007ffd`ce0e33e0 : php8ts!zend_alter_ini_entry_chars+0x95
0000009e`8dfff8c0 00007ffd`ce0e356b : 00000236`4958b238 00000236`49d41e50 00000236`4958b238 00000236`48c6db50 : php8apache2_4+0x1296
0000009e`8dfff900 00007ffd`c78bee45 : 00000000`00000000 00000000`00000002 00000236`49d41e50 00000236`48c23eb0 : php8apache2_4+0x356b
0000009e`8dfffc30 00007ffd`c78bda2f : 00000000`00000000 00000236`49d41e50 00000000`00000000 00000236`49d41e50 : libhttpd!ap_run_handler+0x35
0000009e`8dfffc60 00007ffd`c78ba5da : 00000236`49d41e50 00000000`00000000 00000236`49d41e50 00000236`49a8c410 : libhttpd!ap_invoke_handler+0x10f
0000009e`8dfffcc0 00007ffd`c78ba65f : 00000236`49d3fe40 00000236`48c1ef70 00000236`49d3fe40 00000000`00000000 : libhttpd!ap_internal_redirect_handler+0x29a
0000009e`8dfffd40 00007ffd`bfd787cf : 00000236`49d41dd8 00000236`49d3fe40 00000236`49995750 00000000`00000000 : libhttpd!ap_process_request+0xf
0000009e`8dfffd90 00007ffd`c78c1515 : 00000236`49995750 00000000`00000000 00000236`49995750 00000000`00000000 : mod_http2+0x187cf
0000009e`8dfffe00 00007ffd`bfd784a6 : 00000236`49d4deb0 00000236`49d3fe40 00000236`49d4df68 00000000`00000003 : libhttpd!ap_run_process_connection+0x35
0000009e`8dfffe30 00007ffd`bfd7c30e : 00000236`493e4a28 00000236`482bcdb0 00000000`00000000 00000236`493e4a68 : mod_http2+0x184a6
0000009e`8dfffe90 00007ffd`d3551bb2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mod_http2+0x1c30e
0000009e`8dfffed0 00007ffd`d5287034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ucrtbase!thread_start<unsigned int (__cdecl*)(void *),1>+0x42
0000009e`8dffff00 00007ffd`d5e82651 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
0000009e`8dffff30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


THREAD_SHA1_HASH_MOD_FUNC:  2e20d1922e2b7418ad840fc7bdd107dfb76895ff

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  9a4445e5c41d1210423496bdd46cfcbb23e9e9ce

THREAD_SHA1_HASH_MOD:  d92b0c93420263a341134541b4eca1dd89f055b2

FAULT_INSTR_CODE:  880ab60f

FAULTING_SOURCE_LINE:  D:\a01\_work\9\s\src\vctools\crt\vcruntime\src\string\amd64\memcpy.asm

FAULTING_SOURCE_FILE:  D:\a01\_work\9\s\src\vctools\crt\vcruntime\src\string\amd64\memcpy.asm

FAULTING_SOURCE_LINE_NUMBER:  203

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  vcruntime140!memcpy+114

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: VCRUNTIME140

IMAGE_NAME:  VCRUNTIME140.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  602478b9

STACK_COMMAND:  .ecxr ; kb

BUCKET_ID:  NULL_POINTER_READ_vcruntime140!memcpy+114

PRIMARY_PROBLEM_CLASS:  NULL_POINTER_READ_vcruntime140!memcpy+114

BUCKET_ID_OFFSET:  114

BUCKET_ID_MODULE_STR:  VCRUNTIME140

BUCKET_ID_MODTIMEDATESTAMP:  602478b9

BUCKET_ID_MODCHECKSUM:  1ceea

BUCKET_ID_MODVER_STR:  14.28.29910.0

BUCKET_ID_PREFIX_STR:  NULL_POINTER_READ_

FAILURE_PROBLEM_CLASS:  NULL_POINTER_READ

FAILURE_EXCEPTION_CODE:  c0000005

FAILURE_IMAGE_NAME:  VCRUNTIME140.dll

FAILURE_FUNCTION_NAME:  memcpy

BUCKET_ID_FUNCTION_STR:  memcpy

FAILURE_SYMBOL_NAME:  VCRUNTIME140.dll!memcpy

FAILURE_BUCKET_ID:  NULL_POINTER_READ_c0000005_VCRUNTIME140.dll!memcpy

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/httpd.exe/2.4.46.0/602d081d/VCRUNTIME140.dll/14.28.29910.0/602478b9/c0000005/00001404.htm?Retriage=1

TARGET_TIME:  2021-03-18T09:45:46.000Z

OSBUILD:  19042

OSSERVICEPACK:  804

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.19041.804

ANALYSIS_SESSION_ELAPSED_TIME: 7d9c

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:null_pointer_read_c0000005_vcruntime140.dll!memcpy

FAILURE_ID_HASH:  {e914085a-a9fd-ad16-cf5c-b3563eacf9a9}

Followup:     MachineOwner
---------

Make a new paste