ID: 37239
Updated by: [EMAIL PROTECTED]
Reported By: dimox at inbox dot lv
-Status: Open
+Status: Feedback
Bug Type: Reproducible crash
Operating System: Windows XP Pro SP2
PHP Version: 4.4.2
Previous Comments:
------------------------------------------------------------------------
[2006-05-15 21:34:38] beagle-php at sector99 dot com
I have confirmed this problem on another box, this one running XPSP2 /
IIS like the original poster. I don't have a Linux environment with
4.4.2 on it to test that but I hope to shortly.
I can try running a trace but I'm a total noob with that kind of stuff.
I don't see a debug version of PHP 4.4.2 on the snaps page -- just one
for 5.x and 6.x. I tried using the Win32 debug download as referenced
in bug #37188 (see 25 Apr) but couldn't get it to work. Any suggestions
where to get a debug version?
Thanks for your help!
------------------------------------------------------------------------
[2006-05-15 21:26:43] dimox at inbox dot lv
Yes, its works on Linux. This bug is Windows only.
On Apache/1.3.29 (Win32) PHP/4.3.10 this code works fine too.
What information I can provide, except backtrace?
------------------------------------------------------------------------
[2006-05-14 12:28:11] [EMAIL PROTECTED]
Works perfectly fine on Linux.
Please provide more information.
------------------------------------------------------------------------
[2006-05-12 20:03:50] beagle-php at sector99 dot com
I have used Dimox's code on a Windows 2000 server running IIS and PHP
4.4.2 and have reproduced the problem. The regular expression commands
on this server combination seem to be susceptible to crashing like
this.
------------------------------------------------------------------------
[2006-05-02 11:03:31] dimox at inbox dot lv
Can I get trial version of MSVC6? If it exist, can you add link for me?
I'm only web-programmer and I has no tools for C++
development/debugging.
Maybe you can run file test_bug.php on your oun PC with this tools and
generate this debug backtrace?
------------
test_bug.php
------------
<?php
$text = '<block name="name1">
something
<block name="name2">1223567890 qwertyuiop[[[]asdfghjkl;rrrr
\zxcvbnm,./zxcvbnmm, xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
1223567890 qwertyuiop[[[]asdfghjkl;rrrr \zxcvbnm,./zxcvbnmm,
xsxasxaxaxae dsvvzs vsv bdbdb<> <>><<<
123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890
<blockend>
<blockend>';
$regex='/\<block\s*name=\"([^\"]+)\"\s*\>((.(?!\<block\s))+?)\<blockend\>/is';
while(preg_match_all($regex, $text, $block_matches,PREG_SET_ORDER)){
foreach($block_matches AS $block)
echo '<pre>'; print_r($block_matches);
$text = preg_replace($regex, '', $text);
}
?>
This file causes 100% crash on my Win32 server. I realy want to help
PHP better.
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/37239
--
Edit this bug report at http://bugs.php.net/?id=37239&edit=1