php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #63096 Crash when run cli script
Submitted: 2012-09-15 17:49 UTC Modified: 2012-09-17 13:37 UTC
From: pracanowo at gmail dot com Assigned:
Status: Not a bug Package: *General Issues
PHP Version: 5.4.7 OS: win xp sp3
Private report: No CVE-ID: None
View Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
If you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: pracanowo at gmail dot com
New email:
PHP Version: OS:

 

 [2012-09-15 17:49 UTC] pracanowo at gmail dot com
Description:
------------
[Web crawler preg curl etc]

 Report for php__PID__2688__Date__09_15_2012__Time_01_31_06PM__296__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   XXXX 
Operating System   Windows XP Dodatek Service Pack 3 
Number Of Processors   2 
Process ID   2688 
Process Image   ...php.exe 
System Up-Time   8 day(s) 01:44:43 
Process Up-Time   00:02:07 


Thread 0 - System ID 3144
Entry point   php!sapi_cli_single_write+80d8 
Create time   2012-09-15 13:28:59 
Time spent in user mode   0 Days 0:0:43.468 
Time spent in kernel mode   0 Days 0:0:1.109 

Full Call Stack

Function     Arg 1     Arg 2     Arg 3     Arg 4   Source 
php5!zval_dtor_func+45     02b24040     0128f408     03ab0a38     0128f408    
php5!zend_objects_store_del_ref_by_handle_ex+24b     01280888     00000000     00c1e8f0     00c1e944    
php5!execute+164     012bea58     012bc688     00c1e9a8     00c1e9b4    
php5!zend_call_function+269     00c1e9b4     012bc688     00c1e9a8     1050f034    
php5!zend_objects_destroy_object+bc     03d0ccb8     0000000c     012253b4     03587678    
php5!libiconv_open+57a97     00000000     00000000     00000000     00000000    

Exception Information
PHP5!ZVAL_DTOR_FUNC+45WARNING - DebugDiag was not able to locate debug symbols for php5.dll, so the information below may be incomplete.

In php__PID__2688__Date__09_15_2012__Time_01_31_06PM__296__Second_Chance_Exception_C0000005.dmp the assembly instruction at php5!zval_dtor_func+45 in G:\Home\PHP5\php5.dll from The PHP Group has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00001874 on thread 0

 


Test script:
---------------
too big need first find error line


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2012-09-15 19:32 UTC] felipe@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.


 [2012-09-15 19:32 UTC] felipe@php.net
-Status: Open +Status: Feedback
 [2012-09-15 20:48 UTC] pracanowo at gmail dot com
-Status: Feedback +Status: Open
 [2012-09-15 20:48 UTC] pracanowo at gmail dot com
Error are somtimes random, script parse lot of data [ so i think is preg ], on Monday i will be able to reproduce error, now all sessio that my script need handle are finish. I need also create some markers in my code. Now i install Xdebug. I remember in 5.3 whose the same now i update to 5.4.7
 [2012-09-16 01:31 UTC] reeze@php.net
-Status: Open +Status: Feedback
 [2012-09-16 01:31 UTC] reeze@php.net
Could you please try to get a reproducible test script ?
if possible it would be much easier to spot.
 [2012-09-17 10:28 UTC] pajoye@php.net
First of all, please post a clean backtrace.

See https://bugs.php.net/bugs-generating-backtrace-win32.php
 [2012-09-17 11:45 UTC] pracanowo at gmail dot com
ok i find it str_get_html() from "PHP Simple HTML DOM Parser".

Now i need only save bugy html
 [2012-09-17 13:13 UTC] pajoye@php.net
ok, as you mentioned that you pcre, I seriously hope that you are not parsing HTML using pcre. That's the best to end in a stack overflow crash with PCRE.

Use tidy or DOM instead.

Alternatively you can increase the stack size of the php.exe (using editbin.exe).
 [2012-09-17 13:34 UTC] pracanowo at gmail dot com
I seriously hope that you are not parsing HTML using pcre

Yes, i do it gently :)

This is not annoying buq i create some fixes so for me its no problemo
 [2012-09-17 13:37 UTC] pajoye@php.net
pcre issue, No bug :)
 [2012-09-17 13:37 UTC] pajoye@php.net
-Status: Feedback +Status: Not a bug
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Sun Jul 13 23:01:33 2025 UTC