php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #71537 PCRE segfault from Opcache
Submitted: 2016-02-05 16:53 UTC Modified: 2016-02-07 15:39 UTC
From: max dot goldberg at gmail dot com Assigned: laruence (profile)
Status: Closed Package: opcache
PHP Version: 7.0.3 OS: Debian/Centos
Private report: No CVE-ID: None
View Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
If you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: max dot goldberg at gmail dot com
New email:
PHP Version: OS:

 

 [2016-02-05 16:53 UTC] max dot goldberg at gmail dot com
Description:
------------
In certain conditions, PHP 7 will segfault when preg_replace() is executed from the opcache. This has been happening since at least 7.0.0RC1 and up until php-src as of today.

Turning the opcache off, or blacklisting just the calling script seems to make the problem go away. Turning opcache.jit on or off seems to have no bearing on the issue. opcache ini settings are all at their default otherwise.

Despite my best efforts, I have not been able to reduce the code causing the segfault to single script. I'm available on efnet in #php.pecl or via email to work through it if need be. 

Actual result:
--------------
(gdb) bt
#0  0x00000000004f486f in php_pcre_replace_impl (pce=0x127f380, subject_str=0x7ffff21b2f00, subject=0x7ffff21b2f18 "/find-a-class/studio/:id(/:offset)/", subject_len=35, 
    replace_val=0x7fffea14a7d8, is_callable_replace=0, limit=-1, replace_count=0x7fffffffa78c) at /usr/local/src/php-src/ext/pcre/php_pcre.c:1197
#1  0x00000000004f43f7 in php_pcre_replace (regex=0x7ffff2077fc0, subject_str=0x7ffff21b2f00, subject=0x7ffff21b2f18 "/find-a-class/studio/:id(/:offset)/", subject_len=35, 
    replace_val=0x7fffea14a7d8, is_callable_replace=0, limit=-1, replace_count=0x7fffffffa78c) at /usr/local/src/php-src/ext/pcre/php_pcre.c:1055
#2  0x00000000004f5115 in php_replace_in_subject (regex=0x7ffff2016880, replace=0x7ffff2016890, subject=0x7ffff20168a0, limit=-1, is_callable_replace=0, 
    replace_count=0x7fffffffa78c) at /usr/local/src/php-src/ext/pcre/php_pcre.c:1389
#3  0x00000000004f54e9 in preg_replace_impl (return_value=0x7ffff20167f0, regex=0x7ffff2016880, replace=0x7ffff2016890, subject=0x7ffff20168a0, limit_val=-1, 
    is_callable_replace=0, is_filter=0) at /usr/local/src/php-src/ext/pcre/php_pcre.c:1469
#4  0x00000000004f5b4a in zif_preg_replace (execute_data=0x7ffff2016820, return_value=0x7ffff20167f0) at /usr/local/src/php-src/ext/pcre/php_pcre.c:1511
#5  0x00000000008e3595 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0x7ffff2016700) at /usr/local/src/php-src/Zend/zend_vm_execute.h:714
#6  0x00000000008e29a4 in execute_ex (ex=0x7ffff2015750) at /usr/local/src/php-src/Zend/zend_vm_execute.h:417
#7  0x00000000008707ba in zend_call_function (fci=0x7fffffffaae0, fci_cache=0x7fffffffaab0) at /usr/local/src/php-src/Zend/zend_execute_API.c:860
#8  0x00000000006ebdae in zif_call_user_func_array (execute_data=0x7ffff20156d0, return_value=0x7ffff20156b0) at /usr/local/src/php-src/ext/standard/basic_functions.c:4815
#9  0x00000000008e3595 in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0x7ffff2015620) at /usr/local/src/php-src/Zend/zend_vm_execute.h:714
#10 0x00000000008e29a4 in execute_ex (ex=0x7ffff2015030) at /usr/local/src/php-src/Zend/zend_vm_execute.h:417
#11 0x00000000008e2ace in zend_execute (op_array=0x7ffff2001000, return_value=0x0) at /usr/local/src/php-src/Zend/zend_vm_execute.h:458
#12 0x0000000000887ce6 in zend_execute_scripts (type=8, retval=0x0, file_count=3) at /usr/local/src/php-src/Zend/zend.c:1427
#13 0x00000000007f8b3a in php_execute_script (primary_file=0x7fffffffcfd0) at /usr/local/src/php-src/main/main.c:2484
#14 0x0000000000958da7 in php_cli_server_dispatch_script (server=0x121cda0, client=0x13cff60) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:1940
#15 0x000000000095954b in php_cli_server_dispatch (server=0x121cda0, client=0x13cff60) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:2101
#16 0x0000000000959dc0 in php_cli_server_recv_event_read_request (server=0x121cda0, client=0x13cff60) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:2315
#17 0x000000000095a132 in php_cli_server_do_event_for_each_fd_callback (_params=0x7fffffffd240, fd=9, event=1) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:2400
#18 0x0000000000956421 in php_cli_server_poller_iter_on_active (poller=0x121cda8, opaque=0x7fffffffd240, callback=0x959f18 <php_cli_server_do_event_for_each_fd_callback>)
    at /usr/local/src/php-src/sapi/cli/php_cli_server.c:834
#19 0x000000000095a1a5 in php_cli_server_do_event_for_each_fd (server=0x121cda0, rhandler=0x959cc9 <php_cli_server_recv_event_read_request>, 
    whandler=0x959de7 <php_cli_server_send_event>) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:2418
#20 0x000000000095a209 in php_cli_server_do_event_loop (server=0x121cda0) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:2428
#21 0x000000000095a543 in do_cli_server (argc=5, argv=0x1226b50) at /usr/local/src/php-src/sapi/cli/php_cli_server.c:2529
#22 0x0000000000950ce2 in main (argc=5, argv=0x1226b50) at /usr/local/src/php-src/sapi/cli/php_cli.c:1348
(gdb) info local 
extra = 0x7fffffffa540
extra_data = {flags = 50, study_data = 0x7ffff2077fc0, match_limit = 100, callout_data = 0x7fffffffa640, tables = 0x7fffffffa590 "\030/\033\362\377\177", 
  match_limit_recursion = 100, mark = 0x7fffffffa528, executable_jit = 0x69f20e3ec0}
exoptions = 8192
count = 1
offsets = 0x7fffffffa4d0
subpat_names = 0x0
num_subpats = 1
size_offsets = 3
new_len = 500990
alloc_len = 0
match_len = 32767
backref = 0
start_offset = 0
g_notempty = 0
replace_len = 681947597
replace = 0x7ffff2185b18 ""
walkbuf = 0x0
walk = 0x7ffff2200001 <Address 0x7ffff2200001 out of bounds>
match = 0x7ffff21b2f2d ":id(/:offset)/"
piece = 0x7ffff21b2f18 "/find-a-class/studio/:id(/:offset)/"
replace_end = 0x80001abe0ce5 <Address 0x80001abe0ce5 out of bounds>
walk_last = 0 '\000'
result_len = 0
mark = 0x0
result = 0x0
eval_result = 0x0
use_heap = 0 '\000'
__PRETTY_FUNCTION__ = "php_pcre_replace_impl"
(gdb)

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2016-02-05 18:50 UTC] rasmus@php.net
-Status: Open +Status: Feedback
 [2016-02-05 18:50 UTC] rasmus@php.net
The PHP version listed is 7.0.3, but the line numbers in your backtrace don't seem to match 7.0.3?
 [2016-02-05 19:04 UTC] max dot goldberg at gmail dot com
Sorry, this was backtrace was generated with php-src. I'll add one from 7.0.3
 [2016-02-05 19:14 UTC] max dot goldberg at gmail dot com
-Status: Feedback +Status: Open
 [2016-02-05 19:14 UTC] max dot goldberg at gmail dot com
From 7.0.3:

#0  0x00000000004f4cd1 in php_pcre_replace_impl (pce=0x128b180, subject_str=0x7ffff21b3ea0, subject=0x7ffff21b3eb8 "/find-a-class/studio/:id(/:offset)/", subject_len=35, 
    replace_val=0x7fffea1923d8, is_callable_replace=0, limit=-1, replace_count=0x7fffffffa78c) at /usr/local/src/php-7.0.3/ext/pcre/php_pcre.c:1197
#1  0x00000000004f486c in php_pcre_replace (regex=0x7ffff21e4aa0, subject_str=0x7ffff21b3ea0, subject=0x7ffff21b3eb8 "/find-a-class/studio/:id(/:offset)/", subject_len=35, 
    replace_val=0x7fffea1923d8, is_callable_replace=0, limit=-1, replace_count=0x7fffffffa78c) at /usr/local/src/php-7.0.3/ext/pcre/php_pcre.c:1070
#2  0x00000000004f5642 in php_replace_in_subject (regex=0x7ffff2016880, replace=0x7ffff2016890, subject=0x7ffff20168a0, limit=-1, is_callable_replace=0, 
    replace_count=0x7fffffffa78c) at /usr/local/src/php-7.0.3/ext/pcre/php_pcre.c:1403
#3  0x00000000004f5a16 in preg_replace_impl (return_value=0x7ffff20167f0, regex=0x7ffff2016880, replace=0x7ffff2016890, subject=0x7ffff20168a0, limit_val=-1, 
    is_callable_replace=0, is_filter=0) at /usr/local/src/php-7.0.3/ext/pcre/php_pcre.c:1483
#4  0x00000000004f6077 in zif_preg_replace (execute_data=0x7ffff2016820, return_value=0x7ffff20167f0) at /usr/local/src/php-7.0.3/ext/pcre/php_pcre.c:1525
#5  0x00000000008ec7fd in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0x7ffff2016700) at /usr/local/src/php-7.0.3/Zend/zend_vm_execute.h:714
#6  0x00000000008ebc1f in execute_ex (ex=0x7ffff2015750) at /usr/local/src/php-7.0.3/Zend/zend_vm_execute.h:417
#7  0x000000000087a0dd in zend_call_function (fci=0x7fffffffaae0, fci_cache=0x7fffffffaab0) at /usr/local/src/php-7.0.3/Zend/zend_execute_API.c:860
#8  0x00000000006ea22f in zif_call_user_func_array (execute_data=0x7ffff20156d0, return_value=0x7ffff20156b0) at /usr/local/src/php-7.0.3/ext/standard/basic_functions.c:4811
#9  0x00000000008ec7fd in ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (execute_data=0x7ffff2015620) at /usr/local/src/php-7.0.3/Zend/zend_vm_execute.h:714
#10 0x00000000008ebc1f in execute_ex (ex=0x7ffff2015030) at /usr/local/src/php-7.0.3/Zend/zend_vm_execute.h:417
#11 0x00000000008ebd49 in zend_execute (op_array=0x7ffff2001000, return_value=0x0) at /usr/local/src/php-7.0.3/Zend/zend_vm_execute.h:458
#12 0x0000000000891802 in zend_execute_scripts (type=8, retval=0x0, file_count=3) at /usr/local/src/php-7.0.3/Zend/zend.c:1427
#13 0x0000000000803086 in php_execute_script (primary_file=0x7fffffffcfd0) at /usr/local/src/php-7.0.3/main/main.c:2484
#14 0x00000000009606a0 in php_cli_server_dispatch_script (server=0x12207e0, client=0x13b9260) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:1940
#15 0x0000000000960e44 in php_cli_server_dispatch (server=0x12207e0, client=0x13b9260) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:2101
#16 0x00000000009616b9 in php_cli_server_recv_event_read_request (server=0x12207e0, client=0x13b9260) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:2315
#17 0x00000000009619e1 in php_cli_server_do_event_for_each_fd_callback (_params=0x7fffffffd240, fd=8, event=1) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:2395
#18 0x000000000095dd1a in php_cli_server_poller_iter_on_active (poller=0x12207e8, opaque=0x7fffffffd240, callback=0x961811 <php_cli_server_do_event_for_each_fd_callback>)
    at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:834
#19 0x0000000000961a9e in php_cli_server_do_event_for_each_fd (server=0x12207e0, rhandler=0x9615c2 <php_cli_server_recv_event_read_request>, 
    whandler=0x9616e0 <php_cli_server_send_event>) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:2418
#20 0x0000000000961b02 in php_cli_server_do_event_loop (server=0x12207e0) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:2428
#21 0x0000000000961e3c in do_cli_server (argc=5, argv=0x122ab40) at /usr/local/src/php-7.0.3/sapi/cli/php_cli_server.c:2529
#22 0x00000000009585ee in main (argc=5, argv=0x122ab40) at /usr/local/src/php-7.0.3/sapi/cli/php_cli.c:1348
 [2016-02-06 15:20 UTC] laruence@php.net
could you try with valgrind?
 [2016-02-06 15:28 UTC] max dot goldberg at gmail dot com
As with the built-in server, the first hit, pre-opcache goes fine, and the segfault occurs on the second hit. Here's the valgrind result from the second hit, let me know if you need it run with specific options:

==30154== Conditional jump or move depends on uninitialised value(s)
==30154==    at 0x4F4CD6: php_pcre_replace_impl (php_pcre.c:1197)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x8EBD48: zend_execute (zend_vm_execute.h:458)
==30154== 
==30154== Conditional jump or move depends on uninitialised value(s)
==30154==    at 0x4F4CE4: php_pcre_replace_impl (php_pcre.c:1197)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x8EBD48: zend_execute (zend_vm_execute.h:458)
==30154== 
==30154== Conditional jump or move depends on uninitialised value(s)
==30154==    at 0x4F4CEE: php_pcre_replace_impl (php_pcre.c:1198)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x8EBD48: zend_execute (zend_vm_execute.h:458)
==30154==  Uninitialised value was created by a stack allocation
==30154==    at 0x8688FD: zend_compile_method_call (zend_compile.c:3256)
==30154== 
==30154== Conditional jump or move depends on uninitialised value(s)
==30154==    at 0x4F43C8: preg_get_backref (php_pcre.c:979)
==30154==    by 0x4F4D23: php_pcre_replace_impl (php_pcre.c:1203)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==  Uninitialised value was created by a stack allocation
==30154==    at 0x8688FD: zend_compile_method_call (zend_compile.c:3256)
==30154== 
==30154== Conditional jump or move depends on uninitialised value(s)
==30154==    at 0x4F43D9: preg_get_backref (php_pcre.c:982)
==30154==    by 0x4F4D23: php_pcre_replace_impl (php_pcre.c:1203)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==  Uninitialised value was created by a stack allocation
==30154==    at 0x8688FD: zend_compile_method_call (zend_compile.c:3256)
==30154== 
==30154== Conditional jump or move depends on uninitialised value(s)
==30154==    at 0x4F43F9: preg_get_backref (php_pcre.c:988)
==30154==    by 0x4F4D23: php_pcre_replace_impl (php_pcre.c:1203)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==  Uninitialised value was created by a stack allocation
==30154==    at 0x8688FD: zend_compile_method_call (zend_compile.c:3256)
==30154== 
==30154== 
==30154== Process terminating with default action of signal 11 (SIGSEGV)
==30154==  Bad permissions for mapped region at address 0xB037000
==30154==    at 0x4F4CD1: php_pcre_replace_impl (php_pcre.c:1197)
==30154==    by 0x4F486B: php_pcre_replace (php_pcre.c:1070)
==30154==    by 0x4F5641: php_replace_in_subject (php_pcre.c:1403)
==30154==    by 0x4F5A15: preg_replace_impl (php_pcre.c:1483)
==30154==    by 0x4F6076: zif_preg_replace (php_pcre.c:1525)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x87A0DC: zend_call_function (zend_execute_API.c:860)
==30154==    by 0x6EA22E: zif_call_user_func_array (basic_functions.c:4811)
==30154==    by 0x8EC7FC: ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER (zend_vm_execute.h:714)
==30154==    by 0x8EBC1E: execute_ex (zend_vm_execute.h:417)
==30154==    by 0x8EBD48: zend_execute (zend_vm_execute.h:458)
==30154== 
==30154== HEAP SUMMARY:
==30154==     in use at exit: 2,114,167 bytes in 19,195 blocks
==30154==   total heap usage: 23,125 allocs, 3,930 frees, 3,644,424 bytes allocated
==30154== 
==30154== LEAK SUMMARY:
==30154==    definitely lost: 0 bytes in 0 blocks
==30154==    indirectly lost: 0 bytes in 0 blocks
==30154==      possibly lost: 1,464,606 bytes in 14,788 blocks
==30154==    still reachable: 649,561 bytes in 4,407 blocks
==30154==         suppressed: 0 bytes in 0 blocks
==30154== Rerun with --leak-check=full to see details of leaked memory
==30154== 
==30154== For counts of detected and suppressed errors, rerun with: -v
==30154== ERROR SUMMARY: 11846 errors from 6 contexts (suppressed: 17 from 9)
Segmentation fault
 [2016-02-07 09:15 UTC] laruence@php.net
is that possible you could grant me a ssh access to the reproducible box? (via mail)

thanks
 [2016-02-07 10:33 UTC] max dot goldberg at gmail dot com
Credentials sent!
 [2016-02-07 15:19 UTC] laruence@php.net
Automatic comment on behalf of laruence@gmail.com
Revision: http://git.php.net/?p=php-src.git;a=commit;h=336e39f2b194e1425dc363abd18554f60c80bed1
Log: Fixed bug #71537 (PCRE segfault from Opcache)
 [2016-02-07 15:19 UTC] laruence@php.net
-Status: Open +Status: Closed
 [2016-02-07 15:20 UTC] laruence@php.net
-Status: Closed +Status: Open
 [2016-02-07 15:20 UTC] laruence@php.net
thanks max, it has been fixed, your help is appreciated..

anyway, your local php-src has been patched. so, you might need clean it :<

thanks
 [2016-02-07 15:39 UTC] laruence@php.net
-Status: Open +Status: Closed -Assigned To: +Assigned To: laruence
 [2016-02-07 15:39 UTC] laruence@php.net
The fix for this bug has been committed.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.


 [2016-07-20 11:33 UTC] davey@php.net
Automatic comment on behalf of laruence@gmail.com
Revision: http://git.php.net/?p=php-src.git;a=commit;h=336e39f2b194e1425dc363abd18554f60c80bed1
Log: Fixed bug #71537 (PCRE segfault from Opcache)
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Thu Nov 21 12:01:29 2024 UTC