php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #63096 Crash when run cli script
Submitted: 2012-09-15 17:49 UTC Modified: 2012-09-17 13:37 UTC
From: pracanowo at gmail dot com Assigned:
Status: Not a bug Package: *General Issues
PHP Version: 5.4.7 OS: win xp sp3
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: pracanowo at gmail dot com
New email:
PHP Version: OS:

 

 [2012-09-15 17:49 UTC] pracanowo at gmail dot com
Description:
------------
[Web crawler preg curl etc]

 Report for php__PID__2688__Date__09_15_2012__Time_01_31_06PM__296__Second_Chance_Exception_C0000005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   XXXX 
Operating System   Windows XP Dodatek Service Pack 3 
Number Of Processors   2 
Process ID   2688 
Process Image   ...php.exe 
System Up-Time   8 day(s) 01:44:43 
Process Up-Time   00:02:07 


Thread 0 - System ID 3144
Entry point   php!sapi_cli_single_write+80d8 
Create time   2012-09-15 13:28:59 
Time spent in user mode   0 Days 0:0:43.468 
Time spent in kernel mode   0 Days 0:0:1.109 

Full Call Stack

Function     Arg 1     Arg 2     Arg 3     Arg 4   Source 
php5!zval_dtor_func+45     02b24040     0128f408     03ab0a38     0128f408    
php5!zend_objects_store_del_ref_by_handle_ex+24b     01280888     00000000     00c1e8f0     00c1e944    
php5!execute+164     012bea58     012bc688     00c1e9a8     00c1e9b4    
php5!zend_call_function+269     00c1e9b4     012bc688     00c1e9a8     1050f034    
php5!zend_objects_destroy_object+bc     03d0ccb8     0000000c     012253b4     03587678    
php5!libiconv_open+57a97     00000000     00000000     00000000     00000000    

Exception Information
PHP5!ZVAL_DTOR_FUNC+45WARNING - DebugDiag was not able to locate debug symbols for php5.dll, so the information below may be incomplete.

In php__PID__2688__Date__09_15_2012__Time_01_31_06PM__296__Second_Chance_Exception_C0000005.dmp the assembly instruction at php5!zval_dtor_func+45 in G:\Home\PHP5\php5.dll from The PHP Group has caused an access violation exception (0xC0000005) when trying to read from memory location 0x00001874 on thread 0

 


Test script:
---------------
too big need first find error line


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2012-09-15 19:32 UTC] felipe@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.


 [2012-09-15 19:32 UTC] felipe@php.net
-Status: Open +Status: Feedback
 [2012-09-15 20:48 UTC] pracanowo at gmail dot com
-Status: Feedback +Status: Open
 [2012-09-15 20:48 UTC] pracanowo at gmail dot com
Error are somtimes random, script parse lot of data [ so i think is preg ], on Monday i will be able to reproduce error, now all sessio that my script need handle are finish. I need also create some markers in my code. Now i install Xdebug. I remember in 5.3 whose the same now i update to 5.4.7
 [2012-09-16 01:31 UTC] reeze@php.net
-Status: Open +Status: Feedback
 [2012-09-16 01:31 UTC] reeze@php.net
Could you please try to get a reproducible test script ?
if possible it would be much easier to spot.
 [2012-09-17 10:28 UTC] pajoye@php.net
First of all, please post a clean backtrace.

See https://bugs.php.net/bugs-generating-backtrace-win32.php
 [2012-09-17 11:45 UTC] pracanowo at gmail dot com
ok i find it str_get_html() from "PHP Simple HTML DOM Parser".

Now i need only save bugy html
 [2012-09-17 13:13 UTC] pajoye@php.net
ok, as you mentioned that you pcre, I seriously hope that you are not parsing HTML using pcre. That's the best to end in a stack overflow crash with PCRE.

Use tidy or DOM instead.

Alternatively you can increase the stack size of the php.exe (using editbin.exe).
 [2012-09-17 13:34 UTC] pracanowo at gmail dot com
I seriously hope that you are not parsing HTML using pcre

Yes, i do it gently :)

This is not annoying buq i create some fixes so for me its no problemo
 [2012-09-17 13:37 UTC] pajoye@php.net
pcre issue, No bug :)
 [2012-09-17 13:37 UTC] pajoye@php.net
-Status: Feedback +Status: Not a bug
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Mon Jul 14 05:01:34 2025 UTC