ID: 47766 User updated by: ipseno at yahoo dot com Reported By: ipseno at yahoo dot com -Status: Feedback +Status: Open Bug Type: CGI related Operating System: Win XP SP3 PHP Version: 5.3CVS-2009-03-24 (snap) New Comment:
Ok, I've parsed it with: VC9 x86 Non Thread Safe (2009-Mar-24 15:00:00) * Zip [12.73MB] sha1: 9c94f8a7cdc73c22da8c66e6af16ade4ceb4d197 Result: CGI / FastCGI has encountered a problem and needs to close. We are sorry for the inconvenience. This means same thing is happening. Only one line of code is responsible for it. Commenting it out, makes no crash at all. Line of code is: $temp .= $site->p('You will receive ' . $amount . ' ' . $mon . ' to ' . $dc . ' account with number ' . $acc, array('class'=>'phys_wide face_green') ); HINT: When I "shothened"(removed letters), first or second arg of 'p' method it worked! Like: $temp .= $site->p('You will receive ' . $amount . ' ' . $mon . ' to ' . $dc . ' account number ' . $acc, array('class'=>'phys_wide face_green') ); Works without crash! Previous Comments: ------------------------------------------------------------------------ [2009-03-24 22:52:46] paj...@php.net It would help to have the "evil" script. If you use FastCGI, you do not need the thread safe version, please try using the NTS builds (vc9 too). ------------------------------------------------------------------------ [2009-03-24 22:38:26] ipseno at yahoo dot com Description: ------------ PHP Version 5.3.0RC2-dev System Windows NT DEV 5.1 build 2600 (Windows XP Professional Service Pack 3) i586 Build Date Mar 24 2009 14:47:41 Compiler MSVC9 (Visual C++ 2008) Architecture x86 Server API CGI/FastCGI I am using VC9, as I am not runing php as apache's modul. If that would be a case, I would use VC6 instead. After parsing "evil" script: Faulting application php-cgi.exe, version 5.3.0.0, faulting module php5ts.dll, version 5.3.0.0, fault address 0x000a4f6e. Category: (100) Type: Error Event ID: 1000 If you ask / need, I will make a backtrace. ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=47766&edit=1