ID: 25607
Updated by: [EMAIL PROTECTED]
Reported By: php at burnsystems dot de
-Status: Open
+Status: Wont fix
Bug Type: Reproducible crash
Operating System: Win XP
PHP Version: 4.3.3
New Comment:
This is same as #23872, fixed in PHP 5, wont fix in PHP 4.
Previous Comments:
------------------------------------------------------------------------
[2003-09-19 12:46:32] php at burnsystems dot de
Description:
------------
Servus,
I got a crash of 4.3.x under Apache and direct call of php.exe under
windows, when the script creates a huge array.
When $nAmount has a value over 32768 PHP and Apache
crashes.
Any suggestions or help, how to get a better description of this
problem.
Is it the same as following bug??
Bug #23872: reference to same variable(array) crash web server
Thanks,
Martin Brenn
Reproduce code:
---------------
...
<script language="php">
$nAmount = 100000;
$szPlayerID = 'x';
for ( $nCounter = 0; $nCounter < $nAmount; $nCounter++ )
{
echo ( $nCounter . "\r" );
$aszExtracted [ $szPlayerID ] [ $nUnit ] ['type' ] = $aszUnit [
'type' ];
$aszExtracted [ $szPlayerID ] [ $nUnit ] [ 'job' ] = $aszUnit [
'job' ];
$nUnit++;
}
</script>
..
Expected result:
----------------
No crash
Actual result:
--------------
Die Anweisung in "0x100b35ef" verweist auf Speicher in "0x000000008".
Der Vorgang "written" konnte nicht auf dem Speicher durchgef�hrt
werden.
The command in 0x100b35ef refers to memory in 0x0000008. The operation
written couldn't be completed (or so).
My VC++ only reported these line, I don't have a debug build.
PHP4TS:
100B35DD 75 03 jne 100B35E2
100B35DF 89 6B 14 mov dword ptr [ebx+14h],ebp
100B35E2 8B 43 10 mov eax,dword ptr [ebx+10h]
100B35E5 85 C0 test eax,eax
100B35E7 75 03 jne 100B35EC
100B35E9 89 6B 10 mov dword ptr [ebx+10h],ebp
100B35EC 8B 43 1C mov eax,dword ptr [ebx+1Ch]
100B35EF 89 2C B0 mov dword ptr [eax+esi*4],ebp
<-----
100B35F2 A1 2C F5 13 10 mov eax,[1013F52C]
100B35F7 85 C0 test eax,eax
100B35F9 74 02 je 100B35FD
100B35FB FF D0 call eax
100B35FD 8B 53 08 mov edx,dword ptr [ebx+8]
100B3600 8B 0B mov ecx,dword ptr [ebx]
100B3602 42 inc edx
100B3603 8B C2 mov eax,edx
100B3605 89 53 08 mov dword ptr [ebx+8],edx
100B3608 3B C1 cmp eax,ecx
100B360A 76 09 jbe 100B3615
100B360C 53 push ebx
100B360D E8 5E 05 00 00 call 100B3B70
------------------------------------------------------------------------
--
Edit this bug report at http://bugs.php.net/?id=25607&edit=1