ID: 25607 Updated by: [EMAIL PROTECTED] Reported By: php at burnsystems dot de -Status: Open +Status: Wont fix Bug Type: Reproducible crash Operating System: Win XP PHP Version: 4.3.3 New Comment:
This is same as #23872, fixed in PHP 5, wont fix in PHP 4. Previous Comments: ------------------------------------------------------------------------ [2003-09-19 12:46:32] php at burnsystems dot de Description: ------------ Servus, I got a crash of 4.3.x under Apache and direct call of php.exe under windows, when the script creates a huge array. When $nAmount has a value over 32768 PHP and Apache crashes. Any suggestions or help, how to get a better description of this problem. Is it the same as following bug?? Bug #23872: reference to same variable(array) crash web server Thanks, Martin Brenn Reproduce code: --------------- ... <script language="php"> $nAmount = 100000; $szPlayerID = 'x'; for ( $nCounter = 0; $nCounter < $nAmount; $nCounter++ ) { echo ( $nCounter . "\r" ); $aszExtracted [ $szPlayerID ] [ $nUnit ] ['type' ] = $aszUnit [ 'type' ]; $aszExtracted [ $szPlayerID ] [ $nUnit ] [ 'job' ] = $aszUnit [ 'job' ]; $nUnit++; } </script> .. Expected result: ---------------- No crash Actual result: -------------- Die Anweisung in "0x100b35ef" verweist auf Speicher in "0x000000008". Der Vorgang "written" konnte nicht auf dem Speicher durchgeführt werden. The command in 0x100b35ef refers to memory in 0x0000008. The operation written couldn't be completed (or so). My VC++ only reported these line, I don't have a debug build. PHP4TS: 100B35DD 75 03 jne 100B35E2 100B35DF 89 6B 14 mov dword ptr [ebx+14h],ebp 100B35E2 8B 43 10 mov eax,dword ptr [ebx+10h] 100B35E5 85 C0 test eax,eax 100B35E7 75 03 jne 100B35EC 100B35E9 89 6B 10 mov dword ptr [ebx+10h],ebp 100B35EC 8B 43 1C mov eax,dword ptr [ebx+1Ch] 100B35EF 89 2C B0 mov dword ptr [eax+esi*4],ebp <----- 100B35F2 A1 2C F5 13 10 mov eax,[1013F52C] 100B35F7 85 C0 test eax,eax 100B35F9 74 02 je 100B35FD 100B35FB FF D0 call eax 100B35FD 8B 53 08 mov edx,dword ptr [ebx+8] 100B3600 8B 0B mov ecx,dword ptr [ebx] 100B3602 42 inc edx 100B3603 8B C2 mov eax,edx 100B3605 89 53 08 mov dword ptr [ebx+8],edx 100B3608 3B C1 cmp eax,ecx 100B360A 76 09 jbe 100B3615 100B360C 53 push ebx 100B360D E8 5E 05 00 00 call 100B3B70 ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=25607&edit=1