From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 5073 invoked by alias); 29 Nov 2016 18:56:46 -0000 Mailing-List: contact cygwin-help@cygwin.com; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner@cygwin.com Mail-Followup-To: cygwin@cygwin.com Received: (qmail 3979 invoked by uid 89); 29 Nov 2016 18:56:45 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.9 required=5.0 tests=BAYES_00,KAM_LAZY_DOMAIN_SECURITY,SPF_HELO_PASS autolearn=no version=3.3.2 spammy=H*i:sk:5118c6c, H*f:sk:5118c6c, H*Ad:U*yselkowitz, Home X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 29 Nov 2016 18:56:35 +0000 Received: from int-mx11.intmail.prod.int.phx2.redhat.com (int-mx11.intmail.prod.int.phx2.redhat.com [10.5.11.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8B9D58E249 for ; Tue, 29 Nov 2016 18:56:34 +0000 (UTC) Received: from [10.10.116.23] (ovpn-116-23.rdu2.redhat.com [10.10.116.23]) by int-mx11.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id uATIuXvn026082 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 29 Nov 2016 13:56:34 -0500 Subject: Re: php 7 upgrade -- segmentation fault To: cygwin@cygwin.com References: <5118c6cbe09f3ed17a791417295bd3dafb91@guerrillamail.com> From: Yaakov Selkowitz Message-ID: Date: Wed, 30 Nov 2016 01:08:00 -0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.5.0 MIME-Version: 1.0 In-Reply-To: <5118c6cbe09f3ed17a791417295bd3dafb91@guerrillamail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2016-11/txt/msg00339.txt.bz2 On 2016-11-29 12:22, 59yfvs+f4bkzvgzw@guerrillamail.com wrote: > I can revert to php5 (insecure) and the problem is gone. I just performed > a full rebase which did nothing for this problem. Are you saying that on a > Windows 7 64 bit Home system with 32 bit cygwin you are not having any issues? I was testing on Windows 10 Pro. > I found a solution that is not really satisfying. If I go into Windows > System Advanced Settings - Data Execution Prevention tab, and I explicitly > add php.exe to the list of DEP exceptions, I no longer have errors with preg_match(). Ah, that explains it. PHP 7 uses pcre's JIT functionality where 5.6 did not. I guess you'd have the same problem with anything using a JIT. You will have to handle such issues with DEP on your end. -- Yaakov -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple