3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo preg_replace('#[^\p{L} 0-9?!]#ui', '', mysql_real_escape_string($_POST['searchquery'])); ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/XCS4b
function name:  (null)
number of ops:  13
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    1     0  E >   INIT_FCALL                                               'preg_replace'
          1        SEND_VAL                                                 '%23%5B%5E%5Cp%7BL%7D+0-9%3F%21%5D%23ui'
          2        SEND_VAL                                                 ''
          3        INIT_FCALL_BY_NAME                                       'mysql_real_escape_string'
          4        CHECK_FUNC_ARG                                           
          5        FETCH_FUNC_ARG               global              $0      '_POST'
          6        FETCH_DIM_FUNC_ARG                               $1      $0, 'searchquery'
          7        SEND_FUNC_ARG                                            $1
          8        DO_FCALL                                      0  $2      
          9        SEND_VAR                                                 $2
         10        DO_ICALL                                         $3      
         11        ECHO                                                     $3
         12      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.88 ms | 1394 KiB | 15 Q