3v4l.org

run code in 300+ PHP versions simultaneously
<?php $_content = '<a href="https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xpa1/v/t1.0-9/p100x100/10394047_10202106066684824_80590983553430220_n.jpg?oh=fcccf17086a3593d926a100c9a82f898&amp;oe=546AACC9&amp;__gda__=1416199983_da92aa7319b2636ad2887652e2f9a10e">https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xpa1/v/t1.0-9/p100x100/10394047_10202106066684824_80590983553430220_n.jpg?oh=fcccf17086a3593d926a100c9a82f898&amp;oe=546AACC9&amp;__gda__=1416199983_da92aa7319b2636ad2887652e2f9a10e</a>'; if(preg_match_all('#<a href=\"https://fbcdn([^\?\'"]*?)(.jpg|.gif|.png)\?([^\'"]*?)[^>]*>([^<]*?)</a>#i', $_content, $matches)); var_dump($matches);
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 7
Branch analysis from position: 7
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 7
filename:       /in/dtMCA
function name:  (null)
number of ops:  11
compiled vars:  !0 = $_content, !1 = $matches
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%3Ca+href%3D%22https%3A%2F%2Ffbcdn-sphotos-g-a.akamaihd.net%2Fhphotos-ak-xpa1%2Fv%2Ft1.0-9%2Fp100x100%2F10394047_10202106066684824_80590983553430220_n.jpg%3Foh%3Dfcccf17086a3593d926a100c9a82f898%26amp%3Boe%3D546AACC9%26amp%3B__gda__%3D1416199983_da92aa7319b2636ad2887652e2f9a10e%22%3Ehttps%3A%2F%2Ffbcdn-sphotos-g-a.akamaihd.net%2Fhphotos-ak-xpa1%2Fv%2Ft1.0-9%2Fp100x100%2F10394047_10202106066684824_80590983553430220_n.jpg%3Foh%3Dfcccf17086a3593d926a100c9a82f898%26amp%3Boe%3D546AACC9%26amp%3B__gda__%3D1416199983_da92aa7319b2636ad2887652e2f9a10e%3C%2Fa%3E'
    3     1        INIT_FCALL                                               'preg_match_all'
          2        SEND_VAL                                                 '%23%3Ca+href%3D%5C%22https%3A%2F%2Ffbcdn%28%5B%5E%5C%3F%27%22%5D%2A%3F%29%28.jpg%7C.gif%7C.png%29%5C%3F%28%5B%5E%27%22%5D%2A%3F%29%5B%5E%3E%5D%2A%3E%28%5B%5E%3C%5D%2A%3F%29%3C%2Fa%3E%23i'
          3        SEND_VAR                                                 !0
          4        SEND_REF                                                 !1
          5        DO_ICALL                                         $3      
          6      > JMPZ                                                     $3, ->7
    4     7    >   INIT_FCALL                                               'var_dump'
          8        SEND_VAR                                                 !1
          9        DO_ICALL                                                 
         10      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
191.04 ms | 1395 KiB | 17 Q