PHP  
 PHP_5_6
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for ext/mbstring/tests/zend_multibyte-09.phpt ('zend multibyte (9)')

Script

1: <?php
2:
declare(encoding="EUC-JP");
3:
// forcefully interpret an UTF-8 encoded string as EUC-JP and then convert it
4: // back to UTF-8. There should be only a pair of consecutive bytes that is
5: // valid EUC-encoded character "鴻".
6:
var_dump(bin2hex("テスト"));
7:
?>
8:

Report

==21472== Conditional jump or move depends on uninitialised value(s)
==21472==    at 0x4C2B310: memchr (vg_replace_strmem.c:887)
==21472==    by 0xE67A27: lex_scan (zend_language_scanner.l:1757)
==21472==    by 0xEC57E0: zendlex (zend_compile.c:6919)
==21472==    by 0xE57968: zendparse (zend_language_parser.c:3742)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Conditional jump or move depends on uninitialised value(s)
==21472==    at 0xE67DE0: lex_scan (zend_language_scanner.l:1805)
==21472==    by 0xEC57E0: zendlex (zend_compile.c:6919)
==21472==    by 0xE57968: zendparse (zend_language_parser.c:3742)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Conditional jump or move depends on uninitialised value(s)
==21472==    at 0xE67E00: lex_scan (zend_language_scanner.l:1805)
==21472==    by 0xEC57E0: zendlex (zend_compile.c:6919)
==21472==    by 0xE57968: zendparse (zend_language_parser.c:3742)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Use of uninitialised value of size 8
==21472==    at 0xF37D61: zend_new_interned_string_int (zend_string.c:97)
==21472==    by 0xE9E2FB: zend_insert_literal (zend_compile.c:343)
==21472==    by 0xE9E537: zend_add_literal (zend_compile.c:366)
==21472==    by 0xEA259C: zend_do_echo (zend_compile.c:877)
==21472==    by 0xE58C82: zendparse (zend_language_parser.y:339)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Conditional jump or move depends on uninitialised value(s)
==21472==    at 0xF37D8A: zend_new_interned_string_int (zend_string.c:99)
==21472==    by 0xE9E2FB: zend_insert_literal (zend_compile.c:343)
==21472==    by 0xE9E537: zend_add_literal (zend_compile.c:366)
==21472==    by 0xEA259C: zend_do_echo (zend_compile.c:877)
==21472==    by 0xE58C82: zendparse (zend_language_parser.y:339)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Use of uninitialised value of size 8
==21472==    at 0xF37F89: zend_new_interned_string_int (zend_string.c:133)
==21472==    by 0xE9E2FB: zend_insert_literal (zend_compile.c:343)
==21472==    by 0xE9E537: zend_add_literal (zend_compile.c:366)
==21472==    by 0xEA259C: zend_do_echo (zend_compile.c:877)
==21472==    by 0xE58C82: zendparse (zend_language_parser.y:339)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Use of uninitialised value of size 8
==21472==    at 0xF380C5: zend_new_interned_string_int (zend_string.c:151)
==21472==    by 0xE9E2FB: zend_insert_literal (zend_compile.c:343)
==21472==    by 0xE9E537: zend_add_literal (zend_compile.c:366)
==21472==    by 0xEA259C: zend_do_echo (zend_compile.c:877)
==21472==    by 0xE58C82: zendparse (zend_language_parser.y:339)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Conditional jump or move depends on uninitialised value(s)
==21472==    at 0xE678BD: lex_scan (zend_language_scanner.c:1082)
==21472==    by 0xEC57E0: zendlex (zend_compile.c:6919)
==21472==    by 0xE57968: zendparse (zend_language_parser.c:3742)
==21472==    by 0xE65AD2: compile_file (zend_language_scanner.l:586)
==21472==    by 0xAA2F69: phar_compile_file (phar.c:3370)
==21472==    by 0xEF210B: zend_execute_scripts (zend.c:1333)
==21472==    by 0xE0E79D: php_execute_script (main.c:2613)
==21472==    by 0x10ACC56: do_cli (php_cli.c:998)
==21472==    by 0x10AE44F: main (php_cli.c:1382)
==21472== 
==21472== Syscall param write(buf) points to uninitialised byte(s)
==21472==    at 0xD23B7D0: __write_nocancel (in /lib64/libc-2.12.so)
==21472==    by 0x10AA564: sapi_cli_single_write (php_cli.c:277)
==21472==    by 0x10AA6F1: sapi_cli_ub_write (php_cli.c:312)
==21472==    by 0xE340EA: php_output_op (output.c:1094)
==21472==    by 0xE30F1A: php_output_write (output.c:270)
==21472==    by 0xE0CA0D: php_output_wrapper (main.c:1962)
==21472==    by 0xEEEBCF: zend_print_zval_ex (zend.c:332)
==21472==    by 0xEEEAAD: zend_print_zval (zend.c:313)
==21472==    by 0xEED115: zend_print_variable (zend_variables.c:160)
==21472==    by 0xF6A581: ZEND_ECHO_SPEC_CONST_HANDLER (zend_vm_execute.h:2409)
==21472==    by 0xF5DB34: execute_ex (zend_vm_execute.h:363)
==21472==    by 0xF5E6D7: zend_execute (zend_vm_execute.h:388)
==21472==  Address 0x141b227c is 339,660 bytes inside a block of size 1,048,576 alloc'd
==21472==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==21472==    by 0xF37AA5: zend_interned_strings_init (zend_string.c:48)
==21472==    by 0xEEFD00: zend_startup (zend.c:747)
==21472==    by 0xE0CEFE: php_module_startup (main.c:2149)
==21472==    by 0x10AACC3: php_cli_startup (php_cli.c:421)
==21472==    by 0x10AE356: main (php_cli.c:1362)
==21472== 

 

Generated at Mon, 27 Nov 2017 05:04:32 +0000 (18 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.