PHP  
 PHP_7_1
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/watch_001.phpt ('Test simple recursive watchpoint')

Script

1: <?php
2:
3: $a 
1;
4:
$b = [$a];
5:
6: unset(
$b);
7:
$b 2;
8:

Report

==10722== Conditional jump or move depends on uninitialised value(s)
==10722==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==10722==    by 0x1283845: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==10722==    by 0x12892D7: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==10722==    by 0x1289E4B: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==10722==    by 0x125AFB8: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==10722==    by 0x10D6590: zend_execute (zend_vm_execute.h:474)
==10722==    by 0x1254B51: phpdbg_do_run (phpdbg_prompt.c:945)
==10722==    by 0x127DF99: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==10722==    by 0x127E16A: phpdbg_stack_execute (phpdbg_cmd.c:733)
==10722==    by 0x1258F70: phpdbg_interactive (phpdbg_prompt.c:1634)
==10722==    by 0x1244D63: main (phpdbg.c:2005)
==10722== 
==10722== Conditional jump or move depends on uninitialised value(s)
==10722==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==10722==    by 0x128387D: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==10722==    by 0x12892D7: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==10722==    by 0x1289E4B: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==10722==    by 0x125AFB8: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==10722==    by 0x10D6590: zend_execute (zend_vm_execute.h:474)
==10722==    by 0x1254B51: phpdbg_do_run (phpdbg_prompt.c:945)
==10722==    by 0x127DF99: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==10722==    by 0x127E16A: phpdbg_stack_execute (phpdbg_cmd.c:733)
==10722==    by 0x1258F70: phpdbg_interactive (phpdbg_prompt.c:1634)
==10722==    by 0x1244D63: main (phpdbg.c:2005)
==10722== 
==10722== Conditional jump or move depends on uninitialised value(s)
==10722==    at 0x4C2CFF1: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==10722==    by 0x128387D: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==10722==    by 0x12892D7: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==10722==    by 0x1289E4B: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==10722==    by 0x125AFB8: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==10722==    by 0x10D6590: zend_execute (zend_vm_execute.h:474)
==10722==    by 0x1254B51: phpdbg_do_run (phpdbg_prompt.c:945)
==10722==    by 0x127DF99: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==10722==    by 0x127E16A: phpdbg_stack_execute (phpdbg_cmd.c:733)
==10722==    by 0x1258F70: phpdbg_interactive (phpdbg_prompt.c:1634)
==10722==    by 0x1244D63: main (phpdbg.c:2005)
==10722== 
==10722== Conditional jump or move depends on uninitialised value(s)
==10722==    at 0x12892DA: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==10722==    by 0x1289E4B: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==10722==    by 0x125AFB8: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==10722==    by 0x10D6590: zend_execute (zend_vm_execute.h:474)
==10722==    by 0x1254B51: phpdbg_do_run (phpdbg_prompt.c:945)
==10722==    by 0x127DF99: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==10722==    by 0x127E16A: phpdbg_stack_execute (phpdbg_cmd.c:733)
==10722==    by 0x1258F70: phpdbg_interactive (phpdbg_prompt.c:1634)
==10722==    by 0x1244D63: main (phpdbg.c:2005)
==10722== 
==10722== Conditional jump or move depends on uninitialised value(s)
==10722==    at 0x12893AE: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==10722==    by 0x1289E4B: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==10722==    by 0x125AFB8: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==10722==    by 0x10D6590: zend_execute (zend_vm_execute.h:474)
==10722==    by 0x1254B51: phpdbg_do_run (phpdbg_prompt.c:945)
==10722==    by 0x127DF99: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==10722==    by 0x127E16A: phpdbg_stack_execute (phpdbg_cmd.c:733)
==10722==    by 0x1258F70: phpdbg_interactive (phpdbg_prompt.c:1634)
==10722==    by 0x1244D63: main (phpdbg.c:2005)
==10722== 
==10722== Conditional jump or move depends on uninitialised value(s)
==10722==    at 0x12893D0: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==10722==    by 0x1289E4B: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==10722==    by 0x125AFB8: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==10722==    by 0x10D6590: zend_execute (zend_vm_execute.h:474)
==10722==    by 0x1254B51: phpdbg_do_run (phpdbg_prompt.c:945)
==10722==    by 0x127DF99: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==10722==    by 0x127E16A: phpdbg_stack_execute (phpdbg_cmd.c:733)
==10722==    by 0x1258F70: phpdbg_interactive (phpdbg_prompt.c:1634)
==10722==    by 0x1244D63: main (phpdbg.c:2005)
==10722== 
==10722== Invalid read of size 4
==10722==    at 0xA6C6562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA6CC952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA5965C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA86262: zm_shutdown_pdo_oci (pdo_oci.c:140)
==10722==    by 0x1009C33: module_destructor (zend_API.c:2501)
==10722==    by 0xFF4018: module_destructor_zval (zend.c:633)
==10722==    by 0x102CE04: _zend_hash_del_el_ex (zend_hash.c:997)
==10722==    by 0x102CE04: _zend_hash_del_el (zend_hash.c:1020)
==10722==    by 0x102CE04: zend_hash_graceful_reverse_destroy (zend_hash.c:1476)
==10722==    by 0x100556B: zend_destroy_modules (zend_API.c:1978)
==10722==    by 0xFF4A7D: zend_shutdown (zend.c:876)
==10722==    by 0xEE9FC9: php_module_shutdown (main.c:2445)
==10722==    by 0x1245A5F: main (phpdbg.c:2166)
==10722==  Address 0x15c26510 is 0 bytes inside a block of size 43,632 free'd
==10722==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==10722==    by 0xA9BCCDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xAA82ED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xB412F6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA6CC6E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA6CC952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA5965C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA86262: zm_shutdown_pdo_oci (pdo_oci.c:140)
==10722==    by 0x1009C33: module_destructor (zend_API.c:2501)
==10722==    by 0xFF4018: module_destructor_zval (zend.c:633)
==10722==    by 0x102CE04: _zend_hash_del_el_ex (zend_hash.c:997)
==10722==    by 0x102CE04: _zend_hash_del_el (zend_hash.c:1020)
==10722==    by 0x102CE04: zend_hash_graceful_reverse_destroy (zend_hash.c:1476)
==10722==    by 0x100556B: zend_destroy_modules (zend_API.c:1978)
==10722==  Block was alloc'd at
==10722==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==10722==    by 0xA9BCCEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xAA82EEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xB412EFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA6D6030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA6D42FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA5964E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==10722==    by 0xA861D0: zm_activate_pdo_oci (pdo_oci.c:118)
==10722==    by 0x1009DF4: zend_activate_modules (zend_API.c:2539)
==10722==    by 0xEE797E: php_request_startup (main.c:1698)
==10722==    by 0x1243F1D: main (phpdbg.c:1810)
==10722== 

 

Generated at Thu, 16 May 2019 13:22:37 +0000 (5 days ago)

Copyright © 2005-2019 The PHP Group
All rights reserved.