PHP  
 PHP_7_1
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/watch_004.phpt ('Test detection of inline string manipulations on zval watch')

Script

1: <?php
2:
3: $b 
"a";
4:
$a $b.$b;
5:
$a[1] = "b";
6:

Report

==1032== Conditional jump or move depends on uninitialised value(s)
==1032==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==1032==    by 0x127EA7B: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==1032==    by 0x12845A8: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==1032==    by 0x128511C: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==1032==    by 0x1255E5F: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==1032==    by 0x10D0F26: zend_execute (zend_vm_execute.h:474)
==1032==    by 0x124F9F8: phpdbg_do_run (phpdbg_prompt.c:945)
==1032==    by 0x12791CF: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==1032==    by 0x12793A0: phpdbg_stack_execute (phpdbg_cmd.c:733)
==1032==    by 0x1253E17: phpdbg_interactive (phpdbg_prompt.c:1634)
==1032==    by 0x123FC0A: main (phpdbg.c:2005)
==1032== 
==1032== Conditional jump or move depends on uninitialised value(s)
==1032==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==1032==    by 0x127EAB3: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==1032==    by 0x12845A8: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==1032==    by 0x128511C: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==1032==    by 0x1255E5F: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==1032==    by 0x10D0F26: zend_execute (zend_vm_execute.h:474)
==1032==    by 0x124F9F8: phpdbg_do_run (phpdbg_prompt.c:945)
==1032==    by 0x12791CF: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==1032==    by 0x12793A0: phpdbg_stack_execute (phpdbg_cmd.c:733)
==1032==    by 0x1253E17: phpdbg_interactive (phpdbg_prompt.c:1634)
==1032==    by 0x123FC0A: main (phpdbg.c:2005)
==1032== 
==1032== Conditional jump or move depends on uninitialised value(s)
==1032==    at 0x4C2CFF1: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==1032==    by 0x127EAB3: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==1032==    by 0x12845A8: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==1032==    by 0x128511C: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==1032==    by 0x1255E5F: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==1032==    by 0x10D0F26: zend_execute (zend_vm_execute.h:474)
==1032==    by 0x124F9F8: phpdbg_do_run (phpdbg_prompt.c:945)
==1032==    by 0x12791CF: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==1032==    by 0x12793A0: phpdbg_stack_execute (phpdbg_cmd.c:733)
==1032==    by 0x1253E17: phpdbg_interactive (phpdbg_prompt.c:1634)
==1032==    by 0x123FC0A: main (phpdbg.c:2005)
==1032== 
==1032== Conditional jump or move depends on uninitialised value(s)
==1032==    at 0x12845AB: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==1032==    by 0x128511C: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==1032==    by 0x1255E5F: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==1032==    by 0x10D0F26: zend_execute (zend_vm_execute.h:474)
==1032==    by 0x124F9F8: phpdbg_do_run (phpdbg_prompt.c:945)
==1032==    by 0x12791CF: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==1032==    by 0x12793A0: phpdbg_stack_execute (phpdbg_cmd.c:733)
==1032==    by 0x1253E17: phpdbg_interactive (phpdbg_prompt.c:1634)
==1032==    by 0x123FC0A: main (phpdbg.c:2005)
==1032== 
==1032== Conditional jump or move depends on uninitialised value(s)
==1032==    at 0x128467F: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==1032==    by 0x128511C: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==1032==    by 0x1255E5F: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==1032==    by 0x10D0F26: zend_execute (zend_vm_execute.h:474)
==1032==    by 0x124F9F8: phpdbg_do_run (phpdbg_prompt.c:945)
==1032==    by 0x12791CF: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==1032==    by 0x12793A0: phpdbg_stack_execute (phpdbg_cmd.c:733)
==1032==    by 0x1253E17: phpdbg_interactive (phpdbg_prompt.c:1634)
==1032==    by 0x123FC0A: main (phpdbg.c:2005)
==1032== 
==1032== Conditional jump or move depends on uninitialised value(s)
==1032==    at 0x12846A1: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==1032==    by 0x128511C: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==1032==    by 0x1255E5F: phpdbg_execute_ex (phpdbg_prompt.c:1867)
==1032==    by 0x10D0F26: zend_execute (zend_vm_execute.h:474)
==1032==    by 0x124F9F8: phpdbg_do_run (phpdbg_prompt.c:945)
==1032==    by 0x12791CF: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==1032==    by 0x12793A0: phpdbg_stack_execute (phpdbg_cmd.c:733)
==1032==    by 0x1253E17: phpdbg_interactive (phpdbg_prompt.c:1634)
==1032==    by 0x123FC0A: main (phpdbg.c:2005)
==1032== 
==1032== Invalid read of size 4
==1032==    at 0xA537562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA53D952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA4075C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA7F75B: zm_shutdown_pdo_oci (pdo_oci.c:140)
==1032==    by 0x10047C7: module_destructor (zend_API.c:2501)
==1032==    by 0xFEEB56: module_destructor_zval (zend.c:633)
==1032==    by 0x1027A87: _zend_hash_del_el_ex (zend_hash.c:997)
==1032==    by 0x1027A87: _zend_hash_del_el (zend_hash.c:1020)
==1032==    by 0x1027A87: zend_hash_graceful_reverse_destroy (zend_hash.c:1476)
==1032==    by 0x10000FF: zend_destroy_modules (zend_API.c:1978)
==1032==    by 0xFEF5BB: zend_shutdown (zend.c:876)
==1032==    by 0xEE4D47: php_module_shutdown (main.c:2445)
==1032==    by 0x1240906: main (phpdbg.c:2166)
==1032==  Address 0x150300d0 is 0 bytes inside a block of size 43,632 free'd
==1032==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==1032==    by 0xA82DCDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA8F3ED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xB283F6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA53D6E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA53D952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA4075C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA7F75B: zm_shutdown_pdo_oci (pdo_oci.c:140)
==1032==    by 0x10047C7: module_destructor (zend_API.c:2501)
==1032==    by 0xFEEB56: module_destructor_zval (zend.c:633)
==1032==    by 0x1027A87: _zend_hash_del_el_ex (zend_hash.c:997)
==1032==    by 0x1027A87: _zend_hash_del_el (zend_hash.c:1020)
==1032==    by 0x1027A87: zend_hash_graceful_reverse_destroy (zend_hash.c:1476)
==1032==    by 0x10000FF: zend_destroy_modules (zend_API.c:1978)
==1032==  Block was alloc'd at
==1032==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==1032==    by 0xA82DCEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA8F3EEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xB283EFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA547030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA5452FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA4074E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==1032==    by 0xA7F6C9: zm_activate_pdo_oci (pdo_oci.c:118)
==1032==    by 0x1004988: zend_activate_modules (zend_API.c:2539)
==1032==    by 0xEE26FE: php_request_startup (main.c:1698)
==1032==    by 0x123EDC4: main (phpdbg.c:1810)
==1032== 

 

Generated at Sat, 28 Jul 2018 01:57:30 +0000 (23 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.