PHP  
 PHP_7_2
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for ext/interbase/tests/ibase_num_params_001.phpt ('ibase_num_params(): Basic test')

Script

1: <?php
2:
3:
require("interbase.inc");
4:
5:
$x ibase_connect($test_base);
6:
7:
$rs ibase_prepare('SELECT * FROM test1 WHERE 1 = ? AND 2 = ?');
8:
var_dump(ibase_num_params($rs));
9:
10:
$rs ibase_prepare('SELECT * FROM test1 WHERE 1 = ? AND 2 = ?');
11:
var_dump(ibase_num_params());
12:
13:
$rs ibase_prepare('SELECT * FROM test1 WHERE 1 = ? AND 2 = ? AND 3 = :x');
14:
var_dump(ibase_num_params($rs));
15:
16:
17:
?>
18:

Report

==765== Invalid read of size 4
==765==    at 0x6157A82: ??? (in /usr/lib64/libfbclient.so.2.5.7)
==765==    by 0x6149759: isc_database_info (in /usr/lib64/libfbclient.so.2.5.7)
==765==    by 0x8DA085: _php_ibase_free_stmt_handle (ibase_query.c:127)
==765==    by 0x8DA2E0: _php_ibase_free_query (ibase_query.c:169)
==765==    by 0x8DA409: php_ibase_free_query_rsrc (ibase_query.c:189)
==765==    by 0x114799E: zend_resource_dtor (zend_list.c:76)
==765==    by 0x11483C3: zend_close_rsrc (zend_list.c:230)
==765==    by 0x113D40B: zend_hash_reverse_apply (zend_hash.c:1599)
==765==    by 0x114840F: zend_close_rsrc_list (zend_list.c:238)
==765==    by 0x10CFBF3: shutdown_executor (zend_execute_API.c:263)
==765==    by 0x110392B: zend_deactivate (zend.c:1032)
==765==    by 0xFF3E2B: php_request_shutdown (main.c:1904)
==765==  Address 0x15b44a80 is 0 bytes inside a block of size 32 free'd
==765==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==765==    by 0x1098A9C: _efree (zend_alloc.c:2444)
==765==    by 0x8D62EE: _php_ibase_close_link (interbase.c:643)
==765==    by 0x114799E: zend_resource_dtor (zend_list.c:76)
==765==    by 0x1147A79: zend_list_close (zend_list.c:89)
==765==    by 0x8D795A: _php_ibase_connect (interbase.c:943)
==765==    by 0x8D848A: zif_ibase_connect (interbase.c:1037)
==765==    by 0x135A166: ZEND_DO_ICALL_SPEC_RETVAL_USED_HANDLER (zend_vm_execute.h:617)
==765==    by 0x135A166: execute_ex (zend_vm_execute.h:59750)
==765==    by 0x10D44CB: zend_call_function (zend_execute_API.c:820)
==765==    by 0x10D2E43: _call_user_function_ex (zend_execute_API.c:655)
==765==    by 0xD9BE12: user_shutdown_function_call (basic_functions.c:5023)
==765==    by 0x113BD7B: zend_hash_apply (zend_hash.c:1508)
==765==  Block was alloc'd at
==765==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==765==    by 0x109A002: __zend_malloc (zend_alloc.c:2829)
==765==    by 0x1093836: _emalloc_32 (zend_alloc.c:2352)
==765==    by 0x8D7D49: _php_ibase_connect (interbase.c:988)
==765==    by 0x8D848A: zif_ibase_connect (interbase.c:1037)
==765==    by 0x135A166: ZEND_DO_ICALL_SPEC_RETVAL_USED_HANDLER (zend_vm_execute.h:617)
==765==    by 0x135A166: execute_ex (zend_vm_execute.h:59750)
==765==    by 0x13816A0: zend_execute (zend_vm_execute.h:63776)
==765==    by 0x110585A: zend_execute_scripts (zend.c:1498)
==765==    by 0xFF61D7: php_execute_script (main.c:2594)
==765==    by 0x138755B: do_cli (php_cli.c:1011)
==765==    by 0x1388FE5: main (php_cli.c:1403)
==765== 

 

Generated at Sun, 10 Feb 2019 05:24:25 +0000 (10 days ago)

Copyright © 2005-2019 The PHP Group
All rights reserved.