PHP  
 PHP_7_2
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/bug73794.phpt ('Bug #73794 (Crash (out of memory) when using run and # command separator)')

Script

1: <?php
2:
echo $argv[1];
3:
?>
4:

Report

==16984== Invalid write of size 1
==16984==    at 0x13895CA: phpdbg_do_run (phpdbg_prompt.c:904)
==16984==    by 0x13B318E: phpdbg_internal_stack_execute (phpdbg_cmd.c:680)
==16984==    by 0x13B35AD: phpdbg_stack_execute (phpdbg_cmd.c:733)
==16984==    by 0x138DD7E: phpdbg_interactive (phpdbg_prompt.c:1631)
==16984==    by 0x1379B66: main (phpdbg.c:2001)
==16984==  Address 0x14f45291 is 0 bytes after a block of size 1 alloc'd
==16984==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==16984==    by 0x10872AB: __zend_malloc (zend_alloc.c:2829)
==16984==    by 0x1085A2B: _emalloc (zend_alloc.c:2429)
==16984==    by 0x1388F3C: phpdbg_do_run (phpdbg_prompt.c:841)
==16984==    by 0x13B318E: phpdbg_internal_stack_execute (phpdbg_cmd.c:680)
==16984==    by 0x13B35AD: phpdbg_stack_execute (phpdbg_cmd.c:733)
==16984==    by 0x138DD7E: phpdbg_interactive (phpdbg_prompt.c:1631)
==16984==    by 0x1379B66: main (phpdbg.c:2001)
==16984== 
==16984== Conditional jump or move depends on uninitialised value(s)
==16984==    at 0x4C2A868: __strlen_sse42 (vg_replace_strmem.c:462)
==16984==    by 0x10022DF: php_build_argv (php_variables.c:571)
==16984==    by 0x138979E: phpdbg_do_run (phpdbg_prompt.c:921)
==16984==    by 0x13B318E: phpdbg_internal_stack_execute (phpdbg_cmd.c:680)
==16984==    by 0x13B35AD: phpdbg_stack_execute (phpdbg_cmd.c:733)
==16984==    by 0x138DD7E: phpdbg_interactive (phpdbg_prompt.c:1631)
==16984==    by 0x1379B66: main (phpdbg.c:2001)
==16984== 
==16984== Invalid read of size 1
==16984==    at 0x10CA5CE: zend_string_release (zend_string.h:289)
==16984==    by 0x10CA5CE: destroy_op_array (zend_opcode.c:399)
==16984==    by 0x137162C: php_phpdbg_destroy_file_source (phpdbg.c:131)
==16984==    by 0x1126256: zend_hash_destroy (zend_hash.c:1245)
==16984==    by 0x137A7E3: main (phpdbg.c:2159)
==16984==  Address 0x14f438f5 is 5 bytes inside a block of size 32 free'd
==16984==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==16984==    by 0x13BF8B6: phpdbg_watch_efree (phpdbg_watch.c:1169)
==16984==    by 0x1085D45: _efree (zend_alloc.c:2444)
==16984==    by 0x116F4CA: _str_dtor (zend_string.c:50)
==16984==    by 0x112616D: zend_hash_destroy (zend_hash.c:1234)
==16984==    by 0x1170640: zend_interned_strings_deactivate (zend_string.c:205)
==16984==    by 0xFE1598: php_request_shutdown (main.c:1925)
==16984==    by 0x137A0D6: main (phpdbg.c:2098)
==16984==  Block was alloc'd at
==16984==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==16984==    by 0x10872AB: __zend_malloc (zend_alloc.c:2829)
==16984==    by 0x1085A2B: _emalloc (zend_alloc.c:2429)
==16984==    by 0x104EB93: zend_string_alloc (zend_string.h:134)
==16984==    by 0x104EB93: zend_string_init (zend_string.h:170)
==16984==    by 0x104EB93: lex_scan (zend_language_scanner.l:1869)
==16984==    by 0x108F8D7: zendlex (zend_compile.c:1721)
==16984==    by 0x1035770: zendparse (zend_language_parser.c:4914)
==16984==    by 0x1041014: zend_compile (zend_language_scanner.l:585)
==16984==    by 0x10413F8: compile_file (zend_language_scanner.l:635)
==16984==    by 0xB77EE3: phar_compile_file (phar.c:3320)
==16984==    by 0x13A3F40: phpdbg_compile_file (phpdbg_list.c:274)
==16984==    by 0x13A4480: phpdbg_init_compile_file (phpdbg_list.c:317)
==16984==    by 0x1387367: phpdbg_compile (phpdbg_prompt.c:600)
==16984== 

 

Generated at Fri, 03 Aug 2018 22:39:28 +0000 (14 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.