PHP  
 PHP_7_2
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/phpdbg_get_executable_stream_wrapper.phpt ('Getting executable lines from custom wrappers')

Script

1: <?php
2:
3:
/**
4:  * This example demonstrates how phpdbg_get_executable() behaves differently
5:  * when passed the 'files' option vs without, in the face of some mild abuse
6:  * of stream wrappers.
7:  */
8:
9: /**
10:  * First, we define a stream wrapper that simply maps to a real file on disk.
11:  */
12:
final class StreamWrapper
13:
{
14:     public function 
stream_open(
15:         
string $path,
16:         
string $mode,
17:         
int $options 0,
18:         
string &$openedPath null
19:     
) : bool {
20:         if (
$mode[0] !== 'r') {
21:             return 
false;
22:         }
23:
24:         list(
$scheme$path) = explode('://'$path2);
25:
26:         
$stream = \fopen($path$mode);
27:
28:         if (
$stream === false) {
29:             return 
false;
30:         }
31:
32:         
$this->stream $stream;
33:
34:         
/**
35:          * The $openedPath reference variable is assigned, indicating the
36:          * *actual* path that was opened. This affects the behaviour of
37:          * constants like __FILE__.
38:          */
39:         
$openedPath = \realpath($path);
40:
41:         return 
true;
42:     }
43:
44:     public function 
stream_read(int $count) : string { return \fread($this->stream$count); }
45:     public function 
stream_close() : bool { return \fclose($this->stream); }
46:     public function 
stream_eof() : bool { return \feof($this->stream); }
47:     public function 
stream_stat() { return \fstat($this->stream); }
48:
49:     private 
$stream false;
50: }
51:
52:
stream_wrapper_register('wrapper'StreamWrapper::class);
53:
54:
/**
55:  * Next, we include a PHP file that contains executable lines, via the stream
56:  * wrapper.
57:  */
58:
$filename __DIR__ '/phpdbg_get_executable_stream_wrapper.inc';
59: require 
'wrapper://' $filename;
60:
61:
/**
62:  * If we call phpdbg_get_executable() and pass no options, the realpath of the
63:  * included file is present in the array, but indicates no executable lines.
64:  */
65:
$x phpdbg_get_executable();
66:
67:
// We expect [5 => 0], but got an empty array ...
68:
var_dump($x[$filename]);
69:
70:
?>
71:

Report

==31008== Invalid read of size 4
==31008==    at 0xA304562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA30A952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA1D45C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xAE6A71: zm_shutdown_pdo_oci (pdo_oci.c:140)
==31008==    by 0x110561C: module_destructor (zend_API.c:2564)
==31008==    by 0x10EF705: module_destructor_zval (zend.c:690)
==31008==    by 0x11286CF: _zend_hash_del_el_ex (zend_hash.c:996)
==31008==    by 0x11286CF: _zend_hash_del_el (zend_hash.c:1019)
==31008==    by 0x11286CF: zend_hash_graceful_reverse_destroy (zend_hash.c:1475)
==31008==    by 0x1100B9C: zend_destroy_modules (zend_API.c:2008)
==31008==    by 0x10EFF03: zend_shutdown (zend.c:905)
==31008==    by 0xFE2BE7: php_module_shutdown (main.c:2453)
==31008==    by 0x137A4C9: main (phpdbg.c:2162)
==31008==  Address 0x14ef1f70 is 0 bytes inside a block of size 43,632 free'd
==31008==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==31008==    by 0xA5FACDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA6C0ED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xB050F6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA30A6E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA30A952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA1D45C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xAE6A71: zm_shutdown_pdo_oci (pdo_oci.c:140)
==31008==    by 0x110561C: module_destructor (zend_API.c:2564)
==31008==    by 0x10EF705: module_destructor_zval (zend.c:690)
==31008==    by 0x11286CF: _zend_hash_del_el_ex (zend_hash.c:996)
==31008==    by 0x11286CF: _zend_hash_del_el (zend_hash.c:1019)
==31008==    by 0x11286CF: zend_hash_graceful_reverse_destroy (zend_hash.c:1475)
==31008==    by 0x1100B9C: zend_destroy_modules (zend_API.c:2008)
==31008==  Block was alloc'd at
==31008==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==31008==    by 0xA5FACEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA6C0EEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xB050EFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA314030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA3122FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xA1D44E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==31008==    by 0xAE69DF: zm_activate_pdo_oci (pdo_oci.c:118)
==31008==    by 0x11057DD: zend_activate_modules (zend_API.c:2600)
==31008==    by 0xFE0427: php_request_startup (main.c:1694)
==31008==    by 0x137898C: main (phpdbg.c:1806)
==31008== 

 

Generated at Thu, 12 Jul 2018 17:17:45 +0000 (7 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.