PHP  
 PHP_7_2
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/watch_001.phpt ('Test simple recursive watchpoint')

Script

1: <?php
2:
3: $a 
1;
4:
$b = [$a];
5:
6: unset(
$b);
7:
$b 2;
8:

Report

==6582== Conditional jump or move depends on uninitialised value(s)
==6582==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==6582==    by 0x13B70F9: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==6582==    by 0x13BCCE7: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==6582==    by 0x13BD885: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==6582==    by 0x138E22C: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==6582==    by 0x136C4F2: zend_execute (zend_vm_execute.h:63760)
==6582==    by 0x1387DBD: phpdbg_do_run (phpdbg_prompt.c:942)
==6582==    by 0x13B1842: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==6582==    by 0x13B1A13: phpdbg_stack_execute (phpdbg_cmd.c:733)
==6582==    by 0x138C1E4: phpdbg_interactive (phpdbg_prompt.c:1631)
==6582==    by 0x1377FCC: main (phpdbg.c:2001)
==6582== 
==6582== Conditional jump or move depends on uninitialised value(s)
==6582==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==6582==    by 0x13B7131: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==6582==    by 0x13BCCE7: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==6582==    by 0x13BD885: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==6582==    by 0x138E22C: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==6582==    by 0x136C4F2: zend_execute (zend_vm_execute.h:63760)
==6582==    by 0x1387DBD: phpdbg_do_run (phpdbg_prompt.c:942)
==6582==    by 0x13B1842: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==6582==    by 0x13B1A13: phpdbg_stack_execute (phpdbg_cmd.c:733)
==6582==    by 0x138C1E4: phpdbg_interactive (phpdbg_prompt.c:1631)
==6582==    by 0x1377FCC: main (phpdbg.c:2001)
==6582== 
==6582== Conditional jump or move depends on uninitialised value(s)
==6582==    at 0x4C2CFF1: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==6582==    by 0x13B7131: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==6582==    by 0x13BCCE7: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==6582==    by 0x13BD885: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==6582==    by 0x138E22C: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==6582==    by 0x136C4F2: zend_execute (zend_vm_execute.h:63760)
==6582==    by 0x1387DBD: phpdbg_do_run (phpdbg_prompt.c:942)
==6582==    by 0x13B1842: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==6582==    by 0x13B1A13: phpdbg_stack_execute (phpdbg_cmd.c:733)
==6582==    by 0x138C1E4: phpdbg_interactive (phpdbg_prompt.c:1631)
==6582==    by 0x1377FCC: main (phpdbg.c:2001)
==6582== 
==6582== Conditional jump or move depends on uninitialised value(s)
==6582==    at 0x13BCCEA: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==6582==    by 0x13BD885: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==6582==    by 0x138E22C: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==6582==    by 0x136C4F2: zend_execute (zend_vm_execute.h:63760)
==6582==    by 0x1387DBD: phpdbg_do_run (phpdbg_prompt.c:942)
==6582==    by 0x13B1842: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==6582==    by 0x13B1A13: phpdbg_stack_execute (phpdbg_cmd.c:733)
==6582==    by 0x138C1E4: phpdbg_interactive (phpdbg_prompt.c:1631)
==6582==    by 0x1377FCC: main (phpdbg.c:2001)
==6582== 
==6582== Conditional jump or move depends on uninitialised value(s)
==6582==    at 0x13BCDBE: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==6582==    by 0x13BD885: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==6582==    by 0x138E22C: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==6582==    by 0x136C4F2: zend_execute (zend_vm_execute.h:63760)
==6582==    by 0x1387DBD: phpdbg_do_run (phpdbg_prompt.c:942)
==6582==    by 0x13B1842: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==6582==    by 0x13B1A13: phpdbg_stack_execute (phpdbg_cmd.c:733)
==6582==    by 0x138C1E4: phpdbg_interactive (phpdbg_prompt.c:1631)
==6582==    by 0x1377FCC: main (phpdbg.c:2001)
==6582== 
==6582== Conditional jump or move depends on uninitialised value(s)
==6582==    at 0x13BCDE0: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==6582==    by 0x13BD885: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==6582==    by 0x138E22C: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==6582==    by 0x136C4F2: zend_execute (zend_vm_execute.h:63760)
==6582==    by 0x1387DBD: phpdbg_do_run (phpdbg_prompt.c:942)
==6582==    by 0x13B1842: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==6582==    by 0x13B1A13: phpdbg_stack_execute (phpdbg_cmd.c:733)
==6582==    by 0x138C1E4: phpdbg_interactive (phpdbg_prompt.c:1631)
==6582==    by 0x1377FCC: main (phpdbg.c:2001)
==6582== 
==6582== Invalid read of size 4
==6582==    at 0xA304562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA30A952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA1D45C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xAE6FAF: zm_shutdown_pdo_oci (pdo_oci.c:140)
==6582==    by 0x11042C4: module_destructor (zend_API.c:2564)
==6582==    by 0x10EE3AD: module_destructor_zval (zend.c:690)
==6582==    by 0x1127377: _zend_hash_del_el_ex (zend_hash.c:996)
==6582==    by 0x1127377: _zend_hash_del_el (zend_hash.c:1019)
==6582==    by 0x1127377: zend_hash_graceful_reverse_destroy (zend_hash.c:1475)
==6582==    by 0x10FF844: zend_destroy_modules (zend_API.c:2008)
==6582==    by 0x10EEBAB: zend_shutdown (zend.c:905)
==6582==    by 0xFE189D: php_module_shutdown (main.c:2453)
==6582==    by 0x1378CC3: main (phpdbg.c:2162)
==6582==  Address 0x14ee3230 is 0 bytes inside a block of size 43,632 free'd
==6582==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==6582==    by 0xA5FACDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA6C0ED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xB050F6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA30A6E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA30A952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA1D45C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xAE6FAF: zm_shutdown_pdo_oci (pdo_oci.c:140)
==6582==    by 0x11042C4: module_destructor (zend_API.c:2564)
==6582==    by 0x10EE3AD: module_destructor_zval (zend.c:690)
==6582==    by 0x1127377: _zend_hash_del_el_ex (zend_hash.c:996)
==6582==    by 0x1127377: _zend_hash_del_el (zend_hash.c:1019)
==6582==    by 0x1127377: zend_hash_graceful_reverse_destroy (zend_hash.c:1475)
==6582==    by 0x10FF844: zend_destroy_modules (zend_API.c:2008)
==6582==  Block was alloc'd at
==6582==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==6582==    by 0xA5FACEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA6C0EEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xB050EFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA314030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA3122FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xA1D44E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==6582==    by 0xAE6F1D: zm_activate_pdo_oci (pdo_oci.c:118)
==6582==    by 0x1104485: zend_activate_modules (zend_API.c:2600)
==6582==    by 0xFDF0DD: php_request_startup (main.c:1694)
==6582==    by 0x1377186: main (phpdbg.c:1806)
==6582== 

 

Generated at Fri, 25 May 2018 13:51:30 +0000 (25 hours ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.