PHP  
 PHP_7_2
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/watch_004.phpt ('Test detection of inline string manipulations on zval watch')

Script

1: <?php
2:
3: $b 
"a";
4:
$a $b.$b;
5:
$a[1] = "b";
6:

Report

==5704== Conditional jump or move depends on uninitialised value(s)
==5704==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==5704==    by 0x1388103: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==5704==    by 0x138D907: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==5704==    by 0x138E465: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==5704==    by 0x13602ED: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==5704==    by 0x133EBB9: zend_execute (zend_vm_execute.h:63760)
==5704==    by 0x1359E63: phpdbg_do_run (phpdbg_prompt.c:942)
==5704==    by 0x13827D2: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==5704==    by 0x1382991: phpdbg_stack_execute (phpdbg_cmd.c:733)
==5704==    by 0x135E2A0: phpdbg_interactive (phpdbg_prompt.c:1631)
==5704==    by 0x134A28F: main (phpdbg.c:1996)
==5704== 
==5704== Conditional jump or move depends on uninitialised value(s)
==5704==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==5704==    by 0x138813B: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==5704==    by 0x138D907: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==5704==    by 0x138E465: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==5704==    by 0x13602ED: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==5704==    by 0x133EBB9: zend_execute (zend_vm_execute.h:63760)
==5704==    by 0x1359E63: phpdbg_do_run (phpdbg_prompt.c:942)
==5704==    by 0x13827D2: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==5704==    by 0x1382991: phpdbg_stack_execute (phpdbg_cmd.c:733)
==5704==    by 0x135E2A0: phpdbg_interactive (phpdbg_prompt.c:1631)
==5704==    by 0x134A28F: main (phpdbg.c:1996)
==5704== 
==5704== Conditional jump or move depends on uninitialised value(s)
==5704==    at 0x4C2CFF1: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==5704==    by 0x138813B: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==5704==    by 0x138D907: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==5704==    by 0x138E465: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==5704==    by 0x13602ED: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==5704==    by 0x133EBB9: zend_execute (zend_vm_execute.h:63760)
==5704==    by 0x1359E63: phpdbg_do_run (phpdbg_prompt.c:942)
==5704==    by 0x13827D2: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==5704==    by 0x1382991: phpdbg_stack_execute (phpdbg_cmd.c:733)
==5704==    by 0x135E2A0: phpdbg_interactive (phpdbg_prompt.c:1631)
==5704==    by 0x134A28F: main (phpdbg.c:1996)
==5704== 
==5704== Conditional jump or move depends on uninitialised value(s)
==5704==    at 0x138D90A: phpdbg_check_watchpoint (phpdbg_watch.c:1007)
==5704==    by 0x138E465: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==5704==    by 0x13602ED: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==5704==    by 0x133EBB9: zend_execute (zend_vm_execute.h:63760)
==5704==    by 0x1359E63: phpdbg_do_run (phpdbg_prompt.c:942)
==5704==    by 0x13827D2: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==5704==    by 0x1382991: phpdbg_stack_execute (phpdbg_cmd.c:733)
==5704==    by 0x135E2A0: phpdbg_interactive (phpdbg_prompt.c:1631)
==5704==    by 0x134A28F: main (phpdbg.c:1996)
==5704== 
==5704== Conditional jump or move depends on uninitialised value(s)
==5704==    at 0x138D9EF: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==5704==    by 0x138E465: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==5704==    by 0x13602ED: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==5704==    by 0x133EBB9: zend_execute (zend_vm_execute.h:63760)
==5704==    by 0x1359E63: phpdbg_do_run (phpdbg_prompt.c:942)
==5704==    by 0x13827D2: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==5704==    by 0x1382991: phpdbg_stack_execute (phpdbg_cmd.c:733)
==5704==    by 0x135E2A0: phpdbg_interactive (phpdbg_prompt.c:1631)
==5704==    by 0x134A28F: main (phpdbg.c:1996)
==5704== 
==5704== Conditional jump or move depends on uninitialised value(s)
==5704==    at 0x138DA11: phpdbg_check_watchpoint (phpdbg_watch.c:1015)
==5704==    by 0x138E465: phpdbg_print_changed_zvals (phpdbg_watch.c:1107)
==5704==    by 0x13602ED: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==5704==    by 0x133EBB9: zend_execute (zend_vm_execute.h:63760)
==5704==    by 0x1359E63: phpdbg_do_run (phpdbg_prompt.c:942)
==5704==    by 0x13827D2: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==5704==    by 0x1382991: phpdbg_stack_execute (phpdbg_cmd.c:733)
==5704==    by 0x135E2A0: phpdbg_interactive (phpdbg_prompt.c:1631)
==5704==    by 0x134A28F: main (phpdbg.c:1996)
==5704== 
==5704== Invalid read of size 4
==5704==    at 0xA0EA562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA0F0952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0x9FBA5C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xAE7728: zm_shutdown_pdo_oci (pdo_oci.c:140)
==5704==    by 0x10F680E: module_destructor (zend_API.c:2564)
==5704==    by 0x10E0791: module_destructor_zval (zend.c:690)
==5704==    by 0x1119A38: _zend_hash_del_el_ex (zend_hash.c:996)
==5704==    by 0x1119A38: _zend_hash_del_el (zend_hash.c:1019)
==5704==    by 0x1119A38: zend_hash_graceful_reverse_destroy (zend_hash.c:1475)
==5704==    by 0x10F1D33: zend_destroy_modules (zend_API.c:2008)
==5704==    by 0x10E0F80: zend_shutdown (zend.c:905)
==5704==    by 0xFD4831: php_module_shutdown (main.c:2453)
==5704==    by 0x134AECA: main (phpdbg.c:2157)
==5704==  Address 0x14ec9240 is 0 bytes inside a block of size 43,632 free'd
==5704==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==5704==    by 0xA3E0CDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA4A6ED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xAE36F6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA0F06E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA0F0952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0x9FBA5C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xAE7728: zm_shutdown_pdo_oci (pdo_oci.c:140)
==5704==    by 0x10F680E: module_destructor (zend_API.c:2564)
==5704==    by 0x10E0791: module_destructor_zval (zend.c:690)
==5704==    by 0x1119A38: _zend_hash_del_el_ex (zend_hash.c:996)
==5704==    by 0x1119A38: _zend_hash_del_el (zend_hash.c:1019)
==5704==    by 0x1119A38: zend_hash_graceful_reverse_destroy (zend_hash.c:1475)
==5704==    by 0x10F1D33: zend_destroy_modules (zend_API.c:2008)
==5704==  Block was alloc'd at
==5704==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==5704==    by 0xA3E0CEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA4A6EEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xAE36EFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA0FA030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xA0F82FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0x9FBA4E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==5704==    by 0xAE769C: zm_activate_pdo_oci (pdo_oci.c:118)
==5704==    by 0x10F69CB: zend_activate_modules (zend_API.c:2600)
==5704==    by 0xFD2103: php_request_startup (main.c:1694)
==5704==    by 0x1349478: main (phpdbg.c:1806)
==5704== 

 

Generated at Sun, 18 Feb 2018 15:10:37 +0000 (33 hours ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.