PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/phpdbg_get_executable_stream_wrapper.phpt ('Getting executable lines from custom wrappers')

Script

1: <?php
2:
3:
/**
4:  * This example demonstrates how phpdbg_get_executable() behaves differently
5:  * when passed the 'files' option vs without, in the face of some mild abuse
6:  * of stream wrappers.
7:  */
8:
9: /**
10:  * First, we define a stream wrapper that simply maps to a real file on disk.
11:  */
12:
final class StreamWrapper
13:
{
14:     public function 
stream_open(
15:         
string $path,
16:         
string $mode,
17:         
int $options 0,
18:         
string &$openedPath null
19:     
) : bool {
20:         if (
$mode[0] !== 'r') {
21:             return 
false;
22:         }
23:
24:         list(
$scheme$path) = explode('://'$path2);
25:
26:         
$stream = \fopen($path$mode);
27:
28:         if (
$stream === false) {
29:             return 
false;
30:         }
31:
32:         
$this->stream $stream;
33:
34:         
/**
35:          * The $openedPath reference variable is assigned, indicating the
36:          * *actual* path that was opened. This affects the behaviour of
37:          * constants like __FILE__.
38:          */
39:         
$openedPath = \realpath($path);
40:
41:         return 
true;
42:     }
43:
44:     public function 
stream_read(int $count) : string { return \fread($this->stream$count); }
45:     public function 
stream_close() : bool { return \fclose($this->stream); }
46:     public function 
stream_eof() : bool { return \feof($this->stream); }
47:     public function 
stream_stat() { return \fstat($this->stream); }
48:
49:     private 
$stream false;
50: }
51:
52:
stream_wrapper_register('wrapper'StreamWrapper::class);
53:
54:
/**
55:  * Next, we include a PHP file that contains executable lines, via the stream
56:  * wrapper.
57:  */
58:
$filename __DIR__ '/phpdbg_get_executable_stream_wrapper.inc';
59: require 
'wrapper://' $filename;
60:
61:
/**
62:  * If we call phpdbg_get_executable() and pass no options, the realpath of the
63:  * included file is present in the array, but indicates no executable lines.
64:  */
65:
$x phpdbg_get_executable();
66:
67:
// We expect [5 => 0], but got an empty array ...
68:
var_dump($x[$filename]);
69:
70:
?>
71:

Report

==30607== Invalid read of size 1
==30607==    at 0x10DE2B3: zend_string_release (zend_string.h:284)
==30607==    by 0x10DE2B3: destroy_op_array (zend_opcode.c:398)
==30607==    by 0x135911F: php_phpdbg_destroy_file_source (phpdbg.c:131)
==30607==    by 0x113BFA0: zend_hash_destroy (zend_hash.c:1310)
==30607==    by 0x1362404: main (phpdbg.c:2162)
==30607==  Address 0x14ece795 is 5 bytes inside a block of size 40 free'd
==30607==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==30607==    by 0x13A67EF: phpdbg_watch_efree (phpdbg_watch.c:1170)
==30607==    by 0x1099D1D: _efree (zend_alloc.c:2499)
==30607==    by 0x1185029: _str_dtor (zend_string.c:59)
==30607==    by 0x113BFA0: zend_hash_destroy (zend_hash.c:1310)
==30607==    by 0x1187983: zend_interned_strings_deactivate (zend_string.c:284)
==30607==    by 0xFEEBF2: php_request_shutdown (main.c:1786)
==30607==    by 0x1361DFF: main (phpdbg.c:2100)
==30607==  Block was alloc'd at
==30607==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==30607==    by 0x109DA88: __zend_malloc (zend_alloc.c:2884)
==30607==    by 0x10999FA: _emalloc (zend_alloc.c:2484)
==30607==    by 0x105F7F0: zend_string_alloc (zend_string.h:136)
==30607==    by 0x105F7F0: zend_string_init (zend_string.h:172)
==30607==    by 0x105F7F0: lex_scan (zend_language_scanner.l:1867)
==30607==    by 0x10A5CF4: zendlex (zend_compile.c:1730)
==30607==    by 0x104577B: zendparse (zend_language_parser.c:4912)
==30607==    by 0x105165F: zend_compile (zend_language_scanner.l:585)
==30607==    by 0x1051A3B: compile_file (zend_language_scanner.l:635)
==30607==    by 0xBBADE1: phar_compile_file (phar.c:3339)
==30607==    by 0x138B768: phpdbg_compile_file (phpdbg_list.c:274)
==30607==    by 0x138BCAF: phpdbg_init_compile_file (phpdbg_list.c:317)
==30607==    by 0x136F04A: phpdbg_compile (phpdbg_prompt.c:600)
==30607== 
==30607== Invalid read of size 1
==30607==    at 0x10DE2B3: zend_string_release (zend_string.h:284)
==30607==    by 0x10DE2B3: destroy_op_array (zend_opcode.c:398)
==30607==    by 0x1359B83: zm_shutdown_phpdbg (phpdbg.c:268)
==30607==    by 0x111AE2F: module_destructor (zend_API.c:2497)
==30607==    by 0x1105096: module_destructor_zval (zend.c:725)
==30607==    by 0x113EA35: _zend_hash_del_el_ex (zend_hash.c:1074)
==30607==    by 0x113EA35: _zend_hash_del_el (zend_hash.c:1097)
==30607==    by 0x113EA35: zend_hash_graceful_reverse_destroy (zend_hash.c:1551)
==30607==    by 0x1116639: zend_destroy_modules (zend_API.c:1942)
==30607==    by 0x110580C: zend_shutdown (zend.c:951)
==30607==    by 0xFF059B: php_module_shutdown (main.c:2326)
==30607==    by 0x1362479: main (phpdbg.c:2165)
==30607==  Address 0x15899a65 is 5 bytes inside a block of size 40 free'd
==30607==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==30607==    by 0x13A67EF: phpdbg_watch_efree (phpdbg_watch.c:1170)
==30607==    by 0x1099D1D: _efree (zend_alloc.c:2499)
==30607==    by 0x1185029: _str_dtor (zend_string.c:59)
==30607==    by 0x113BFA0: zend_hash_destroy (zend_hash.c:1310)
==30607==    by 0x1187983: zend_interned_strings_deactivate (zend_string.c:284)
==30607==    by 0xFEEBF2: php_request_shutdown (main.c:1786)
==30607==    by 0x1361DFF: main (phpdbg.c:2100)
==30607==  Block was alloc'd at
==30607==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==30607==    by 0x109DA88: __zend_malloc (zend_alloc.c:2884)
==30607==    by 0x10999FA: _emalloc (zend_alloc.c:2484)
==30607==    by 0x105F7F0: zend_string_alloc (zend_string.h:136)
==30607==    by 0x105F7F0: zend_string_init (zend_string.h:172)
==30607==    by 0x105F7F0: lex_scan (zend_language_scanner.l:1867)
==30607==    by 0x10A5CF4: zendlex (zend_compile.c:1730)
==30607==    by 0x104577B: zendparse (zend_language_parser.c:4912)
==30607==    by 0x105165F: zend_compile (zend_language_scanner.l:585)
==30607==    by 0x1051A3B: compile_file (zend_language_scanner.l:635)
==30607==    by 0xBBADE1: phar_compile_file (phar.c:3339)
==30607==    by 0x138B768: phpdbg_compile_file (phpdbg_list.c:274)
==30607==    by 0x138BCAF: phpdbg_init_compile_file (phpdbg_list.c:317)
==30607==    by 0x136F04A: phpdbg_compile (phpdbg_prompt.c:600)
==30607== 
==30607== Invalid read of size 4
==30607==    at 0xA2F2562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA2F8952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA1C25C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xB26590: zm_shutdown_pdo_oci (pdo_oci.c:140)
==30607==    by 0x111AE2F: module_destructor (zend_API.c:2497)
==30607==    by 0x1105096: module_destructor_zval (zend.c:725)
==30607==    by 0x113EA35: _zend_hash_del_el_ex (zend_hash.c:1074)
==30607==    by 0x113EA35: _zend_hash_del_el (zend_hash.c:1097)
==30607==    by 0x113EA35: zend_hash_graceful_reverse_destroy (zend_hash.c:1551)
==30607==    by 0x1116639: zend_destroy_modules (zend_API.c:1942)
==30607==    by 0x110580C: zend_shutdown (zend.c:951)
==30607==    by 0xFF059B: php_module_shutdown (main.c:2326)
==30607==    by 0x1362479: main (phpdbg.c:2165)
==30607==  Address 0x14e78c90 is 0 bytes inside a block of size 43,632 free'd
==30607==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==30607==    by 0xA5E8CDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA6AEED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xB03EF6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA2F86E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA2F8952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA1C25C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xB26590: zm_shutdown_pdo_oci (pdo_oci.c:140)
==30607==    by 0x111AE2F: module_destructor (zend_API.c:2497)
==30607==    by 0x1105096: module_destructor_zval (zend.c:725)
==30607==    by 0x113EA35: _zend_hash_del_el_ex (zend_hash.c:1074)
==30607==    by 0x113EA35: _zend_hash_del_el (zend_hash.c:1097)
==30607==    by 0x113EA35: zend_hash_graceful_reverse_destroy (zend_hash.c:1551)
==30607==    by 0x1116639: zend_destroy_modules (zend_API.c:1942)
==30607==  Block was alloc'd at
==30607==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==30607==    by 0xA5E8CEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA6AEEEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xB03EEFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA302030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA3002FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xA1C24E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30607==    by 0xB26504: zm_activate_pdo_oci (pdo_oci.c:118)
==30607==    by 0x111B00D: zend_activate_modules (zend_API.c:2533)
==30607==    by 0xFEE3E6: php_request_startup (main.c:1664)
==30607==    by 0x1360A6A: main (phpdbg.c:1808)
==30607== 

 

Generated at Mon, 15 Jan 2018 23:48:43 +0000 (6 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.