PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/phpdbg/tests/watch_005.phpt ('Test proper watch comparisons when having multiple levels of indirection from a zval to its value')

Script

1: <?php
2:
3: $b 
"a";
4:
$a $b.$b;
5:
$c = &$a;
6:
$a[1] = "b";
7:
8: exit;
9:

Report

==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==30672==    by 0x139FF1B: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==30672==    by 0x13A5801: phpdbg_check_watchpoint (phpdbg_watch.c:1008)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x4C2D026: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==30672==    by 0x139FF53: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==30672==    by 0x13A5801: phpdbg_check_watchpoint (phpdbg_watch.c:1008)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x4C2CFF1: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==30672==    by 0x139FF53: phpdbg_check_watch_diff (phpdbg_watch.c:139)
==30672==    by 0x13A5801: phpdbg_check_watchpoint (phpdbg_watch.c:1008)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x13A5804: phpdbg_check_watchpoint (phpdbg_watch.c:1008)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x13A58E9: phpdbg_check_watchpoint (phpdbg_watch.c:1016)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x13A590B: phpdbg_check_watchpoint (phpdbg_watch.c:1016)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x4C2CFF1: __memcmp_sse4_1 (vg_replace_strmem.c:1100)
==30672==    by 0x139FF1B: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==30672==    by 0x13A5801: phpdbg_check_watchpoint (phpdbg_watch.c:1008)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Conditional jump or move depends on uninitialised value(s)
==30672==    at 0x139FF1E: phpdbg_check_watch_diff (phpdbg_watch.c:135)
==30672==    by 0x13A5801: phpdbg_check_watchpoint (phpdbg_watch.c:1008)
==30672==    by 0x13A636B: phpdbg_print_changed_zvals (phpdbg_watch.c:1108)
==30672==    by 0x1377AE7: phpdbg_execute_ex (phpdbg_prompt.c:1864)
==30672==    by 0x135609D: zend_execute (zend_vm_execute.h:61747)
==30672==    by 0x1371566: phpdbg_do_run (phpdbg_prompt.c:942)
==30672==    by 0x139A566: phpdbg_internal_stack_execute (phpdbg_cmd.c:703)
==30672==    by 0x139A725: phpdbg_stack_execute (phpdbg_cmd.c:733)
==30672==    by 0x13759CF: phpdbg_interactive (phpdbg_prompt.c:1631)
==30672==    by 0x136188D: main (phpdbg.c:2003)
==30672== 
==30672== Invalid read of size 4
==30672==    at 0xA2F2562: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA2F8952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA1C25C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xB26590: zm_shutdown_pdo_oci (pdo_oci.c:140)
==30672==    by 0x111AE2F: module_destructor (zend_API.c:2497)
==30672==    by 0x1105096: module_destructor_zval (zend.c:725)
==30672==    by 0x113EA35: _zend_hash_del_el_ex (zend_hash.c:1074)
==30672==    by 0x113EA35: _zend_hash_del_el (zend_hash.c:1097)
==30672==    by 0x113EA35: zend_hash_graceful_reverse_destroy (zend_hash.c:1551)
==30672==    by 0x1116639: zend_destroy_modules (zend_API.c:1942)
==30672==    by 0x110580C: zend_shutdown (zend.c:951)
==30672==    by 0xFF059B: php_module_shutdown (main.c:2326)
==30672==    by 0x1362479: main (phpdbg.c:2165)
==30672==  Address 0x14e78b90 is 0 bytes inside a block of size 43,632 free'd
==30672==    at 0x4C28BD4: free (vg_replace_malloc.c:529)
==30672==    by 0xA5E8CDE: ssMemFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA6AEED9: sktsfFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xB03EF6B: kpummefree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA2F86E6: kpufhndl0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA2F8952: kpufhndl (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA1C25C4: OCIHandleFree (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xB26590: zm_shutdown_pdo_oci (pdo_oci.c:140)
==30672==    by 0x111AE2F: module_destructor (zend_API.c:2497)
==30672==    by 0x1105096: module_destructor_zval (zend.c:725)
==30672==    by 0x113EA35: _zend_hash_del_el_ex (zend_hash.c:1074)
==30672==    by 0x113EA35: _zend_hash_del_el (zend_hash.c:1097)
==30672==    by 0x113EA35: zend_hash_graceful_reverse_destroy (zend_hash.c:1551)
==30672==    by 0x1116639: zend_destroy_modules (zend_API.c:1942)
==30672==  Block was alloc'd at
==30672==    at 0x4C291FA: malloc (vg_replace_malloc.c:298)
==30672==    by 0xA5E8CEC: ssMemMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA6AEEEB: sktsfMalloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xB03EEFD: kpummealloc (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA302030: kpuinit0 (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA3002FC: kpuenvcr (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xA1C24E9: OCIEnvCreate (in /u01/app/oracle/product/11.2.0/xe/lib/libclntsh.so.11.1)
==30672==    by 0xB26504: zm_activate_pdo_oci (pdo_oci.c:118)
==30672==    by 0x111B00D: zend_activate_modules (zend_API.c:2533)
==30672==    by 0xFEE3E6: php_request_startup (main.c:1664)
==30672==    by 0x1360A6A: main (phpdbg.c:1808)
==30672== 

 

Generated at Mon, 15 Jan 2018 23:48:43 +0000 (7 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.