Patch valgrind-log-20190306 for PECL Bug #77692
Patch version 2019-03-06 00:44 UTC
Return to Bug #77692 |
Download this patch
Patch Revisions:
Developer: timandes@php.net
==133== Memcheck, a memory error detector
==133== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==133== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==133== Command: /opt/php-master/bin/php -dextension=/root/php-zookeeper/modules/zookeeper.so -dextension=/opt/php-master/lib/php/extensions/debug-non-zts-20180731/mbstring.so test.php app:test
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x90AAFC: zend_string_equal_content (zend_string.h:310)
==133== by 0x90CDA6: zend_hash_find_bucket (zend_hash.c:593)
==133== by 0x911D1A: zend_hash_find (zend_hash.c:2090)
==133== by 0x87475B: cfg_get_entry_ex (php_ini.c:908)
==133== by 0x868AF4: php_get_configuration_directive_for_zend (main.c:1625)
==133== by 0x8F936B: zend_get_configuration_directive (zend.c:1144)
==133== by 0x91FCCC: zend_register_ini_entries (zend_ini.c:258)
==133== by 0x86A1A5: php_module_startup (main.c:2275)
==133== by 0x9CC271: php_cli_startup (php_cli.c:420)
==133== by 0x9CE127: main (php_cli.c:1356)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x933022: zend_string_equal_content (zend_string.h:310)
==133== by 0x93378C: zend_interned_string_ht_lookup (zend_string.c:156)
==133== by 0x9338A4: zend_new_interned_string_permanent (zend_string.c:196)
==133== by 0x91FD39: zend_register_ini_entries (zend_ini.c:261)
==133== by 0x86A1A5: php_module_startup (main.c:2275)
==133== by 0x9CC271: php_cli_startup (php_cli.c:420)
==133== by 0x9CE127: main (php_cli.c:1356)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x90AAFC: zend_string_equal_content (zend_string.h:310)
==133== by 0x90F040: zend_hash_del (zend_hash.c:1234)
==133== by 0x908152: zend_declare_property_ex (zend_API.c:3727)
==133== by 0x908459: zend_declare_property (zend_API.c:3772)
==133== by 0x908555: zend_declare_property_long (zend_API.c:3801)
==133== by 0x626A84: zm_startup_dom (php_dom.c:616)
==133== by 0x901AE3: zend_startup_module_ex (zend_API.c:1878)
==133== by 0x901B45: zend_startup_module_zval (zend_API.c:1893)
==133== by 0x910847: zend_hash_apply (zend_hash.c:1688)
==133== by 0x90214A: zend_startup_modules (zend_API.c:2004)
==133== by 0x86A2A3: php_module_startup (main.c:2333)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x90AAFC: zend_string_equal_content (zend_string.h:310)
==133== by 0x90CDA6: zend_hash_find_bucket (zend_hash.c:593)
==133== by 0x90D128: _zend_hash_add_or_update_i (zend_hash.c:676)
==133== by 0x90D89C: zend_hash_add (zend_hash.c:818)
==133== by 0x874B87: zend_hash_add_mem (zend_hash.h:643)
==133== by 0x877074: sapi_register_post_entry (SAPI.c:956)
==133== by 0x876FD1: sapi_register_post_entries (SAPI.c:938)
==133== by 0x73FCE59: OnUpdate_mbstring_encoding_translation (mbstring.c:1444)
==133== by 0x91FDC8: zend_register_ini_entries (zend_ini.c:267)
==133== by 0x73FD1AF: zm_startup_mbstring (mbstring.c:1577)
==133== by 0x901AE3: zend_startup_module_ex (zend_API.c:1878)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x933022: zend_string_equal_content (zend_string.h:310)
==133== by 0x93378C: zend_interned_string_ht_lookup (zend_string.c:156)
==133== by 0x9339B6: zend_new_interned_string_request (zend_string.c:224)
==133== by 0x8C7C17: zval_make_interned_string (zend_compile.c:473)
==133== by 0x8C7C92: zend_insert_literal (zend_compile.c:485)
==133== by 0x8C7DB2: zend_add_literal (zend_compile.c:505)
==133== by 0x8CBE79: zend_emit_op (zend_compile.c:2110)
==133== by 0x8CE8F0: zend_compile_args (zend_compile.c:3263)
==133== by 0x8CEA45: zend_compile_call_common (zend_compile.c:3307)
==133== by 0x8D10EB: zend_compile_call (zend_compile.c:4036)
==133== by 0x8DDAE7: zend_compile_var (zend_compile.c:8414)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x933022: zend_string_equal_content (zend_string.h:310)
==133== by 0x93378C: zend_interned_string_ht_lookup (zend_string.c:156)
==133== by 0x9339F0: zend_new_interned_string_request (zend_string.c:230)
==133== by 0x8C7C17: zval_make_interned_string (zend_compile.c:473)
==133== by 0x8CCEB5: zend_try_compile_cv (zend_compile.c:2527)
==133== by 0x8CD157: zend_compile_simple_var (zend_compile.c:2599)
==133== by 0x8DDA79: zend_compile_var (zend_compile.c:8402)
==133== by 0x8DD6EA: zend_compile_expr (zend_compile.c:8292)
==133== by 0x8D1163: zend_compile_method_call (zend_compile.c:4054)
==133== by 0x8DDB02: zend_compile_var (zend_compile.c:8417)
==133== by 0x8DD6EA: zend_compile_expr (zend_compile.c:8292)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x8E96F6: zend_string_equal_content (zend_string.h:310)
==133== by 0x8E9735: zend_string_equals (zend_string.h:315)
==133== by 0x8F381E: zend_is_identical (zend_operators.c:2211)
==133== by 0x8F38B6: is_identical_function (zend_operators.c:2225)
==133== by 0x8D9A54: zend_try_ct_eval_binary_op (zend_compile.c:6959)
==133== by 0x8D9F2B: zend_compile_binary_op (zend_compile.c:7083)
==133== by 0x8DD77A: zend_compile_expr (zend_compile.c:8310)
==133== by 0x8D3430: zend_compile_if (zend_compile.c:4885)
==133== by 0x8DD2F4: zend_compile_stmt (zend_compile.c:8216)
==133== by 0x8D4D13: zend_compile_stmt_list (zend_compile.c:5413)
==133== by 0x8DD206: zend_compile_stmt (zend_compile.c:8173)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x8C5E74: zend_string_equal_content (zend_string.h:310)
==133== by 0x8C5EB3: zend_string_equals (zend_string.h:315)
==133== by 0x8D5BF5: zend_compile_closure_uses (zend_compile.c:5745)
==133== by 0x8D6DC2: zend_compile_func_decl (zend_compile.c:6047)
==133== by 0x8DD9AE: zend_compile_expr (zend_compile.c:8388)
==133== by 0x8D21C7: zend_compile_return (zend_compile.c:4450)
==133== by 0x8DD24A: zend_compile_stmt (zend_compile.c:8185)
==133== by 0x8D4D13: zend_compile_stmt_list (zend_compile.c:5413)
==133== by 0x8DD206: zend_compile_stmt (zend_compile.c:8173)
==133== by 0x8D6DCE: zend_compile_func_decl (zend_compile.c:6049)
==133== by 0x8DD33D: zend_compile_stmt (zend_compile.c:8229)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x406F922: ???
==133== by 0x7BB7FE7: ???
==133== by 0x7BB7FE7: ???
==133== by 0x7BB7FE8: ???
==133== by 0x6C0E45F: ???
==133== by 0x7BB7FE7: ???
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x406F922: ???
==133== by 0x7BBA9C7: ???
==133== by 0x7BBA9C7: ???
==133== by 0x7BBA9C8: ???
==133== by 0x6C0E45F: ???
==133== by 0x7BBA9C7: ???
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x406F922: ???
==133== by 0x7BBB5A7: ???
==133== by 0x7BBB5A7: ???
==133== by 0x7BBB5A8: ???
==133== by 0x6C0E45F: ???
==133== by 0x7BBB5A7: ???
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x406F922: ???
==133== by 0x7BBBD17: ???
==133== by 0x7BBBD17: ???
==133== by 0x7BBBD18: ???
==133== by 0x6C0E45F: ???
==133== by 0x7BBBD17: ???
==133==
2019-03-06 00:41:07,445:133(0x895c700):ZOO_ERROR@handle_socket_error_msg@2432: Socket [127.0.0.1:2181] zk retcode=-4, errno=111(Connection refused): server refused to accept the client
==133== Invalid read of size 4
==133== at 0x94A219: zend_gc_delref (zend_types.h:996)
==133== by 0x94A942: zend_objects_store_del (zend_objects_API.c:185)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b78 is 72 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid write of size 4
==133== at 0x94A222: zend_gc_delref (zend_types.h:996)
==133== by 0x94A942: zend_objects_store_del (zend_objects_API.c:185)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b78 is 72 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid read of size 4
==133== at 0x94A228: zend_gc_delref (zend_types.h:996)
==133== by 0x94A942: zend_objects_store_del (zend_objects_API.c:185)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b78 is 72 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid read of size 8
==133== at 0x94A947: zend_objects_store_del (zend_objects_API.c:188)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b90 is 96 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid read of size 4
==133== at 0x94A96C: zend_objects_store_del (zend_objects_API.c:189)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b7c is 76 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid read of size 4
==133== at 0x92ED0C: gc_remove_from_buffer (zend_gc.c:589)
==133== by 0x94A983: zend_objects_store_del (zend_objects_API.c:189)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b7c is 76 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid read of size 4
==133== at 0x92ED1E: gc_remove_from_buffer (zend_gc.c:596)
==133== by 0x94A983: zend_objects_store_del (zend_objects_API.c:189)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b7c is 76 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid write of size 4
==133== at 0x92ED2C: gc_remove_from_buffer (zend_gc.c:596)
==133== by 0x94A983: zend_objects_store_del (zend_objects_API.c:189)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b7c is 76 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Invalid free() / delete / delete[] / realloc()
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x94A9A6: zend_objects_store_del (zend_objects_API.c:190)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133== Address 0x7bc0b30 is 0 bytes inside a block of size 112 free'd
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x8C4B2C: _efree (zend_alloc.c:2508)
==133== by 0x6F46C34: php_zk_destroy (php_zookeeper.c:832)
==133== by 0x6F46C6E: php_zk_free_storage (php_zookeeper.c:841)
==133== by 0x94A936: zend_objects_store_del (zend_objects_API.c:184)
==133== by 0x8F6BF9: zend_object_destroy_wrapper (zend_variables.c:95)
==133== by 0x8F6A6E: rc_dtor_func (zend_variables.c:65)
==133== by 0x9BCAAA: ZEND_UNSET_CV_SPEC_CV_UNUSED_HANDLER (zend_vm_execute.h:47269)
==133== by 0x9CA0E5: execute_ex (zend_vm_execute.h:60362)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== Block was alloc'd at
==133== at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==133== by 0x8C57AD: __zend_malloc (zend_alloc.c:2904)
==133== by 0x8C4A85: _emalloc (zend_alloc.c:2494)
==133== by 0x8C4EDB: _ecalloc (zend_alloc.c:2579)
==133== by 0x6F46D04: php_zk_new (php_zookeeper.c:856)
==133== by 0x900408: object_and_properties_init (zend_API.c:1335)
==133== by 0x900449: object_init_ex (zend_API.c:1343)
==133== by 0x96D5C0: ZEND_NEW_SPEC_CONST_UNUSED_HANDLER (zend_vm_execute.h:8818)
==133== by 0x9C5EEA: execute_ex (zend_vm_execute.h:56256)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x406EED6: ???
==133== by 0x7BC6647: ???
==133== by 0x7BC6647: ???
==133== by 0x7BC66A5: ???
==133== by 0x6C0E45F: ???
==133== by 0x7BC6647: ???
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x95289B: zend_string_equal_content (zend_string.h:310)
==133== by 0x95329D: zend_fast_equal_strings (zend_operators.h:734)
==133== by 0x976B3A: ZEND_IS_NOT_EQUAL_SPEC_TMPVAR_CONST_HANDLER (zend_vm_execute.h:13316)
==133== by 0x9C68DA: execute_ex (zend_vm_execute.h:56892)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x95289B: zend_string_equal_content (zend_string.h:310)
==133== by 0x95329D: zend_fast_equal_strings (zend_operators.h:734)
==133== by 0x976810: ZEND_IS_EQUAL_SPEC_TMPVAR_CONST_HANDLER (zend_vm_execute.h:13258)
==133== by 0x9C68CA: execute_ex (zend_vm_execute.h:56888)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133== by 0x9CE1D4: main (php_cli.c:1389)
==133==
==133== Conditional jump or move depends on uninitialised value(s)
==133== at 0x933D7D: zend_string_equal_val (zend_string.c:403)
==133== by 0x90AAFC: zend_string_equal_content (zend_string.h:310)
==133== by 0x90CDA6: zend_hash_find_bucket (zend_hash.c:593)
==133== by 0x911D72: _zend_hash_find_known_hash (zend_hash.c:2100)
==133== by 0x95291A: zend_hash_find_ex (zend_hash.h:174)
==133== by 0x9580D7: zend_fetch_dimension_address_inner (zend_execute.c:1709)
==133== by 0x977900: ZEND_FETCH_DIM_R_SPEC_TMPVAR_CONST_HANDLER (zend_vm_execute.h:13694)
==133== by 0x9C69BA: execute_ex (zend_vm_execute.h:56948)
==133== by 0x9CA88F: zend_execute (zend_vm_execute.h:60834)
==133== by 0x8FA6D3: zend_execute_scripts (zend.c:1568)
==133== by 0x86AB0B: php_execute_script (main.c:2630)
==133== by 0x9CD268: do_cli (php_cli.c:997)
==133==
In ErrorHandler.php line 48:
Notice: Undefined offset: 3 in /root/ZookeeperSegmentationFault/src/TestCommand.php on line 28
app:test
==133== Invalid free() / delete / delete[] / realloc()
==133== at 0x4C2ACBD: free (vg_replace_malloc.c:530)
==133== by 0x629DB7B: __libc_freeres (in /usr/lib64/libc-2.17.so)
==133== by 0x4A246D9: _vgnU_freeres (vg_preloaded.c:77)
==133== by 0x6167B2A: __run_exit_handlers (exit.c:92)
==133== by 0x6167BB6: exit (exit.c:99)
==133== by 0x9CE25A: main (php_cli.c:1427)
==133== Address 0x64f43c0 is 0 bytes inside data symbol "noai6ai_cached"
==133==
==133==
==133== HEAP SUMMARY:
==133== in use at exit: 3,662 bytes in 33 blocks
==133== total heap usage: 29,855 allocs, 29,824 frees, 7,085,022 bytes allocated
==133==
==133== LEAK SUMMARY:
==133== definitely lost: 640 bytes in 4 blocks
==133== indirectly lost: 1,280 bytes in 5 blocks
==133== possibly lost: 0 bytes in 0 blocks
==133== still reachable: 1,742 bytes in 24 blocks
==133== suppressed: 0 bytes in 0 blocks
==133== Rerun with --leak-check=full to see details of leaked memory
==133==
==133== For counts of detected and suppressed errors, rerun with: -v
==133== Use --track-origins=yes to see where uninitialised values come from
==133== ERROR SUMMARY: 5253 errors from 26 contexts (suppressed: 0 from 0)
|