On Wed, 7 Jul 2021 at 11:21, Viktor Djupsjöbacka <viktor.djupsjoba...@supermetrics.com> wrote: > > Hi! > > My name is Viktor Djupsjöbacka and I'm a Lead Developer at Supermetrics. > In recent months, we've revived an old, unpublished PHP extension > project for using JSONPath notation in array data lookups.
Hi Viktor, For entertainment, I checked out the extension and ran the tests with valgrind i.e. with "php run-tests.php -m -j4". There seem to be a few invalid reads for a couple of the tests; output is below. Annoyingly, adding the --enable-debug configure option to PHP makes the invalid reads "go away". If you're testing standalone scripts, you'll need to turn off the zend allocator to see the error e.g. "USE_ZEND_ALLOC=0 valgrind php tests/023.php" I've certainly reached the limit of 'entertainment' for investigating that...so good luck tracking it down. btw the copyright notice might need an update, but other than that it might be time to apply for the pecl account. cheers Dan Ack ==747== Conditional jump or move depends on uninitialised value(s) ==747== at 0x407FD54: ??? ==747== by 0xDE0B2C7: ??? ==747== by 0xDE0B2C7: ??? ==747== by 0xDE0B2D2: ??? ==747== by 0xD979BCF: ??? ==747== by 0xDE0B2C7: ??? ==747== ==747== Invalid read of size 16 ==747== at 0x407FC8A: ??? ==747== by 0xDE0B467: ??? ==747== by 0xDE0B467: ??? ==747== by 0xDE0B472: ??? ==747== by 0xD979BCF: ??? ==747== by 0xDE0B467: ??? ==747== Address 0xde0b46f is 31 bytes inside a block of size 40 alloc'd ==747== at 0x4C2BBAF: malloc (vg_replace_malloc.c:299) ==747== by 0x4B49D8: __zend_malloc (zend_alloc.c:3043) ==747== by 0x4A0FEF: zend_string_alloc (zend_string.h:141) ==747== by 0x4A0FEF: zend_string_init (zend_string.h:163) ==747== by 0x4A0FEF: zend_scan_escape_string (zend_language_scanner.l:921) ==747== by 0x4A5CE1: lex_scan (zend_language_scanner.l:2538) ==747== by 0x4BEF45: zendlex (zend_compile.c:1847) ==747== by 0x49E0F3: zendparse (zend_language_parser.c:4471) ==747== by 0x4A0DEE: zend_compile (zend_language_scanner.l:599) ==747== by 0x4A2414: compile_file (zend_language_scanner.l:654) ==747== by 0x3955E8: phar_compile_file (phar.c:3346) ==747== by 0x4E180C: zend_execute_scripts (zend.c:1786) ==747== by 0x47BF2B: php_execute_script (main.c:2523) ==747== by 0x5C0452: do_cli (php_cli.c:965) -- PECL development discussion Mailing List (https://pecl.php.net/) To unsubscribe, visit: https://www.php.net/unsub.php