On Wed, 7 Jul 2021 at 11:21, Viktor Djupsjöbacka
<viktor.djupsjoba...@supermetrics.com> wrote:
>
> Hi!
>
> My name is Viktor Djupsjöbacka and I'm a Lead Developer at Supermetrics.
> In recent months, we've revived an old, unpublished PHP extension
> project for using JSONPath notation in array data lookups.

Hi Viktor,

For entertainment, I checked out the extension and ran the tests with
valgrind i.e. with "php run-tests.php -m -j4". There seem to be a few
invalid reads for a couple of the tests; output is below.

Annoyingly, adding the --enable-debug configure option to PHP makes
the invalid reads "go away". If you're testing standalone scripts,
you'll need to turn off the zend allocator to see the error e.g.
"USE_ZEND_ALLOC=0 valgrind php tests/023.php"

I've certainly reached the limit of 'entertainment' for investigating
that...so good luck tracking it down.

btw the copyright notice might need an update, but other than that it
might be time to apply for the pecl account.

cheers
Dan
Ack


==747== Conditional jump or move depends on uninitialised value(s)
==747==    at 0x407FD54: ???
==747==    by 0xDE0B2C7: ???
==747==    by 0xDE0B2C7: ???
==747==    by 0xDE0B2D2: ???
==747==    by 0xD979BCF: ???
==747==    by 0xDE0B2C7: ???
==747==
==747== Invalid read of size 16
==747==    at 0x407FC8A: ???
==747==    by 0xDE0B467: ???
==747==    by 0xDE0B467: ???
==747==    by 0xDE0B472: ???
==747==    by 0xD979BCF: ???
==747==    by 0xDE0B467: ???
==747==  Address 0xde0b46f is 31 bytes inside a block of size 40 alloc'd
==747==    at 0x4C2BBAF: malloc (vg_replace_malloc.c:299)
==747==    by 0x4B49D8: __zend_malloc (zend_alloc.c:3043)
==747==    by 0x4A0FEF: zend_string_alloc (zend_string.h:141)
==747==    by 0x4A0FEF: zend_string_init (zend_string.h:163)
==747==    by 0x4A0FEF: zend_scan_escape_string (zend_language_scanner.l:921)
==747==    by 0x4A5CE1: lex_scan (zend_language_scanner.l:2538)
==747==    by 0x4BEF45: zendlex (zend_compile.c:1847)
==747==    by 0x49E0F3: zendparse (zend_language_parser.c:4471)
==747==    by 0x4A0DEE: zend_compile (zend_language_scanner.l:599)
==747==    by 0x4A2414: compile_file (zend_language_scanner.l:654)
==747==    by 0x3955E8: phar_compile_file (phar.c:3346)
==747==    by 0x4E180C: zend_execute_scripts (zend.c:1786)
==747==    by 0x47BF2B: php_execute_script (main.c:2523)
==747==    by 0x5C0452: do_cli (php_cli.c:965)

--
PECL development discussion Mailing List (https://pecl.php.net/)
To unsubscribe, visit: https://www.php.net/unsub.php

Reply via email to