/src/php-src/sapi/fuzzer/fuzzer-execute-common.h
Line | Count | Source |
1 | | /* |
2 | | +----------------------------------------------------------------------+ |
3 | | | Copyright (c) The PHP Group | |
4 | | +----------------------------------------------------------------------+ |
5 | | | This source file is subject to version 3.01 of the PHP license, | |
6 | | | that is bundled with this package in the file LICENSE, and is | |
7 | | | available through the world-wide-web at the following url: | |
8 | | | https://www.php.net/license/3_01.txt | |
9 | | | If you did not receive a copy of the PHP license and are unable to | |
10 | | | obtain it through the world-wide-web, please send a note to | |
11 | | | license@php.net so we can mail you a copy immediately. | |
12 | | +----------------------------------------------------------------------+ |
13 | | | Authors: Nikita Popov <nikic@php.net> | |
14 | | +----------------------------------------------------------------------+ |
15 | | */ |
16 | | |
17 | | #include <main/php.h> |
18 | | |
19 | | #if defined(__FreeBSD__) |
20 | | # include <sys/sysctl.h> |
21 | | #endif |
22 | | |
23 | | #include "fuzzer.h" |
24 | | #include "fuzzer-sapi.h" |
25 | | #include "zend_exceptions.h" |
26 | | #include "zend_vm.h" |
27 | | |
28 | 205k | #define FILE_NAME "/tmp/fuzzer.php" |
29 | 243k | #define MAX_STEPS 1000 |
30 | 815k | #define MAX_SIZE (8 * 1024) |
31 | 9.63M | #define ZEND_VM_ENTER_BIT 1ULL |
32 | | |
33 | | static uint32_t steps_left; |
34 | | static bool bailed_out = false; |
35 | | |
36 | 13.0k | static zend_always_inline void fuzzer_bailout(void) { |
37 | 13.0k | bailed_out = true; |
38 | 13.0k | zend_bailout(); |
39 | 13.0k | } fuzzer-tracing-jit.c:fuzzer_bailout Line | Count | Source | 36 | 5.64k | static zend_always_inline void fuzzer_bailout(void) { | 37 | 5.64k | bailed_out = true; | 38 | 5.64k | zend_bailout(); | 39 | 5.64k | } |
fuzzer-function-jit.c:fuzzer_bailout Line | Count | Source | 36 | 6.76k | static zend_always_inline void fuzzer_bailout(void) { | 37 | 6.76k | bailed_out = true; | 38 | 6.76k | zend_bailout(); | 39 | 6.76k | } |
fuzzer-execute.c:fuzzer_bailout Line | Count | Source | 36 | 668 | static zend_always_inline void fuzzer_bailout(void) { | 37 | 668 | bailed_out = true; | 38 | 668 | zend_bailout(); | 39 | 668 | } |
|
40 | | |
41 | 10.4M | static zend_always_inline void fuzzer_step(void) { |
42 | 10.4M | if (--steps_left == 0) { |
43 | | /* Reset steps before bailing out, so code running after bailout (e.g. in |
44 | | * destructors) will get another MAX_STEPS, rather than UINT32_MAX steps. */ |
45 | 3.50k | steps_left = MAX_STEPS; |
46 | 3.50k | fuzzer_bailout(); |
47 | 3.50k | } |
48 | 10.4M | } fuzzer-tracing-jit.c:fuzzer_step Line | Count | Source | 41 | 4.57M | static zend_always_inline void fuzzer_step(void) { | 42 | 4.57M | if (--steps_left == 0) { | 43 | | /* Reset steps before bailing out, so code running after bailout (e.g. in | 44 | | * destructors) will get another MAX_STEPS, rather than UINT32_MAX steps. */ | 45 | 1.31k | steps_left = MAX_STEPS; | 46 | 1.31k | fuzzer_bailout(); | 47 | 1.31k | } | 48 | 4.57M | } |
fuzzer-function-jit.c:fuzzer_step Line | Count | Source | 41 | 5.22M | static zend_always_inline void fuzzer_step(void) { | 42 | 5.22M | if (--steps_left == 0) { | 43 | | /* Reset steps before bailing out, so code running after bailout (e.g. in | 44 | | * destructors) will get another MAX_STEPS, rather than UINT32_MAX steps. */ | 45 | 1.75k | steps_left = MAX_STEPS; | 46 | 1.75k | fuzzer_bailout(); | 47 | 1.75k | } | 48 | 5.22M | } |
fuzzer-execute.c:fuzzer_step Line | Count | Source | 41 | 689k | static zend_always_inline void fuzzer_step(void) { | 42 | 689k | if (--steps_left == 0) { | 43 | | /* Reset steps before bailing out, so code running after bailout (e.g. in | 44 | | * destructors) will get another MAX_STEPS, rather than UINT32_MAX steps. */ | 45 | 437 | steps_left = MAX_STEPS; | 46 | 437 | fuzzer_bailout(); | 47 | 437 | } | 48 | 689k | } |
|
49 | | |
50 | | static void (*orig_execute_ex)(zend_execute_data *execute_data); |
51 | | |
52 | 247k | static void fuzzer_execute_ex(zend_execute_data *execute_data) { |
53 | | |
54 | 247k | #ifdef ZEND_CHECK_STACK_LIMIT |
55 | 247k | if (UNEXPECTED(zend_call_stack_overflowed(EG(stack_limit)))) { |
56 | 0 | zend_call_stack_size_error(); |
57 | | /* No opline was executed before exception */ |
58 | 0 | EG(opline_before_exception) = NULL; |
59 | | /* Fall through to handle exception below. */ |
60 | 0 | } |
61 | 247k | #endif /* ZEND_CHECK_STACK_LIMIT */ |
62 | | |
63 | 247k | const zend_op *opline = EX(opline); |
64 | | |
65 | 9.65M | while (1) { |
66 | 9.51M | fuzzer_step(); |
67 | 9.51M | opline = ((zend_vm_opcode_handler_func_t) zend_get_opcode_handler_func(opline))(execute_data, opline); |
68 | 9.51M | if ((uintptr_t) opline & ZEND_VM_ENTER_BIT) { |
69 | 111k | opline = (const zend_op *) ((uintptr_t) opline & ~ZEND_VM_ENTER_BIT); |
70 | 111k | if (opline) { |
71 | 0 | execute_data = EG(current_execute_data); |
72 | 111k | } else { |
73 | 111k | return; |
74 | 111k | } |
75 | 111k | } |
76 | 9.51M | } |
77 | 247k | } fuzzer-tracing-jit.c:fuzzer_execute_ex Line | Count | Source | 52 | 101k | static void fuzzer_execute_ex(zend_execute_data *execute_data) { | 53 | | | 54 | 101k | #ifdef ZEND_CHECK_STACK_LIMIT | 55 | 101k | if (UNEXPECTED(zend_call_stack_overflowed(EG(stack_limit)))) { | 56 | 0 | zend_call_stack_size_error(); | 57 | | /* No opline was executed before exception */ | 58 | 0 | EG(opline_before_exception) = NULL; | 59 | | /* Fall through to handle exception below. */ | 60 | 0 | } | 61 | 101k | #endif /* ZEND_CHECK_STACK_LIMIT */ | 62 | | | 63 | 101k | const zend_op *opline = EX(opline); | 64 | | | 65 | 4.17M | while (1) { | 66 | 4.11M | fuzzer_step(); | 67 | 4.11M | opline = ((zend_vm_opcode_handler_func_t) zend_get_opcode_handler_func(opline))(execute_data, opline); | 68 | 4.11M | if ((uintptr_t) opline & ZEND_VM_ENTER_BIT) { | 69 | 35.9k | opline = (const zend_op *) ((uintptr_t) opline & ~ZEND_VM_ENTER_BIT); | 70 | 35.9k | if (opline) { | 71 | 0 | execute_data = EG(current_execute_data); | 72 | 35.9k | } else { | 73 | 35.9k | return; | 74 | 35.9k | } | 75 | 35.9k | } | 76 | 4.11M | } | 77 | 101k | } |
fuzzer-function-jit.c:fuzzer_execute_ex Line | Count | Source | 52 | 98.0k | static void fuzzer_execute_ex(zend_execute_data *execute_data) { | 53 | | | 54 | 98.0k | #ifdef ZEND_CHECK_STACK_LIMIT | 55 | 98.0k | if (UNEXPECTED(zend_call_stack_overflowed(EG(stack_limit)))) { | 56 | 0 | zend_call_stack_size_error(); | 57 | | /* No opline was executed before exception */ | 58 | 0 | EG(opline_before_exception) = NULL; | 59 | | /* Fall through to handle exception below. */ | 60 | 0 | } | 61 | 98.0k | #endif /* ZEND_CHECK_STACK_LIMIT */ | 62 | | | 63 | 98.0k | const zend_op *opline = EX(opline); | 64 | | | 65 | 4.83M | while (1) { | 66 | 4.77M | fuzzer_step(); | 67 | 4.77M | opline = ((zend_vm_opcode_handler_func_t) zend_get_opcode_handler_func(opline))(execute_data, opline); | 68 | 4.77M | if ((uintptr_t) opline & ZEND_VM_ENTER_BIT) { | 69 | 38.1k | opline = (const zend_op *) ((uintptr_t) opline & ~ZEND_VM_ENTER_BIT); | 70 | 38.1k | if (opline) { | 71 | 0 | execute_data = EG(current_execute_data); | 72 | 38.1k | } else { | 73 | 38.1k | return; | 74 | 38.1k | } | 75 | 38.1k | } | 76 | 4.77M | } | 77 | 98.0k | } |
fuzzer-execute.c:fuzzer_execute_ex Line | Count | Source | 52 | 47.8k | static void fuzzer_execute_ex(zend_execute_data *execute_data) { | 53 | | | 54 | 47.8k | #ifdef ZEND_CHECK_STACK_LIMIT | 55 | 47.8k | if (UNEXPECTED(zend_call_stack_overflowed(EG(stack_limit)))) { | 56 | 0 | zend_call_stack_size_error(); | 57 | | /* No opline was executed before exception */ | 58 | 0 | EG(opline_before_exception) = NULL; | 59 | | /* Fall through to handle exception below. */ | 60 | 0 | } | 61 | 47.8k | #endif /* ZEND_CHECK_STACK_LIMIT */ | 62 | | | 63 | 47.8k | const zend_op *opline = EX(opline); | 64 | | | 65 | 642k | while (1) { | 66 | 632k | fuzzer_step(); | 67 | 632k | opline = ((zend_vm_opcode_handler_func_t) zend_get_opcode_handler_func(opline))(execute_data, opline); | 68 | 632k | if ((uintptr_t) opline & ZEND_VM_ENTER_BIT) { | 69 | 37.4k | opline = (const zend_op *) ((uintptr_t) opline & ~ZEND_VM_ENTER_BIT); | 70 | 37.4k | if (opline) { | 71 | 0 | execute_data = EG(current_execute_data); | 72 | 37.4k | } else { | 73 | 37.4k | return; | 74 | 37.4k | } | 75 | 37.4k | } | 76 | 632k | } | 77 | 47.8k | } |
|
78 | | |
79 | | static zend_op_array *(*orig_compile_string)( |
80 | | zend_string *source_string, const char *filename, zend_compile_position position); |
81 | | |
82 | | static zend_op_array *fuzzer_compile_string( |
83 | 4.51k | zend_string *str, const char *filename, zend_compile_position position) { |
84 | 4.51k | if (ZSTR_LEN(str) > MAX_SIZE) { |
85 | | /* Avoid compiling huge inputs via eval(). */ |
86 | 7 | fuzzer_bailout(); |
87 | 7 | } |
88 | | |
89 | 4.51k | return orig_compile_string(str, filename, position); |
90 | 4.51k | } fuzzer-tracing-jit.c:fuzzer_compile_string Line | Count | Source | 83 | 2.56k | zend_string *str, const char *filename, zend_compile_position position) { | 84 | 2.56k | if (ZSTR_LEN(str) > MAX_SIZE) { | 85 | | /* Avoid compiling huge inputs via eval(). */ | 86 | 2 | fuzzer_bailout(); | 87 | 2 | } | 88 | | | 89 | 2.56k | return orig_compile_string(str, filename, position); | 90 | 2.56k | } |
fuzzer-function-jit.c:fuzzer_compile_string Line | Count | Source | 83 | 1.74k | zend_string *str, const char *filename, zend_compile_position position) { | 84 | 1.74k | if (ZSTR_LEN(str) > MAX_SIZE) { | 85 | | /* Avoid compiling huge inputs via eval(). */ | 86 | 3 | fuzzer_bailout(); | 87 | 3 | } | 88 | | | 89 | 1.74k | return orig_compile_string(str, filename, position); | 90 | 1.74k | } |
fuzzer-execute.c:fuzzer_compile_string Line | Count | Source | 83 | 203 | zend_string *str, const char *filename, zend_compile_position position) { | 84 | 203 | if (ZSTR_LEN(str) > MAX_SIZE) { | 85 | | /* Avoid compiling huge inputs via eval(). */ | 86 | 2 | fuzzer_bailout(); | 87 | 2 | } | 88 | | | 89 | 203 | return orig_compile_string(str, filename, position); | 90 | 203 | } |
|
91 | | |
92 | | static void (*orig_execute_internal)(zend_execute_data *execute_data, zval *return_value); |
93 | | |
94 | 970k | static void fuzzer_execute_internal(zend_execute_data *execute_data, zval *return_value) { |
95 | 970k | fuzzer_step(); |
96 | | |
97 | 970k | uint32_t num_args = ZEND_CALL_NUM_ARGS(execute_data); |
98 | 2.18M | for (uint32_t i = 0; i < num_args; i++) { |
99 | | /* Some internal functions like preg_replace() may be slow on large inputs. |
100 | | * Limit the maximum size of string inputs. */ |
101 | 1.21M | zval *arg = ZEND_CALL_VAR_NUM(execute_data, i); |
102 | 1.21M | if (Z_TYPE_P(arg) == IS_STRING && Z_STRLEN_P(arg) > MAX_SIZE) { |
103 | 9.56k | fuzzer_bailout(); |
104 | 9.56k | } |
105 | 1.21M | } |
106 | | |
107 | 970k | orig_execute_internal(execute_data, return_value); |
108 | 970k | } fuzzer-tracing-jit.c:fuzzer_execute_internal Line | Count | Source | 94 | 464k | static void fuzzer_execute_internal(zend_execute_data *execute_data, zval *return_value) { | 95 | 464k | fuzzer_step(); | 96 | | | 97 | 464k | uint32_t num_args = ZEND_CALL_NUM_ARGS(execute_data); | 98 | 1.06M | for (uint32_t i = 0; i < num_args; i++) { | 99 | | /* Some internal functions like preg_replace() may be slow on large inputs. | 100 | | * Limit the maximum size of string inputs. */ | 101 | 598k | zval *arg = ZEND_CALL_VAR_NUM(execute_data, i); | 102 | 598k | if (Z_TYPE_P(arg) == IS_STRING && Z_STRLEN_P(arg) > MAX_SIZE) { | 103 | 4.32k | fuzzer_bailout(); | 104 | 4.32k | } | 105 | 598k | } | 106 | | | 107 | 464k | orig_execute_internal(execute_data, return_value); | 108 | 464k | } |
fuzzer-function-jit.c:fuzzer_execute_internal Line | Count | Source | 94 | 448k | static void fuzzer_execute_internal(zend_execute_data *execute_data, zval *return_value) { | 95 | 448k | fuzzer_step(); | 96 | | | 97 | 448k | uint32_t num_args = ZEND_CALL_NUM_ARGS(execute_data); | 98 | 1.00M | for (uint32_t i = 0; i < num_args; i++) { | 99 | | /* Some internal functions like preg_replace() may be slow on large inputs. | 100 | | * Limit the maximum size of string inputs. */ | 101 | 554k | zval *arg = ZEND_CALL_VAR_NUM(execute_data, i); | 102 | 554k | if (Z_TYPE_P(arg) == IS_STRING && Z_STRLEN_P(arg) > MAX_SIZE) { | 103 | 5.00k | fuzzer_bailout(); | 104 | 5.00k | } | 105 | 554k | } | 106 | | | 107 | 448k | orig_execute_internal(execute_data, return_value); | 108 | 448k | } |
fuzzer-execute.c:fuzzer_execute_internal Line | Count | Source | 94 | 57.4k | static void fuzzer_execute_internal(zend_execute_data *execute_data, zval *return_value) { | 95 | 57.4k | fuzzer_step(); | 96 | | | 97 | 57.4k | uint32_t num_args = ZEND_CALL_NUM_ARGS(execute_data); | 98 | 115k | for (uint32_t i = 0; i < num_args; i++) { | 99 | | /* Some internal functions like preg_replace() may be slow on large inputs. | 100 | | * Limit the maximum size of string inputs. */ | 101 | 57.6k | zval *arg = ZEND_CALL_VAR_NUM(execute_data, i); | 102 | 57.6k | if (Z_TYPE_P(arg) == IS_STRING && Z_STRLEN_P(arg) > MAX_SIZE) { | 103 | 229 | fuzzer_bailout(); | 104 | 229 | } | 105 | 57.6k | } | 106 | | | 107 | 57.4k | orig_execute_internal(execute_data, return_value); | 108 | 57.4k | } |
|
109 | | |
110 | 6 | static void fuzzer_init_php_for_execute(const char *extra_ini) { |
111 | | /* Compilation will often trigger fatal errors. |
112 | | * Use tracked allocation mode to avoid leaks in that case. */ |
113 | 6 | putenv("USE_TRACKED_ALLOC=1"); |
114 | | |
115 | | /* Just like other SAPIs, ignore SIGPIPEs. */ |
116 | 6 | signal(SIGPIPE, SIG_IGN); |
117 | | |
118 | 6 | fuzzer_init_php(extra_ini); |
119 | | |
120 | 6 | orig_execute_ex = zend_execute_ex; |
121 | 6 | zend_execute_ex = fuzzer_execute_ex; |
122 | 6 | orig_execute_internal = zend_execute_internal ? zend_execute_internal : execute_internal; |
123 | 6 | zend_execute_internal = fuzzer_execute_internal; |
124 | 6 | orig_compile_string = zend_compile_string; |
125 | 6 | zend_compile_string = fuzzer_compile_string; |
126 | 6 | } fuzzer-tracing-jit.c:fuzzer_init_php_for_execute Line | Count | Source | 110 | 2 | static void fuzzer_init_php_for_execute(const char *extra_ini) { | 111 | | /* Compilation will often trigger fatal errors. | 112 | | * Use tracked allocation mode to avoid leaks in that case. */ | 113 | 2 | putenv("USE_TRACKED_ALLOC=1"); | 114 | | | 115 | | /* Just like other SAPIs, ignore SIGPIPEs. */ | 116 | 2 | signal(SIGPIPE, SIG_IGN); | 117 | | | 118 | 2 | fuzzer_init_php(extra_ini); | 119 | | | 120 | 2 | orig_execute_ex = zend_execute_ex; | 121 | 2 | zend_execute_ex = fuzzer_execute_ex; | 122 | 2 | orig_execute_internal = zend_execute_internal ? zend_execute_internal : execute_internal; | 123 | 2 | zend_execute_internal = fuzzer_execute_internal; | 124 | 2 | orig_compile_string = zend_compile_string; | 125 | 2 | zend_compile_string = fuzzer_compile_string; | 126 | 2 | } |
fuzzer-function-jit.c:fuzzer_init_php_for_execute Line | Count | Source | 110 | 2 | static void fuzzer_init_php_for_execute(const char *extra_ini) { | 111 | | /* Compilation will often trigger fatal errors. | 112 | | * Use tracked allocation mode to avoid leaks in that case. */ | 113 | 2 | putenv("USE_TRACKED_ALLOC=1"); | 114 | | | 115 | | /* Just like other SAPIs, ignore SIGPIPEs. */ | 116 | 2 | signal(SIGPIPE, SIG_IGN); | 117 | | | 118 | 2 | fuzzer_init_php(extra_ini); | 119 | | | 120 | 2 | orig_execute_ex = zend_execute_ex; | 121 | 2 | zend_execute_ex = fuzzer_execute_ex; | 122 | 2 | orig_execute_internal = zend_execute_internal ? zend_execute_internal : execute_internal; | 123 | 2 | zend_execute_internal = fuzzer_execute_internal; | 124 | 2 | orig_compile_string = zend_compile_string; | 125 | 2 | zend_compile_string = fuzzer_compile_string; | 126 | 2 | } |
fuzzer-execute.c:fuzzer_init_php_for_execute Line | Count | Source | 110 | 2 | static void fuzzer_init_php_for_execute(const char *extra_ini) { | 111 | | /* Compilation will often trigger fatal errors. | 112 | | * Use tracked allocation mode to avoid leaks in that case. */ | 113 | 2 | putenv("USE_TRACKED_ALLOC=1"); | 114 | | | 115 | | /* Just like other SAPIs, ignore SIGPIPEs. */ | 116 | 2 | signal(SIGPIPE, SIG_IGN); | 117 | | | 118 | 2 | fuzzer_init_php(extra_ini); | 119 | | | 120 | 2 | orig_execute_ex = zend_execute_ex; | 121 | 2 | zend_execute_ex = fuzzer_execute_ex; | 122 | 2 | orig_execute_internal = zend_execute_internal ? zend_execute_internal : execute_internal; | 123 | 2 | zend_execute_internal = fuzzer_execute_internal; | 124 | 2 | orig_compile_string = zend_compile_string; | 125 | 2 | zend_compile_string = fuzzer_compile_string; | 126 | 2 | } |
|
127 | | |
128 | 4 | ZEND_ATTRIBUTE_UNUSED static void create_file(void) { |
129 | | /* For opcache_invalidate() to work, the dummy file name used for fuzzing needs to |
130 | | * actually exist. */ |
131 | 4 | FILE *f = fopen(FILE_NAME, "w"); |
132 | 4 | fclose(f); |
133 | 4 | } fuzzer-tracing-jit.c:create_file Line | Count | Source | 128 | 2 | ZEND_ATTRIBUTE_UNUSED static void create_file(void) { | 129 | | /* For opcache_invalidate() to work, the dummy file name used for fuzzing needs to | 130 | | * actually exist. */ | 131 | 2 | FILE *f = fopen(FILE_NAME, "w"); | 132 | 2 | fclose(f); | 133 | 2 | } |
fuzzer-function-jit.c:create_file Line | Count | Source | 128 | 2 | ZEND_ATTRIBUTE_UNUSED static void create_file(void) { | 129 | | /* For opcache_invalidate() to work, the dummy file name used for fuzzing needs to | 130 | | * actually exist. */ | 131 | 2 | FILE *f = fopen(FILE_NAME, "w"); | 132 | 2 | fclose(f); | 133 | 2 | } |
Unexecuted instantiation: fuzzer-execute.c:create_file |
134 | | |
135 | 55.8k | ZEND_ATTRIBUTE_UNUSED static void opcache_invalidate(void) { |
136 | 55.8k | steps_left = MAX_STEPS; |
137 | 55.8k | zend_object *exception = EG(exception); |
138 | 55.8k | EG(exception) = NULL; |
139 | 55.8k | zval retval, args[2]; |
140 | 55.8k | zend_function *fn = zend_hash_str_find_ptr(CG(function_table), ZEND_STRL("opcache_invalidate")); |
141 | 55.8k | ZEND_ASSERT(fn != NULL); |
142 | | |
143 | 55.8k | ZVAL_STRING(&args[0], FILE_NAME); |
144 | 55.8k | ZVAL_TRUE(&args[1]); |
145 | 55.8k | zend_call_known_function(fn, NULL, NULL, &retval, 2, args, NULL); |
146 | 55.8k | ZEND_ASSERT(Z_TYPE(retval) == IS_TRUE); |
147 | 55.8k | zval_ptr_dtor(&args[0]); |
148 | 55.8k | zval_ptr_dtor(&retval); |
149 | 55.8k | EG(exception) = exception; |
150 | 55.8k | } fuzzer-tracing-jit.c:opcache_invalidate Line | Count | Source | 135 | 31.3k | ZEND_ATTRIBUTE_UNUSED static void opcache_invalidate(void) { | 136 | 31.3k | steps_left = MAX_STEPS; | 137 | 31.3k | zend_object *exception = EG(exception); | 138 | 31.3k | EG(exception) = NULL; | 139 | 31.3k | zval retval, args[2]; | 140 | 31.3k | zend_function *fn = zend_hash_str_find_ptr(CG(function_table), ZEND_STRL("opcache_invalidate")); | 141 | 31.3k | ZEND_ASSERT(fn != NULL); | 142 | | | 143 | 31.3k | ZVAL_STRING(&args[0], FILE_NAME); | 144 | 31.3k | ZVAL_TRUE(&args[1]); | 145 | 31.3k | zend_call_known_function(fn, NULL, NULL, &retval, 2, args, NULL); | 146 | 31.3k | ZEND_ASSERT(Z_TYPE(retval) == IS_TRUE); | 147 | 31.3k | zval_ptr_dtor(&args[0]); | 148 | 31.3k | zval_ptr_dtor(&retval); | 149 | 31.3k | EG(exception) = exception; | 150 | 31.3k | } |
fuzzer-function-jit.c:opcache_invalidate Line | Count | Source | 135 | 24.5k | ZEND_ATTRIBUTE_UNUSED static void opcache_invalidate(void) { | 136 | 24.5k | steps_left = MAX_STEPS; | 137 | 24.5k | zend_object *exception = EG(exception); | 138 | 24.5k | EG(exception) = NULL; | 139 | 24.5k | zval retval, args[2]; | 140 | 24.5k | zend_function *fn = zend_hash_str_find_ptr(CG(function_table), ZEND_STRL("opcache_invalidate")); | 141 | 24.5k | ZEND_ASSERT(fn != NULL); | 142 | | | 143 | 24.5k | ZVAL_STRING(&args[0], FILE_NAME); | 144 | 24.5k | ZVAL_TRUE(&args[1]); | 145 | 24.5k | zend_call_known_function(fn, NULL, NULL, &retval, 2, args, NULL); | 146 | 24.5k | ZEND_ASSERT(Z_TYPE(retval) == IS_TRUE); | 147 | 24.5k | zval_ptr_dtor(&args[0]); | 148 | 24.5k | zval_ptr_dtor(&retval); | 149 | 24.5k | EG(exception) = exception; | 150 | 24.5k | } |
Unexecuted instantiation: fuzzer-execute.c:opcache_invalidate |