mirror of
https://github.com/php/php-src.git
synced 2024-12-05 07:46:06 +08:00
4130fe437a
While basic support for MSVCRT debugging has been added long ago[1], the leak checking is not usable for the test suite, because we are no longer calling `xmlCleanupParser()` on RSHUTDOWN of ext/libxml[2], and therefore a few bogus leaks are reported whenever ext/libxml is unloaded. We therefore ignore memory leaks for this case. We introduce `ZEND_IGNORE_LEAKS_BEGIN()` and `ZEND_IGNORE_LEAKS_END()` to keep those ignores better readable, and also because these *might* be useful for other leak checkers as well. We also explicitly free the `zend_handlers_table` and the `p5s` to avoid spurious leak reports. [1] <http://git.php.net/?p=php-src.git;a=commit;h=d756e1db2324c1f4ab6f9b52e329959ce6a02bc3> [2] <http://git.php.net/?p=php-src.git;a=commit;h=8742276eb3905eb97a585417000c7b8df85006d4>
144 lines
3.5 KiB
Plaintext
144 lines
3.5 KiB
Plaintext
{%DEFINES%}
|
|
|
|
#if (ZEND_VM_KIND != ZEND_VM_KIND_CALL) && (ZEND_GCC_VERSION >= 4000) && !defined(__clang__)
|
|
# pragma GCC push_options
|
|
# pragma GCC optimize("no-gcse")
|
|
# pragma GCC optimize("no-ivopts")
|
|
#endif
|
|
ZEND_API void {%EXECUTOR_NAME%}_ex(zend_execute_data *ex)
|
|
{
|
|
DCL_OPLINE
|
|
|
|
{%HELPER_VARS%}
|
|
|
|
{%INTERNAL_LABELS%}
|
|
|
|
LOAD_OPLINE();
|
|
ZEND_VM_LOOP_INTERRUPT_CHECK();
|
|
|
|
while (1) {
|
|
{%ZEND_VM_CONTINUE_LABEL%}
|
|
{%ZEND_VM_DISPATCH%} {
|
|
{%INTERNAL_EXECUTOR%}
|
|
}
|
|
|
|
}
|
|
zend_error_noreturn(E_CORE_ERROR, "Arrived at end of main loop which shouldn't happen");
|
|
}
|
|
#if (ZEND_VM_KIND != ZEND_VM_KIND_CALL) && (ZEND_GCC_VERSION >= 4000) && !defined(__clang__)
|
|
# pragma GCC pop_options
|
|
#endif
|
|
|
|
ZEND_API void zend_{%EXECUTOR_NAME%}(zend_op_array *op_array, zval *return_value)
|
|
{
|
|
zend_execute_data *execute_data;
|
|
void *object_or_called_scope;
|
|
uint32_t call_info;
|
|
|
|
if (EG(exception) != NULL) {
|
|
return;
|
|
}
|
|
|
|
object_or_called_scope = zend_get_this_object(EG(current_execute_data));
|
|
if (EXPECTED(!object_or_called_scope)) {
|
|
object_or_called_scope = zend_get_called_scope(EG(current_execute_data));
|
|
call_info = ZEND_CALL_TOP_CODE | ZEND_CALL_HAS_SYMBOL_TABLE;
|
|
} else {
|
|
call_info = ZEND_CALL_TOP_CODE | ZEND_CALL_HAS_SYMBOL_TABLE | ZEND_CALL_HAS_THIS;
|
|
}
|
|
execute_data = zend_vm_stack_push_call_frame(call_info,
|
|
(zend_function*)op_array, 0, object_or_called_scope);
|
|
if (EG(current_execute_data)) {
|
|
execute_data->symbol_table = zend_rebuild_symbol_table();
|
|
} else {
|
|
execute_data->symbol_table = &EG(symbol_table);
|
|
}
|
|
EX(prev_execute_data) = EG(current_execute_data);
|
|
i_init_code_execute_data(execute_data, op_array, return_value);
|
|
zend_{%EXECUTOR_NAME%}_ex(execute_data);
|
|
zend_vm_stack_free_call_frame(execute_data);
|
|
}
|
|
|
|
{%EXTERNAL_EXECUTOR%}
|
|
|
|
void {%INITIALIZER_NAME%}(void)
|
|
{
|
|
{%EXTERNAL_LABELS%}
|
|
VM_TRACE_START();
|
|
}
|
|
|
|
static HashTable *zend_handlers_table = NULL;
|
|
|
|
void zend_vm_dtor(void)
|
|
{
|
|
VM_TRACE_END();
|
|
if (zend_handlers_table) {
|
|
zend_hash_destroy(zend_handlers_table);
|
|
free(zend_handlers_table);
|
|
}
|
|
}
|
|
|
|
static void init_opcode_serialiser(void)
|
|
{
|
|
int i;
|
|
zval tmp;
|
|
|
|
zend_handlers_table = malloc(sizeof(HashTable));
|
|
zend_hash_init_ex(zend_handlers_table, zend_handlers_count, NULL, NULL, 1, 0);
|
|
zend_hash_real_init(zend_handlers_table, 0);
|
|
Z_TYPE_INFO(tmp) = IS_LONG;
|
|
for (i = 0; i < zend_handlers_count; i++) {
|
|
Z_LVAL(tmp) = i;
|
|
zend_hash_index_add(zend_handlers_table, (zend_long)(zend_uintptr_t)zend_opcode_handlers[i], &tmp);
|
|
}
|
|
}
|
|
|
|
ZEND_API void ZEND_FASTCALL zend_serialize_opcode_handler(zend_op *op)
|
|
{
|
|
zval *zv;
|
|
|
|
if (!zend_handlers_table) {
|
|
init_opcode_serialiser();
|
|
}
|
|
zv = zend_hash_index_find(zend_handlers_table, (zend_long)(zend_uintptr_t)op->handler);
|
|
ZEND_ASSERT(zv != NULL);
|
|
op->handler = (const void *)(zend_uintptr_t)Z_LVAL_P(zv);
|
|
}
|
|
|
|
ZEND_API void ZEND_FASTCALL zend_deserialize_opcode_handler(zend_op *op)
|
|
{
|
|
op->handler = zend_opcode_handlers[(zend_uintptr_t)op->handler];
|
|
}
|
|
|
|
ZEND_API const void* ZEND_FASTCALL zend_get_opcode_handler_func(const zend_op *op)
|
|
{
|
|
#if ZEND_VM_KIND == ZEND_VM_KIND_CALL
|
|
return op->handler;
|
|
#elif ZEND_VM_KIND == ZEND_VM_KIND_HYBRID
|
|
zval *zv;
|
|
|
|
if (!zend_handlers_table) {
|
|
init_opcode_serialiser();
|
|
}
|
|
zv = zend_hash_index_find(zend_handlers_table, (zend_long)(zend_uintptr_t)op->handler);
|
|
ZEND_ASSERT(zv != NULL);
|
|
return zend_opcode_handler_funcs[Z_LVAL_P(zv)];
|
|
#else
|
|
return NULL;
|
|
#endif
|
|
}
|
|
|
|
ZEND_API const zend_op *zend_get_halt_op(void)
|
|
{
|
|
#if ZEND_VM_KIND == ZEND_VM_KIND_HYBRID
|
|
return &hybrid_halt_op;
|
|
#else
|
|
return NULL;
|
|
#endif
|
|
}
|
|
|
|
ZEND_API int zend_vm_kind(void)
|
|
{
|
|
return ZEND_VM_KIND;
|
|
}
|