/php-src/ext/json/tests/ |
H A D | 007.phpt | 27 string(28) "Maximum stack depth exceeded"
|
H A D | json_validate_002.phpt | 32 string(28) "Maximum stack depth exceeded"
|
/php-src/ext/standard/tests/serialize/ |
H A D | bug69793.phpt | 2 Bug #69793: Remotely triggerable stack exhaustion via recursive method calls
|
/php-src/Zend/asm/ |
H A D | jump_riscv64_sysv_elf_gas.S | 66 # prepare stack for GP + FPU 144 # restore stack from GP + FPU
|
H A D | make_arm_aapcs_macho_gas.S | 48 @ reserve space for context-data on context-stack
|
H A D | make_x86_64_ms_pe_masm.asm | 119 ; save address of context stack limit as 'dealloction stack'
|
H A D | make_ppc32_sysv_elf_gas.S | 66 # reserve space on context-stack, including 16 bytes of linkage 146 .section .note.GNU-stack,"",%progbits
|
H A D | jump_i386_sysv_elf_gas.S | 93 .section .note.GNU-stack,"",%progbits
|
H A D | make_arm_aapcs_elf_gas.S | 51 @ reserve space for context-data on context-stack
|
H A D | make_i386_sysv_elf_gas.S | 113 .section .note.GNU-stack,"",%progbits
|
H A D | jump_ppc64_sysv_macho_gas.S | 74 ; reserve space on stack 144 ; adjust stack
|
/php-src/sapi/phpdbg/ |
H A D | phpdbg_prompt.c | 98 if (stack->type == STACK_PARAM) { in phpdbg_call_register() 101 name = stack->next; in phpdbg_call_register() 255 phpdbg_param_t stack; in phpdbg_line_init() local 257 phpdbg_init_param(&stack, STACK_PARAM); in phpdbg_line_init() 261 if (phpdbg_do_parse(&stack, input) <= 0) { in phpdbg_line_init() 279 phpdbg_stack_free(&stack); in phpdbg_line_init() 1527 phpdbg_param_t stack; in phpdbg_interactive() local 1541 phpdbg_init_param(&stack, STACK_PARAM); in phpdbg_interactive() 1549 phpdbg_stack_free(&stack); in phpdbg_interactive() 1581 phpdbg_stack_free(&stack); in phpdbg_interactive() [all …]
|
H A D | config.w32 | 19 ADD_FLAG("LDFLAGS_PHPDBG", "/stack:8388608");
|
H A D | phpdbg_parser.y | 188 int phpdbg_do_parse(phpdbg_param_t *stack, char *input) { in phpdbg_do_parse() argument 198 phpdbg_init_lexer(stack, input); in phpdbg_do_parse()
|
/php-src/Zend/tests/ |
H A D | bug77345_gc_1.phpt | 2 Bug #77345 (Segmentation faults stack overflow in cyclic garbage collector) (Bug #77427)
|
H A D | bug77345_gc_2.phpt | 2 Bug #77345 (Segmentation faults stack overflow in cyclic garbage collector) (Bug #77427)
|
/php-src/sapi/cgi/tests/ |
H A D | apache_request_headers.phpt | 2 apache_request_headers() stack overflow.
|
/php-src/Zend/tests/stack_limit/ |
H A D | stack_limit_012.phpt | 41 Fatal error: Maximum call stack size of %d bytes (zend.max_allowed_stack_size - zend.reserved_stack…
|
H A D | stack_limit_007.phpt | 44 Maximum call stack size of %d bytes (zend.max_allowed_stack_size - zend.reserved_stack_size) reache…
|
H A D | stack_limit_008.phpt | 58 Maximum call stack size of %d bytes (zend.max_allowed_stack_size - zend.reserved_stack_size) reache…
|
/php-src/ext/reflection/tests/ |
H A D | ReflectionFiber_notrace_2.phpt | 2 ReflectionFiber should not segfault when inspecting fibers where the previous stack frame is a nati…
|
/php-src/ext/gd/tests/ |
H A D | github_bug_215.phpt | 2 Github #215 (imagefilltoborder stack overflow when invalid pallete index used)
|
/php-src/Zend/tests/named_params/ |
H A D | defaults.phpt | 23 // NB: We also want to test the stack trace.
|
/php-src/sapi/phpdbg/tests/ |
H A D | exceptions_002.phpt | 29 prompt> [The stack contains nothing !]
|
/php-src/ext/zend_test/ |
H A D | test.c | 558 zend_call_stack stack; in ZEND_FUNCTION() local 562 if (zend_call_stack_get(&stack)) { in ZEND_FUNCTION() 567 str = strpprintf(0, "%p", stack.base); in ZEND_FUNCTION() 570 str = strpprintf(0, "0x%zx", stack.max_size); in ZEND_FUNCTION() 598 zend_call_stack stack; in ZEND_FUNCTION() local 602 if (!zend_call_stack_get(&stack)) { in ZEND_FUNCTION() 608 void *limit = zend_call_stack_limit(stack.base, stack.max_size, 4096); in ZEND_FUNCTION()
|