Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 21 Branch analysis from position: 21 1 jumps found. (Code = 62) Position 1 = -2 Found catch point at position: 7 Branch analysis from position: 7 2 jumps found. (Code = 107) Position 1 = 8, Position 2 = -2 Branch analysis from position: 8 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/IHPI5 function name: (null) number of ops: 22 compiled vars: !0 = $e line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 34 0 E > INIT_FCALL 'foo' 1 NEW $1 'SimpleXMLElement' 2 SEND_VAL_EX '%3Ctest+%2F%3E' 3 DO_FCALL 0 4 SEND_VAR $1 5 DO_FCALL 0 6 > JMP ->21 36 7 E > > CATCH last 'Exception' 37 8 > INIT_METHOD_CALL !0, 'enhancedGetTraceAsString' 9 DO_FCALL 0 $4 10 ECHO $4 38 11 ECHO '%0A+--+%0A' 39 12 INIT_FCALL 'unserialize' 13 INIT_FCALL 'serialize' 14 SEND_VAR !0 15 DO_ICALL $5 16 SEND_VAR $5 17 DO_ICALL $6 18 INIT_METHOD_CALL $6, 'enhancedGetTraceAsString' 19 DO_FCALL 0 $7 20 ECHO $7 40 21 > > RETURN 1 Function foo: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 108) Position 1 = -2 filename: /in/IHPI5 function name: foo number of ops: 5 compiled vars: !0 = $x line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 29 0 E > RECV !0 30 1 NEW $1 'Serializable_Exception' 2 DO_FCALL 0 3 > THROW 0 $1 31 4* > RETURN null End of function foo Class Serializable_Exception: Function __sleep: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 3, Position 2 = 7 Branch analysis from position: 3 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 7 filename: /in/IHPI5 function name: __sleep number of ops: 16 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 11 0 E > FETCH_OBJ_R ~0 'serialized_backtrace' 1 TYPE_CHECK 2 ~0 2 > JMPZ ~1, ->7 12 3 > INIT_METHOD_CALL 'getTraceAsString' 4 DO_FCALL 0 $3 5 ASSIGN_OBJ 'serialized_backtrace' 6 OP_DATA $3 15 7 > INIT_FCALL 'array_keys' 8 INIT_FCALL 'get_object_vars' 9 FETCH_THIS ~4 10 SEND_VAL ~4 11 DO_ICALL $5 12 SEND_VAR $5 13 DO_ICALL $6 14 > RETURN $6 16 15* > RETURN null End of function __sleep Function enhancedgettraceasstring: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 2, Position 2 = 5 Branch analysis from position: 2 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 5 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/IHPI5 function name: enhancedGetTraceAsString number of ops: 9 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 20 0 E > ISSET_ISEMPTY_PROP_OBJ 'serialized_backtrace' 1 > JMPZ ~0, ->5 21 2 > FETCH_OBJ_R ~1 'serialized_backtrace' 3 > RETURN ~1 20 4* JMP ->8 24 5 > INIT_STATIC_METHOD_CALL 'getTraceAsString' 6 DO_FCALL 0 $2 7 > RETURN $2 26 8* > RETURN null End of function enhancedgettraceasstring End of class Serializable_Exception.
Generated using Vulcan Logic Dumper, using php 8.0.0