Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 47) Position 1 = 4, Position 2 = 7 Branch analysis from position: 4 2 jumps found. (Code = 47) Position 1 = 8, Position 2 = 23 Branch analysis from position: 8 2 jumps found. (Code = 47) Position 1 = 17, Position 2 = 21 Branch analysis from position: 17 2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 33 Branch analysis from position: 24 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 33 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 21 Branch analysis from position: 23 Branch analysis from position: 7 filename: /in/kpt2P function name: (null) number of ops: 34 compiled vars: !0 = $debugIps line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > ASSIGN !0, <array> 12 1 FETCH_IS ~2 '_SERVER' 2 ISSET_ISEMPTY_DIM_OBJ 0 ~3 ~2, 'HTTP_CLIENT_IP' 3 > JMPNZ_EX ~3 ~3, ->7 13 4 > FETCH_IS ~4 '_SERVER' 5 ISSET_ISEMPTY_DIM_OBJ 0 ~5 ~4, 'HTTP_X_FORWARDED_FOR' 6 BOOL ~3 ~5 7 > > JMPNZ_EX ~3 ~3, ->23 14 8 > INIT_FCALL 'in_array' 9 BEGIN_SILENCE ~6 10 FETCH_R global ~7 '_SERVER' 11 FETCH_DIM_R ~8 ~7, 'REMOTE_ADDR' 12 END_SILENCE ~6 13 SEND_VAL ~8 14 SEND_VAR !0 15 DO_ICALL $9 16 > JMPNZ_EX ~10 $9, ->21 17 > INIT_FCALL 'php_sapi_name' 18 DO_ICALL $11 19 IS_IDENTICAL ~12 $11, 'cli-server' 20 BOOL ~10 ~12 21 > BOOL_NOT ~13 ~10 22 BOOL ~3 ~13 23 > > JMPZ ~3, ->33 16 24 > INIT_FCALL 'header' 25 SEND_VAL 'HTTP%2F1.0+403+Forbidden' 26 DO_ICALL 17 27 INIT_FCALL 'basename' 28 SEND_VAL '%2Fin%2Fkpt2P' 29 DO_ICALL $15 30 CONCAT ~16 'You+are+not+allowed+to+access+this+file.+Check+', $15 31 CONCAT ~17 ~16, '+for+more+information.' 32 > EXIT ~17 18 33 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0