PHP  
 PHP_7_1
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/bug66606_1.phpt ('Bug #66606 (Sets HTTP_CONTENT_TYPE but not CONTENT_TYPE) - GET request')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
php_cli_server_start('var_dump($_SERVER["CONTENT_TYPE"], $_SERVER["CONTENT_LENGTH"])');
4: echo 
file_get_contents("http://" PHP_CLI_SERVER_ADDRESS);
5:
?>
6:

Report

==6183== Jump to the invalid address stated on the next line
==6183==    at 0x4FE: ???
==6183==    by 0x1F00000000: ???
==6183==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==6183==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==6183==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==6183==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==6183==    by 0x6: ???
==6183==    by 0x1FFF00077E: ???
==6183==    by 0x1FFF0007A1: ???
==6183==    by 0x1FFF0007A4: ???
==6183==    by 0x1FFF0007C9: ???
==6183==    by 0x1FFF0007CC: ???
==6183==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==6183== 
==6183== 
==6183== Process terminating with default action of signal 11 (SIGSEGV)
==6183==  Bad permissions for mapped region at address 0x4FE
==6183==    at 0x4FE: ???
==6183==    by 0x1F00000000: ???
==6183==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==6183==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==6183==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==6183==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==6183==    by 0x6: ???
==6183==    by 0x1FFF00077E: ???
==6183==    by 0x1FFF0007A1: ???
==6183==    by 0x1FFF0007A4: ???
==6183==    by 0x1FFF0007C9: ???
==6183==    by 0x1FFF0007CC: ???

 

Generated at Fri, 01 Dec 2017 18:56:15 +0000 (13 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.