PHP  
 PHP_7_2
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/bug68291.phpt ('Bug #68291 (404 on urls with '+')')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
file_put_contents(__DIR__ '/bug68291+test.html''Found');
4:
php_cli_server_start(NULLNULL);
5: echo 
file_get_contents('http://' PHP_CLI_SERVER_ADDRESS '/bug68291+test.html');
6:
?>
7:

Report

==5250== Jump to the invalid address stated on the next line
==5250==    at 0x4FE: ???
==5250==    by 0x5: ???
==5250==    by 0xF2002AD: ??? (in /usr/lib64/libssl3.so)
==5250==    by 0x1FFEFFF15F: ???
==5250==    by 0x4010028: _dl_check_map_versions (in /lib64/ld-2.12.so)
==5250==    by 0x1EFFFFFFFF: ???
==5250==    by 0x2E30322E3639362C: ???
==5250==    by 0x38782E366C652E30: ???
==5250==    by 0xF446D7F: ??? (in /usr/lib64/libssl3.so)
==5250==    by 0xF446D5F: ??? (in /usr/lib64/libssl3.so)
==5250==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==5250== 
==5250== 
==5250== Process terminating with default action of signal 11 (SIGSEGV)
==5250==  Bad permissions for mapped region at address 0x4FE
==5250==    at 0x4FE: ???
==5250==    by 0x5: ???
==5250==    by 0xF2002AD: ??? (in /usr/lib64/libssl3.so)
==5250==    by 0x1FFEFFF15F: ???
==5250==    by 0x4010028: _dl_check_map_versions (in /lib64/ld-2.12.so)
==5250==    by 0x1EFFFFFFFF: ???
==5250==    by 0x2E30322E3639362C: ???
==5250==    by 0x38782E366C652E30: ???
==5250==    by 0xF446D7F: ??? (in /usr/lib64/libssl3.so)
==5250==    by 0xF446D5F: ??? (in /usr/lib64/libssl3.so)

 

Generated at Sun, 18 Feb 2018 15:10:37 +0000 (6 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.