PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for ext/opcache/tests/issue0115.phpt ('ISSUE #115 (path issue when using phar)')

Script

1: <?php
2: $stub 
'<?php
3: Phar::interceptFileFuncs();
4: require "phar://this/index.php";
5: __HALT_COMPILER(); ?>'
;
6:
$p = new Phar(__DIR__ '/issue0115_1.phar.php'0'this');
7:
$p['index.php'] = '<?php
8:   echo "Hello from Index 1.\n";
9:   require_once "phar://this/hello.php";
10: '
;
11:
$p['hello.php'] = "Hello World 1!\n";
12:
$p->setStub($stub);
13: unset(
$p);
14:
$p = new Phar(__DIR__ '/issue0115_2.phar.php'0'this');
15:
$p['index.php'] = '<?php
16:   echo "Hello from Index 2.\n";
17:   require_once "phar://this/hello.php";
18: '
;
19:
$p['hello.php'] = "Hello World 2!\n";
20:
$p->setStub($stub);
21: unset(
$p);
22:
23: include 
"php_cli_server.inc";
24:
php_cli_server_start('-d opcache.enable=1 -d opcache.enable_cli=1 -d extension=phar.'.PHP_SHLIB_SUFFIX);
25: echo 
file_get_contents('http://' PHP_CLI_SERVER_ADDRESS '/issue0115_1.phar.php');
26: echo 
file_get_contents('http://' PHP_CLI_SERVER_ADDRESS '/issue0115_2.phar.php');
27:
?>
28:

Report

==7371== Jump to the invalid address stated on the next line
==7371==    at 0x4FE: ???
==7371==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==7371== 
==7371== 
==7371== Process terminating with default action of signal 11 (SIGSEGV)
==7371==  Bad permissions for mapped region at address 0x4FE
==7371==    at 0x4FE: ???

 

Generated at Sun, 12 Nov 2017 21:17:35 +0000 (6 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.