PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/bug68291.phpt ('Bug #68291 (404 on urls with '+')')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
file_put_contents(__DIR__ '/bug68291+test.html''Found');
4:
php_cli_server_start(NULLNULL);
5: echo 
file_get_contents('http://' PHP_CLI_SERVER_ADDRESS '/bug68291+test.html');
6:
?>
7:

Report

==5379== Jump to the invalid address stated on the next line
==5379==    at 0x4FE: ???
==5379==    by 0x40056AF: open_verify (in /lib64/ld-2.12.so)
==5379==    by 0x4005D5A: open_path (in /lib64/ld-2.12.so)
==5379==    by 0x4008973: _dl_map_object (in /lib64/ld-2.12.so)
==5379==    by 0x400C701: openaux (in /lib64/ld-2.12.so)
==5379==    by 0x400E5E8: _dl_catch_error (in /lib64/ld-2.12.so)
==5379==    by 0x400CDE4: _dl_map_object_deps (in /lib64/ld-2.12.so)
==5379==    by 0x40034C7: dl_main (in /lib64/ld-2.12.so)
==5379==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==5379==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==5379==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==5379==    by 0x5: ???
==5379==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==5379== 
==5379== 
==5379== Process terminating with default action of signal 11 (SIGSEGV)
==5379==  Bad permissions for mapped region at address 0x4FE
==5379==    at 0x4FE: ???
==5379==    by 0x40056AF: open_verify (in /lib64/ld-2.12.so)
==5379==    by 0x4005D5A: open_path (in /lib64/ld-2.12.so)
==5379==    by 0x4008973: _dl_map_object (in /lib64/ld-2.12.so)
==5379==    by 0x400C701: openaux (in /lib64/ld-2.12.so)
==5379==    by 0x400E5E8: _dl_catch_error (in /lib64/ld-2.12.so)
==5379==    by 0x400CDE4: _dl_map_object_deps (in /lib64/ld-2.12.so)
==5379==    by 0x40034C7: dl_main (in /lib64/ld-2.12.so)
==5379==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==5379==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==5379==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==5379==    by 0x5: ???

 

Generated at Thu, 19 Jul 2018 09:51:32 +0000 (2 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.