PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/bug68291.phpt ('Bug #68291 (404 on urls with '+')')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
file_put_contents(__DIR__ '/bug68291+test.html''Found');
4:
php_cli_server_start(NULLNULL);
5: echo 
file_get_contents('http://' PHP_CLI_SERVER_ADDRESS '/bug68291+test.html');
6:
?>
7:

Report

==7661== Jump to the invalid address stated on the next line
==7661==    at 0x4FE: ???
==7661==    by 0x1E8799F: ??? (in /var/php_gcov/PHP_HEAD/sapi/cli/php)
==7661==    by 0x1FFEFFEF0F: ???
==7661==    by 0xD8FCFC3: ??? (in /lib64/libkrb5.so.3.3)
==7661==    by 0x1FFEFFEF0F: ???
==7661==    by 0x50: ???
==7661==    by 0x4045A8F: ???
==7661==    by 0xEAA6944D: ???
==7661==    by 0x4009EA4: do_lookup_x (in /lib64/ld-2.12.so)
==7661==    by 0x400A269: _dl_lookup_symbol_x (in /lib64/ld-2.12.so)
==7661==    by 0x400BAB3: _dl_relocate_object (in /lib64/ld-2.12.so)
==7661==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==7661==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==7661== 
==7661== 
==7661== Process terminating with default action of signal 11 (SIGSEGV)
==7661==  Bad permissions for mapped region at address 0x4FE
==7661==    at 0x4FE: ???
==7661==    by 0x1E8799F: ??? (in /var/php_gcov/PHP_HEAD/sapi/cli/php)
==7661==    by 0x1FFEFFEF0F: ???
==7661==    by 0xD8FCFC3: ??? (in /lib64/libkrb5.so.3.3)
==7661==    by 0x1FFEFFEF0F: ???
==7661==    by 0x50: ???
==7661==    by 0x4045A8F: ???
==7661==    by 0xEAA6944D: ???
==7661==    by 0x4009EA4: do_lookup_x (in /lib64/ld-2.12.so)
==7661==    by 0x400A269: _dl_lookup_symbol_x (in /lib64/ld-2.12.so)
==7661==    by 0x400BAB3: _dl_relocate_object (in /lib64/ld-2.12.so)
==7661==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)

 

Generated at Sat, 09 Sep 2017 03:10:54 +0000 (13 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.