PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/bug69953.phpt ('FR #69953 (Support MKCALENDAR request method)')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
php_cli_server_start('echo $_SERVER["REQUEST_METHOD"];');
4:
$context stream_context_create(['http' => ['method' => 'MKCALENDAR']]);
5:
var_dump(file_get_contents("http://" PHP_CLI_SERVER_ADDRESSfalse$context));
6:
?>
7:

Report

==30165== Jump to the invalid address stated on the next line
==30165==    at 0x4FE: ???
==30165==    by 0xC: ???
==30165==    by 0xED3CAD9: ??? (in /usr/lib64/libgnutls.so.26.22.6)
==30165==    by 0x1FFEFFF13F: ???
==30165==    by 0x4010028: _dl_check_map_versions (in /lib64/ld-2.12.so)
==30165==    by 0x1EFFFFFFFF: ???
==30165==    by 0x2E38312E3639362C: ???
==30165==    by 0x38782E366C652E36: ???
==30165==    by 0xEFE0167: ??? (in /usr/lib64/libgnutls.so.26.22.6)
==30165==    by 0xEFE0147: ??? (in /usr/lib64/libgnutls.so.26.22.6)
==30165==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==30165== 
==30165== 
==30165== Process terminating with default action of signal 11 (SIGSEGV)
==30165==  Bad permissions for mapped region at address 0x4FE
==30165==    at 0x4FE: ???
==30165==    by 0xC: ???
==30165==    by 0xED3CAD9: ??? (in /usr/lib64/libgnutls.so.26.22.6)
==30165==    by 0x1FFEFFF13F: ???
==30165==    by 0x4010028: _dl_check_map_versions (in /lib64/ld-2.12.so)
==30165==    by 0x1EFFFFFFFF: ???
==30165==    by 0x2E38312E3639362C: ???
==30165==    by 0x38782E366C652E36: ???
==30165==    by 0xEFE0167: ??? (in /usr/lib64/libgnutls.so.26.22.6)
==30165==    by 0xEFE0147: ??? (in /usr/lib64/libgnutls.so.26.22.6)

 

Generated at Mon, 15 Jan 2018 23:48:43 +0000 (6 days ago)

Copyright © 2005-2018 The PHP Group
All rights reserved.