PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/php_cli_server_002.phpt ('$_SERVER variable')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
php_cli_server_start('var_dump($_SERVER["DOCUMENT_ROOT"], $_SERVER["SERVER_SOFTWARE"], $_SERVER["SERVER_NAME"], $_SERVER["SERVER_PORT"]);');
4:
var_dump(file_get_contents("http://" PHP_CLI_SERVER_ADDRESS));
5:
?>
6:

Report

==17918== Jump to the invalid address stated on the next line
==17918==    at 0x4FE: ???
==17918==    by 0xD8FCF8F: ??? (in /lib64/libkrb5.so.3.3)
==17918==    by 0x400F2DB: _dl_name_match_p (in /lib64/ld-2.12.so)
==17918==    by 0x4009C04: do_lookup_x (in /lib64/ld-2.12.so)
==17918==    by 0x400A269: _dl_lookup_symbol_x (in /lib64/ld-2.12.so)
==17918==    by 0x400BAB3: _dl_relocate_object (in /lib64/ld-2.12.so)
==17918==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==17918==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==17918==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==17918==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==17918==    by 0x6: ???
==17918==    by 0x1FFF00075A: ???
==17918==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==17918== 
==17918== 
==17918== Process terminating with default action of signal 11 (SIGSEGV)
==17918==  Bad permissions for mapped region at address 0x4FE
==17918==    at 0x4FE: ???
==17918==    by 0xD8FCF8F: ??? (in /lib64/libkrb5.so.3.3)
==17918==    by 0x400F2DB: _dl_name_match_p (in /lib64/ld-2.12.so)
==17918==    by 0x4009C04: do_lookup_x (in /lib64/ld-2.12.so)
==17918==    by 0x400A269: _dl_lookup_symbol_x (in /lib64/ld-2.12.so)
==17918==    by 0x400BAB3: _dl_relocate_object (in /lib64/ld-2.12.so)
==17918==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==17918==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==17918==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==17918==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==17918==    by 0x6: ???
==17918==    by 0x1FFF00075A: ???

 

Generated at Sun, 12 Nov 2017 21:17:35 +0000 (6 days ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.