PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/php_cli_server_010.phpt ('Bug #60180 ($_SERVER["PHP_SELF"] incorrect)')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
php_cli_server_start('var_dump($_SERVER["PHP_SELF"], $_SERVER["SCRIPT_NAME"], $_SERVER["PATH_INFO"], $_SERVER["QUERY_STRING"]);'null);
4:
5: list(
$host$port) = explode(':'PHP_CLI_SERVER_ADDRESS);
6:
$port intval($port)?:80;
7:
8:
$fp fsockopen($host$port$errno$errstr0.5);
9: if (!
$fp) {
10:   die(
"connect failed");
11: }
12:
13: if(
fwrite($fp, <<<HEADER
14:
GET /foo/bar?foo=bar HTTP/1.1
15: Host: 
{$host}
16:
17:
18:
HEADER
19: )) {
20:     while (!
feof($fp)) {
21:         echo 
fgets($fp);
22:     }
23: }
24:
25:
fclose($fp);
26:
27:
$fp fsockopen($host$port$errno$errstr0.5);
28: if (!
$fp) {
29:   die(
"connect failed");
30: }
31:
32:
33: if(
fwrite($fp, <<<HEADER
34:
GET /index.php/foo/bar/?foo=bar HTTP/1.0
35: Host: 
{$host}
36:
37:
38:
HEADER
39: )) {
40:     while (!
feof($fp)) {
41:         echo 
fgets($fp);
42:     }
43: }
44:
45:
fclose($fp);
46:
47:
?>
48:

Report

==17471== Jump to the invalid address stated on the next line
==17471==    at 0x4FE: ???
==17471==    by 0x1F00000000: ???
==17471==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==17471==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==17471==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==17471==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==17471==    by 0x5: ???
==17471==    by 0x1FFF000766: ???
==17471==    by 0x1FFF00078A: ???
==17471==    by 0x1FFF00078D: ???
==17471==    by 0x1FFF0007B3: ???
==17471==    by 0x1FFF0007B6: ???
==17471==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==17471== 
==17471== 
==17471== Process terminating with default action of signal 11 (SIGSEGV)
==17471==  Bad permissions for mapped region at address 0x4FE
==17471==    at 0x4FE: ???
==17471==    by 0x1F00000000: ???
==17471==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==17471==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==17471==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==17471==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==17471==    by 0x5: ???
==17471==    by 0x1FFF000766: ???
==17471==    by 0x1FFF00078A: ???
==17471==    by 0x1FFF00078D: ???
==17471==    by 0x1FFF0007B3: ???
==17471==    by 0x1FFF0007B6: ???

 

Generated at Sun, 24 Sep 2017 15:32:56 +0000 (39 hours ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.