PHP  
 PHP_HEAD
downloads | QA | documentation | faq | getting help | mailing lists | reporting bugs | php.net sites | links | my php.net 
 

Valgrind Report for sapi/cli/tests/php_cli_server_015.phpt ('Bug #60523 (PHP Errors are not reported in browsers using built-in SAPI)')

Script

1: <?php
2:
include "php_cli_server.inc";
3:
php_cli_server_start('require("syntax_error.php");');
4:
$dir realpath(dirname(__FILE__));
5:
6:
file_put_contents($dir "/syntax_error.php""<?php non_exists_function(); ?>");
7:
8: list(
$host$port) = explode(':'PHP_CLI_SERVER_ADDRESS);
9:
$port intval($port)?:80;
10:
$output '';
11:
12:
$fp fsockopen($host$port$errno$errstr0.5);
13: if (!
$fp) {
14:   die(
"connect failed");
15: }
16:
17: if(
fwrite($fp, <<<HEADER
18:
GET /index.php HTTP/1.1
19: Host: 
{$host}
20:
21:
22:
HEADER
23: )) {
24:     while (!
feof($fp)) {
25:         
$output .= fgets($fp);
26:     }
27: }
28: echo 
$output;
29: @
unlink($dir "/syntax_error.php");
30:
fclose($fp);
31:
?>
32:

Report

==17492== Jump to the invalid address stated on the next line
==17492==    at 0x4FE: ???
==17492==    by 0x1F00000000: ???
==17492==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==17492==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==17492==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==17492==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==17492==    by 0x6: ???
==17492==    by 0x1FFF00075A: ???
==17492==    by 0x1FFF00077E: ???
==17492==    by 0x1FFF000781: ???
==17492==    by 0x1FFF0007A7: ???
==17492==    by 0x1FFF0007AA: ???
==17492==  Address 0x4fe is not stack'd, malloc'd or (recently) free'd
==17492== 
==17492== 
==17492== Process terminating with default action of signal 11 (SIGSEGV)
==17492==  Bad permissions for mapped region at address 0x4FE
==17492==    at 0x4FE: ???
==17492==    by 0x1F00000000: ???
==17492==    by 0x4003A08: dl_main (in /lib64/ld-2.12.so)
==17492==    by 0x401640D: _dl_sysdep_start (in /lib64/ld-2.12.so)
==17492==    by 0x40014D3: _dl_start (in /lib64/ld-2.12.so)
==17492==    by 0x4000B37: ??? (in /lib64/ld-2.12.so)
==17492==    by 0x6: ???
==17492==    by 0x1FFF00075A: ???
==17492==    by 0x1FFF00077E: ???
==17492==    by 0x1FFF000781: ???
==17492==    by 0x1FFF0007A7: ???
==17492==    by 0x1FFF0007AA: ???

 

Generated at Sun, 24 Sep 2017 15:32:56 +0000 (39 hours ago)

Copyright © 2005-2017 The PHP Group
All rights reserved.