Skip to content

Instantly share code, notes, and snippets.

Created Jun 5, 2013
Embed
What would you like to do?
==8682== Memcheck, a memory error detector
==8682== Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al.
==8682== Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info
==8682== Command: sapi/cli/php /home/arjen/public_html/php/php64896.php
==8682==
--8682-- Valgrind options:
--8682-- -v
--8682-- --tool=memcheck
--8682-- --leak-check=yes
--8682-- --num-callers=20
--8682-- --track-fds=yes
--8682-- Contents of /proc/version:
--8682-- Linux version 3.9.4-1-ARCH (tobias@T-POWA-LX) (gcc version 4.8.0 20130502 (prerelease) (GCC) ) #1 SMP PREEMPT Sat May 25 16:14:55 CEST 2013
--8682-- Arch and hwcaps: AMD64, amd64-sse3-cx16-avx
--8682-- Page sizes: currently 4096, max supported 4096
--8682-- Valgrind library directory: /usr/lib/valgrind
--8682-- Reading syms from /home/arjen/php-5.4.15/sapi/cli/php
--8682-- Reading syms from /usr/lib/ld-2.17.so
--8682-- Reading syms from /usr/lib/valgrind/memcheck-amd64-linux
--8682-- object doesn't have a symbol table
--8682-- object doesn't have a dynamic symbol table
--8682-- Scheduler: using generic scheduler lock implementation.
--8682-- Reading suppressions file: /usr/lib/valgrind/default.supp
==8682== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8682-by-arjen-on-???
==8682== embedded gdbserver: writing to /tmp/vgdb-pipe-to-vgdb-from-8682-by-arjen-on-???
==8682== embedded gdbserver: shared mem /tmp/vgdb-pipe-shared-mem-vgdb-8682-by-arjen-on-???
==8682==
==8682== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8682== don't want to do, unless you know exactly what you're doing,
==8682== or are doing some strange experiment):
==8682== /usr/lib/valgrind/../../bin/vgdb --pid=8682 ...command...
==8682==
==8682== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8682== /path/to/gdb sapi/cli/php
==8682== and then give GDB the following command
==8682== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8682
==8682== --pid is optional if only one valgrind process is running
==8682==
--8682-- REDIR: 0x4017730 (strlen) redirected to 0x3806c651 (???)
--8682-- Reading syms from /usr/lib/valgrind/vgpreload_core-amd64-linux.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so
--8682-- object doesn't have a symbol table
--8682-- REDIR: 0x4017680 (index) redirected to 0x4c2c710 (index)
--8682-- REDIR: 0x4017700 (strcmp) redirected to 0x4c2d720 (strcmp)
--8682-- Reading syms from /usr/lib/libcrypt-2.17.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libresolv-2.17.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/librt-2.17.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libm-2.17.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libdl-2.17.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libnsl-2.17.so
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libxml2.so.2.9.1
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libz.so.1.2.8
--8682-- object doesn't have a symbol table
--8682-- Reading syms from /usr/lib/libc-2.17.so
--8682-- Reading syms from /usr/lib/libpthread-2.17.so
--8682-- Reading syms from /usr/lib/liblzma.so.5.0.4
--8682-- object doesn't have a symbol table
--8682-- REDIR: 0x61a6980 (strcasecmp) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x61a2d30 (strnlen) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x61a8c50 (strncasecmp) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x61a5790 (memset) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x61a5740 (memcpy@GLIBC_2.2.5) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x61a4720 (__GI_strrchr) redirected to 0x4c2c530 (__GI_strrchr)
--8682-- REDIR: 0x619ce70 (malloc) redirected to 0x4c2bfe0 (malloc)
--8682-- REDIR: 0x61ab320 (memcpy@@GLIBC_2.14) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x6251bb0 (__memcpy_ssse3_back) redirected to 0x4c2da50 (memcpy@@GLIBC_2.14)
--8682-- REDIR: 0x61a2c50 (__GI_strlen) redirected to 0x4c2ca90 (__GI_strlen)
--8682-- REDIR: 0x61a2e50 (__GI_strncmp) redirected to 0x4c2cf60 (__GI_strncmp)
--8682-- REDIR: 0x61a57d0 (__GI_memset) redirected to 0x4c2eb50 (memset)
--8682-- REDIR: 0x61a2c00 (strlen) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x626c7f0 (__strlen_sse2_pminub) redirected to 0x4c2ca70 (strlen)
--8682-- REDIR: 0x619d320 (realloc) redirected to 0x4c2c1e0 (realloc)
--8682-- REDIR: 0x61a46e0 (rindex) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x623ece0 (__strrchr_sse42) redirected to 0x4c2c500 (rindex)
--8682-- REDIR: 0x61a11f0 (__GI_strcmp) redirected to 0x4c2d6d0 (__GI_strcmp)
--8682-- REDIR: 0x61a1130 (__GI_strchr) redirected to 0x4c2c610 (__GI_strchr)
--8682-- REDIR: 0x61ac860 (strchrnul) redirected to 0x4c2f0a0 (strchrnul)
--8682-- REDIR: 0x619d290 (free) redirected to 0x4c2acd0 (free)
--8682-- REDIR: 0x61a6820 (__GI_stpcpy) redirected to 0x4c2e8e0 (__GI_stpcpy)
--8682-- REDIR: 0x61a2680 (__GI_strcpy) redirected to 0x4c2cb80 (__GI_strcpy)
--8682-- REDIR: 0x61a5160 (bcmp) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x6267120 (__memcmp_sse4_1) redirected to 0x4c2e770 (bcmp)
--8682-- REDIR: 0x61a10f0 (index) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x623cea0 (__strchr_sse42) redirected to 0x4c2c5d0 (index)
--8682-- REDIR: 0x62442a0 (__strcasecmp_avx) redirected to 0x4c2cfd0 (strcasecmp)
--8682-- REDIR: 0xffffffffff600400 (???) redirected to 0x3806c63d (???)
--8682-- REDIR: 0x61a11b0 (strcmp) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x623cf50 (__strcmp_sse42) redirected to 0x4c2d680 (strcmp)
--8682-- REDIR: 0x6245910 (__strncasecmp_avx) redirected to 0x4c2d0b0 (strncasecmp)
--8682-- REDIR: 0xffffffffff600000 (???) redirected to 0x3806c633 (???)
--8682-- REDIR: 0x61b9d70 (strstr) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x623ee80 (__strstr_sse42) redirected to 0x4c2f4a0 (strstr)
--8682-- REDIR: 0x61a4e10 (memchr) redirected to 0x4c2d7c0 (memchr)
--8682-- REDIR: 0x61a4b40 (strspn) redirected to 0x4a24720 (_vgnU_ifunc_wrapper)
--8682-- REDIR: 0x6244180 (__strspn_sse42) redirected to 0x4c2f600 (strspn)
==8682== Invalid read of size 1
==8682== at 0x654541: _zend_mm_free_int (zend_alloc.c:2100)
==8682== by 0x66A2E1: _zval_ptr_dtor (zend_variables.h:35)
==8682== by 0x685937: zend_hash_destroy (zend_hash.c:560)
==8682== by 0x677AA1: _zval_dtor_func (zend_variables.c:45)
==8682== by 0x6E5A5F: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER (zend_execute.c:937)
==8682== by 0x69E3DB: execute (zend_vm_execute.h:410)
==8682== by 0x66BF80: zend_call_function (zend_execute_API.c:958)
==8682== by 0x68E964: zend_call_method (zend_interfaces.c:97)
==8682== by 0x698134: zend_objects_destroy_object (zend_objects.c:123)
==8682== by 0x69619C: gc_collect_cycles (zend_gc.c:816)
==8682== by 0x688668: zif_gc_collect_cycles (zend_builtin_functions.c:361)
==8682== by 0x71C78F: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:643)
==8682== by 0x69E3DB: execute (zend_vm_execute.h:410)
==8682== by 0x679FDD: zend_execute_scripts (zend.c:1315)
==8682== by 0x61D498: php_execute_script (main.c:2492)
==8682== by 0x71E573: do_cli (php_cli.c:988)
==8682== by 0x425596: main (php_cli.c:1364)
==8682== Address 0x506944fd8 is not stack'd, malloc'd or (recently) free'd
==8682==
==8682==
==8682== Process terminating with default action of signal 11 (SIGSEGV)
==8682== Access not within mapped region at address 0x506944FD8
==8682== at 0x654541: _zend_mm_free_int (zend_alloc.c:2100)
==8682== by 0x66A2E1: _zval_ptr_dtor (zend_variables.h:35)
==8682== by 0x685937: zend_hash_destroy (zend_hash.c:560)
==8682== by 0x677AA1: _zval_dtor_func (zend_variables.c:45)
==8682== by 0x6E5A5F: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER (zend_execute.c:937)
==8682== by 0x69E3DB: execute (zend_vm_execute.h:410)
==8682== by 0x66BF80: zend_call_function (zend_execute_API.c:958)
==8682== by 0x68E964: zend_call_method (zend_interfaces.c:97)
==8682== by 0x698134: zend_objects_destroy_object (zend_objects.c:123)
==8682== by 0x69619C: gc_collect_cycles (zend_gc.c:816)
==8682== by 0x688668: zif_gc_collect_cycles (zend_builtin_functions.c:361)
==8682== by 0x71C78F: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:643)
==8682== by 0x69E3DB: execute (zend_vm_execute.h:410)
==8682== by 0x679FDD: zend_execute_scripts (zend.c:1315)
==8682== by 0x61D498: php_execute_script (main.c:2492)
==8682== by 0x71E573: do_cli (php_cli.c:988)
==8682== by 0x425596: main (php_cli.c:1364)
==8682== If you believe this happened as a result of a stack
==8682== overflow in your program's main thread (unlikely but
==8682== possible), you can try to increase the size of the
==8682== main thread stack using the --main-stacksize= flag.
==8682== The main thread stack size used in this run was 8388608.
==8682==
==8682== FILE DESCRIPTORS: 3 open at exit.
==8682== Open file descriptor 2: /home/arjen/valgrind.txt
==8682== <inherited from parent>
==8682==
==8682== Open file descriptor 1: /dev/pts/2
==8682== <inherited from parent>
==8682==
==8682== Open file descriptor 0: /dev/pts/2
==8682== <inherited from parent>
==8682==
==8682==
==8682== HEAP SUMMARY:
==8682== in use at exit: 2,999,141 bytes in 11,160 blocks
==8682== total heap usage: 11,550 allocs, 390 frees, 3,071,335 bytes allocated
==8682==
==8682== Searching for pointers to 11,160 not-freed blocks
==8682== Checked 1,413,336 bytes
==8682==
==8682== LEAK SUMMARY:
==8682== definitely lost: 0 bytes in 0 blocks
==8682== indirectly lost: 0 bytes in 0 blocks
==8682== possibly lost: 0 bytes in 0 blocks
==8682== still reachable: 2,999,141 bytes in 11,160 blocks
==8682== suppressed: 0 bytes in 0 blocks
==8682== Reachable blocks (those to which a pointer was found) are not shown.
==8682== To see them, rerun with: --leak-check=full --show-reachable=yes
==8682==
==8682== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 2 from 2)
==8682==
==8682== 1 errors in context 1 of 1:
==8682== Invalid read of size 1
==8682== at 0x654541: _zend_mm_free_int (zend_alloc.c:2100)
==8682== by 0x66A2E1: _zval_ptr_dtor (zend_variables.h:35)
==8682== by 0x685937: zend_hash_destroy (zend_hash.c:560)
==8682== by 0x677AA1: _zval_dtor_func (zend_variables.c:45)
==8682== by 0x6E5A5F: ZEND_ASSIGN_SPEC_CV_VAR_HANDLER (zend_execute.c:937)
==8682== by 0x69E3DB: execute (zend_vm_execute.h:410)
==8682== by 0x66BF80: zend_call_function (zend_execute_API.c:958)
==8682== by 0x68E964: zend_call_method (zend_interfaces.c:97)
==8682== by 0x698134: zend_objects_destroy_object (zend_objects.c:123)
==8682== by 0x69619C: gc_collect_cycles (zend_gc.c:816)
==8682== by 0x688668: zif_gc_collect_cycles (zend_builtin_functions.c:361)
==8682== by 0x71C78F: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:643)
==8682== by 0x69E3DB: execute (zend_vm_execute.h:410)
==8682== by 0x679FDD: zend_execute_scripts (zend.c:1315)
==8682== by 0x61D498: php_execute_script (main.c:2492)
==8682== by 0x71E573: do_cli (php_cli.c:988)
==8682== by 0x425596: main (php_cli.c:1364)
==8682== Address 0x506944fd8 is not stack'd, malloc'd or (recently) free'd
==8682==
--8682--
--8682-- used_suppression: 2 dl-hack3-cond-1
==8682==
==8682== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 2 from 2)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment