Created
April 22, 2015 10:56
-
-
Save tony2001/3f08bfc9b1632ad630eb to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
==10202== Memcheck, a memory error detector | |
==10202== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. | |
==10202== Using Valgrind-3.9.0 and LibVEX; rerun with -h for copyright info | |
==10202== Command: /local/php5/bin/php-cgi -c /local/php5/conf/php.ini --fpm-config /home/emakhrov/php-fpm.conf -F | |
==10202== Parent PID: 10201 | |
==10202== | |
==10202== Warning: set address range perms: large range [0x39fee000, 0x787ee000) (defined) | |
==10227== Invalid read of size 1 | |
==10227== at 0x4C2C3F1: strcmp (mc_replace_strmem.c:730) | |
==10227== by 0x6C8C56A: xdebug_branch_info_mark_reached (xdebug_branch_info.c:347) | |
==10227== by 0x6C8CDA7: xdebug_print_opcode_info (xdebug_code_coverage.c:102) | |
==10227== by 0x6C8D79F: xdebug_common_assign_dim_handler (xdebug_code_coverage.c:296) | |
==10227== by 0x6C8DB6E: xdebug_assign_handler (xdebug_code_coverage.c:352) | |
==10227== by 0x67BE31: ZEND_USER_OPCODE_SPEC_HANDLER (zend_vm_execute.h:1121) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449) | |
==10227== by 0x597AD8: php_execute_script (main.c:2573) | |
==10227== by 0x6B9A10: main (fpm_main.c:2188) | |
==10227== Address 0xe55bae0 is 0 bytes inside a block of size 69 free'd | |
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468) | |
==10227== by 0x6C8CC5E: xdebug_coverage_file_dtor (xdebug_code_coverage.c:59) | |
==10227== by 0x6C9E5C0: hash_element_dtor (xdebug_hash.c:79) | |
==10227== by 0x6C9E2E0: xdebug_llist_remove (xdebug_llist.c:127) | |
==10227== by 0x6C9E420: xdebug_llist_empty (xdebug_llist.c:174) | |
==10227== by 0x6C9E44E: xdebug_llist_destroy (xdebug_llist.c:180) | |
==10227== by 0x6C9EDF4: xdebug_hash_destroy (xdebug_hash.c:278) | |
==10227== by 0x6C878D3: zm_post_zend_deactivate_xdebug (xdebug.c:1036) | |
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461) | |
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716) | |
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470) | |
==10227== by 0x598674: php_request_shutdown (main.c:1879) | |
==10227== by 0x6B9550: main (fpm_main.c:2216) | |
==10227== | |
==10227== Invalid read of size 1 | |
==10227== at 0x4C2C418: strcmp (mc_replace_strmem.c:730) | |
==10227== by 0x6C8C56A: xdebug_branch_info_mark_reached (xdebug_branch_info.c:347) | |
==10227== by 0x6C8CDA7: xdebug_print_opcode_info (xdebug_code_coverage.c:102) | |
==10227== by 0x6C8D79F: xdebug_common_assign_dim_handler (xdebug_code_coverage.c:296) | |
==10227== by 0x6C8DB6E: xdebug_assign_handler (xdebug_code_coverage.c:352) | |
==10227== by 0x67BE31: ZEND_USER_OPCODE_SPEC_HANDLER (zend_vm_execute.h:1121) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449) | |
==10227== by 0x597AD8: php_execute_script (main.c:2573) | |
==10227== by 0x6B9A10: main (fpm_main.c:2188) | |
==10227== Address 0xe55bae1 is 1 bytes inside a block of size 69 free'd | |
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468) | |
==10227== by 0x6C8CC5E: xdebug_coverage_file_dtor (xdebug_code_coverage.c:59) | |
==10227== by 0x6C9E5C0: hash_element_dtor (xdebug_hash.c:79) | |
==10227== by 0x6C9E2E0: xdebug_llist_remove (xdebug_llist.c:127) | |
==10227== by 0x6C9E420: xdebug_llist_empty (xdebug_llist.c:174) | |
==10227== by 0x6C9E44E: xdebug_llist_destroy (xdebug_llist.c:180) | |
==10227== by 0x6C9EDF4: xdebug_hash_destroy (xdebug_hash.c:278) | |
==10227== by 0x6C878D3: zm_post_zend_deactivate_xdebug (xdebug.c:1036) | |
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461) | |
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716) | |
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470) | |
==10227== by 0x598674: php_request_shutdown (main.c:1879) | |
==10227== by 0x6B9550: main (fpm_main.c:2216) | |
==10227== | |
==10227== Invalid read of size 8 | |
==10227== at 0x6C8BE82: xdebug_path_info_get_path_for_level (xdebug_branch_info.c:170) | |
==10227== by 0x6C8F04B: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:780) | |
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449) | |
==10227== by 0x597AD8: php_execute_script (main.c:2573) | |
==10227== by 0x6B9A10: main (fpm_main.c:2188) | |
==10227== Address 0x14ec7938 is 8 bytes inside a block of size 520 free'd | |
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468) | |
==10227== by 0x6C8C185: xdebug_path_info_dtor (xdebug_branch_info.c:265) | |
==10227== by 0x6C87A9E: zm_post_zend_deactivate_xdebug (xdebug.c:1072) | |
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461) | |
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716) | |
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470) | |
==10227== by 0x598674: php_request_shutdown (main.c:1879) | |
==10227== by 0x6B9550: main (fpm_main.c:2216) | |
==10227== | |
==10227== Invalid write of size 8 | |
==10227== at 0x6C8BE4F: xdebug_path_info_add_path_for_level (xdebug_branch_info.c:164) | |
==10227== by 0x6C8EF52: xdebug_code_coverage_start_of_function (xdebug_code_coverage.c:767) | |
==10227== by 0x6C89868: xdebug_execute_ex (xdebug.c:1515) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449) | |
==10227== by 0x597AD8: php_execute_script (main.c:2573) | |
==10227== by 0x6B9A10: main (fpm_main.c:2188) | |
==10227== Address 0x14ec7938 is 8 bytes inside a block of size 520 free'd | |
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468) | |
==10227== by 0x6C8C185: xdebug_path_info_dtor (xdebug_branch_info.c:265) | |
==10227== by 0x6C87A9E: zm_post_zend_deactivate_xdebug (xdebug.c:1072) | |
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461) | |
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716) | |
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470) | |
==10227== by 0x598674: php_request_shutdown (main.c:1879) | |
==10227== by 0x6B9550: main (fpm_main.c:2216) | |
==10227== | |
==10227== Invalid read of size 4 | |
==10227== at 0x6C8C205: xdebug_create_key_for_path (xdebug_branch_info.c:276) | |
==10227== by 0x6C8F076: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:789) | |
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== Address 0x70 is not stack'd, malloc'd or (recently) free'd | |
==10227== | |
==10227== Invalid read of size 8 | |
==10227== at 0xC7FCA71: eaccelerator_crash_handler (eaccelerator.c:286) | |
==10227== by 0x60E891F: ??? (in /lib64/libc-2.11.3.so) | |
==10227== by 0x6C8C204: xdebug_create_key_for_path (xdebug_branch_info.c:276) | |
==10227== by 0x6C8F076: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:789) | |
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== Address 0x0 is not stack'd, malloc'd or (recently) free'd | |
==10227== | |
==10227== | |
==10227== Process terminating with default action of signal 11 (SIGSEGV): dumping core | |
==10227== Access not within mapped region at address 0x0 | |
==10227== at 0xC7FCA71: eaccelerator_crash_handler (eaccelerator.c:286) | |
==10227== by 0x60E891F: ??? (in /lib64/libc-2.11.3.so) | |
==10227== by 0x6C8C204: xdebug_create_key_for_path (xdebug_branch_info.c:276) | |
==10227== by 0x6C8F076: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:789) | |
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363) | |
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544) | |
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536) | |
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584) | |
==10227== If you believe this happened as a result of a stack | |
==10227== overflow in your program's main thread (unlikely but | |
==10227== possible), you can try to increase the size of the | |
==10227== main thread stack using the --main-stacksize= flag. | |
==10227== The main thread stack size used in this run was 8388608. | |
==10227== | |
==10227== HEAP SUMMARY: | |
==10227== in use at exit: 35,802,186 bytes in 488,034 blocks | |
==10227== total heap usage: 2,346,907 allocs, 1,858,873 frees, 177,440,408 bytes allocated | |
==10227== | |
==10227== LEAK SUMMARY: | |
==10227== definitely lost: 1,444 bytes in 45 blocks | |
==10227== indirectly lost: 1,013 bytes in 40 blocks | |
==10227== possibly lost: 0 bytes in 0 blocks | |
==10227== still reachable: 35,799,729 bytes in 487,949 blocks | |
==10227== suppressed: 0 bytes in 0 blocks | |
==10227== Rerun with --leak-check=full to see details of leaked memory | |
==10227== | |
==10227== For counts of detected and suppressed errors, rerun with: -v | |
==10227== ERROR SUMMARY: 19544 errors from 6 contexts (suppressed: 6 from 6) | |
==10227== could not unlink /tmp/vgdb-pipe-from-vgdb-to-10227-by-???-on-??? | |
==10227== could not unlink /tmp/vgdb-pipe-to-vgdb-from-10227-by-???-on-??? | |
==10227== could not unlink /tmp/vgdb-pipe-shared-mem-vgdb-10227-by-???-on-??? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment