Skip to content

Instantly share code, notes, and snippets.

@tony2001
Created April 22, 2015 10:56
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tony2001/3f08bfc9b1632ad630eb to your computer and use it in GitHub Desktop.
Save tony2001/3f08bfc9b1632ad630eb to your computer and use it in GitHub Desktop.
==10202== Memcheck, a memory error detector
==10202== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==10202== Using Valgrind-3.9.0 and LibVEX; rerun with -h for copyright info
==10202== Command: /local/php5/bin/php-cgi -c /local/php5/conf/php.ini --fpm-config /home/emakhrov/php-fpm.conf -F
==10202== Parent PID: 10201
==10202==
==10202== Warning: set address range perms: large range [0x39fee000, 0x787ee000) (defined)
==10227== Invalid read of size 1
==10227== at 0x4C2C3F1: strcmp (mc_replace_strmem.c:730)
==10227== by 0x6C8C56A: xdebug_branch_info_mark_reached (xdebug_branch_info.c:347)
==10227== by 0x6C8CDA7: xdebug_print_opcode_info (xdebug_code_coverage.c:102)
==10227== by 0x6C8D79F: xdebug_common_assign_dim_handler (xdebug_code_coverage.c:296)
==10227== by 0x6C8DB6E: xdebug_assign_handler (xdebug_code_coverage.c:352)
==10227== by 0x67BE31: ZEND_USER_OPCODE_SPEC_HANDLER (zend_vm_execute.h:1121)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449)
==10227== by 0x597AD8: php_execute_script (main.c:2573)
==10227== by 0x6B9A10: main (fpm_main.c:2188)
==10227== Address 0xe55bae0 is 0 bytes inside a block of size 69 free'd
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468)
==10227== by 0x6C8CC5E: xdebug_coverage_file_dtor (xdebug_code_coverage.c:59)
==10227== by 0x6C9E5C0: hash_element_dtor (xdebug_hash.c:79)
==10227== by 0x6C9E2E0: xdebug_llist_remove (xdebug_llist.c:127)
==10227== by 0x6C9E420: xdebug_llist_empty (xdebug_llist.c:174)
==10227== by 0x6C9E44E: xdebug_llist_destroy (xdebug_llist.c:180)
==10227== by 0x6C9EDF4: xdebug_hash_destroy (xdebug_hash.c:278)
==10227== by 0x6C878D3: zm_post_zend_deactivate_xdebug (xdebug.c:1036)
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461)
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716)
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470)
==10227== by 0x598674: php_request_shutdown (main.c:1879)
==10227== by 0x6B9550: main (fpm_main.c:2216)
==10227==
==10227== Invalid read of size 1
==10227== at 0x4C2C418: strcmp (mc_replace_strmem.c:730)
==10227== by 0x6C8C56A: xdebug_branch_info_mark_reached (xdebug_branch_info.c:347)
==10227== by 0x6C8CDA7: xdebug_print_opcode_info (xdebug_code_coverage.c:102)
==10227== by 0x6C8D79F: xdebug_common_assign_dim_handler (xdebug_code_coverage.c:296)
==10227== by 0x6C8DB6E: xdebug_assign_handler (xdebug_code_coverage.c:352)
==10227== by 0x67BE31: ZEND_USER_OPCODE_SPEC_HANDLER (zend_vm_execute.h:1121)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449)
==10227== by 0x597AD8: php_execute_script (main.c:2573)
==10227== by 0x6B9A10: main (fpm_main.c:2188)
==10227== Address 0xe55bae1 is 1 bytes inside a block of size 69 free'd
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468)
==10227== by 0x6C8CC5E: xdebug_coverage_file_dtor (xdebug_code_coverage.c:59)
==10227== by 0x6C9E5C0: hash_element_dtor (xdebug_hash.c:79)
==10227== by 0x6C9E2E0: xdebug_llist_remove (xdebug_llist.c:127)
==10227== by 0x6C9E420: xdebug_llist_empty (xdebug_llist.c:174)
==10227== by 0x6C9E44E: xdebug_llist_destroy (xdebug_llist.c:180)
==10227== by 0x6C9EDF4: xdebug_hash_destroy (xdebug_hash.c:278)
==10227== by 0x6C878D3: zm_post_zend_deactivate_xdebug (xdebug.c:1036)
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461)
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716)
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470)
==10227== by 0x598674: php_request_shutdown (main.c:1879)
==10227== by 0x6B9550: main (fpm_main.c:2216)
==10227==
==10227== Invalid read of size 8
==10227== at 0x6C8BE82: xdebug_path_info_get_path_for_level (xdebug_branch_info.c:170)
==10227== by 0x6C8F04B: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:780)
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449)
==10227== by 0x597AD8: php_execute_script (main.c:2573)
==10227== by 0x6B9A10: main (fpm_main.c:2188)
==10227== Address 0x14ec7938 is 8 bytes inside a block of size 520 free'd
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468)
==10227== by 0x6C8C185: xdebug_path_info_dtor (xdebug_branch_info.c:265)
==10227== by 0x6C87A9E: zm_post_zend_deactivate_xdebug (xdebug.c:1072)
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461)
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716)
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470)
==10227== by 0x598674: php_request_shutdown (main.c:1879)
==10227== by 0x6B9550: main (fpm_main.c:2216)
==10227==
==10227== Invalid write of size 8
==10227== at 0x6C8BE4F: xdebug_path_info_add_path_for_level (xdebug_branch_info.c:164)
==10227== by 0x6C8EF52: xdebug_code_coverage_start_of_function (xdebug_code_coverage.c:767)
==10227== by 0x6C89868: xdebug_execute_ex (xdebug.c:1515)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x5FC7E1: zend_execute_scripts (zend.c:1449)
==10227== by 0x597AD8: php_execute_script (main.c:2573)
==10227== by 0x6B9A10: main (fpm_main.c:2188)
==10227== Address 0x14ec7938 is 8 bytes inside a block of size 520 free'd
==10227== at 0x4C2970C: free (vg_replace_malloc.c:468)
==10227== by 0x6C8C185: xdebug_path_info_dtor (xdebug_branch_info.c:265)
==10227== by 0x6C87A9E: zm_post_zend_deactivate_xdebug (xdebug.c:1072)
==10227== by 0x5FF0D1: exec_done_cb (zend_API.c:2461)
==10227== by 0x60AE14: zend_hash_apply (zend_hash.c:716)
==10227== by 0x60378D: zend_post_deactivate_modules (zend_API.c:2470)
==10227== by 0x598674: php_request_shutdown (main.c:1879)
==10227== by 0x6B9550: main (fpm_main.c:2216)
==10227==
==10227== Invalid read of size 4
==10227== at 0x6C8C205: xdebug_create_key_for_path (xdebug_branch_info.c:276)
==10227== by 0x6C8F076: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:789)
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== Address 0x70 is not stack'd, malloc'd or (recently) free'd
==10227==
==10227== Invalid read of size 8
==10227== at 0xC7FCA71: eaccelerator_crash_handler (eaccelerator.c:286)
==10227== by 0x60E891F: ??? (in /lib64/libc-2.11.3.so)
==10227== by 0x6C8C204: xdebug_create_key_for_path (xdebug_branch_info.c:276)
==10227== by 0x6C8F076: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:789)
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== Address 0x0 is not stack'd, malloc'd or (recently) free'd
==10227==
==10227==
==10227== Process terminating with default action of signal 11 (SIGSEGV): dumping core
==10227== Access not within mapped region at address 0x0
==10227== at 0xC7FCA71: eaccelerator_crash_handler (eaccelerator.c:286)
==10227== by 0x60E891F: ??? (in /lib64/libc-2.11.3.so)
==10227== by 0x6C8C204: xdebug_create_key_for_path (xdebug_branch_info.c:276)
==10227== by 0x6C8F076: xdebug_code_coverage_end_of_function (xdebug_code_coverage.c:789)
==10227== by 0x6C8999B: xdebug_execute_ex (xdebug.c:1549)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== by 0x67B727: execute_ex (zend_vm_execute.h:363)
==10227== by 0x6C8996B: xdebug_execute_ex (xdebug.c:1544)
==10227== by 0xCA0557E: memtrack_execute_ex (memtrack.c:536)
==10227== by 0x681AD8: zend_do_fcall_common_helper_SPEC (zend_vm_execute.h:584)
==10227== If you believe this happened as a result of a stack
==10227== overflow in your program's main thread (unlikely but
==10227== possible), you can try to increase the size of the
==10227== main thread stack using the --main-stacksize= flag.
==10227== The main thread stack size used in this run was 8388608.
==10227==
==10227== HEAP SUMMARY:
==10227== in use at exit: 35,802,186 bytes in 488,034 blocks
==10227== total heap usage: 2,346,907 allocs, 1,858,873 frees, 177,440,408 bytes allocated
==10227==
==10227== LEAK SUMMARY:
==10227== definitely lost: 1,444 bytes in 45 blocks
==10227== indirectly lost: 1,013 bytes in 40 blocks
==10227== possibly lost: 0 bytes in 0 blocks
==10227== still reachable: 35,799,729 bytes in 487,949 blocks
==10227== suppressed: 0 bytes in 0 blocks
==10227== Rerun with --leak-check=full to see details of leaked memory
==10227==
==10227== For counts of detected and suppressed errors, rerun with: -v
==10227== ERROR SUMMARY: 19544 errors from 6 contexts (suppressed: 6 from 6)
==10227== could not unlink /tmp/vgdb-pipe-from-vgdb-to-10227-by-???-on-???
==10227== could not unlink /tmp/vgdb-pipe-to-vgdb-from-10227-by-???-on-???
==10227== could not unlink /tmp/vgdb-pipe-shared-mem-vgdb-10227-by-???-on-???
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment