Hi Michel,

Thank you for catching this.
I fixed the first problem, and will care about the second one later.
It is related to memory overflow and probably cannot be fixed in memory
manager itself.

Dmitry.

> -----Original Message-----
> From: Michael Wallner [mailto:[EMAIL PROTECTED] 
> Sent: Saturday, November 11, 2006 11:57 PM
> To: internals@lists.php.net; Dmitry Stogov
> Subject: memory manager panic
> 
> 
> Hi,
> 
> There's a problem with the memory manager (HEAD):
> 
> [EMAIL PROTECTED]:~/build/php-unicode-debug$ cli 
> -d"memory_limit=500k" -r 'leak(212930);' [Sat Nov 11 21:39:42 
> 2006]  Script:  '-'
> /home/mike/cvs/php-src/Zend/zend_builtin_functions.c(1181) :  
> Freeing 0xB6E73000 (212930 bytes), script=- zend_mm_heap 
> corrupted Segmentation fault
> 
> [EMAIL PROTECTED]:~/build/php-unicode-debug$ gdb --args 
> sapi/cli/php -d"memory_limit=500k" -r 'leak(212800);' Using 
> host libthread_db library "/lib/tls/i686/cmov/libthread_db.so.1".
> (gdb) r
> Starting program: 
> /home/mike/build/php-unicode-debug/sapi/cli/php 
> -dmemory_limit=500k -r leak\(212800\)\; [Thread debugging 
> using libthread_db enabled] [New Thread -1225652560 (LWP 
> 9328)] [Sat Nov 11 21:40:04 2006]  Script:  '-'
> /home/mike/cvs/php-src/Zend/zend_builtin_functions.c(1181) :  
> Freeing 0xB6EEB0A0 (212800 bytes), script=- zend_mm_heap corrupted
> 
> Program received signal SIGSEGV, Segmentation fault.
> [Switching to Thread -1225652560 (LWP 9328)]
> 0xffffe410 in __kernel_vsyscall ()
> (gdb) bt
> #0  0xffffe410 in __kernel_vsyscall ()
> #1  0xb7035ba6 in kill () from /lib/tls/i686/cmov/libc.so.6
> #2  0x08298639 in zend_mm_panic (message=0x83e9a2b 
> "zend_mm_heap corrupted") at 
> /home/mike/cvs/php-src/Zend/zend_alloc.c:61
> #3  0x08298f14 in zend_mm_find_leaks (segment=0xb6edf008, 
> b=0xb6eeb07c) at /home/mike/cvs/php-src/Zend/zend_alloc.c:673
> #4  0x082990dd in zend_mm_check_leaks (heap=0x841b4b0) at 
> /home/mike/cvs/php-src/Zend/zend_alloc.c:735
> #5  0x08299b2a in zend_mm_shutdown (heap=0x841b4b0, 
> full_shutdown=0, silent=0) at 
> /home/mike/cvs/php-src/Zend/zend_alloc.c:997
> #6  0x0829b940 in shutdown_memory_manager (silent=0, 
> full_shutdown=0, tsrm_ls=0x841a018) at 
> /home/mike/cvs/php-src/Zend/zend_alloc.c:1875
> #7  0x0824a439 in php_request_shutdown (dummy=0x0) at 
> /home/mike/cvs/php-src/main/main.c:1435
> #8  0x08360230 in main (argc=4, argv=0xbfd39c94) at 
> /home/mike/cvs/php-src/sapi/cli/php_cli.c:1270
> 
> [EMAIL PROTECTED]:~/build/php-unicode-debug$ valgrind 
> sapi/cli/php -d"memory_limit=500k" -r 'leak(211800);' 
> ==9345== Memcheck, a memory error detector. ==9345== 
> Copyright (C) 2002-2006, and GNU GPL'd, by Julian Seward et 
> al. ==9345== Using LibVEX rev 1606, a library for dynamic 
> binary translation. ==9345== Copyright (C) 2004-2006, and GNU 
> GPL'd, by OpenWorks LLP. ==9345== Using 
> valgrind-3.2.0-Debian, a dynamic binary instrumentation 
> framework. ==9345== Copyright (C) 2000-2006, and GNU GPL'd, 
> by Julian Seward et al. ==9345== For more details, rerun 
> with: -v ==9345== [Sat Nov 11 21:44:38 2006]  Script:  '-'
> /home/mike/cvs/php-src/Zend/zend_builtin_functions.c(1181) :  
> Freeing 0x052AF490 (211800 bytes), script=- ==9345== Invalid 
> read of size 4
> ==9345==    at 0x8298F01: zend_mm_find_leaks (zend_alloc.c:670)
> ==9345==    by 0x82990DC: zend_mm_check_leaks (zend_alloc.c:735)
> ==9345==    by 0x8299B29: zend_mm_shutdown (zend_alloc.c:997)
> ==9345==    by 0x829B93F: shutdown_memory_manager (zend_alloc.c:1875)
> ==9345==    by 0x824A438: php_request_shutdown (main.c:1435)
> ==9345==    by 0x836022F: main (php_cli.c:1270)
> ==9345==  Address 0x52E302C is 4 bytes after a block of size 
> 262,144 alloc'd
> ==9345==    at 0x4021396: malloc (vg_replace_malloc.c:149)
> ==9345==    by 0x8298843: zend_mm_mem_malloc_alloc (zend_alloc.c:230)
> ==9345==    by 0x829A243: _zend_mm_alloc_int (zend_alloc.c:1208)
> ==9345==    by 0x829B194: _emalloc (zend_alloc.c:1646)
> ==9345==    by 0x8263991: php_output_activate (output.c:116)
> ==9345==    by 0x8249481: php_request_startup (main.c:1195)
> ==9345==    by 0x835F714: main (php_cli.c:1015)
> zend_mm_heap corrupted
> ==9345==
> ==9345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 
> 47 from 1) ==9345== malloc/free: in use at exit: 1,104,886 
> bytes in 14,284 blocks. ==9345== malloc/free: 15,049 allocs, 
> 765 frees, 1,463,471 bytes allocated. ==9345== For counts of 
> detected errors, rerun with: -v ==9345== searching for 
> pointers to 14,284 not-freed blocks. ==9345== checked 
> 1,236,528 bytes. ==9345== ==9345== LEAK SUMMARY:
> ==9345==    definitely lost: 0 bytes in 0 blocks.
> ==9345==      possibly lost: 0 bytes in 0 blocks.
> ==9345==    still reachable: 1,104,886 bytes in 14,284 blocks.
> ==9345==         suppressed: 0 bytes in 0 blocks.
> ==9345== Reachable blocks (those to which a pointer was 
> found) are not shown. ==9345== To see them, rerun with: 
> --show-reachable=yes Segmentation fault
> 
> 
> Bytes to leak may differ as you can see.  The problem doesn't 
> seem to be tied to leaks though, because I can replicate with 
> code that doesn't leak and that generates a different backtrace:
> 
> [EMAIL PROTECTED]:~/build/php-unicode-debug$ gdb --quiet 
> sapi/cli/php Using host libthread_db library 
> "/lib/tls/i686/cmov/libthread_db.so.1".
> (gdb) r -d"memory_limit=500k" -d"output_buffering=1" -r 
> 'while(true) echo "foo";' > /dev/null Starting program: 
> /home/mike/build/php-unicode-debug/sapi/cli/php 
> -d"memory_limit=500k" -d"output_buffering=1" -r 'while(true) 
> echo "foo";' > /dev/null [Thread debugging using libthread_db 
> enabled] [New Thread -1225435472 (LWP 9350)]
> 
> Program received signal SIGSEGV, Segmentation fault.
> [Switching to Thread -1225435472 (LWP 9350)]
> 0x0829a048 in _zend_mm_alloc_int (heap=0x841b4c8, size=10, 
> __zend_filename=0x83d057c 
> "/home/mike/cvs/php-src/main/SAPI.c", __zend_lineno=267, 
> __zend_orig_filename=0x0, __zend_orig_lineno=0)
>     at /home/mike/cvs/php-src/Zend/zend_alloc.c:1139
> 1139                    size_t s = ZEND_MM_FREE_BLOCK_SIZE(p);
> (gdb) bt
> #0  0x0829a048 in _zend_mm_alloc_int (heap=0x841b4c8, 
> size=10, __zend_filename=0x83d057c 
> "/home/mike/cvs/php-src/main/SAPI.c", __zend_lineno=267, 
> __zend_orig_filename=0x0, __zend_orig_lineno=0)
>     at /home/mike/cvs/php-src/Zend/zend_alloc.c:1139
> #1  0x0829b195 in _emalloc (size=10, 
> __zend_filename=0x83d057c 
> "/home/mike/cvs/php-src/main/SAPI.c", __zend_lineno=267, 
> __zend_orig_filename=0x0, __zend_orig_lineno=0)
>     at /home/mike/cvs/php-src/Zend/zend_alloc.c:1646
> #2  0x0829b5ed in _estrdup (s=0x83cf29b "text/html", 
> __zend_filename=0x83d057c 
> "/home/mike/cvs/php-src/main/SAPI.c", __zend_lineno=267, 
> __zend_orig_filename=0x0, __zend_orig_lineno=0)
>     at /home/mike/cvs/php-src/Zend/zend_alloc.c:1754
> #3  0x082545e9 in sapi_get_default_content_type 
> (tsrm_ls=0x841a018) at /home/mike/cvs/php-src/main/SAPI.c:267
> #4  0x08254608 in sapi_get_default_content_type_header 
> (default_header=0xbffdc898, tsrm_ls=0x841a018) at 
> /home/mike/cvs/php-src/main/SAPI.c:275
> #5  0x082560e2 in sapi_send_headers (tsrm_ls=0x841a018) at 
> /home/mike/cvs/php-src/main/SAPI.c:727
> #6  0x081b17f1 in php_header (tsrm_ls=0x841a018) at 
> /home/mike/cvs/php-src/ext/standard/head.c:54
> #7  0x08266638 in php_output_op (op=0,
>     str=0xb6f241fc "foo"..., len=180390, tsrm_ls=0x841a018) 
> at /home/mike/cvs/php-src/main/output.c:1073
> #8  0x08264605 in php_output_write (
>     str=0xb6f241fc "foo"..., len=180390, tsrm_ls=0x841a018) 
> at /home/mike/cvs/php-src/main/output.c:278
> #9  0x08266ff5 in php_output_stack_pop (flags=1, 
> tsrm_ls=0x841a018) at /home/mike/cvs/php-src/main/output.c:1250
> #10 0x08264937 in php_output_end_all (tsrm_ls=0x841a018) at 
> /home/mike/cvs/php-src/main/output.c:358
> #11 0x0824a042 in php_request_shutdown (dummy=0x0) at 
> /home/mike/cvs/php-src/main/main.c:1388
> #12 0x08360230 in main (argc=5, argv=0xbffdcf14) at 
> /home/mike/cvs/php-src/sapi/cli/php_cli.c:1270
> 
> 
> Regards,
> -- 
> Michael
> 

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to