我最初发布于
https://stackoverflow.com/questions/9665189/php-on-command-line-displays-out-of-memory,但建议在此发布.
原文链接:/php/139642.html当脚本中的内存不足时,这不是正常的致命错误,因为它没有提供文件名,行号或使用的内存量.每当我尝试在命令行上运行PHP时,它只是说“内存不足”,或者当你传递一个脚本或者只是自己运行PHP时.即使尝试运行不存在的脚本也会产生相同的消息.
换句话说,我明白了:
dan@server [~]# PHP Out of memory dan@server [~]# PHP test.PHP Out of memory dan@server [~]# PHP doesntexist.PHP Out of memory dan@server [~]# PHP -v Out of memory
但是通过Apache的PHP工作非常好.我只是在CLI上得到了这个错误.
有问题的机器运行的是CentOS版本5.7(最终版),它是64位和PHP 5.3.10.它是一个专用的服务器.
我尝试过运行ulimit -a,如同建议的那样,这是输出:
core file size (blocks,-c) 200000 data seg size (kbytes,-d) 200000 scheduling priority (-e) 0 file size (blocks,-f) unlimited pending signals (-i) 37888 max locked memory (kbytes,-l) 32 max memory size (kbytes,-m) 200000 open files (-n) 100 pipe size (512 bytes,-p) 8 POSIX message queues (bytes,-q) 819200 real-time priority (-r) 0 stack size (kbytes,-s) 8192 cpu time (seconds,-t) unlimited max user processes (-u) 35 virtual memory (kbytes,-v) 200000 file locks (-x) unlimited
root上的free -m给出了:
total used free shared buffers cached Mem: 3824 3714 110 0 142 2632 -/+ buffers/cache: 939 2885 Swap: 3490 0 3490
从顶部开始的内存使用情况:
Mem: 3916648k total,3797056k used,119592k free,145820k buffers Swap: 3574452k total,168k used,3574284k free,2686844k cached
更新:昨天重新启动服务器,它在下午的剩余时间工作.然而,今天它正在做同样的事情.
运行“strace PHP test.PHP”(一个存在的文件),它会持续一段时间,但putty的最后一页左右是这样的:
fstat(3,{st_mode=S_IFREG|0644,st_size=100030,...}) = 0 mmap(NULL,100030,PROT_READ,MAP_PRIVATE,3,0) = 0x2ad3ce0af000 close(3) = 0 open("/lib64/libnss_dns.so.2",O_RDONLY) = 3 read(3,"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\340\17\0\0\0\0\0\0"...,832) = 832 fstat(3,{st_mode=S_IFREG|0755,st_size=23736,2113792,PROT_READ|PROT_EXEC,MAP_PRIVATE|MAP_DENYWRITE,0) = -1 ENOMEM (Cannot allocate memory) close(3) = 0 munmap(0x2ad3ce0af000,100030) = 0 alarm(0) = 0 futex(0x3d80e07b20,FUTEX_WAKE_PRIVATE,2147483647) = 0 futex(0x3d80e079a0,2147483647) = 0 futex(0x3d7fe94760,2147483647) = 0 futex(0x3d7fe94c10,2147483647) = 0 stat("/etc/krb5.conf",st_size=608,...}) = 0 open("/proc/filesystems",O_RDONLY) = 3 read(3,"nodev\tsysfs\nnodev\trootfs\nnodev\tb"...,4095) = 314 close(3) = 0 open("/etc/krb5.conf",O_RDONLY) = 3 open("/proc/filesystems",O_RDONLY) = 4 read(4,4095) = 314 close(4) = 0 access("/etc/krb5.conf",W_OK) = -1 EACCES (Permission denied) fstat(3,4096,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANONYMOUS,-1,0) = 0x2ad3ce0af000 read(3,"[logging]\n default = FILE:/var/l"...,4096) = 608 read(3,"",4096) = 0 close(3) = 0 munmap(0x2ad3ce0af000,4096) = 0 open("/dev/urandom",O_RDONLY) = 3 fstat(3,{st_mode=S_IFCHR|0444,st_rdev=makedev(1,9),...}) = 0 read(3,"\300\260\36co\363cI\t\355\324\3518gy\354\357\314Z:",20) = 20 close(3) = 0 futex(0x3d7f624640,2147483647) = 0 open("/proc/filesystems",4095) = 314 close(3) = 0 open("/etc/krb5.keytab",O_RDONLY) = -1 ENOENT (No such file or directory) open("/proc/filesystems",4095) = 314 close(3) = 0 futex(0x3d8122d0c0,2147483647) = 0 stat("/dev/urandom",...}) = 0 brk(0x340b000) = 0x340b000 brk(0x342c000) = 0x340b000 mmap(NULL,1048576,0) = -1 ENOMEM (Cannot allocate memory) mmap(NULL,134217728,PROT_NONE,MAP_PRIVATE|MAP_ANONYMOUS|MAP_NORESERVE,67108864,0) = -1 ENOMEM (Cannot allocate memory) write(2,"Out of memory\n",14Out of memory ) = 14 exit_group(1) = ?
整个日志位于http://www.2shared.com/file/05MVRFI6/dmp.html
cat / proc / meminfo的输出:
MemTotal: 3916648 kB MemFree: 501180 kB Buffers: 335276 kB Cached: 2312536 kB SwapCached: 0 kB Active: 1312888 kB Inactive: 1702096 kB HighTotal: 0 kB HighFree: 0 kB LowTotal: 3916648 kB LowFree: 501180 kB SwapTotal: 3574452 kB SwapFree: 3574292 kB Dirty: 728 kB Writeback: 0 kB AnonPages: 367160 kB Mapped: 33640 kB Slab: 351564 kB PageTables: 18588 kB NFS_Unstable: 0 kB Bounce: 0 kB CommitLimit: 5532776 kB Committed_AS: 1188280 kB VmallocTotal: 34359738367 kB VmallocUsed: 265828 kB VmallocChunk: 34359471827 kB HugePages_Total: 0 HugePages_Free: 0 HugePages_Rsvd: 0 Hugepagesize: 2048 kB
运行PHP test.PHP后cat / proc / meminfo的输出如下.我在这里替换了服务器的IP地址,因为它是公共IP – xxx.xxx.xxx.11是服务器的主IP,xxx.xxx.xxx.12是其他IP.
Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=3 ID=271 PROTO=UDP SPT=10170 DPT=33437 LEN=12 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=89.39.188.210 DST=xxx.xxx.xxx.11 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=47199 DF PROTO=TCP SPT=2119 DPT=4899 WINDOW=65535 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=89.39.188.210 DST=xxx.xxx.xxx.11 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=47678 DF PROTO=TCP SPT=2119 DPT=4899 WINDOW=65535 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=89.39.188.210 DST=xxx.xxx.xxx.11 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=48675 DF PROTO=TCP SPT=2119 DPT=4899 WINDOW=65535 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=198.60.169.59 DST=xxx.xxx.xxx.11 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16299 DF PROTO=TCP SPT=3185 DPT=5555 WINDOW=16384 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=198.60.169.59 DST=xxx.xxx.xxx.12 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16300 DF PROTO=TCP SPT=3186 DPT=5555 WINDOW=16384 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=198.60.169.59 DST=xxx.xxx.xxx.12 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=17038 DF PROTO=TCP SPT=3186 DPT=5555 WINDOW=16384 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=198.60.169.59 DST=xxx.xxx.xxx.11 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=17073 DF PROTO=TCP SPT=3185 DPT=5555 WINDOW=16384 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=188.254.224.225 DST=xxx.xxx.xxx.12 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=39888 PROTO=TCP SPT=59828 DPT=5900 WINDOW=65535 RES=0x00 SYN URGP=0 Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=188.254.224.225 DST=xxx.xxx.xxx.11 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=43041 PROTO=TCP SPT=59828 DPT=5900 WINDOW=65535 RES=0x00 SYN URGP=0 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=1 ID=269 PROTO=UDP SPT=10202 DPT=33437 LEN=12 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=1 ID=269 PROTO=UDP SPT=10202 DPT=33437 LEN=12 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=2 ID=270 PROTO=UDP SPT=10202 DPT=33437 LEN=12 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=2 ID=270 PROTO=UDP SPT=10202 DPT=33437 LEN=12 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=3 ID=271 PROTO=UDP SPT=10202 DPT=33437 LEN=12 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=93.191.199.110 DST=xxx.xxx.xxx.11 LEN=32 TOS=0x00 PREC=0x00 TTL=3 ID=271 PROTO=UDP SPT=10202 DPT=33437 LEN=12 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=65.111.170.208 DST=xxx.xxx.xxx.11 LEN=444 TOS=0x00 PREC=0x00 TTL=52 ID=0 DF PROTO=UDP SPT=5105 DPT=5060 LEN=424 Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=65.111.170.208 DST=xxx.xxx.xxx.12 LEN=443 TOS=0x00 PREC=0x00 TTL=52 ID=0 DF PROTO=UDP SPT=5105 DPT=5060 LEN=423 TCP: Treason uncloaked! Peer 82.129.64.220:5306/59348 shrinks window 3410313698:3410313754. Repaired. Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=00:23:ae:8f:59:78:30:37:a6:da:d2:e9:08:00 SRC=223.203.192.53 DST=xxx.xxx.xxx.12 LEN=1500 TOS=0x00 PREC=0x00 TTL=47 ID=2742 PROTO=UDP SPT=0 DPT=0 LEN=44665
cat /etc/security/limits.conf显示我已经注释掉了所有内容:
# /etc/security/limits.conf # #Each line describes a limit for a user in the form: # #<domain> <type> <item> <value> # #Where: #<domain> can be: # - an user name # - a group name,with @group Syntax # - the wildcard *,for default entry # - the wildcard %,can be also used with %group Syntax,# for maxlogin limit # #<type> can have the two values: # - "soft" for enforcing the soft limits # - "hard" for enforcing hard limits # #<item> can be one of the following: # - core - limits the core file size (KB) # - data - max data size (KB) # - fsize - maximum filesize (KB) # - memlock - max locked-in-memory address space (KB) # - nofile - max number of open files # - RSS - max resident set size (KB) # - stack - max stack size (KB) # - cpu - max cpu time (MIN) # - nproc - max number of processes # - as - address space limit # - maxlogins - max number of logins for this user # - maxsyslogins - max number of logins on the system # - priority - the priority to run user process with # - locks - max number of file locks the user can hold # - sigpending - max number of pending signals # - msgqueue - max memory used by POSIX message queues (bytes) # - nice - max nice priority allowed to raise to # - rtprio - max realtime priority # #<domain> <type> <item> <value> # #* soft core 0 #* hard RSS 10000 #@student hard nproc 20 #@faculty soft nproc 20 #@faculty hard nproc 50 #ftp hard nproc 0 #@student - maxlogins 4 # End of file
而cat /etc/sysctl.conf的输出:
# Kernel sysctl configuration file for Red Hat Linux # # For binary values,0 is disabled,1 is enabled. See sysctl(8) and # sysctl.conf(5) for more details. # Controls IP packet forwarding net.ipv4.ip_forward = 0 # Controls source route verification net.ipv4.conf.default.rp_filter = 1 # Do not accept source routing net.ipv4.conf.default.accept_source_route = 0 # Controls the System Request debugging functionality of the kernel kernel.sysrq = 0 # Controls whether core dumps will append the PID to the core filename # Useful for debugging multi-threaded applications kernel.core_uses_pid = 1 # Controls the use of TCP syncookies net.ipv4.tcp_syncookies = 1 # Controls the maximum size of a message,in bytes kernel.msgmnb = 65536 # Controls the default maxmimum size of a mesage queue kernel.msgmax = 65536 # Controls the maximum shared segment size,in bytes kernel.shmmax = 68719476736 # Controls the maximum number of shared memory segments,in pages kernel.shmall = 4294967296
编辑:更新上面的ulimit以dan,而不是root运行.