ID: 33941 Updated by: [EMAIL PROTECTED] Reported By: gordon at heydon dot com dot au -Status: Assigned +Status: Closed Bug Type: Class/Object related Operating System: * PHP Version: 5CVS-2005-08-02 Assigned To: dmitry
Previous Comments: ------------------------------------------------------------------------ [2005-09-17 01:53:06] [EMAIL PROTECTED] For the record, I don't see any memleaks with 5.0/5.1/6.0 now. ------------------------------------------------------------------------ [2005-09-09 14:18:51] fanfatal at fanfatal dot pl In PHP 5.0.4 this bug has been corrected Greatings ;-) ... ------------------------------------------------------------------------ [2005-08-18 09:27:48] [EMAIL PROTECTED] Can we atleast make sure it gives a nice big warning on this? Now it merely produces some leaks: <?php class Foo { function __set($name, $value) { var_dump($name, $value); } } $f = new Foo(); $f->bar[1] = 42; produces: [EMAIL PROTECTED]:~$ php-6.0dev /tmp/foooo.php /dat/dev/php/php-6.0dev/Zend/zend_execute.c(827) : Freeing 0x08796494 (16 bytes), script=/tmp/foooo.php /dat/dev/php/php-6.0dev/Zend/zend_execute.c(1005) : Freeing 0x0879643C (35 bytes), script=/tmp/foooo.php /dat/dev/php/php-6.0dev/Zend/zend_hash.c(383) : Actual location (location was relayed) /dat/dev/php/php-6.0dev/Zend/zend_execute.c(1060) : Freeing 0x087963DC (44 bytes), script=/tmp/foooo.php /dat/dev/php/php-6.0dev/Zend/zend_API.c(712) : Actual location (location was relayed) Last leak repeated 1 time /dat/dev/php/php-6.0dev/Zend/zend_execute.c(1057) : Freeing 0x087842CC (16 bytes), script=/tmp/foooo.php === Total 5 memory leaks detected === ------------------------------------------------------------------------ [2005-08-05 12:06:17] [EMAIL PROTECTED] This is not fixable :( ------------------------------------------------------------------------ [2005-08-05 11:44:23] [EMAIL PROTECTED] Dmitry "The Fixer", please check this out. ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/33941 -- Edit this bug report at http://bugs.php.net/?id=33941&edit=1