ID: 26440 User updated by: steven at pearavenue dot com Reported By: steven at pearavenue dot com -Status: Closed +Status: Open Bug Type: HTTP related Operating System: Linux PHP Version: 4.3.4 Assigned To: pollita New Comment:
I checked the last two snapshots and do not see this fix - the example behaves as before. Previous Comments: ------------------------------------------------------------------------ [2003-11-27 21:02:57] steven at pearavenue dot com Can I get a 4.3.4 patch for this? I am a little nervous about using a snapshot when I go into production. ------------------------------------------------------------------------ [2003-11-27 19:11:01] steven at pearavenue dot com Damn, that was quick. Well done. ------------------------------------------------------------------------ [2003-11-27 18:59:43] [EMAIL PROTECTED] This bug has been fixed in CVS. In case this was a PHP problem, snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. In case this was a documentation problem, the fix will show up soon at http://www.php.net/manual/. In case this was a PHP.net website problem, the change will show up on the PHP.net site and on the mirror sites in short time. Thank you for the report, and for helping us make PHP better. The memory leak is not fixed. After the fix the script works as expected, fopen() fails because the return code is 304 (what you wanted) and not 200. ------------------------------------------------------------------------ [2003-11-27 18:37:32] steven at pearavenue dot com It fails with HEAD too under the release 4.3.4. Thanks for confirming. ------------------------------------------------------------------------ [2003-11-27 18:11:48] [EMAIL PROTECTED] PHP_4_3: Reproduced with latest CVS, here's some leaks: /usr/src/web/php/php4/Zend/zend_hash.c(450) : Freeing 0x086510CC (64 bytes), script=t.php /usr/src/web/php/php4/Zend/zend_hash.c(416) : Freeing 0x08651074 (35 bytes), script=t.php Last leak repeated 8 times /usr/src/web/php/php4/ext/standard/file.c(616) : Freeing 0x086505AC (44 bytes), script=t.php /usr/src/web/php/php4/Zend/zend_variables.c(122) : Actual location (location was relayed) /usr/src/web/php/php4/ext/standard/file.c(997) : Freeing 0x08650494 (44 bytes), script=t.php /usr/src/web/php/php4/Zend/zend_API.c(562) : Actual location (location was relayed) /usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(372) : Freeing 0x08650EAC (25 bytes), script=t.php Last leak repeated 7 times /usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(370) : Freeing 0x08650E6C (12 bytes), script=t.php Last leak repeated 7 times /usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(316) : Freeing 0x086502F4 (18 bytes), script=t.php /usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(296) : Freeing 0x086502B4 (12 bytes), script=t.php /usr/src/web/php/php4/Zend/zend_hash.c(188) : Freeing 0x0864DD1C (32 bytes), script=t.php /usr/src/web/php/php4/ext/standard/file.c(614) : Freeing 0x0864DC9C (12 bytes), script=t.php /usr/src/web/php/php4/main/streams.c(2884) : Freeing 0x08652A44 (57 bytes), script=t.php /usr/src/web/php/php4/Zend/zend_variables.c(111) : Actual location (location was relayed) /usr/src/web/php/php4/main/streams.c(2882) : Freeing 0x08652A04 (12 bytes), script=t.php Seems to work with HEAD, but still some leaks: /usr/src/web/php/php5/main/streams/streams.c(1694) : Freeing 0x40E49B98 (57 bytes), script=t.php /usr/src/web/php/php5/Zend/zend_variables.c(137) : Actual location (location was relayed) /usr/src/web/php/php5/main/streams/streams.c(1692) : Freeing 0x40E49B54 (16 bytes), script=t.php === Total 2 memory leaks detected === ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/26440 -- Edit this bug report at http://bugs.php.net/?id=26440&edit=1