#39093 [Com]: several leaks appear when changing the result of __get()

2007-04-16 Thread judas dot iscariote at gmail dot com
 ID:   39093
 Comment by:   judas dot iscariote at gmail dot com
 Reported By:  [EMAIL PROTECTED]
 Status:   Assigned
 Bug Type: Scripting Engine problem
 Operating System: Linux
 PHP Version:  5.2.0RC5
 Assigned To:  tony2001
 New Comment:

ping ! this leak still happends in 5.2.1RC2-dev , 

PHP Notice:  Indirect modification of overloaded property test::$a has
no effect in /home/cristian/get.php on line 6

Notice: Indirect modification of overloaded property test::$a has no
effect in /home/cristian/get.php on line 6
[Mon Apr 16 06:18:54 2007]  Script:  'get.php'
/home/cristian/php5/Zend/zend_variables.h(45) :  Freeing 0x00C789A0 (1
bytes), script=get.php
/home/cristian/php5/Zend/zend_variables.c(120) : Actual location
(location was relayed)
[Mon Apr 16 06:18:54 2007]  Script:  'get.php'
/home/cristian/php5/Zend/zend_execute.c(1062) :  Freeing 0x00C789F8 (64
bytes), script=get.php
/home/cristian/php5/Zend/zend_alloc.c(2314) : Actual location (location
was relayed)
Last leak repeated 1 time
[Mon Apr 16 06:18:54 2007]  Script:  'get.php'
/home/cristian/php5/Zend/zend_execute.c(1058) :  Freeing 0x00C78A90 (24
bytes), script=get.php
[Mon Apr 16 06:18:54 2007]  Script:  'get.php'
/home/cristian/php5/Zend/zend_execute.c(827) :  Freeing 0x00C7B3F8 (24
bytes), script=get.php
[Mon Apr 16 06:18:54 2007]  Script:  'get.php'
/home/cristian/php5/Zend/zend_hash.c(247) :  Freeing 0x00C7B508 (73
bytes), script=get.php
=== Total 6 memory leaks detected ===

ps: and it should be a warning ;-)


Previous Comments:


[2006-10-09 22:15:15] [EMAIL PROTECTED]

It's notice at the moment.
The main goal is to fix the leak, whether it should be notice or
warning - it's another question.



[2006-10-09 22:03:26] judas dot iscariote at gmail dot vom

Tony why not a warning instead of a notice ?? 
that should be warning IMHO.



[2006-10-09 13:43:01] [EMAIL PROTECTED]

Dmitry made a patch which adds the notice:
http://tony2001.phpclub.net/dev/tmp/bug39093.diff
It doesn't fix the leaks, though.



[2006-10-09 13:41:22] [EMAIL PROTECTED]

Description:

Several leaks appear in the reproduce code.
The code itself is quite weird (and cannot work), but still..

Reproduce code:
---
a["b"]["c"] = "";
?>

Expected result:

Notice: Indirect modification of overloaded property test::$a has no
effect in ..

Actual result:
--
==10186== 146 (16 direct, 130 indirect) bytes in 1 blocks are
definitely lost in loss record 1 of 2
==10186==at 0x401C4CE: malloc (vg_replace_malloc.c:149)
==10186==by 0x8160629: _emalloc (zend_alloc.c:1637)
==10186==by 0x8196FFA: zend_fetch_dimension_address
(zend_execute.c:1061)
==10186==by 0x81ACD45: ZEND_ASSIGN_DIM_SPEC_VAR_CONST_HANDLER
(zend_vm_execute.h:9200)
==10186==by 0x8197AF0: execute (zend_vm_execute.h:92)
==10186==by 0x816E8FF: zend_eval_string (zend_execute_API.c:1137)
==10186==by 0x816EA5F: zend_eval_string_ex
(zend_execute_API.c:1171)
==10186==by 0x81DEAC9: main (php_cli.c:1147)
==10186==
==10186==
==10186== 130 bytes in 5 blocks are indirectly lost in loss record 2 of
2
==10186==at 0x401C4CE: malloc (vg_replace_malloc.c:149)
==10186==by 0x8160629: _emalloc (zend_alloc.c:1637)
==10186==by 0x817C1C1: _array_init (zend_API.c:819)
==10186==by 0x8197081: zend_fetch_dimension_address
(zend_execute.c:1065)
==10186==by 0x81ACD45: ZEND_ASSIGN_DIM_SPEC_VAR_CONST_HANDLER
(zend_vm_execute.h:9200)
==10186==by 0x8197AF0: execute (zend_vm_execute.h:92)
==10186==by 0x816E8FF: zend_eval_string (zend_execute_API.c:1137)
==10186==by 0x816EA5F: zend_eval_string_ex
(zend_execute_API.c:1171)
==10186==by 0x81DEAC9: main (php_cli.c:1147)






-- 
Edit this bug report at http://bugs.php.net/?id=39093&edit=1


#39093 [Com]: several leaks appear when changing the result of __get()

2006-10-09 Thread judas dot iscariote at gmail dot vom
 ID:   39093
 Comment by:   judas dot iscariote at gmail dot vom
 Reported By:  [EMAIL PROTECTED]
 Status:   Assigned
 Bug Type: Scripting Engine problem
 Operating System: Linux
 PHP Version:  5.2.0RC5
 Assigned To:  tony2001
 New Comment:

Tony why not a warning instead of a notice ?? 
that should be warning IMHO.


Previous Comments:


[2006-10-09 13:43:01] [EMAIL PROTECTED]

Dmitry made a patch which adds the notice:
http://tony2001.phpclub.net/dev/tmp/bug39093.diff
It doesn't fix the leaks, though.



[2006-10-09 13:41:22] [EMAIL PROTECTED]

Description:

Several leaks appear in the reproduce code.
The code itself is quite weird (and cannot work), but still..

Reproduce code:
---
a["b"]["c"] = "";
?>

Expected result:

Notice: Indirect modification of overloaded property test::$a has no
effect in ..

Actual result:
--
==10186== 146 (16 direct, 130 indirect) bytes in 1 blocks are
definitely lost in loss record 1 of 2
==10186==at 0x401C4CE: malloc (vg_replace_malloc.c:149)
==10186==by 0x8160629: _emalloc (zend_alloc.c:1637)
==10186==by 0x8196FFA: zend_fetch_dimension_address
(zend_execute.c:1061)
==10186==by 0x81ACD45: ZEND_ASSIGN_DIM_SPEC_VAR_CONST_HANDLER
(zend_vm_execute.h:9200)
==10186==by 0x8197AF0: execute (zend_vm_execute.h:92)
==10186==by 0x816E8FF: zend_eval_string (zend_execute_API.c:1137)
==10186==by 0x816EA5F: zend_eval_string_ex
(zend_execute_API.c:1171)
==10186==by 0x81DEAC9: main (php_cli.c:1147)
==10186==
==10186==
==10186== 130 bytes in 5 blocks are indirectly lost in loss record 2 of
2
==10186==at 0x401C4CE: malloc (vg_replace_malloc.c:149)
==10186==by 0x8160629: _emalloc (zend_alloc.c:1637)
==10186==by 0x817C1C1: _array_init (zend_API.c:819)
==10186==by 0x8197081: zend_fetch_dimension_address
(zend_execute.c:1065)
==10186==by 0x81ACD45: ZEND_ASSIGN_DIM_SPEC_VAR_CONST_HANDLER
(zend_vm_execute.h:9200)
==10186==by 0x8197AF0: execute (zend_vm_execute.h:92)
==10186==by 0x816E8FF: zend_eval_string (zend_execute_API.c:1137)
==10186==by 0x816EA5F: zend_eval_string_ex
(zend_execute_API.c:1171)
==10186==by 0x81DEAC9: main (php_cli.c:1147)






-- 
Edit this bug report at http://bugs.php.net/?id=39093&edit=1