ID: 39093
Comment by: judas dot iscariote at gmail dot com
Reported By: [EMAIL PROTECTED]
Status: Assigned
Bug Type: Scripting Engine problem
Operating System: Linux
PHP Version: 5.2.0RC5
Assigned To: tony2001
New Comment:
ping ! this leak still happends in 5.2.1RC2-dev ,
PHP Notice: Indirect modification of overloaded property test::$a has
no effect in /home/cristian/get.php on line 6
Notice: Indirect modification of overloaded property test::$a has no
effect in /home/cristian/get.php on line 6
[Mon Apr 16 06:18:54 2007] Script: 'get.php'
/home/cristian/php5/Zend/zend_variables.h(45) : Freeing 0x00C789A0 (1
bytes), script=get.php
/home/cristian/php5/Zend/zend_variables.c(120) : Actual location
(location was relayed)
[Mon Apr 16 06:18:54 2007] Script: 'get.php'
/home/cristian/php5/Zend/zend_execute.c(1062) : Freeing 0x00C789F8 (64
bytes), script=get.php
/home/cristian/php5/Zend/zend_alloc.c(2314) : Actual location (location
was relayed)
Last leak repeated 1 time
[Mon Apr 16 06:18:54 2007] Script: 'get.php'
/home/cristian/php5/Zend/zend_execute.c(1058) : Freeing 0x00C78A90 (24
bytes), script=get.php
[Mon Apr 16 06:18:54 2007] Script: 'get.php'
/home/cristian/php5/Zend/zend_execute.c(827) : Freeing 0x00C7B3F8 (24
bytes), script=get.php
[Mon Apr 16 06:18:54 2007] Script: 'get.php'
/home/cristian/php5/Zend/zend_hash.c(247) : Freeing 0x00C7B508 (73
bytes), script=get.php
=== Total 6 memory leaks detected ===
ps: and it should be a warning ;-)
Previous Comments:
[2006-10-09 22:15:15] [EMAIL PROTECTED]
It's notice at the moment.
The main goal is to fix the leak, whether it should be notice or
warning - it's another question.
[2006-10-09 22:03:26] judas dot iscariote at gmail dot vom
Tony why not a warning instead of a notice ??
that should be warning IMHO.
[2006-10-09 13:43:01] [EMAIL PROTECTED]
Dmitry made a patch which adds the notice:
http://tony2001.phpclub.net/dev/tmp/bug39093.diff
It doesn't fix the leaks, though.
[2006-10-09 13:41:22] [EMAIL PROTECTED]
Description:
Several leaks appear in the reproduce code.
The code itself is quite weird (and cannot work), but still..
Reproduce code:
---
a["b"]["c"] = "";
?>
Expected result:
Notice: Indirect modification of overloaded property test::$a has no
effect in ..
Actual result:
--
==10186== 146 (16 direct, 130 indirect) bytes in 1 blocks are
definitely lost in loss record 1 of 2
==10186==at 0x401C4CE: malloc (vg_replace_malloc.c:149)
==10186==by 0x8160629: _emalloc (zend_alloc.c:1637)
==10186==by 0x8196FFA: zend_fetch_dimension_address
(zend_execute.c:1061)
==10186==by 0x81ACD45: ZEND_ASSIGN_DIM_SPEC_VAR_CONST_HANDLER
(zend_vm_execute.h:9200)
==10186==by 0x8197AF0: execute (zend_vm_execute.h:92)
==10186==by 0x816E8FF: zend_eval_string (zend_execute_API.c:1137)
==10186==by 0x816EA5F: zend_eval_string_ex
(zend_execute_API.c:1171)
==10186==by 0x81DEAC9: main (php_cli.c:1147)
==10186==
==10186==
==10186== 130 bytes in 5 blocks are indirectly lost in loss record 2 of
2
==10186==at 0x401C4CE: malloc (vg_replace_malloc.c:149)
==10186==by 0x8160629: _emalloc (zend_alloc.c:1637)
==10186==by 0x817C1C1: _array_init (zend_API.c:819)
==10186==by 0x8197081: zend_fetch_dimension_address
(zend_execute.c:1065)
==10186==by 0x81ACD45: ZEND_ASSIGN_DIM_SPEC_VAR_CONST_HANDLER
(zend_vm_execute.h:9200)
==10186==by 0x8197AF0: execute (zend_vm_execute.h:92)
==10186==by 0x816E8FF: zend_eval_string (zend_execute_API.c:1137)
==10186==by 0x816EA5F: zend_eval_string_ex
(zend_execute_API.c:1171)
==10186==by 0x81DEAC9: main (php_cli.c:1147)
--
Edit this bug report at http://bugs.php.net/?id=39093&edit=1