ID:               26440
 User updated by:  steven at pearavenue dot com
 Reported By:      steven at pearavenue dot com
-Status:           Closed
+Status:           Open
 Bug Type:         HTTP related
 Operating System: Linux
 PHP Version:      4.3.4
 Assigned To:      pollita
 New Comment:

I checked the last two snapshots and do not see this fix - the example
behaves as before.


Previous Comments:
------------------------------------------------------------------------

[2003-11-27 21:02:57] steven at pearavenue dot com

Can I get a 4.3.4 patch for this? I am a little nervous about using a
snapshot when I go into production.

------------------------------------------------------------------------

[2003-11-27 19:11:01] steven at pearavenue dot com

Damn, that was quick. Well done.

------------------------------------------------------------------------

[2003-11-27 18:59:43] [EMAIL PROTECTED]

This bug has been fixed in CVS.

In case this was a PHP problem, snapshots of the sources are packaged
every three hours; this change will be in the next snapshot. You can
grab the snapshot at http://snaps.php.net/.
 
In case this was a documentation problem, the fix will show up soon at
http://www.php.net/manual/.

In case this was a PHP.net website problem, the change will show
up on the PHP.net site and on the mirror sites in short time.
 
Thank you for the report, and for helping us make PHP better.

The memory leak is not fixed. After the fix the script works as
expected, fopen() fails because the return code is 304 (what you
wanted) and not 200.

------------------------------------------------------------------------

[2003-11-27 18:37:32] steven at pearavenue dot com

It fails with HEAD too under the release 4.3.4. Thanks for confirming.

------------------------------------------------------------------------

[2003-11-27 18:11:48] [EMAIL PROTECTED]

PHP_4_3: Reproduced with latest CVS, here's some leaks:

/usr/src/web/php/php4/Zend/zend_hash.c(450) :  Freeing 0x086510CC (64
bytes), script=t.php
/usr/src/web/php/php4/Zend/zend_hash.c(416) :  Freeing 0x08651074 (35
bytes), script=t.php
Last leak repeated 8 times
/usr/src/web/php/php4/ext/standard/file.c(616) :  Freeing 0x086505AC
(44 bytes), script=t.php
/usr/src/web/php/php4/Zend/zend_variables.c(122) : Actual location
(location was relayed)
/usr/src/web/php/php4/ext/standard/file.c(997) :  Freeing 0x08650494
(44 bytes), script=t.php
/usr/src/web/php/php4/Zend/zend_API.c(562) : Actual location (location
was relayed)
/usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(372) :  Freeing
0x08650EAC (25 bytes), script=t.php
Last leak repeated 7 times
/usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(370) :  Freeing
0x08650E6C (12 bytes), script=t.php
Last leak repeated 7 times
/usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(316) :  Freeing
0x086502F4 (18 bytes), script=t.php
/usr/src/web/php/php4/ext/standard/http_fopen_wrapper.c(296) :  Freeing
0x086502B4 (12 bytes), script=t.php
/usr/src/web/php/php4/Zend/zend_hash.c(188) :  Freeing 0x0864DD1C (32
bytes), script=t.php
/usr/src/web/php/php4/ext/standard/file.c(614) :  Freeing 0x0864DC9C
(12 bytes), script=t.php
/usr/src/web/php/php4/main/streams.c(2884) :  Freeing 0x08652A44 (57
bytes), script=t.php
/usr/src/web/php/php4/Zend/zend_variables.c(111) : Actual location
(location was relayed)
/usr/src/web/php/php4/main/streams.c(2882) :  Freeing 0x08652A04 (12
bytes), script=t.php

Seems to work with HEAD, but still some leaks:

/usr/src/web/php/php5/main/streams/streams.c(1694) :  Freeing
0x40E49B98 (57 bytes), script=t.php
/usr/src/web/php/php5/Zend/zend_variables.c(137) : Actual location
(location was relayed)
/usr/src/web/php/php5/main/streams/streams.c(1692) :  Freeing
0x40E49B54 (16 bytes), script=t.php
=== Total 2 memory leaks detected ===


------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/26440

-- 
Edit this bug report at http://bugs.php.net/?id=26440&edit=1

Reply via email to