Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:3629 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 10695 invoked from network); 29 Jul 2003 11:52:56 -0000 Received: from unknown (HELO hanna.linnea.net) (193.45.225.41) by pb1.pair.com with SMTP; 29 Jul 2003 11:52:56 -0000 Received: (qmail 29045 invoked from network); 29 Jul 2003 11:52:53 -0000 Received: from rl141.kiruna.se (HELO novell) (193.45.238.241) by ns2.kiruna.se with SMTP; 29 Jul 2003 11:52:53 -0000 Date: Tue, 29 Jul 2003 13:52:39 +0200 To: internals@lists.php.net Message-ID: <20030729135239.1251bcab.magnus@php.net> X-Mailer: Sylpheed version 0.9.3claws (GTK+ 1.2.10; i686-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Memory leaks in PHP_4_3 and HEAD From: magnus@php.net (Magnus Maatta) a = &$a; } } $a = new a(); for ($i = 0; $i <= 4; $i++) { $a->items[] = new b($a); } print_r($a); ?> With PHP5: [4] => b Object ( [a] => a Object *RECURSION* ) ) ) /opt/dev/php/php5/Zend/zend_hash.c(374) : Freeing 0x4153718C (35 bytes), script=24811.php Last leak repeated 4 times /opt/dev/php/php5/Zend/zend_hash.c(233) : Freeing 0x41537130 (37 bytes), script=24811.php Last leak repeated 5 times /opt/dev/php/php5/Zend/zend_API.c(677) : Freeing 0x415370DC (32 bytes), script=24811.php /opt/dev/php/php5/Zend/zend_hash.c(154) : Actual location (location was relayed) Last leak repeated 5 times /opt/dev/php/php5/Zend/zend_execute.c(3037) : Freeing 0x41537078 (44 bytes), script=24811.php /opt/dev/php/php5/Zend/zend_API.c(676) : Actual location (location was relayed) Last leak repeated 5 times /opt/dev/php/php5/Zend/zend_objects.c(95) : Freeing 0x41537034 (12 bytes), script=24811.php Last leak repeated 5 times /opt/dev/php/php5/Zend/zend_execute.c(3036) : Freeing 0x41536FF0 (16 bytes), script=24811.php Last leak repeated 5 times /opt/dev/php/php5/Zend/zend_variables.c(123) : Freeing 0x41538EE8 (32 bytes), script=24811.php /opt/dev/php/php5/Zend/zend_hash.c(154) : Actual location (location was relayed) /opt/dev/php/php5/Zend/zend_execute.c(793) : Freeing 0x41538E84 (44 bytes), script=24811.php /opt/dev/php/php5/Zend/zend_variables.c(122) : Actual location (location was relayed) Last leak repeated 1 time PHP4: [4] => b Object ( [a] => a Object ( [items] => Array *RECURSION* ) ) ) ) /opt/dev/php/php4/Zend/zend_hash.c(406) : Freeing 0x081F009C (35 bytes), script=24811.php Last leak repeated 4 times /opt/dev/php/php4/Zend/zend_hash.c(178) : Freeing 0x081EFFF4 (32 bytes), script=24811.php Last leak repeated 6 times /opt/dev/php/php4/Zend/zend_API.c(594) : Freeing 0x081EFF94 (44 bytes), script=24811.php /opt/dev/php/php4/Zend/zend_API.c(582) : Actual location (location was relayed) Last leak repeated 5 times /opt/dev/php/php4/Zend/zend_execute.c(1975) : Freeing 0x081EFF54 (12 bytes), script=24811.php Last leak repeated 5 times /opt/dev/php/php4/Zend/zend_hash.c(262) : Freeing 0x081EFEA4 (37 bytes), script=24811.php Last leak repeated 5 times /opt/dev/php/php4/Zend/zend_execute.c(774) : Freeing 0x081F1454 (44 bytes), script=24811.php /opt/dev/php/php4/Zend/zend_variables.c(122) : Actual location (location was relayed) Last leak repeated 1 time -- BOFH Excuse #131: telnet: Unable to connect to remote host: Connection refused