Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:57448 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 46867 invoked from network); 20 Jan 2012 03:35:59 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 20 Jan 2012 03:35:59 -0000 Authentication-Results: pb1.pair.com header.from=pierrick@webstart.fr; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=pierrick@webstart.fr; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain webstart.fr from 209.85.214.170 cause and error) X-PHP-List-Original-Sender: pierrick@webstart.fr X-Host-Fingerprint: 209.85.214.170 mail-tul01m020-f170.google.com Received: from [209.85.214.170] ([209.85.214.170:47499] helo=mail-tul01m020-f170.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id F9/A0-42843-C11E81F4 for ; Thu, 19 Jan 2012 22:35:59 -0500 Received: by obbwd18 with SMTP id wd18so208872obb.29 for ; Thu, 19 Jan 2012 19:35:53 -0800 (PST) MIME-Version: 1.0 Received: by 10.182.49.106 with SMTP id t10mr25253187obn.49.1327030553649; Thu, 19 Jan 2012 19:35:53 -0800 (PST) Received: by 10.182.159.9 with HTTP; Thu, 19 Jan 2012 19:35:53 -0800 (PST) Date: Thu, 19 Jan 2012 22:35:53 -0500 Message-ID: To: Stanislav Malyshev , David Soria Parra , Internals Content-Type: multipart/mixed; boundary=f46d04479fcfc1a1d404b6ed6031 Subject: Remove memory leak in PHP5.4 for bug 55971 From: pierrick@webstart.fr (Pierrick Charron) --f46d04479fcfc1a1d404b6ed6031 Content-Type: text/plain; charset=ISO-8859-1 Hi Stas, I did run the test of bug #55871 and got memory leaks. This patch remove them. Could you please review the patch and if it is Ok i'll commit it to 5.4 Thanks Pierrick --f46d04479fcfc1a1d404b6ed6031 Content-Type: text/plain; charset=US-ASCII; name="55871.txt" Content-Disposition: attachment; filename="55871.txt" Content-Transfer-Encoding: base64 X-Attachment-Id: f_gxmnq26n0 SW5kZXg6IE5FV1MKPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PQotLS0gTkVXUwkocmV2aXNpb24gMzIyNDgyKQorKysgTkVX Uwkod29ya2luZyBjb3B5KQpAQCAtMiw2ICsyLDkgQEAKIHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8 fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHwK ID8/IEphbiAyMDEyLCBQSFAgNS40LjAKIAorLSBTdGFuZGFyZDoKKyAgLiBGaXhlZCBtZW1vcnkg bGVhayBpbiBzdWJzdHJfcmVwbGFjZS4gKFBpZXJyaWNrKQorCiAxOSBKYW4gMjAxMiwgUEhQIDUu NC4wIFJDNgogCiAtIENvcmU6CkluZGV4OiBleHQvc3RhbmRhcmQvc3RyaW5nLmMKPT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PQotLS0gZXh0L3N0YW5kYXJkL3N0cmluZy5jCShyZXZpc2lvbiAzMjI0ODIpCisrKyBleHQvc3Rh bmRhcmQvc3RyaW5nLmMJKHdvcmtpbmcgY29weSkKQEAgLTI1MTgsNiArMjUxOCw5IEBACiAKIAkJ CQkJaWYoWl9SRUZDT1VOVF9QKG9yaWdfc3RyKSAhPSByZWZjb3VudCkgewogCQkJCQkJcGhwX2Vy cm9yX2RvY3JlZihOVUxMIFRTUk1MU19DQywgRV9XQVJOSU5HLCAiQXJndW1lbnQgd2FzIG1vZGlm aWVkIHdoaWxlIHJlcGxhY2luZyIpOworCQkJCQkJaWYoWl9UWVBFX1BQKHRtcF9yZXBsKSAhPSBJ U19TVFJJTkcpIHsKKwkJCQkJCQl6dmFsX2R0b3IocmVwbF9zdHIpOworCQkJCQkJfQogCQkJCQkJ YnJlYWs7CiAJCQkJCX0KIAo= --f46d04479fcfc1a1d404b6ed6031--