Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:81566 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 89905 invoked from network); 2 Feb 2015 08:53:43 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 2 Feb 2015 08:53:43 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.216.47 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.216.47 mail-qa0-f47.google.com Received: from [209.85.216.47] ([209.85.216.47:63566] helo=mail-qa0-f47.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 35/74-02376-51B3FC45 for ; Mon, 02 Feb 2015 03:53:42 -0500 Received: by mail-qa0-f47.google.com with SMTP id n8so28250281qaq.6 for ; Mon, 02 Feb 2015 00:53:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=POPVb7b2gqowceBhfR3Pw1N+m1qAcH2IsxIIvhK5coc=; b=ubMF3s2KnspINhVdiBYLdK+bKo7ZtsmGD6zbZ+pT3bfeAFbsSvN9n4+7/e2oK55eSQ 2kQmN2oBH4LKFvkd66XmQvib0xY5OTm3KWbZcwbWJfMxE+0qLRDfBq27NZu1L+gAXvs+ SC/XeZfxi3en85icb/zkipkbUpUVJJzjI/VSNpaf/Zsdtp3k8vqcJBvUZRuXanGr/liO AtAa+KbA/05BWjHC9hrgMJDeoxChlBR9tHDNHzrZ65JCOH/brnuMoNqZ5E+0cRkS/pD8 CGWm5YXXkvxYyi6rA7jEAi/whBOOhZac0E8Hh9Sga0fPzbov23Jv3LhvGuJ/Be/QVw3z ovPQ== X-Received: by 10.229.114.74 with SMTP id d10mr15522317qcq.5.1422867219245; Mon, 02 Feb 2015 00:53:39 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.229.93.70 with HTTP; Mon, 2 Feb 2015 00:52:59 -0800 (PST) In-Reply-To: References: <54CC625E.8030802@lerdorf.com> <54CC8115.20705@lerdorf.com> Date: Mon, 2 Feb 2015 17:52:59 +0900 X-Google-Sender-Auth: kgPmZZsYhb3jLOYJ9C52yUmThV0 Message-ID: To: Xinchen Hui Cc: Rasmus Lerdorf , Michael Wallner , PHP Internals Content-Type: multipart/alternative; boundary=001a1133c9622a7513050e1717a1 Subject: Re: [PHP-DEV] Magic getter bug tickled by Moodle From: yohgaki@ohgaki.net (Yasuo Ohgaki) --001a1133c9622a7513050e1717a1 Content-Type: text/plain; charset=UTF-8 Hi Xinchen, On Sat, Jan 31, 2015 at 7:15 PM, Xinchen Hui wrote: > must be fixed, > > https://github.com/php/php-src/commit/1a60175e2595a24ebc3b6d80a112d574c6c98f58 > Impressive work! It's irrelevant probably. I only get one valgrind leak with TS build now. NTS is fine. [yohgaki@dev php-src]$ USE_ZEND_ALLOC=0 valgrind --track-origins=yes --leak-check=full ./sapi/cli/php -r "echo 1;" ==13614== Memcheck, a memory error detector ==13614== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==13614== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info ==13614== Command: ./php-bin -r echo\ 1; ==13614== 1==13614== ==13614== HEAP SUMMARY: ==13614== in use at exit: 88,808 bytes in 2,768 blocks ==13614== total heap usage: 32,420 allocs, 29,652 frees, 3,656,230 bytes allocated ==13614== ==13614== 376 bytes in 1 blocks are definitely lost in loss record 89 of 135 ==13614== at 0x4C29BCF: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==13614== by 0xAEB3B5: alloc_globals_ctor (zend_alloc.c:2382) ==13614== by 0xA6665C: ts_allocate_id (TSRM.c:259) ==13614== by 0xAEB4B9: start_memory_manager (zend_alloc.c:2405) ==13614== by 0xB21D09: zend_startup (zend.c:572) ==13614== by 0xA6DA0F: php_module_startup (main.c:2105) ==13614== by 0xBD2FB1: php_cli_startup (php_cli.c:421) ==13614== by 0xBD53B7: main (php_cli.c:1341) ==13614== ==13614== LEAK SUMMARY: ==13614== definitely lost: 376 bytes in 1 blocks ==13614== indirectly lost: 0 bytes in 0 blocks ==13614== possibly lost: 0 bytes in 0 blocks ==13614== still reachable: 88,432 bytes in 2,767 blocks ==13614== suppressed: 0 bytes in 0 blocks ==13614== Reachable blocks (those to which a pointer was found) are not shown. ==13614== To see them, rerun with: --leak-check=full --show-leak-kinds=all ==13614== ==13614== For counts of detected and suppressed errors, rerun with: -v ==13614== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) -- Yasuo Ohgaki yohgaki@ohgaki.net --001a1133c9622a7513050e1717a1--