You can try to create a copy of the script, and cut down this copy as much
as possible, while checking that it still causes this leak. The final
cut-down test case would probably be small enough for you to publish.
Zeev
At 04:45 27-09-01, Mike Rogers wrote:
>There doesn't appear to be anything unusual in the script. There are a few
>includes pointing almost completely to HTML, and a few MySQL database
>queries. It is not my code to release, so I am hesitant to do so. Any
>alternate ways to debug this? I can strace or gdb to a thread and wait for
>it to come up if that would help.
>--
>Mike
>
>----- Original Message -----
>From: "Sterling Hughes" <[EMAIL PROTECTED]>
>To: "Mike Rogers" <[EMAIL PROTECTED]>
>Cc: <[EMAIL PROTECTED]>
>Sent: Wednesday, September 26, 2001 10:57 PM
>Subject: Re: [PHP-DEV] php_smart_str leek
>
>
> > On Wed, 26 Sep 2001, Mike Rogers wrote:
> >
> > > I seem to have found a leak:
> > >
> > > php_smart_str.h(74) : Freeing 0x08641FF4 (4568 bytes),
> > > script=/path/to/file.php
> > > Last leak repeated 2 times
> > >
> >
> > Can you show me the source of file.php (the leak isn't in the
> > smart_str() code, but rather in a library that implements it)?
> >
> > -Sterling
> >
> >
>
>--
>PHP Development Mailing List <http://www.php.net/>
>To unsubscribe, e-mail: [EMAIL PROTECTED]
>For additional commands, e-mail: [EMAIL PROTECTED]
>To contact the list administrators, e-mail: [EMAIL PROTECTED]
--
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]