On 18/03/02, "Jim Winstead" <[EMAIL PROTECTED]> wrote:
> the easiest way to track it down would be to insert some debugging
> statements in the wordwrap() function to print out the text being
> wrapped, the newtextlen that gets calculated, and then value of
> newtextlen at the end of the function.
Well, I wrapped the wordwrap calls in my script to syslog some info:
debug is a function that sticks microtime() output on the front of
a syslog.
function dbg_wordwrap($str, $wrap, $char, $cut=0)
{
debug("wordwrap: str is $str");
debug("wordwrap: bin is " . bin2hex($str));
debug("wordwrap: char=" . ord($char) . " cut=" . $cut);
return wordwrap($str, $wrap, $char, $cut);
}
(Hopefully wordwrapping in this message won't matter too much):
I got 3 of these in a row:
Mar 18 00:28:10 zaneeb httpd: 0.88278100 1016411290 wordwrap: str is
Mar 18 00:28:10 zaneeb httpd: 0.92683800 1016411290 wordwrap: bin is
Mar 18 00:28:10 zaneeb httpd: 0.97130300 1016411290 wordwrap: char=10 cut=0
And I think this is the culprit:
Mar 18 00:28:11 zaneeb httpd: 0.01609200 1016411291 wordwrap: str is Well..with
latest CVS I don't get any leak log entries. --Jani On Sun, 17 Mar
2002, Wez Furlong wrote: >Jani, > >I've made the streams code use the memory manager
in a more >clever way; could you try with latest CVS and report the >leak output
again. > >Thanks! > >--Wez. > >On 17/03/02, "Jani Taskinen" <[EMAIL PROTECTED]> wrote: >>
I get these leaks with even this script: >> >> <?php phpinfo(); ?> > > > > >
-- -- PHP Dev
Mar 18 00:28:11 zaneeb httpd: 0.06023000 1016411291 wordwrap: bin is
0a2020202057656c6c2e2e77697468206c617465737420435653204920646f6e27742067657420616e79206c65616b206c6f6720656e74726965732e0a20202020202020200a202020202d2d4a616e690a202020200a0a0a4f6e2053756e2c203137204d617220323030322c2057657a204675726c6f6e672077726f74653a0a0a3e4a616e692c0a3e0a3e49277665206d616465207468652073747265616d7320636f64652075736520746865206d656d6f7279206d616e6167657220696e2061206d6f72650a3e636c65766572207761793b20636f756c6420796f752074727920776974682
Mar 18 00:28:11 zaneeb httpd: 0.09354100 1016411291 wordwrap: char=10 cut=0
[Mon Mar 18 00:28:37 2002] Script:
'/home/CLIENTWEB/worlddo/www/managedo/my/index.php'
---------------------------------------
/home/wez/src/php/PHPDEV/Zend/zend_execute_API.c(274) : Block 0x0882D4B0 status:
/home/wez/src/php/PHPDEV/Zend/zend_variables.c(44) : Actual location (location was
relayed)
Beginning: OK (allocated on /home/wez/src/php/PHPDEV/ext/standard/string.c:670,
142 bytes)
End: Overflown (magic=0x2A8FCC00 instead of 0x2A8FCC84)
1 byte(s) overflown
---------------------------------------
--
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php