On 10/12/02, "Ilia A." <[EMAIL PROTECTED]> wrote: > So, I think this is indeed a problem. Allocating a huge buffer just because > users says so is not right, we might as well allow people direct memory > access while we are at it. One thing is that if this were to fail because > there were really 1000000000 bytes to read and PHP could not allocate that > much memory to store all this data. Even then, a graceful exit would've been > nicer then a segmentation fault, but that's already arguable.
Lets have a backtrace please. > One more issue that I've come across since the last email is the following > leak in the streams code. > /home/rei/PHP_CVS/php4/main/streams.c(986) : Freeing 0x084DA69C (1 bytes), > script=/home/rei/PHP_CVS/php4/run-tests.php > /home/rei/PHP_CVS/php4/ext/standard/file.c(438) : Actual location (location > was relayed) > > Unfortunately, I am unable to reproduce the with a small test scripts, so not > much detail about this leak atm, I'm afraid. If you could update your CVS as well, so that the line numbers match the repository, that would help too :-) --Wez. -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php