On 10/12/02, "Ilia A." <[EMAIL PROTECTED]> wrote:
> So, I think this is indeed a problem. Allocating a huge buffer just because 
> users says so is not right, we might as well allow people direct memory 
> access while we are at it. One thing is that if this were to fail because 
> there were really 1000000000 bytes to read and PHP could not allocate that 
> much memory to store all this data. Even then, a graceful exit would've been 
> nicer then a segmentation fault, but that's already arguable.

Lets have a backtrace please.
 
> One more issue that I've come across since the last email is the following 
> leak in the streams code.
> /home/rei/PHP_CVS/php4/main/streams.c(986) :  Freeing 0x084DA69C (1 bytes), 
> script=/home/rei/PHP_CVS/php4/run-tests.php
> /home/rei/PHP_CVS/php4/ext/standard/file.c(438) : Actual location (location 
> was relayed)
> 
> Unfortunately, I am unable to reproduce the with a small test scripts, so not 
> much detail about this leak atm, I'm afraid.

If you could update your CVS as well, so that the line numbers match
the repository, that would help too :-)

--Wez.


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to