Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:12321 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 45755 invoked by uid 1010); 24 Aug 2004 12:30:26 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 40829 invoked from network); 24 Aug 2004 12:29:01 -0000 Received: from unknown (HELO web11002.mail.yahoo.com) (216.136.131.52) by pb1.pair.com with SMTP; 24 Aug 2004 12:29:01 -0000 Message-ID: <20040824122859.1826.qmail@web11002.mail.yahoo.com> Received: from [203.144.144.186] by web11002.mail.yahoo.com via HTTP; Tue, 24 Aug 2004 05:28:59 PDT Date: Tue, 24 Aug 2004 05:28:59 -0700 (PDT) To: internals@lists.php.net MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: preg leak From: jase303@yahoo.com (Jason) Hi guys, I'm looking for the maintainer of the preg_match function in PHP. There appears to be a nasty leak in its most basic functionality, and being a very fundamental function of PHP (not to mention that my long running scripts use it a lot ;) I thought I'd try and go the direct route. Sorry, I don't know C or I'd try to fix it myself! Considering its nature I thought best to at least make a post to the list rather than it get lost in the bugs pile (the original (much less refined) report from someone else had been sitting a long time). http://bugs.php.net/bug.php?id=28513 This leaks 50MB per second on my PHP5.0.0,5.0.1. It is probably the similar bug reported in PHP4. If you have any suggestions, please let me know! Sincere regards, Jason. _______________________________ Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. http://promotions.yahoo.com/goldrush