Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:28656 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 41393 invoked by uid 1010); 3 Apr 2007 07:17:21 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 41377 invoked from network); 3 Apr 2007 07:17:21 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 3 Apr 2007 07:17:21 -0000 Authentication-Results: pb1.pair.com header.from=daniel@rozsnyo.com; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=daniel@rozsnyo.com; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain rozsnyo.com from 147.229.191.152 cause and error) X-PHP-List-Original-Sender: daniel@rozsnyo.com X-Host-Fingerprint: 147.229.191.152 tron.kn.vutbr.cz FreeBSD 4.6-4.9 Received: from [147.229.191.152] ([147.229.191.152:3834] helo=tron.kn.vutbr.cz) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 0D/F5-17495-D7FF1164 for ; Tue, 03 Apr 2007 03:17:18 -0400 Received: from [192.168.0.12] (a03-0106a.kn.vutbr.cz [147.229.212.212]) by tron.kn.vutbr.cz (8.12.9p2/8.12.9) with ESMTP id l337HDkJ011089; Tue, 3 Apr 2007 09:17:14 +0200 (CEST) (envelope-from daniel@rozsnyo.com) Message-ID: <4611FF79.2060801@rozsnyo.com> Date: Tue, 03 Apr 2007 09:17:13 +0200 User-Agent: Thunderbird 1.5.0.10 (X11/20070323) MIME-Version: 1.0 To: Ilia Alshanetsky CC: PHPdev Mailing List References: In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV version 0.88.7, clamav-milter version 0.88.7 on tron.kn.vutbr.cz X-Virus-Status: Clean X-Spam-Flag: NO X-Scanned-By: milter-spamc/0.19.268 (tron [147.229.191.152]); Tue, 03 Apr 2007 09:17:15 +0200 X-Spam-Status: NO, hits=-0.00 required=6.00 X-Spam-Level: X-Spam-Report: Spam detection software, running on the system "tron.kn.vutbr.cz", has tested this incoming email. See other headers to know if the email has beed identified as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or block similar future email. If you have any questions, see the administrator of that system for details. ____ Content analysis details: (-0.0 points, 6.0 required) ____ pts rule name description ---- ---------------------- -------------------------------------------- -0.0 BAYES_44 BODY: Bayesian spam probability is 44 to 50% [score: 0.4950] ____ Subject: Re: PHP 5.2.2 RC1 Schedule From: daniel@rozsnyo.com (=?UTF-8?B?RGFuaWVsIFJvenNuecOz?=) Ilia Alshanetsky wrote: > If you have any major patches left over, please commit them as they will > no longer be accepted for 5.2.2. I have no CVS access, so please some of the skilled devs take my patch for multicast there. It only adds features (branches to case, some constants), it should not broke anything. Somebody on the list complained that last one was for 5.1.6, here is a recent one (on my machine its in use for almost 30 days): http://diary.rozsnyo.com/2006/06/16/php5-ext-sockets-multicast-5.2.1.patch Also, if merged, close the bug http://bugs.php.net/bug.php?id=40510 (somebody found my page and made a feature reqest) Thanks, Daniel Rozsnyo