https://bugs.exim.org/show_bug.cgi?id=1803
--- Comment #28 from Nish Aravamudan <nish.aravamudan@???> ---
I also noticed that for UTF8 specificaly, there is another pcre_exec that
occurs (l#1853).
Breakpoint 10, php_pcre_split_impl (pce=0x555555d333a0,
subject=0x7fffed40b1a8 "\303\251\303\204\303\237\343\201\224a",
subject_len=10, return_value=0x7ffff381b240, limit_val=-1,
flags=<optimized out>)
at /build/php7.0-WHFaJZ/php7.0-7.0.3/ext/pcre/php_pcre.c:1851
1851 count = pcre_exec(re_bump, extra_bump, subject,
(gdb) print start_offset
$151 = 2
(gdb) print offsets[0]
$152 = -1
(gdb) print offsets[1]
$153 = -1
(gdb) print extra_bump
$154 = (pcre_extra *) 0x555555d33580
(gdb) print subject
$155 = 0x7fffed40b1a8 "\303\251\303\204\303\237\343\201\224a"
(gdb) step
1854 if (count < 1) {
(gdb) print offsets[0]
$156 = 2
(gdb) print offsets[1]
$157 = 4
(gdb) print count
$159 = 1
--
You are receiving this mail because:
You are on the CC list for the bug.