https://bugs.exim.org/show_bug.cgi?id=1803
--- Comment #28 from Nish Aravamudan <[email protected]> --- I also noticed that for UTF8 specificaly, there is another pcre_exec that occurs (l#1853). Breakpoint 10, php_pcre_split_impl (pce=0x555555d333a0, subject=0x7fffed40b1a8 "\303\251\303\204\303\237\343\201\224a", subject_len=10, return_value=0x7ffff381b240, limit_val=-1, flags=<optimized out>) at /build/php7.0-WHFaJZ/php7.0-7.0.3/ext/pcre/php_pcre.c:1851 1851 count = pcre_exec(re_bump, extra_bump, subject, (gdb) print start_offset $151 = 2 (gdb) print offsets[0] $152 = -1 (gdb) print offsets[1] $153 = -1 (gdb) print extra_bump $154 = (pcre_extra *) 0x555555d33580 (gdb) print subject $155 = 0x7fffed40b1a8 "\303\251\303\204\303\237\343\201\224a" (gdb) step 1854 if (count < 1) { (gdb) print offsets[0] $156 = 2 (gdb) print offsets[1] $157 = 4 (gdb) print count $159 = 1 -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at https://lists.exim.org/mailman/listinfo/pcre-dev
