Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:107825 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 64193 invoked from network); 19 Nov 2019 11:51:13 -0000 Received: from unknown (HELO php-smtp3.php.net) (208.43.231.12) by pb1.pair.com with SMTP; 19 Nov 2019 11:51:13 -0000 Received: from php-smtp3.php.net (localhost [127.0.0.1]) by php-smtp3.php.net (Postfix) with ESMTP id 45C9F2D1FA3 for ; Tue, 19 Nov 2019 01:44:02 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp3.php.net X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS8560 212.227.0.0/16 X-Spam-Virus: Error (Cannot connect to unix socket '/var/run/clamav/clamd.ctl': connect: Connection refused) Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp3.php.net (Postfix) with ESMTPS for ; Tue, 19 Nov 2019 01:44:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1574156640; bh=iG8VvXcckU9KgT3fxTN0XVpS+hju/NObtiCPJyv3DwQ=; h=X-UI-Sender-Class:Subject:To:References:From:Date:In-Reply-To; b=boBZx5wvOyVqSnxfdaU+/Bz8hCX14WDk055LUxN7bY2kkyOVcOA9rBfGMiGqPT8vD We5iCMRTzoqLG17IqvCcbklE060lSLPC6nRlz1s/1K4NFfUKncp3uleKT77SxXwDFS ki1Z4RNSkaFv+U46V2NzOxR0byhswBA5hXkJO8Kk= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.2.93] ([84.179.238.88]) by mail.gmx.com (mrgmx005 [212.227.17.190]) with ESMTPSA (Nemesis) id 1Mulm5-1hfJKt113D-00rmsG for ; Tue, 19 Nov 2019 10:44:00 +0100 To: PHP internals References: Message-ID: <6fbd8905-a415-c723-dc87-ba7209539c0c@gmx.de> Date: Tue, 19 Nov 2019 10:44:00 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: de-DE Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:MnTvUx0lhLnlmc5/0A09Z0d5N/j02xzKtr/PK8mu9hOIdNjHdAt GLcNs5DLcya3ghMd7i1JeKmify6qyQN31hKB/lluOeoG+4NwWa0YfzM8Las3I3b1a5O6Z+y 1gPCY7IfTlOVMvzDwkDAHNpgxdmRqziBHGDoKWa7NfdJ3xv7fyCPq7O64/8hSOucnpBCfhA bEGxyNDoxQCDBBy2iIgZg== X-UI-Out-Filterresults: notjunk:1;V03:K0:GwZsk0fmGvE=:td6y4KN/Q2rdVN7dR+dJBp lkMWYxJiqG53Oj5miANsFFkes8HaNGT6nXg9KCD6qIZwWzolGJkCvnfGGoUw/f/vd3tHYpzRe K/szPHAtbssaeFQLobK+XTJDnMafXIw+2pozT5ndh/YTtyOI57gkMCXKGLAP4siD2HZr47Fwu J+bu5z3VIbfP8ljigybOlZVRUQbdk2AoTmq7pIW2Kqtl8xp0u3bQdGGW/kdIqfNm4JF/L7FEU g+oso4ZRfoNqqg9eDBgS1eHpRF1IDmGvS11VnBPQdnqjwFq4Yn/6gr2ngDjIrP5iuAwnxLYtH nnFXZmq9ECE6Y6ziMFrc8sKBFOvzyLitJLn/znagiF3PbXlYwHKbjQn/MZLJOSsE1cz8BVA5l NzxJDwJcUfRwLRYUgzeZ/Er6mKGxjc3F51q1QXYDiir42pzdCukR2zk+1oBSXYzq3vVih8r5L 8mX/pHjNy13RAjfBjO66Cd9Ap/YIHtLfWZKwysTEE2OlWVhLOkvXynLSCK4T43mGhil1STf8B tbLZySDKo5sV07JtcnZwFVOCzRtu5XhO/HqSadXoK5V5r9h2IeVk2cMftHb0lXrBWVPc4cJkU djI1wO4f/K3voP5IOcbwDXn3r4WjgU4sYF65IGC6t7AF4Yb4+bYIJjomCA7RfDeF4G679XFAi R6R+/vHl0kE5gmxbdeQC3oYU65aXHUbuT1+o186gHGZhX6QRRoWGLziRFPAUDMTup7ggf2UaZ 30fe50sbBTUeWIqXZPc2z7nwsfm3SZGLvQ1/7iTv9PBrx+MzW0etTfEhRTYCj+528ESJ6PZ1y zId+OPH2Vs8+52RNzkxZrof1fV3NL18bnkx0TsnrVDOGcS5Ei1wZM5J1xbLCxcnYrJqPJXs/k UaWRujQsZ2LzoiF39AnrjV1Eo96xsIDMp8iMe5Eg4phQwXzKRREtGLe3JwfDMBl0WXF9BQc9d TRijQzq2uKvxOoMdoCMTutXTpIRTszCgUreAJPWzd/wUQXDN9k8Eo8j920WrPxhUO3dWpCtcO 8LSsgnRWoJ/AQ0rmueF7rOyd9bDdWenFJE17K9eroax/NdvVASgwr7BfaoHReeS/mNsIPUN0y KHUoJlGGbvoehPCp6Axe1BSMXbAF5DgwHZpkedsgcq5kZxfM3fUMMazOFATMJt14cdPZqPXm1 jpA3LC/aVKo4XrrsFVCJ1h/ntt5Gwgf5BxHbWqemh6fvWAXcBhXtLNOkVBa2p33GVLy8vjpQv ReKoHbMLFcx/de8/ChGiOxKTBLNY/bexVrep5/iF/gsGHTzO6Ecz/uZ3L8LQ= X-Envelope-From: Subject: Re: file_cache is prone to some configuration changes From: cmbecker69@gmx.de ("Christoph M. Becker") On 06.11.2019 at 14:02, Christoph M. Becker wrote: > while having had a closer look at , I > learned that OPcache's file_cache is prone to some configuration > changes, which may cause PHP segfaults (and maybe other malfunctions). > For instance, if Xdebug is enabled while a file is compiled, but later > disabled when executing that file, the process is segfaulting because > the cached file relies on user opcode handlers which are no longer > available without Xdebug loaded. I'm presenting Xdebug as example > because that likely caused the issues reported in that ticket, but > basically any extension can call zend_set_user_opcode_handler() to > install user opcode handlers, causing the same problems. > > It should be mentioned that, to my knowledge, shared memory caches are > not affected by this (except for Windows), because re-attaching a > differently configured php instance isn't possible at all. > > Anyhow, should we fix this (assuming a general fix would be possible), > or would that be rather a documentation issue, based on the assumption > that such configuration changes don't make sense in combination with > OPcache at all (IOW, if such changes are done, users should reset OPcach= e).. Any thoughts regarding this issue? =2D- Christoph M. Becker