Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:113210 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 46785 invoked from network); 18 Feb 2021 23:59:20 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 18 Feb 2021 23:59:20 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 2EDE61804D0 for ; Thu, 18 Feb 2021 15:46:41 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: * X-Spam-Status: No, score=1.1 required=5.0 tests=BAYES_40,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,HTML_MESSAGE,MISSING_HEADERS,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Virus: No X-Envelope-From: Received: from mail-lj1-f173.google.com (mail-lj1-f173.google.com [209.85.208.173]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Thu, 18 Feb 2021 15:46:40 -0800 (PST) Received: by mail-lj1-f173.google.com with SMTP id a17so9436848ljq.2 for ; Thu, 18 Feb 2021 15:46:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:cc; bh=DbRCorrW9S2L4vhriQSPqY2i2Jc8yhxoFfOI++lheT4=; b=CN/Xgw937qvRrAAweFzphsrr0OFLOwfVpnT2bV8ynU3ivukfDH9vC90MHlQcl/OE+j /qNVcjDjeoK6ur0YMpC9bhZTSAKfLsvwFF4Jjg+ZYWKS9j5t9DEuvkP5Vl2rGXhben9w 2F8mzAiULig2mOjpgHQOZIOSWrcSHn5vgmwUMagjlwt05s3h7ttEeuIRFCL51iHuXrrE abkjb5V5wWQqEcxV5SHxgmyuf/YlyhOl2MQqVAHSH6YBApFSMUcniP83193FrQBwUs+P UjoGjZ4o1gkfCO8/aN+3DEQI5rRueMi3sfPmSf3bHnQ+2A6ii5OG8LWCgupEtVuaWHxo pC4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:cc; bh=DbRCorrW9S2L4vhriQSPqY2i2Jc8yhxoFfOI++lheT4=; b=stRC6hE8pNu3EtGiCj3jghD1VgTBtrJbisABNtJsLbGxw3lBJXd5V6OBrfWR/qV/uO 7P32NhAi90XLiCX1cyIEDDm4S+xszJL99d0yBpCsU1Zm8MERhsnaiQuc7GwGJUVWQ8Yk o9AQsn+OocQOxMH5Rjz0v2omaLDRCeJU8icQxL2sUeVLzrxIIWS7oLFy6yeSGi0Lzno8 i9xulY8Si7mXoC/nIadRrN9fpK8rpqwgLt204eQQSfKGfoF8py3B/aeEgEXoiqTMIEet hiWpI3W9grXJwArIImAQioYnkbVhU/CnUT2O+ZrBcDpK0W2pTCBwSDjN6cH+ic66CwRe zxow== X-Gm-Message-State: AOAM533kMstb1JFVXhYqGfu0l7g61Uun+UFLnlAp74j5GQW9b/GhltH8 akKslwhZXS8nvUjXiB7DsGrBnxrwLJ6vnLWC4Uq86Q5RY9k= X-Google-Smtp-Source: ABdhPJzMmI7RrT/PoCyMQQHoif5UZriPYtyOOazzv3WHFL2Kbg3/C1nWkJag3ud5H2AOj3ZamlGKf4cQ1cZEGlLgJic= X-Received: by 2002:a19:3817:: with SMTP id f23mr3616703lfa.591.1613691998339; Thu, 18 Feb 2021 15:46:38 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: Date: Fri, 19 Feb 2021 00:46:27 +0100 Message-ID: Cc: PHP Internals List Content-Type: multipart/alternative; boundary="00000000000056894a05bba4f2d3" Subject: Re: [PHP-DEV] [RFC] [Discussion] Measuring maximum execution time based on wall-time From: kocsismate90@gmail.com (=?UTF-8?B?TcOhdMOpIEtvY3Npcw==?=) --00000000000056894a05bba4f2d3 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Nikita, Something potentially worth pointing out (and assuming I'm inferring the > correct behavior here): If max_execution_wall_time is exceeded during an > internal function call (which seems quite likely, as that's where there i= s > the most potential for something to hang) and the function does not retur= n > within hard_timeout seconds, then the a process abort will be triggered. > The hard_timeout is 2s by default. If any of the individual call timeouts > are >=3D 2s, then it's not unlikely that this situation occurs. > Thanks for bringing this to my attention, I didn't realize this consequence. I'm wondering though if it would be a sane idea to use the current, CPU time based timer for hard_limit even when max_execution_wall_time times out? This way the process abort could be avoided in case of most functions in question, if I got it right. Nevertheless, I'll update the RFC with its relation to hard_timeout in the coming days. As I'd like to proceed with this RFC soon, I'd appreciate any review and constructive feedback. I have two questions for example: - Is the max_execution_wall_time really the best setting name we can come up with? What about something like max_execution_real_time? - Would anyone miss a set_wall_time_limit() function? Regards: M=C3=A1t=C3=A9 --00000000000056894a05bba4f2d3--