Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:124338 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id 003DD1A00B7 for ; Wed, 10 Jul 2024 09:31:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1720604005; bh=MtgfjCXMr/UFerRx5bU+aErSkxLZu4Cwn+de/03nkqw=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=hlQPd3GI6tVaz1IMhnsvNfU9cl0IPU8z3koWXKC+kaS/fj1lrbgtrb8crMpeXKt4I +UoVzADgDbW6FYPhkpKfa8zcoqp/3eI1E83Z2aWTcobe/oyHAoWQuzyNmXeGe4KcC0 g611WxDLozOKFa1tRkZq4dySqQNpxyKqwS7C+tn553dZ5OS+B6oF3qoVUW3pfL1MFC utIxgfbSwPUU2ChFpVG7LlksabMJRJX6HZrdOZzRp89nGevhZOwmKbSy6qs0xHGX// qvZEq7E4f8J9Dw7OtxWfHz/sHf0UwA9KTCtBXlyoywN4XHFtSCO4l/hmc7jtmurWmD cqCnjeBxn9F9g== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id E4F9218007E for ; Wed, 10 Jul 2024 09:33:23 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: *** X-Spam-Status: No, score=3.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_PASS, SPF_SOFTFAIL autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: No X-Envelope-From: Received: from xdebug.org (xdebug.org [82.113.146.227]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 10 Jul 2024 09:33:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1720603915; bh=MtgfjCXMr/UFerRx5bU+aErSkxLZu4Cwn+de/03nkqw=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=kFb5m3Oj+j4S3WvGZgwMVM0LCmdtPLQU1ltbetJYK3OwYudktbjH4eoxstP9ROnSP x+XEpIEzhKHITwZEvTl69h3cBYJGf8Veulh5Dmar87lG/LIPQ5Ttb6QoFZMmv5hKZ4 kO998pGfgJGFBWdwqH7WMK7PuEvlDyJ3FMckGgdg//F0zlsGnixY+h6Fnd6SUlB3/1 7h4pd1q3ezLPTIslw0h9o7MSlgA77FMtohTxmPaPxUxxLxQqxTXzN7LgLalEgrgWOA Z35k6oC5bCa5DOp0wYvwyNZ/OWI7mfxBjxB3wjuNF9qZg6FkmyyCMUfPMEiQWHVEm6 g16MM480dNGiw== Received: from localhost (localhost [IPv6:::1]) by xdebug.org (Postfix) with ESMTPS id 3AD3110C187; Wed, 10 Jul 2024 10:31:54 +0100 (BST) Date: Wed, 10 Jul 2024 10:31:54 +0100 (BST) To: Larry Garfield cc: php internals Subject: Re: [PHP-DEV] [RFC] Property Hook improvements In-Reply-To: Message-ID: <520ee513-d6fe-a658-5845-00296a9e08a2@php.net> References: Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII From: derick@php.net (Derick Rethans) On Mon, 1 Jul 2024, Larry Garfield wrote: > Hi folks. As Ilija's been polishing off hooks to get the PR merged, > we've run into two small revisions that should make life better for > all involved. One is a performance improvement that requires a very > slight error handling behavior change, and the other is enabling > readonly in selected (but probably all of the relevant) circumstances. > > I'd say we expect these to be uncontroversial, but this is PHP. :-) > So I will instead just note that it's a short RFC and open the > discussion accordingly. > > https://wiki.php.net/rfc/hook_improvements 1. Remove the proactive guard against recursive backing value access "which would eventually trigger a stack overflow" Would it though? PHP 8.4 has an actual protection against this now, instead of getting the white-screen-of-death. Not that it matters much, but it's probably good to be precise in the language. cheers, Derick