Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:126113 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id 25E291A00BD for ; Thu, 5 Dec 2024 22:31:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1733437684; bh=QkRP9BTa00vhT8DkNMo+Ye3J8CVTbG6XT8wGKLnUypQ=; h=Date:Subject:To:References:From:In-Reply-To:From; b=iNOTD01n1FvSjPkEIP/S+295N7gtRkuBQapY4I92JUF6dyEQwOC51dARCXPLSwADX yHdF3bBP28jjWfkggSi3Fv4r/eZe7xLP4NajmhE7yabbju9W/yxVDVaQFs3ArcoWRJ e6OBSy793naDx3tmsSMxSZNIBNiVO47IPN+nNubm07veAdOZpflp5HL/5yZvD2bMez pm+ogVMuaTA99dbtL53BAsRGvnw7X1ifGLzPPEpbgZH1d3u4UVKdNn1rv4+BOSXuEi H+P8vvg6oQr8PMScUfwDyl6ATtU3jc8FVhfTg4GN7DM4t6Pb2onyWJsZ+oAQ7M9kFb MJTHn3gaa1dyg== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id A0F83180042 for ; Thu, 5 Dec 2024 22:28:00 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: No X-Envelope-From: Received: from chrono.xqk7.com (chrono.xqk7.com [176.9.45.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Thu, 5 Dec 2024 22:28:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bastelstu.be; s=mail20171119; t=1733437865; bh=KSeN6XHCcixdPQcOMa/5Jem0+lbVbb2h/VPhVvt2AYQ=; h=Message-ID:Date:MIME-Version:Subject:To:References:From: In-Reply-To:Content-Type:from:to:cc:subject:message-id; b=cxoMPUKXdjn7Cj+PKKVCdnAlUJzJgArwojQjEhahfn8qD7IgUo4242b9ZUVpWlI8A ZX/5PnCJPOQ4jduHNQbdGVLJfaDp0jc9yODwOIXdpOKRT4wHx16TN0LGSe0THj9sh+ BfhxfCduoI3hMVUvXJVmBpy2pF/6kM/hhfh62yGwhDHJEi8V+9ZB6R5TKKMUD4rLQE TQiVe+Od/7zZAXEpjub9/T2bJKLLFujFfWuwjPom2Z6z8XiPkQ0WSbI0HSI41fJ0Kb sFuWgmRWl79E6d1i709Ke1vuU9+92NVvhWx/FCPgywi0RZTgg52sqODD9ACMsHJbVB MtbtPcjbsJ/Vg== Message-ID: <8f268a8e-1646-455e-a1c2-b030581dcb9f@bastelstu.be> Date: Thu, 5 Dec 2024 23:31:04 +0100 Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net x-ms-reactions: disallow MIME-Version: 1.0 Subject: Re: [PHP-DEV] [RFC] [Discussion] Error backtraces v2 To: erictnorris@gmail.com, PHP internals References: Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit From: tim@bastelstu.be (=?UTF-8?Q?Tim_D=C3=BCsterhus?=) Hi Thank you for your RFC. This time I'm making sure to comment already during the discussion period :-) On 12/5/24 21:57, Eric Norris wrote: > https://wiki.php.net/rfc/error_backtraces_v2 > > The RFC currently has two voting choices, the first is to accept an > INI setting to configure an error mask for backtraces, and the second > is to choose the default value for the error mask. You are not restricted to Yes/No votes for the voting widgets. I suggest to rephrase the second voting widget to: "What should the default value of the 'error_backtrace_recording' INI be?" - E_FATAL_ERRORS - 0 This avoids the complicated sentence above the voting widget. The “php.ini Defaults” section should probably refer to the voting widget as well. The first voting widget would probably be better phrased as: "Add the 'error_backtrace_recording' INI as described?" --- As for the RFC contents, I had a look at the previous discussion. Dan remarked that adding the backtrace to `error_get_last()` would keep any parameters to functions in the stack trace alive until the next error occurs. This can easily break RAII patterns, such as this example: https://3v4l.org/i6EOv