Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:46222 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 86980 invoked from network); 28 Nov 2009 22:51:05 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 28 Nov 2009 22:51:05 -0000 Authentication-Results: pb1.pair.com header.from=jani.taskinen@sci.fi; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=jani.taskinen@sci.fi; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain sci.fi from 204.13.248.71 cause and error) X-PHP-List-Original-Sender: jani.taskinen@sci.fi X-Host-Fingerprint: 204.13.248.71 mho-01-ewr.mailhop.org Received: from [204.13.248.71] ([204.13.248.71:50277] helo=mho-01-ewr.mailhop.org) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 4A/A6-44817-859A11B4 for ; Sat, 28 Nov 2009 17:51:04 -0500 Received: from cs27025051.pp.htv.fi ([89.27.25.51] helo=[127.0.0.1]) by mho-01-ewr.mailhop.org with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from ) id 1NEW86-0005CO-2L; Sat, 28 Nov 2009 22:51:02 +0000 X-Mail-Handler: MailHop Outbound by DynDNS X-Originating-IP: 89.27.25.51 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1/GhuVia2XJH4C59vRj2XClGLsh2YQTvB0= Message-ID: <4B11AA29.7030105@sci.fi> Date: Sun, 29 Nov 2009 00:54:33 +0200 Reply-To: jani.taskinen@iki.fi User-Agent: Thunderbird 2.0.0.23 (Windows/20090812) MIME-Version: 1.0 To: Gwynne Raskind CC: PHP Internals List References: <7F59B61F-90E6-45E2-9CF3-84051A1CE530@darkrainfall.org> In-Reply-To: <7F59B61F-90E6-45E2-9CF3-84051A1CE530@darkrainfall.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] Backporting bypass_shell and posix_pipe() from trunk to 5.3 From: jani.taskinen@sci.fi (Jani Taskinen) Gwynne Raskind wrote: > Some while ago, I committed a patch to trunk which adds the shell_bypass option to proc_open() on UNIX. I'd like to backport that patch to 5.3.2, along with posix_pipe(), which helps quite a bit in using it. The patch can be found at . It's been tested and run through valgrind and the Clang analyzer. Any reason I shouldn't commit it? I tried to get it into 5.3.0 but the consensus at the time was "let's get this out the door already" :). -1 And buy an enter key. --Jani