Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72272 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 22335 invoked from network); 5 Feb 2014 13:47:02 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 5 Feb 2014 13:47:02 -0000 Authentication-Results: pb1.pair.com smtp.mail=cryptocompress@googlemail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=cryptocompress@googlemail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain googlemail.com designates 209.85.215.179 as permitted sender) X-PHP-List-Original-Sender: cryptocompress@googlemail.com X-Host-Fingerprint: 209.85.215.179 mail-ea0-f179.google.com Received: from [209.85.215.179] ([209.85.215.179:59183] helo=mail-ea0-f179.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id CA/87-09402-4D042F25 for ; Wed, 05 Feb 2014 08:47:01 -0500 Received: by mail-ea0-f179.google.com with SMTP id q10so202635ead.10 for ; Wed, 05 Feb 2014 05:46:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type; bh=CGNyI7rUa7vhxteAw+8cmjaXrmXht65ijKcOUIdxvsU=; b=EWh+HUkrH6UpCQ0CoG/YZlv99/l03KIMUDXDU09MAYHjqKIttp5uhnriV6TxfwMmOA IxI/sweVuC8pHA8A4WjpLW4Wlw0wXXzr9Z9tefGFznuP01djPbIIxMATQYwPytv3IIaC rvu7cRBOEJfxxQbPJASFR18xXOYfxJ6v24ywFMupmy+UHGS0wFG0BOv8E/nllOfaIe9n Y//BF1fSGCNxSWt+xRWUbvXsqizVznrym0d37qgR786U37beO45ZBQPWbWxq7aDdRC/B OdLMocqtCtgMLomlRrJTTs6jjP7woeKCBU2/42gasq3evkoFvVMcijqGQxkzV+DcftTk jKJg== X-Received: by 10.15.36.196 with SMTP id i44mr2123359eev.104.1391608018263; Wed, 05 Feb 2014 05:46:58 -0800 (PST) Received: from [192.168.1.115] (mnch-5d856266.pool.mediaWays.net. [93.133.98.102]) by mx.google.com with ESMTPSA id b41sm102411142eef.16.2014.02.05.05.46.55 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 05 Feb 2014 05:46:56 -0800 (PST) Message-ID: <52F240CA.3080909@googlemail.com> Date: Wed, 05 Feb 2014 14:46:50 +0100 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0 MIME-Version: 1.0 To: Yasuo Ohgaki , tjerk.meesters@gmail.com CC: Sara Golemon , PHP Developers Mailing List References: <52F00437.7010903@googlemail.com> <52F005E6.6090702@googlemail.com> <52F0D36B.7010905@googlemail.com> In-Reply-To: Content-Type: multipart/alternative; boundary="------------020601010106070107090508" Subject: Re: [PHP-DEV] [RFC] [VOTE] __debugInfo() From: cryptocompress@googlemail.com (Crypto Compress) --------------020601010106070107090508 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Hi! > > 1. Can this hook be bypassed or disabled (global/temporary)? > > e.g. real_var_dump(), ini setting, some other flag? > > > > 2. What will be affected by this hook beside "var_dump"? > > e.g. xdebug output, var_export, ... > > > > 3. How would this behave (segfault?): > > public function __debugInfo() { var_dump($this); return []; } > > > > Yeah, there doesn't seem to be any recursion protection, just like: > > public function __toString() { return (string)$this; } > > > It is the same as > > function f() { > f(); > } > > User may do that, but it's a documentation problem. > It would be not obvious as function call recursion. > and must be documented, probably. > var_dump has *no* recursion check unlike print_r --------------020601010106070107090508--