Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:78914 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 97552 invoked from network); 15 Nov 2014 07:56:32 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 15 Nov 2014 07:56:32 -0000 Authentication-Results: pb1.pair.com header.from=php@bof.de; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=php@bof.de; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain bof.de designates 80.242.145.70 as permitted sender) X-PHP-List-Original-Sender: php@bof.de X-Host-Fingerprint: 80.242.145.70 mars.intermailgate.com Received: from [80.242.145.70] ([80.242.145.70:47354] helo=mars.intermailgate.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 8B/41-24496-E2707645 for ; Sat, 15 Nov 2014 02:56:31 -0500 Received: (qmail 24673 invoked by uid 1009); 15 Nov 2014 08:56:28 +0100 Received: from 209.85.192.50 by mars (envelope-from , uid 89) with qmail-scanner-1.25-st-qms (clamdscan: 0.96.2/19630. spamassassin: 3.3.1. perlscan: 1.25-st-qms. Clear:RC:1(209.85.192.50):. Processed in 0.272218 secs); 15 Nov 2014 07:56:28 -0000 X-Antivirus-MYDOMAIN-Mail-From: php@bof.de via mars X-Antivirus-MYDOMAIN: 1.25-st-qms (Clear:RC:1(209.85.192.50):. Processed in 0.272218 secs Process 24649) Received: from mail-qg0-f50.google.com (gmail@bof.de@209.85.192.50) by mars.intermailgate.com with RC4-SHA encrypted SMTP; 15 Nov 2014 08:56:27 +0100 Received: by mail-qg0-f50.google.com with SMTP id e89so2131059qgf.23 for ; Fri, 14 Nov 2014 23:56:26 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.140.22.81 with SMTP id 75mr16874591qgm.19.1416038186773; Fri, 14 Nov 2014 23:56:26 -0800 (PST) Received: by 10.140.37.41 with HTTP; Fri, 14 Nov 2014 23:56:26 -0800 (PST) Received: by 10.140.37.41 with HTTP; Fri, 14 Nov 2014 23:56:26 -0800 (PST) Date: Sat, 15 Nov 2014 08:56:26 +0100 Message-ID: To: Yasuo Ohgaki Cc: internals , Ferenc Kovacs Content-Type: multipart/alternative; boundary=001a11c11c141c76c50507e1152e Subject: Session Lazy Write (was Re: [PHP-DEV] PHP 5.6.3 is available) From: php@bof.de (Patrick Schaaf) --001a11c11c141c76c50507e1152e Content-Type: text/plain; charset=UTF-8 Yasuo, Am 15.11.2014 02:27 schrieb "Yasuo Ohgaki" : > > I've asked this issue on this list and there wasn't much opinion. > I'm rather put the feature in PHP 7, since 3d party session save handler module need to > adopt new API to get most out of it. > > Since master has new code, I'll prepare new patch, hopefully soon. I'm happy with the nothing-changed-so-dont-write stuff getting more love and being released in PHP 7 only. We are using sessions through a small wrapper class that does it in userlevel, i.e. we close our sessions immediately after retrieving their values, stash the values away for later comparison, and in a shutdown handler, see whether $_SESSION changed wrt to that memory, and when it does, open the session again to update the values. I'll be glad to rip out that part of the code eventually, but it works and I can easily wait for PHP 7. What we apparently experienced with memcache session handler in PHP 5.6.2 testing, was that sessions did not get properly unlocked - presumably because the way we do it the session variables are never changed up-front on the first close. Of course further access to the session then hang... best regards Patrick --001a11c11c141c76c50507e1152e--