Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:95431 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 89322 invoked from network); 24 Aug 2016 15:51:27 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 24 Aug 2016 15:51:27 -0000 Authentication-Results: pb1.pair.com header.from=dave+php@mudsite.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=dave@mudsite.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain mudsite.com designates 209.85.217.181 as permitted sender) X-PHP-List-Original-Sender: dave@mudsite.com X-Host-Fingerprint: 209.85.217.181 mail-ua0-f181.google.com Received: from [209.85.217.181] ([209.85.217.181:33924] helo=mail-ua0-f181.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 31/B9-10212-E72CDB75 for ; Wed, 24 Aug 2016 11:51:27 -0400 Received: by mail-ua0-f181.google.com with SMTP id k90so35611855uak.1 for ; Wed, 24 Aug 2016 08:51:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mudsite-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fS0tbklLyhfTmpSLq7cqFKoITTObyCsAI9OB6G19j1g=; b=se5mm8A6C/JjO59/nXoHyvfaLzDM9D/F78kwRqVwrazzGv+hgA6REiZL7tnc6VreVV bgGueQD5/YQCAmA1YL7mq1a4sZEdZ4x6kF51oG3CH3+/ZTQh6L8xbdfCE/WP1ce3sfHP 83QW9lPy64Bok8H6WQ5yw6b0kMgLgTCsQ4WriVKKkJ5Vj4rTIUO1yh5FD7Di8SE0LhUg f/L4jxCL/vHIKHkbj0c5U0rJGu8OZos3imR9qj2h4WR2+4YokNcDPKKUm+NpG5/7CSnN TPrWb3RZ+g9V3phuYfsH4WmDJDb5ALkFgSrojj3ePqF4oV862tXixTnI2rkbZH1dRD02 mu7Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fS0tbklLyhfTmpSLq7cqFKoITTObyCsAI9OB6G19j1g=; b=BNyb7uOOSLjzynLiAJpRQ+6AWV6Lb3O8Cp6utVz79wmKh0SdLG22XCaAtm3Voh+L0n s3IJV3EqcRjxPL6ujXOEuAB5kcnPn3OG2aIKCmZwBiTrISq7o161/F1op5/dI/Xxrc6a WawzJs4Rd2kJHd264G+dCwEDqQZTaLprwOgRiSx6lOZAzyuvODLnOSIyebOlQKn03W62 /AnAi7A+Qpkt94QddKeA97XHOeJXzL2AuKXZzUdT/dZYI3pp8384S57VquJ3TXZ8Xw39 V7geGXOIpmBUxVAD2VnfDYCwx7uP1ta2pFp5S9rDSY7VSlqR9itbVSNpPPKPQ248BR4/ GsOg== X-Gm-Message-State: AEkooutc4UsmQNk0rL8wr0U21i24e+kEf1rBaGE+BsgJmboWVOQXNPi3ipGYxe5/ZPy4nI51sc4FGoH1OQboQg== X-Received: by 10.31.128.85 with SMTP id b82mr1751683vkd.31.1472053883415; Wed, 24 Aug 2016 08:51:23 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: Date: Wed, 24 Aug 2016 15:51:13 +0000 Message-ID: To: bishop@php.net Cc: PHP internals Content-Type: multipart/alternative; boundary=001a114284ced00eca053ad34033 Subject: Re: [PHP-DEV] [RFC][VOTE] E_WARNING on invalid container read-adccess From: dave+php@mudsite.com (David Walker) --001a114284ced00eca053ad34033 Content-Type: text/plain; charset=UTF-8 On Wed, Aug 24, 2016 at 9:36 AM Bishop Bettini wrote: > On Wed, Aug 24, 2016 at 10:58 AM, David Walker > wrote: > >> I'd like to extend the vote through Sunday evening in the event anyone had >> reservations based on potential performance impact. The RFC is currently >> sitting 15-0 in favor. >> > > I'd recommend extending the original end date by a week, since internals > tends to vote in weekly intervals (an informal minimal reasonable response > time, I suppose). > Good to know the general convention here. I'll extend a week until Wednesday the 31st. > > >> (added to RFC) >> Execution Time (DualCore 3ghz; 2g ram) >> * Current Master : ~0.09s (~489k operations) >> * Current Master w/RFC Displaying Warnings: ~33.25s >> * Current Master w/RFC Hiding Warnings: ~0.82s (~4.091m operations) >> >> We can see there is a significant increase in operations on huge loads. >> However, I wouldn't suspect 1m of these errors per request almost ever. >> So, yes there is; but I'd call it useful information overhead. >> > > I've not looked at the code. How much, if at all, does the RFC change the > happy path operation, on a test like this? > > $a = [ 'foo' ]; > for ($i = 0; $i < 1000000; $i++) { $a[0]; } > > Notwithstanding, I feel the ops increase 10x is worth it: this is a subtle > code problem. > That is my thoughts too. When testing this change against my product I uncovered 10 cases of this warning being raised (which was actually helpful), but only ever 2-3 per request. So I'd imagine it's never going to come to the 1m+ happenings per request ever. And for your given test case, since $a[0] is defined (as 'foo') the change in this RFC is not triggered, so there is no difference between any of the testings. -- Dave --001a114284ced00eca053ad34033--