#
645af9fb |
| 07-Apr-2024 |
David Carlier |
ext/sockets: adding solaris/illumos SO_EXCLBIND constant. when set to "true", neutralises the effect of SO_REUSEADDR/SO_REUSEPORT making the socket binding exclusive. Close GH-1
ext/sockets: adding solaris/illumos SO_EXCLBIND constant. when set to "true", neutralises the effect of SO_REUSEADDR/SO_REUSEPORT making the socket binding exclusive. Close GH-13912
show more ...
|
#
db286934 |
| 08-Apr-2024 |
David Carlier |
ext/posix: posix_isatty set errno for it too. Close GH-13918
|
#
ea026826 |
| 08-Apr-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Fix GH-13903: ASAN false positive underflow when executing copy() Closes GH-13917.
|
#
0766ac6e |
| 01-Apr-2024 |
qiangxuhui |
loongarch64 support for fibers Add loongarch64 assembly files from Boost, needed for fibers support, and hook up loongarch64 fibers support during configure. Close GH-13914
|
#
6f8bda05 |
| 08-Apr-2024 |
icy17 <1061499390@qq.com> |
Fix potential NULL pointer dereference before calling EVP_SignInit Closes GH-13870.
|
#
af098acd |
| 21-Mar-2024 |
Bob Weinand |
Always load EX(opline) into the current frame in JIT when observers are enabled Fixes #13772. Closes #13776.
|
#
0da1eb5f |
| 08-Apr-2024 |
Arnaud Le Blanc |
[ci skip] NEWS
|
#
85d62124 |
| 08-Apr-2024 |
Arnaud Le Blanc |
[ci skip] NEWS
|
#
2aae14c8 |
| 05-Apr-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Fix GH-13860: Incorrect PHP_STREAM_OPTION_CHECK_LIVENESS case in ext/openssl/xp_ssl.c - causing use of dead socket php_socket_errno() may return a stale value when recv returns a value >
Fix GH-13860: Incorrect PHP_STREAM_OPTION_CHECK_LIVENESS case in ext/openssl/xp_ssl.c - causing use of dead socket php_socket_errno() may return a stale value when recv returns a value >= 0. As such, the liveness check is wrong. This is the same bug as #70198 (fixed in GH-1456). So we fix it in the same way. Closes GH-13895.
show more ...
|
#
d8f290057 |
| 07-Apr-2024 |
David Carlier |
ext/pcntl: adding pcntl_getcpu. using sched_getcpu under the hood (Linux and FreeBSD). Returns the current cpu id for the current process. For Linux, we need to see beyond the sole p
ext/pcntl: adding pcntl_getcpu. using sched_getcpu under the hood (Linux and FreeBSD). Returns the current cpu id for the current process. For Linux, we need to see beyond the sole presence of the symbol to consider it. Mostly useful, for now, in the cpu affinity context since the os can migrate processes as it sees fits otherwise. Clos GH-13908
show more ...
|
#
01817e99 |
| 07-Apr-2024 |
David Carlier |
ext/pcntl pcntl_signal_get_handler update. The situation varies from platform to another, thus taking in account the complexity of it. Close GH-13902
|
#
1cf8291c |
| 05-Apr-2024 |
David Carlier |
ext/pcntl: cpu affinity api introduction. For now, working on Linux, FreeBSD >= 13.x and DragonFlyBSD. Handy wrapper to assign an array of cpu ids or to retrieve the cpu ids assigned
ext/pcntl: cpu affinity api introduction. For now, working on Linux, FreeBSD >= 13.x and DragonFlyBSD. Handy wrapper to assign an array of cpu ids or to retrieve the cpu ids assigned to a given process. pcntl_setaffinity inserts valid unique cpu ids (within the range of available cpus). Close GH-13893
show more ...
|
#
8367e9cc |
| 06-Apr-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
[ci skip] NEWS
|
#
ae4978a1 |
| 03-Apr-2024 |
David Carlier |
ext/pcntl: adding pcntl_setns for Linux >= 5.3 allows a given process to join an existing Linux namespace, relatively complementary to the existing pcntl_unshare. Close GH-13878
|
#
dfbad9f2 |
| 04-Apr-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
[ci skip] NEWS
|
#
18d70db0 |
| 27-Mar-2024 |
Cristian Rodríguez |
Fix gcc-14 Wcalloc-transposed-args warnings gcc-14 and later warns of inverted arguments in calloc or calloc-like __alloc_size__ annotated functions. Closes GH-13818.
|
#
46f45a51 |
| 01-Apr-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Fix GH-13856: Member access within null pointer of type 'ps_files' in ext/session/mod_files.c We should not mark the session as opened when there was a failure in open. Closes G
Fix GH-13856: Member access within null pointer of type 'ps_files' in ext/session/mod_files.c We should not mark the session as opened when there was a failure in open. Closes GH-13858.
show more ...
|
#
17f936ee |
| 01-Apr-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
[ci skip] NEWS
|
#
30885f3b |
| 31-Mar-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Implement request #71571: XSLT processor should provide option to change maxDepth (#13731) There are two depth limiting parameters for XSLT templates. 1) maxTemplateDepth This cor
Implement request #71571: XSLT processor should provide option to change maxDepth (#13731) There are two depth limiting parameters for XSLT templates. 1) maxTemplateDepth This corresponds to the recursion depth of a template. For very complicated templates this can be hit. 2) maxTemplateVars This is the total number of live variables. When using recursive templates with lots of parameters you can hit this limit. This patch introduces two new properties to XSLTProcessor that corresponds to the above variables.
show more ...
|
#
47bb6c1b |
| 31-Mar-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Fix GH-13833: Applying zero offset to null pointer in zend_hash.c MAPPHAR_FAIL will call the destructor of the manifest, mounted_dirs, and virtual_dirs tables. When a new phar object is
Fix GH-13833: Applying zero offset to null pointer in zend_hash.c MAPPHAR_FAIL will call the destructor of the manifest, mounted_dirs, and virtual_dirs tables. When a new phar object is allocated using (p)ecalloc, the bytes are zeroed, but the flag for an uninitialized table is non-zero. So we have to manually set the flag in case that we have a code path that can destroy the tables without first initializing them at least once. Closes GH-13847.
show more ...
|
#
5a043c26 |
| 30-Mar-2024 |
Fabrice Fontaine |
Zend/zend_call_stack.c: fix build for Linux/uclibc-ng without pthread. Fix the following build failure without pthread raised since version 8.3.0 and https://github.com/php/php-src/c
Zend/zend_call_stack.c: fix build for Linux/uclibc-ng without pthread. Fix the following build failure without pthread raised since version 8.3.0 and https://github.com/php/php-src/commit/a11c8a30399e90c17c287b9656c0077bc5131c9c: /home/buildroot/instance-0/output-1/build/php-8.3.4/Zend/zend_call_stack.c:39:11: fatal error: pthread.h: No such file or directory 39 | # include <pthread.h> | ^~~~~~~~~~~ Fixes: - http://autobuild.buildroot.org/results/a4ef648a9da50b26ed56d5d490e4cf5a1bfff970 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Close GH-13843
show more ...
|
#
ed8ed714 |
| 30-Mar-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Fix GH-13836: Renaming a file in a Phar to an already existing filename causes a NULL pointer dereference If the destination already exists, then the `add` function on the manifest will
Fix GH-13836: Renaming a file in a Phar to an already existing filename causes a NULL pointer dereference If the destination already exists, then the `add` function on the manifest will return NULL, resulting in a NULL entry and therefore a NULL deref. As `copy()` (not `Phar::copy`) chooses to succeed and overwrite the destination if it already exists, we should do the same. Therefore the fix is as simple as changing `add` to `update`. Closes GH-13840.
show more ...
|
#
d3f1f3ab |
| 28-Mar-2024 |
Niels Dossche <7771979+nielsdos@users.noreply.github.com> |
Fix GH-13827: Null pointer access of type 'zval' in phpdbg_frame We don't always have the line and filename in a backtrace frame, but phpdbg assumes we do. Closes GH-13831.
|
#
c1bd9a93 |
| 21-Dec-2023 |
Jakub Zelenka |
Fix GH-10495: feof on OpenSSL stream hangs indefinitely This fixes the issue with unbounded waiting on SSL_peek which can happen when only part of the record is fetched. It makes socket
Fix GH-10495: feof on OpenSSL stream hangs indefinitely This fixes the issue with unbounded waiting on SSL_peek which can happen when only part of the record is fetched. It makes socket non blocking so it is possible to verify if OpenSSL is expecting some more data or if there is an error. This also fixes bug #79501 Closes GH-13487
show more ...
|
#
c087398c |
| 23-Mar-2024 |
Jakub Zelenka |
Fix GH-13264: Part 1 - Memory leak on filter failure Closes GH-13790
|