History log of /php-src/NEWS (Results 51 – 75 of 14922)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
# 645af9fb 07-Apr-2024 David Carlier

ext/sockets: adding solaris/illumos SO_EXCLBIND constant.

when set to "true", neutralises the effect of SO_REUSEADDR/SO_REUSEPORT
making the socket binding exclusive.

Close GH-1

ext/sockets: adding solaris/illumos SO_EXCLBIND constant.

when set to "true", neutralises the effect of SO_REUSEADDR/SO_REUSEPORT
making the socket binding exclusive.

Close GH-13912

show more ...


# db286934 08-Apr-2024 David Carlier

ext/posix: posix_isatty set errno for it too.

Close GH-13918


# ea026826 08-Apr-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Fix GH-13903: ASAN false positive underflow when executing copy()

Closes GH-13917.


# 0766ac6e 01-Apr-2024 qiangxuhui

loongarch64 support for fibers

Add loongarch64 assembly files from Boost, needed for fibers support,
and hook up loongarch64 fibers support during configure.

Close GH-13914


# 6f8bda05 08-Apr-2024 icy17 <1061499390@qq.com>

Fix potential NULL pointer dereference before calling EVP_SignInit

Closes GH-13870.


# af098acd 21-Mar-2024 Bob Weinand

Always load EX(opline) into the current frame in JIT when observers are enabled

Fixes #13772.
Closes #13776.


# 0da1eb5f 08-Apr-2024 Arnaud Le Blanc

[ci skip] NEWS


# 85d62124 08-Apr-2024 Arnaud Le Blanc

[ci skip] NEWS


# 2aae14c8 05-Apr-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Fix GH-13860: Incorrect PHP_STREAM_OPTION_CHECK_LIVENESS case in ext/openssl/xp_ssl.c - causing use of dead socket

php_socket_errno() may return a stale value when recv returns a
value >

Fix GH-13860: Incorrect PHP_STREAM_OPTION_CHECK_LIVENESS case in ext/openssl/xp_ssl.c - causing use of dead socket

php_socket_errno() may return a stale value when recv returns a
value >= 0. As such, the liveness check is wrong.
This is the same bug as #70198 (fixed in GH-1456). So we fix it in the
same way.

Closes GH-13895.

show more ...


# d8f290057 07-Apr-2024 David Carlier

ext/pcntl: adding pcntl_getcpu.

using sched_getcpu under the hood (Linux and FreeBSD).
Returns the current cpu id for the current process.
For Linux, we need to see beyond the sole p

ext/pcntl: adding pcntl_getcpu.

using sched_getcpu under the hood (Linux and FreeBSD).
Returns the current cpu id for the current process.
For Linux, we need to see beyond the sole presence of the symbol
to consider it.
Mostly useful, for now, in the cpu affinity context since
the os can migrate processes as it sees fits otherwise.

Clos GH-13908

show more ...


# 01817e99 07-Apr-2024 David Carlier

ext/pcntl pcntl_signal_get_handler update.

The situation varies from platform to another, thus taking in
account the complexity of it.

Close GH-13902


# 1cf8291c 05-Apr-2024 David Carlier

ext/pcntl: cpu affinity api introduction.

For now, working on Linux, FreeBSD >= 13.x and DragonFlyBSD.
Handy wrapper to assign an array of cpu ids or to retrieve the cpu ids
assigned

ext/pcntl: cpu affinity api introduction.

For now, working on Linux, FreeBSD >= 13.x and DragonFlyBSD.
Handy wrapper to assign an array of cpu ids or to retrieve the cpu ids
assigned to a given process.

pcntl_setaffinity inserts valid unique cpu ids (within the range of available
cpus).

Close GH-13893

show more ...


# 8367e9cc 06-Apr-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

[ci skip] NEWS


# ae4978a1 03-Apr-2024 David Carlier

ext/pcntl: adding pcntl_setns for Linux >= 5.3

allows a given process to join an existing Linux namespace, relatively
complementary to the existing pcntl_unshare.

Close GH-13878


# dfbad9f2 04-Apr-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

[ci skip] NEWS


# 18d70db0 27-Mar-2024 Cristian Rodríguez

Fix gcc-14 Wcalloc-transposed-args warnings

gcc-14 and later warns of inverted arguments in calloc or
calloc-like __alloc_size__ annotated functions.

Closes GH-13818.


# 46f45a51 01-Apr-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Fix GH-13856: Member access within null pointer of type 'ps_files' in ext/session/mod_files.c

We should not mark the session as opened when there was a failure in
open.

Closes G

Fix GH-13856: Member access within null pointer of type 'ps_files' in ext/session/mod_files.c

We should not mark the session as opened when there was a failure in
open.

Closes GH-13858.

show more ...


# 17f936ee 01-Apr-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

[ci skip] NEWS


# 30885f3b 31-Mar-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Implement request #71571: XSLT processor should provide option to change maxDepth (#13731)

There are two depth limiting parameters for XSLT templates.
1) maxTemplateDepth
This cor

Implement request #71571: XSLT processor should provide option to change maxDepth (#13731)

There are two depth limiting parameters for XSLT templates.
1) maxTemplateDepth
This corresponds to the recursion depth of a template. For very
complicated templates this can be hit.
2) maxTemplateVars
This is the total number of live variables. When using recursive
templates with lots of parameters you can hit this limit.

This patch introduces two new properties to XSLTProcessor that
corresponds to the above variables.

show more ...


# 47bb6c1b 31-Mar-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Fix GH-13833: Applying zero offset to null pointer in zend_hash.c

MAPPHAR_FAIL will call the destructor of the manifest, mounted_dirs, and
virtual_dirs tables. When a new phar object is

Fix GH-13833: Applying zero offset to null pointer in zend_hash.c

MAPPHAR_FAIL will call the destructor of the manifest, mounted_dirs, and
virtual_dirs tables. When a new phar object is allocated using (p)ecalloc,
the bytes are zeroed, but the flag for an uninitialized table is
non-zero. So we have to manually set the flag in case that we have a
code path that can destroy the tables without first initializing them at
least once.

Closes GH-13847.

show more ...


# 5a043c26 30-Mar-2024 Fabrice Fontaine

Zend/zend_call_stack.c: fix build for Linux/uclibc-ng without pthread.

Fix the following build failure without pthread raised since version
8.3.0 and
https://github.com/php/php-src/c

Zend/zend_call_stack.c: fix build for Linux/uclibc-ng without pthread.

Fix the following build failure without pthread raised since version
8.3.0 and
https://github.com/php/php-src/commit/a11c8a30399e90c17c287b9656c0077bc5131c9c:

/home/buildroot/instance-0/output-1/build/php-8.3.4/Zend/zend_call_stack.c:39:11: fatal error: pthread.h: No such file or directory
39 | # include <pthread.h>
| ^~~~~~~~~~~

Fixes:
- http://autobuild.buildroot.org/results/a4ef648a9da50b26ed56d5d490e4cf5a1bfff970

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>

Close GH-13843

show more ...


# ed8ed714 30-Mar-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Fix GH-13836: Renaming a file in a Phar to an already existing filename causes a NULL pointer dereference

If the destination already exists, then the `add` function on the
manifest will

Fix GH-13836: Renaming a file in a Phar to an already existing filename causes a NULL pointer dereference

If the destination already exists, then the `add` function on the
manifest will return NULL, resulting in a NULL entry and therefore a
NULL deref. As `copy()` (not `Phar::copy`) chooses to succeed and
overwrite the destination if it already exists, we should do the same.
Therefore the fix is as simple as changing `add` to `update`.

Closes GH-13840.

show more ...


# d3f1f3ab 28-Mar-2024 Niels Dossche <7771979+nielsdos@users.noreply.github.com>

Fix GH-13827: Null pointer access of type 'zval' in phpdbg_frame

We don't always have the line and filename in a backtrace frame, but
phpdbg assumes we do.

Closes GH-13831.


# c1bd9a93 21-Dec-2023 Jakub Zelenka

Fix GH-10495: feof on OpenSSL stream hangs indefinitely

This fixes the issue with unbounded waiting on SSL_peek which can happen
when only part of the record is fetched. It makes socket

Fix GH-10495: feof on OpenSSL stream hangs indefinitely

This fixes the issue with unbounded waiting on SSL_peek which can happen
when only part of the record is fetched. It makes socket non blocking so
it is possible to verify if OpenSSL is expecting some more data or if
there is an error.

This also fixes bug #79501

Closes GH-13487

show more ...


# c087398c 23-Mar-2024 Jakub Zelenka

Fix GH-13264: Part 1 - Memory leak on filter failure

Closes GH-13790


12345678910>>...597