On February 01, 2004 01:08 pm, you wrote:
> Oh OK. As I mentioned in a previous email I'm not sure this is the best way
> of doing the patch. It should be possible to bailout when the parse error
> is detected.

That was my initial concern as well, however the problem is that any earlier 
attempts to bail out on the parse error result in leaked file handle. For 
example, commenting out E_PARSE error handling in PHP's error handling allows 
the behaviour to be addressed without even touch ZE code. But, the 
consequence is that the opened filehandle is leaked. 

The only other solutions (least code change) is to apply the following patch 
(reverting the original). It seems to handle the problem adequatly.

Index: zend_language_scanner.l
===================================================================
RCS file: /repository/Zend/Attic/zend_language_scanner.l,v
retrieving revision 1.54.2.25
diff -u -3 -p -r1.54.2.25 zend_language_scanner.l
--- zend_language_scanner.l     29 Nov 2003 19:05:59 -0000      1.54.2.25
+++ zend_language_scanner.l     1 Feb 2004 18:27:39 -0000
@@ -383,8 +383,7 @@ ZEND_API zend_op_array *compile_file(zen
                zend_do_return(&retval_znode, 0 TSRMLS_CC);
                CG(in_compilation) = original_in_compilation;
                if (compiler_result==1) { /* parser error */
-                       CG(unclean_shutdown) = 1;
-                       retval = NULL;
+                       zend_bailout();
                }
                compilation_successful=1;
 #ifdef ZEND_MULTIBYTE

Ilia

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to