ID:               36424
 Updated by:       [EMAIL PROTECTED]
 Reported By:      mastabog at hotmail dot com
 Status:           Assigned
 Bug Type:         Scripting Engine problem
 Operating System: *
 PHP Version:      5.1.3RC2-dev
 Assigned To:      helly
 New Comment:

It's still assigned to me.


Previous Comments:
------------------------------------------------------------------------

[2006-06-06 21:21:58] hos dot endre at cafecsoport dot hu

"It's expected and has nothing to do with this report."

I disagree with it, and Im sure Helly will make it work as expected
which means without crash at least.

------------------------------------------------------------------------

[2006-06-06 21:18:52] [EMAIL PROTECTED]

The problem has nothing to do with SPL.

------------------------------------------------------------------------

[2006-06-06 21:04:32] hos dot endre at cafecsoport dot hu

Yes its expected, but IMHO the problem need a featureful fix, not a
limitation.

Im not sure my problem is SPL related.

Here is my workaround:

The native serialize must start counting variables from 1. Outer
references may indexed negative, in case of nested call. Nested native
calls can only called in a native calls context in case of handling a
__serialize() or Serializable::serialize() call. The nested call can
reference as -1 to the topmost calls serialized root object. In case of
a negative reference is unresolvable on unserialization (multiplying by
-1 and querying the topmost pointer remapping), the value is not ready,
and a null value replaces temporarily.

What about a nested call already serialized a variable
that the topmost is willing to serialize? we have that pointer in the
map, but the reference no. might be greater
than the number of locally serialized variables.

If every call starts numbering variables from 1, then the topmost
serialize call also could reference on those hidden
variables by a negative index from the nesting wide accessible map -
not the calls local map. Backwards
if the unserialization process makes it possible, the negative
reference is also resolvable at the time the function processes it.

In case of wrong unserialization order, the negative reference's zval
is created with null, and the time the unserialization reaches that
index, da value's pointer is ready to be casted properly.

I think above mentioned way doesnt violates the syntax or the result of
serialization, this could work for a lot of cases, just like mine.

This way, the following code could produce this:

C:1:"A":93:{a:2:{s:4:"that";C:1:"A":43:{a:2:{s:4:"that";R:-1;s:9:"thatsThat";R:-2;}}s:9:"thatsThat";R:-1;}

class A implements Serializable
{
        public $dontSerialize;
        public $that;
        public $thatsThat;

        function __construct($that = null)
        {
                $this->that = ($that === null) ? new A($this) : $that;
                $this->thatsThat = &$this->that->that;
        }

        function serialize()
        {
                return serialize(array($this->that, $this->thatsThat));
        }

        function unserialize($serialized)
        {
                list($this->that, $this->thatsThat) = unserialize($serialized);
        }
}
echo serialize(new A());

Some more without any class relation, the following script serialises 3
arrays instead of 2 since we are passing a copy of $arr1, but the
_deprecated_ syntax serialize(&$arr1) still works fine.

Documentation says: "recent versions of PHP you will get a warning
saying that "Call-time pass-by-reference" is deprecated when you use a
& in foo(&$a);"

References' syntax are not consequent.

$arr2 = array();
$arr1['that'] = &$arr2;
$arr2['that'] = &$arr1;
$arr1['thatsThat'] = &$arr2['that'];
$arr2['thatsThat'] = &$arr1['that'];
echo serialize($arr1);

Produces:

a:2:{s:4:"that";a:2:{s:4:"that";a:2:{s:4:"that";R:2;s:9:"thatsThat";R:3;}s:9:"thatsThat";R:2;}s:9:"thatsThat";R:3;}

instead of

a:2:{s:4:"that";a:2:{s:4:"that";R:1;s:9:"thatsThat";R:2;}s:9:"thatsThat";R:1;}

------------------------------------------------------------------------

[2006-06-06 19:02:38] [EMAIL PROTECTED]

Yeah, calling a function in an endless loop usually ends up with stack
overflow. It's expected and has nothing to do with this report.

------------------------------------------------------------------------

[2006-06-06 18:51:37] hos dot endre at cafecsoport dot hu

Crashing also reproducable.

Win2000Prof / PHP514

My related problem is that serializing a Serializable object, thats
some object property holds a reference to the serialized root object,
PHP crashes.

The magic function __serialize have too much sideFx for me - making the
object unworkable,
but I cant figure out how nested serialize function calls could work
properly.

Probably when the native serialize function is handles a nested call
then could hook up the root calls pointer map?

And then could this work for nested unserialization?

At this time I have no vision about the sideFx of this mention.

Right now I dont have a prepared C development environment to work out,
and dont remember how the related part of the code workx. As I remember
nested call test was implemented in the __autoload() function.

Since it can cause crashes please take more care on this bug.

Just uncomment 'implements Serializable' to let it crash.

class A // implements Serializable
{
        public $dontSerialize;
        public $that;

        function __construct($that = null)
        {
                $this->that = ($that === null) ? new A($this) : $that;
        }

        function serialize()
        {
                return serialize($this->that);
        }

        function unserialize($serialized)
        {
                $this->that = serialize($serialized);
        }
}

------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/36424

-- 
Edit this bug report at http://bugs.php.net/?id=36424&edit=1

Reply via email to