ID:               30153
 Updated by:       [EMAIL PROTECTED]
 Reported By:      OvdSpek at LIACS dot NL
-Status:           Open
+Status:           Bogus
 Bug Type:         Zlib Related
 Operating System: *
 PHP Version:      4CVS, 5CVS (20040929)
 New Comment:

This is not a support forum, there is no bug here. Stop reopening it.


Previous Comments:
------------------------------------------------------------------------

[2004-10-01 11:38:18] OvdSpek at LIACS dot NL

And why are there no 'friends' that do not abort?

------------------------------------------------------------------------

[2004-10-01 11:21:59] OvdSpek at LIACS dot NL

So what does the allow_failure parameter do?

------------------------------------------------------------------------

[2004-10-01 11:19:08] [EMAIL PROTECTED]

No, emalloc() and friends abort in case of a memory overflow, Checking
for the return value does not make any sense.

------------------------------------------------------------------------

[2004-10-01 11:17:11] OvdSpek at LIACS dot NL

> which results in graceful request termination.

Is a call to exit() graceful request termination?
In my opinion, that's just killing the entire process.
And in the case of a multi-threaded server, that's equivalent to
killing the entire server.

BTW, erealloc has an allow_failure parameter. How about passing true at
/php4/ext/zlib/zlib.c:628?

ZEND_API void *_erealloc(void *ptr, size_t size, int allow_failure
ZEND_FILE_LINE_DC ZEND_FILE_LINE_ORIG_DC)

------------------------------------------------------------------------

[2004-10-01 11:06:10] OvdSpek at LIACS dot NL

But /php4/ext/zlib/zlib.c is your code right? Not the code from the
zlib authors?
The bug isn't in zlib owned code, it's in php owned code, and that's
your code.

This code indeed expects to get NULL if erealloc fails.
Is there a flag for erealloc or function to use that doesn't 'cause an
exception' and instead just returns NULL?

s2 = (char *) erealloc(s1,length);
if(! s2) { if(s1) efree(s1); RETURN_FALSE; }

------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/30153

-- 
Edit this bug report at http://bugs.php.net/?id=30153&edit=1

Reply via email to