ID: 40441 User updated by: dmitry at rsl dot ru Reported By: dmitry at rsl dot ru Status: Bogus Bug Type: mbstring related Operating System: linux PHP Version: 5.2.1 New Comment:
Does your answer mean that any php_value option in .htaccess could be randomly ignored by php when it is built as apache2 module? Previous Comments: ------------------------------------------------------------------------ [2007-02-12 09:52:05] [EMAIL PROTECTED] This Apache2-related problem is described in details in bug #38670. >since we not using safe mode at all safe_mode is just an INI setting, as well as mbstring.func_overload. ------------------------------------------------------------------------ [2007-02-12 09:46:34] dmitry at rsl dot ru I'm not sure that this is duplicate of bug #38670, since we not using safe mode at all. I think that this bug is a kind of http://bugs.php.net/bug.php?id=39361. The problem is that mbstring.function_overload is set to 0 for apache's virtualhost (while mbstring.function_overload = 2 in php.ini), but strstr (and probably others) still overloaded, not always but randomly. No matter if strstr got overloaded or not, ini_get('mbstring.function_overload') is equal to 0 for this virtualhost. ------------------------------------------------------------------------ [2007-02-12 09:21:28] [EMAIL PROTECTED] Duplicate of bug #38670. ------------------------------------------------------------------------ [2007-02-12 09:13:27] dmitry at rsl dot ru how I can provide more information than phpinfo() at http://www.projectharmony.ru/temp-images/qq.php? ------------------------------------------------------------------------ [2007-02-12 08:56:38] [EMAIL PROTECTED] Not enough information was provided for us to be able to handle this bug. Please re-read the instructions at http://bugs.php.net/how-to-report.php If you can provide more information, feel free to add it to this bug and change the status back to "Open". Thank you for your interest in PHP. ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/40441 -- Edit this bug report at http://bugs.php.net/?id=40441&edit=1