Bug #63652 [Opn->Nab]: Using twice the same trait causes fatal error.

2012-12-03 Thread laruence
Edit report at https://bugs.php.net/bug.php?id=63652&edit=1

 ID: 63652
 Updated by: larue...@php.net
 Reported by:stealz at op dot pl
 Summary:Using twice the same trait causes fatal error.
-Status: Open
+Status: Not a bug
 Type:   Bug
 Package:Class/Object related
 Operating System:   Windows 7
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

use a triat means copy the methods of traits into the dst class table.

so, they are not the same method after copied.


Previous Comments:

[2012-12-01 14:05:28] stealz at op dot pl

Thank you for your reply.
PHP had warned me indeed, but it doesn't change the fact that, as I wrote, this 
is exactly the same method of exactly the same trait, so it shouldn't be 
colliding at all.
Can you please prove me wrong?


[2012-12-01 05:52:37] larue...@php.net

I think PHP had warn you about method collisions..


[2012-12-01 05:52:32] larue...@php.net

I think PHP had warn you about method collisions..


[2012-11-30 01:48:47] stealz at op dot pl

Description:

I think PHP should check whether traits were used already (ex. in parent class) 
and ignore them instead using again. It causes fatal error due to collisions 
which are obvious, because trait name is the same.
What's interesting, collisions refer only to methods. PHP seems not to see the 
problem if double-used trait contains properties only.

Test script:
---
trait LifeOrganism {
public $age; // it's fine
#public function live() {} // uncomment to get Fatal error
}

trait Man {
use LifeOrganism;
}

trait Elephant {
use LifeOrganism;
}

class ElephantMan {
use Man, Elephant;
}

Expected result:

Ignore trait which was already used.

Actual result:
--
Fatal error.






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63652&edit=1


Req #49366 [Com]: Make slash escaping optional in json_encode()

2012-12-03 Thread php dot net at site dot lanzz dot org
Edit report at https://bugs.php.net/bug.php?id=49366&edit=1

 ID: 49366
 Comment by: php dot net at site dot lanzz dot org
 Reported by:don at smugmug dot com
 Summary:Make slash escaping optional in json_encode()
 Status: Closed
 Type:   Feature/Change Request
 Package:JSON related
 Operating System:   CentOS 5.3
 PHP Version:5.3.0
 Assigned To:aharvey
 Block user comment: N
 Private report: N

 New Comment:

To me, this issue is just magic quotes being still alive and well, in the year 
2012. I thought the lesson of "don't overquote when you don't have to" has been 
learned already? Granted, this issue is marginally better than the magic quotes 
fiasco, as it doesn't actually change the semantics of the escaped value.


Previous Comments:

[2012-03-02 17:26:48] diego dot pasc at tiscali dot it

I also agree that NOT ESCAPING should be the default


[2011-12-16 01:37:05] don at smugmug dot com

I totally agree that this should just be the default, rather than some new 
option. 

Both ways are 100% JSON compliant, but one (the PHP chosen method) is far less 
common, has a significantly larger footprint on lots of common types of data, 
and 
is harder for humans to read.  I see no benefit t


[2011-12-15 22:05:06] dtremblay dot fafard at gmail dot com

Actually, I can't find any reason why is escaping slashes by default and create 
an option to remove this feature.  Usually, when you want something added (e.g. 
Escaping Slashes), you use an option to recreate the feature wanted. So why is 
the option used to REMOVE a feature? Options exists to add features, not remove 
them?? Where am I wrong?


[2010-09-16 15:53:38] ahar...@php.net

This bug has been fixed in SVN.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.

I've implemented this on trunk via a json_encode() option called 
JSON_UNESCAPED_SLASHES. The default behaviour remains to escape slashes.


[2010-09-16 15:53:29] ahar...@php.net

Automatic comment from SVN on behalf of aharvey
Revision: http://svn.php.net/viewvc/?view=revision&revision=303421
Log: Implemented FR #49366 (Make slash escaping optional in json_encode()).




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=49366


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=49366&edit=1


Bug #63637 [Opn->Fbk]: POST value duplicated when passed to PHP

2012-12-03 Thread mike
Edit report at https://bugs.php.net/bug.php?id=63637&edit=1

 ID: 63637
 Updated by: m...@php.net
 Reported by:sarciszewski at knights dot ucf dot edu
 Summary:POST value duplicated when passed to PHP
-Status: Open
+Status: Feedback
 Type:   Bug
 Package:Apache2 related
 Operating System:   Debian
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

What PHP extensions are loaded?


Previous Comments:

[2012-11-28 18:03:39] sarciszewski at knights dot ucf dot edu

Downgrading to PHP 5.3.19 resolved the issue. Is there something in the code 
that links Apache2 and PHP 5.4.9 that could be causing this problem? It wasn't 
causing issues in 5.4.8


[2012-11-28 17:24:01] sarciszewski at knights dot ucf dot edu

Description:

Originally I thought this was an Apache bug since php://input held duplicate 
POST data. https://issues.apache.org/bugzilla/show_bug.cgi?id=54218 - However, 
Perl correctly reads single values.

admin@summit:$uname -a
Linux summit 2.6.26-2-686-bigmem #1 SMP Sun Mar 4 23:05:22 UTC 2012 i686 
GNU/Linux
admin@summit:$/usr/sbin/apache2 -v
Server version: Apache/2.2.16 (Debian)
Server built:   Sep  9 2012 21:17:33
admin@summit:$ /usr/bin/php5 -v
PHP 5.4.9-1~dotdeb.0 (cli) (built: Nov 26 2012 04:24:47)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies

Test script:
---

This duplicates:




This doesn't:






Expected result:

Output (first button):
menu=Blah
=
array(1) {
  ["menu"]=>
  string(4) "Blah"
}
Output (second button):
menu=Blah&second=Second+value
=
array(2) {
  ["menu"]=>
  string(4) "Blah"
  ["second"]=>
  string(12) "Second value"
}

Actual result:
--
Output (first button):
menu=Blahmenu=Blah
=
array(1) {
  ["menu"]=>
  string(13) "Blahmenu=Blah"
}
Output (second button):
menu=Blah&second=Second+valuemenu=Blah&second=Second+value
=
array(2) {
  ["menu"]=>
  string(4) "Blah"
  ["second"]=>
  string(12) "Second value"
}






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63637&edit=1


Bug #63637 [Com]: POST value duplicated when passed to PHP

2012-12-03 Thread sarciszewski at knights dot ucf dot edu
Edit report at https://bugs.php.net/bug.php?id=63637&edit=1

 ID: 63637
 Comment by: sarciszewski at knights dot ucf dot edu
 Reported by:sarciszewski at knights dot ucf dot edu
 Summary:POST value duplicated when passed to PHP
 Status: Feedback
 Type:   Bug
 Package:Apache2 related
 Operating System:   Debian
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

Whatever gets installed via:
apt-get install php5 php5-common php5-mysql php5-cli php5-curl

>From the dotdeb repository (which offers 5.4)


Previous Comments:

[2012-12-03 09:32:16] m...@php.net

What PHP extensions are loaded?


[2012-11-28 18:03:39] sarciszewski at knights dot ucf dot edu

Downgrading to PHP 5.3.19 resolved the issue. Is there something in the code 
that links Apache2 and PHP 5.4.9 that could be causing this problem? It wasn't 
causing issues in 5.4.8


[2012-11-28 17:24:01] sarciszewski at knights dot ucf dot edu

Description:

Originally I thought this was an Apache bug since php://input held duplicate 
POST data. https://issues.apache.org/bugzilla/show_bug.cgi?id=54218 - However, 
Perl correctly reads single values.

admin@summit:$uname -a
Linux summit 2.6.26-2-686-bigmem #1 SMP Sun Mar 4 23:05:22 UTC 2012 i686 
GNU/Linux
admin@summit:$/usr/sbin/apache2 -v
Server version: Apache/2.2.16 (Debian)
Server built:   Sep  9 2012 21:17:33
admin@summit:$ /usr/bin/php5 -v
PHP 5.4.9-1~dotdeb.0 (cli) (built: Nov 26 2012 04:24:47)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies

Test script:
---

This duplicates:




This doesn't:






Expected result:

Output (first button):
menu=Blah
=
array(1) {
  ["menu"]=>
  string(4) "Blah"
}
Output (second button):
menu=Blah&second=Second+value
=
array(2) {
  ["menu"]=>
  string(4) "Blah"
  ["second"]=>
  string(12) "Second value"
}

Actual result:
--
Output (first button):
menu=Blahmenu=Blah
=
array(1) {
  ["menu"]=>
  string(13) "Blahmenu=Blah"
}
Output (second button):
menu=Blah&second=Second+valuemenu=Blah&second=Second+value
=
array(2) {
  ["menu"]=>
  string(4) "Blah"
  ["second"]=>
  string(12) "Second value"
}






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63637&edit=1


Bug #63570 [PATCH]: Bogus warning 'Operation now in progress'

2012-12-03 Thread osma...@php.net
Edit report at https://bugs.php.net/bug.php?id=63570&edit=1

 ID: 63570
 Patch added by: osma...@php.net
 Reported by:kakserpompoyaitsam at gmail dot com
 Summary:Bogus warning 'Operation now in progress'
 Status: Open
 Type:   Bug
 Package:Sockets related
 Operating System:   linux
 PHP Version:5.4.8
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: ignore-warnings-for-nonblocking
Revision:   1354535643
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-warnings-for-nonblocking&revision=1354535643


Previous Comments:

[2012-11-28 12:41:30] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-EINPROGRESS-warning-nonblocking-2
Revision:   1354106490
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking-2&revision=1354106490


[2012-11-28 12:40:08] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-EINPROGRESS-warning-nonblocking
Revision:   1354106408
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking&revision=1354106408


[2012-11-28 12:33:54] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-EINPROGRESS-warning
Revision:   1354106034
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning&revision=1354106034


[2012-11-21 17:24:08] kakserpompoyaitsam at gmail dot com

It would awesome if you include it to 5.5.


[2012-11-21 05:52:36] kakserpompoyaitsam at gmail dot com

Description:

When I'm getting annoying warning while working with non-blocking socket,
For instance: socket_connect(): unable to connect [115]: Operation now in 
progress
Hence, I have to use @socket_connect and the performance getting compromised.
I do use pecl-libevent, and this error makes no sense at all.
Please do not ignore this little defect, Thank you in advance.

Test script:
---
https://bugs.php.net/bug.php?id=63570&edit=1


Bug #63570 [Com]: Bogus warning 'Operation now in progress'

2012-12-03 Thread osma...@php.net
Edit report at https://bugs.php.net/bug.php?id=63570&edit=1

 ID: 63570
 Comment by: osma...@php.net
 Reported by:kakserpompoyaitsam at gmail dot com
 Summary:Bogus warning 'Operation now in progress'
 Status: Open
 Type:   Bug
 Package:Sockets related
 Operating System:   linux
 PHP Version:5.4.8
 Block user comment: N
 Private report: N

 New Comment:

I've uploaded a simple patch. But I'd rather do it via exceptions as in other 
languages like Python.


Previous Comments:

[2012-12-03 11:54:03] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-warnings-for-nonblocking
Revision:   1354535643
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-warnings-for-nonblocking&revision=1354535643


[2012-11-28 12:41:30] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-EINPROGRESS-warning-nonblocking-2
Revision:   1354106490
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking-2&revision=1354106490


[2012-11-28 12:40:08] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-EINPROGRESS-warning-nonblocking
Revision:   1354106408
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking&revision=1354106408


[2012-11-28 12:33:54] osma...@php.net

The following patch has been added/updated:

Patch Name: ignore-EINPROGRESS-warning
Revision:   1354106034
URL:
https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning&revision=1354106034


[2012-11-21 17:24:08] kakserpompoyaitsam at gmail dot com

It would awesome if you include it to 5.5.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=63570


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63570&edit=1


Bug #63528 [Com]: Generators crash on Zend\tests\generators\clone_with_stack.phpt

2012-12-03 Thread a...@php.net
Edit report at https://bugs.php.net/bug.php?id=63528&edit=1

 ID: 63528
 Comment by: a...@php.net
 Reported by:a...@php.net
 Summary:Generators crash on
 Zend\tests\generators\clone_with_stack.phpt
 Status: Assigned
 Type:   Bug
 Package:*General Issues
 Operating System:   Windows
 PHP Version:5.5Git-2012-11-15 (Git)
 Assigned To:nikic
 Block user comment: N
 Private report: N

 New Comment:

nikic, any progress on this one?


Previous Comments:

[2012-11-22 20:31:41] a...@php.net

No, only the mentioned test fails for me. Newly tested with both TS and NTS 
snaps from Nov 22th http://windows.php.net/downloads/snaps/php-5.5/ . A way to 
repro your fails?


[2012-11-21 12:04:07] ni...@php.net

Is this the only test that is failing for you?

I just played around with it on Windows and for me anything involving pushed 
stack arguments crashes. E.g. the yield_during_function_call test.


[2012-11-15 15:57:05] a...@php.net

Btw. there are no valgrind complains on Linux for this test.


[2012-11-15 14:35:20] a...@php.net

Description:

Both TS and NTS crash. On a debug build VS gives the following error:

Unhandled exception at 0x102D369E (php5ts_debug.dll) in php.exe: 0xC005: 
Access violation reading location 0x5A5A5A56.

and the debugger stops in zend_execute.h:337 (second line in 
zend_vm_stack_clear_multiple()). 

Here is the corresponding BT:

php5ts_debug.dll!zend_vm_stack_clear_multiple(void * * * tsrm_ls) Line 
337  C
php5ts_debug.dll!zend_do_fcall_common_helper_SPEC(_zend_execute_data * 
execute_data, void * * * tsrm_ls) Line 736   C
php5ts_debug.dll!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER(_zend_execute_data 
* execute_data, void * * * tsrm_ls) Line 879 C
php5ts_debug.dll!execute_ex(_zend_execute_data * execute_data, void * * 
* tsrm_ls) Line 436 C
php5ts_debug.dll!execute(_zend_op_array * op_array, void * * * tsrm_ls) 
Line 461C
php5ts_debug.dll!zend_execute_scripts(int type, void * * * tsrm_ls, 
_zval_struct * * retval, int file_count, ...) Line 1309 C
php5ts_debug.dll!php_execute_script(_zend_file_handle * primary_file, 
void * * * tsrm_ls) Line 2468 C
php.exe!do_cli(int argc, char * * argv, void * * * tsrm_ls) Line 988
C
php.exe!main(int argc, char * * argv) Line 1364 C
php.exe!__tmainCRTStartup() Line 582C
php.exe!mainCRTStartup() Line 399   C
kernel32.dll!76971866() Unknown
[Frames below may be incorrect and/or missing, no symbols loaded for 
kernel32.dll]  
ntdll.dll!770668f1()Unknown
ntdll.dll!7706689d()Unknown
 

Test script:
---
Zend\tests\generators\clone_with_stack.phpt

Expected result:

Test diff:

001+
001- string(10) "xx"

Actual result:
--
test pass






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63528&edit=1


Bug #63528 [Com]: Generators crash on Zend\tests\generators\clone_with_stack.phpt

2012-12-03 Thread ni...@php.net
Edit report at https://bugs.php.net/bug.php?id=63528&edit=1

 ID: 63528
 Comment by: ni...@php.net
 Reported by:a...@php.net
 Summary:Generators crash on
 Zend\tests\generators\clone_with_stack.phpt
 Status: Assigned
 Type:   Bug
 Package:*General Issues
 Operating System:   Windows
 PHP Version:5.5Git-2012-11-15 (Git)
 Assigned To:nikic
 Block user comment: N
 Private report: N

 New Comment:

@ab: I just tried the current build (php-5.5-nts-windows-vc9-x86-r262decd) and 
this does not occur anymore. I think that dmitry's changes fixed this as a side 
effect. Does the issue persist for you?


Previous Comments:

[2012-12-03 14:22:17] a...@php.net

nikic, any progress on this one?


[2012-11-22 20:31:41] a...@php.net

No, only the mentioned test fails for me. Newly tested with both TS and NTS 
snaps from Nov 22th http://windows.php.net/downloads/snaps/php-5.5/ . A way to 
repro your fails?


[2012-11-21 12:04:07] ni...@php.net

Is this the only test that is failing for you?

I just played around with it on Windows and for me anything involving pushed 
stack arguments crashes. E.g. the yield_during_function_call test.


[2012-11-15 15:57:05] a...@php.net

Btw. there are no valgrind complains on Linux for this test.


[2012-11-15 14:35:20] a...@php.net

Description:

Both TS and NTS crash. On a debug build VS gives the following error:

Unhandled exception at 0x102D369E (php5ts_debug.dll) in php.exe: 0xC005: 
Access violation reading location 0x5A5A5A56.

and the debugger stops in zend_execute.h:337 (second line in 
zend_vm_stack_clear_multiple()). 

Here is the corresponding BT:

php5ts_debug.dll!zend_vm_stack_clear_multiple(void * * * tsrm_ls) Line 
337  C
php5ts_debug.dll!zend_do_fcall_common_helper_SPEC(_zend_execute_data * 
execute_data, void * * * tsrm_ls) Line 736   C
php5ts_debug.dll!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER(_zend_execute_data 
* execute_data, void * * * tsrm_ls) Line 879 C
php5ts_debug.dll!execute_ex(_zend_execute_data * execute_data, void * * 
* tsrm_ls) Line 436 C
php5ts_debug.dll!execute(_zend_op_array * op_array, void * * * tsrm_ls) 
Line 461C
php5ts_debug.dll!zend_execute_scripts(int type, void * * * tsrm_ls, 
_zval_struct * * retval, int file_count, ...) Line 1309 C
php5ts_debug.dll!php_execute_script(_zend_file_handle * primary_file, 
void * * * tsrm_ls) Line 2468 C
php.exe!do_cli(int argc, char * * argv, void * * * tsrm_ls) Line 988
C
php.exe!main(int argc, char * * argv) Line 1364 C
php.exe!__tmainCRTStartup() Line 582C
php.exe!mainCRTStartup() Line 399   C
kernel32.dll!76971866() Unknown
[Frames below may be incorrect and/or missing, no symbols loaded for 
kernel32.dll]  
ntdll.dll!770668f1()Unknown
ntdll.dll!7706689d()Unknown
 

Test script:
---
Zend\tests\generators\clone_with_stack.phpt

Expected result:

Test diff:

001+
001- string(10) "xx"

Actual result:
--
test pass






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63528&edit=1


[PHP-BUG] Bug #63677 [NEW]: Segmentation Fault when calling zend_std_object_get_class

2012-12-03 Thread imprec at gmail dot com
From: imprec at gmail dot com
Operating system: Linux / OSX
PHP version:  5.4.9
Package:  *General Issues
Bug Type: Bug
Bug description:Segmentation Fault when calling zend_std_object_get_class 

Description:

A segfault always happen when running Imagine test suite 
(https://github.com/avalanche123/Imagine). This segfault happens when
running 
gmagick driver tests, but are not reproducible outside test scope.

I think it's not completely gmagick related as the backtrace reference PHP
core 
calls as responsible of the segfault (see attached backtrace)

This bug occurs with PHP 5.3.10, PHP 5.4.9, PHP 5.5.0-dev

I can provide a dedicated debug box for this error.

Test script:
---
Running Imagine tests suite with gmagick extension 1.1.1.RC1 or 1.1.0.RC3
will produce the segfault (https://github.com/avalanche123/Imagine).

Expected result:

No segmentation fault

Actual result:
--
Program received signal SIGSEGV, Segmentation fault.
0x0081e0c9 in zend_std_object_get_class (object=0x7073bf70) at

/usr/local/src/php-5.4.9/Zend/zend_object_handlers.c:1454
1454return zobj->ce;
(gdb) backtrace full
#0  0x0081e0c9 in zend_std_object_get_class
(object=0x7073bf70)
at /usr/local/src/php-5.4.9/Zend/zend_object_handlers.c:1454
zobj = 0x7fff9e61
#1  0x007e9ed0 in zend_get_class_entry (zobject=0x7073bf70) at

/usr/local/src/php-5.4.9/Zend/zend_API.c:238
No locals.
#2  0x00875f6b in ZEND_INIT_METHOD_CALL_SPEC_VAR_CONST_HANDLER 
(execute_data=0x77fa6a10)
at /usr/local/src/php-5.4.9/Zend/zend_vm_execute.h:13466
opline = 0x70c316d8
function_name = 0x70c30738
function_name_strval = 0x77eb9768 "destroy"
function_name_strlen = 7
free_op1 = {var = 0x0}
#3  0x008262e2 in execute (op_array=0x70c30e30) at 
/usr/local/src/php-5.4.9/Zend/zend_vm_execute.h:410
ret = 0
execute_data = 0x77fa6a10
nested = 1 '\001'
original_in_execution = 1 '\001'
#4  0x007d5758 in zend_call_function (fci=0x7fff9890, 
fci_cache=0x7fff98e0)
at /usr/local/src/php-5.4.9/Zend/zend_execute_API.c:958
i = 0
original_return_value = 0x0
calling_symbol_table = 0x0
original_op_array = 0x71806650
original_opline_ptr = 0x77fa6138
current_scope = 0x71802570
current_called_scope = 0x71802570
calling_scope = 0x7073d6d8
called_scope = 0x7073d6d8
current_this = 0x7fffed5d82b0
execute_data = {opline = 0x0, function_state = {function = 
0x70c30e30, arguments = 0x77fa6a08}, fbc = 0x0, 
  called_scope = 0x0, op_array = 0x0, object = 0x708973d0, Ts =

0x77fa61d8, CVs = 0x77fa61c8, 
  symbol_table = 0x0, prev_execute_data = 0x77fa6138, 
old_error_reporting = 0x0, nested = 1 '\001', 
  original_return_value = 0x70dfddb8, current_scope = 
0x70dfea80, current_called_scope = 0x70fc7638, 
  current_this = 0x70fc7818, current_object = 0x0}
fci_cache_local = {initialized = 144 '\220', function_handler =
0x0, 
calling_scope = 0x7fff9670, 
  called_scope = 0x711188f0, object_ptr = 0x0}
#5  0x00807695 in zend_call_method (object_pp=0x7fff99b8, 
obj_ce=0x7073d6d8, fn_proxy=0x7fff99b0, 
function_name=0xd039c6 "__destruct", function_name_len=10, 
retval_ptr_ptr=0x0, param_count=0, arg1=0x0, arg2=0x0)
at /usr/local/src/php-5.4.9/Zend/zend_interfaces.c:97
fcic = {initialized = 1 '\001', function_handler = 0x70c30e30,

calling_scope = 0x7073d6d8, 
  called_scope = 0x7073d6d8, object_ptr = 0x708973d0}
result = 32
fci = {size = 72, function_table = 0xf9b2d0, function_name = 
0x7fff9910, symbol_table = 0x0, 
  retval_ptr_ptr = 0x7fff9948, param_count = 0, params = 
0x7fff9930, object_ptr = 0x708973d0, 
  no_separation = 1 '\001'}
z_fname = {value = {lval = 140737488329072, dval =
6.9533558065377856e-
310, str = {
  val = 0x7fff9970 "\360\231\377\377\377\177", len =
8280692}, 
ht = 0x7fff9970, obj = {handle = 4294941040, 
  handlers = 0x7e5a74}}, refcount__gc = 4035539952, type = 255

'\377', is_ref__gc = 127 '\177'}
retval = 0x0
function_table = 0x7073d700
params = {0x7fff9988, 0x7fff9990}
#6  0x00814fbf in zend_objects_destroy_object
(object=0x70745cc0, 
handle=45021)
at /usr/local/src/php-5.4.9/Zend/zend_objects.c:123
old_exception = 0x0
obj = 0x708973d0
obj_bucket = 0x7fffee6a87b0
destructor = 0x70c30e30
#7  0x008125d9 in gc_collect_cycles () at /usr/local/src/php-
5.4.9/Zend/zend_gc.c:814
p = 0x70745d38
q = 0x0
orig_free_list = 0x0
o

[PHP-BUG] Bug #63678 [NEW]: SplObjectStorage->current() !== current(SplObjectStorage)

2012-12-03 Thread Alex at phpguide dot co dot il
From: Alex at phpguide dot co dot il
Operating system: debian 6
PHP version:  5.4.9
Package:  SPL related
Bug Type: Bug
Bug description:SplObjectStorage->current() !== current(SplObjectStorage)

Description:

$SplObjectStorage->current() returns different value from
current($SplObjectStorage).


Test script:
---
class test
{
public $val;

public function __construct()
{
$this->val = rand();
}
}

class blat extends \SplObjectStorage
{
public function add()
{
$this->attach(new test());
}
}

$blat = new blat();
$blat->add();
$blat->add();
$blat->add();
$blat->add();

var_dump($blat->current() === current($blat));
// null === false

Expected result:

true

Actual result:
--
false

-- 
Edit bug report at https://bugs.php.net/bug.php?id=63678&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63678&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63678&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63678&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63678&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63678&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63678&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63678&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63678&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63678&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63678&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63678&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63678&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63678&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63678&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63678&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63678&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63678&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63678&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63678&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63678&r=mysqlcfg



Bug #63678 [Com]: SplObjectStorage->current() !== current(SplObjectStorage)

2012-12-03 Thread mail+php at requinix dot net
Edit report at https://bugs.php.net/bug.php?id=63678&edit=1

 ID: 63678
 Comment by: mail+php at requinix dot net
 Reported by:Alex at phpguide dot co dot il
 Summary:SplObjectStorage->current() !==
 current(SplObjectStorage)
 Status: Open
 Type:   Bug
 Package:SPL related
 Operating System:   debian 6
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

SplObjectStorage provides ->current() as part of the implementation to 
Iterator/Traversable. If you want to call it directly you may need to obey the 
Iterator convention of calling ->rewind() first.

But doing so only changes the ->current() value to be the object and not null. 
Even with $blat->rewind() and reset($blat) both key() and current() behave 
differently. In the example for SplObjectStorage::current() it includes

$object = $s->current(); // similar to current($s)

so I would also expect them to behave the same.

tl;dr with ->rewind() and reset():
key($blat)==null, current($blat)==false
$blat->key()==0, $blat->current()==a test object

Without ->rewind() and reset():
key($blat)==null, current($blat)==false
$blat->key()==0, $blat->current()==null


Previous Comments:

[2012-12-03 21:07:18] Alex at phpguide dot co dot il

Description:

$SplObjectStorage->current() returns different value from
current($SplObjectStorage).


Test script:
---
class test
{
public $val;

public function __construct()
{
$this->val = rand();
}
}

class blat extends \SplObjectStorage
{
public function add()
{
$this->attach(new test());
}
}

$blat = new blat();
$blat->add();
$blat->add();
$blat->add();
$blat->add();

var_dump($blat->current() === current($blat));
// null === false

Expected result:

true

Actual result:
--
false






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63678&edit=1


Bug #63651 [Com]: preg_replace() returns null for very long string

2012-12-03 Thread mail+php at requinix dot net
Edit report at https://bugs.php.net/bug.php?id=63651&edit=1

 ID: 63651
 Comment by: mail+php at requinix dot net
 Reported by:magog dot the dot ogre at gmail dot com
 Summary:preg_replace() returns null for very long string
 Status: Open
 Type:   Bug
 Package:PCRE related
 Operating System:   Windows, Unix
 PHP Version:5.3.19
 Block user comment: N
 Private report: N

 New Comment:

You're hitting the backtrack limit defined as the pcre.backtrack_limit setting. 
If 
I up mine to 1000 (10e6) I get a string(80) "Hello worldHello world..."

Simply put, your regex is too inefficient to work on that $text.


Previous Comments:

[2012-11-30 01:46:45] magog dot the dot ogre at gmail dot com

Description:

I have tested and gotten this error on the following two distros:
*5.3.19 for Windows
*5.3.8 for SunOS

Run the code at the pastebin link I've provided. You will see that PHP is 
returning null in a preg_replace function! It occurs in both Windows and Unix. 
I 
do not know if this is a PHP problem, or a PCRE problem.

Test script:
---
http://pastebin.com/PBCDexXH



Expected result:

A string should be outputted

Actual result:
--
Instead, a NULL result is outputted.






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63651&edit=1


[PHP-BUG] Bug #63680 [NEW]: Memleak in splfixedarray with cycle reference

2012-12-03 Thread larue...@php.net
From: laruence
Operating system: 
PHP version:  5.4.9
Package:  SPL related
Bug Type: Bug
Bug description:Memleak in splfixedarray with cycle reference

Description:

dmitry introduced the new get_gc handler, but seems splfixedarray doesn't 
implement it.

 
also there are some other extensions still using ugly implementation for
gc, I 
will review them one by one.

thanks

Test script:
---
https://bugs.php.net/bug.php?id=63680&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63680&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63680&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63680&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63680&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63680&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63680&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63680&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63680&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63680&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63680&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63680&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63680&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63680&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63680&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63680&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63680&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63680&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63680&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63680&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63680&r=mysqlcfg



Bug #63680 [PATCH]: Memleak in splfixedarray with cycle reference

2012-12-03 Thread larue...@php.net
Edit report at https://bugs.php.net/bug.php?id=63680&edit=1

 ID: 63680
 Patch added by: larue...@php.net
 Reported by:larue...@php.net
 Summary:Memleak in splfixedarray with cycle reference
 Status: Open
 Type:   Bug
 Package:SPL related
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: bug63680.patch
Revision:   1354598600
URL:
https://bugs.php.net/patch-display.php?bug=63680&patch=bug63680.patch&revision=1354598600


Previous Comments:

[2012-12-04 05:22:46] larue...@php.net

Description:

dmitry introduced the new get_gc handler, but seems splfixedarray doesn't 
implement it.

 
also there are some other extensions still using ugly implementation for gc, I 
will review them one by one.

thanks

Test script:
---
https://bugs.php.net/bug.php?id=63680&edit=1


[PHP-BUG] Bug #63681 [NEW]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
From: laruence
Operating system: 
PHP version:  5.4.9
Package:  SPL related
Bug Type: Bug
Bug description:Use get_gc instead of hack of get_properties

Description:

imporve the gc handler for spl_object

Test script:
---
none

Expected result:

none

Actual result:
--
none

-- 
Edit bug report at https://bugs.php.net/bug.php?id=63681&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63681&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63681&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63681&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63681&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63681&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63681&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63681&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63681&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63681&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63681&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63681&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63681&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63681&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63681&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63681&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63681&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63681&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63681&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63681&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63681&r=mysqlcfg



Bug #63681 [PATCH]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
Edit report at https://bugs.php.net/bug.php?id=63681&edit=1

 ID: 63681
 Patch added by: larue...@php.net
 Reported by:larue...@php.net
 Summary:Use get_gc instead of hack of get_properties
 Status: Open
 Type:   Bug
 Package:SPL related
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: bug63681.patch
Revision:   1354599228
URL:
https://bugs.php.net/patch-display.php?bug=63681&patch=bug63681.patch&revision=1354599228


Previous Comments:

[2012-12-04 05:33:22] larue...@php.net

Description:

imporve the gc handler for spl_object

Test script:
---
none

Expected result:

none

Actual result:
--
none






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63681&edit=1


[PHP-BUG] Bug #63682 [NEW]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
From: laruence
Operating system: 
PHP version:  5.4.9
Package:  SimpleXML related
Bug Type: Bug
Bug description:Use get_gc instead of hack of get_properties

Description:

see summary

Test script:
---
none

Expected result:

none

Actual result:
--
none

-- 
Edit bug report at https://bugs.php.net/bug.php?id=63682&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63682&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63682&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63682&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63682&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63682&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63682&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63682&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63682&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63682&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63682&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63682&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63682&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63682&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63682&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63682&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63682&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63682&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63682&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63682&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63682&r=mysqlcfg



Bug #63682 [PATCH]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
Edit report at https://bugs.php.net/bug.php?id=63682&edit=1

 ID: 63682
 Patch added by: larue...@php.net
 Reported by:larue...@php.net
 Summary:Use get_gc instead of hack of get_properties
 Status: Open
 Type:   Bug
 Package:SimpleXML related
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: bug63682.patch
Revision:   1354599675
URL:
https://bugs.php.net/patch-display.php?bug=63682&patch=bug63682.patch&revision=1354599675


Previous Comments:

[2012-12-04 05:40:38] larue...@php.net

Description:

see summary

Test script:
---
none

Expected result:

none

Actual result:
--
none






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63682&edit=1


[PHP-BUG] Bug #63683 [NEW]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
From: laruence
Operating system: 
PHP version:  5.4.9
Package:  Date/time related
Bug Type: Bug
Bug description:Use get_gc instead of hack of get_properties

Description:

see summary

Test script:
---
none

Expected result:

none

Actual result:
--
none

-- 
Edit bug report at https://bugs.php.net/bug.php?id=63683&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63683&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63683&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63683&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63683&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63683&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63683&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63683&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63683&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63683&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63683&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63683&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63683&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63683&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63683&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63683&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63683&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63683&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63683&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63683&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63683&r=mysqlcfg



Bug #63683 [PATCH]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
Edit report at https://bugs.php.net/bug.php?id=63683&edit=1

 ID: 63683
 Patch added by: larue...@php.net
 Reported by:larue...@php.net
 Summary:Use get_gc instead of hack of get_properties
 Status: Open
 Type:   Bug
 Package:Date/time related
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: bug63683.patch
Revision:   1354600121
URL:
https://bugs.php.net/patch-display.php?bug=63683&patch=bug63683.patch&revision=1354600121


Previous Comments:

[2012-12-04 05:48:02] larue...@php.net

Description:

see summary

Test script:
---
none

Expected result:

none

Actual result:
--
none






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63683&edit=1


Bug #63682 [PATCH]: Use get_gc instead of hack of get_properties

2012-12-03 Thread larue...@php.net
Edit report at https://bugs.php.net/bug.php?id=63682&edit=1

 ID: 63682
 Patch added by: larue...@php.net
 Reported by:larue...@php.net
 Summary:Use get_gc instead of hack of get_properties
 Status: Open
 Type:   Bug
 Package:SimpleXML related
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: bug63682.patch
Revision:   1354601347
URL:
https://bugs.php.net/patch-display.php?bug=63682&patch=bug63682.patch&revision=1354601347


Previous Comments:

[2012-12-04 05:41:15] larue...@php.net

The following patch has been added/updated:

Patch Name: bug63682.patch
Revision:   1354599675
URL:
https://bugs.php.net/patch-display.php?bug=63682&patch=bug63682.patch&revision=1354599675


[2012-12-04 05:40:38] larue...@php.net

Description:

see summary

Test script:
---
none

Expected result:

none

Actual result:
--
none






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63682&edit=1


Bug #63680 [Opn->Asn]: Memleak in splfixedarray with cycle reference

2012-12-03 Thread dmitry
Edit report at https://bugs.php.net/bug.php?id=63680&edit=1

 ID: 63680
 Updated by: dmi...@php.net
 Reported by:larue...@php.net
 Summary:Memleak in splfixedarray with cycle reference
-Status: Open
+Status: Assigned
 Type:   Bug
 Package:SPL related
 PHP Version:5.4.9
-Assigned To:
+Assigned To:dmitry
 Block user comment: N
 Private report: N



Previous Comments:

[2012-12-04 05:23:20] larue...@php.net

The following patch has been added/updated:

Patch Name: bug63680.patch
Revision:   1354598600
URL:
https://bugs.php.net/patch-display.php?bug=63680&patch=bug63680.patch&revision=1354598600


[2012-12-04 05:22:46] larue...@php.net

Description:

dmitry introduced the new get_gc handler, but seems splfixedarray doesn't 
implement it.

 
also there are some other extensions still using ugly implementation for gc, I 
will review them one by one.

thanks

Test script:
---
https://bugs.php.net/bug.php?id=63680&edit=1


Bug #63651 [Opn->Nab]: preg_replace() returns null for very long string

2012-12-03 Thread nikic
Edit report at https://bugs.php.net/bug.php?id=63651&edit=1

 ID: 63651
 Updated by: ni...@php.net
 Reported by:magog dot the dot ogre at gmail dot com
 Summary:preg_replace() returns null for very long string
-Status: Open
+Status: Not a bug
 Type:   Bug
 Package:PCRE related
 Operating System:   Windows, Unix
 PHP Version:5.3.19
 Block user comment: N
 Private report: N

 New Comment:

In particular this part of the regex seems odd: \s*?)\s*\s* Three 
asterix-quantifier on the same thing in a row, that's something that can easily 
blow up a regular expression ;)


Previous Comments:

[2012-12-04 01:04:38] mail+php at requinix dot net

You're hitting the backtrack limit defined as the pcre.backtrack_limit setting. 
If 
I up mine to 1000 (10e6) I get a string(80) "Hello worldHello world..."

Simply put, your regex is too inefficient to work on that $text.


[2012-11-30 01:46:45] magog dot the dot ogre at gmail dot com

Description:

I have tested and gotten this error on the following two distros:
*5.3.19 for Windows
*5.3.8 for SunOS

Run the code at the pastebin link I've provided. You will see that PHP is 
returning null in a preg_replace function! It occurs in both Windows and Unix. 
I 
do not know if this is a PHP problem, or a PCRE problem.

Test script:
---
http://pastebin.com/PBCDexXH



Expected result:

A string should be outputted

Actual result:
--
Instead, a NULL result is outputted.






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63651&edit=1