Bug #63652 [Opn->Nab]: Using twice the same trait causes fatal error.
Edit report at https://bugs.php.net/bug.php?id=63652&edit=1 ID: 63652 Updated by: larue...@php.net Reported by:stealz at op dot pl Summary:Using twice the same trait causes fatal error. -Status: Open +Status: Not a bug Type: Bug Package:Class/Object related Operating System: Windows 7 PHP Version:5.4.9 Block user comment: N Private report: N New Comment: use a triat means copy the methods of traits into the dst class table. so, they are not the same method after copied. Previous Comments: [2012-12-01 14:05:28] stealz at op dot pl Thank you for your reply. PHP had warned me indeed, but it doesn't change the fact that, as I wrote, this is exactly the same method of exactly the same trait, so it shouldn't be colliding at all. Can you please prove me wrong? [2012-12-01 05:52:37] larue...@php.net I think PHP had warn you about method collisions.. [2012-12-01 05:52:32] larue...@php.net I think PHP had warn you about method collisions.. [2012-11-30 01:48:47] stealz at op dot pl Description: I think PHP should check whether traits were used already (ex. in parent class) and ignore them instead using again. It causes fatal error due to collisions which are obvious, because trait name is the same. What's interesting, collisions refer only to methods. PHP seems not to see the problem if double-used trait contains properties only. Test script: --- trait LifeOrganism { public $age; // it's fine #public function live() {} // uncomment to get Fatal error } trait Man { use LifeOrganism; } trait Elephant { use LifeOrganism; } class ElephantMan { use Man, Elephant; } Expected result: Ignore trait which was already used. Actual result: -- Fatal error. -- Edit this bug report at https://bugs.php.net/bug.php?id=63652&edit=1
Req #49366 [Com]: Make slash escaping optional in json_encode()
Edit report at https://bugs.php.net/bug.php?id=49366&edit=1 ID: 49366 Comment by: php dot net at site dot lanzz dot org Reported by:don at smugmug dot com Summary:Make slash escaping optional in json_encode() Status: Closed Type: Feature/Change Request Package:JSON related Operating System: CentOS 5.3 PHP Version:5.3.0 Assigned To:aharvey Block user comment: N Private report: N New Comment: To me, this issue is just magic quotes being still alive and well, in the year 2012. I thought the lesson of "don't overquote when you don't have to" has been learned already? Granted, this issue is marginally better than the magic quotes fiasco, as it doesn't actually change the semantics of the escaped value. Previous Comments: [2012-03-02 17:26:48] diego dot pasc at tiscali dot it I also agree that NOT ESCAPING should be the default [2011-12-16 01:37:05] don at smugmug dot com I totally agree that this should just be the default, rather than some new option. Both ways are 100% JSON compliant, but one (the PHP chosen method) is far less common, has a significantly larger footprint on lots of common types of data, and is harder for humans to read. I see no benefit t [2011-12-15 22:05:06] dtremblay dot fafard at gmail dot com Actually, I can't find any reason why is escaping slashes by default and create an option to remove this feature. Usually, when you want something added (e.g. Escaping Slashes), you use an option to recreate the feature wanted. So why is the option used to REMOVE a feature? Options exists to add features, not remove them?? Where am I wrong? [2010-09-16 15:53:38] ahar...@php.net This bug has been fixed in SVN. Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/. Thank you for the report, and for helping us make PHP better. I've implemented this on trunk via a json_encode() option called JSON_UNESCAPED_SLASHES. The default behaviour remains to escape slashes. [2010-09-16 15:53:29] ahar...@php.net Automatic comment from SVN on behalf of aharvey Revision: http://svn.php.net/viewvc/?view=revision&revision=303421 Log: Implemented FR #49366 (Make slash escaping optional in json_encode()). The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=49366 -- Edit this bug report at https://bugs.php.net/bug.php?id=49366&edit=1
Bug #63637 [Opn->Fbk]: POST value duplicated when passed to PHP
Edit report at https://bugs.php.net/bug.php?id=63637&edit=1 ID: 63637 Updated by: m...@php.net Reported by:sarciszewski at knights dot ucf dot edu Summary:POST value duplicated when passed to PHP -Status: Open +Status: Feedback Type: Bug Package:Apache2 related Operating System: Debian PHP Version:5.4.9 Block user comment: N Private report: N New Comment: What PHP extensions are loaded? Previous Comments: [2012-11-28 18:03:39] sarciszewski at knights dot ucf dot edu Downgrading to PHP 5.3.19 resolved the issue. Is there something in the code that links Apache2 and PHP 5.4.9 that could be causing this problem? It wasn't causing issues in 5.4.8 [2012-11-28 17:24:01] sarciszewski at knights dot ucf dot edu Description: Originally I thought this was an Apache bug since php://input held duplicate POST data. https://issues.apache.org/bugzilla/show_bug.cgi?id=54218 - However, Perl correctly reads single values. admin@summit:$uname -a Linux summit 2.6.26-2-686-bigmem #1 SMP Sun Mar 4 23:05:22 UTC 2012 i686 GNU/Linux admin@summit:$/usr/sbin/apache2 -v Server version: Apache/2.2.16 (Debian) Server built: Sep 9 2012 21:17:33 admin@summit:$ /usr/bin/php5 -v PHP 5.4.9-1~dotdeb.0 (cli) (built: Nov 26 2012 04:24:47) Copyright (c) 1997-2012 The PHP Group Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies Test script: --- This duplicates: This doesn't: Expected result: Output (first button): menu=Blah = array(1) { ["menu"]=> string(4) "Blah" } Output (second button): menu=Blah&second=Second+value = array(2) { ["menu"]=> string(4) "Blah" ["second"]=> string(12) "Second value" } Actual result: -- Output (first button): menu=Blahmenu=Blah = array(1) { ["menu"]=> string(13) "Blahmenu=Blah" } Output (second button): menu=Blah&second=Second+valuemenu=Blah&second=Second+value = array(2) { ["menu"]=> string(4) "Blah" ["second"]=> string(12) "Second value" } -- Edit this bug report at https://bugs.php.net/bug.php?id=63637&edit=1
Bug #63637 [Com]: POST value duplicated when passed to PHP
Edit report at https://bugs.php.net/bug.php?id=63637&edit=1 ID: 63637 Comment by: sarciszewski at knights dot ucf dot edu Reported by:sarciszewski at knights dot ucf dot edu Summary:POST value duplicated when passed to PHP Status: Feedback Type: Bug Package:Apache2 related Operating System: Debian PHP Version:5.4.9 Block user comment: N Private report: N New Comment: Whatever gets installed via: apt-get install php5 php5-common php5-mysql php5-cli php5-curl >From the dotdeb repository (which offers 5.4) Previous Comments: [2012-12-03 09:32:16] m...@php.net What PHP extensions are loaded? [2012-11-28 18:03:39] sarciszewski at knights dot ucf dot edu Downgrading to PHP 5.3.19 resolved the issue. Is there something in the code that links Apache2 and PHP 5.4.9 that could be causing this problem? It wasn't causing issues in 5.4.8 [2012-11-28 17:24:01] sarciszewski at knights dot ucf dot edu Description: Originally I thought this was an Apache bug since php://input held duplicate POST data. https://issues.apache.org/bugzilla/show_bug.cgi?id=54218 - However, Perl correctly reads single values. admin@summit:$uname -a Linux summit 2.6.26-2-686-bigmem #1 SMP Sun Mar 4 23:05:22 UTC 2012 i686 GNU/Linux admin@summit:$/usr/sbin/apache2 -v Server version: Apache/2.2.16 (Debian) Server built: Sep 9 2012 21:17:33 admin@summit:$ /usr/bin/php5 -v PHP 5.4.9-1~dotdeb.0 (cli) (built: Nov 26 2012 04:24:47) Copyright (c) 1997-2012 The PHP Group Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies Test script: --- This duplicates: This doesn't: Expected result: Output (first button): menu=Blah = array(1) { ["menu"]=> string(4) "Blah" } Output (second button): menu=Blah&second=Second+value = array(2) { ["menu"]=> string(4) "Blah" ["second"]=> string(12) "Second value" } Actual result: -- Output (first button): menu=Blahmenu=Blah = array(1) { ["menu"]=> string(13) "Blahmenu=Blah" } Output (second button): menu=Blah&second=Second+valuemenu=Blah&second=Second+value = array(2) { ["menu"]=> string(4) "Blah" ["second"]=> string(12) "Second value" } -- Edit this bug report at https://bugs.php.net/bug.php?id=63637&edit=1
Bug #63570 [PATCH]: Bogus warning 'Operation now in progress'
Edit report at https://bugs.php.net/bug.php?id=63570&edit=1 ID: 63570 Patch added by: osma...@php.net Reported by:kakserpompoyaitsam at gmail dot com Summary:Bogus warning 'Operation now in progress' Status: Open Type: Bug Package:Sockets related Operating System: linux PHP Version:5.4.8 Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: ignore-warnings-for-nonblocking Revision: 1354535643 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-warnings-for-nonblocking&revision=1354535643 Previous Comments: [2012-11-28 12:41:30] osma...@php.net The following patch has been added/updated: Patch Name: ignore-EINPROGRESS-warning-nonblocking-2 Revision: 1354106490 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking-2&revision=1354106490 [2012-11-28 12:40:08] osma...@php.net The following patch has been added/updated: Patch Name: ignore-EINPROGRESS-warning-nonblocking Revision: 1354106408 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking&revision=1354106408 [2012-11-28 12:33:54] osma...@php.net The following patch has been added/updated: Patch Name: ignore-EINPROGRESS-warning Revision: 1354106034 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning&revision=1354106034 [2012-11-21 17:24:08] kakserpompoyaitsam at gmail dot com It would awesome if you include it to 5.5. [2012-11-21 05:52:36] kakserpompoyaitsam at gmail dot com Description: When I'm getting annoying warning while working with non-blocking socket, For instance: socket_connect(): unable to connect [115]: Operation now in progress Hence, I have to use @socket_connect and the performance getting compromised. I do use pecl-libevent, and this error makes no sense at all. Please do not ignore this little defect, Thank you in advance. Test script: --- https://bugs.php.net/bug.php?id=63570&edit=1
Bug #63570 [Com]: Bogus warning 'Operation now in progress'
Edit report at https://bugs.php.net/bug.php?id=63570&edit=1 ID: 63570 Comment by: osma...@php.net Reported by:kakserpompoyaitsam at gmail dot com Summary:Bogus warning 'Operation now in progress' Status: Open Type: Bug Package:Sockets related Operating System: linux PHP Version:5.4.8 Block user comment: N Private report: N New Comment: I've uploaded a simple patch. But I'd rather do it via exceptions as in other languages like Python. Previous Comments: [2012-12-03 11:54:03] osma...@php.net The following patch has been added/updated: Patch Name: ignore-warnings-for-nonblocking Revision: 1354535643 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-warnings-for-nonblocking&revision=1354535643 [2012-11-28 12:41:30] osma...@php.net The following patch has been added/updated: Patch Name: ignore-EINPROGRESS-warning-nonblocking-2 Revision: 1354106490 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking-2&revision=1354106490 [2012-11-28 12:40:08] osma...@php.net The following patch has been added/updated: Patch Name: ignore-EINPROGRESS-warning-nonblocking Revision: 1354106408 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning-nonblocking&revision=1354106408 [2012-11-28 12:33:54] osma...@php.net The following patch has been added/updated: Patch Name: ignore-EINPROGRESS-warning Revision: 1354106034 URL: https://bugs.php.net/patch-display.php?bug=63570&patch=ignore-EINPROGRESS-warning&revision=1354106034 [2012-11-21 17:24:08] kakserpompoyaitsam at gmail dot com It would awesome if you include it to 5.5. The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=63570 -- Edit this bug report at https://bugs.php.net/bug.php?id=63570&edit=1
Bug #63528 [Com]: Generators crash on Zend\tests\generators\clone_with_stack.phpt
Edit report at https://bugs.php.net/bug.php?id=63528&edit=1 ID: 63528 Comment by: a...@php.net Reported by:a...@php.net Summary:Generators crash on Zend\tests\generators\clone_with_stack.phpt Status: Assigned Type: Bug Package:*General Issues Operating System: Windows PHP Version:5.5Git-2012-11-15 (Git) Assigned To:nikic Block user comment: N Private report: N New Comment: nikic, any progress on this one? Previous Comments: [2012-11-22 20:31:41] a...@php.net No, only the mentioned test fails for me. Newly tested with both TS and NTS snaps from Nov 22th http://windows.php.net/downloads/snaps/php-5.5/ . A way to repro your fails? [2012-11-21 12:04:07] ni...@php.net Is this the only test that is failing for you? I just played around with it on Windows and for me anything involving pushed stack arguments crashes. E.g. the yield_during_function_call test. [2012-11-15 15:57:05] a...@php.net Btw. there are no valgrind complains on Linux for this test. [2012-11-15 14:35:20] a...@php.net Description: Both TS and NTS crash. On a debug build VS gives the following error: Unhandled exception at 0x102D369E (php5ts_debug.dll) in php.exe: 0xC005: Access violation reading location 0x5A5A5A56. and the debugger stops in zend_execute.h:337 (second line in zend_vm_stack_clear_multiple()). Here is the corresponding BT: php5ts_debug.dll!zend_vm_stack_clear_multiple(void * * * tsrm_ls) Line 337 C php5ts_debug.dll!zend_do_fcall_common_helper_SPEC(_zend_execute_data * execute_data, void * * * tsrm_ls) Line 736 C php5ts_debug.dll!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER(_zend_execute_data * execute_data, void * * * tsrm_ls) Line 879 C php5ts_debug.dll!execute_ex(_zend_execute_data * execute_data, void * * * tsrm_ls) Line 436 C php5ts_debug.dll!execute(_zend_op_array * op_array, void * * * tsrm_ls) Line 461C php5ts_debug.dll!zend_execute_scripts(int type, void * * * tsrm_ls, _zval_struct * * retval, int file_count, ...) Line 1309 C php5ts_debug.dll!php_execute_script(_zend_file_handle * primary_file, void * * * tsrm_ls) Line 2468 C php.exe!do_cli(int argc, char * * argv, void * * * tsrm_ls) Line 988 C php.exe!main(int argc, char * * argv) Line 1364 C php.exe!__tmainCRTStartup() Line 582C php.exe!mainCRTStartup() Line 399 C kernel32.dll!76971866() Unknown [Frames below may be incorrect and/or missing, no symbols loaded for kernel32.dll] ntdll.dll!770668f1()Unknown ntdll.dll!7706689d()Unknown Test script: --- Zend\tests\generators\clone_with_stack.phpt Expected result: Test diff: 001+ 001- string(10) "xx" Actual result: -- test pass -- Edit this bug report at https://bugs.php.net/bug.php?id=63528&edit=1
Bug #63528 [Com]: Generators crash on Zend\tests\generators\clone_with_stack.phpt
Edit report at https://bugs.php.net/bug.php?id=63528&edit=1 ID: 63528 Comment by: ni...@php.net Reported by:a...@php.net Summary:Generators crash on Zend\tests\generators\clone_with_stack.phpt Status: Assigned Type: Bug Package:*General Issues Operating System: Windows PHP Version:5.5Git-2012-11-15 (Git) Assigned To:nikic Block user comment: N Private report: N New Comment: @ab: I just tried the current build (php-5.5-nts-windows-vc9-x86-r262decd) and this does not occur anymore. I think that dmitry's changes fixed this as a side effect. Does the issue persist for you? Previous Comments: [2012-12-03 14:22:17] a...@php.net nikic, any progress on this one? [2012-11-22 20:31:41] a...@php.net No, only the mentioned test fails for me. Newly tested with both TS and NTS snaps from Nov 22th http://windows.php.net/downloads/snaps/php-5.5/ . A way to repro your fails? [2012-11-21 12:04:07] ni...@php.net Is this the only test that is failing for you? I just played around with it on Windows and for me anything involving pushed stack arguments crashes. E.g. the yield_during_function_call test. [2012-11-15 15:57:05] a...@php.net Btw. there are no valgrind complains on Linux for this test. [2012-11-15 14:35:20] a...@php.net Description: Both TS and NTS crash. On a debug build VS gives the following error: Unhandled exception at 0x102D369E (php5ts_debug.dll) in php.exe: 0xC005: Access violation reading location 0x5A5A5A56. and the debugger stops in zend_execute.h:337 (second line in zend_vm_stack_clear_multiple()). Here is the corresponding BT: php5ts_debug.dll!zend_vm_stack_clear_multiple(void * * * tsrm_ls) Line 337 C php5ts_debug.dll!zend_do_fcall_common_helper_SPEC(_zend_execute_data * execute_data, void * * * tsrm_ls) Line 736 C php5ts_debug.dll!ZEND_DO_FCALL_BY_NAME_SPEC_HANDLER(_zend_execute_data * execute_data, void * * * tsrm_ls) Line 879 C php5ts_debug.dll!execute_ex(_zend_execute_data * execute_data, void * * * tsrm_ls) Line 436 C php5ts_debug.dll!execute(_zend_op_array * op_array, void * * * tsrm_ls) Line 461C php5ts_debug.dll!zend_execute_scripts(int type, void * * * tsrm_ls, _zval_struct * * retval, int file_count, ...) Line 1309 C php5ts_debug.dll!php_execute_script(_zend_file_handle * primary_file, void * * * tsrm_ls) Line 2468 C php.exe!do_cli(int argc, char * * argv, void * * * tsrm_ls) Line 988 C php.exe!main(int argc, char * * argv) Line 1364 C php.exe!__tmainCRTStartup() Line 582C php.exe!mainCRTStartup() Line 399 C kernel32.dll!76971866() Unknown [Frames below may be incorrect and/or missing, no symbols loaded for kernel32.dll] ntdll.dll!770668f1()Unknown ntdll.dll!7706689d()Unknown Test script: --- Zend\tests\generators\clone_with_stack.phpt Expected result: Test diff: 001+ 001- string(10) "xx" Actual result: -- test pass -- Edit this bug report at https://bugs.php.net/bug.php?id=63528&edit=1
[PHP-BUG] Bug #63677 [NEW]: Segmentation Fault when calling zend_std_object_get_class
From: imprec at gmail dot com Operating system: Linux / OSX PHP version: 5.4.9 Package: *General Issues Bug Type: Bug Bug description:Segmentation Fault when calling zend_std_object_get_class Description: A segfault always happen when running Imagine test suite (https://github.com/avalanche123/Imagine). This segfault happens when running gmagick driver tests, but are not reproducible outside test scope. I think it's not completely gmagick related as the backtrace reference PHP core calls as responsible of the segfault (see attached backtrace) This bug occurs with PHP 5.3.10, PHP 5.4.9, PHP 5.5.0-dev I can provide a dedicated debug box for this error. Test script: --- Running Imagine tests suite with gmagick extension 1.1.1.RC1 or 1.1.0.RC3 will produce the segfault (https://github.com/avalanche123/Imagine). Expected result: No segmentation fault Actual result: -- Program received signal SIGSEGV, Segmentation fault. 0x0081e0c9 in zend_std_object_get_class (object=0x7073bf70) at /usr/local/src/php-5.4.9/Zend/zend_object_handlers.c:1454 1454return zobj->ce; (gdb) backtrace full #0 0x0081e0c9 in zend_std_object_get_class (object=0x7073bf70) at /usr/local/src/php-5.4.9/Zend/zend_object_handlers.c:1454 zobj = 0x7fff9e61 #1 0x007e9ed0 in zend_get_class_entry (zobject=0x7073bf70) at /usr/local/src/php-5.4.9/Zend/zend_API.c:238 No locals. #2 0x00875f6b in ZEND_INIT_METHOD_CALL_SPEC_VAR_CONST_HANDLER (execute_data=0x77fa6a10) at /usr/local/src/php-5.4.9/Zend/zend_vm_execute.h:13466 opline = 0x70c316d8 function_name = 0x70c30738 function_name_strval = 0x77eb9768 "destroy" function_name_strlen = 7 free_op1 = {var = 0x0} #3 0x008262e2 in execute (op_array=0x70c30e30) at /usr/local/src/php-5.4.9/Zend/zend_vm_execute.h:410 ret = 0 execute_data = 0x77fa6a10 nested = 1 '\001' original_in_execution = 1 '\001' #4 0x007d5758 in zend_call_function (fci=0x7fff9890, fci_cache=0x7fff98e0) at /usr/local/src/php-5.4.9/Zend/zend_execute_API.c:958 i = 0 original_return_value = 0x0 calling_symbol_table = 0x0 original_op_array = 0x71806650 original_opline_ptr = 0x77fa6138 current_scope = 0x71802570 current_called_scope = 0x71802570 calling_scope = 0x7073d6d8 called_scope = 0x7073d6d8 current_this = 0x7fffed5d82b0 execute_data = {opline = 0x0, function_state = {function = 0x70c30e30, arguments = 0x77fa6a08}, fbc = 0x0, called_scope = 0x0, op_array = 0x0, object = 0x708973d0, Ts = 0x77fa61d8, CVs = 0x77fa61c8, symbol_table = 0x0, prev_execute_data = 0x77fa6138, old_error_reporting = 0x0, nested = 1 '\001', original_return_value = 0x70dfddb8, current_scope = 0x70dfea80, current_called_scope = 0x70fc7638, current_this = 0x70fc7818, current_object = 0x0} fci_cache_local = {initialized = 144 '\220', function_handler = 0x0, calling_scope = 0x7fff9670, called_scope = 0x711188f0, object_ptr = 0x0} #5 0x00807695 in zend_call_method (object_pp=0x7fff99b8, obj_ce=0x7073d6d8, fn_proxy=0x7fff99b0, function_name=0xd039c6 "__destruct", function_name_len=10, retval_ptr_ptr=0x0, param_count=0, arg1=0x0, arg2=0x0) at /usr/local/src/php-5.4.9/Zend/zend_interfaces.c:97 fcic = {initialized = 1 '\001', function_handler = 0x70c30e30, calling_scope = 0x7073d6d8, called_scope = 0x7073d6d8, object_ptr = 0x708973d0} result = 32 fci = {size = 72, function_table = 0xf9b2d0, function_name = 0x7fff9910, symbol_table = 0x0, retval_ptr_ptr = 0x7fff9948, param_count = 0, params = 0x7fff9930, object_ptr = 0x708973d0, no_separation = 1 '\001'} z_fname = {value = {lval = 140737488329072, dval = 6.9533558065377856e- 310, str = { val = 0x7fff9970 "\360\231\377\377\377\177", len = 8280692}, ht = 0x7fff9970, obj = {handle = 4294941040, handlers = 0x7e5a74}}, refcount__gc = 4035539952, type = 255 '\377', is_ref__gc = 127 '\177'} retval = 0x0 function_table = 0x7073d700 params = {0x7fff9988, 0x7fff9990} #6 0x00814fbf in zend_objects_destroy_object (object=0x70745cc0, handle=45021) at /usr/local/src/php-5.4.9/Zend/zend_objects.c:123 old_exception = 0x0 obj = 0x708973d0 obj_bucket = 0x7fffee6a87b0 destructor = 0x70c30e30 #7 0x008125d9 in gc_collect_cycles () at /usr/local/src/php- 5.4.9/Zend/zend_gc.c:814 p = 0x70745d38 q = 0x0 orig_free_list = 0x0 o
[PHP-BUG] Bug #63678 [NEW]: SplObjectStorage->current() !== current(SplObjectStorage)
From: Alex at phpguide dot co dot il Operating system: debian 6 PHP version: 5.4.9 Package: SPL related Bug Type: Bug Bug description:SplObjectStorage->current() !== current(SplObjectStorage) Description: $SplObjectStorage->current() returns different value from current($SplObjectStorage). Test script: --- class test { public $val; public function __construct() { $this->val = rand(); } } class blat extends \SplObjectStorage { public function add() { $this->attach(new test()); } } $blat = new blat(); $blat->add(); $blat->add(); $blat->add(); $blat->add(); var_dump($blat->current() === current($blat)); // null === false Expected result: true Actual result: -- false -- Edit bug report at https://bugs.php.net/bug.php?id=63678&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=63678&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=63678&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=63678&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=63678&r=fixed Fixed in release: https://bugs.php.net/fix.php?id=63678&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=63678&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=63678&r=needscript Try newer version: https://bugs.php.net/fix.php?id=63678&r=oldversion Not developer issue:https://bugs.php.net/fix.php?id=63678&r=support Expected behavior: https://bugs.php.net/fix.php?id=63678&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=63678&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=63678&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=63678&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63678&r=php4 Daylight Savings: https://bugs.php.net/fix.php?id=63678&r=dst IIS Stability: https://bugs.php.net/fix.php?id=63678&r=isapi Install GNU Sed:https://bugs.php.net/fix.php?id=63678&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=63678&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=63678&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=63678&r=mysqlcfg
Bug #63678 [Com]: SplObjectStorage->current() !== current(SplObjectStorage)
Edit report at https://bugs.php.net/bug.php?id=63678&edit=1 ID: 63678 Comment by: mail+php at requinix dot net Reported by:Alex at phpguide dot co dot il Summary:SplObjectStorage->current() !== current(SplObjectStorage) Status: Open Type: Bug Package:SPL related Operating System: debian 6 PHP Version:5.4.9 Block user comment: N Private report: N New Comment: SplObjectStorage provides ->current() as part of the implementation to Iterator/Traversable. If you want to call it directly you may need to obey the Iterator convention of calling ->rewind() first. But doing so only changes the ->current() value to be the object and not null. Even with $blat->rewind() and reset($blat) both key() and current() behave differently. In the example for SplObjectStorage::current() it includes $object = $s->current(); // similar to current($s) so I would also expect them to behave the same. tl;dr with ->rewind() and reset(): key($blat)==null, current($blat)==false $blat->key()==0, $blat->current()==a test object Without ->rewind() and reset(): key($blat)==null, current($blat)==false $blat->key()==0, $blat->current()==null Previous Comments: [2012-12-03 21:07:18] Alex at phpguide dot co dot il Description: $SplObjectStorage->current() returns different value from current($SplObjectStorage). Test script: --- class test { public $val; public function __construct() { $this->val = rand(); } } class blat extends \SplObjectStorage { public function add() { $this->attach(new test()); } } $blat = new blat(); $blat->add(); $blat->add(); $blat->add(); $blat->add(); var_dump($blat->current() === current($blat)); // null === false Expected result: true Actual result: -- false -- Edit this bug report at https://bugs.php.net/bug.php?id=63678&edit=1
Bug #63651 [Com]: preg_replace() returns null for very long string
Edit report at https://bugs.php.net/bug.php?id=63651&edit=1 ID: 63651 Comment by: mail+php at requinix dot net Reported by:magog dot the dot ogre at gmail dot com Summary:preg_replace() returns null for very long string Status: Open Type: Bug Package:PCRE related Operating System: Windows, Unix PHP Version:5.3.19 Block user comment: N Private report: N New Comment: You're hitting the backtrack limit defined as the pcre.backtrack_limit setting. If I up mine to 1000 (10e6) I get a string(80) "Hello worldHello world..." Simply put, your regex is too inefficient to work on that $text. Previous Comments: [2012-11-30 01:46:45] magog dot the dot ogre at gmail dot com Description: I have tested and gotten this error on the following two distros: *5.3.19 for Windows *5.3.8 for SunOS Run the code at the pastebin link I've provided. You will see that PHP is returning null in a preg_replace function! It occurs in both Windows and Unix. I do not know if this is a PHP problem, or a PCRE problem. Test script: --- http://pastebin.com/PBCDexXH Expected result: A string should be outputted Actual result: -- Instead, a NULL result is outputted. -- Edit this bug report at https://bugs.php.net/bug.php?id=63651&edit=1
[PHP-BUG] Bug #63680 [NEW]: Memleak in splfixedarray with cycle reference
From: laruence Operating system: PHP version: 5.4.9 Package: SPL related Bug Type: Bug Bug description:Memleak in splfixedarray with cycle reference Description: dmitry introduced the new get_gc handler, but seems splfixedarray doesn't implement it. also there are some other extensions still using ugly implementation for gc, I will review them one by one. thanks Test script: --- https://bugs.php.net/bug.php?id=63680&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=63680&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=63680&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=63680&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=63680&r=fixed Fixed in release: https://bugs.php.net/fix.php?id=63680&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=63680&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=63680&r=needscript Try newer version: https://bugs.php.net/fix.php?id=63680&r=oldversion Not developer issue:https://bugs.php.net/fix.php?id=63680&r=support Expected behavior: https://bugs.php.net/fix.php?id=63680&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=63680&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=63680&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=63680&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63680&r=php4 Daylight Savings: https://bugs.php.net/fix.php?id=63680&r=dst IIS Stability: https://bugs.php.net/fix.php?id=63680&r=isapi Install GNU Sed:https://bugs.php.net/fix.php?id=63680&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=63680&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=63680&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=63680&r=mysqlcfg
Bug #63680 [PATCH]: Memleak in splfixedarray with cycle reference
Edit report at https://bugs.php.net/bug.php?id=63680&edit=1 ID: 63680 Patch added by: larue...@php.net Reported by:larue...@php.net Summary:Memleak in splfixedarray with cycle reference Status: Open Type: Bug Package:SPL related PHP Version:5.4.9 Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: bug63680.patch Revision: 1354598600 URL: https://bugs.php.net/patch-display.php?bug=63680&patch=bug63680.patch&revision=1354598600 Previous Comments: [2012-12-04 05:22:46] larue...@php.net Description: dmitry introduced the new get_gc handler, but seems splfixedarray doesn't implement it. also there are some other extensions still using ugly implementation for gc, I will review them one by one. thanks Test script: --- https://bugs.php.net/bug.php?id=63680&edit=1
[PHP-BUG] Bug #63681 [NEW]: Use get_gc instead of hack of get_properties
From: laruence Operating system: PHP version: 5.4.9 Package: SPL related Bug Type: Bug Bug description:Use get_gc instead of hack of get_properties Description: imporve the gc handler for spl_object Test script: --- none Expected result: none Actual result: -- none -- Edit bug report at https://bugs.php.net/bug.php?id=63681&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=63681&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=63681&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=63681&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=63681&r=fixed Fixed in release: https://bugs.php.net/fix.php?id=63681&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=63681&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=63681&r=needscript Try newer version: https://bugs.php.net/fix.php?id=63681&r=oldversion Not developer issue:https://bugs.php.net/fix.php?id=63681&r=support Expected behavior: https://bugs.php.net/fix.php?id=63681&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=63681&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=63681&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=63681&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63681&r=php4 Daylight Savings: https://bugs.php.net/fix.php?id=63681&r=dst IIS Stability: https://bugs.php.net/fix.php?id=63681&r=isapi Install GNU Sed:https://bugs.php.net/fix.php?id=63681&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=63681&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=63681&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=63681&r=mysqlcfg
Bug #63681 [PATCH]: Use get_gc instead of hack of get_properties
Edit report at https://bugs.php.net/bug.php?id=63681&edit=1 ID: 63681 Patch added by: larue...@php.net Reported by:larue...@php.net Summary:Use get_gc instead of hack of get_properties Status: Open Type: Bug Package:SPL related PHP Version:5.4.9 Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: bug63681.patch Revision: 1354599228 URL: https://bugs.php.net/patch-display.php?bug=63681&patch=bug63681.patch&revision=1354599228 Previous Comments: [2012-12-04 05:33:22] larue...@php.net Description: imporve the gc handler for spl_object Test script: --- none Expected result: none Actual result: -- none -- Edit this bug report at https://bugs.php.net/bug.php?id=63681&edit=1
[PHP-BUG] Bug #63682 [NEW]: Use get_gc instead of hack of get_properties
From: laruence Operating system: PHP version: 5.4.9 Package: SimpleXML related Bug Type: Bug Bug description:Use get_gc instead of hack of get_properties Description: see summary Test script: --- none Expected result: none Actual result: -- none -- Edit bug report at https://bugs.php.net/bug.php?id=63682&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=63682&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=63682&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=63682&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=63682&r=fixed Fixed in release: https://bugs.php.net/fix.php?id=63682&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=63682&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=63682&r=needscript Try newer version: https://bugs.php.net/fix.php?id=63682&r=oldversion Not developer issue:https://bugs.php.net/fix.php?id=63682&r=support Expected behavior: https://bugs.php.net/fix.php?id=63682&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=63682&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=63682&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=63682&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63682&r=php4 Daylight Savings: https://bugs.php.net/fix.php?id=63682&r=dst IIS Stability: https://bugs.php.net/fix.php?id=63682&r=isapi Install GNU Sed:https://bugs.php.net/fix.php?id=63682&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=63682&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=63682&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=63682&r=mysqlcfg
Bug #63682 [PATCH]: Use get_gc instead of hack of get_properties
Edit report at https://bugs.php.net/bug.php?id=63682&edit=1 ID: 63682 Patch added by: larue...@php.net Reported by:larue...@php.net Summary:Use get_gc instead of hack of get_properties Status: Open Type: Bug Package:SimpleXML related PHP Version:5.4.9 Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: bug63682.patch Revision: 1354599675 URL: https://bugs.php.net/patch-display.php?bug=63682&patch=bug63682.patch&revision=1354599675 Previous Comments: [2012-12-04 05:40:38] larue...@php.net Description: see summary Test script: --- none Expected result: none Actual result: -- none -- Edit this bug report at https://bugs.php.net/bug.php?id=63682&edit=1
[PHP-BUG] Bug #63683 [NEW]: Use get_gc instead of hack of get_properties
From: laruence Operating system: PHP version: 5.4.9 Package: Date/time related Bug Type: Bug Bug description:Use get_gc instead of hack of get_properties Description: see summary Test script: --- none Expected result: none Actual result: -- none -- Edit bug report at https://bugs.php.net/bug.php?id=63683&edit=1 -- Try a snapshot (PHP 5.4): https://bugs.php.net/fix.php?id=63683&r=trysnapshot54 Try a snapshot (PHP 5.3): https://bugs.php.net/fix.php?id=63683&r=trysnapshot53 Try a snapshot (trunk): https://bugs.php.net/fix.php?id=63683&r=trysnapshottrunk Fixed in SVN: https://bugs.php.net/fix.php?id=63683&r=fixed Fixed in release: https://bugs.php.net/fix.php?id=63683&r=alreadyfixed Need backtrace: https://bugs.php.net/fix.php?id=63683&r=needtrace Need Reproduce Script: https://bugs.php.net/fix.php?id=63683&r=needscript Try newer version: https://bugs.php.net/fix.php?id=63683&r=oldversion Not developer issue:https://bugs.php.net/fix.php?id=63683&r=support Expected behavior: https://bugs.php.net/fix.php?id=63683&r=notwrong Not enough info: https://bugs.php.net/fix.php?id=63683&r=notenoughinfo Submitted twice: https://bugs.php.net/fix.php?id=63683&r=submittedtwice register_globals: https://bugs.php.net/fix.php?id=63683&r=globals PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63683&r=php4 Daylight Savings: https://bugs.php.net/fix.php?id=63683&r=dst IIS Stability: https://bugs.php.net/fix.php?id=63683&r=isapi Install GNU Sed:https://bugs.php.net/fix.php?id=63683&r=gnused Floating point limitations: https://bugs.php.net/fix.php?id=63683&r=float No Zend Extensions: https://bugs.php.net/fix.php?id=63683&r=nozend MySQL Configuration Error: https://bugs.php.net/fix.php?id=63683&r=mysqlcfg
Bug #63683 [PATCH]: Use get_gc instead of hack of get_properties
Edit report at https://bugs.php.net/bug.php?id=63683&edit=1 ID: 63683 Patch added by: larue...@php.net Reported by:larue...@php.net Summary:Use get_gc instead of hack of get_properties Status: Open Type: Bug Package:Date/time related PHP Version:5.4.9 Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: bug63683.patch Revision: 1354600121 URL: https://bugs.php.net/patch-display.php?bug=63683&patch=bug63683.patch&revision=1354600121 Previous Comments: [2012-12-04 05:48:02] larue...@php.net Description: see summary Test script: --- none Expected result: none Actual result: -- none -- Edit this bug report at https://bugs.php.net/bug.php?id=63683&edit=1
Bug #63682 [PATCH]: Use get_gc instead of hack of get_properties
Edit report at https://bugs.php.net/bug.php?id=63682&edit=1 ID: 63682 Patch added by: larue...@php.net Reported by:larue...@php.net Summary:Use get_gc instead of hack of get_properties Status: Open Type: Bug Package:SimpleXML related PHP Version:5.4.9 Block user comment: N Private report: N New Comment: The following patch has been added/updated: Patch Name: bug63682.patch Revision: 1354601347 URL: https://bugs.php.net/patch-display.php?bug=63682&patch=bug63682.patch&revision=1354601347 Previous Comments: [2012-12-04 05:41:15] larue...@php.net The following patch has been added/updated: Patch Name: bug63682.patch Revision: 1354599675 URL: https://bugs.php.net/patch-display.php?bug=63682&patch=bug63682.patch&revision=1354599675 [2012-12-04 05:40:38] larue...@php.net Description: see summary Test script: --- none Expected result: none Actual result: -- none -- Edit this bug report at https://bugs.php.net/bug.php?id=63682&edit=1
Bug #63680 [Opn->Asn]: Memleak in splfixedarray with cycle reference
Edit report at https://bugs.php.net/bug.php?id=63680&edit=1 ID: 63680 Updated by: dmi...@php.net Reported by:larue...@php.net Summary:Memleak in splfixedarray with cycle reference -Status: Open +Status: Assigned Type: Bug Package:SPL related PHP Version:5.4.9 -Assigned To: +Assigned To:dmitry Block user comment: N Private report: N Previous Comments: [2012-12-04 05:23:20] larue...@php.net The following patch has been added/updated: Patch Name: bug63680.patch Revision: 1354598600 URL: https://bugs.php.net/patch-display.php?bug=63680&patch=bug63680.patch&revision=1354598600 [2012-12-04 05:22:46] larue...@php.net Description: dmitry introduced the new get_gc handler, but seems splfixedarray doesn't implement it. also there are some other extensions still using ugly implementation for gc, I will review them one by one. thanks Test script: --- https://bugs.php.net/bug.php?id=63680&edit=1
Bug #63651 [Opn->Nab]: preg_replace() returns null for very long string
Edit report at https://bugs.php.net/bug.php?id=63651&edit=1 ID: 63651 Updated by: ni...@php.net Reported by:magog dot the dot ogre at gmail dot com Summary:preg_replace() returns null for very long string -Status: Open +Status: Not a bug Type: Bug Package:PCRE related Operating System: Windows, Unix PHP Version:5.3.19 Block user comment: N Private report: N New Comment: In particular this part of the regex seems odd: \s*?)\s*\s* Three asterix-quantifier on the same thing in a row, that's something that can easily blow up a regular expression ;) Previous Comments: [2012-12-04 01:04:38] mail+php at requinix dot net You're hitting the backtrack limit defined as the pcre.backtrack_limit setting. If I up mine to 1000 (10e6) I get a string(80) "Hello worldHello world..." Simply put, your regex is too inefficient to work on that $text. [2012-11-30 01:46:45] magog dot the dot ogre at gmail dot com Description: I have tested and gotten this error on the following two distros: *5.3.19 for Windows *5.3.8 for SunOS Run the code at the pastebin link I've provided. You will see that PHP is returning null in a preg_replace function! It occurs in both Windows and Unix. I do not know if this is a PHP problem, or a PCRE problem. Test script: --- http://pastebin.com/PBCDexXH Expected result: A string should be outputted Actual result: -- Instead, a NULL result is outputted. -- Edit this bug report at https://bugs.php.net/bug.php?id=63651&edit=1