Bug #65499 [Com]: json_decode reports invalid literal as valid JSON

2013-08-22 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65499&edit=1

 ID: 65499
 Comment by:     r...@php.net
 Reported by:m dot kurzyna at crystalpoint dot pl
 Summary:json_decode reports invalid literal as valid JSON
 Status: Closed
 Type:   Bug
 Package:JSON related
 Operating System:   Linux
 PHP Version:5.5.2
 Block user comment: N
 Private report: N

 New Comment:

As Fedora, Ubuntu and some other Linux distributions have switch to JSONC 
extension, you can report this strictness change in 
https://github.com/remicollet/pecl-json-c/issues?state=open


Previous Comments:

[2013-08-22 15:16:32] m dot kurzyna at crystalpoint dot pl

I'm at Ubuntu. 

I've built current master (from git) and also didn't reproduce this behaviour 
so just as you suggest - it seems to be packagers problem. 

I will report to Ubuntu maintainers.


[2013-08-22 11:34:15] yohg...@php.net

It seems my fedora 19 x86_64 does this, while my PHP-5.5 branch don't on the 
same machine. It seems packager's issue.

$ php
https://bugs.php.net/bug.php?id=65499


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65499&edit=1


Bug #65446 [Com]: disk_total_space doesn't work with LVM

2013-08-27 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65446&edit=1

 ID: 65446
 Comment by:     r...@php.net
 Reported by:puciek at gmail dot com
 Summary:disk_total_space doesn't work with LVM
 Status: Feedback
 Type:   Bug
 Package:Filesystem function related
 Operating System:   Centos, Gentoo, Ubuntu
 PHP Version:5.4.17
 Block user comment: N
 Private report: N

 New Comment:

I means which "exact" value for directory option.

If you use "/dev/mapper/batty-root" which is only a file (ok, a special one) it 
will report about space in /dev (so 4G)

If you use "/" it will report about space in /


Previous Comments:

[2013-08-27 10:29:08] puciek at gmail dot com

Director inside LVM share which we want to measure

----
[2013-08-27 09:30:06] r...@php.net

I was asking for the option given to the disk_total_space call.


[2013-08-27 08:29:57] puciek at gmail dot com

df with parameter "-h" changes the output data from bytes to more human 
readable 
format 
-h, --human-readable
  print sizes in human readable format (e.g., 1K 234M 2G)

--------
[2013-08-27 08:26:32] r...@php.net

I cannot reproduce, tested with
PHP 5.4.19 / RHEL-6
PHP 5.5.3 / Fedora 19

As this function is a simple wrapper other the statvfs (or statfs), I don't 
think of a PHP bug.

What is the option used in the test call ?


[2013-08-13 21:21:13] puciek at gmail dot com

Description:

Running disk_total_space on a system that is using LVM it will return 
completely 
incorrect data.
For example on a machine with result of "df -h" as follows:
Filesystem   Size  Used Avail Use% Mounted on
/dev/mapper/vg-vg_root99G   47G   47G  50% /
tmpfs 32G 0   32G   0% /dev/shm
/dev/sda1194M   65M  120M  36% /boot
/dev/mapper/vg-vg_backup 400G   33M  400G   1% /var/tmp
/dev/mapper/vg-vg_mysql  950G   81G  870G   9% /data

on this setup it will always return 32G.

We get similar result on second machine with "df -h":
Filesystem  Size  Used Avail Use% Mounted on
/dev/mapper/batty-root  258G  217G   29G  89% /
none4.0G  208K  4.0G   1% /dev
none4.0G 0  4.0G   0% /dev/shm
none4.0G   88K  4.0G   1% /var/run
none4.0G 0  4.0G   0% /var/lock
none4.0G 0  4.0G   0% /lib/init/rw
none258G  217G   29G  89% /var/lib/ureadahead/debugfs 

where it will always return 4G.

At first that it was because of outdated version of PHP, original tests were 
with PHP version 5.3.27 and 5.3.6, but then I was able to reproduce it on my 
testing box with Gentoo and PHP 5.4.17.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65446&edit=1


Bug #65564 [Com]: stack-buffer-overflow in DateTimeZone stuff caught by AddressSanitizer

2013-08-29 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65564&edit=1

 ID: 65564
 Comment by:     r...@php.net
 Reported by:dhiru dot kholia at gmail dot com
 Summary:stack-buffer-overflow in DateTimeZone stuff caught
 by AddressSanitizer
 Status: Open
 Type:   Bug
 Package:Reproducible crash
 Operating System:   Fedora 19
 PHP Version:5.5.3
 Block user comment: N
 Private report: N

 New Comment:

Reproduced php5.5-201308300430 snapshot.

This issue make 62 failed tests, all in date extension.

=
FAILED TEST SUMMARY
-
date_isodate_set() tests [ext/date/tests/012.phpt]
date_date_set() tests [ext/date/tests/013.phpt]
timezone_offset_get() tests [ext/date/tests/014.phpt]
Test clone on DateTimeZone objects 
[ext/date/tests/DateTimeZone_clone_basic1.phpt]
Testing clone on objects whoose class derived from DateTimeZone class 
[ext/date/tests/DateTimeZone_clone_basic2.phpt]
Test clone of DateTimeZOne objects 
[ext/date/tests/DateTimeZone_clone_basic3.phpt]
Test new DateTimeZone() : basic functionality 
[ext/date/tests/DateTimeZone_construct_basic.phpt]
Test serialization of DateTimeZone objects 
[ext/date/tests/DateTimeZone_serialize_type_1.phpt]
Test serialization of DateTimeZone objects 
[ext/date/tests/DateTimeZone_serialize_type_2.phpt]
Test serialization of DateTimeZone objects 
[ext/date/tests/DateTimeZone_serialize_type_3.phpt]
Test clone of objects whoose class derived from DateTime class 
[ext/date/tests/DateTime_clone_basic2.phpt]
Test clone of DateTime objects [ext/date/tests/DateTime_clone_basic3.phpt]
Test new DateTime() : basic functionality 
[ext/date/tests/DateTime_construct_basic1.phpt]
Test new DateTime() function : usage variation - Passing unexpected values to 
first argument $time. [ext/date/tests/DateTime_construct_variation1.phpt]
Test new DateTime() function : usage variation - Passing unexpected values to 
second argument $timezone. [ext/date/tests/DateTime_construct_variation2.phpt]
Test DateTime::modify() function : usage variation - Passing unexpected values 
to first argument $modify. [ext/date/tests/DateTime_modify_variation1.phpt]
Test serialization of DateTime objects [ext/date/tests/DateTime_serialize.phpt]
Test DateTime::setDate() function : usage variation - Passing unexpected values 
to first argument $year. [ext/date/tests/DateTime_setDate_variation1.phpt]
Test DateTime::setDate() function : usage variation - Passing unexpected values 
to second argument $month. [ext/date/tests/DateTime_setDate_variation2.phpt]
Test DateTime::setDate() function : usage variation - Passing unexpected values 
to third argument $day. [ext/date/tests/DateTime_setDate_variation3.phpt]
Test DateTime::setISODate() function : usage variation - Passing unexpected 
values to first argument $year. 
[ext/date/tests/DateTime_setISODate_variation1.phpt]
Test DateTime::setISODate() function : usage variation - Passing unexpected 
values to second argument $week. 
[ext/date/tests/DateTime_setISODate_variation2.phpt]
Test DateTime::setISODate() function : usage variation - Passing unexpected 
values to third argument $day. 
[ext/date/tests/DateTime_setISODate_variation3.phpt]
Test DateTime::setTime() function : usage variation - Passing unexpected values 
to first argument $hour. [ext/date/tests/DateTime_setTime_variation1.phpt]
Test DateTime::setTime() function : usage variation - Passing unexpected values 
to second argument $minute. [ext/date/tests/DateTime_setTime_variation2.phpt]
Test DateTime::setTime() function : usage variation - Passing unexpected values 
to third argument $second. [ext/date/tests/DateTime_setTime_variation3.phpt]
Bug #41523 (strtotime('-00-00 00:00:00') is parsed as 1999-11-30) (64 bit) 
[ext/date/tests/bug41523-64bit.phpt]
Bug #45682 (Unable to var_dump(DateInterval)) [ext/date/tests/bug45682.phpt]
Bug #46108 (DateTime - Memory leak when unserializing) 
[ext/date/tests/bug46108.phpt]
Bug #48097 (date_timezone_set function produces wrong datetime result) 
[ext/date/tests/bug48097.phpt]
Bug #48678 (DateInterval segfaults when unserialising) 
[ext/date/tests/bug48678.phpt]
Bug #49081 (DateTime::diff() mistake if start in January and interval > 28 
days) [ext/date/tests/bug49081.phpt]
Bug #49778 (DateInterval::format("%a") is always zero when an interval is 
created from an ISO string) [ext/date/tests/bug49778.phpt]
Bug #51866 (Lenient parsing with parseFromFormat) [ext/date/tests/bug51866.phpt]
Bug #52113 (Seg fault while creating (by unserialization) DatePeriod) 
[ext/date/tests/bug52113.phpt]
Bug #52738 (Can't use new properties in class extended from DateInterval) 
[ext/date/tests/bug52738.phpt]
Bug #52808 (Segfault when specifying interval as two dates) 
[ext/date/tests/bug52808.phpt]
Bug #53437 (Crash when using 

Bug #60633 [Com]: build warning

2013-10-02 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=60633&edit=1

 ID: 60633
 Comment by:     r...@php.net
 Reported by:fedora at famillecollet dot com
 Summary:build warning
 Status: Open
 Type:   Bug
 Package:BC math related
 Operating System:   GNU/Linux (Fedora 16)
 PHP Version:5.4SVN-2012-01-01 (snap)
 Block user comment: N
 Private report: N

 New Comment:

@Mike, I can't find upstream for this library...

So I don't know if we can fix those "trivial" build warning in the php tree 
(the reason why I kept this bug open, while I can have commit the patch)


Previous Comments:

[2013-10-02 09:39:06] m...@php.net

Nevermind the last comment.


[2013-10-02 09:27:26] m...@php.net

Do we already patch this lib, or is it untouched?


[2012-01-01 08:32:23] fedora at famillecollet dot com

Description:

Build warning

Test script:
---
make

Expected result:

No warning


Actual result:
--
/home/rpmbuild/BUILD/php5.4-201112300630/ext/bcmath/libbcmath/src/recmul.c: In 
function '_bc_rec_mul':
/home/rpmbuild/BUILD/php5.4-201112300630/ext/bcmath/libbcmath/src/recmul.c:186:14:
 warning: variable 'v0len' set but not used [-Wunused-but-set-variable]
/home/rpmbuild/BUILD/php5.4-201112300630/ext/bcmath/libbcmath/src/recmul.c:186:7:
 warning: variable 'u0len' set but not used [-Wunused-but-set-variable]







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=60633&edit=1


[PHP-BUG] Bug #61288 [NEW]: pdo_mysql___construct_options_libmysql.phpt test fails

2012-03-05 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 16)
PHP version:  5.4.0
Package:  MySQL related
Bug Type: Bug
Bug description:pdo_mysql___construct_options_libmysql.phpt test fails

Description:

When no connexion is available, this test should not fails but be skipped
(as the others)

Please see trivial patch attached

Sorry, I don't find a "pdo_mysql" in package list

Test script:
---
pear run-tests pdo_mysql___construct_options_libmysql.phpt

Expected result:

Running 1 tests
SKIP MySQL PDO->__construct(), libmysql only
options[pdo_mysql___construct_options_libmysql.phpt](reason:
SQLSTATE[28000] [1045] Access denied for user 'root'@'localhost' (using
password: NO))
TOTAL TIME: 00:00
0 PASSED TESTS
1 SKIPPED TESTS


Actual result:
--
Running 1 tests
FAIL MySQL PDO->__construct(), libmysql only
options[pdo_mysql___construct_options_libmysql.phpt]
wrote log to "/dev/shm/php-5.4.0/ext/pdo_mysql/tests/run-tests.log"
TOTAL TIME: 00:01
0 PASSED TESTS
0 SKIPPED TESTS
1 FAILED TESTS:


-- 
Edit bug report at https://bugs.php.net/bug.php?id=61288&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61288&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61288&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61288&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61288&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61288&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61288&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61288&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61288&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61288&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61288&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61288&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61288&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61288&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61288&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61288&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61288&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61288&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61288&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61288&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61288&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61288&r=mysqlcfg



[PHP-BUG] Bug #61291 [NEW]: tiger is broken

2012-03-05 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 16)
PHP version:  5.4.0
Package:  hash related
Bug Type: Bug
Bug description:tiger is broken

Description:

mhash_001 and mash_003 fails.

For mhash 001
025+ MHASH_TIGER: string(48)
"fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"
026+ MHASH_TIGER: string(48)
"953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

Some tests


 PHP 5.1.6

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

 PHP 5.3.10

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r 'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash
extension...",true)));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

 PHP 5.4.0

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash
extension...")));'
string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

php -r 'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash
extension...",true)));'
string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

=== PHP 5.4.0 with patch

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r  'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash
extension...",true)));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"




-- 
Edit bug report at https://bugs.php.net/bug.php?id=61291&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61291&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61291&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61291&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61291&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61291&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61291&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61291&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61291&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61291&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61291&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61291&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61291&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61291&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61291&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61291&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61291&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61291&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61291&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61291&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61291&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61291&r=mysqlcfg



Bug #61291 [Com]: tiger is broken

2012-03-05 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=61291&edit=1

 ID: 61291
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:tiger is broken
 Status: Open
 Type:   Bug
 Package:hash related
 Operating System:   GNU/Linux (Fedora 16)
 PHP Version:5.4.0
 Block user comment: N
 Private report: N

 New Comment:

Seems related to 
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/ext/hash/hash_tiger.c?r1=321634&r2=322437

(8 * (0%8)) != 56


The patch fixes this, and the "old" tests.

I think, this will break the "new" tests (added after the regression was 
introduce)


Previous Comments:
----
[2012-03-05 16:29:36] r...@php.net

Description:

mhash_001 and mash_003 fails.

For mhash 001
025+ MHASH_TIGER: string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"
026+ MHASH_TIGER: string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

Some tests


 PHP 5.1.6

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

 PHP 5.3.10

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r 'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash 
extension...",true)));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

 PHP 5.4.0

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

php -r 'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash 
extension...",true)));'
string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

=== PHP 5.4.0 with patch

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r  'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash 
extension...",true)));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"









-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61291&edit=1


Bug #61291 [Com]: tiger is broken

2012-03-06 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=61291&edit=1

 ID: 61291
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:tiger is broken
 Status: Not a bug
 Type:   Bug
 Package:hash related
 Operating System:   GNU/Linux (Fedora 16)
 PHP Version:5.4.0
 Assigned To:mike
 Block user comment: N
 Private report: N

 New Comment:

So, to clarify the fix for bug #60221

The new result is ok.

So, mhash_001.phpt and mash_003.phpt tests need to be fixed

So, if I have store hash results somewhere with php < 5.4.0, I won't be able to 
check this with php >= 5.4.0 ?


Previous Comments:

[2012-03-06 12:01:27] m...@php.net

To clarify the situation, it's just a matter of how to display the hash:

http://pastie.org/3532887


[2012-03-06 08:50:02] m...@php.net

Hi Remi,

this is not a bug, it's the result of a fix for bug #60221
See alos bug #32463

Thanks,
Mike

----
[2012-03-05 16:34:20] r...@php.net

Seems related to 
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/ext/hash/hash_tiger.c?r1=321634&r2=322437

(8 * (0%8)) != 56


The patch fixes this, and the "old" tests.

I think, this will break the "new" tests (added after the regression was 
introduce)

--------
[2012-03-05 16:29:36] r...@php.net

Description:

mhash_001 and mash_003 fails.

For mhash 001
025+ MHASH_TIGER: string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"
026+ MHASH_TIGER: string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

Some tests


 PHP 5.1.6

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

 PHP 5.3.10

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r 'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash 
extension...",true)));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

 PHP 5.4.0

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

php -r 'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash 
extension...",true)));'
string(48) "953ac3799a01b9fdeb91aeab97207e67395cbb54300be00d"

=== PHP 5.4.0 with patch

php -r 'var_dump(bin2hex(mhash(MHASH_TIGER,"This is the test of the mhash 
extension...")));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"

php -r  'var_dump(bin2hex(hash("tiger192,3","This is the test of the mhash 
extension...",true)));'
string(48) "fdb9019a79c33a95677e2097abae91eb0de00b3054bb5c39"









-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61291&edit=1


Bug #64258 [Com]: XMLReader not compatibile with new libxml2 (undefined symbol: xmlTextReaderSet)

2013-02-21 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64258&edit=1

 ID: 64258
 Comment by:     r...@php.net
 Reported by:spamik at yum dot pl
 Summary:XMLReader not compatibile with new libxml2
 (undefined symbol: xmlTextReaderSet)
 Status: Open
 Type:   Bug
 Package:XML Reader
 PHP Version:5.4.11
 Block user comment: N
 Private report: N

 New Comment:

Cannot reproduce.

php 5.4.11 and 5.4.12 build against libxml2 and work as expected.


Previous Comments:

[2013-02-21 00:01:56] spamik at yum dot pl

Description:

datadata';
$xml->XML($xmldata);
?>

php 5.4.11 compiled with libxml2 2.9.0

/usr/bin/php: symbol lookup error: /usr/bin/php: undefined symbol: 
xmlTextReaderSetup

It works when php is compiled against libxml2 2.6.26 
XMLReader is not compatibile with new libxml2 version.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=64258&edit=1


Bug #64461 [Com]: Zend/zend_language_parser.h error with --enable-maintainer-zts in tarballs

2013-03-22 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64461&edit=1

 ID: 64461
 Comment by:     r...@php.net
 Reported by:kevin dot waterson at gmail dot com
 Summary:Zend/zend_language_parser.h error with
 --enable-maintainer-zts in tarballs
 Status: Re-Opened
 Type:   Bug
 Package:Compile Failure
 Operating System:   Centos 6.3
 PHP Version:5.5.0beta1
 Block user comment: N
 Private report: N

 New Comment:

5.5.0beta1 parser is generated with bison 2.6.1
snapshot parser is generated with bison 2.4.1

And snapshot works.


Previous Comments:

[2013-03-22 00:32:05] ahar...@php.net

The tarball version of Zend/zend_language_parser.h has the following extra 
declarations (at the end of the file, just before the last #endif) compared to 
the generated version in my git checkout:

#ifdef YYPARSE_PARAM
#if defined __STDC__ || defined __cplusplus
int zendparse (void *YYPARSE_PARAM);
#else
int zendparse ();
#endif
#else /* ! YYPARSE_PARAM */
#if defined __STDC__ || defined __cplusplus
int zendparse (void);
#else
int zendparse ();
#endif
#endif /* ! YYPARSE_PARAM */


[2013-03-22 00:29:58] ahar...@php.net

Mea culpa; I should have dug into this a little more. I can now reproduce this 
with beta 1, after seeing another report on IRC.

Short version: configuring tarball builds with --enable-maintainer-zts results 
in 
the error in the original report. I can't reproduce this if I run buildconf 
myself in a Git tree, so it's something peculiar to the distributed tarballs.


[2013-03-20 23:16:46] s...@php.net

Closing as per previous comment


[2013-03-20 23:11:11] kevin dot waterson at gmail dot com

OK! Fixed in latest snap. Thanks for looking
Kev


[2013-03-20 20:20:16] ahar...@php.net

I don't seem to be able to reproduce this. So, a few questions for you:

1. How did you get PHP? Tarball, git checkout, something else?
2. Does the error still occur with a blank configure line (ie just ./configure)?
3. Does it still happen with the latest 5.5 snapshot from http://snaps.php.net/?




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=64461


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=64461&edit=1


Bug #64503 [Com]: Compilation fails with error: conflicting types for 'zendparse'

2013-03-25 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64503&edit=1

 ID: 64503
 Comment by:     r...@php.net
 Reported by:stormbyte at gmail dot com
 Summary:Compilation fails with error: conflicting types for
 'zendparse'
 Status: Assigned
 Type:   Bug
 Package:Compile Failure
 Operating System:   Gentoo
 PHP Version:5.5.0beta1
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

Sorry for the delay.

Test done with 201303251230 snapshot, and, to ensure file being regenerated
rm Zend/zend_{language,ini}_parser.[ch]
Do you think this is enough ?


Fedora 18, bison 2.6.1: ok.
Fedora 17, bison 2.5.1: ok
RHEL 6.4, bison 2.4.1; HS

/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c: In 
function 'tokenizer_register_constants':
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:32: 
error: 'T_REQUIRE_ONCE' undeclared (first use in this function)
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:32: 
error: (Each undeclared identifier is reported only once
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:32: 
error: for each function it appears in.)
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:33: 
error: 'T_REQUIRE' undeclared (first use in this function)
...

But this seems a parallel build issue, as running a "make" after failue 
succeed... need more tests.


Previous Comments:

[2013-03-25 10:59:11] larue...@php.net

Remi, could you please test with the patches? personally, I prefer the sencode 
one. since it's simple


[2013-03-25 07:46:49] larue...@php.net

see:  http://marc.info/?l=php-internals&m=136419054303602&w=2


[2013-03-25 05:46:20] larue...@php.net

The following patch has been added/updated:

Patch Name: bison_build_2.patch
Revision:   1364190380
URL:
https://bugs.php.net/patch-display.php?bug=64503&patch=bison_build_2.patch&revision=1364190380


[2013-03-25 05:16:46] larue...@php.net

The following patch has been added/updated:

Patch Name: bison_build.patch
Revision:   1364188606
URL:
https://bugs.php.net/patch-display.php?bug=64503&patch=bison_build.patch&revision=1364188606


[2013-03-24 15:40:54] stormbyte at gmail dot com

Description:

These are the last lines for compile log output:

/var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_language_parser.h:331:5: error: conflicting types for 
'zendparse'
In file included from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_globals.h:28:0,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_compile.h:418,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_modules.h:26,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_API.h:26,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/main/php.h:38,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/ext/tokenizer/tokenizer_data.c:26:
/var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_globals_macros.h:35:5: note: previous declaration of 
'zendparse' was here
distcc[20503] ERROR: compile /var/tmp/portage/dev-lang/php-5.5.0_beta1-
r2/work/sapis-build/cli/ext/tokenizer/tokenizer_data.c on localhost failed
make: *** [ext/tokenizer/tokenizer_data.lo] Error 1
make: *** Waiting for unfinished jobs
In file included from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/ext/tokenizer/tokenizer.c:33:0:
/var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_language_parser.h:331:5: error: conflicting types for 
'zendparse'
In file included from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_globals.h:28:0,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_compile.h:418,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_modules.h:26,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/Zend/zend_API.h:26,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/work/sapis-
build/cli/main/php.h:38,
 from /var/tmp/portage/dev-lang/php-5.5.0_beta1-r2/w

Bug #64503 [Com]: Compilation fails with error: conflicting types for 'zendparse'

2013-03-25 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64503&edit=1

 ID: 64503
 Comment by:     r...@php.net
 Reported by:stormbyte at gmail dot com
 Summary:Compilation fails with error: conflicting types for
 'zendparse'
 Status: Assigned
 Type:   Bug
 Package:Compile Failure
 Operating System:   Gentoo
 PHP Version:5.5.0beta1
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

Sorry for bad previous tests.

Adding, before the build to ensure correct generation
rm Zend/zend_{language,ini}_parser.[ch]
./genfiles

Fedora 18, bison 2.6.1, NTS: ok.
Fedora 18, bison 2.6.1, ZTS: ok.
Fedora 17, bison 2.5.1, NTS: ok
Fedora 17, bison 2.5.1, ZTS: ok
RHEL 6.4,  bison 2.4.1, NTS: ok
RHEL 6.4,  bison 2.4.1, ZTS: ok

So I think you can commit the bison_build_2.patch


Previous Comments:

[2013-03-25 14:43:09] r...@php.net

Sorry for the delay.

Test done with 201303251230 snapshot, and, to ensure file being regenerated
rm Zend/zend_{language,ini}_parser.[ch]
Do you think this is enough ?


Fedora 18, bison 2.6.1: ok.
Fedora 17, bison 2.5.1: ok
RHEL 6.4, bison 2.4.1; HS

/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c: In 
function 'tokenizer_register_constants':
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:32: 
error: 'T_REQUIRE_ONCE' undeclared (first use in this function)
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:32: 
error: (Each undeclared identifier is reported only once
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:32: 
error: for each function it appears in.)
/builddir/build/BUILD/php5.5-201303251230/ext/tokenizer/tokenizer_data.c:33: 
error: 'T_REQUIRE' undeclared (first use in this function)
...

But this seems a parallel build issue, as running a "make" after failue 
succeed... need more tests.


[2013-03-25 10:59:11] larue...@php.net

Remi, could you please test with the patches? personally, I prefer the sencode 
one. since it's simple


[2013-03-25 07:46:49] larue...@php.net

see:  http://marc.info/?l=php-internals&m=136419054303602&w=2


[2013-03-25 05:46:20] larue...@php.net

The following patch has been added/updated:

Patch Name: bison_build_2.patch
Revision:   1364190380
URL:
https://bugs.php.net/patch-display.php?bug=64503&patch=bison_build_2.patch&revision=1364190380


[2013-03-25 05:16:46] larue...@php.net

The following patch has been added/updated:

Patch Name: bison_build.patch
Revision:   1364188606
URL:
https://bugs.php.net/patch-display.php?bug=64503&patch=bison_build.patch&revision=1364188606




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=64503


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=64503&edit=1


[PHP-BUG] Bug #64565 [NEW]: copy doesn't report failure on partial copy

2013-04-02 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.13
Package:  Filesystem function related
Bug Type: Bug
Bug description:copy doesn't report failure on partial copy

Description:

When destination folder of a copy haven't enough place, copy reports
success instead of failure.


Test script:
---
https://bugs.php.net/bug.php?id=64565&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64565&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64565&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64565&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64565&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64565&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64565&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64565&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64565&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64565&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64565&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64565&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64565&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64565&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64565&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64565&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64565&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64565&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64565&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64565&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64565&r=mysqlcfg



Bug #63520 [Com]: JSON extension includes a problematic license statement

2013-04-27 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63520&edit=1

 ID: 63520
 Comment by:     r...@php.net
 Reported by:kaplan at debian dot org
 Summary:JSON extension includes a problematic license
 statement
 Status: Assigned
 Type:   Bug
 Package:JSON related
 PHP Version:Irrelevant
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

Yes, I'm still working on the new alternative extension.


Previous Comments:

[2013-04-22 22:24:39] pleasestand at live dot com

Remi: any update? Is <https://github.com/remicollet/pecl-json-c>
relevant?

I'll note that as a [MediaWiki][1] developer, I recently removed our
bundled copy of PEAR Services_JSON on the basis that the JSON extension
is compiled in by default, and therefore users can be expected to have
it installed. Unfortunately, I had to [revert the change][2] because
I only found out about the licensing problem last week, and our next
release is three weeks from now (2013-05-15).

So I would like to know whether you are still working on this.

[1]: https://www.mediawiki.org/
[2]: https://bugzilla.wikimedia.org/show_bug.cgi?id=47431


[2013-04-04 18:00:52] b dot eltzner at gmx dot de

I am not a native speaker. This comment is not supposed to be rude or insult 
anybody.

I would like to make the problem clearer:

*The "json license" affecting /ext/json/JSON_parser.c and 
/ext/json/utf8_decode.c is regarded non-free by GNU/FSF, Debian, Fedora, Red 
Hat and Google and is not approved by OSI. This is not at all the same as "Free 
but incompatible with GPL", which is the category in which the FSF lists the 
php license.

*The morality clause "The Software shall be used for Good, not Evil." violates 
software freedom 0 and point 6 of the open source definition and the license 
will therefore _never_ be free or open source by definition. This is not a 
license "some fanatics don't like", it is a manifestly proprietary license.

*The original author of the license has purposely chosen this form of license 
to trick open source projects into mistaking it as an open source license. He 
did this to prove the point that "those open source guys are entitled kids" and 
plays the issue for amusement: http://www.youtube.com/watch?v=-hCimLnIsDA

*With the non-free files, PHP cannot be distributed unmodified as free software 
by downstream projects.

Note that I don't say "Throw that stuff out11" It goes without saying that 
you can distribute the result of your work under whatever licenses you like, 
open source or not. However, if you want PHP to be easily distributable as free 
and open source software by downstream projects, I am sure they would be 
enormously relieved, if you provided them with a simple way to exclude the 
non-free files without breaking too much functionality.

--------
[2012-11-23 13:33:42] r...@php.net

A patch proposed in https://bugs.php.net/63588 makes "json_encode" really free.


[2012-11-15 18:09:30] ras...@php.net

I am not saying it isn't a tricky license clause to deal with and it would be 
better if it wasn't there. However, I am also not keen on spending resources on 
rewriting code for this reason. If someone supplies a functionally equivalent 
replacement, we will have a look at it. But as far as I am concerned, license-
wise the terms Good and Evil are not legal terms. These are more subjective 
self-describing terms and since I deem PHP's use of the code as "Good" then we 
comply with the license. Could others perhaps use PHP and thus the code for 
"Evil" and therefore not comply with the license? Sure, but there are many 
things people can do with our code that is either against the various licenses 
involved or even illegal criminally. It is something we cannot control.


[2012-11-15 18:01:24] paj...@php.net

More seriously, as soon as the license is changed upstream, we will merge it. 
But 
we won't be able to do anything before.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=63520


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63520&edit=1


Bug #64785 [Com]: Compile fails using --with-gd

2013-05-07 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64785&edit=1

 ID: 64785
 Comment by:     r...@php.net
 Reported by:s...@php.net
 Summary:Compile fails using --with-gd
 Status: Assigned
 Type:   Bug
 Package:GD related
 Operating System:   Linux
 PHP Version:5.5Git-2013-05-07 (Git)
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

I don't think it works in 5.4

libpng is mandatory and cannot be disabled.

checking for GD support... yes
checking for the location of libvpx... no
checking for the location of libjpeg... no
checking for the location of libpng... no
checking for the location of libXpm... no
checking for FreeType 2... no
checking for T1lib support... no
checking whether to enable truetype string function in GD... no
checking whether to enable JIS-mapped Japanese font support in GD... no
If configure fails try --with-vpx-dir=
If configure fails try --with-jpeg-dir=
configure: error: png.h not found.


I will restore this behaviour in 5.5.


Previous Comments:

[2013-05-07 21:42:57] s...@php.net

Description:

In PHP 5.5, using "./configure --with-gd" causes compilation failure. It works 
in PHP 5.4.  The compilation errors after doing "./configure --with-gd" are:

ext/gd/libgd/.libs/gd_png.o: In function `php_gd_gdImagePngCtxEx':
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:482: undefined reference to 
`png_create_write_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:491: undefined reference to 
`png_create_info_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:502: undefined reference to 
`png_destroy_write_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:508: undefined reference to 
`png_set_write_fn'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:524: undefined reference to 
`png_set_compression_level'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:526: undefined reference to 
`png_set_filter'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:581: undefined reference to 
`png_set_IHDR'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:664: undefined reference to 
`png_write_info'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:667: undefined reference to 
`png_set_packing'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:720: undefined reference to 
`png_write_image'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:721: undefined reference to 
`png_write_end'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:754: undefined reference to 
`png_destroy_write_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:494: undefined reference to 
`png_destroy_write_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:577: undefined reference to 
`png_set_IHDR'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:590: undefined reference to 
`png_set_tRNS'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:637: undefined reference to 
`png_set_tRNS'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:660: undefined reference to 
`png_set_PLTE'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:739: undefined reference to 
`png_write_image'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:740: undefined reference to 
`png_write_end'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:574: undefined reference to 
`png_set_IHDR'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:748: undefined reference to 
`png_write_image'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:749: undefined reference to 
`png_write_end'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:720: undefined reference to 
`png_write_image'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:721: undefined reference to 
`png_write_end'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:739: undefined reference to 
`png_write_image'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:740: undefined reference to 
`png_write_end'
ext/gd/libgd/.libs/gd_png.o: In function `gdPngWriteData':
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:86: undefined reference to 
`png_get_io_ptr'
ext/gd/libgd/.libs/gd_png.o: In function `gdPngErrorHandler':
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:66: undefined reference to 
`png_get_error_ptr'
ext/gd/libgd/.libs/gd_png.o: In function `php_gd_gdImageCreateFromPngCtx':
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:149: undefined reference to 
`png_sig_cmp'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:154: undefined reference to 
`png_create_read_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:163: undefined reference to 
`png_create_info_struct'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:188: undefined reference to 
`png_set_sig_bytes'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:190: undefined reference to 
`png_set_read_fn'
/home/cjones/php-5.5/ext/gd/libgd/gd_png.c:191: undefined reference to 
`png_read_info'
/home/cjones/php-5.

[PHP-BUG] Bug #64895 [NEW]: interger overflow in SndToJewish

2013-05-21 Thread r...@php.net
From: remi
Operating system: GNU/Linux 64bits
PHP version:  5.3.25
Package:  Calendar related
Bug Type: Bug
Bug description:interger overflow in SndToJewish

Description:

Interger overflow occurs in SndToJewish

Last correct value is 324542846

With very large value (ex: 9223372036854746369), php hangs.

Test script:
---
https://bugs.php.net/bug.php?id=64895&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64895&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64895&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64895&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64895&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64895&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64895&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64895&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64895&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64895&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64895&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64895&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64895&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64895&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64895&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64895&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64895&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64895&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64895&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64895&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64895&r=mysqlcfg



[PHP-BUG] Bug #64915 [NEW]: error_log ignored when daemonize=0

2013-05-24 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.15
Package:  FPM related
Bug Type: Bug
Bug description:error_log ignored when daemonize=0

Description:

error_log is only used when daemonize=1.

This make sense to display message during an interactive / debug run.

Launching php-fpm using systemd (with type=simple of new type=notify),
--nodaemonize option is used. So error_log directive is ignored and all
messages goes to stdout (catched by systemd and redirected to system log).


Proposal : use error_log configured file if daemonize OR !interactive
(using isatty test)


-- 
Edit bug report at https://bugs.php.net/bug.php?id=64915&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64915&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64915&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64915&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64915&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64915&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64915&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64915&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64915&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64915&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64915&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64915&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64915&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64915&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64915&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64915&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64915&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64915&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64915&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64915&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64915&r=mysqlcfg



Bug #64915 [PATCH]: error_log ignored when daemonize=0

2013-05-24 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64915&edit=1

 ID: 64915
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:error_log ignored when daemonize=0
 Status: Assigned
 Type:   Bug
 Package:FPM related
 Operating System:   GNU/Linux
 PHP Version:5.4.15
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: php-5.5.0-bug64915.patch
Revision:   1369387402
URL:
https://bugs.php.net/patch-display.php?bug=64915&patch=php-5.5.0-bug64915.patch&revision=1369387402


Previous Comments:

[2013-05-24 08:41:31] r...@php.net

Description:

error_log is only used when daemonize=1.

This make sense to display message during an interactive / debug run.

Launching php-fpm using systemd (with type=simple of new type=notify), 
--nodaemonize option is used. So error_log directive is ignored and all 
messages goes to stdout (catched by systemd and redirected to system log).


Proposal : use error_log configured file if daemonize OR !interactive (using 
isatty test)







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=64915&edit=1


Bug #64915 [PATCH]: error_log ignored when daemonize=0

2013-05-24 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64915&edit=1

 ID: 64915
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:error_log ignored when daemonize=0
 Status: Assigned
 Type:   Bug
 Package:FPM related
 Operating System:   GNU/Linux
 PHP Version:5.4.15
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: php-5.5.0-bug64915.patch
Revision:   1369389053
URL:
https://bugs.php.net/patch-display.php?bug=64915&patch=php-5.5.0-bug64915.patch&revision=1369389053


Previous Comments:

[2013-05-24 09:23:22] r...@php.net

The following patch has been added/updated:

Patch Name: php-5.5.0-bug64915.patch
Revision:   1369387402
URL:
https://bugs.php.net/patch-display.php?bug=64915&patch=php-5.5.0-bug64915.patch&revision=1369387402


[2013-05-24 08:41:31] r...@php.net

Description:

error_log is only used when daemonize=1.

This make sense to display message during an interactive / debug run.

Launching php-fpm using systemd (with type=simple of new type=notify), 
--nodaemonize option is used. So error_log directive is ignored and all 
messages goes to stdout (catched by systemd and redirected to system log).


Proposal : use error_log configured file if daemonize OR !interactive (using 
isatty test)







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=64915&edit=1


[PHP-BUG] Bug #64949 [NEW]: Buffer overflow in _pdo_pgsql_error

2013-05-30 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.3.25
Package:  PostgreSQL related
Bug Type: Bug
Bug description:Buffer overflow in _pdo_pgsql_error

Description:

running the unit tests in ext/pdo_pgsql, 2 tests cause a segfault (with
same backtrace)

(gdb) run copy_from.php
.
Testing pgsqlCopyFromArray() with error
*** buffer overflow detected ***: /usr/bin/php terminated
...
(gdb) bt
#0  0x74bfcba5 in __GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:63
#1  0x74bfe358 in __GI_abort () at abort.c:90
#2  0x74c3c59b in __libc_message (do_abort=do_abort@entry=2,
fmt=fmt@entry=0x74d3f81f "*** %s ***: %s terminated\n") at
../sysdeps/unix/sysv/linux/libc_fatal.c:197
#3  0x74cd16b7 in __GI___fortify_fail (msg=msg@entry=0x74d3f7c5
"buffer overflow detected") at fortify_fail.c:31
#4  0x74ccf830 in __GI___chk_fail () at chk_fail.c:28
#5  0x7fffe67cdb61 in strcpy (__src=0x7fffe67d0c3a "Copy command
failed", __dest=0x77fbf920 "Copy c") at
/usr/include/bits/string3.h:104
#6  _pdo_pgsql_error (dbh=dbh@entry=0x77fbf8c8, stmt=stmt@entry=0x0,
errcode=errcode@entry=7, sqlstate=0x7fffe67d0c3a "Copy command failed",
file=, line=)
at /usr/src/debug/php-5.5.0RC2/ext/pdo_pgsql/pgsql_driver.c:83
#7  0x7fffe67cee73 in zim_PDO_pgsqlCopyFromArray (ht=,
return_value=0x77fbf9a8, return_value_ptr=,
this_ptr=, return_value_used=)
at /usr/src/debug/php-5.5.0RC2/ext/pdo_pgsql/pgsql_driver.c:611
#8  0x55778249 in dtrace_execute_internal
(execute_data_ptr=, fci=,
return_value_used=) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_dtrace.c:99
#9  0x55836dd3 in zend_do_fcall_common_helper_SPEC
(execute_data=0x77f83340) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_vm_execute.h:545
#10 0x557f6e78 in execute_ex (execute_data=0x77f83340) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_vm_execute.h:356
#11 0x5577810d in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php-5.5.0RC2/Zend/zend_dtrace.c:75
#12 0x55789b08 in zend_execute_scripts (type=type@entry=8,
retval=retval@entry=0x0, file_count=file_count@entry=3) at
/usr/src/debug/php-5.5.0RC2/Zend/zend.c:1316
#13 0x557278dc in php_execute_script
(primary_file=primary_file@entry=0x7fffcb80) at
/usr/src/debug/php-5.5.0RC2/main/main.c:2481
#14 0x5583a4e6 in do_cli (argc=2, argv=0x55b7c3d0) at
/usr/src/debug/php-5.5.0RC2/sapi/cli/php_cli.c:993
#15 0x5560f38a in main (argc=2, argv=0x55b7c3d0) at
/usr/src/debug/php-5.5.0RC2/sapi/cli/php_cli.c:1377



(gdb) run copy_to.php
...
Testing pgsqlCopyToArray() with error
*** buffer overflow detected ***: /usr/bin/php terminated
...
(gdb) bt
#0  0x74bfcba5 in __GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:63
#1  0x74bfe358 in __GI_abort () at abort.c:90
#2  0x74c3c59b in __libc_message (do_abort=do_abort@entry=2,
fmt=fmt@entry=0x74d3f81f "*** %s ***: %s terminated\n") at
../sysdeps/unix/sysv/linux/libc_fatal.c:197
#3  0x74cd16b7 in __GI___fortify_fail (msg=msg@entry=0x74d3f7c5
"buffer overflow detected") at fortify_fail.c:31
#4  0x74ccf830 in __GI___chk_fail () at chk_fail.c:28
#5  0x7fffe67cdb61 in strcpy (__src=0x7fffe67d0c3a "Copy command
failed", __dest=0x77fbbae8 "Copy c") at
/usr/include/bits/string3.h:104
#6  _pdo_pgsql_error (dbh=dbh@entry=0x77fbba90, stmt=stmt@entry=0x0,
errcode=errcode@entry=7, sqlstate=0x7fffe67d0c3a "Copy command failed",
file=, line=)
at /usr/src/debug/php-5.5.0RC2/ext/pdo_pgsql/pgsql_driver.c:83
#7  0x7fffe67ce68b in zim_PDO_pgsqlCopyToArray (ht=,
return_value=0x77fbffe0, return_value_ptr=,
this_ptr=, return_value_used=)
at /usr/src/debug/php-5.5.0RC2/ext/pdo_pgsql/pgsql_driver.c:864
#8  0x55778249 in dtrace_execute_internal
(execute_data_ptr=, fci=,
return_value_used=) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_dtrace.c:99
#9  0x55836dd3 in zend_do_fcall_common_helper_SPEC
(execute_data=0x77f829c0) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_vm_execute.h:545
#10 0x557f6e78 in execute_ex (execute_data=0x77f829c0) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_vm_execute.h:356
#11 0x5577810d in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php-5.5.0RC2/Zend/zend_dtrace.c:75
#12 0x55789b08 in zend_execute_scripts (type=type@entry=8,
retval=retval@entry=0x0, file_count=file_count@entry=3) at
/usr/src/debug/php-5.5.0RC2/Zend/zend.c:1316
#13 0x557278dc in php_execute_script
(primary_file=primary_file@entry=0x7fffcb80) at
/usr/src/debug/php-5.5.0RC2/main/main.c:2481
#14 0x5583a4e6 in do_cli (argc=2, argv=0x55b7c3d0) at
/usr/src/debug/php-5.5.0RC2/sapi/cli/php_cli.c:993
#15 0x5560f38a in main (argc=2, argv=0x55b7c3d0) at
/usr/src/debug/php-5.5.0RC2/sapi/cli/php_cli.c:1377


A trivial fix will be to switch to strncpy to avoid this buffer overflo

[PHP-BUG] Bug #64961 [NEW]: segfault in imagesetinterpolation

2013-06-03 Thread r...@php.net
From: remi
Operating system: GNU/Linux 64bits
PHP version:  5.5.0RC2
Package:  GD related
Bug Type: Bug
Bug description:segfault in imagesetinterpolation

Description:

(gdb) bt
#0  0x55798494 in zend_fetch_resource
(passed_id=passed_id@entry=0x7fffa448, default_id=default_id@entry=-1,
resource_type_name=resource_type_name@entry=
0x7fffe366d3c0 "Image",
found_resource_type=found_resource_type@entry=0x0,
num_resource_types=num_resource_types@entry=1)
at /usr/src/debug/php-5.5.0RC2/Zend/zend_list.c:126
#1  0x7fffe3664014 in zif_imagesetinterpolation (ht=,
return_value=0x77fb9dc8, return_value_ptr=,
this_ptr=, 
return_value_used=) at
/dev/shm/BUILD/php5.5-201305271230/ext/gd/gd.c:5370
#2  0x55777e69 in dtrace_execute_internal
(execute_data_ptr=, fci=,
return_value_used=)
at /usr/src/debug/php-5.5.0RC2/Zend/zend_dtrace.c:99
#3  0x7fffed6caafa in xdebug_execute_internal
(current_execute_data=0x77f7f1a0, fci=0x0, return_value_used=0)
at /usr/src/debug/php-pecl-xdebug-2.2.3/xdebug-2.2.3/xdebug.c:1551
#4  0x558369f3 in zend_do_fcall_common_helper_SPEC
(execute_data=0x77f7f1a0) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_vm_execute.h:545
#5  0x557f6a98 in execute_ex (execute_data=0x77f7f1a0) at
/usr/src/debug/php-5.5.0RC2/Zend/zend_vm_execute.h:356
#6  0x55777d2d in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php-5.5.0RC2/Zend/zend_dtrace.c:75
#7  0x7fffed6cb184 in xdebug_execute_ex (execute_data=0x77f7f1a0)
at /usr/src/debug/php-pecl-xdebug-2.2.3/xdebug-2.2.3/xdebug.c:1437
#8  0x55789728 in zend_execute_scripts (type=type@entry=8,
retval=retval@entry=0x0, file_count=file_count@entry=3)
at /usr/src/debug/php-5.5.0RC2/Zend/zend.c:1316
#9  0x557274dc in php_execute_script
(primary_file=primary_file@entry=0x7fffcbb0) at
/usr/src/debug/php-5.5.0RC2/main/main.c:2481
#10 0x5583a106 in do_cli (argc=2, argv=0x55b7c3b0) at
/usr/src/debug/php-5.5.0RC2/sapi/cli/php_cli.c:993
#11 0x5560f31a in main (argc=2, argv=0x55b7c3b0) at
/usr/src/debug/php-5.5.0RC2/sapi/cli/php_cli.c:1377


enum type are not long ;) so cannot be used as zend_parse_parameters arg.


-- 
Edit bug report at https://bugs.php.net/bug.php?id=64961&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64961&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64961&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64961&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64961&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64961&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64961&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64961&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64961&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64961&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64961&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64961&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64961&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64961&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64961&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64961&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64961&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64961&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64961&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64961&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64961&r=mysqlcfg



[PHP-BUG] Bug #64962 [NEW]: imagerotate produce corrupted image

2013-06-03 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.5.0RC2
Package:  GD related
Bug Type: Bug
Bug description:imagerotate produce corrupted image

Description:

Upstream GD bug #67
https://bitbucket.org/libgd/gd-libgd/issue/67/problem-with-gdrotate


-- 
Edit bug report at https://bugs.php.net/bug.php?id=64962&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64962&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64962&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64962&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64962&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64962&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64962&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64962&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64962&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64962&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64962&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64962&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64962&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64962&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64962&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64962&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64962&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64962&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64962&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64962&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64962&r=mysqlcfg



[PHP-BUG] Bug #65047 [NEW]: Test skip on client / server version

2013-06-17 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.16
Package:  PostgreSQL related
Bug Type: Bug
Bug description:Test skip on client / server version

Description:

Hi,

Running the php test suite, using a client library version 8.4.13 (RHEL-6)
against a server running version 9.2.4 (RHEL-6 + RHSCL 1.0beta) reports
some failures

/tmp/php-5.4.16/ext/pgsql/tests/08escape.phpt
/tmp/php-5.4.16/ext/pgsql/tests/10pg_convert_85.phpt
/tmp/php-5.4.16/ext/pgsql/tests/12pg_insert_85.phpt
/tmp/php-5.4.16/ext/pgsql/tests/14pg_update_85.phpt
/tmp/php-5.4.16/ext/pgsql/tests/18pg_escape_bytea.phpt
/tmp/php-5.4.16/ext/pgsql/tests/bug37100_85.phpt

/tmp/php-5.4.16/ext/pdo_pgsql/tests/bug46274.phpt
/tmp/php-5.4.16/ext/pdo_pgsql/tests/bug46274_2.phpt

For example PQunescapeBytea function is a pure client side function. So
result depends on the client version, not on the server version.

Proposal, keep (or add where is missing):
skip_server_version('8.5dev', '<');

And add:
skip_client_version('8.5dev', '<');

I agree, using a 8.4 client to access a 9.2 server is something which
should be avoid...


What is your thoughts ?
(I prefer asking before committing something perhaps stupid)


-- 
Edit bug report at https://bugs.php.net/bug.php?id=65047&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=65047&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=65047&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=65047&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=65047&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=65047&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=65047&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=65047&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=65047&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=65047&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=65047&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=65047&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=65047&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=65047&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=65047&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=65047&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=65047&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=65047&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=65047&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=65047&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=65047&r=mysqlcfg



Bug #65047 [Com]: Test skip on client / server version

2013-06-17 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65047&edit=1

 ID: 65047
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Test skip on client / server version
 Status: Open
 Type:   Bug
 Package:PostgreSQL related
 Operating System:   GNU/Linux
 PHP Version:5.4.16
 Block user comment: N
 Private report: N

 New Comment:

On a opposite side pgsql/tests/bug37100.phpt could use
skip_client_version('8.5dev', '>=');

It will be run and will succeed with client version 8.4


Previous Comments:
----
[2013-06-17 13:11:33] r...@php.net

Description:

Hi,

Running the php test suite, using a client library version 8.4.13 (RHEL-6) 
against a server running version 9.2.4 (RHEL-6 + RHSCL 1.0beta) reports some 
failures

/tmp/php-5.4.16/ext/pgsql/tests/08escape.phpt
/tmp/php-5.4.16/ext/pgsql/tests/10pg_convert_85.phpt
/tmp/php-5.4.16/ext/pgsql/tests/12pg_insert_85.phpt
/tmp/php-5.4.16/ext/pgsql/tests/14pg_update_85.phpt
/tmp/php-5.4.16/ext/pgsql/tests/18pg_escape_bytea.phpt
/tmp/php-5.4.16/ext/pgsql/tests/bug37100_85.phpt

/tmp/php-5.4.16/ext/pdo_pgsql/tests/bug46274.phpt
/tmp/php-5.4.16/ext/pdo_pgsql/tests/bug46274_2.phpt

For example PQunescapeBytea function is a pure client side function. So result 
depends on the client version, not on the server version.

Proposal, keep (or add where is missing):
skip_server_version('8.5dev', '<');

And add:
skip_client_version('8.5dev', '<');

I agree, using a 8.4 client to access a 9.2 server is something which should be 
avoid...


What is your thoughts ?
(I prefer asking before committing something perhaps stupid)







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65047&edit=1


Bug #65093 [Com]: password_hash ignores salts with spaces

2013-06-21 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65093&edit=1

 ID: 65093
 Comment by:     r...@php.net
 Reported by:michael at squiloople dot com
 Summary:password_hash ignores salts with spaces
 Status: Open
 Type:   Bug
 Package:hash related
 Operating System:   Windows Vista SP2
 PHP Version:5.5.0
 Block user comment: N
 Private report: N

 New Comment:

I think it's only a documentation problem which should explains which are the 
allowed characters in the salt (from code: a-z A-Z 0-9 . /)

(notice: It is strongly recommended that you do not generate your own salt for 
this function)


Previous Comments:

[2013-06-21 22:37:03] michael at squiloople dot com

Description:

When manually setting a salt which contains spaces the function ignores it and 
automatically generates its own.

Test script:
---
  echo password_hash('this is a test', PASSWORD_DEFAULT, array('salt' => 
'thisisatestthisisatest'));

  echo '';

  echo password_hash('this is a test', PASSWORD_DEFAULT, array('salt' => 
'thisisatestthisis test'));

Expected result:

$2y$10$thisisatestthisisateseLNFJ7M2ONUSijVBKli7sVFN6rQm7o36
$2y$10$thisisatestthisis tesOZPioeRNSLNeG3cuJW56OSusfQ5SjKdO

(with the part after the salt being whatever it would be)

Actual result:
--
$2y$10$thisisatestthisisateseLNFJ7M2ONUSijVBKli7sVFN6rQm7o36
$2y$10$dGhpc2lzYXRlc3R0aGlzaOZPioeRNSLNeG3cuJW56OSusfQ5SjKdO






-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65093&edit=1


Bug #65142 [PATCH]: Missing phar man page

2013-06-27 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65142&edit=1

 ID: 65142
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Missing phar man page
 Status: Open
 Type:   Bug
 Package:PHAR related
 Operating System:   GNU/Linux
 PHP Version:5.4.16
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: phar.1.in
Revision:   1372317222
URL:
https://bugs.php.net/patch-display.php?bug=65142&patch=phar.1.in&revision=1372317222


Previous Comments:

[2013-06-27 07:13:15] r...@php.net

Description:

There is no man page for the phar command.

I will provide one (from pear help output)







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65142&edit=1


[PHP-BUG] Bug #65143 [NEW]: Missing php-cgi man page

2013-06-27 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.16
Package:  CGI/CLI related
Bug Type: Bug
Bug description:Missing php-cgi man page

Description:

There is no man page for php-cgi command

Simple proposal (as all options are described in php man page), a simple
redirect:

.so man1/php.1



-- 
Edit bug report at https://bugs.php.net/bug.php?id=65143&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=65143&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=65143&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=65143&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=65143&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=65143&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=65143&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=65143&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=65143&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=65143&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=65143&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=65143&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=65143&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=65143&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=65143&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=65143&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=65143&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=65143&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=65143&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=65143&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=65143&r=mysqlcfg



[PHP-BUG] Bug #65142 [NEW]: Missing phar man page

2013-06-27 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.16
Package:  PHAR related
Bug Type: Bug
Bug description:Missing phar man page

Description:

There is no man page for the phar command.

I will provide one (from pear help output)


-- 
Edit bug report at https://bugs.php.net/bug.php?id=65142&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=65142&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=65142&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=65142&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=65142&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=65142&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=65142&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=65142&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=65142&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=65142&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=65142&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=65142&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=65142&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=65142&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=65142&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=65142&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=65142&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=65142&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=65142&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=65142&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=65142&r=mysqlcfg



Req #65082 [Com]: json_encode's option for replacing ill-formd byte sequences with substitute cha

2013-07-10 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65082&edit=1

 ID: 65082
 Comment by:     r...@php.net
 Reported by:masakielastic at gmail dot com
 Summary:json_encode's option for replacing ill-formd byte
 sequences with substitute cha
 Status: Open
 Type:   Feature/Change Request
 Package:JSON related
 Operating System:   All
 PHP Version:5.5.0
 Block user comment: N
 Private report: N

 New Comment:

Here is a proposal fo this issue
https://github.com/remicollet/pecl-json-c/commit/5a499a4550d1f29f1f8eeb1b4ca0b01a33c64779

This add 2 new options to json_encode

- JSON_NOTUTF8_SUBSTITUTE (name seems better, at least to me), to replace 
not-utf8 char with the replacement char.

- JSON_NOTUTF8_IGNORE to ignore not-utf8 char (remove in escaped mode, keep 
without any check in unescaped mode)


Previous Comments:

[2013-06-21 07:26:33] ni...@php.net

It's currently possible to get a partial output using 
JSON_PARTIAL_OUTPUT_ON_ERROR. This will replace invalid UTF8 strings with NULL 
though. It probably would make sense to have an alternative option that inserts 
the substitution character.


[2013-06-21 05:31:34] masakielastic at gmail dot com

Description:

json_encode returns false if the string contains ill-formed byte 
sequences. It is hard to find the problem since a lot of web applications don't 
expect the existence of ill-formed byte sequences. The one example is Symfony's 
JsonResponse class.

https://github.com/symfony/symfony/blob/master/src/Symfony/Component/HttpFoundat
ion/JsonResponse.php#L83

Introducing json_encode's option for replacing ill-formd byte sequences with 
substitute characters (such as U+FFFD) save writing the logic.

function json_encode2($value, $options, $depth)
{
if (is_scalar($value)) {
return json_encode($value, $options, $depth);
}

$value2 = [];

foreach ($value as $key => $elm) {

$value2[str_scrub($key)] = str_scrub($elm);

}

return json_encode($value2, $options, $depth);
}


// https://bugs.php.net/bug.php?id=65081
function str_scrub($str, $encoding = 'UTF-8')
{
return htmlspecialchars_decode(htmlspecialchars($str, ENT_SUBSTITUTE, 
$encoding));
}

The precedent example is htmlspecialchars's ENT_SUBSTITUTE option which was 
introduced 
in PHP 5.4. json_encode shares the part of logic used such as 
php_next_utf8_char 
by htmlspecialchars since PHP 5.5.

https://github.com/php/php-src/blob/master/ext/json/json.c#L369

Another reason for introducing the option is existence of JsonSerializable 
interface.

Accessing jsonSerialize method's values come from private properties is hard 
or impossbile.

The one of names of candiates for the option is JSON_SUBSTITUTE similar to 
htmlspecialchar's ENT_SUBSTITUTE option.

json_encode($object, JSON_SUBSTITUTE);







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65082&edit=1


Req #65082 [Com]: json_encode's option for replacing ill-formd byte sequences with substitute cha

2013-07-15 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65082&edit=1

 ID: 65082
 Comment by:     r...@php.net
 Reported by:masakielastic at gmail dot com
 Summary:json_encode's option for replacing ill-formd byte
 sequences with substitute cha
 Status: Assigned
 Type:   Feature/Change Request
 Package:JSON related
 Operating System:   All
 PHP Version:5.5.0
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

> Hi remi, could you test my patch for PHP_JSON_UNESCAPED_UNICODE option?
> The patch adopts JSON_NOTUTF8_SUBSTITUTE and JSON_NOTUTF8_IGNORE options.

The PHP_JSON_UNESCAPED_UNICODE + JSON_NOTUTF8_IGNORE already works with my 
patch.

Yes, PHP_JSON_UNESCAPED_UNICODE + JSON_NOTUTF8_SUBSTITUTE doesn't work for now, 
but converting to utf16, then back to utf8 seems really... messy. Need 
something simpler.

Notice: this bug is only for json_encode. Other issue have their own bug for 
tracking (especially the json_decode one, as I dont plan to alter it)


Previous Comments:

[2013-07-14 12:45:47] masakielastic at gmail dot com

As for JSON_NOTUTF8_IGNORE, the description for security is needed in the 
manual 
like htmlspecialchars's ENT_IGNORE

http://www.php.net/manual/en/function.htmlspecialchars.php

That's why I didn't sugguest JSON_IGNORE in the draft and showed Escaping RFC's 
link
as resource.

UNICODE SECURITY CONSIDERATIONS
http://www.unicode.org/reports/tr36/#Deletion_of_Noncharacters
IDS11-J. Eliminate noncharacter code points before validation
https://www.securecoding.cert.org/confluence/display/java/IDS11-
J.+Eliminate+noncharacter+code+points+before+validation


[2013-07-14 12:31:29] masakielastic at gmail dot com

Hi, nikic, sorry, ignore my last comment.

I added small change in json.c
https://gist.github.com/masakielastic/5973095#file-02-small_refactaring-patch


[2013-07-14 08:48:01] masakielastic at gmail dot com

I nominate other names from the view of consistency with JSON_ERROR_UTF8.

JSON_UTF8_SUBSTITUTE
JSON_UTF8_IGNORE


[2013-07-14 08:44:02] masakielastic at gmail dot com

Hi, nikic, I posted a document request for the mission option and error codes.

https://bugs.php.net/bug.php?id=65259

Your opinion about the consistency among 
JSON_PARTIAL_OUTPUT_ON_ERROR and JSON_NOTUTF8_SUBSTITUTE 
and JSON_NOTUTF8_IGNORE is needed.


[2013-07-14 08:28:53] masakielastic at gmail dot com

I created new feature request for preveting XSS attack and I withdraw my option 
about the change of default behavior.

new function for preventing XSS attack
https://bugs.php.net/bug.php?id=65257




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=65082


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65082&edit=1


Bug #65460 [Com]: PHP 5.4.18 fails to compile with Apache 2.4.6

2013-08-19 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=65460&edit=1

 ID: 65460
 Comment by:     r...@php.net
 Reported by:stu at coe dot uky dot edu
 Summary:PHP 5.4.18 fails to compile with Apache 2.4.6
 Status: Assigned
 Type:   Bug
 Package:Compile Failure
 Operating System:   Slackware64 14.0
 PHP Version:5.4.18
 Assigned To:stas
 Block user comment: N
 Private report: N

 New Comment:

I think this is the same issue than #64503, caused by the switch from Bison 2.3 
to 2.7, used to generate the parser.

Notice : the fix for this issue have only been applied in 5.5 tree.


Previous Comments:

[2013-08-19 07:37:04] m...@php.net

Sorry for not being explicit enough!

I can reproduce with 

$ ./configure --enable-maintainer-zts --disable-all --prefix=$(pwd)/usr 

so, enabling ZTS should cause the issue.


[2013-08-19 07:10:26] s...@php.net

Mike, so which options should I use to reproduce it? Because I used with-apxs2 
and it worked fine. Should apache be built with some special options? IIRC, it 
usually does not build ZTS version, so what is the config for you that doesn't 
work?


[2013-08-19 07:03:45] m...@php.net

I also doubt that it's about Apache, but rather about ZTS.  Looking at the 
tarball files I see:

in zend_global_macros.h:
/* Compiler */
#ifdef ZTS
# define CG(v) TSRMG(compiler_globals_id, zend_compiler_globals *, v)
int zendparse(void *compiler_globals);
#else
# define CG(v) (compiler_globals.v)
extern ZEND_API struct _zend_compiler_globals compiler_globals;
int zendparse(void);
#endif


Note the #ifdef ZTS zendparse declaration



...and in zend_language_parser.h:


#ifdef YYPARSE_PARAM
#if defined __STDC__ || defined __cplusplus
int zendparse (void *YYPARSE_PARAM);
#else
int zendparse ();
#endif
#else /* ! YYPARSE_PARAM */
#if defined __STDC__ || defined __cplusplus
int zendparse (void);
#else
int zendparse ();
#endif
#endif /* ! YYPARSE_PARAM */

...where YYPARSE_PARAM is defined in the source (.c) file.


[2013-08-19 00:28:49] s...@php.net

5.4 compiles fine for me on CentOS 6.3 and on Mac. Apache is older there but I 
don't think this should have any consequence for zendparse.


[2013-08-18 19:11:35] m...@php.net

Looks like something was wrongly or not completely merged into 5.4?




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=65460


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=65460&edit=1


[PHP-BUG] Req #61949 [NEW]: Allow cgi test ti run out of build tree

2012-05-04 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 16)
PHP version:  5.4.2
Package:  CGI/CLI related
Bug Type: Feature/Change Request
Bug description:Allow cgi test ti run out of build tree

Description:

Tests provided in sapi/cgi/tests need to detect path of php-cgi binary.

This doesn't work when run (pear run-tests) in the source tree out of the
build process

The attached patch try to improve this detection.
First change uses PHP_BINARY which requires PHP 5.4
The other change will work on PHP 5.3/5.4 (when
TEST_PHP_EXECUTABLE=/usr/bin/php)

Test script:
---
$ cd sapi/cgi/tests
$ pear run-tests 010.phpt


Expected result:

Running 1 tests
PASS Bug #45860 (header() function fails to correctly replace all Status
lines)[010.phpt]
TOTAL TIME: 00:01
1 PASSED TESTS
0 SKIPPED TESTS


Actual result:
--
Running 1 tests
SKIP Bug #45860 (header() function fails to correctly replace all Status
lines)[010.phpt](reason: CGI not found)
TOTAL TIME: 00:01
0 PASSED TESTS
1 SKIPPED TESTS


-- 
Edit bug report at https://bugs.php.net/bug.php?id=61949&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61949&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61949&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61949&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61949&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61949&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61949&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61949&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61949&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61949&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61949&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61949&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61949&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61949&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61949&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61949&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61949&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61949&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61949&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61949&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61949&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61949&r=mysqlcfg



[PHP-BUG] Bug #61950 [NEW]: Failing tests

2012-05-05 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 16)
PHP version:  5.4.2
Package:  CGI/CLI related
Bug Type: Bug
Bug description:Failing tests

Description:

Most of the tests provided in sapi/cgi/tests are failing.

Failing tests (001 to 009) use var_dump(`$php ...`); which break expected
output (CR/LF).
Others working tests (010, 011) use echo(`$php ...`); 

The attached patch proposal use passthru, which seems another working
solution.

With this patch applied, all the 11 tests return "PASS".

Test script:
---
$ pear run-tests 001.phpt

Expected result:

Running 1 tests
PASS version string[001.phpt]
TOTAL TIME: 00:00
1 PASSED TESTS
0 SKIPPED TESTS


Actual result:
--
Running 1 tests
FAIL version string[001.phpt]
wrote log to "/dev/shm/php-5.4.2/sapi/cgi/tests/run-tests.log"
TOTAL TIME: 00:01
0 PASSED TESTS
0 SKIPPED TESTS
1 FAILED TESTS:
001.phpt

$ cat 001.out
string(151) "PHP 5.4.2 (cgi-fcgi) (built: May  4 2012 14:44:54)\nCopyright
(c) 1997-2012 The PHP Group\nZend Engine v2.4.0, Copyright (c) 1998-2012
Zend Technologies\n"


-- 
Edit bug report at https://bugs.php.net/bug.php?id=61950&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=61950&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=61950&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=61950&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=61950&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=61950&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=61950&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=61950&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=61950&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=61950&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=61950&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=61950&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=61950&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=61950&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=61950&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=61950&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=61950&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=61950&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=61950&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=61950&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=61950&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=61950&r=mysqlcfg



Req #61949 [PATCH]: Allow cgi test ti run out of build tree

2012-05-05 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=61949&edit=1

 ID: 61949
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Allow cgi test ti run out of build tree
 Status: Open
 Type:   Feature/Change Request
 Package:CGI/CLI related
 Operating System:   GNU/Linux (Fedora 16)
 PHP Version:5.4.2
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: php-cgi-path-detection.patch
Revision:   1336204323
URL:
https://bugs.php.net/patch-display.php?bug=61949&patch=php-cgi-path-detection.patch&revision=1336204323


Previous Comments:

[2012-05-05 06:56:30] r...@php.net

Description:

Tests provided in sapi/cgi/tests need to detect path of php-cgi binary.

This doesn't work when run (pear run-tests) in the source tree out of the build 
process

The attached patch try to improve this detection.
First change uses PHP_BINARY which requires PHP 5.4
The other change will work on PHP 5.3/5.4 (when 
TEST_PHP_EXECUTABLE=/usr/bin/php)

Test script:
---
$ cd sapi/cgi/tests
$ pear run-tests 010.phpt


Expected result:

Running 1 tests
PASS Bug #45860 (header() function fails to correctly replace all Status 
lines)[010.phpt]
TOTAL TIME: 00:01
1 PASSED TESTS
0 SKIPPED TESTS


Actual result:
--
Running 1 tests
SKIP Bug #45860 (header() function fails to correctly replace all Status 
lines)[010.phpt](reason: CGI not found)
TOTAL TIME: 00:01
0 PASSED TESTS
1 SKIPPED TESTS







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=61949&edit=1


[PHP-BUG] Req #63085 [NEW]: Systemd integration and daemonize

2012-09-13 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 17)
PHP version:  5.4.7
Package:  FPM related
Bug Type: Feature/Change Request
Bug description:Systemd integration and daemonize

Description:

Currently "daemonize" is a option taken from configuration file.

I think is is quite ugly to have a starting script of systemd unit file to
rely on a external configuration file.

I think a command line option will be more robust.

For ex, 
- in init script we could launch php-fpm --daemonize
- in systemd unit, we could launch php-fpm --nodaemonize

Without command line option, I propose to keep reading option from the
config file (to not break existing configuration).

We could also imagine another option (--debug) which run in foreground and
log everything need thing to screen (for interactive run).

What do you think ?
I could propose a patch


-- 
Edit bug report at https://bugs.php.net/bug.php?id=63085&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=63085&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=63085&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=63085&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=63085&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=63085&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=63085&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=63085&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=63085&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=63085&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=63085&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=63085&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=63085&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=63085&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=63085&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=63085&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=63085&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=63085&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=63085&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=63085&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=63085&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=63085&r=mysqlcfg



Req #63085 [PATCH]: Systemd integration and daemonize

2012-09-13 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63085&edit=1

 ID: 63085
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Systemd integration and daemonize
 Status: Open
 Type:   Feature/Change Request
 Package:FPM related
 Operating System:   GNU/Linux (Fedora 17)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: php-fpm.service
Revision:   1347601268
URL:
https://bugs.php.net/patch-display.php?bug=63085&patch=php-fpm.service&revision=1347601268


Previous Comments:

[2012-09-14 05:40:12] r...@php.net

Description:

Currently "daemonize" is a option taken from configuration file.

I think is is quite ugly to have a starting script of systemd unit file to rely 
on a external configuration file.

I think a command line option will be more robust.

For ex, 
- in init script we could launch php-fpm --daemonize
- in systemd unit, we could launch php-fpm --nodaemonize

Without command line option, I propose to keep reading option from the config 
file (to not break existing configuration).

We could also imagine another option (--debug) which run in foreground and log 
everything need thing to screen (for interactive run).

What do you think ?
I could propose a patch







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63085&edit=1


Req #63085 [Com]: Systemd integration and daemonize

2012-09-13 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63085&edit=1

 ID: 63085
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Systemd integration and daemonize
 Status: Open
 Type:   Feature/Change Request
 Package:FPM related
 Operating System:   GNU/Linux (Fedora 17)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

I have join the systemd unit file used in Fedora.

Note : "type=Forking" is not present, 
so this rely on daemonize=no in config file.

It could be great to have this unit file (made more generic if needed) provided 
in php distribution.


Previous Comments:

[2012-09-14 05:41:08] r...@php.net

The following patch has been added/updated:

Patch Name: php-fpm.service
Revision:   1347601268
URL:
https://bugs.php.net/patch-display.php?bug=63085&patch=php-fpm.service&revision=1347601268


[2012-09-14 05:40:12] r...@php.net

Description:

Currently "daemonize" is a option taken from configuration file.

I think is is quite ugly to have a starting script of systemd unit file to rely 
on a external configuration file.

I think a command line option will be more robust.

For ex, 
- in init script we could launch php-fpm --daemonize
- in systemd unit, we could launch php-fpm --nodaemonize

Without command line option, I propose to keep reading option from the config 
file (to not break existing configuration).

We could also imagine another option (--debug) which run in foreground and log 
everything need thing to screen (for interactive run).

What do you think ?
I could propose a patch







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63085&edit=1


[PHP-BUG] Bug #52262 [NEW]: json_decode reports no error while returning NULL

2010-07-06 Thread r...@php.net
From: 
Operating system: Linux/Ubuntu
PHP version:  5.3.2
Package:  JSON related
Bug Type: Bug
Bug description:json_decode reports no error while returning NULL

Description:

I'm attempting to use json_decode on a relatively long piece of JSON. The
JSON 

is returned successfully by file_get_contents, and is valid according to 

JSONLint.



What I expect to happen is for the JSON to be correctly decoded, or NULL to
be 

returned and json_last_error to be populated with the reason. For some
reason 

NULL is returned and json_last_error remains at 0.



I have a feeling that this could be to do with the length of the file 

(containing a large array of objects).



I'm currently using:



r...@ross-laptop:/$ php -v



PHP 5.3.2-1ubuntu4.2 with Suhosin-Patch (cli) (built: May 13 2010 20:01:00)


Copyright (c) 1997-2009 The PHP Group

Zend Engine v2.3.0, Copyright (c) 1998-2010 Zend Technologies

Test script:
---
http://api.steampowered.com/ISteamUserStats/GetGlobalAchievementPercentagesForApp/v0001/?gameid=440";);



$decoded = json_decode($raw);



$errors = array(

JSON_ERROR_NONE => "No error has occurred",

JSON_ERROR_DEPTH => "The maximum stack depth has been exceeded",

JSON_ERROR_CTRL_CHAR => "Control character error, possibly incorrectly
encoded",

JSON_ERROR_SYNTAX => "Syntax error",

//JSON_ERROR_UTF8 => "Malformed UTF-8 characters, possibly incorrectly
encoded"

);



var_dump("Raw result:", $raw, "\n\n");

var_dump("Decoded result:", $decoded, "\n\n");

var_dump("JSON errors:", $errors[json_last_error()]);

Expected result:

Raw result: (long raw json)

Decoded result: object stdClass(1) { (data array) }

JSON errors: string "No error has occurred"

Actual result:
--
Raw result: (long raw json)

Decoded result: NULL

JSON errors: string "No error has occurred"

-- 
Edit bug report at http://bugs.php.net/bug.php?id=52262&edit=1
-- 
Try a snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=52262&r=trysnapshot52
Try a snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=52262&r=trysnapshot53
Try a snapshot (trunk):  
http://bugs.php.net/fix.php?id=52262&r=trysnapshottrunk
Fixed in SVN:
http://bugs.php.net/fix.php?id=52262&r=fixed
Fixed in SVN and need be documented: 
http://bugs.php.net/fix.php?id=52262&r=needdocs
Fixed in release:
http://bugs.php.net/fix.php?id=52262&r=alreadyfixed
Need backtrace:  
http://bugs.php.net/fix.php?id=52262&r=needtrace
Need Reproduce Script:   
http://bugs.php.net/fix.php?id=52262&r=needscript
Try newer version:   
http://bugs.php.net/fix.php?id=52262&r=oldversion
Not developer issue: 
http://bugs.php.net/fix.php?id=52262&r=support
Expected behavior:   
http://bugs.php.net/fix.php?id=52262&r=notwrong
Not enough info: 
http://bugs.php.net/fix.php?id=52262&r=notenoughinfo
Submitted twice: 
http://bugs.php.net/fix.php?id=52262&r=submittedtwice
register_globals:
http://bugs.php.net/fix.php?id=52262&r=globals
PHP 4 support discontinued:  http://bugs.php.net/fix.php?id=52262&r=php4
Daylight Savings:http://bugs.php.net/fix.php?id=52262&r=dst
IIS Stability:   
http://bugs.php.net/fix.php?id=52262&r=isapi
Install GNU Sed: 
http://bugs.php.net/fix.php?id=52262&r=gnused
Floating point limitations:  
http://bugs.php.net/fix.php?id=52262&r=float
No Zend Extensions:  
http://bugs.php.net/fix.php?id=52262&r=nozend
MySQL Configuration Error:   
http://bugs.php.net/fix.php?id=52262&r=mysqlcfg



Bug #52262 [Com]: json_decode reports no error while returning NULL

2010-07-07 Thread r...@php.net
Edit report at http://bugs.php.net/bug.php?id=52262&edit=1

 ID:   52262
 Comment by:       r...@php.net
 Reported by:      r...@php.net
 Summary:  json_decode reports no error while returning NULL
 Status:   Closed
 Type: Bug
 Package:  JSON related
 Operating System: Linux/Ubuntu
 PHP Version:  5.3.2
 Assigned To:  scottmac

 New Comment:

Thanks for the fix, will talk to Steam.


Previous Comments:

[2010-07-06 19:08:47] scott...@php.net

It now correctly returns an error code to indicate an invalid UTF-8
error. The 

issue is an incorrectly encoded character around number 21,190.



I suggest you speak to Steam and get them to produce a correctly valid
feed.


[2010-07-06 19:01:35] scott...@php.net

Automatic comment from SVN on behalf of scottmac
Revision: http://svn.php.net/viewvc/?view=revision&revision=301028
Log: Fix bug #52262 - Invalid UTF-8 documents don't set an error code
when they fail to decode.


[2010-07-06 13:34:48] johan...@php.net

That codition in php_json_decode is hit as utf16_len == -2



utf16_len = utf8_to_utf16(utf16, str, str_len);

if (utf16_len <= 0) {

if (utf16) {

efree(utf16);

}

RETURN_NULL();

}


[2010-07-06 11:17:59] r...@php.net

Description:

I'm attempting to use json_decode on a relatively long piece of JSON.
The JSON 

is returned successfully by file_get_contents, and is valid according to


JSONLint.



What I expect to happen is for the JSON to be correctly decoded, or NULL
to be 

returned and json_last_error to be populated with the reason. For some
reason 

NULL is returned and json_last_error remains at 0.



I have a feeling that this could be to do with the length of the file 

(containing a large array of objects).



I'm currently using:



r...@ross-laptop:/$ php -v



PHP 5.3.2-1ubuntu4.2 with Suhosin-Patch (cli) (built: May 13 2010
20:01:00) 

Copyright (c) 1997-2009 The PHP Group

Zend Engine v2.3.0, Copyright (c) 1998-2010 Zend Technologies

Test script:
---
http://api.steampowered.com/ISteamUserStats/GetGlobalAchievementPercentagesForApp/v0001/?gameid=440";);



$decoded = json_decode($raw);



$errors = array(

JSON_ERROR_NONE => "No error has occurred",

JSON_ERROR_DEPTH => "The maximum stack depth has been exceeded",

JSON_ERROR_CTRL_CHAR => "Control character error, possibly
incorrectly encoded",

JSON_ERROR_SYNTAX => "Syntax error",

//JSON_ERROR_UTF8 => "Malformed UTF-8 characters, possibly
incorrectly encoded"

);



var_dump("Raw result:", $raw, "\n\n");

var_dump("Decoded result:", $decoded, "\n\n");

var_dump("JSON errors:", $errors[json_last_error()]);

Expected result:

Raw result: (long raw json)

Decoded result: object stdClass(1) { (data array) }

JSON errors: string "No error has occurred"

Actual result:
--
Raw result: (long raw json)

Decoded result: NULL

JSON errors: string "No error has occurred"






-- 
Edit this bug report at http://bugs.php.net/bug.php?id=52262&edit=1


[PHP-BUG] Bug #63117 [NEW]: Bad version libdb version use.

2012-09-19 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.7
Package:  DBM/DBA related
Bug Type: Bug
Bug description:Bad version libdb version use.

Description:

Hi,

When various versiosn are installed, among 4.8, 5.2 or 5.3, configure
doesn't detect the current one.

config.m4 include 5.1 condition but none for 5.2 or 5.3.

For headers, $i/include/db.h is probably the default/current version
For library, libdb.so is also probably the default/current version

Proposal:
Test $y/include/db.h first and, in PHP_DBA_DB_CHECK, "db" first.

RFE: It will be great to have libdb version reported in phpinfo().



-- 
Edit bug report at https://bugs.php.net/bug.php?id=63117&edit=1
-- 
Try a snapshot (PHP 5.4):
https://bugs.php.net/fix.php?id=63117&r=trysnapshot54
Try a snapshot (PHP 5.3):
https://bugs.php.net/fix.php?id=63117&r=trysnapshot53
Try a snapshot (trunk):  
https://bugs.php.net/fix.php?id=63117&r=trysnapshottrunk
Fixed in SVN:
https://bugs.php.net/fix.php?id=63117&r=fixed
Fixed in SVN and need be documented: 
https://bugs.php.net/fix.php?id=63117&r=needdocs
Fixed in release:
https://bugs.php.net/fix.php?id=63117&r=alreadyfixed
Need backtrace:  
https://bugs.php.net/fix.php?id=63117&r=needtrace
Need Reproduce Script:   
https://bugs.php.net/fix.php?id=63117&r=needscript
Try newer version:   
https://bugs.php.net/fix.php?id=63117&r=oldversion
Not developer issue: 
https://bugs.php.net/fix.php?id=63117&r=support
Expected behavior:   
https://bugs.php.net/fix.php?id=63117&r=notwrong
Not enough info: 
https://bugs.php.net/fix.php?id=63117&r=notenoughinfo
Submitted twice: 
https://bugs.php.net/fix.php?id=63117&r=submittedtwice
register_globals:
https://bugs.php.net/fix.php?id=63117&r=globals
PHP 4 support discontinued:  
https://bugs.php.net/fix.php?id=63117&r=php4
Daylight Savings:https://bugs.php.net/fix.php?id=63117&r=dst
IIS Stability:   
https://bugs.php.net/fix.php?id=63117&r=isapi
Install GNU Sed: 
https://bugs.php.net/fix.php?id=63117&r=gnused
Floating point limitations:  
https://bugs.php.net/fix.php?id=63117&r=float
No Zend Extensions:  
https://bugs.php.net/fix.php?id=63117&r=nozend
MySQL Configuration Error:   
https://bugs.php.net/fix.php?id=63117&r=mysqlcfg



Bug #63117 [PATCH]: Bad version libdb version use.

2012-09-19 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63117&edit=1

 ID: 63117
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Bad version libdb version use.
 Status: Open
 Type:   Bug
 Package:DBM/DBA related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: dba-libdbinfo.patch
Revision:   1348060204
URL:
https://bugs.php.net/patch-display.php?bug=63117&patch=dba-libdbinfo.patch&revision=1348060204


Previous Comments:

[2012-09-19 10:54:43] r...@php.net

Description:

Hi,

When various versiosn are installed, among 4.8, 5.2 or 5.3, configure doesn't 
detect the current one.

config.m4 include 5.1 condition but none for 5.2 or 5.3.

For headers, $i/include/db.h is probably the default/current version
For library, libdb.so is also probably the default/current version

Proposal:
Test $y/include/db.h first and, in PHP_DBA_DB_CHECK, "db" first.

RFE: It will be great to have libdb version reported in phpinfo().








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63117&edit=1


Req #63085 [PATCH]: Systemd integration and daemonize

2012-09-19 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63085&edit=1

 ID: 63085
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Systemd integration and daemonize
 Status: Open
 Type:   Feature/Change Request
 Package:FPM related
 Operating System:   GNU/Linux (Fedora 17)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: php-fpm-systemd.patch
Revision:   1348066817
URL:
https://bugs.php.net/patch-display.php?bug=63085&patch=php-fpm-systemd.patch&revision=1348066817


Previous Comments:

[2012-09-14 05:43:02] r...@php.net

I have join the systemd unit file used in Fedora.

Note : "type=Forking" is not present, 
so this rely on daemonize=no in config file.

It could be great to have this unit file (made more generic if needed) provided 
in php distribution.


[2012-09-14 05:41:08] r...@php.net

The following patch has been added/updated:

Patch Name: php-fpm.service
Revision:   1347601268
URL:
https://bugs.php.net/patch-display.php?bug=63085&patch=php-fpm.service&revision=1347601268

----
[2012-09-14 05:40:12] r...@php.net

Description:

Currently "daemonize" is a option taken from configuration file.

I think is is quite ugly to have a starting script of systemd unit file to rely 
on a external configuration file.

I think a command line option will be more robust.

For ex, 
- in init script we could launch php-fpm --daemonize
- in systemd unit, we could launch php-fpm --nodaemonize

Without command line option, I propose to keep reading option from the config 
file (to not break existing configuration).

We could also imagine another option (--debug) which run in foreground and log 
everything need thing to screen (for interactive run).

What do you think ?
I could propose a patch







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63085&edit=1


Req #63085 [Com]: Systemd integration and daemonize

2012-09-19 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63085&edit=1

 ID: 63085
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Systemd integration and daemonize
 Status: Open
 Type:   Feature/Change Request
 Package:FPM related
 Operating System:   GNU/Linux (Fedora 17)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

In the proposed php-fpm-systemd.patch:
- add --daemonize option, and update init.d to use it
- add --nodaemonize option
- update --help output
- update man page for new options and systemd use
- add systemd unit file, which use --nodaemonize


Previous Comments:

[2012-09-19 15:00:17] r...@php.net

The following patch has been added/updated:

Patch Name: php-fpm-systemd.patch
Revision:   1348066817
URL:
https://bugs.php.net/patch-display.php?bug=63085&patch=php-fpm-systemd.patch&revision=1348066817


[2012-09-14 05:43:02] r...@php.net

I have join the systemd unit file used in Fedora.

Note : "type=Forking" is not present, 
so this rely on daemonize=no in config file.

It could be great to have this unit file (made more generic if needed) provided 
in php distribution.


[2012-09-14 05:41:08] r...@php.net

The following patch has been added/updated:

Patch Name: php-fpm.service
Revision:   1347601268
URL:
https://bugs.php.net/patch-display.php?bug=63085&patch=php-fpm.service&revision=1347601268

----
[2012-09-14 05:40:12] r...@php.net

Description:

Currently "daemonize" is a option taken from configuration file.

I think is is quite ugly to have a starting script of systemd unit file to rely 
on a external configuration file.

I think a command line option will be more robust.

For ex, 
- in init script we could launch php-fpm --daemonize
- in systemd unit, we could launch php-fpm --nodaemonize

Without command line option, I propose to keep reading option from the config 
file (to not break existing configuration).

We could also imagine another option (--debug) which run in foreground and log 
everything need thing to screen (for interactive run).

What do you think ?
I could propose a patch







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63085&edit=1


[PHP-BUG] Bug #63126 [NEW]: DISABLE_AUTHENTICATOR ignores array

2012-09-20 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.7
Package:  IMAP related
Bug Type: Bug
Bug description:DISABLE_AUTHENTICATOR ignores array

Description:

According to source code, DISABLE_AUTHENTICATOR could be a string or an
array.

Works as expected:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>'GSSAPI');

Doesn't works:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>array('GSSAPI','NTLM'));


The trivial attached patch should fix this (but cannot test it)



-- 
Edit bug report at https://bugs.php.net/bug.php?id=63126&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63126&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63126&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63126&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63126&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63126&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63126&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63126&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63126&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63126&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63126&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63126&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63126&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63126&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63126&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63126&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63126&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63126&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63126&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63126&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63126&r=mysqlcfg



Bug #63126 [Com]: DISABLE_AUTHENTICATOR ignores array

2012-09-20 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63126&edit=1

 ID: 63126
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:DISABLE_AUTHENTICATOR ignores array
 Status: Open
 Type:   Bug
 Package:IMAP related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

This also affects php 5.3


Previous Comments:

[2012-09-21 06:33:46] r...@php.net

Description:

According to source code, DISABLE_AUTHENTICATOR could be a string or an array.

Works as expected:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>'GSSAPI');

Doesn't works:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>array('GSSAPI','NTLM'));


The trivial attached patch should fix this (but cannot test it)








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63126&edit=1


Bug #63126 [Com]: DISABLE_AUTHENTICATOR ignores array

2012-09-21 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63126&edit=1

 ID: 63126
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:DISABLE_AUTHENTICATOR ignores array
 Status: Open
 Type:   Bug
 Package:IMAP related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

I can find a exchange server an test the fix.

Test script:
$inbox = 
imap_open($server,$userlogin,$password,OP_HALFOPEN,1,array('DISABLE_AUTHENTICATOR'
 => array('GSSAPI','NTLM')));
var_dump(imap_errors());

Without the patch:
array(2) {
  [0]=>
  string(148) "Kerberos error: Credentials cache file 
'/run/user/1000/krb5cc_ea1f24ead9d3199b715d4d57505d4335/t (try running kinit) 
for exchange2007."
  [1]=>
  string(55) "SECURITY PROBLEM: insecure server advertised AUTH=PLAIN"
}

With the patch:
array(1) {
  [0]=>
  string(55) "SECURITY PROBLEM: insecure server advertised AUTH=PLAIN"
}


Previous Comments:
--------
[2012-09-21 06:42:50] r...@php.net

This also affects php 5.3

--------
[2012-09-21 06:33:46] r...@php.net

Description:

According to source code, DISABLE_AUTHENTICATOR could be a string or an array.

Works as expected:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>'GSSAPI');

Doesn't works:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>array('GSSAPI','NTLM'));


The trivial attached patch should fix this (but cannot test it)








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63126&edit=1


Bug #63126 [Com]: DISABLE_AUTHENTICATOR ignores array

2012-09-21 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63126&edit=1

 ID: 63126
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:DISABLE_AUTHENTICATOR ignores array
 Status: Open
 Type:   Bug
 Package:IMAP related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

I try to send my first pull request, I hope this is ok
https://github.com/php/php-src/pull/200


Previous Comments:

[2012-09-21 07:38:31] r...@php.net

I can find a exchange server an test the fix.

Test script:
$inbox = 
imap_open($server,$userlogin,$password,OP_HALFOPEN,1,array('DISABLE_AUTHENTICATOR'
 => array('GSSAPI','NTLM')));
var_dump(imap_errors());

Without the patch:
array(2) {
  [0]=>
  string(148) "Kerberos error: Credentials cache file 
'/run/user/1000/krb5cc_ea1f24ead9d3199b715d4d57505d4335/t (try running kinit) 
for exchange2007."
  [1]=>
  string(55) "SECURITY PROBLEM: insecure server advertised AUTH=PLAIN"
}

With the patch:
array(1) {
  [0]=>
  string(55) "SECURITY PROBLEM: insecure server advertised AUTH=PLAIN"
}

--------
[2012-09-21 06:42:50] r...@php.net

This also affects php 5.3

--------
[2012-09-21 06:33:46] r...@php.net

Description:

According to source code, DISABLE_AUTHENTICATOR could be a string or an array.

Works as expected:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>'GSSAPI');

Doesn't works:
imap_open($srv,$user,$pass,OP_HALF_OPEN,1,
   array('DISABLE_AUTHENTICATOR'=>array('GSSAPI','NTLM'));


The trivial attached patch should fix this (but cannot test it)








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63126&edit=1


[PHP-BUG] Req #63147 [NEW]: Some tests fail because require internet connection

2012-09-24 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.7
Package:  Testing related
Bug Type: Feature/Change Request
Bug description:Some tests fail because require internet connection

Description:

Hi,

Test which requires an internet connection (dns request, ...) fail if test
are run offline.

This is the case in some build environment.

Proposal : add a SKIP_ONLINE_TESTS condition for such tests.

I will submit a pull request.


-- 
Edit bug report at https://bugs.php.net/bug.php?id=63147&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63147&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63147&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63147&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63147&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63147&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63147&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63147&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63147&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63147&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63147&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63147&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63147&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63147&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63147&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63147&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63147&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63147&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63147&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63147&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63147&r=mysqlcfg



Req #63147 [Com]: Some tests fail because require internet connection

2012-09-24 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63147&edit=1

 ID: 63147
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Some tests fail because require internet connection
 Status: Open
 Type:   Feature/Change Request
 Package:Testing related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

See https://github.com/php/php-src/pull/201


Previous Comments:

[2012-09-24 07:04:36] r...@php.net

Description:

Hi,

Test which requires an internet connection (dns request, ...) fail if test are 
run offline.

This is the case in some build environment.

Proposal : add a SKIP_ONLINE_TESTS condition for such tests.

I will submit a pull request.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63147&edit=1


[PHP-BUG] Bug #63149 [NEW]: Feature missing with system SQLite

2012-09-24 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.7
Package:  SQLite related
Bug Type: Bug
Bug description:Feature missing with system SQLite

Description:

When build against bundled SQLite, SQLITE_ENABLE_COLUMN_METADATA is
defined, so sqlite3_column_table_name is know as available and used in
pdo_sqlite (for getColumnMeta)

When build against system SQlite, availability of sqlite3_column_table_name
is not checked.

This make bug_42589 fail.

I will submit a pull request with the fix.


-- 
Edit bug report at https://bugs.php.net/bug.php?id=63149&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63149&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63149&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63149&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63149&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63149&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63149&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63149&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63149&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63149&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63149&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63149&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63149&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63149&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63149&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63149&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63149&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63149&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63149&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63149&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63149&r=mysqlcfg



Bug #63149 [Com]: Feature missing with system SQLite

2012-09-24 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63149&edit=1

 ID: 63149
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Feature missing with system SQLite
 Status: Open
 Type:   Bug
 Package:SQLite related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

Please consider https://github.com/php/php-src/pull/203


Previous Comments:

[2012-09-24 11:51:17] r...@php.net

Description:

When build against bundled SQLite, SQLITE_ENABLE_COLUMN_METADATA is defined, so 
sqlite3_column_table_name is know as available and used in pdo_sqlite (for 
getColumnMeta)

When build against system SQlite, availability of sqlite3_column_table_name is 
not checked.

This make bug_42589 fail.

I will submit a pull request with the fix.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63149&edit=1


Req #63147 [Com]: Some tests fail because require internet connection

2012-09-24 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63147&edit=1

 ID: 63147
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Some tests fail because require internet connection
 Status: Open
 Type:   Feature/Change Request
 Package:Testing related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

There is a few tests concerned and probably a few people affected.
But --offline option added (in the pull request)

Note : if this "small" feature is accepted, I will also check the non-standard 
extension for such tests (currently, with run "make test", after build, only 
for static extension)


Previous Comments:

[2012-09-25 03:10:30] larue...@php.net

remi, should there also be a corresponding option for run-test.php?

----
[2012-09-24 07:46:34] r...@php.net

See https://github.com/php/php-src/pull/201

----
[2012-09-24 07:04:36] r...@php.net

Description:

Hi,

Test which requires an internet connection (dns request, ...) fail if test are 
run offline.

This is the case in some build environment.

Proposal : add a SKIP_ONLINE_TESTS condition for such tests.

I will submit a pull request.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63147&edit=1


[PHP-BUG] Bug #63160 [NEW]: Lot of fstat call during include

2012-09-25 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.7
Package:  Performance problem
Bug Type: Bug
Bug description:Lot of fstat call during include

Description:

Hi,

Each "include" statement call fstat 3 time, which can be "slow" in some
cluster environment (usgin GFS2 p.e.)

Already open as #49383 (but closed as "not a bug")

The fstat cache is only available inside "plain_wrapper".
A solution could be to expose a stream_cached_stat (in
_php_stream_wrapper_ops) and use it during open process (or a additionnal
parameter to stream_stat).

But this will introduce a important bc break.

Test script:
---
Trivial test code:
test1.php: https://bugs.php.net/bug.php?id=63160&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63160&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63160&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63160&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63160&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63160&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63160&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63160&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63160&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63160&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63160&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63160&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63160&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63160&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63160&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63160&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63160&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63160&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63160&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63160&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63160&r=mysqlcfg



Bug #63160 [Com]: Lot of fstat call during include

2012-09-25 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63160&edit=1

 ID: 63160
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Lot of fstat call during include
 Status: Open
 Type:   Bug
 Package:Performance problem
 Operating System:   GNU/Linux
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

Here is the backtrace for each fstat call

Breakpoint 1, do_fstat (d=d@entry=0x77fcbed0, force=force@entry=0) at 
/usr/src/debug/php-5.4.7/main/streams/plain_wrapper.c:138
138 {
(gdb) bt
#0  do_fstat (d=d@entry=0x77fcbed0, force=force@entry=0) at 
/usr/src/debug/php-5.4.7/main/streams/plain_wrapper.c:138
#1  0x00581d0b in _php_stream_fopen (filename=, 
mode=0x6a3831 "rb", opened_path=0x7fffa7d0, options=) at 
/usr/src/debug/php-5.4.7/main/streams/plain_wrapper.c:967
#2  0x0057d4f2 in _php_stream_open_wrapper_ex (path=0x77fcb238 
"/home/rcollet/test/test2.php", path@entry=0x77eba2e0 "test2.php", 
mode=mode@entry=0x6a3831 "rb", options=16520, 
opened_path=opened_path@entry=0x7fffa7d0, context=context@entry=0x0) at 
/usr/src/debug/php-5.4.7/main/streams/streams.c:2049
#3  0x00562a21 in php_stream_open_for_zend_ex (filename=0x77eba2e0 
"test2.php", handle=0x7fffa7c0, mode=) at 
/usr/src/debug/php-5.4.7/main/main.c:1303
#4  0x005d919c in zend_stream_fixup 
(file_handle=file_handle@entry=0x7fffa7c0, buf=buf@entry=0x7fffa500, 
len=len@entry=0x7fffa508) at /usr/src/debug/php-5.4.7/Zend/zend_stream.c:187
#5  0x0058de66 in open_file_for_scanning 
(file_handle=file_handle@entry=0x7fffa7c0) at 
Zend/zend_language_scanner.l:486
#6  0x0058e0f2 in compile_file (file_handle=0x7fffa7c0, type=2) at 
Zend/zend_language_scanner.l:569
#7  0x701bbf5a in phar_compile_file (file_handle=0x7fffa7c0, 
type=2) at /usr/src/debug/php-5.4.7/ext/phar/phar.c:3388
#8  0x0058e2e0 in compile_filename (type=type@entry=2, 
filename=filename@entry=0x77fcc960) at Zend/zend_language_scanner.l:625
#9  0x006079fb in ZEND_INCLUDE_OR_EVAL_SPEC_CONST_HANDLER 
(execute_data=0x77f97060) at 
/usr/src/debug/php-5.4.7/Zend/zend_vm_execute.h:2592
#10 0x00623c47 in execute (op_array=0x77fcbaa8) at 
/usr/src/debug/php-5.4.7/Zend/zend_vm_execute.h:410
#11 0x005c4a3c in zend_execute_scripts (type=type@entry=8, 
retval=retval@entry=0x0, file_count=file_count@entry=3) at 
/usr/src/debug/php-5.4.7/Zend/zend.c:1286
#12 0x005645bd in php_execute_script 
(primary_file=primary_file@entry=0x7fffcd80) at 
/usr/src/debug/php-5.4.7/main/main.c:2473
#13 0x0066c5c6 in do_cli (argc=2, argv=0x7fffe218) at 
/usr/src/debug/php-5.4.7/sapi/cli/php_cli.c:988
#14 0x00425aaa in main (argc=2, argv=0x7fffe218) at 
/usr/src/debug/php-5.4.7/sapi/cli/php_cli.c:1364
(gdb) c
Continuing.

Breakpoint 1, do_fstat (d=d@entry=0x77fcbed0, force=force@entry=1) at 
/usr/src/debug/php-5.4.7/main/streams/plain_wrapper.c:138
138 {
(gdb) bt
#0  do_fstat (d=d@entry=0x77fcbed0, force=force@entry=1) at 
/usr/src/debug/php-5.4.7/main/streams/plain_wrapper.c:138
#1  0x005807fa in php_stdiop_stat (stream=, 
ssb=0x7fffa360) at /usr/src/debug/php-5.4.7/main/streams/plain_wrapper.c:546
#2  0x0056132f in php_zend_stream_fsizer 
(handle=handle@entry=0x77fcbfa0) at 
/usr/src/debug/php-5.4.7/main/main.c:1286
#3  0x00562aaf in php_stream_open_for_zend_ex (filename=0x77eba2e0 
"test2.php", handle=0x7fffa7c0, mode=) at 
/usr/src/debug/php-5.4.7/main/main.c:1318
#4  0x005d919c in zend_stream_fixup 
(file_handle=file_handle@entry=0x7fffa7c0, buf=buf@entry=0x7fffa500, 
len=len@entry=0x7fffa508) at /usr/src/debug/php-5.4.7/Zend/zend_stream.c:187
#5  0x0058de66 in open_file_for_scanning 
(file_handle=file_handle@entry=0x7fffa7c0) at 
Zend/zend_language_scanner.l:486
#6  0x0058e0f2 in compile_file (file_handle=0x7fffa7c0, type=2) at 
Zend/zend_language_scanner.l:569
#7  0x701bbf5a in phar_compile_file (file_handle=0x7fffa7c0, 
type=2) at /usr/src/debug/php-5.4.7/ext/phar/phar.c:3388
#8  0x0058e2e0 in compile_filename (type=type@entry=2, 
filename=filename@entry=0x77fcc960) at Zend/zend_language_scanner.l:625
#9  0x006079fb in ZEND_INCLUDE_OR_EVAL_SPEC_CONST_HANDLER 
(execute_data=0x77f97060) at 
/usr/src/debug/php-5.4.7/Zend/zend_vm_execute.h:2592
#10 0x00623c47 in execute (op_array=0x77fcbaa8) at 
/usr/src/debug/php-5.4.7/Zend/zend_vm_execute.h:410
#11 0x005c4a3c in zend_execute_scripts (type=type@entry=8, 
retval=retval@entry=0x0, file_count=file_count@entry=3) at 
/usr/src/debug/php-5.4.7/Zend/zend.c:1286
#12 0x005645bd in php_execute_script 
(primary_file=primary_file@entry=0

[PHP-BUG] Bug #63171 [NEW]: Script hangs after max_execution_time

2012-09-27 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.7
Package:  ODBC related
Bug Type: Bug
Bug description:Script hangs after max_execution_time

Description:

As unixODBC functions are not async-signal-safe, nor safe to be longjmp'ed
out, If a timeout occurs during an odbc calls, with a lock set, the PHP
script will hangs.

I have a patch proposal, will submit a pull request.

Test script:
---
https://bugs.php.net/bug.php?id=63171&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63171&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63171&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63171&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63171&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63171&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63171&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63171&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63171&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63171&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63171&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63171&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63171&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63171&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63171&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63171&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63171&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63171&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63171&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63171&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63171&r=mysqlcfg



Bug #63171 [Com]: Script hangs after max_execution_time

2012-09-27 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63171&edit=1

 ID: 63171
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Script hangs after max_execution_time
 Status: Open
 Type:   Bug
 Package:ODBC related
 Operating System:   GNU/Linux
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

Please, review https://github.com/php/php-src/pull/207

Pull request against 5.4, but could apply to all branches, 5.3, 5.4 and master.


Previous Comments:

[2012-09-27 11:36:19] r...@php.net

Description:

As unixODBC functions are not async-signal-safe, nor safe to be longjmp'ed out, 
If a timeout occurs during an odbc calls, with a lock set, the PHP script will 
hangs.

I have a patch proposal, will submit a pull request.

Test script:
---
https://bugs.php.net/bug.php?id=63171&edit=1


[PHP-BUG] Bug #63172 [NEW]: Script hangs after max_execution_time (tzset)

2012-09-27 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.7
Package:  Unknown/Other Function
Bug Type: Bug
Bug description:Script hangs after max_execution_time (tzset)

Description:

As tzset functions is not async-signal-safe, nor safe to be longjmp'ed out,
If a timeout occurs during soem glib call, with a lock set, the PHP script
will hangs.


tzset should not be called during timeout management.


Attached patch solves this.

Test script:
---
https://bugs.php.net/bug.php?id=63172&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63172&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63172&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63172&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63172&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63172&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63172&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63172&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63172&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63172&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63172&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63172&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63172&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63172&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63172&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63172&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63172&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63172&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63172&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63172&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63172&r=mysqlcfg



[PHP-BUG] Bug #63235 [NEW]: buffer overflow in use of SQLGetDiagRec

2012-10-08 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.7
Package:  PDO related
Bug Type: Bug
Bug description:buffer overflow in use of SQLGetDiagRec

Description:

Already report on internals http://marc.info/?t=13426268866&r=1&w=2

Discard state is 5 char long, so buffer must be 6.

Trivial fix attached.
(could apply in all branches)



-- 
Edit bug report at https://bugs.php.net/bug.php?id=63235&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63235&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63235&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63235&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63235&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63235&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63235&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63235&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63235&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63235&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63235&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63235&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63235&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63235&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63235&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63235&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63235&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63235&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63235&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63235&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63235&r=mysqlcfg



Bug #63235 [PATCH]: buffer overflow in use of SQLGetDiagRec

2012-10-08 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63235&edit=1

 ID: 63235
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:buffer overflow in use of SQLGetDiagRec
 Status: Open
 Type:   Bug
 Package:PDO related
 Operating System:   GNU/Linux
 PHP Version:5.4.7
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: php-5.3.3-pdo-overflow.patch
Revision:   1349681821
URL:
https://bugs.php.net/patch-display.php?bug=63235&patch=php-5.3.3-pdo-overflow.patch&revision=1349681821


Previous Comments:

[2012-10-08 07:36:51] r...@php.net

Description:

Already report on internals http://marc.info/?t=13426268866&r=1&w=2

Discard state is 5 char long, so buffer must be 6.

Trivial fix attached.
(could apply in all branches)








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63235&edit=1


[PHP-BUG] Bug #63236 [NEW]: Executable permission on various source files

2012-10-08 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4Git-2012-10-08 (Git)
Package:  *General Issues
Bug Type: Bug
Bug description:Executable permission on various source files

Description:

Not a big issue, but easy to fix one.

This raises some warnings (rpmlint) for packaging on the "debuginfo"
package.

Test script:
---
find . -name \*.[ch] -executable 

Expected result:

empty result

Actual result:
--
./Zend/zend_iterators.c
./Zend/zend_build.h
./Zend/zend_interfaces.h
./Zend/zend_interfaces.c
./Zend/zend_iterators.h
./ext/sqlite/libsqlite/src/config_static.w32.h
./ext/pcntl/pcntl.c
./ext/interbase/php_ibase_includes.h
./ext/com_dotnet/com_persist.c
./ext/enchant/enchant.c
./ext/pdo_oci/php_pdo_oci_int.h
./ext/pdo_oci/php_pdo_oci.h
./ext/pdo_oci/oci_statement.c
./ext/pdo_oci/oci_driver.c
./ext/pdo_oci/pdo_oci.c
./ext/mbstring/libmbfl/filters/mbfilter_iso8859_16.h
./ext/mbstring/libmbfl/filters/mbfilter_iso8859_16.c
./ext/mbstring/libmbfl/mbfl/mbfl_defs.h
./ext/mbstring/oniguruma/enc/utf32_le.c
./ext/mbstring/oniguruma/enc/utf32_be.c
./ext/mbstring/oniguruma/enc/utf16_be.c
./ext/mbstring/oniguruma/enc/utf16_le.c
./ext/mbstring/oniguruma/regext.c
./ext/pdo_mysql/pdo_mysql.c
./ext/pdo_mysql/mysql_statement.c
./ext/pdo_mysql/mysql_driver.c
./ext/pdo_mysql/php_pdo_mysql.h
./ext/pdo_mysql/php_pdo_mysql_int.h
./ext/pdo/php_pdo.h
./ext/pdo/php_pdo_int.h
./ext/pdo/pdo_stmt.c
./ext/pdo/pdo.c
./ext/pdo/php_pdo_driver.h
./ext/pdo/pdo_dbh.c
./ext/spl/spl_exceptions.c
./ext/spl/spl_functions.h
./ext/spl/spl_exceptions.h
./ext/spl/spl_functions.c
./ext/spl/spl_array.h
./ext/spl/spl_observer.c
./ext/spl/spl_directory.h
./ext/spl/spl_directory.c
./ext/spl/spl_array.c
./ext/spl/php_spl.c
./ext/spl/spl_engine.h
./ext/spl/spl_iterators.c
./ext/spl/php_spl.h
./ext/spl/spl_iterators.h
./ext/spl/spl_observer.h
./ext/spl/spl_engine.c
./ext/simplexml/sxe.h
./ext/simplexml/php_simplexml_exports.h
./ext/simplexml/sxe.c
./ext/dba/php_db1.h
./ext/dba/dba_db1.c
./ext/dba/dba_qdbm.c
./ext/pdo_odbc/odbc_stmt.c
./ext/pdo_odbc/php_pdo_odbc_int.h
./ext/pdo_odbc/pdo_odbc.c
./ext/pdo_odbc/odbc_driver.c
./ext/standard/winver.h
./main/streams/glob_wrapper.c
./main/streams/php_stream_glob_wrapper.h
./main/streams/streams.c
./main/php_streams.h
./win32/globals.c
./win32/php_win32_globals.h


-- 
Edit bug report at https://bugs.php.net/bug.php?id=63236&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63236&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63236&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63236&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63236&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63236&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63236&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63236&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63236&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63236&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63236&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63236&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63236&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63236&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63236&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63236&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63236&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63236&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63236&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63236&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63236&r=mysqlcfg



[PHP-BUG] Bug #63362 [NEW]: Not needed but installed headers.

2012-10-25 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.8
Package:  *General Issues
Bug Type: Bug
Bug description:Not needed but installed headers.

Description:

Various Windows specific headers are provided in the php sources
(of course, this is absolutely not a problem).

It will be great to not install them on other OS.

Installed headers list:

 TSRM/tsrm_win32.h
 TSRM/tsrm_config.w32.h
 Zend/zend_config.w32.h
 ext/mysqlnd/config-win.h
 ext/standard/winver.h
 main/win32_internal_function_disabled.h
 main/win95nt.h




-- 
Edit bug report at https://bugs.php.net/bug.php?id=63362&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63362&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63362&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63362&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63362&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63362&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63362&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63362&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63362&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63362&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63362&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63362&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63362&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63362&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63362&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63362&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63362&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63362&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63362&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63362&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63362&r=mysqlcfg



[PHP-BUG] Bug #63581 [NEW]: Possible null dereference and buffer overflow

2012-11-22 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.8
Package:  FPM related
Bug Type: Bug
Bug description:Possible null dereference and buffer overflow

Description:

1. possible null dereference

   => fpm/fpm/fpm_events.c|435|

I'm not familiar with the code, but it seems to be possible NULL
dereference.  Please, consider the situation (on line 425) when the 'q'
item is the latest one on the list --  q->next does not exist (== NULL).
Next, if the 'q' is also fpm_event_queue_timer (I'm not sure if this may
occur?), program will crash on NULL dereference.


2. Same situation -> null dereference

   => fpm/fpm/fpm_events.c|191|

Consider the queue length of 1.  Than the condition (q == *queue) (line
189) must be true ~~> *queue = q->next (this is NULL) ~~> NULL->prev =
NULL

Again, I'm not sure if there may exist queue of single item.


3. off-by-one(two) (low prio)

   => fpm/fpm/fpm_log.c|459|

The 'len' may be up to 1025 on this line.  On line 149, consider 'len' to
be equal to 1024 - program then continues down to line 453 where the 'len'
is incremented.

The problem could only occurs if, after increment (ligne 453), loop is
not entered again. So when produced buffer is "exactly" 1024" or "1025".


Test script:
---
This issues where found from by static code analysis tool and, so, I can't
provide any reproducer.



-- 
Edit bug report at https://bugs.php.net/bug.php?id=63581&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63581&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63581&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63581&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63581&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63581&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63581&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63581&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63581&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63581&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63581&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63581&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63581&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63581&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63581&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63581&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63581&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63581&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63581&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63581&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63581&r=mysqlcfg



Bug #63581 [Com]: Possible null dereference and buffer overflow

2012-11-22 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63581&edit=1

 ID: 63581
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Possible null dereference and buffer overflow
 Status: Open
 Type:   Bug
 Package:FPM related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.8
 Block user comment: N
 Private report: N

 New Comment:

See https://github.com/php/php-src/pull/234


Previous Comments:

[2012-11-22 13:43:12] r...@php.net

Description:

1. possible null dereference

   => fpm/fpm/fpm_events.c|435|

I'm not familiar with the code, but it seems to be possible NULL dereference.  
Please, consider the situation (on line 425) when the 'q' item is the latest 
one on the list --  q->next does not exist (== NULL). Next, if the 'q' is also 
fpm_event_queue_timer (I'm not sure if this may occur?), program will crash on 
NULL dereference.


2. Same situation -> null dereference

   => fpm/fpm/fpm_events.c|191|

Consider the queue length of 1.  Than the condition (q == *queue) (line 189) 
must be true ~~> *queue = q->next (this is NULL) ~~> NULL->prev = NULL

Again, I'm not sure if there may exist queue of single item.


3. off-by-one(two) (low prio)

   => fpm/fpm/fpm_log.c|459|

The 'len' may be up to 1025 on this line.  On line 149, consider 'len' to be 
equal to 1024 - program then continues down to line 453 where the 'len' is 
incremented.

The problem could only occurs if, after increment (ligne 453), loop is
not entered again. So when produced buffer is "exactly" 1024" or "1025".


Test script:
---
This issues where found from by static code analysis tool and, so, I can't 
provide any reproducer.








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63581&edit=1


Bug #63581 [Com]: Possible null dereference and buffer overflow

2012-11-22 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63581&edit=1

 ID: 63581
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Possible null dereference and buffer overflow
 Status: Open
 Type:   Bug
 Package:FPM related
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.8
 Block user comment: N
 Private report: N

 New Comment:

I have forget, affected branches: 5.3, 5.4 and 5.5


Previous Comments:

[2012-11-22 13:44:03] r...@php.net

See https://github.com/php/php-src/pull/234


[2012-11-22 13:43:12] r...@php.net

Description:

1. possible null dereference

   => fpm/fpm/fpm_events.c|435|

I'm not familiar with the code, but it seems to be possible NULL dereference.  
Please, consider the situation (on line 425) when the 'q' item is the latest 
one on the list --  q->next does not exist (== NULL). Next, if the 'q' is also 
fpm_event_queue_timer (I'm not sure if this may occur?), program will crash on 
NULL dereference.


2. Same situation -> null dereference

   => fpm/fpm/fpm_events.c|191|

Consider the queue length of 1.  Than the condition (q == *queue) (line 189) 
must be true ~~> *queue = q->next (this is NULL) ~~> NULL->prev = NULL

Again, I'm not sure if there may exist queue of single item.


3. off-by-one(two) (low prio)

   => fpm/fpm/fpm_log.c|459|

The 'len' may be up to 1025 on this line.  On line 149, consider 'len' to be 
equal to 1024 - program then continues down to line 453 where the 'len' is 
incremented.

The problem could only occurs if, after increment (ligne 453), loop is
not entered again. So when produced buffer is "exactly" 1024" or "1025".


Test script:
---
This issues where found from by static code analysis tool and, so, I can't 
provide any reproducer.








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63581&edit=1


Bug #63520 [Com]: JSON extension includes a problematic license statement

2012-11-23 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63520&edit=1

 ID: 63520
 Comment by:     r...@php.net
 Reported by:kaplan at debian dot org
 Summary:JSON extension includes a problematic license
 statement
 Status: Suspended
 Type:   Bug
 Package:JSON related
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

A patch proposed in https://bugs.php.net/63588 makes "json_encode" really free.


Previous Comments:

[2012-11-15 18:09:30] ras...@php.net

I am not saying it isn't a tricky license clause to deal with and it would be 
better if it wasn't there. However, I am also not keen on spending resources on 
rewriting code for this reason. If someone supplies a functionally equivalent 
replacement, we will have a look at it. But as far as I am concerned, license-
wise the terms Good and Evil are not legal terms. These are more subjective 
self-describing terms and since I deem PHP's use of the code as "Good" then we 
comply with the license. Could others perhaps use PHP and thus the code for 
"Evil" and therefore not comply with the license? Sure, but there are many 
things people can do with our code that is either against the various licenses 
involved or even illegal criminally. It is something we cannot control.


[2012-11-15 18:01:24] paj...@php.net

More seriously, as soon as the license is changed upstream, we will merge it. 
But 
we won't be able to do anything before.


[2012-11-15 18:00:52] paj...@php.net

well, the FSF does not like the PHP license either. Nothing worries me here :)


[2012-11-15 17:58:38] ansgar at debian dot org

I just want to note that the FSF[1] and other distributions like Fedora also 
think this license is bad[2].

  [1] <http://www.gnu.org/licenses/license-list.html#JSON>
  [2] <https://fedoraproject.org/wiki/Licensing:Main#Bad_Licenses>, look for 
"JSON License"

So this is not a problem for just Debian.

Ansgar


[2012-11-15 07:39:35] ras...@php.net

Sorry, I don't see us ripping out and rewriting the json code due to this.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

https://bugs.php.net/bug.php?id=63520


-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63520&edit=1


[PHP-BUG] Bug #63635 [NEW]: Segfault in gc

2012-11-28 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.9
Package:  *General Issues
Bug Type: Bug
Bug description:Segfault in gc

Description:

When using huge object tree with circular reference,

With zend.enable_gc=0 : lot of memory consumed
With zend.enable_gc=1 : segfault

(gdb) bt
#0  0x005e23d9 in gc_zval_possible_root (zv=0x19e5500) at
/usr/src/debug/php-5.4.9/Zend/zend_gc.c:143
#1  0x005e40f7 in zend_object_std_dtor (object=0x7fffcf6f2020) at
/usr/src/debug/php-5.4.9/Zend/zend_objects.c:54
#2  0x005e4129 in zend_objects_free_object_storage
(object=0x7fffcf6f2020) at
/usr/src/debug/php-5.4.9/Zend/zend_objects.c:137
#3  0x005e9e53 in zend_objects_store_del_ref_by_handle_ex
(handle=3273, handlers=)
at /usr/src/debug/php-5.4.9/Zend/zend_objects_API.c:220
#4  0x005e220e in gc_collect_cycles () at
/usr/src/debug/php-5.4.9/Zend/zend_gc.c:832
#5  0x005e2303 in gc_zobj_possible_root (zv=0x19e5500,
zv@entry=0x1967560) at /usr/src/debug/php-5.4.9/Zend/zend_gc.c:221
#6  0x005e23ea in gc_zval_possible_root (zv=zv@entry=0x1967560) at
/usr/src/debug/php-5.4.9/Zend/zend_gc.c:143
#7  0x005f2ffd in gc_zval_check_possible_root (z=0x1967560) at
/usr/src/debug/php-5.4.9/Zend/zend_gc.h:183
#8  i_zval_ptr_dtor (zval_ptr=0x1967560) at
/usr/src/debug/php-5.4.9/Zend/zend_execute.h:97
#9  zend_leave_helper_SPEC (execute_data=0x77f855f8) at
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:468
#10 0x00624067 in execute (op_array=0x77fbfdf8) at
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:410
#11 0x717e0fd2 in xdebug_execute () from
/usr/lib64/php/modules/xdebug.so
#12 0x0066a529 in zend_do_fcall_common_helper_SPEC
(execute_data=0x77f85060) at
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:669
#13 0x00624067 in execute (op_array=0x77fbdab0) at
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:410
#14 0x717e0fd2 in xdebug_execute () from
/usr/lib64/php/modules/xdebug.so
#15 0x005c4dec in zend_execute_scripts (type=type@entry=8,
retval=retval@entry=0x0, file_count=file_count@entry=3)
at /usr/src/debug/php-5.4.9/Zend/zend.c:1309
#16 0x0056475d in php_execute_script
(primary_file=primary_file@entry=0x7fffcbb0) at
/usr/src/debug/php-5.4.9/main/main.c:2482
#17 0x0066ca66 in do_cli (argc=2, argv=0x7fffe048) at
/usr/src/debug/php-5.4.9/sapi/cli/php_cli.c:988
#18 0x00425b0a in main (argc=2, argv=0x7fffe048) at
/usr/src/debug/php-5.4.9/sapi/cli/php_cli.c:1364


Test script:
---
childs[] = $this;
}
$this->childs[] = $this;
}

function __destruct() {
$this->childs = NULL;
}   
}

define("MAX", 16);

while (true) {
printf("Memory: %6.2fMB ->", memory_get_usage()/1024/1024);
$top = new Node();
for ($i=0 ; $i   5.62MB
Memory:   5.62MB ->   3.40MB
Memory:   3.40MB ->   5.62MB
Memory:   5.62MB ->   7.83MB
Memory:   7.83MB ->
Program received signal SIGSEGV, Segmentation fault.


-- 
Edit bug report at https://bugs.php.net/bug.php?id=63635&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63635&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63635&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63635&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63635&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63635&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63635&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63635&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63635&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63635&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63635&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63635&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63635&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63635&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63635&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63635&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63635&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63635&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63635&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63635&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63635&r=mysqlcfg



Bug #63635 [Com]: Segfault in gc_collect_cycles

2012-11-28 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63635&edit=1

 ID: 63635
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:Segfault in gc_collect_cycles
 Status: Open
 Type:   Bug
 Package:*General Issues
 Operating System:   GNU/Linux (Fedora 18)
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

Note: without the circular reference, no segfault.

$this->childs[] = $this;


Previous Comments:

[2012-11-28 11:17:44] r...@php.net

Description:

When using huge object tree with circular reference,

With zend.enable_gc=0 : lot of memory consumed
With zend.enable_gc=1 : segfault

(gdb) bt
#0  0x005e23d9 in gc_zval_possible_root (zv=0x19e5500) at 
/usr/src/debug/php-5.4.9/Zend/zend_gc.c:143
#1  0x005e40f7 in zend_object_std_dtor (object=0x7fffcf6f2020) at 
/usr/src/debug/php-5.4.9/Zend/zend_objects.c:54
#2  0x005e4129 in zend_objects_free_object_storage 
(object=0x7fffcf6f2020) at /usr/src/debug/php-5.4.9/Zend/zend_objects.c:137
#3  0x005e9e53 in zend_objects_store_del_ref_by_handle_ex (handle=3273, 
handlers=)
at /usr/src/debug/php-5.4.9/Zend/zend_objects_API.c:220
#4  0x005e220e in gc_collect_cycles () at 
/usr/src/debug/php-5.4.9/Zend/zend_gc.c:832
#5  0x005e2303 in gc_zobj_possible_root (zv=0x19e5500, 
zv@entry=0x1967560) at /usr/src/debug/php-5.4.9/Zend/zend_gc.c:221
#6  0x005e23ea in gc_zval_possible_root (zv=zv@entry=0x1967560) at 
/usr/src/debug/php-5.4.9/Zend/zend_gc.c:143
#7  0x005f2ffd in gc_zval_check_possible_root (z=0x1967560) at 
/usr/src/debug/php-5.4.9/Zend/zend_gc.h:183
#8  i_zval_ptr_dtor (zval_ptr=0x1967560) at 
/usr/src/debug/php-5.4.9/Zend/zend_execute.h:97
#9  zend_leave_helper_SPEC (execute_data=0x77f855f8) at 
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:468
#10 0x00624067 in execute (op_array=0x77fbfdf8) at 
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:410
#11 0x717e0fd2 in xdebug_execute () from 
/usr/lib64/php/modules/xdebug.so
#12 0x0066a529 in zend_do_fcall_common_helper_SPEC 
(execute_data=0x77f85060) at 
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:669
#13 0x00624067 in execute (op_array=0x77fbdab0) at 
/usr/src/debug/php-5.4.9/Zend/zend_vm_execute.h:410
#14 0x717e0fd2 in xdebug_execute () from 
/usr/lib64/php/modules/xdebug.so
#15 0x005c4dec in zend_execute_scripts (type=type@entry=8, 
retval=retval@entry=0x0, file_count=file_count@entry=3)
at /usr/src/debug/php-5.4.9/Zend/zend.c:1309
#16 0x0056475d in php_execute_script 
(primary_file=primary_file@entry=0x7fffcbb0) at 
/usr/src/debug/php-5.4.9/main/main.c:2482
#17 0x0066ca66 in do_cli (argc=2, argv=0x7fffe048) at 
/usr/src/debug/php-5.4.9/sapi/cli/php_cli.c:988
#18 0x00425b0a in main (argc=2, argv=0x7fffe048) at 
/usr/src/debug/php-5.4.9/sapi/cli/php_cli.c:1364


Test script:
---
childs[] = $this;
}
$this->childs[] = $this;
}

function __destruct() {
$this->childs = NULL;
}   
}

define("MAX", 16);

while (true) {
printf("Memory: %6.2fMB ->", memory_get_usage()/1024/1024);
$top = new Node();
for ($i=0 ; $i   5.62MB
Memory:   5.62MB ->   3.40MB
Memory:   3.40MB ->   5.62MB
Memory:   5.62MB ->   7.83MB
Memory:   7.83MB ->
Program received signal SIGSEGV, Segmentation fault.







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63635&edit=1


[PHP-BUG] Bug #63738 [NEW]: unpack string behavior change

2012-12-11 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 17)
PHP version:  5.5Git-2012-12-11 (snap)
Package:  Unknown/Other Function
Bug Type: Bug
Bug description:unpack string behavior change

Description:

Seems a regression between 5.4.9 and 5.5.0-dev

This breaks Archive_Tar


Test script:
---

  string(2) "AB"
}


Actual result:
--
With php 5.5.0-dev:

string(4) "AB^@^@"
array(1) {
  ["foo"]=>
  string(4) "AB^@^@"
}


-- 
Edit bug report at https://bugs.php.net/bug.php?id=63738&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=63738&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=63738&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=63738&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=63738&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=63738&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=63738&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=63738&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=63738&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=63738&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=63738&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=63738&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=63738&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=63738&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=63738&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=63738&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=63738&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=63738&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=63738&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=63738&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=63738&r=mysqlcfg



Req #63814 [Com]: angles parameters in imagefilledarc are integers, they should be float

2012-12-20 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=63814&edit=1

 ID: 63814
 Comment by:     r...@php.net
 Reported by:webmaster at fxtop dot com
 Summary:angles parameters in imagefilledarc are integers,
 they should be float
 Status: Open
 Type:   Feature/Change Request
 Package:GD related
 Operating System:   Windows
 PHP Version:5.4.9
 Block user comment: N
 Private report: N

 New Comment:

the gd extension is mostly a wrapper for gd library.

As gd library doesn't accept float values for this comment, I think this is not 
possible.


Previous Comments:

[2012-12-20 12:32:55] webmaster at fxtop dot com

Description:

see sample result at
http://mon-convertisseur.fr/php/imgangle.php?DEGRE=172.3

angles are truncated to nearest integer, in imagefilledarc function, they 
shouldn't

you can change parameter if you like

---
>From manual page: 
>http://www.php.net/function.imagefilledarc#refsect1-function.imagefilledarc-description
---



Test script:
---
header("Content-type: image/jpeg");

if (isset($_GET["DEGRE"])){ $lDegre=$_GET["DEGRE"];}
$lSizeX=916;
$lSizeY=945;
$image  = imagecreatetruecolor($lSizeX, $lSizeY);
$colorGreen = imagecolorallocate($image, 0, 255, 0);

// background coming from 
http://commons.wikimedia.org/wiki/File:Protractor_katomierz.jpg with some 
little changes
$fond=imagecreatefromjpeg("Protractor_katomierz_tourne05b.jpg");

//HERE I ROUND DEGRE PARAMETER BECAUSE imagefilledarc only accept integers (I 
prefer it rounded than truncated)
$lNumDegre=round($lDegre);
$lResult|=imagefilledarc ($image , 460 , 474 , 2*430 , 2*430  , -$lNumDegre , 
0, $colorGreen , IMG_ARC_PIE );
$lResult|=imagecopymerge($image, $fond, 0, 0, 0 , 0, $lSizeX,$lSizeY,75);
imagejpeg($image, "temp.jpg");
imagedestroy($image);
echo file_get_contents("temp.jpg");

Expected result:

imagefilledarc should accept float parameters for "start" and "end" parameters.
As you can see on sample at 
http://mon-convertisseur.fr/php/imgangle.php?DEGRE=172.3 green backgound 
allways fall on a degre graduation  of the protactor. 








-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63814&edit=1


[PHP-BUG] Bug #64047 [NEW]: segfault in request shutdown (server_context is NULL)

2013-01-22 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  Irrelevant
Package:  Apache2 related
Bug Type: Bug
Bug description:segfault in request shutdown (server_context is NULL)

Description:

We encounter, in specific race condition (seems http/500 error) a segfault
in php_request_shutdown.

According to backtrace, server_context is NULL.

This backtrace is from php 5.3.3, but as I don't see any change in git
history, I think it could occurs in latest php 5.3.

Core was generated by `/usr/sbin/httpd'.
Program terminated with signal 11, Segmentation fault.
#0  php_apache_sapi_header_handler (sapi_header=,
op=SAPI_HEADER_ADD, sapi_headers=)
at /usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:124
124 if (ctx->content_type) {

(gdb) bt
#0  php_apache_sapi_header_handler (sapi_header=,
op=SAPI_HEADER_ADD, sapi_headers=)
at /usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:124
#1  0x7fe16f2127ce in sapi_header_op (op=,
arg=) at /usr/src/debug/php-5.3.3/main/SAPI.c:756
#2  0x7fe16f212d98 in sapi_add_header_ex (header_line=0x7fe17ddff728
"Content-type: text/html", header_line_len=, 
duplicate=0 '\000', replace=) at
/usr/src/debug/php-5.3.3/main/SAPI.c:515
#3  0x7fe16f2135e2 in sapi_send_headers () at
/usr/src/debug/php-5.3.3/main/SAPI.c:796
#4  0x7fe16f1bbdd9 in php_header () at
/usr/src/debug/php-5.3.3/ext/standard/head.c:69
#5  0x7fe16f21b3e3 in php_ub_body_write (str=0x7fe17f65b400 "",
str_length=0) at /usr/src/debug/php-5.3.3/main/output.c:719
#6  0x7fe16f21b998 in php_end_ob_buffer (send_buffer=1 '\001',
just_flush=0 '\000') at /usr/src/debug/php-5.3.3/main/output.c:298
#7  0x7fe16f21c249 in php_end_ob_buffers (send_buffer=1 '\001') at
/usr/src/debug/php-5.3.3/main/output.c:337
#8  0x7fe16f20873f in php_request_shutdown (dummy=) at /usr/src/debug/php-5.3.3/main/main.c:1598
#9  0x7fe16f2e2997 in php_apache_request_dtor (r=0x7fe17db8dd18) at
/usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:509
#10 php_handler (r=0x7fe17db8dd18) at
/usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:681
#11 0x7fe17c46ab00 in ap_run_handler (r=0x7fe17db8dd18) at
/usr/src/debug/httpd-2.2.15/server/config.c:158
#12 0x7fe17c46e3be in ap_invoke_handler (r=0x7fe17db8dd18) at
/usr/src/debug/httpd-2.2.15/server/config.c:376
#13 0x7fe17c479a30 in ap_process_request (r=0x7fe17db8dd18) at
/usr/src/debug/httpd-2.2.15/modules/http/http_request.c:282
#14 0x7fe17c4768f8 in ap_process_http_connection (c=0x7fe17da29518) at
/usr/src/debug/httpd-2.2.15/modules/http/http_core.c:190
#15 0x7fe17c472608 in ap_run_process_connection (c=0x7fe17da29518) at
/usr/src/debug/httpd-2.2.15/server/connection.c:43
#16 0x7fe17c47e807 in child_main (child_num_arg=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:667
#17 0x7fe17c47eb1a in make_child (s=0x7fe17d1d4860, slot=1) at
/usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:763
#18 0x7fe17c47f79c in perform_idle_server_maintenance (_pconf=, plog=, s=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:898
#19 ap_mpm_run (_pconf=, plog=,
s=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:1102
#20 0x7fe17c456900 in main (argc=1, argv=0x7fff82467b78) at
/usr/src/debug/httpd-2.2.15/server/main.c:760
(gdb) print sapi_globals
$1 = {server_context = 0x0, request_info = {request_method = 0x7fe17db8f638
"GET", 
query_string = 0x7fe17d734d88
"option=###&view=main&article-id=",
post_data = 0x0, 
raw_post_data = 0x0, cookie_data = 0x0, content_length = 0,
post_data_length = 0, raw_post_data_length = 0, 
path_translated = 0x7fe17d734df8 "/var/www/html/index.php", request_uri
= 0x7fe17d734de8 "/index.php", content_type = 0x0, 
headers_only = 0 '\000', no_headers = 0 '\000', headers_read = 0
'\000', post_entry = 0x0, content_type_dup = 0x0, auth_user = 0x0, 
auth_password = 0x0, auth_digest = 0x0, argv0 = 0x0, current_user =
0x0, current_user_length = 0, argc = 0, argv = 0x0, proto_num = 1000}, 
  sapi_headers = {headers = {head = 0x7fe17f0ecb70, tail = 0x7fe17e588a48,
count = 3, size = 16, dtor = 0x7fe16f212270 , 
  persistent = 0 '\000', traverse_ptr = 0x0}, http_response_code = 500,
send_default_content_type = 0 '\000', 
mimetype = 0x7fe17ddff980 "text/html", http_status_line =
0x7fe17ddfb750 "HTTP/1.0 500 Internal Server Error"}, read_post_bytes = 0,

  headers_sent = 0 '\000', global_stat = {st_dev = 0, st_ino = 0, st_nlink
= 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, 
st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0,
tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, 
  tv_nsec = 0}, __unused = {0, 0, 0}}, default_mimetype =
0x7fe17d8be530 "text/html", default_charset = 0x7fe16f2ea939 "", 
  rfc1867_uploaded_files = 0x0

Bug #64047 [PATCH]: segfault in request shutdown (server_context is NULL)

2013-01-22 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64047&edit=1

 ID: 64047
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:segfault in request shutdown (server_context is
 NULL)
 Status: Open
 Type:   Bug
 Package:Apache2 related
 Operating System:   GNU/Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: temporary.patch
Revision:   1358863274
URL:
https://bugs.php.net/patch-display.php?bug=64047&patch=temporary.patch&revision=1358863274


Previous Comments:

[2013-01-22 14:00:33] r...@php.net

Description:

We encounter, in specific race condition (seems http/500 error) a segfault in 
php_request_shutdown.

According to backtrace, server_context is NULL.

This backtrace is from php 5.3.3, but as I don't see any change in git history, 
I think it could occurs in latest php 5.3.

Core was generated by `/usr/sbin/httpd'.
Program terminated with signal 11, Segmentation fault.
#0  php_apache_sapi_header_handler (sapi_header=, 
op=SAPI_HEADER_ADD, sapi_headers=)
at /usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:124
124 if (ctx->content_type) {

(gdb) bt
#0  php_apache_sapi_header_handler (sapi_header=, 
op=SAPI_HEADER_ADD, sapi_headers=)
at /usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:124
#1  0x7fe16f2127ce in sapi_header_op (op=, arg=) at /usr/src/debug/php-5.3.3/main/SAPI.c:756
#2  0x7fe16f212d98 in sapi_add_header_ex (header_line=0x7fe17ddff728 
"Content-type: text/html", header_line_len=, 
duplicate=0 '\000', replace=) at 
/usr/src/debug/php-5.3.3/main/SAPI.c:515
#3  0x7fe16f2135e2 in sapi_send_headers () at 
/usr/src/debug/php-5.3.3/main/SAPI.c:796
#4  0x7fe16f1bbdd9 in php_header () at 
/usr/src/debug/php-5.3.3/ext/standard/head.c:69
#5  0x7fe16f21b3e3 in php_ub_body_write (str=0x7fe17f65b400 "", 
str_length=0) at /usr/src/debug/php-5.3.3/main/output.c:719
#6  0x7fe16f21b998 in php_end_ob_buffer (send_buffer=1 '\001', just_flush=0 
'\000') at /usr/src/debug/php-5.3.3/main/output.c:298
#7  0x7fe16f21c249 in php_end_ob_buffers (send_buffer=1 '\001') at 
/usr/src/debug/php-5.3.3/main/output.c:337
#8  0x7fe16f20873f in php_request_shutdown (dummy=) at 
/usr/src/debug/php-5.3.3/main/main.c:1598
#9  0x7fe16f2e2997 in php_apache_request_dtor (r=0x7fe17db8dd18) at 
/usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:509
#10 php_handler (r=0x7fe17db8dd18) at 
/usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:681
#11 0x7fe17c46ab00 in ap_run_handler (r=0x7fe17db8dd18) at 
/usr/src/debug/httpd-2.2.15/server/config.c:158
#12 0x7fe17c46e3be in ap_invoke_handler (r=0x7fe17db8dd18) at 
/usr/src/debug/httpd-2.2.15/server/config.c:376
#13 0x7fe17c479a30 in ap_process_request (r=0x7fe17db8dd18) at 
/usr/src/debug/httpd-2.2.15/modules/http/http_request.c:282
#14 0x7fe17c4768f8 in ap_process_http_connection (c=0x7fe17da29518) at 
/usr/src/debug/httpd-2.2.15/modules/http/http_core.c:190
#15 0x7fe17c472608 in ap_run_process_connection (c=0x7fe17da29518) at 
/usr/src/debug/httpd-2.2.15/server/connection.c:43
#16 0x7fe17c47e807 in child_main (child_num_arg=) at 
/usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:667
#17 0x7fe17c47eb1a in make_child (s=0x7fe17d1d4860, slot=1) at 
/usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:763
#18 0x7fe17c47f79c in perform_idle_server_maintenance (_pconf=, plog=, s=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:898
#19 ap_mpm_run (_pconf=, plog=, 
s=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:1102
#20 0x7fe17c456900 in main (argc=1, argv=0x7fff82467b78) at 
/usr/src/debug/httpd-2.2.15/server/main.c:760
(gdb) print sapi_globals
$1 = {server_context = 0x0, request_info = {request_method = 0x7fe17db8f638 
"GET", 
query_string = 0x7fe17d734d88 
"option=###&view=main&article-id=",
 post_data = 0x0, 
raw_post_data = 0x0, cookie_data = 0x0, content_length = 0, 
post_data_length = 0, raw_post_data_length = 0, 
path_translated = 0x7fe17d734df8 "/var/www/html/index.php", request_uri = 
0x7fe17d734de8 "/index.php", content_type = 0x0, 
headers_only = 0 '\000', no_headers = 0 '\000', headers_read = 0 '\000', 
post_entry = 0x0, content_type_dup = 0x0, auth_user = 0x0, 
auth_password = 0x0, auth_digest = 0x0, argv0 = 0x0, current_user = 0x0, 
current_user_length = 0, argc = 0, argv = 0x0, proto_num = 1000}, 
  sapi_headers = {headers = {head 

Bug #64047 [Com]: segfault in request shutdown (server_context is NULL)

2013-01-22 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64047&edit=1

 ID: 64047
 Comment by:     r...@php.net
 Reported by:    r...@php.net
 Summary:segfault in request shutdown (server_context is
 NULL)
 Status: Open
 Type:   Bug
 Package:Apache2 related
 Operating System:   GNU/Linux
 PHP Version:Irrelevant
 Block user comment: N
 Private report: N

 New Comment:

We are currently trying to run with the temporary patch applied to get more 
information about the segfault context.

I will update this bug as soon as I will get more debug information.


Previous Comments:

[2013-01-22 14:01:14] r...@php.net

The following patch has been added/updated:

Patch Name: temporary.patch
Revision:   1358863274
URL:
https://bugs.php.net/patch-display.php?bug=64047&patch=temporary.patch&revision=1358863274


[2013-01-22 14:00:33] r...@php.net

Description:

We encounter, in specific race condition (seems http/500 error) a segfault in 
php_request_shutdown.

According to backtrace, server_context is NULL.

This backtrace is from php 5.3.3, but as I don't see any change in git history, 
I think it could occurs in latest php 5.3.

Core was generated by `/usr/sbin/httpd'.
Program terminated with signal 11, Segmentation fault.
#0  php_apache_sapi_header_handler (sapi_header=, 
op=SAPI_HEADER_ADD, sapi_headers=)
at /usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:124
124 if (ctx->content_type) {

(gdb) bt
#0  php_apache_sapi_header_handler (sapi_header=, 
op=SAPI_HEADER_ADD, sapi_headers=)
at /usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:124
#1  0x7fe16f2127ce in sapi_header_op (op=, arg=) at /usr/src/debug/php-5.3.3/main/SAPI.c:756
#2  0x7fe16f212d98 in sapi_add_header_ex (header_line=0x7fe17ddff728 
"Content-type: text/html", header_line_len=, 
duplicate=0 '\000', replace=) at 
/usr/src/debug/php-5.3.3/main/SAPI.c:515
#3  0x7fe16f2135e2 in sapi_send_headers () at 
/usr/src/debug/php-5.3.3/main/SAPI.c:796
#4  0x7fe16f1bbdd9 in php_header () at 
/usr/src/debug/php-5.3.3/ext/standard/head.c:69
#5  0x7fe16f21b3e3 in php_ub_body_write (str=0x7fe17f65b400 "", 
str_length=0) at /usr/src/debug/php-5.3.3/main/output.c:719
#6  0x7fe16f21b998 in php_end_ob_buffer (send_buffer=1 '\001', just_flush=0 
'\000') at /usr/src/debug/php-5.3.3/main/output.c:298
#7  0x7fe16f21c249 in php_end_ob_buffers (send_buffer=1 '\001') at 
/usr/src/debug/php-5.3.3/main/output.c:337
#8  0x7fe16f20873f in php_request_shutdown (dummy=) at 
/usr/src/debug/php-5.3.3/main/main.c:1598
#9  0x7fe16f2e2997 in php_apache_request_dtor (r=0x7fe17db8dd18) at 
/usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:509
#10 php_handler (r=0x7fe17db8dd18) at 
/usr/src/debug/php-5.3.3/sapi/apache2handler/sapi_apache2.c:681
#11 0x7fe17c46ab00 in ap_run_handler (r=0x7fe17db8dd18) at 
/usr/src/debug/httpd-2.2.15/server/config.c:158
#12 0x7fe17c46e3be in ap_invoke_handler (r=0x7fe17db8dd18) at 
/usr/src/debug/httpd-2.2.15/server/config.c:376
#13 0x7fe17c479a30 in ap_process_request (r=0x7fe17db8dd18) at 
/usr/src/debug/httpd-2.2.15/modules/http/http_request.c:282
#14 0x7fe17c4768f8 in ap_process_http_connection (c=0x7fe17da29518) at 
/usr/src/debug/httpd-2.2.15/modules/http/http_core.c:190
#15 0x7fe17c472608 in ap_run_process_connection (c=0x7fe17da29518) at 
/usr/src/debug/httpd-2.2.15/server/connection.c:43
#16 0x7fe17c47e807 in child_main (child_num_arg=) at 
/usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:667
#17 0x7fe17c47eb1a in make_child (s=0x7fe17d1d4860, slot=1) at 
/usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:763
#18 0x7fe17c47f79c in perform_idle_server_maintenance (_pconf=, plog=, s=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:898
#19 ap_mpm_run (_pconf=, plog=, 
s=)
at /usr/src/debug/httpd-2.2.15/server/mpm/prefork/prefork.c:1102
#20 0x7fe17c456900 in main (argc=1, argv=0x7fff82467b78) at 
/usr/src/debug/httpd-2.2.15/server/main.c:760
(gdb) print sapi_globals
$1 = {server_context = 0x0, request_info = {request_method = 0x7fe17db8f638 
"GET", 
query_string = 0x7fe17d734d88 
"option=###&view=main&article-id=",
 post_data = 0x0, 
raw_post_data = 0x0, cookie_data = 0x0, content_length = 0, 
post_data_length = 0, raw_post_data_length = 0, 
path_translated = 0x7fe17d734df8 "/var/www/html/index.php", request_uri = 
0x7fe17d734de8 "/index.php", content_type = 0x0, 
headers_only = 0 '\000', no_headers = 0 

[PHP-BUG] Bug #64111 [NEW]: Segfault in gc_zval_possible_root

2013-01-31 Thread r...@php.net
From: remi
Operating system: GNU/Linux (Fedora 18)
PHP version:  5.4.11
Package:  *General Issues
Bug Type: Bug
Bug description:Segfault in gc_zval_possible_root

Description:

Running a lot test suite (using phpunit)

Truncated backtrace:
Thread no. 1 (10 frames)
 #0 gc_zval_possible_root at /usr/src/debug/php-5.4.11/Zend/zend_gc.c:143
 #1 zend_hash_destroy at /usr/src/debug/php-5.4.11/Zend/zend_hash.c:560
 #2 _zval_dtor_func at /usr/src/debug/php-5.4.11/Zend/zend_variables.c:45
 #3 _zval_dtor at /usr/src/debug/php-5.4.11/Zend/zend_variables.h:35
 #4 _zval_ptr_dtor at
/usr/src/debug/php-5.4.11/Zend/zend_execute_API.c:438
 #6 destroy_zend_class at /usr/src/debug/php-5.4.11/Zend/zend_opcode.c:278
 #7 zend_hash_apply_deleter at
/usr/src/debug/php-5.4.11/Zend/zend_hash.c:650
 #8 zend_hash_reverse_apply at
/usr/src/debug/php-5.4.11/Zend/zend_hash.c:804
 #9 shutdown_executor at
/usr/src/debug/php-5.4.11/Zend/zend_execute_API.c:305
 #10 zend_deactivate at /usr/src/debug/php-5.4.11/Zend/zend.c:938


At first look, I was thinking to a regression introduced by fix for #63635,
but reverting the fix doesn't resolve the issue.

Full traceback, php 5.4.10:
https://bugzilla.redhat.com/attachment.cgi?id=684984

Full traceback, php 5.4.11:
https://bugzilla.redhat.com/attachment.cgi?id=685073

Short traceback, php 5.4.11 with lot extension disable:
https://bugzilla.redhat.com/attachment.cgi?id=686607

Sorry to not being able to produce a simple reproducer, but I could easily
create a test build and ask the initial reporter to test it.





-- 
Edit bug report at https://bugs.php.net/bug.php?id=64111&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64111&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64111&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64111&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64111&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64111&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64111&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64111&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64111&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64111&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64111&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64111&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64111&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64111&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64111&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64111&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64111&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64111&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64111&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64111&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64111&r=mysqlcfg



[PHP-BUG] Bug #64123 [NEW]: Segfault in bug54268.phpt

2013-02-01 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.5.0alpha4
Package:  *General Issues
Bug Type: Bug
Bug description:Segfault in bug54268.phpt

Description:

$ build-apache/sapi/cli/php -n -d memory_limit=8M Zend/tests/bug54268.php
Erreur de segmentation

(gdb) run  -n -d memory_limit=8M Zend/tests/bug54268.php
Starting program: /usr/bin/php -n -d memory_limit=8M
Zend/tests/bug54268.php
Program received signal SIGSEGV, Segmentation fault.
zend_execute (op_array=0x77fbabb8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:377

(gdb) bt
#0  zend_execute (op_array=0x77fbabb8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:377
#1  0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3bc8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#2  0x00605d18 in execute_ex (execute_data=0x715e3bc8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#3  0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#4  0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3b00) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#5  0x00605d18 in execute_ex (execute_data=0x715e3b00) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#6  0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#7  0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3a38) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#8  0x00605d18 in execute_ex (execute_data=0x715e3a38) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#9  0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#10 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3970) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#11 0x00605d18 in execute_ex (execute_data=0x715e3970) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#12 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#13 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e38a8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#14 0x00605d18 in execute_ex (execute_data=0x715e38a8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#15 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#16 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e37e0) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#17 0x00605d18 in execute_ex (execute_data=0x715e37e0) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#18 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#19 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3718) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#20 0x00605d18 in execute_ex (execute_data=0x715e3718) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#21 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#22 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3650) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#23 0x00605d18 in execute_ex (execute_data=0x715e3650) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#24 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#25 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e3588) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#26 0x00605d18 in execute_ex (execute_data=0x715e3588) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#27 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#28 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e34c0) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#29 0x00605d18 in execute_ex (execute_data=0x715e34c0) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:356
#30 0x005891cd in dtrace_execute_ex (execute_data=)
at /usr/src/debug/php5.5-201302010630/Zend/zend_dtrace.c:75
#31 0x00645bb4 in zend_do_fcall_common_helper_SPEC
(execute_data=0x715e33f8) at
/usr/src/debug/php5.5-201302010630/Zend/zend_vm_execute.h:573
#32 0x00605d18 in execute_ex (execute_data=0x715e33f8) at
/u

[PHP-BUG] Bug #64128 [NEW]: buit-in web server is broken on ppc64

2013-02-01 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.11
Package:  Built-in web server
Bug Type: Bug
Bug description:buit-in web server is broken on ppc64

Description:

I think this bug also affects non x86 architecture

built-in server don't answer to any request.

Strace analysis show it enter an infinite loop of "select" but never accept
any incoming connection. 

Source analysis show that fdset management using bit operator is broken.

Switching to standard FD_ISSET method fix the problem.

I have a patch ready to commit.



Test script:
---
This issue cause various test to fail:
< Bug #61977 Test exit code for various errors
[sapi/cli/tests/bug43177.phpt]
< Bug #61679 (Error on non-standard HTTP methods)
[sapi/cli/tests/bug61679.phpt]
< Bug #61977 test CLI web-server support for Mime Type File extensions
mapping [sapi/cli/tests/bug61977.phpt]
< basic function [sapi/cli/tests/php_cli_server_001.phpt]
< $_SERVER variable [sapi/cli/tests/php_cli_server_002.phpt]
< Bug #55726 (Changing the working directory makes router script
inaccessible) [sapi/cli/tests/php_cli_server_003.phpt]
< Bug #55747 (request headers missed in $_SERVER)
[sapi/cli/tests/php_cli_server_004.phpt]
< Post a file [sapi/cli/tests/php_cli_server_005.phpt]
< Bug #55755 (SegFault when outputting header WWW-Authenticate)
[sapi/cli/tests/php_cli_server_006.phpt]
< Bug #55758 (Digest Authenticate missed in 5.4)
[sapi/cli/tests/php_cli_server_007.phpt]
< SERVER_PROTOCOL header availability
[sapi/cli/tests/php_cli_server_008.phpt]
< PATH_INFO (relevant to #60112) [sapi/cli/tests/php_cli_server_009.phpt]
< Bug #60180 ($_SERVER["PHP_SELF"] incorrect)
[sapi/cli/tests/php_cli_server_010.phpt]
< Bug #60180 ($_SERVER["PHP_SELF"] incorrect)
[sapi/cli/tests/php_cli_server_011.phpt]
< Bug #60159 (Router returns false, but POST is not passed to requested
resource) [sapi/cli/tests/php_cli_server_012.phpt]
< No router, no script [sapi/cli/tests/php_cli_server_013.phpt]
< Bug #60477: Segfault after two multipart/form-data POST requestes
[sapi/cli/tests/php_cli_server_014.phpt]
< Bug #60523 (PHP Errors are not reported in browsers using built-in SAPI)
[sapi/cli/tests/php_cli_server_015.phpt]
< Bug #60591 (Memory leak when access a non-exists file)
[sapi/cli/tests/php_cli_server_016.phpt]
< Implement Req #60850 (Built in web server does not set
$_SERVER['SCRIPT_FILENAME'] when using router)
[sapi/cli/tests/php_cli_server_017.phpt]
< Implement Req #61679 (Support HTTP PATCH method)
[sapi/cli/tests/php_cli_server_018.phpt]



-- 
Edit bug report at https://bugs.php.net/bug.php?id=64128&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64128&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64128&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64128&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64128&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64128&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64128&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64128&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64128&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64128&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64128&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64128&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64128&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64128&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64128&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64128&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64128&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64128&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64128&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64128&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64128&r=mysqlcfg



[PHP-BUG] Bug #64142 [NEW]: dval to lval different behavior on ppc64

2013-02-04 Thread r...@php.net
From: remi
Operating system: GNU/Linux
PHP version:  5.4.11
Package:  *General Issues
Bug Type: Bug
Bug description:dval to lval different behavior on ppc64

Description:

zend_dval_to_lval have different result on x86_64 and ppc64 (and probably
other arch)

This cause some test failure:
Test & operator : 64bit long tests
[tests/lang/operators/bitwiseAnd_basiclong_64bit.phpt]
Test ~N operator : 64bit long tests
[tests/lang/operators/bitwiseNot_basiclong_64bit.phpt]
Test | operator : 64bit long tests
[tests/lang/operators/bitwiseOr_basiclong_64bit.phpt]
Test ^ operator : 64bit long tests
[tests/lang/operators/bitwiseXor_basiclong_64bit.phpt]
Test % operator : 64bit long tests
[tests/lang/operators/modulus_basiclong_64bit.phpt]
Test decbin function : 64bit long tests
[ext/standard/tests/math/decbin_basiclong_64bit.phpt]
Test dechex function : 64bit long tests
[ext/standard/tests/math/dechex_basiclong_64bit.phpt]
Test decoct function : 64bit long tests
[ext/standard/tests/math/decoct_basiclong_64bit.phpt]
Test chunk_split() function : usage variations - unexpected values for
'chunklen' argument(Bug#42796)
[ext/standard/tests/strings/chunk_split_variation2.phpt]




Test script:
---
php -r 'printf("%ld\n", 0x7fff);'
php -r 'printf("%ld\n", 0x7fff+1);'


Expected result:

9223372036854775807
-9223372036854775808

Actual result:
--
9223372036854775807
9223372036854775807


-- 
Edit bug report at https://bugs.php.net/bug.php?id=64142&edit=1
-- 
Try a snapshot (PHP 5.4):   
https://bugs.php.net/fix.php?id=64142&r=trysnapshot54
Try a snapshot (PHP 5.3):   
https://bugs.php.net/fix.php?id=64142&r=trysnapshot53
Try a snapshot (trunk): 
https://bugs.php.net/fix.php?id=64142&r=trysnapshottrunk
Fixed in SVN:   https://bugs.php.net/fix.php?id=64142&r=fixed
Fixed in release:   https://bugs.php.net/fix.php?id=64142&r=alreadyfixed
Need backtrace: https://bugs.php.net/fix.php?id=64142&r=needtrace
Need Reproduce Script:  https://bugs.php.net/fix.php?id=64142&r=needscript
Try newer version:  https://bugs.php.net/fix.php?id=64142&r=oldversion
Not developer issue:https://bugs.php.net/fix.php?id=64142&r=support
Expected behavior:  https://bugs.php.net/fix.php?id=64142&r=notwrong
Not enough info:
https://bugs.php.net/fix.php?id=64142&r=notenoughinfo
Submitted twice:
https://bugs.php.net/fix.php?id=64142&r=submittedtwice
register_globals:   https://bugs.php.net/fix.php?id=64142&r=globals
PHP 4 support discontinued: https://bugs.php.net/fix.php?id=64142&r=php4
Daylight Savings:   https://bugs.php.net/fix.php?id=64142&r=dst
IIS Stability:  https://bugs.php.net/fix.php?id=64142&r=isapi
Install GNU Sed:https://bugs.php.net/fix.php?id=64142&r=gnused
Floating point limitations: https://bugs.php.net/fix.php?id=64142&r=float
No Zend Extensions: https://bugs.php.net/fix.php?id=64142&r=nozend
MySQL Configuration Error:  https://bugs.php.net/fix.php?id=64142&r=mysqlcfg



Bug #64142 [PATCH]: dval to lval different behavior on ppc64

2013-02-04 Thread r...@php.net
Edit report at https://bugs.php.net/bug.php?id=64142&edit=1

 ID: 64142
 Patch added by:     r...@php.net
 Reported by:    r...@php.net
 Summary:dval to lval different behavior on ppc64
 Status: Assigned
 Type:   Bug
 Package:*General Issues
 Operating System:   GNU/Linux
 PHP Version:5.4.11
 Assigned To:remi
 Block user comment: N
 Private report: N

 New Comment:

The following patch has been added/updated:

Patch Name: 0001-Fixed-bug-64142-dval-to-lval-different-behavior-on-p.patch
Revision:   1359988217
URL:
https://bugs.php.net/patch-display.php?bug=64142&patch=0001-Fixed-bug-64142-dval-to-lval-different-behavior-on-p.patch&revision=1359988217


Previous Comments:

[2013-02-04 14:15:11] r...@php.net

Description:

zend_dval_to_lval have different result on x86_64 and ppc64 (and probably other 
arch)

This cause some test failure:
Test & operator : 64bit long tests 
[tests/lang/operators/bitwiseAnd_basiclong_64bit.phpt]
Test ~N operator : 64bit long tests 
[tests/lang/operators/bitwiseNot_basiclong_64bit.phpt]
Test | operator : 64bit long tests 
[tests/lang/operators/bitwiseOr_basiclong_64bit.phpt]
Test ^ operator : 64bit long tests 
[tests/lang/operators/bitwiseXor_basiclong_64bit.phpt]
Test % operator : 64bit long tests 
[tests/lang/operators/modulus_basiclong_64bit.phpt]
Test decbin function : 64bit long tests 
[ext/standard/tests/math/decbin_basiclong_64bit.phpt]
Test dechex function : 64bit long tests 
[ext/standard/tests/math/dechex_basiclong_64bit.phpt]
Test decoct function : 64bit long tests 
[ext/standard/tests/math/decoct_basiclong_64bit.phpt]
Test chunk_split() function : usage variations - unexpected values for 
'chunklen' argument(Bug#42796) 
[ext/standard/tests/strings/chunk_split_variation2.phpt]




Test script:
---
php -r 'printf("%ld\n", 0x7fff);'
php -r 'printf("%ld\n", 0x7fff+1);'


Expected result:

9223372036854775807
-9223372036854775808

Actual result:
--
9223372036854775807
9223372036854775807







-- 
Edit this bug report at https://bugs.php.net/bug.php?id=64142&edit=1