Test: /sapi/phpdbg/tests/run_002.phpt - Version 7.0.14    

There are 4 different diffs reported by users for this test.

Count Diff
2 (40%)
001+ was compiled: %s/run_002.php
003- prompt> [Breakpoint #0 added at %s:6]
004+ prompt> file path: %s/run_002.php, resolved path: %s/run_002.php, was compiled: 1
005+ [Breakpoint #0 added at %s/run_002.php:6]
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
015+ prompt> Do you really want to restart execution? (type y or n): was compiled: %s/run_002.php
016+ file path: %s/run_002.php, resolved path: %s/run_002.php, was compiled: 1
017+ array(3) {
032+ was compiled: %s/run_002.php
033+ file path: %s/run_002.php, resolved path: %s/run_002.php, was compiled: 1
1 (20%)
013+ prompt> Do you really want to restart execution? (type y or n):
014+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (20%)
001+ Direct leak of 88 byte(s) in 1 object(s) allocated from:
002+ #0 0x7fcb472d179a in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9879a)
003+ #1 0xaff86a in phpdbg_stack_push /home/php-7.0.14/sapi/phpdbg/phpdbg_cmd.c:435
004+
005+ Direct leak of 16 byte(s) in 2 object(s) allocated from:
006+ #0 0x7fcb472d1602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
007+ #1 0x7fcb467d2489 in __strdup (/lib/x86_64-linux-gnu/libc.so.6+0x8b489)
008+
009+ SUMMARY: AddressSanitizer: 104 byte(s) leaked in 3 allocation(s).
001- [Successful compilation of %s]
002- prompt> 10
003- prompt> [Breakpoint #0 added at %s:6]
004- prompt> array(1) {
005- [0]=>
006- string(%d) "%s"
007- }
008- string(10) "stdin
009- data"
010- [Breakpoint #0 at %s:6, hits: 1]
011- >00006: echo "ok\n";
012- 00007:
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (20%)
001+ Direct leak of 88 byte(s) in 1 object(s) allocated from:
002+ #0 0x7fba3464f79a in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9879a)
003+ #1 0xdec5ca in phpdbg_stack_push /home/php-7.0.14/sapi/phpdbg/phpdbg_cmd.c:435
004+
005+ Direct leak of 16 byte(s) in 2 object(s) allocated from:
006+ #0 0x7fba3464f602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
007+ #1 0x7fba33795489 in __strdup (/lib/x86_64-linux-gnu/libc.so.6+0x8b489)
008+
009+ SUMMARY: AddressSanitizer: 104 byte(s) leaked in 3 allocation(s).
001- [Successful compilation of %s]
002- prompt> 10
003- prompt> [Breakpoint #0 added at %s:6]
004- prompt> array(1) {
005- [0]=>
006- string(%d) "%s"
007- }
008- string(10) "stdin
009- data"
010- [Breakpoint #0 at %s:6, hits: 1]
011- >00006: echo "ok\n";
012- 00007:
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>