Test: /sapi/phpdbg/tests/run_002.phpt - Version 7.2.6    

There are 10 different diffs reported by users for this test.

Count Diff
74 (63%)
013+ prompt> Do you really want to restart execution? (type y or n):
014+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
19 (16%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault (core dumped)
014+
015+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
12 (10%)
013+ prompt> Do you really want to restart execution? (type y or n):
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
6 (5%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault
014+
015+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (1%)
1 (1%)
001+
001- [Successful compilation of %s]
002- prompt> 10
003- prompt> [Breakpoint #0 added at %s:6]
004- prompt> array(1) {
005- [0]=>
006- string(%d) "%s"
007- }
008- string(10) "stdin
009- data"
010- [Breakpoint #0 at %s:6, hits: 1]
011- >00006: echo "ok\n";
012- 00007:
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (1%)
001+ Termsig=11
001- [Successful compilation of %s]
002- prompt> 10
003- prompt> [Breakpoint #0 added at %s:6]
004- prompt> array(1) {
005- [0]=>
006- string(%d) "%s"
007- }
008- string(10) "stdin
009- data"
010- [Breakpoint #0 at %s:6, hits: 1]
011- >00006: echo "ok\n";
012- 00007:
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (1%)
002+ prompt>
003+ Warning: file_put_contents(run_002_tmp.fixture): failed to open stream: Permission denied in eval()'d code on line 1
004+
002- prompt> 10
1 (1%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (1%)
028+ prompt>
028- prompt>
029+ =================================================================
030+ ==29557==ERROR: LeakSanitizer: detected memory leaks
031+
032+ Direct leak of 88 byte(s) in 1 object(s) allocated from:
033+ #0 0x7effac47cd38 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded38)
034+ #1 0x55ef49038d7a in phpdbg_stack_push /home/zsw/Documents/project/php/php-7.2.6/sapi/phpdbg/phpdbg_cmd.c:435
035+
036+ Direct leak of 16 byte(s) in 2 object(s) allocated from:
037+ #0 0x7effac415538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
038+ #1 0x55ef4902b6ab in phpdbg_set_prompt /home/zsw/Documents/project/php/php-7.2.6/sapi/phpdbg/phpdbg_utils.c:296
039+
040+ SUMMARY: AddressSanitizer: 104 byte(s) leaked in 3 allocation(s).