Test: /sapi/phpdbg/tests/stdin_001.phpt - Version 7.2.11    

There are 10 different diffs reported by users for this test.

Count Diff
104 (67%)
008+
009+ Termsig=11
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
17 (11%)
008+ Segmentation fault (core dumped)
009+
010+ Termsig=11
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
14 (9%)
008+ Segmentation fault
009+
010+ Termsig=11
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
13 (8%)
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
3 (2%)
001+ Termsig=11
001- prompt> [Successful compilation of stdin input]
002- prompt> [Breakpoint #0 added at Standard input code:3]
003- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
004- >00003: echo "Hello, world!\n";
005- 00004:
006- prompt> Hello, world!
007- [Script ended normally]
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
1 (1%)
011+ prompt>
011- prompt>
012+ =================================================================
013+ ==30354==ERROR: LeakSanitizer: detected memory leaks
014+
015+ Direct leak of 88 byte(s) in 1 object(s) allocated from:
016+ #0 0x509d78 (/root/Desktop/fuzz/test/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x509d78)
017+ #1 0x20b27ee (/root/Desktop/fuzz/test/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x20b27ee)
018+ #2 0x204b2e4 (/root/Desktop/fuzz/test/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x204b2e4)
019+ #3 0x203fc26 (/root/Desktop/fuzz/test/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x203fc26)
020+ #4 0x7f8735c6509a (/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
021+
022+ Direct leak of 8 byte(s) in 1 object(s) allocated from:
023+ #0 0x460240 (/root/Desktop/fuzz/test/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x460240)
024+ #1 0x209d6fa (/root/Desktop/fuzz/test/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x209d6fa)
025+ #2 0x7f8735c6509a (/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
026+
027+ SUMMARY: AddressSanitizer: 96 byte(s) leaked in 2 allocation(s).
1 (1%)
011+ prompt>
011- prompt>
012+ =================================================================
013+ ==269156==ERROR: LeakSanitizer: detected memory leaks
014+
015+ Direct leak of 88 byte(s) in 1 object(s) allocated from:
016+ #0 0x4fa6c8 (/home/tunguyen/Downloads/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x4fa6c8)
017+ #1 0x1f3c00d (/home/tunguyen/Downloads/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x1f3c00d)
018+ #2 0x1ed7470 (/home/tunguyen/Downloads/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x1ed7470)
019+ #3 0x1ecd73b (/home/tunguyen/Downloads/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x1ecd73b)
020+ #4 0x7fa00f1c40b2 (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
021+
022+ Direct leak of 8 byte(s) in 1 object(s) allocated from:
023+ #0 0x499a10 (/home/tunguyen/Downloads/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x499a10)
024+ #1 0x1f27bc5 (/home/tunguyen/Downloads/php-src-php-7.2.11/sapi/phpdbg/phpdbg+0x1f27bc5)
025+ #2 0x7fa00f1c40b2 (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
026+
027+ SUMMARY: AddressSanitizer: 96 byte(s) leaked in 2 allocation(s).
1 (1%)
008+ Segmentation fault (core dumped)
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
1 (1%)
008+
009+ Termsig=0
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>
1 (1%)
001+ Segmentation fault (core dumped)
002+
003+ Termsig=11
001- prompt> [Successful compilation of stdin input]
002- prompt> [Breakpoint #0 added at Standard input code:3]
003- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
004- >00003: echo "Hello, world!\n";
005- 00004:
006- prompt> Hello, world!
007- [Script ended normally]
008- prompt> [Breakpoint #0 at Standard input code:3, hits: 1]
009- >00003: echo "Hello, world!\n";
010- 00004:
011- prompt>