Test: /sapi/phpdbg/tests/run_002.phpt - Version 7.1.0    

There are 12 different diffs reported by users for this test.

Count Diff
140 (61%)
013+ prompt> Do you really want to restart execution? (type y or n):
014+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
33 (14%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault
014+
015+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
28 (12%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault (core dumped)
014+
015+ Termsig=11
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
14 (6%)
013+ prompt> Do you really want to restart execution? (type y or n):
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
3 (1%)
3 (1%)
002+ prompt>
003+ Warning: file_put_contents(run_002_tmp.fixture): failed to open stream: Permission denied in eval()'d code on line 1
004+
002- prompt> 10
2 (1%)
001+
001- [Successful compilation of %s]
002- prompt> 10
003- prompt> [Breakpoint #0 added at %s:6]
004- prompt> array(1) {
005- [0]=>
006- string(%d) "%s"
007- }
008- string(10) "stdin
009- data"
010- [Breakpoint #0 at %s:6, hits: 1]
011- >00006: echo "ok\n";
012- 00007:
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
2 (1%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (0%)
013+ prompt> Do you really want to restart execution? (type y or n): Bus error
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (0%)
013+ prompt> Do you really want to restart execution? (type y or n): Bus error
014+
015+ Termsig=7
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (0%)
013+ prompt> Do you really want to restart execution? (type y or n): Segmentation fault (core dumped)
013- prompt> Do you really want to restart execution? (type y or n): array(3) {
014- [0]=>
015- string(%d) "%s"
016- [1]=>
017- string(4) "arg1"
018- [2]=>
019- string(10) "_ ' arg2 ""
020- }
021- string(10) "stdin
022- data"
023- [Breakpoint #0 at %s:6, hits: 1]
024- >00006: echo "ok\n";
025- 00007:
026- prompt> ok
027- [Script ended normally]
028- prompt>
1 (0%)
028+ prompt>
028- prompt>
029+ =================================================================
030+ ==17822==ERROR: LeakSanitizer: detected memory leaks
031+
032+ Direct leak of 88 byte(s) in 1 object(s) allocated from:
033+ #0 0x4e6360 in calloc /home/fuzzer/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:72:3
034+ #1 0x1d028eb in phpdbg_stack_push (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1d028eb)
035+ #2 0x1c848fd in phpdbg_parse (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1c848fd)
036+ #3 0x1c88309 in phpdbg_do_parse (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1c88309)
037+ #4 0x1cac543 in phpdbg_interactive (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1cac543)
038+ #5 0x1c7c28a in main (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1c7c28a)
039+ #6 0x7f5a329c982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
040+
041+ Direct leak of 16 byte(s) in 2 object(s) allocated from:
042+ #0 0x4d288a in strdup /home/fuzzer/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:562:3
043+ #1 0x1ce776a in phpdbg_set_prompt (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1ce776a)
044+ #2 0x1c797af in main (/home/fuzzer/PHP/php-7.1.0/sapi/phpdbg/phpdbg+0x1c797af)
045+ #3 0x7f5a329c982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
046+
047+ SUMMARY: AddressSanitizer: 104 byte(s) leaked in 3 allocation(s).