Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:96871 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 60284 invoked from network); 13 Nov 2016 02:10:12 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 13 Nov 2016 02:10:12 -0000 Authentication-Results: pb1.pair.com smtp.mail=dlundgren@syberisle.net; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=dlundgren@syberisle.net; sender-id=pass Received-SPF: pass (pb1.pair.com: domain syberisle.net designates 96.126.116.40 as permitted sender) X-PHP-List-Original-Sender: dlundgren@syberisle.net X-Host-Fingerprint: 96.126.116.40 mail.syberisle.net Received: from [96.126.116.40] ([96.126.116.40:46083] helo=li341-40.members.linode.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 9B/D3-31581-38BC7285 for ; Sat, 12 Nov 2016 21:10:11 -0500 Received: from localhost (admin.local [127.0.0.1]) by li341-40.members.linode.com (Postfix) with ESMTP id F01A825254 for ; Sat, 12 Nov 2016 21:10:08 -0500 (EST) X-Virus-Scanned: Debian amavisd-new at syberisle.net Received: from li341-40.members.linode.com ([127.0.0.1]) by localhost (syberisle.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 139OUgf1cEW2 for ; Sat, 12 Nov 2016 21:10:08 -0500 (EST) Received: from oo-laptop.local (cpe-65-29-233-211.wi.res.rr.com [65.29.233.211]) (Authenticated sender: dlundgren@syberisle.net) by li341-40.members.linode.com (Postfix) with ESMTPSA id 60AE825253 for ; Sat, 12 Nov 2016 21:10:08 -0500 (EST) To: internals@lists.php.net References: Message-ID: <01a5cc38-2679-095b-edc9-f2e92c6d5c78@syberisle.net> Date: Sat, 12 Nov 2016 20:10:07 -0600 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="NUQrwxoqFxdKlntaMHe8JL0td7JKubAMM" Subject: Re: [PHP-DEV] PHP 5.6.27 and 5.6.28 both fail tests with Fatal error in the same place From: dlundgren@syberisle.net (David Lundgren) --NUQrwxoqFxdKlntaMHe8JL0td7JKubAMM Content-Type: multipart/mixed; boundary="FBpb9fGd3vkWf7XlQDsDUTSxkn8ix4sU4"; protected-headers="v1" From: David Lundgren To: internals@lists.php.net Message-ID: <01a5cc38-2679-095b-edc9-f2e92c6d5c78@syberisle.net> Subject: Re: [PHP-DEV] PHP 5.6.27 and 5.6.28 both fail tests with Fatal error in the same place References: In-Reply-To: --FBpb9fGd3vkWf7XlQDsDUTSxkn8ix4sU4 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 11/12/16 7:48 PM, Dennis Clarke wrote: >=20 > FAIL Specific protocol method specification > [ext/openssl/tests/stream_crypto_flags_004.phpt] > PHP Fatal error: String size overflow in > /usr/local/build/php-5.6.28_SunOS5.10_sparcv9.001/run-tests.php on line= > 1120 > gmake: *** [test] Error 255 >=20 > So the question is, how do I run whatever specific test is creating thi= s > problem in a verbose manner to get more information? > https://qa.php.net/running-tests.php has instructions for using the test framework. Briefly: make test TESTS=3Dpath/to/test.phpt If you haven't already found it, you should be able to find =2E(diff|exp|log|out|php|sh) files for the tests that failed in ext/openssl/tests, so hopefully that helps to find which test failed. Depending on the OS, it may be one of these: ext/openssl/tests/stream_server_reneg_limit.phpt ext/openssl/tests/streams_crypto_method.phpt Good hunting, David --=20 David Lundgren dlundgren@syberisle.net GPG: 0x26F54D7F --FBpb9fGd3vkWf7XlQDsDUTSxkn8ix4sU4-- --NUQrwxoqFxdKlntaMHe8JL0td7JKubAMM Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYJ8t/AAoJEAH3/xgm9U1/jBYP/R4UxL6WPoA5Vcc2BqNw4F9F 6cwn0P0q2Dp7UpBH9l7BxKN/YKY4yqW3ABu06XlYfbBa39WN60QMRm8Q20jGx+xB sVkTZTqSUY7BF181zv6O2zH5u1PdOD74cXB2pbSiOzyVALe3NupoFj+jXztEj4Qn SiuEjbtmEz9rDP4Bi+mVcoZr3Q99yEZo8vcsqeWyJRhMusQPpu5P3x19BA/5Gtbh nhbHidZbb2DYNZuI73YXpuzfGunrDEWicA+Xy5PyhYNgD719htJlu+PRilNso5z5 S68uMuv0hcMx6AT8AYGInw6MQkbycqxhaIPqz/OvpdDarw0iUMwYVXSOkBV1ww2I 61JhWyRqBTjzeOhAXQVptDx+W8B6NpDCqYkFtj2eKA5T0tx3V6GWtjZHohFCwDLV PzHW6npb0hlwNY83LRqvJZ/jTZh4OXqydEBNztnpHd+BtBGH0Dckgc2QEZ5K9vY9 T/SRbQKGjbMx6lAtbFrfQlB9WgS5wz89AmarD48mw2h4nVvzEULaJZoDvjo1DBD+ E1qNIOuynwbC8DvNPzDwtVF+LQANzvsScTgyqyNJgXY3tQJVk6oVVNPqR2ds4sEd vKDcTsrlYCG/I5ArUekyc1sSP5VTUU8B6r7csz510gocKVQy82k39n4ekSBgtILM eWWSiRIrR+G6XBuXJiNs =3rOV -----END PGP SIGNATURE----- --NUQrwxoqFxdKlntaMHe8JL0td7JKubAMM--