==18275== Memcheck, a memory error detector ==18275== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==18275== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==18275== Command: php codecept run tests/unit/Codeception/StepTest.php -o coverage:\ path_coverage:\ true --coverage ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A969E7: ??? ==18275== by 0x7A969E7: ??? ==18275== by 0x7A969E8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A969E7: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96627: ??? ==18275== by 0x7A96627: ??? ==18275== by 0x7A96628: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96627: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A963E7: ??? ==18275== by 0x7A963E7: ??? ==18275== by 0x7A963E8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A963E7: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96327: ??? ==18275== by 0x7A96327: ??? ==18275== by 0x7A96328: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96327: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A95DE7: ??? ==18275== by 0x7A95DE7: ??? ==18275== by 0x7A95DE8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A95DE7: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96867: ??? ==18275== by 0x7A96867: ??? ==18275== by 0x7A96868: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96867: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A964A7: ??? ==18275== by 0x7A964A7: ??? ==18275== by 0x7A964A8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A964A7: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96447: ??? ==18275== by 0x7A96447: ??? ==18275== by 0x7A96448: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96447: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96567: ??? ==18275== by 0x7A96567: ??? ==18275== by 0x7A96568: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96567: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96BC7: ??? ==18275== by 0x7A96BC7: ??? ==18275== by 0x7A96BC8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96BC7: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A96507: ??? ==18275== by 0x7A96507: ??? ==18275== by 0x7A96508: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A96507: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BEF8BF: ??? ==18275== by 0x7A968C7: ??? ==18275== by 0x7A968C7: ??? ==18275== by 0x7A968C8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A968C7: ??? ==18275== Codeception PHP Testing Framework v5.0.0 https://helpukrainewin.org [Seed] 856495978 Unit Tests (11) --------------------------------------------------------------------------------------------------------------------- - StepTest: Long arguments==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x51A2DFE: xdebug_branch_info_mark_reached (branch_info.c:387) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== ==18275== Use of uninitialised value of size 8 ==18275== at 0x51A2E0E: xdebug_branch_info_mark_reached (branch_info.c:390) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x389F07: ap_php_conv_10 (in /usr/bin/php8.1) ==18275== by 0x38AA39: ??? (in /usr/bin/php8.1) ==18275== by 0x38B9FD: ap_php_vsnprintf (in /usr/bin/php8.1) ==18275== by 0x51988E1: xdebug_sprintf (str.c:222) ==18275== by 0x51A2E51: xdebug_branch_info_mark_reached (branch_info.c:397) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x389F42: ap_php_conv_10 (in /usr/bin/php8.1) ==18275== by 0x38AA39: ??? (in /usr/bin/php8.1) ==18275== by 0x38B9FD: ap_php_vsnprintf (in /usr/bin/php8.1) ==18275== by 0x51988E1: xdebug_sprintf (str.c:222) ==18275== by 0x51A2E51: xdebug_branch_info_mark_reached (branch_info.c:397) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x484ED28: strlen (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==18275== by 0x51A2E5C: xdebug_branch_info_mark_reached (branch_info.c:399) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== ==18275== Use of uninitialised value of size 8 ==18275== at 0x518F2E1: xdebug_hash_extended_find (hash.c:215) ==18275== by 0x51A2E74: xdebug_branch_info_mark_reached (branch_info.c:399) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x484ED28: strlen (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==18275== by 0x51A2F86: xdebug_branch_info_mark_reached (branch_info.c:401) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== ==18275== Use of uninitialised value of size 8 ==18275== at 0x518FF89: xdebug_hash_add_or_update (hash.c:160) ==18275== by 0x51A2F9C: xdebug_branch_info_mark_reached (branch_info.c:401) ==18275== by 0x51B9E15: xdebug_print_opcode_info.constprop.0.isra.0 (code_coverage.c:173) ==18275== by 0x51A3087: xdebug_common_override_handler.lto_priv.0 (code_coverage.c:241) ==18275== by 0x453AFC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x51A33D9: xdebug_coverage_count_line_if_active (code_coverage.c:961) ==18275== by 0x5193AA4: xdebug_add_stack_frame (base.c:653) ==18275== by 0x5194103: xdebug_execute_internal (base.c:866) ==18275== by 0x214F57: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214EE6: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214EE6: ??? (in /usr/bin/php8.1) ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BE3D09: ??? ==18275== by 0x7A943A7: ??? ==18275== by 0x7A943A7: ??? ==18275== by 0x7A943A8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A943A7: ??? ==18275== ✔ StepTest: Long arguments (1.84s) ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BF4895: ??? ==18275== by 0x7A94BE7: ??? ==18275== by 0x7A94BE7: ??? ==18275== by 0x7A94BE8: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A94BE7: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BF4895: ??? ==18275== by 0x7A95067: ??? ==18275== by 0x7A95067: ??? ==18275== by 0x7A95068: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A95067: ??? ==18275== ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BF4895: ??? ==18275== by 0x7A94E27: ??? ==18275== by 0x7A94E27: ??? ==18275== by 0x7A94E28: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A94E27: ??? ==18275== - StepTest: Array as argument ✔ StepTest: Array as argument (0.55s) - StepTest: Formatted output==18275== Invalid read of size 8 ==18275== at 0x51A33D0: xdebug_coverage_count_line_if_active (code_coverage.c:961) ==18275== by 0x5193AA4: xdebug_add_stack_frame (base.c:653) ==18275== by 0x5194103: xdebug_execute_internal (base.c:866) ==18275== by 0x214CAC: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214EE6: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214EE6: ??? (in /usr/bin/php8.1) ==18275== Address 0x7d36690 is 16 bytes inside a block of size 32 free'd ==18275== at 0x484B27F: free (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==18275== by 0x5190287: UnknownInlinedFun (llist.c:122) ==18275== by 0x5190287: xdebug_llist_remove (llist.c:101) ==18275== by 0x519050B: xdebug_llist_empty (llist.c:169) ==18275== by 0x51906CC: xdebug_llist_destroy (llist.c:175) ==18275== by 0x5190873: xdebug_hash_destroy (hash.c:283) ==18275== by 0x51A1C29: xdebug_coverage_file_dtor.lto_priv.0 (code_coverage.c:61) ==18275== by 0x518D415: hash_element_dtor (hash.c:74) ==18275== by 0x5190287: UnknownInlinedFun (llist.c:122) ==18275== by 0x5190287: xdebug_llist_remove (llist.c:101) ==18275== by 0x519050B: xdebug_llist_empty (llist.c:169) ==18275== by 0x51906CC: xdebug_llist_destroy (llist.c:175) ==18275== by 0x5190873: xdebug_hash_destroy (hash.c:283) ==18275== by 0x51A1EF9: zif_xdebug_stop_code_coverage (code_coverage.c:735) ==18275== Block was alloc'd at ==18275== at 0x4848899: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==18275== by 0x519018A: xdebug_hash_add_or_update (hash.c:173) ==18275== by 0x51A2317: xdebug_branch_info_add_branches_and_paths (branch_info.c:472) ==18275== by 0x51A287C: prefill_from_oparray (code_coverage.c:580) ==18275== by 0x51A2BBA: UnknownInlinedFun (code_coverage.c:598) ==18275== by 0x51A2BBA: UnknownInlinedFun (code_coverage.c:594) ==18275== by 0x51A2BBA: UnknownInlinedFun (code_coverage.c:620) ==18275== by 0x51A2BBA: xdebug_prefill_code_coverage.lto_priv.0 (code_coverage.c:648) ==18275== by 0x51A2C1C: xdebug_code_coverage_start_of_function (code_coverage.c:657) ==18275== by 0x51A456A: xdebug_coverage_execute_ex.part.0 (code_coverage.c:998) ==18275== by 0x519481C: xdebug_execute_ex (base.c:762) ==18275== by 0x214C35: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== ✔ StepTest: Formatted output (1.86s) - StepTest: Get html ✔ StepTest: Get html (0.65s) - StepTest: Am on url ✔ StepTest: Am on url (0.60s) - StepTest: Multi byte text length is measured correctly ✔ StepTest: Multi byte text length is measured correctly (0.58s) - StepTest: No args ✔ StepTest: No args (0.58s) - StepTest: Get arguments==18275== Invalid read of size 8 ==18275== at 0x51A33D0: xdebug_coverage_count_line_if_active (code_coverage.c:961) ==18275== by 0x5193AA4: xdebug_add_stack_frame (base.c:653) ==18275== by 0x5194103: xdebug_execute_internal (base.c:866) ==18275== by 0x214F57: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214EE6: ??? (in /usr/bin/php8.1) ==18275== by 0x45E903: zend_vm_call_opcode_handler (in /usr/bin/php8.1) ==18275== by 0x9657CE7: php_pcov_execute_ex (in /usr/lib/php/20210902/pcov.so) ==18275== by 0x51946DA: xdebug_execute_ex (base.c:779) ==18275== by 0x214EE6: ??? (in /usr/bin/php8.1) ==18275== Address 0x7d3c660 is 16 bytes inside a block of size 256 free'd ==18275== at 0x484B27F: free (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==18275== by 0x519AC15: xdebug_path_free (branch_info.c:230) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== Block was alloc'd at ==18275== at 0x484DCD3: realloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==18275== by 0x519ABE0: UnknownInlinedFun (branch_info.c:164) ==18275== by 0x519ABE0: xdebug_path_new (branch_info.c:221) ==18275== by 0x519AC44: xdebug_branch_find_path (branch_info.c:263) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== by 0x519AD0A: xdebug_branch_find_path (branch_info.c:271) ==18275== ✔ StepTest: Get arguments (1.82s) - StepTest: Single quoted string as argument ✔ StepTest: Single quoted string as argument (0.62s) - StepTest: See uppercase text ✔ StepTest: See uppercase text (0.59s) - StepTest: See multi line string in single line ✔ StepTest: See multi line string in single line (0.59s) ------------------------------------------------------------------------------------------------------------------------------------- Code Coverage Report:   2022-08-07 14:28:05     Summary:   Classes: 0.00% (0/25)   Methods: 0.00% (0/104)  Paths: 0.00% (0/5820)  Branches: 0.00% (0/519)  Lines: 0.00% (0/938) Remote CodeCoverage reports are not printed to console ==18275== Conditional jump or move depends on uninitialised value(s) ==18275== at 0x9BE3D09: ??? ==18275== by 0x7A94287: ??? ==18275== by 0x7A94287: ??? ==18275== by 0x7A94288: ??? ==18275== by 0x7D0B8BF: ??? ==18275== by 0x7A94287: ??? ==18275== Time: 01:00.293, Memory: 388.49 MB OK (11 tests, 23 assertions) ==18275== ==18275== HEAP SUMMARY: ==18275== in use at exit: 6,613,588 bytes in 78,928 blocks ==18275== total heap usage: 6,356,254 allocs, 6,277,326 frees, 928,736,518 bytes allocated ==18275== ==18275== LEAK SUMMARY: ==18275== definitely lost: 34,424 bytes in 561 blocks ==18275== indirectly lost: 6,490,060 bytes in 76,901 blocks ==18275== possibly lost: 0 bytes in 0 blocks ==18275== still reachable: 89,104 bytes in 1,466 blocks ==18275== suppressed: 0 bytes in 0 blocks ==18275== Rerun with --leak-check=full to see details of leaked memory ==18275== ==18275== Use --track-origins=yes to see where uninitialised values come from ==18275== For lists of detected and suppressed errors, rerun with: -s ==18275== ERROR SUMMARY: 94 errors from 28 contexts (suppressed: 0 from 0)