3v4l.org

run code in 300+ PHP versions simultaneously
<?php $a = unserialize('C:15:"ReflectionClass":32:{a:1:{s:4:"name";s:8:"Cozzator";}}'); var_dump($a->hasMethod('asdf'));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/1EStm
function name:  (null)
number of ops:  11
compiled vars:  !0 = $a
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'unserialize'
          1        SEND_VAL                                                 'C%3A15%3A%22ReflectionClass%22%3A32%3A%7Ba%3A1%3A%7Bs%3A4%3A%22name%22%3Bs%3A8%3A%22Cozzator%22%3B%7D%7D'
          2        DO_ICALL                                         $1      
          3        ASSIGN                                                   !0, $1
    4     4        INIT_FCALL                                               'var_dump'
          5        INIT_METHOD_CALL                                         !0, 'hasMethod'
          6        SEND_VAL_EX                                              'asdf'
          7        DO_FCALL                                      0  $3      
          8        SEND_VAR                                                 $3
          9        DO_ICALL                                                 
         10      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.5 ms | 1394 KiB | 17 Q