3v4l.org

run code in 300+ PHP versions simultaneously
<?php $_content = '<p>As big a threat as ISIS is, the competition that truly defines the Middle East is the one between Saudi Arabia and Iran. Where do we fit in?<br clear="all"></p>'; $_content = trim(preg_replace(array('#<p[^>]*>#i', '#</p>#i', '#<br[^>]*>#i','#</br>#i'), '', $_content)); echo $_content; if (!empty($_content)) { if(stripos($_content, '<img ') === false) { echo "\nNO IMG"; } else { echo "\nIMG"; } }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 14, Position 2 = 23
Branch analysis from position: 14
2 jumps found. (Code = 43) Position 1 = 20, Position 2 = 22
Branch analysis from position: 20
1 jumps found. (Code = 42) Position 1 = 23
Branch analysis from position: 23
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 22
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 23
filename:       /in/U1qlq
function name:  (null)
number of ops:  24
compiled vars:  !0 = $_content
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%3Cp%3EAs+big+a+threat+as+ISIS+is%2C+the+competition+that+truly+defines+the+Middle+East+is+the+one+between+Saudi+Arabia+and+Iran.+Where+do+we+fit+in%3F%3Cbr+clear%3D%22all%22%3E%3C%2Fp%3E'
    3     1        INIT_FCALL                                               'trim'
          2        INIT_FCALL                                               'preg_replace'
          3        SEND_VAL                                                 <array>
          4        SEND_VAL                                                 ''
          5        SEND_VAR                                                 !0
          6        DO_ICALL                                         $2      
          7        SEND_VAR                                                 $2
          8        DO_ICALL                                         $3      
          9        ASSIGN                                                   !0, $3
    4    10        ECHO                                                     !0
    5    11        ISSET_ISEMPTY_CV                                 ~5      !0
         12        BOOL_NOT                                         ~6      ~5
         13      > JMPZ                                                     ~6, ->23
    6    14    >   INIT_FCALL                                               'stripos'
         15        SEND_VAR                                                 !0
         16        SEND_VAL                                                 '%3Cimg+'
         17        DO_ICALL                                         $7      
         18        TYPE_CHECK                                    4          $7
         19      > JMPZ                                                     ~8, ->22
    7    20    >   ECHO                                                     '%0ANO+IMG'
         21      > JMP                                                      ->23
    9    22    >   ECHO                                                     '%0AIMG'
   11    23    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
151.65 ms | 1387 KiB | 19 Q