PHP Bug #79646 Segmentation fault in garbage collector
==182== Memcheck, a memory error detector | |
==182== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. | |
==182== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info | |
==182== Command: php vendor/bin/phpunit | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x267: ??? | |
==182== by 0x266: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x48E6205: ??? | |
==182== by 0x1CE: ??? | |
==182== by 0x97: ??? | |
==182== by 0x404ED16: strlcat (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x48E6205: ??? | |
==182== by 0x13103DF: ??? | |
==182== by 0x266: ??? | |
==182== by 0x131783F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x64616F6C6F747560: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x7265736F706D6F62: ??? | |
==182== by 0x616F6C6F7475612E: ??? | |
==182== by 0x702E6C6165725F63: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x7265736F706D6F62: ??? | |
==182== by 0x6F4C7373616C432E: ??? | |
==182== by 0x7068702E72656460: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F6E61747370686F: ??? | |
==182== by 0x2F6E61747370686F: ??? | |
==182== by 0x61727473746F6F61: ??? | |
==182== by 0x4F6EA44E00000005: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F7362616C63796C: ??? | |
==182== by 0x706F632D70656563: ??? | |
==182== by 0x65442F6372732F78: ??? | |
==182== by 0x642F79706F437064: ??? | |
==182== by 0x79706F635F706564: ??? | |
==182== by 0x4F6EA44ED4641442: ??? | |
==182== by 0x1FFEFFB84F: ??? | |
==182== by 0x13181BF: ??? | |
==182== by 0x7C63FAF: ??? | |
==182== by 0x7C60CAF: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F74696E7570686F: ??? | |
==182== by 0x2F74696E7570686F: ??? | |
==182== by 0x6D6172462F637272: ??? | |
==182== by 0x73412F6B726F7764: ??? | |
==182== by 0x6E75462F74726572: ??? | |
==182== by 0x702E736E6F697462: ??? | |
==182== by 0x1FFEFFB84F: ??? | |
==182== by 0x13181BF: ??? | |
==182== by 0x7C63FAF: ??? | |
==182== by 0x7C60CAF: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F796E6F666D7972: ??? | |
==182== by 0x6C6C6966796C6F6F: ??? | |
==182== by 0x622F30387068702C: ??? | |
==182== by 0x7061727473746F6E: ??? | |
==182== by 0x6E75462F74726572: ??? | |
==182== by 0x702E736E6F697462: ??? | |
==182== by 0x1FFE007067: ??? | |
==182== by 0x13181BF: ??? | |
==182== by 0x7C63FAF: ??? | |
==182== by 0x7C60CAF: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F796E6F666D7972: ??? | |
==182== by 0x7461636572706563: ??? | |
==182== by 0x746E6F632D6E6F68: ??? | |
==182== by 0x75662F7374636171: ??? | |
==182== by 0x702E6E6F6974636D: ??? | |
==182== by 0x702E736E6F697462: ??? | |
==182== by 0x1FFE007067: ??? | |
==182== by 0x13181BF: ??? | |
==182== by 0x7C63FAF: ??? | |
==182== by 0x7C60CAF: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x6D612F7068706D60: ??? | |
==182== by 0x75662F62696C2F6F: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0xAB07FA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x6D612F7068706D60: ??? | |
==182== by 0x6E492F62696C2F6F: ??? | |
==182== by 0x662F6C616E726573: ??? | |
==182== by 0x736E6F6974636E74: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x79622F7068706D60: ??? | |
==182== by 0x61657274732D6573: ??? | |
==182== by 0x75662F62696C2F6C: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0x642F736E6F697462: ??? | |
==182== by 0x7068702E706D74: ??? | |
==182== by 0x1FFEFFB70F: ??? | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4044: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4868: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F796E6F666D7972: ??? | |
==182== by 0x522F676E69727472: ??? | |
==182== by 0x73656372756F7364: ??? | |
==182== by 0x6F6974636E75662E: ??? | |
==182== by 0x727473746F6F622E: ??? | |
==182== by 0x7068702E7060: ??? | |
==182== by 0x1FFEFFB70F: ??? | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4044: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4868: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x72742F7963617273: ??? | |
==182== by 0x2F6372732F796360: ??? | |
==182== by 0x68732F7963617253: ??? | |
==182== by 0x2E7374756374726E: ??? | |
==182== by 0x72007068702E736D: ??? | |
==182== by 0x7068702E7060: ??? | |
==182== by 0x1FFEFFB70F: ??? | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4044: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4868: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x79732F7068706D60: ??? | |
==182== by 0x662F6372732F636D: ??? | |
==182== by 0x736E6F6974636E74: ??? | |
==182== by 0x2E7374756374726E: ??? | |
==182== by 0x720070680070686F: ??? | |
==182== by 0x7068702E7060: ??? | |
==182== by 0x1FFEFFB70F: ??? | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4044: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4868: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F73616E696D616B: ??? | |
==182== by 0x2D73616E696D616B: ??? | |
==182== by 0x6D617266646E6579: ??? | |
==182== by 0x72622D6B726F7764: ??? | |
==182== by 0x6372732F65676468: ??? | |
==182== by 0x616F6C6F7475612E: ??? | |
==182== by 0x1F00000003: ??? | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== by 0x5D86EC: ??? (in /usr/local/bin/php) | |
==182== by 0x5E059D: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x64616F6C6F747560: ??? | |
==182== by 0x608497: zend_hash_update (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x65732F7068706D60: ??? | |
==182== by 0x74617A696C616971: ??? | |
==182== by 0x2F6372732F6E6F68: ??? | |
==182== by 0x6E6F6974636E7565: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x61702F7068706D60: ??? | |
==182== by 0x6C2F6C656C6C6171: ??? | |
==182== by 0x65746E6F432F6268: ??? | |
==182== by 0x74636E75662F7477: ??? | |
==182== by 0x7068702E736E6F68: ??? | |
==182== by 0xACB9BDF: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x69662F7068706D60: ??? | |
==182== by 0x662F6372732F656B: ??? | |
==182== by 0x736E6F6974636E74: ??? | |
==182== by 0x6974636E75662F71: ??? | |
==182== by 0x7068702E736E6E: ??? | |
==182== by 0xACB9AFF: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x646E617265766163: ??? | |
==182== by 0x6E6462696C2F6D6E: ??? | |
==182== by 0x75662F6372732F72: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0x7068702E706171: ??? | |
==182== by 0xACB9AFF: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x6E642F7068706D60: ??? | |
==182== by 0x75662F62696C2F72: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0x7068700070686F: ??? | |
==182== by 0xACB9AFF: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x752F65756761656B: ??? | |
==182== by 0x65737261702D6971: ??? | |
==182== by 0x75662F6372732F71: ??? | |
==182== by 0x5F736E6F6974636D: ??? | |
==182== by 0x2E6564756C636E68: ??? | |
==182== by 0xACB9AFF: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x74682F7068706D60: ??? | |
==182== by 0x662F6372732F7073: ??? | |
==182== by 0x736E6F6974636E74: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0x2E6564750070686F: ??? | |
==182== by 0x70686F: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x6F732F7068706D60: ??? | |
==182== by 0x6372732F74656B62: ??? | |
==182== by 0x6F6974636E75662E: ??? | |
==182== by 0x2E736E007068702D: ??? | |
==182== by 0x2E6564750070686F: ??? | |
==182== by 0x70686F: ??? | |
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php) | |
==182== by 0x5DF332: ??? (in /usr/local/bin/php) | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x746E6575716F6C64: ??? | |
==182== by 0x732F796E6F68702E: ??? | |
==182== by 0x6974696E692F6371: ??? | |
==182== by 0x68702E657A696C60: ??? | |
==182== by 0x1FFEFFB6FF: ??? | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4044: ??? (in /usr/local/bin/php) | |
==182== by 0x5E9B29: ??? (in /usr/local/bin/php) | |
==182== by 0x5E047D: ??? (in /usr/local/bin/php) | |
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x6F6C2F7068706D60: ??? | |
==182== by 0x75662F6372732F66: ??? | |
==182== by 0x2E736E6F6974636D: ??? | |
==182== by 0x7068702E736E6F68: ??? | |
==182== by 0x10FF: ??? | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x65722F7068706D60: ??? | |
==182== by 0x706164612D746360: ??? | |
==182== by 0x2F6374652F726573: ??? | |
==182== by 0x2E79726F74636145: ??? | |
==182== by 0x10FF: ??? | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x74682F7068706D60: ??? | |
==182== by 0x6E65696C632D7073: ??? | |
==182== by 0x6E492F6372732F73: ??? | |
==182== by 0x662F6C616E726573: ??? | |
==182== by 0x736E6F6974636E74: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x752F7965736D6171: ??? | |
==182== by 0x2F6372732F646974: ??? | |
==182== by 0x6E6F6974636E7565: ??? | |
==182== by 0x662F6C616E726573: ??? | |
==182== by 0x736E6F6974636E74: ??? | |
==182== by 0x7068702D: ??? | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x74682F7068706D60: ??? | |
==182== by 0x65767265732D7073: ??? | |
==182== by 0x694D2F6372732F71: ??? | |
==182== by 0x65726177656C6463: ??? | |
==182== by 0x6F6974636E75662E: ??? | |
==182== by 0x7068702D: ??? | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x746E6575716F6C64: ??? | |
==182== by 0x702D796E6F68702E: ??? | |
==182== by 0x732F74696E757067: ??? | |
==182== by 0x6974696E692F6371: ??? | |
==182== by 0x68702E657A696C60: ??? | |
==182== by 0x7068702E736D: ??? | |
==182== by 0x3F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x61662F63696B696D: ??? | |
==182== by 0x6574756F722D7472: ??? | |
==182== by 0x6E75662F6372732E: ??? | |
==182== by 0x702E736E6F697462: ??? | |
==182== by 0x7068702E736E6F68: ??? | |
==182== by 0x580043FF: vgMemCheck_new_block (mc_malloc_wrappers.c:387) | |
==182== by 0x48A1849: realloc (vg_replace_malloc.c:836) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x6F702F7068706D60: ??? | |
==182== by 0x732F736572677472: ??? | |
==182== by 0x74636E75662F6371: ??? | |
==182== by 0x7068702E736E6F68: ??? | |
==182== by 0x7068702E73007067: ??? | |
==182== by 0x580043FF: vgMemCheck_new_block (mc_malloc_wrappers.c:387) | |
==182== by 0x48A1849: realloc (vg_replace_malloc.c:836) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F6769666E6F632E: ??? | |
==182== by 0x61727473746F6F61: ??? | |
==182== by 0x2: ??? | |
==182== by 0x1FFEFFBAFF: ??? | |
==182== by 0x5B91B9: _php_stream_fopen (in /usr/local/bin/php) | |
==182== by 0x1FFEFFCBFF: ??? | |
==182== by 0x9E33F97: ??? | |
==182== by 0x9E33F97: ??? | |
==182== by 0x3: ??? | |
==182== by 0x7BA317F: ??? | |
==182== by 0xBB6B90F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x64616F6C6F747560: ??? | |
==182== by 0x1FFEFFB6F7: ??? | |
==182== by 0x4094D83: ??? | |
==182== by 0x404E07A: ??? (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0xBB5CB5F: ??? | |
==182== by 0x7FFFFFFFFFFFFFFF: ??? | |
==182== by 0xBA96BAF: ??? | |
==182== by 0xBB524EF: ??? | |
==182== by 0xBB607AB: ??? | |
==182== by 0xFFFFFFFFFFFFFFFE: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F796E6F666D7972: ??? | |
==182== by 0x442F766E65746F63: ??? | |
==182== by 0x68702E766E65746E: ??? | |
==182== by 0x6C6C6F430070686F: ??? | |
==182== by 0x702E6E6F69746364: ??? | |
==182== by 0x706870007067: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F796E6F666D7972: ??? | |
==182== by 0x61682D726F727264: ??? | |
==182== by 0x65442F72656C646D: ??? | |
==182== by 0x7373616C43677561: ??? | |
==182== by 0x702E726564616F4B: ??? | |
==182== by 0x5E4564: ??? (in /usr/local/bin/php) | |
==182== by 0x5E3AE6: ??? (in /usr/local/bin/php) | |
==182== by 0xBBD3E7F: ??? | |
==182== by 0x1102: ??? | |
==182== by 0x58004737: vgMemCheck___builtin_vec_delete (mc_malloc_wrappers.c:530) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F676F6C2F72736F: ??? | |
==182== by 0x2F676F4C2F72734F: ??? | |
==182== by 0x6C6576654C676F4B: ??? | |
==182== by 0x4F6EA44ED4641442: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F78796E6F626576: ??? | |
==182== by 0x2D6C716870617266: ??? | |
==182== by 0x2F6372732F70686F: ??? | |
==182== by 0x2E4C516870617246: ??? | |
==182== by 0xA1E333F: ??? | |
==182== by 0x89: ??? | |
==182== by 0xA6CAFE7: ??? | |
==182== by 0x78: ??? | |
==182== by 0x1FFEFFB8BF: ??? | |
==182== by 0xA1E333F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F74696E7570686F: ??? | |
==182== by 0x656C69662D70686F: ??? | |
==182== by 0x6F7461726574692C: ??? | |
==182== by 0x61462F6372732F71: ??? | |
==182== by 0x7068702E65646162: ??? | |
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400) | |
==182== by 0x27: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA36A9C7: ??? | |
==182== by 0xA36A9C7: ??? | |
==182== by 0xA36A9F2: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA36A9C7: ??? | |
==182== Address 0xa36a9ef is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E352A: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA36A9C7: ??? | |
==182== by 0xA36A9C7: ??? | |
==182== by 0xA36A9F2: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA36A9C7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA36E0D7: ??? | |
==182== by 0xA36E0D7: ??? | |
==182== by 0xA36E102: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA36E0D7: ??? | |
==182== Address 0xa36e0ff is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E352A: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA36E0D7: ??? | |
==182== by 0xA36E0D7: ??? | |
==182== by 0xA36E102: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA36E0D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA3715A7: ??? | |
==182== by 0xA3715A7: ??? | |
==182== by 0xA3715D7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA3715A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA374117: ??? | |
==182== by 0xA374117: ??? | |
==182== by 0xA37414C: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA374117: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA37B067: ??? | |
==182== by 0xA37B067: ??? | |
==182== by 0xA37B091: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37B067: ??? | |
==182== Address 0xa37b08f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA37B067: ??? | |
==182== by 0xA37B067: ??? | |
==182== by 0xA37B091: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37B067: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA374547: ??? | |
==182== by 0xA374547: ??? | |
==182== by 0xA374567: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA374547: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA37B7E7: ??? | |
==182== by 0xA37B7E7: ??? | |
==182== by 0xA37B806: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37B7E7: ??? | |
==182== Address 0xa37b7ff is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA37DC87: ??? | |
==182== by 0xA37DC87: ??? | |
==182== by 0xA37DCA4: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37DC87: ??? | |
==182== Address 0xa37dc9f is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA37DC87: ??? | |
==182== by 0xA37DC87: ??? | |
==182== by 0xA37DCA4: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37DC87: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA37F087: ??? | |
==182== by 0xA37F087: ??? | |
==182== by 0xA37F0A7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37F087: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA37FB27: ??? | |
==182== by 0xA37FB27: ??? | |
==182== by 0xA37FB42: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37FB27: ??? | |
==182== Address 0xa37fb3f is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA37FB27: ??? | |
==182== by 0xA37FB27: ??? | |
==182== by 0xA37FB42: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA37FB27: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xA3807E7: ??? | |
==182== by 0xA3807E7: ??? | |
==182== by 0xA380802: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA3807E7: ??? | |
==182== Address 0xa3807ff is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xA3807E7: ??? | |
==182== by 0xA3807E7: ??? | |
==182== by 0xA380802: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA3807E7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF9235: ??? | |
==182== by 0x7C31C67: ??? | |
==182== by 0x7C31C67: ??? | |
==182== by 0x7C31CA3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7C31C67: ??? | |
==182== Address 0x7c31c9e is 78 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php) | |
==182== by 0x5E0CA1: ??? (in /usr/local/bin/php) | |
==182== by 0x5E9AE9: ??? (in /usr/local/bin/php) | |
==182== by 0x5E047D: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4F12: ??? (in /usr/local/bin/php) | |
==182== by 0x5E7725: ??? (in /usr/local/bin/php) | |
==182== by 0x5E8716: ??? (in /usr/local/bin/php) | |
==182== by 0x5E77FE: ??? (in /usr/local/bin/php) | |
==182== by 0x5E8D4F: ??? (in /usr/local/bin/php) | |
==182== by 0x5E7813: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF9266: ??? | |
==182== by 0x7C31C67: ??? | |
==182== by 0x7C31C67: ??? | |
==182== by 0x7C31CA3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7C31C67: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xAC012A0: ??? | |
==182== by 0xAC01287: ??? | |
==182== by 0xAC012A3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAC01287: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xABFC400: ??? | |
==182== by 0xABFC3E7: ??? | |
==182== by 0xABFC403: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xABFC3E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA62A9E0: ??? | |
==182== by 0xA62A9C7: ??? | |
==182== by 0xA62A9E3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA62A9C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x62694C2F6372732E: ??? | |
==182== by 0x7365542F79726171: ??? | |
==182== by 0x6F666D79532F7373: ??? | |
==182== by 0x74736E6F432F796D: ??? | |
==182== by 0x61422F746E696171: ??? | |
==182== by 0x6E756F6363416B6D: ??? | |
==182== by 0x746164696C615673: ??? | |
==182== by 0x702E74736554726E: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x2F726F646E65762E: ??? | |
==182== by 0x2F796E6F666D7972: ??? | |
==182== by 0x6F746164696C6175: ??? | |
==182== by 0x432F747365542F71: ??? | |
==182== by 0x6E69617274736E6E: ??? | |
==182== by 0x746164696C615673: ??? | |
==182== by 0x614374736554726E: ??? | |
==182== by 0xF: ??? | |
==182== by 0x5EE72A57: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF7641: ??? | |
==182== by 0xA2D88C7: ??? | |
==182== by 0xA2D88C7: ??? | |
==182== by 0xA2D88E4: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA2D88C7: ??? | |
==182== Address 0xa2d88de is 46 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x623F0F: ??? (in /usr/local/bin/php) | |
==182== by 0x5DDD11: ??? (in /usr/local/bin/php) | |
==182== by 0x5E77CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA37B: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php) | |
==182== by 0x5C2703: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3E32: compile_filename (in /usr/local/bin/php) | |
==182== by 0x645BA6: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF7666: ??? | |
==182== by 0xA2D88C7: ??? | |
==182== by 0xA2D88C7: ??? | |
==182== by 0xA2D88E4: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA2D88C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF7666: ??? | |
==182== by 0x4A7A9B7: ??? | |
==182== by 0x4A7A9B7: ??? | |
==182== by 0x4A7A9C8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4A7A9B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF7666: ??? | |
==182== by 0xA5BD7E7: ??? | |
==182== by 0xA5BD7E7: ??? | |
==182== by 0xA5BD807: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA5BD7E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF7666: ??? | |
==182== by 0xAB67CC7: ??? | |
==182== by 0xAB67CC7: ??? | |
==182== by 0xAB67CE7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAB67CC7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF7641: ??? | |
==182== by 0x9E91367: ??? | |
==182== by 0x9E91367: ??? | |
==182== by 0x9E91384: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x9E91367: ??? | |
==182== Address 0x9e9137e is 46 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php) | |
==182== by 0x5E0CA1: ??? (in /usr/local/bin/php) | |
==182== by 0x5E9AE9: ??? (in /usr/local/bin/php) | |
==182== by 0x5E047D: ??? (in /usr/local/bin/php) | |
==182== by 0x5E4814: ??? (in /usr/local/bin/php) | |
==182== by 0x5E3B74: ??? (in /usr/local/bin/php) | |
==182== by 0x5E059D: ??? (in /usr/local/bin/php) | |
==182== by 0x5E68F6: ??? (in /usr/local/bin/php) | |
==182== by 0x5E04DD: ??? (in /usr/local/bin/php) | |
==182== by 0x5E768E: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF7666: ??? | |
==182== by 0x9E91367: ??? | |
==182== by 0x9E91367: ??? | |
==182== by 0x9E91384: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x9E91367: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xA660DFF: ??? | |
==182== by 0xA660DB7: ??? | |
==182== by 0xA660E04: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA660DB7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA6B3669: ??? | |
==182== by 0xA6B3627: ??? | |
==182== by 0xA6B366C: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA6B3627: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF8403: ??? | |
==182== by 0xA66119C: ??? | |
==182== by 0xA661157: ??? | |
==182== by 0xA6611A1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA661157: ??? | |
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php) | |
==182== by 0x5DB979: ??? (in /usr/local/bin/php) | |
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php) | |
==182== by 0x5C2689: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== by 0x678B55: execute_ex (in /usr/local/bin/php) | |
==182== by 0x68108C: zend_execute (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF841C: ??? | |
==182== by 0xA66119C: ??? | |
==182== by 0xA661157: ??? | |
==182== by 0xA6611A1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA661157: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xA66136F: ??? | |
==182== by 0xA661327: ??? | |
==182== by 0xA661374: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA661327: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF83BF: ??? | |
==182== by 0xA661CAE: ??? | |
==182== by 0xA661C67: ??? | |
==182== by 0xA661CB3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA661C67: ??? | |
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php) | |
==182== by 0x5DB979: ??? (in /usr/local/bin/php) | |
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php) | |
==182== by 0x5C2689: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== by 0x678B55: execute_ex (in /usr/local/bin/php) | |
==182== by 0x68108C: zend_execute (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xA661CAE: ??? | |
==182== by 0xA661C67: ??? | |
==182== by 0xA661CB3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA661C67: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA6EDAF1: ??? | |
==182== by 0xA6EDAA7: ??? | |
==182== by 0xA6EDAF7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA6EDAA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA241404: ??? | |
==182== by 0xA2413C7: ??? | |
==182== by 0xA241407: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA2413C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xA2096D7: ??? | |
==182== by 0xA209697: ??? | |
==182== by 0xA2096DC: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA209697: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA75E510: ??? | |
==182== by 0xA75E4C7: ??? | |
==182== by 0xA75E513: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA75E4C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xA64DF23: ??? | |
==182== by 0xA64DED7: ??? | |
==182== by 0xA64DF28: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA64DED7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA762776: ??? | |
==182== by 0xA762737: ??? | |
==182== by 0xA762779: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA762737: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA2FE8CF: ??? | |
==182== by 0xA2FE867: ??? | |
==182== by 0xA2FE8D2: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA2FE867: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF841C: ??? | |
==182== by 0xA2F9DFB: ??? | |
==182== by 0xA2F9DD7: ??? | |
==182== by 0xA2F9E47: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA2F9DD7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x62694C2F6372732E: ??? | |
==182== by 0x7365542F79726171: ??? | |
==182== by 0x736C6974552F7373: ??? | |
==182== by 0x614379656E6F4D2E: ??? | |
==182== by 0x6F6974616C75636B: ??? | |
==182== by 0x702E74736554736D: ??? | |
==182== by 0x657A796B: ??? | |
==182== by 0xAFBFD7F: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB064135: ??? | |
==182== by 0xB0640C7: ??? | |
==182== by 0xB064138: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0640C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB178D00: ??? | |
==182== by 0xB178CD7: ??? | |
==182== by 0xB178D03: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB178CD7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xB0D1553: ??? | |
==182== by 0xB0D1527: ??? | |
==182== by 0xB0D1558: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0D1527: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x62694C2F6372732E: ??? | |
==182== by 0x6C61562F79726171: ??? | |
==182== by 0x7463656A624F6574: ??? | |
==182== by 0x702E657461442F72: ??? | |
==182== by 0x7F: ??? | |
==182== by 0x1101: ??? | |
==182== by 0x4F6EA44ED4641442: ??? | |
==182== by 0x1FFEFFB1BF: ??? | |
==182== by 0xD: ??? | |
==182== by 0x1FFEFFB12F: ??? | |
==182== by 0x4045629: fstatat (in /lib/ld-musl-x86_64.so.1) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB20C501: ??? | |
==182== by 0xB20C4D7: ??? | |
==182== by 0xB20C504: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB20C4D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xB0C6B44: ??? | |
==182== by 0xB0C6B17: ??? | |
==182== by 0xB0C6B49: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0C6B17: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xB0C6C5F: ??? | |
==182== by 0xB0C6C27: ??? | |
==182== by 0xB0C6C64: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0C6C27: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF8403: ??? | |
==182== by 0xB0C6EF0: ??? | |
==182== by 0xB0C6EC7: ??? | |
==182== by 0xB0C6F43: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0C6EC7: ??? | |
==182== Address 0xb0c6f3f is 143 bytes inside a block of size 152 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php) | |
==182== by 0x5DB979: ??? (in /usr/local/bin/php) | |
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php) | |
==182== by 0x5C2689: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== by 0x678B55: execute_ex (in /usr/local/bin/php) | |
==182== by 0x68108C: zend_execute (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF841C: ??? | |
==182== by 0xB0C6EF0: ??? | |
==182== by 0xB0C6EC7: ??? | |
==182== by 0xB0C6F43: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0C6EC7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0x7BF093D: ??? | |
==182== by 0x7BF08B7: ??? | |
==182== by 0x7BF0940: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7BF08B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xAF79BF0: ??? | |
==182== by 0xAF79B67: ??? | |
==182== by 0xAF79BF5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAF79B67: ??? | |
==182== | |
==182== | |
==182== More than 100 errors detected. Subsequent errors | |
==182== will still be recorded, but in less detail than before. | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB39C0ED: ??? | |
==182== by 0xB39C0C7: ??? | |
==182== by 0xB39C0F0: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB39C0C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB39DB8E: ??? | |
==182== by 0xB39DB57: ??? | |
==182== by 0xB39DB91: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB39DB57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xB0D3741: ??? | |
==182== by 0xB0D3707: ??? | |
==182== by 0xB0D3746: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0D3707: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB268CAD: ??? | |
==182== by 0xB268C87: ??? | |
==182== by 0xB268CB0: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB268C87: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF526D: ??? | |
==182== by 0xB0D3E67: ??? | |
==182== by 0xB0D3E67: ??? | |
==182== by 0xB0D3E84: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0D3E67: ??? | |
==182== Address 0xb0d3e7e is 46 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x623F0F: ??? (in /usr/local/bin/php) | |
==182== by 0x5DDD11: ??? (in /usr/local/bin/php) | |
==182== by 0x5E77CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA37B: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php) | |
==182== by 0x5C2703: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF5296: ??? | |
==182== by 0xB0D3E67: ??? | |
==182== by 0xB0D3E67: ??? | |
==182== by 0xB0D3E84: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0D3E67: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF526D: ??? | |
==182== by 0xB1C15D7: ??? | |
==182== by 0xB1C15D7: ??? | |
==182== by 0xB1C1601: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1C15D7: ??? | |
==182== Address 0xb1c15fe is 62 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x623F0F: ??? (in /usr/local/bin/php) | |
==182== by 0x5DDD11: ??? (in /usr/local/bin/php) | |
==182== by 0x5E77CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA37B: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php) | |
==182== by 0x5C2703: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3E32: compile_filename (in /usr/local/bin/php) | |
==182== by 0x645BA6: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF5296: ??? | |
==182== by 0xB1C15D7: ??? | |
==182== by 0xB1C15D7: ??? | |
==182== by 0xB1C1601: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1C15D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF5296: ??? | |
==182== by 0xB0D55D7: ??? | |
==182== by 0xB0D55D7: ??? | |
==182== by 0xB0D55FA: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0D55D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF526D: ??? | |
==182== by 0xB0D54D7: ??? | |
==182== by 0xB0D54D7: ??? | |
==182== by 0xB0D54F5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0D54D7: ??? | |
==182== Address 0xb0d54ee is 46 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x623F0F: ??? (in /usr/local/bin/php) | |
==182== by 0x5DDD11: ??? (in /usr/local/bin/php) | |
==182== by 0x5E77CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA37B: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php) | |
==182== by 0x5C2703: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB25B6BA: ??? | |
==182== by 0xB25B697: ??? | |
==182== by 0xB25B6BD: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB25B697: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF8403: ??? | |
==182== by 0xB1B78BD: ??? | |
==182== by 0xB1B7897: ??? | |
==182== by 0xB1B78C2: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1B7897: ??? | |
==182== Address 0xb1b78bf is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php) | |
==182== by 0x5DB979: ??? (in /usr/local/bin/php) | |
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php) | |
==182== by 0x5C2689: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== by 0x678B55: execute_ex (in /usr/local/bin/php) | |
==182== by 0x68108C: zend_execute (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF841C: ??? | |
==182== by 0xB1B78BD: ??? | |
==182== by 0xB1B7897: ??? | |
==182== by 0xB1B78C2: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1B7897: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB423634: ??? | |
==182== by 0xB423617: ??? | |
==182== by 0xB423637: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB423617: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF83ED: ??? | |
==182== by 0xB1DC327: ??? | |
==182== by 0xB1DC307: ??? | |
==182== by 0xB1DC32C: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1DC307: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF46C5: ??? | |
==182== by 0xB1DCE67: ??? | |
==182== by 0xB1DCE67: ??? | |
==182== by 0xB1DCE85: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1DCE67: ??? | |
==182== Address 0xb1dce7e is 46 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x623F0F: ??? (in /usr/local/bin/php) | |
==182== by 0x5DDD11: ??? (in /usr/local/bin/php) | |
==182== by 0x5E77CA: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA37B: ??? (in /usr/local/bin/php) | |
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php) | |
==182== by 0x5C2703: ??? (in /usr/local/bin/php) | |
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php) | |
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php) | |
==182== by 0x645DA0: ??? (in /usr/local/bin/php) | |
==182== by 0x661A39: ??? (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF46EE: ??? | |
==182== by 0xB1DCE67: ??? | |
==182== by 0xB1DCE67: ??? | |
==182== by 0xB1DCE85: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1DCE67: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB50B5A5: ??? | |
==182== by 0xB50B587: ??? | |
==182== by 0xB50B5A8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB50B587: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB4E4C77: ??? | |
==182== by 0xB4E4C77: ??? | |
==182== by 0xB4E4C86: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4E4C77: ??? | |
==182== Address 0xb4e4c7f is 31 bytes inside a block of size 40 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E352A: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB58B677: ??? | |
==182== by 0xB58B677: ??? | |
==182== by 0xB58B6AA: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB58B677: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB298FC7: ??? | |
==182== by 0xB298FC7: ??? | |
==182== by 0xB298FD6: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB298FC7: ??? | |
==182== Address 0xb298fcf is 31 bytes inside a block of size 40 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E352A: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB577847: ??? | |
==182== by 0xB577847: ??? | |
==182== by 0xB57787A: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB577847: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB57EB07: ??? | |
==182== by 0xB57EB07: ??? | |
==182== by 0xB57EB22: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB57EB07: ??? | |
==182== Address 0xb57eb1f is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB57EB07: ??? | |
==182== by 0xB57EB07: ??? | |
==182== by 0xB57EB22: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB57EB07: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5873A7: ??? | |
==182== by 0xB5873A7: ??? | |
==182== by 0xB5873DC: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5873A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB58C9F7: ??? | |
==182== by 0xB58C9F7: ??? | |
==182== by 0xB58CA18: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB58C9F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB58CF07: ??? | |
==182== by 0xB58CF07: ??? | |
==182== by 0xB58CF38: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB58CF07: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB597827: ??? | |
==182== by 0xB597827: ??? | |
==182== by 0xB597858: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB597827: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5A5C17: ??? | |
==182== by 0xB5A5C17: ??? | |
==182== by 0xB5A5C4C: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5A5C17: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5A86A7: ??? | |
==182== by 0xB5A86A7: ??? | |
==182== by 0xB5A86D5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5A86A7: ??? | |
==182== Address 0xb5a86cf is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5A86A7: ??? | |
==182== by 0xB5A86A7: ??? | |
==182== by 0xB5A86D5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5A86A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5A33D7: ??? | |
==182== by 0xB5A33D7: ??? | |
==182== by 0xB5A3409: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5A33D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5B47B7: ??? | |
==182== by 0xB5B47B7: ??? | |
==182== by 0xB5B47E3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B47B7: ??? | |
==182== Address 0xb5b47df is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5B47B7: ??? | |
==182== by 0xB5B47B7: ??? | |
==182== by 0xB5B47E3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B47B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5B3DD7: ??? | |
==182== by 0xB5B3DD7: ??? | |
==182== by 0xB5B3E07: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B3DD7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB59A357: ??? | |
==182== by 0xB59A357: ??? | |
==182== by 0xB59A385: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB59A357: ??? | |
==182== Address 0xb59a37f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB59A357: ??? | |
==182== by 0xB59A357: ??? | |
==182== by 0xB59A385: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB59A357: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5BEB37: ??? | |
==182== by 0xB5BEB37: ??? | |
==182== by 0xB5BEB63: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BEB37: ??? | |
==182== Address 0xb5beb5f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5BEB37: ??? | |
==182== by 0xB5BEB37: ??? | |
==182== by 0xB5BEB63: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BEB37: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5BEE37: ??? | |
==182== by 0xB5BEE37: ??? | |
==182== by 0xB5BEE69: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BEE37: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5BF6B7: ??? | |
==182== by 0xB5BF6B7: ??? | |
==182== by 0xB5BF6E6: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BF6B7: ??? | |
==182== Address 0xb5bf6df is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5B0DB7: ??? | |
==182== by 0xB5B0DB7: ??? | |
==182== by 0xB5B0DE5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B0DB7: ??? | |
==182== Address 0xb5b0ddf is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5B0DB7: ??? | |
==182== by 0xB5B0DB7: ??? | |
==182== by 0xB5B0DE5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B0DB7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5B1D27: ??? | |
==182== by 0xB5B1D27: ??? | |
==182== by 0xB5B1D56: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B1D27: ??? | |
==182== Address 0xb5b1d4f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5B8EE7: ??? | |
==182== by 0xB5B8EE7: ??? | |
==182== by 0xB5B8F14: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B8EE7: ??? | |
==182== Address 0xb5b8f0f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5B8EE7: ??? | |
==182== by 0xB5B8EE7: ??? | |
==182== by 0xB5B8F14: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B8EE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5BAB47: ??? | |
==182== by 0xB5BAB47: ??? | |
==182== by 0xB5BAB7B: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BAB47: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5B63C7: ??? | |
==182== by 0xB5B63C7: ??? | |
==182== by 0xB5B6400: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B63C7: ??? | |
==182== Address 0xb5b63ff is 79 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5B63C7: ??? | |
==182== by 0xB5B63C7: ??? | |
==182== by 0xB5B6400: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5B63C7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5BD307: ??? | |
==182== by 0xB5BD307: ??? | |
==182== by 0xB5BD340: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BD307: ??? | |
==182== Address 0xb5bd33f is 79 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5BD307: ??? | |
==182== by 0xB5BD307: ??? | |
==182== by 0xB5BD340: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5BD307: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5C2507: ??? | |
==182== by 0xB5C2507: ??? | |
==182== by 0xB5C2535: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5C2507: ??? | |
==182== Address 0xb5c252f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5C2507: ??? | |
==182== by 0xB5C2507: ??? | |
==182== by 0xB5C2535: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5C2507: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5C4127: ??? | |
==182== by 0xB5C4127: ??? | |
==182== by 0xB5C4157: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5C4127: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5C5D27: ??? | |
==182== by 0xB5C5D27: ??? | |
==182== by 0xB5C5D52: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5C5D27: ??? | |
==182== Address 0xb5c5d4f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5C5D27: ??? | |
==182== by 0xB5C5D27: ??? | |
==182== by 0xB5C5D52: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5C5D27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5D56C7: ??? | |
==182== by 0xB5D56C7: ??? | |
==182== by 0xB5D56EC: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5D56C7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5D6337: ??? | |
==182== by 0xB5D6337: ??? | |
==182== by 0xB5D6361: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5D6337: ??? | |
==182== Address 0xb5d635f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5D6337: ??? | |
==182== by 0xB5D6337: ??? | |
==182== by 0xB5D6361: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5D6337: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5CBAB7: ??? | |
==182== by 0xB5CBAB7: ??? | |
==182== by 0xB5CBAFB: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5CBAB7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5EADC7: ??? | |
==182== by 0xB5EADC7: ??? | |
==182== by 0xB5EADFA: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5EADC7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5ECDB7: ??? | |
==182== by 0xB5ECDB7: ??? | |
==182== by 0xB5ECDEA: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5ECDB7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5F7857: ??? | |
==182== by 0xB5F7857: ??? | |
==182== by 0xB5F788C: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5F7857: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5F90D7: ??? | |
==182== by 0xB5F90D7: ??? | |
==182== by 0xB5F911A: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5F90D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB5FA227: ??? | |
==182== by 0xB5FA227: ??? | |
==182== by 0xB5FA265: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5FA227: ??? | |
==182== Address 0xb5fa25f is 79 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5FA227: ??? | |
==182== by 0xB5FA227: ??? | |
==182== by 0xB5FA265: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5FA227: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5D90D7: ??? | |
==182== by 0xB5D90D7: ??? | |
==182== by 0xB5D9118: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5D90D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB607FF7: ??? | |
==182== by 0xB607FF7: ??? | |
==182== by 0xB608024: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB607FF7: ??? | |
==182== Address 0xb60801f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB607FF7: ??? | |
==182== by 0xB607FF7: ??? | |
==182== by 0xB608024: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB607FF7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB60B217: ??? | |
==182== by 0xB60B217: ??? | |
==182== by 0xB60B247: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB60B217: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB609AC7: ??? | |
==182== by 0xB609AC7: ??? | |
==182== by 0xB609AF5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB609AC7: ??? | |
==182== Address 0xb609aef is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB609AC7: ??? | |
==182== by 0xB609AC7: ??? | |
==182== by 0xB609AF5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB609AC7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB6089D7: ??? | |
==182== by 0xB6089D7: ??? | |
==182== by 0xB608A08: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB6089D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB60B877: ??? | |
==182== by 0xB60B877: ??? | |
==182== by 0xB60B8B4: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB60B877: ??? | |
==182== Address 0xb60b8af is 79 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB60B877: ??? | |
==182== by 0xB60B877: ??? | |
==182== by 0xB60B8B4: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB60B877: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB60D6D7: ??? | |
==182== by 0xB60D6D7: ??? | |
==182== by 0xB60D709: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB60D6D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB60DE97: ??? | |
==182== by 0xB60DE97: ??? | |
==182== by 0xB60DEC6: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB60DE97: ??? | |
==182== Address 0xb60debf is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB608DE7: ??? | |
==182== by 0xB608DE7: ??? | |
==182== by 0xB608E19: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB608DE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB60F3B7: ??? | |
==182== by 0xB60F3B7: ??? | |
==182== by 0xB60F3E8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB60F3B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB604DA7: ??? | |
==182== by 0xB604DA7: ??? | |
==182== by 0xB604DC7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB604DA7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB61C797: ??? | |
==182== by 0xB61C797: ??? | |
==182== by 0xB61C7B3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB61C797: ??? | |
==182== Address 0xb61c7af is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB61C797: ??? | |
==182== by 0xB61C797: ??? | |
==182== by 0xB61C7B3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB61C797: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB6259E7: ??? | |
==182== by 0xB6259E7: ??? | |
==182== by 0xB625A00: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB6259E7: ??? | |
==182== Address 0xb6259ff is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB6259E7: ??? | |
==182== by 0xB6259E7: ??? | |
==182== by 0xB625A00: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB6259E7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB619A07: ??? | |
==182== by 0xB619A07: ??? | |
==182== by 0xB619A24: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB619A07: ??? | |
==182== Address 0xb619a1f is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB619A07: ??? | |
==182== by 0xB619A07: ??? | |
==182== by 0xB619A24: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB619A07: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB61A907: ??? | |
==182== by 0xB61A907: ??? | |
==182== by 0xB61A924: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB61A907: ??? | |
==182== Address 0xb61a91f is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB61A907: ??? | |
==182== by 0xB61A907: ??? | |
==182== by 0xB61A924: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB61A907: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5F4C87: ??? | |
==182== by 0xB5F4C87: ??? | |
==182== by 0xB5F4CA7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5F4C87: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB5CA2C7: ??? | |
==182== by 0xB5CA2C7: ??? | |
==182== by 0xB5CA2EA: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5CA2C7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB63D6A7: ??? | |
==182== by 0xB63D6A7: ??? | |
==182== by 0xB63D6C6: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63D6A7: ??? | |
==182== Address 0xb63d6bf is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB633667: ??? | |
==182== by 0xB633667: ??? | |
==182== by 0xB633692: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB633667: ??? | |
==182== Address 0xb63368f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB633667: ??? | |
==182== by 0xB633667: ??? | |
==182== by 0xB633692: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB633667: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB648207: ??? | |
==182== by 0xB648207: ??? | |
==182== by 0xB648229: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB648207: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB61C827: ??? | |
==182== by 0xB61C827: ??? | |
==182== by 0xB61C84B: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB61C827: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB632BE7: ??? | |
==182== by 0xB632BE7: ??? | |
==182== by 0xB632C04: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB632BE7: ??? | |
==182== Address 0xb632bff is 47 bytes inside a block of size 56 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB632BE7: ??? | |
==182== by 0xB632BE7: ??? | |
==182== by 0xB632C04: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB632BE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB632647: ??? | |
==182== by 0xB632647: ??? | |
==182== by 0xB63268A: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB632647: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB642CD7: ??? | |
==182== by 0xB642CD7: ??? | |
==182== by 0xB642D1B: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB642CD7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB63C527: ??? | |
==182== by 0xB63C527: ??? | |
==182== by 0xB63C555: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63C527: ??? | |
==182== Address 0xb63c54f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB63C527: ??? | |
==182== by 0xB63C527: ??? | |
==182== by 0xB63C555: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63C527: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB63C907: ??? | |
==182== by 0xB63C907: ??? | |
==182== by 0xB63C944: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63C907: ??? | |
==182== Address 0xb63c93f is 79 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB63C907: ??? | |
==182== by 0xB63C907: ??? | |
==182== by 0xB63C944: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63C907: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB639A57: ??? | |
==182== by 0xB639A57: ??? | |
==182== by 0xB639A87: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB639A57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB63ACF7: ??? | |
==182== by 0xB63ACF7: ??? | |
==182== by 0xB63AD29: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63ACF7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB6342D7: ??? | |
==182== by 0xB6342D7: ??? | |
==182== by 0xB6342F8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB6342D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB661307: ??? | |
==182== by 0xB661307: ??? | |
==182== by 0xB661356: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB661307: ??? | |
==182== Address 0xb66134f is 95 bytes inside a block of size 104 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB63CFA7: ??? | |
==182== by 0xB63CFA7: ??? | |
==182== by 0xB63D00B: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63CFA7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB65E5D7: ??? | |
==182== by 0xB65E5D7: ??? | |
==182== by 0xB65E631: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB65E5D7: ??? | |
==182== Address 0xb65e62f is 111 bytes inside a block of size 120 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB65E5D7: ??? | |
==182== by 0xB65E5D7: ??? | |
==182== by 0xB65E631: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB65E5D7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB65F437: ??? | |
==182== by 0xB65F437: ??? | |
==182== by 0xB65F4A5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB65F437: ??? | |
==182== Address 0xb65f49f is 127 bytes inside a block of size 136 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB65F437: ??? | |
==182== by 0xB65F437: ??? | |
==182== by 0xB65F4A5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB65F437: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB63DE97: ??? | |
==182== by 0xB63DE97: ??? | |
==182== by 0xB63DEC9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63DE97: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB63F3D7: ??? | |
==182== by 0xB63F3D7: ??? | |
==182== by 0xB63F422: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63F3D7: ??? | |
==182== Address 0xb63f41f is 95 bytes inside a block of size 104 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB63F3D7: ??? | |
==182== by 0xB63F3D7: ??? | |
==182== by 0xB63F422: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB63F3D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB667587: ??? | |
==182== by 0xB667587: ??? | |
==182== by 0xB6675B7: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB667587: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB67AA57: ??? | |
==182== by 0xB67AA57: ??? | |
==182== by 0xB67AA7B: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB67AA57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB67E967: ??? | |
==182== by 0xB67E967: ??? | |
==182== by 0xB67E988: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB67E967: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB673C47: ??? | |
==182== by 0xB673C47: ??? | |
==182== by 0xB673C84: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB673C47: ??? | |
==182== Address 0xb673c7f is 79 bytes inside a block of size 88 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB673C47: ??? | |
==182== by 0xB673C47: ??? | |
==182== by 0xB673C84: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB673C47: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB640627: ??? | |
==182== by 0xB640627: ??? | |
==182== by 0xB640656: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB640627: ??? | |
==182== Address 0xb64064f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB6424B7: ??? | |
==182== by 0xB6424B7: ??? | |
==182== by 0xB64250C: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB6424B7: ??? | |
==182== | |
==182== Invalid read of size 16 | |
==182== at 0xBDF97E1: ??? | |
==182== by 0xB645617: ??? | |
==182== by 0xB645617: ??? | |
==182== by 0xB645646: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB645617: ??? | |
==182== Address 0xb64563f is 63 bytes inside a block of size 72 alloc'd | |
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309) | |
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php) | |
==182== by 0x53ACA6: ??? (in /usr/local/bin/php) | |
==182== by 0x540AA6: ??? (in /usr/local/bin/php) | |
==182== by 0x5411E6: ??? (in /usr/local/bin/php) | |
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php) | |
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x4E38FA: ??? (in /usr/local/bin/php) | |
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php) | |
==182== by 0x617373: zend_call_method (in /usr/local/bin/php) | |
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php) | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB67F2F7: ??? | |
==182== by 0xB67F2F7: ??? | |
==182== by 0xB67F328: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB67F2F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF97FA: ??? | |
==182== by 0xB68D2C7: ??? | |
==182== by 0xB68D2C7: ??? | |
==182== by 0xB68D2E9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB68D2C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBEA2A23: ??? | |
==182== by 0xBEA2A07: ??? | |
==182== by 0xBEA2A26: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBEA2A07: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xBEA569A: ??? | |
==182== by 0xBEA5627: ??? | |
==182== by 0xBEA56A0: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBEA5627: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB7AB37F: ??? | |
==182== by 0xB7AB317: ??? | |
==182== by 0xB7AB385: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB7AB317: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBEA7BFF: ??? | |
==182== by 0xBEA7B57: ??? | |
==182== by 0xBEA7C05: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBEA7B57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB800657: ??? | |
==182== by 0xB800657: ??? | |
==182== by 0xB8006C1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB800657: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB86D0B6: ??? | |
==182== by 0xB86D097: ??? | |
==182== by 0xB86D0BC: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB86D097: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBEC48A3: ??? | |
==182== by 0xBEC4887: ??? | |
==182== by 0xBEC48A9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBEC4887: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1) | |
==182== by 0x6165522F6372732E: ??? | |
==182== by 0x542F6C65646F4D63: ??? | |
==182== by 0x6172472F73747364: ??? | |
==182== by 0x6363412F4C51686F: ??? | |
==182== by 0x2F676E69746E756E: ??? | |
==182== by 0x69746E756F636340: ??? | |
==182== by 0x696E6167724F676D: ??? | |
==182== by 0x75516E6F69746179: ??? | |
==182== by 0x2E74736554797264: ??? | |
==182== by 0x7070612F7273752E: ??? | |
==182== by 0x6165522F6372732E: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB8D0AC0: ??? | |
==182== by 0xB8D0AA7: ??? | |
==182== by 0xB8D0AC3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8D0AA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB7A3B22: ??? | |
==182== by 0xB7A3AE7: ??? | |
==182== by 0xB7A3B25: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB7A3AE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB8DF2F2: ??? | |
==182== by 0xB8DF2B7: ??? | |
==182== by 0xB8DF2F5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8DF2B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB8E1950: ??? | |
==182== by 0xB8E1937: ??? | |
==182== by 0xB8E1953: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8E1937: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB8E38D0: ??? | |
==182== by 0xB8E38B7: ??? | |
==182== by 0xB8E38D3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8E38B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB8E5042: ??? | |
==182== by 0xB8E5007: ??? | |
==182== by 0xB8E5045: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8E5007: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB8CC27A: ??? | |
==182== by 0xB8CC257: ??? | |
==182== by 0xB8CC27D: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8CC257: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB8E8757: ??? | |
==182== by 0xB8E8757: ??? | |
==182== by 0xB8E8778: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8E8757: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9B7050: ??? | |
==182== by 0xB9B7037: ??? | |
==182== by 0xB9B7053: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9B7037: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7D0B6A0: ??? | |
==182== by 0x7D0B687: ??? | |
==182== by 0x7D0B6A3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7D0B687: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7D25F90: ??? | |
==182== by 0x7D25F77: ??? | |
==182== by 0x7D25F93: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7D25F77: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x48B2AF0: ??? | |
==182== by 0x48B2AD7: ??? | |
==182== by 0x48B2AF3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x48B2AD7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4C06C60: ??? | |
==182== by 0x4C06C47: ??? | |
==182== by 0x4C06C63: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4C06C47: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7C20B70: ??? | |
==182== by 0x7C20B57: ??? | |
==182== by 0x7C20B73: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7C20B57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7C77150: ??? | |
==182== by 0x7C77137: ??? | |
==182== by 0x7C77153: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7C77137: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA53CB40: ??? | |
==182== by 0xA53CB27: ??? | |
==182== by 0xA53CB43: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA53CB27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA0E6220: ??? | |
==182== by 0xA0E6207: ??? | |
==182== by 0xA0E6223: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA0E6207: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA181610: ??? | |
==182== by 0xA1815F7: ??? | |
==182== by 0xA181613: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA1815F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA21A800: ??? | |
==182== by 0xA21A7E7: ??? | |
==182== by 0xA21A803: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA21A7E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA07AA60: ??? | |
==182== by 0xA07AA47: ??? | |
==182== by 0xA07AA63: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA07AA47: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA22AC20: ??? | |
==182== by 0xA22AC07: ??? | |
==182== by 0xA22AC23: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA22AC07: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA22CB10: ??? | |
==182== by 0xA22CAF7: ??? | |
==182== by 0xA22CB13: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA22CAF7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA39ADD0: ??? | |
==182== by 0xA39ADB7: ??? | |
==182== by 0xA39ADD3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA39ADB7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA44FA40: ??? | |
==182== by 0xA44FA27: ??? | |
==182== by 0xA44FA43: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA44FA27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xAA1E380: ??? | |
==182== by 0xAA1E367: ??? | |
==182== by 0xAA1E383: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAA1E367: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA97DD00: ??? | |
==182== by 0xA97DCE7: ??? | |
==182== by 0xA97DD03: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA97DCE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA98C960: ??? | |
==182== by 0xA98C947: ??? | |
==182== by 0xA98C963: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA98C947: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA9F7510: ??? | |
==182== by 0xA9F74F7: ??? | |
==182== by 0xA9F7513: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA9F74F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA93FD40: ??? | |
==182== by 0xA93FD27: ??? | |
==182== by 0xA93FD43: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA93FD27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA5D1C60: ??? | |
==182== by 0xA5D1C47: ??? | |
==182== by 0xA5D1C63: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA5D1C47: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA6392D0: ??? | |
==182== by 0xA6392B7: ??? | |
==182== by 0xA6392D3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA6392B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xAB12720: ??? | |
==182== by 0xAB12707: ??? | |
==182== by 0xAB12723: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAB12707: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA1EAD60: ??? | |
==182== by 0xA1EAD47: ??? | |
==182== by 0xA1EAD63: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA1EAD47: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA780500: ??? | |
==182== by 0xA7804E7: ??? | |
==182== by 0xA780503: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA7804E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xAF1B830: ??? | |
==182== by 0xAF1B817: ??? | |
==182== by 0xAF1B833: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAF1B817: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xAF0F050: ??? | |
==182== by 0xAF0F037: ??? | |
==182== by 0xAF0F053: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAF0F037: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xAFCF390: ??? | |
==182== by 0xAFCF377: ??? | |
==182== by 0xAFCF393: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xAFCF377: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB12E880: ??? | |
==182== by 0xB12E867: ??? | |
==182== by 0xB12E883: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB12E867: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB1700D0: ??? | |
==182== by 0xB1700B7: ??? | |
==182== by 0xB1700D3: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1700B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB22D52E: ??? | |
==182== by 0xB22D4F7: ??? | |
==182== by 0xB22D531: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB22D4F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB26AC6E: ??? | |
==182== by 0xB26AC37: ??? | |
==182== by 0xB26AC71: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB26AC37: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB44B30E: ??? | |
==182== by 0xB44B2D7: ??? | |
==182== by 0xB44B311: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB44B2D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB4522CE: ??? | |
==182== by 0xB452297: ??? | |
==182== by 0xB4522D1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB452297: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB445F6D: ??? | |
==182== by 0xB445F47: ??? | |
==182== by 0xB445F70: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB445F47: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB440F1D: ??? | |
==182== by 0xB440EF7: ??? | |
==182== by 0xB440F20: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB440EF7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB461838: ??? | |
==182== by 0xB4617D7: ??? | |
==182== by 0xB46183B: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4617D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB467DD6: ??? | |
==182== by 0xB467DA7: ??? | |
==182== by 0xB467DD9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB467DA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB389910: ??? | |
==182== by 0xB3898D7: ??? | |
==182== by 0xB389913: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB3898D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB1CDCC9: ??? | |
==182== by 0xB1CDCB7: ??? | |
==182== by 0xB1CDCCC: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1CDCB7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA3B84A9: ??? | |
==182== by 0xA3B8497: ??? | |
==182== by 0xA3B84AC: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA3B8497: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB203216: ??? | |
==182== by 0xB2031E7: ??? | |
==182== by 0xB203218: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB2031E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB464946: ??? | |
==182== by 0xB464917: ??? | |
==182== by 0xB464948: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB464917: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB27D0B6: ??? | |
==182== by 0xB27D087: ??? | |
==182== by 0xB27D0B8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB27D087: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB4662A6: ??? | |
==182== by 0xB466277: ??? | |
==182== by 0xB4662A8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB466277: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB4634D6: ??? | |
==182== by 0xB4634A7: ??? | |
==182== by 0xB4634D8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4634A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB4644E6: ??? | |
==182== by 0xB4644B7: ??? | |
==182== by 0xB4644E8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4644B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB416DD6: ??? | |
==182== by 0xB416DA7: ??? | |
==182== by 0xB416DD8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB416DA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF896D: ??? | |
==182== by 0xB416DD6: ??? | |
==182== by 0xB416DA7: ??? | |
==182== by 0xB416DD8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB416DA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBE2F5FF: ??? | |
==182== by 0xBE2F5D7: ??? | |
==182== by 0xBE2F602: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBE2F5D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBE2FC32: ??? | |
==182== by 0xBE2FC17: ??? | |
==182== by 0xBE2FC35: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBE2FC17: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB47E37E: ??? | |
==182== by 0xB47E327: ??? | |
==182== by 0xB47E381: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB47E327: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB488193: ??? | |
==182== by 0xB488137: ??? | |
==182== by 0xB488196: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB488137: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB394B76: ??? | |
==182== by 0xB394B57: ??? | |
==182== by 0xB394B79: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB394B57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB4C3A76: ??? | |
==182== by 0xB4C3A57: ??? | |
==182== by 0xB4C3A79: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4C3A57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB55D6C6: ??? | |
==182== by 0xB55D6A7: ??? | |
==182== by 0xB55D6C9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB55D6A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB4E59A6: ??? | |
==182== by 0xB4E5987: ??? | |
==182== by 0xB4E59A9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4E5987: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB5582E6: ??? | |
==182== by 0xB5582C7: ??? | |
==182== by 0xB5582E9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5582C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB5E12D6: ??? | |
==182== by 0xB5E12B7: ??? | |
==182== by 0xB5E12D9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5E12B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB5FBC06: ??? | |
==182== by 0xB5FBBE7: ??? | |
==182== by 0xB5FBC09: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB5FBBE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB4E313A: ??? | |
==182== by 0xB4E3117: ??? | |
==182== by 0xB4E313D: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB4E3117: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB668866: ??? | |
==182== by 0xB668847: ??? | |
==182== by 0xB668869: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB668847: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB706056: ??? | |
==182== by 0xB706037: ??? | |
==182== by 0xB706059: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB706037: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB678FBD: ??? | |
==182== by 0xB678F97: ??? | |
==182== by 0xB678FC0: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB678F97: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB82EF46: ??? | |
==182== by 0xB82EF27: ??? | |
==182== by 0xB82EF49: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB82EF27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB831106: ??? | |
==182== by 0xB8310E7: ??? | |
==182== by 0xB831109: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8310E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB831CEA: ??? | |
==182== by 0xB831CC7: ??? | |
==182== by 0xB831CED: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB831CC7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB8E55BE: ??? | |
==182== by 0xB8E5587: ??? | |
==182== by 0xB8E55C1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB8E5587: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9568C6: ??? | |
==182== by 0xB9568A7: ??? | |
==182== by 0xB9568C9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9568A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9626A6: ??? | |
==182== by 0xB962687: ??? | |
==182== by 0xB9626A9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB962687: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB956DC6: ??? | |
==182== by 0xB956DA7: ??? | |
==182== by 0xB956DC9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB956DA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBF00E96: ??? | |
==182== by 0xBF00E67: ??? | |
==182== by 0xBF00E98: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBF00E67: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB962E66: ??? | |
==182== by 0xB962E37: ??? | |
==182== by 0xB962E68: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB962E37: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB966266: ??? | |
==182== by 0xB966237: ??? | |
==182== by 0xB966268: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB966237: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBF016F6: ??? | |
==182== by 0xBF016C7: ??? | |
==182== by 0xBF016F8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBF016C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB91CAB6: ??? | |
==182== by 0xB91CA87: ??? | |
==182== by 0xB91CAB8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB91CA87: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB98C252: ??? | |
==182== by 0xB98C237: ??? | |
==182== by 0xB98C255: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB98C237: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB98E622: ??? | |
==182== by 0xB98E607: ??? | |
==182== by 0xB98E625: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB98E607: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB923125: ??? | |
==182== by 0xB9230C7: ??? | |
==182== by 0xB923128: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9230C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0xB98E17E: ??? | |
==182== by 0xB98E147: ??? | |
==182== by 0xB98E181: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB98E147: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9D11D6: ??? | |
==182== by 0xB9D11B7: ??? | |
==182== by 0xB9D11D9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9D11B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9D5FD6: ??? | |
==182== by 0xB9D5FB7: ??? | |
==182== by 0xB9D5FD9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9D5FB7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB010A26: ??? | |
==182== by 0xB0109F7: ??? | |
==182== by 0xB010A28: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB0109F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB017CB6: ??? | |
==182== by 0xB017C87: ??? | |
==182== by 0xB017CB8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB017C87: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB950A86: ??? | |
==182== by 0xB950A57: ??? | |
==182== by 0xB950A88: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB950A57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9EB086: ??? | |
==182== by 0xB9EB057: ??? | |
==182== by 0xB9EB088: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9EB057: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB94E1E6: ??? | |
==182== by 0xB94E1B7: ??? | |
==182== by 0xB94E1E8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB94E1B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7CF3092: ??? | |
==182== by 0x7CF3077: ??? | |
==182== by 0x7CF3095: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7CF3077: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7CFAAF2: ??? | |
==182== by 0x7CFAAD7: ??? | |
==182== by 0x7CFAAF5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7CFAAD7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7D14C65: ??? | |
==182== by 0x7D14C07: ??? | |
==182== by 0x7D14C68: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7D14C07: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0x7D853EE: ??? | |
==182== by 0x7D853B7: ??? | |
==182== by 0x7D853F1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7D853B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7DA42C6: ??? | |
==182== by 0x7DA42A7: ??? | |
==182== by 0x7DA42C9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7DA42A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7DB7C16: ??? | |
==182== by 0x7DB7BF7: ??? | |
==182== by 0x7DB7C19: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7DB7BF7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7D1C986: ??? | |
==182== by 0x7D1C957: ??? | |
==182== by 0x7D1C988: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7D1C957: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7D1E0F6: ??? | |
==182== by 0x7D1E0C7: ??? | |
==182== by 0x7D1E0F8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7D1E0C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9EFFC6: ??? | |
==182== by 0xB9EFF97: ??? | |
==182== by 0xB9EFFC8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9EFF97: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB9F0DC6: ??? | |
==182== by 0xB9F0D97: ??? | |
==182== by 0xB9F0DC8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB9F0D97: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7CE08F6: ??? | |
==182== by 0x7CE08C7: ??? | |
==182== by 0x7CE08F8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7CE08C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB1A3E52: ??? | |
==182== by 0xB1A3E37: ??? | |
==182== by 0xB1A3E55: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1A3E37: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xB1A5A82: ??? | |
==182== by 0xB1A5A67: ??? | |
==182== by 0xB1A5A85: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xB1A5A67: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBA6D705: ??? | |
==182== by 0xBA6D6A7: ??? | |
==182== by 0xBA6D708: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBA6D6A7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0x48E5E6E: ??? | |
==182== by 0x48E5E37: ??? | |
==182== by 0x48E5E71: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x48E5E37: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBAD0086: ??? | |
==182== by 0xBAD0067: ??? | |
==182== by 0xBAD0089: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBAD0067: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4982E96: ??? | |
==182== by 0x4982E77: ??? | |
==182== by 0x4982E99: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4982E77: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4A8F7A6: ??? | |
==182== by 0x4A8F777: ??? | |
==182== by 0x4A8F7A8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4A8F777: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBF50A56: ??? | |
==182== by 0xBF50A27: ??? | |
==182== by 0xBF50A58: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBF50A27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4A91016: ??? | |
==182== by 0x4A90FE7: ??? | |
==182== by 0x4A91018: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4A90FE7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBF4DFF2: ??? | |
==182== by 0xBF4DFD7: ??? | |
==182== by 0xBF4DFF5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBF4DFD7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBF66762: ??? | |
==182== by 0xBF66747: ??? | |
==182== by 0xBF66765: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBF66747: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBAEEBE5: ??? | |
==182== by 0xBAEEB87: ??? | |
==182== by 0xBAEEBE8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBAEEB87: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0x4CAA99E: ??? | |
==182== by 0x4CAA967: ??? | |
==182== by 0x4CAA9A1: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4CAA967: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8962: ??? | |
==182== by 0x4C94A5E: ??? | |
==182== by 0x4C949C7: ??? | |
==182== by 0x4C94A61: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4C949C7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4BFD886: ??? | |
==182== by 0x4BFD867: ??? | |
==182== by 0x4BFD889: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4BFD867: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4C96F76: ??? | |
==182== by 0x4C96F57: ??? | |
==182== by 0x4C96F79: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4C96F57: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4A77CC6: ??? | |
==182== by 0x4A77C97: ??? | |
==182== by 0x4A77CC8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4A77C97: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBAF4FD6: ??? | |
==182== by 0xBAF4FA7: ??? | |
==182== by 0xBAF4FD8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBAF4FA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4B3E626: ??? | |
==182== by 0x4B3E5F7: ??? | |
==182== by 0x4B3E628: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4B3E5F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4B36EC6: ??? | |
==182== by 0x4B36E97: ??? | |
==182== by 0x4B36EC8: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4B36E97: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4B37826: ??? | |
==182== by 0x4B377F7: ??? | |
==182== by 0x4B37828: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4B377F7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBF90D82: ??? | |
==182== by 0xBF90D67: ??? | |
==182== by 0xBF90D85: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBF90D67: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7C34DC2: ??? | |
==182== by 0x7C34DA7: ??? | |
==182== by 0x7C34DC5: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7C34DA7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x4B80D85: ??? | |
==182== by 0x4B80D27: ??? | |
==182== by 0x4B80D88: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x4B80D27: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x7C0B0A6: ??? | |
==182== by 0x7C0B087: ??? | |
==182== by 0x7C0B0A9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x7C0B087: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xBFA10B6: ??? | |
==182== by 0xBFA1097: ??? | |
==182== by 0xBFA10B9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xBFA1097: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x9EE2D66: ??? | |
==182== by 0x9EE2D47: ??? | |
==182== by 0x9EE2D69: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x9EE2D47: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x9F624D6: ??? | |
==182== by 0x9F624B7: ??? | |
==182== by 0x9F624D9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x9F624B7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x9F7FF36: ??? | |
==182== by 0x9F7FF17: ??? | |
==182== by 0x9F7FF39: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x9F7FF17: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0x9F82CA6: ??? | |
==182== by 0x9F82C87: ??? | |
==182== by 0x9F82CA9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0x9F82C87: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA0AB1F6: ??? | |
==182== by 0xA0AB1D7: ??? | |
==182== by 0xA0AB1F9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA0AB1D7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA0DFAB6: ??? | |
==182== by 0xA0DFA97: ??? | |
==182== by 0xA0DFAB9: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA0DFA97: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA24C176: ??? | |
==182== by 0xA24C157: ??? | |
==182== by 0xA24C179: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA24C157: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA220206: ??? | |
==182== by 0xA2201E7: ??? | |
==182== by 0xA220209: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA2201E7: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA09F546: ??? | |
==182== by 0xA09F527: ??? | |
==182== by 0xA09F549: ??? | |
==182== by 0x4A8312F: ??? | |
==182== by 0xA09F527: ??? | |
==182== | |
==182== Conditional jump or move depends on uninitialised value(s) | |
==182== at 0xBDF8940: ??? | |
==182== by 0xA0E2A76: ??? | |