Skip to content

Instantly share code, notes, and snippets.

@enumag
Created June 15, 2020 08:59
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save enumag/42402fcc05d9a404656f50a51fb98d2b to your computer and use it in GitHub Desktop.
Save enumag/42402fcc05d9a404656f50a51fb98d2b to your computer and use it in GitHub Desktop.
PHP Bug #79646 Segmentation fault in garbage collector
==182== Memcheck, a memory error detector
==182== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==182== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info
==182== Command: php vendor/bin/phpunit
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x267: ???
==182== by 0x266: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x48E6205: ???
==182== by 0x1CE: ???
==182== by 0x97: ???
==182== by 0x404ED16: strlcat (in /lib/ld-musl-x86_64.so.1)
==182== by 0x48E6205: ???
==182== by 0x13103DF: ???
==182== by 0x266: ???
==182== by 0x131783F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x64616F6C6F747560: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x7265736F706D6F62: ???
==182== by 0x616F6C6F7475612E: ???
==182== by 0x702E6C6165725F63: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x7265736F706D6F62: ???
==182== by 0x6F4C7373616C432E: ???
==182== by 0x7068702E72656460: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F6E61747370686F: ???
==182== by 0x2F6E61747370686F: ???
==182== by 0x61727473746F6F61: ???
==182== by 0x4F6EA44E00000005: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F7362616C63796C: ???
==182== by 0x706F632D70656563: ???
==182== by 0x65442F6372732F78: ???
==182== by 0x642F79706F437064: ???
==182== by 0x79706F635F706564: ???
==182== by 0x4F6EA44ED4641442: ???
==182== by 0x1FFEFFB84F: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F74696E7570686F: ???
==182== by 0x2F74696E7570686F: ???
==182== by 0x6D6172462F637272: ???
==182== by 0x73412F6B726F7764: ???
==182== by 0x6E75462F74726572: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x1FFEFFB84F: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x6C6C6966796C6F6F: ???
==182== by 0x622F30387068702C: ???
==182== by 0x7061727473746F6E: ???
==182== by 0x6E75462F74726572: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x1FFE007067: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x7461636572706563: ???
==182== by 0x746E6F632D6E6F68: ???
==182== by 0x75662F7374636171: ???
==182== by 0x702E6E6F6974636D: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x1FFE007067: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6D612F7068706D60: ???
==182== by 0x75662F62696C2F6F: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0xAB07FA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6D612F7068706D60: ???
==182== by 0x6E492F62696C2F6F: ???
==182== by 0x662F6C616E726573: ???
==182== by 0x736E6F6974636E74: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x79622F7068706D60: ???
==182== by 0x61657274732D6573: ???
==182== by 0x75662F62696C2F6C: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x642F736E6F697462: ???
==182== by 0x7068702E706D74: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x522F676E69727472: ???
==182== by 0x73656372756F7364: ???
==182== by 0x6F6974636E75662E: ???
==182== by 0x727473746F6F622E: ???
==182== by 0x7068702E7060: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x72742F7963617273: ???
==182== by 0x2F6372732F796360: ???
==182== by 0x68732F7963617253: ???
==182== by 0x2E7374756374726E: ???
==182== by 0x72007068702E736D: ???
==182== by 0x7068702E7060: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x79732F7068706D60: ???
==182== by 0x662F6372732F636D: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x2E7374756374726E: ???
==182== by 0x720070680070686F: ???
==182== by 0x7068702E7060: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F73616E696D616B: ???
==182== by 0x2D73616E696D616B: ???
==182== by 0x6D617266646E6579: ???
==182== by 0x72622D6B726F7764: ???
==182== by 0x6372732F65676468: ???
==182== by 0x616F6C6F7475612E: ???
==182== by 0x1F00000003: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5D86EC: ??? (in /usr/local/bin/php)
==182== by 0x5E059D: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x64616F6C6F747560: ???
==182== by 0x608497: zend_hash_update (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x65732F7068706D60: ???
==182== by 0x74617A696C616971: ???
==182== by 0x2F6372732F6E6F68: ???
==182== by 0x6E6F6974636E7565: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x61702F7068706D60: ???
==182== by 0x6C2F6C656C6C6171: ???
==182== by 0x65746E6F432F6268: ???
==182== by 0x74636E75662F7477: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0xACB9BDF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x69662F7068706D60: ???
==182== by 0x662F6372732F656B: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x6974636E75662F71: ???
==182== by 0x7068702E736E6E: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x646E617265766163: ???
==182== by 0x6E6462696C2F6D6E: ???
==182== by 0x75662F6372732F72: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x7068702E706171: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6E642F7068706D60: ???
==182== by 0x75662F62696C2F72: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x7068700070686F: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x752F65756761656B: ???
==182== by 0x65737261702D6971: ???
==182== by 0x75662F6372732F71: ???
==182== by 0x5F736E6F6974636D: ???
==182== by 0x2E6564756C636E68: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x74682F7068706D60: ???
==182== by 0x662F6372732F7073: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x2E6564750070686F: ???
==182== by 0x70686F: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6F732F7068706D60: ???
==182== by 0x6372732F74656B62: ???
==182== by 0x6F6974636E75662E: ???
==182== by 0x2E736E007068702D: ???
==182== by 0x2E6564750070686F: ???
==182== by 0x70686F: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x746E6575716F6C64: ???
==182== by 0x732F796E6F68702E: ???
==182== by 0x6974696E692F6371: ???
==182== by 0x68702E657A696C60: ???
==182== by 0x1FFEFFB6FF: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E9B29: ??? (in /usr/local/bin/php)
==182== by 0x5E047D: ??? (in /usr/local/bin/php)
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6F6C2F7068706D60: ???
==182== by 0x75662F6372732F66: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0x10FF: ???
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x65722F7068706D60: ???
==182== by 0x706164612D746360: ???
==182== by 0x2F6374652F726573: ???
==182== by 0x2E79726F74636145: ???
==182== by 0x10FF: ???
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x74682F7068706D60: ???
==182== by 0x6E65696C632D7073: ???
==182== by 0x6E492F6372732F73: ???
==182== by 0x662F6C616E726573: ???
==182== by 0x736E6F6974636E74: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x752F7965736D6171: ???
==182== by 0x2F6372732F646974: ???
==182== by 0x6E6F6974636E7565: ???
==182== by 0x662F6C616E726573: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x7068702D: ???
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x74682F7068706D60: ???
==182== by 0x65767265732D7073: ???
==182== by 0x694D2F6372732F71: ???
==182== by 0x65726177656C6463: ???
==182== by 0x6F6974636E75662E: ???
==182== by 0x7068702D: ???
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x746E6575716F6C64: ???
==182== by 0x702D796E6F68702E: ???
==182== by 0x732F74696E757067: ???
==182== by 0x6974696E692F6371: ???
==182== by 0x68702E657A696C60: ???
==182== by 0x7068702E736D: ???
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x61662F63696B696D: ???
==182== by 0x6574756F722D7472: ???
==182== by 0x6E75662F6372732E: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0x580043FF: vgMemCheck_new_block (mc_malloc_wrappers.c:387)
==182== by 0x48A1849: realloc (vg_replace_malloc.c:836)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6F702F7068706D60: ???
==182== by 0x732F736572677472: ???
==182== by 0x74636E75662F6371: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0x7068702E73007067: ???
==182== by 0x580043FF: vgMemCheck_new_block (mc_malloc_wrappers.c:387)
==182== by 0x48A1849: realloc (vg_replace_malloc.c:836)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F6769666E6F632E: ???
==182== by 0x61727473746F6F61: ???
==182== by 0x2: ???
==182== by 0x1FFEFFBAFF: ???
==182== by 0x5B91B9: _php_stream_fopen (in /usr/local/bin/php)
==182== by 0x1FFEFFCBFF: ???
==182== by 0x9E33F97: ???
==182== by 0x9E33F97: ???
==182== by 0x3: ???
==182== by 0x7BA317F: ???
==182== by 0xBB6B90F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x64616F6C6F747560: ???
==182== by 0x1FFEFFB6F7: ???
==182== by 0x4094D83: ???
==182== by 0x404E07A: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0xBB5CB5F: ???
==182== by 0x7FFFFFFFFFFFFFFF: ???
==182== by 0xBA96BAF: ???
==182== by 0xBB524EF: ???
==182== by 0xBB607AB: ???
==182== by 0xFFFFFFFFFFFFFFFE: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x442F766E65746F63: ???
==182== by 0x68702E766E65746E: ???
==182== by 0x6C6C6F430070686F: ???
==182== by 0x702E6E6F69746364: ???
==182== by 0x706870007067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x61682D726F727264: ???
==182== by 0x65442F72656C646D: ???
==182== by 0x7373616C43677561: ???
==182== by 0x702E726564616F4B: ???
==182== by 0x5E4564: ??? (in /usr/local/bin/php)
==182== by 0x5E3AE6: ??? (in /usr/local/bin/php)
==182== by 0xBBD3E7F: ???
==182== by 0x1102: ???
==182== by 0x58004737: vgMemCheck___builtin_vec_delete (mc_malloc_wrappers.c:530)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F676F6C2F72736F: ???
==182== by 0x2F676F4C2F72734F: ???
==182== by 0x6C6576654C676F4B: ???
==182== by 0x4F6EA44ED4641442: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F78796E6F626576: ???
==182== by 0x2D6C716870617266: ???
==182== by 0x2F6372732F70686F: ???
==182== by 0x2E4C516870617246: ???
==182== by 0xA1E333F: ???
==182== by 0x89: ???
==182== by 0xA6CAFE7: ???
==182== by 0x78: ???
==182== by 0x1FFEFFB8BF: ???
==182== by 0xA1E333F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F74696E7570686F: ???
==182== by 0x656C69662D70686F: ???
==182== by 0x6F7461726574692C: ???
==182== by 0x61462F6372732F71: ???
==182== by 0x7068702E65646162: ???
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x27: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9F2: ???
==182== by 0x4A8312F: ???
==182== by 0xA36A9C7: ???
==182== Address 0xa36a9ef is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9F2: ???
==182== by 0x4A8312F: ???
==182== by 0xA36A9C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E102: ???
==182== by 0x4A8312F: ???
==182== by 0xA36E0D7: ???
==182== Address 0xa36e0ff is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E102: ???
==182== by 0x4A8312F: ???
==182== by 0xA36E0D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA3715A7: ???
==182== by 0xA3715A7: ???
==182== by 0xA3715D7: ???
==182== by 0x4A8312F: ???
==182== by 0xA3715A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA374117: ???
==182== by 0xA374117: ???
==182== by 0xA37414C: ???
==182== by 0x4A8312F: ???
==182== by 0xA374117: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37B067: ???
==182== by 0xA37B067: ???
==182== by 0xA37B091: ???
==182== by 0x4A8312F: ???
==182== by 0xA37B067: ???
==182== Address 0xa37b08f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37B067: ???
==182== by 0xA37B067: ???
==182== by 0xA37B091: ???
==182== by 0x4A8312F: ???
==182== by 0xA37B067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA374547: ???
==182== by 0xA374547: ???
==182== by 0xA374567: ???
==182== by 0x4A8312F: ???
==182== by 0xA374547: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37B7E7: ???
==182== by 0xA37B7E7: ???
==182== by 0xA37B806: ???
==182== by 0x4A8312F: ???
==182== by 0xA37B7E7: ???
==182== Address 0xa37b7ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DCA4: ???
==182== by 0x4A8312F: ???
==182== by 0xA37DC87: ???
==182== Address 0xa37dc9f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DCA4: ???
==182== by 0x4A8312F: ???
==182== by 0xA37DC87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37F087: ???
==182== by 0xA37F087: ???
==182== by 0xA37F0A7: ???
==182== by 0x4A8312F: ???
==182== by 0xA37F087: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB42: ???
==182== by 0x4A8312F: ???
==182== by 0xA37FB27: ???
==182== Address 0xa37fb3f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB42: ???
==182== by 0x4A8312F: ???
==182== by 0xA37FB27: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA3807E7: ???
==182== by 0xA3807E7: ???
==182== by 0xA380802: ???
==182== by 0x4A8312F: ???
==182== by 0xA3807E7: ???
==182== Address 0xa3807ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA3807E7: ???
==182== by 0xA3807E7: ???
==182== by 0xA380802: ???
==182== by 0x4A8312F: ???
==182== by 0xA3807E7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF9235: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31CA3: ???
==182== by 0x4A8312F: ???
==182== by 0x7C31C67: ???
==182== Address 0x7c31c9e is 78 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php)
==182== by 0x5E0CA1: ??? (in /usr/local/bin/php)
==182== by 0x5E9AE9: ??? (in /usr/local/bin/php)
==182== by 0x5E047D: ??? (in /usr/local/bin/php)
==182== by 0x5E4F12: ??? (in /usr/local/bin/php)
==182== by 0x5E7725: ??? (in /usr/local/bin/php)
==182== by 0x5E8716: ??? (in /usr/local/bin/php)
==182== by 0x5E77FE: ??? (in /usr/local/bin/php)
==182== by 0x5E8D4F: ??? (in /usr/local/bin/php)
==182== by 0x5E7813: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF9266: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31CA3: ???
==182== by 0x4A8312F: ???
==182== by 0x7C31C67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAC012A0: ???
==182== by 0xAC01287: ???
==182== by 0xAC012A3: ???
==182== by 0x4A8312F: ???
==182== by 0xAC01287: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xABFC400: ???
==182== by 0xABFC3E7: ???
==182== by 0xABFC403: ???
==182== by 0x4A8312F: ???
==182== by 0xABFC3E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA62A9E0: ???
==182== by 0xA62A9C7: ???
==182== by 0xA62A9E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA62A9C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x62694C2F6372732E: ???
==182== by 0x7365542F79726171: ???
==182== by 0x6F666D79532F7373: ???
==182== by 0x74736E6F432F796D: ???
==182== by 0x61422F746E696171: ???
==182== by 0x6E756F6363416B6D: ???
==182== by 0x746164696C615673: ???
==182== by 0x702E74736554726E: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x6F746164696C6175: ???
==182== by 0x432F747365542F71: ???
==182== by 0x6E69617274736E6E: ???
==182== by 0x746164696C615673: ???
==182== by 0x614374736554726E: ???
==182== by 0xF: ???
==182== by 0x5EE72A57: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF7641: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88E4: ???
==182== by 0x4A8312F: ???
==182== by 0xA2D88C7: ???
==182== Address 0xa2d88de is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x5C3E32: compile_filename (in /usr/local/bin/php)
==182== by 0x645BA6: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88E4: ???
==182== by 0x4A8312F: ???
==182== by 0xA2D88C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0x4A7A9B7: ???
==182== by 0x4A7A9B7: ???
==182== by 0x4A7A9C8: ???
==182== by 0x4A8312F: ???
==182== by 0x4A7A9B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0xA5BD7E7: ???
==182== by 0xA5BD7E7: ???
==182== by 0xA5BD807: ???
==182== by 0x4A8312F: ???
==182== by 0xA5BD7E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0xAB67CC7: ???
==182== by 0xAB67CC7: ???
==182== by 0xAB67CE7: ???
==182== by 0x4A8312F: ???
==182== by 0xAB67CC7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF7641: ???
==182== by 0x9E91367: ???
==182== by 0x9E91367: ???
==182== by 0x9E91384: ???
==182== by 0x4A8312F: ???
==182== by 0x9E91367: ???
==182== Address 0x9e9137e is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php)
==182== by 0x5E0CA1: ??? (in /usr/local/bin/php)
==182== by 0x5E9AE9: ??? (in /usr/local/bin/php)
==182== by 0x5E047D: ??? (in /usr/local/bin/php)
==182== by 0x5E4814: ??? (in /usr/local/bin/php)
==182== by 0x5E3B74: ??? (in /usr/local/bin/php)
==182== by 0x5E059D: ??? (in /usr/local/bin/php)
==182== by 0x5E68F6: ??? (in /usr/local/bin/php)
==182== by 0x5E04DD: ??? (in /usr/local/bin/php)
==182== by 0x5E768E: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0x9E91367: ???
==182== by 0x9E91367: ???
==182== by 0x9E91384: ???
==182== by 0x4A8312F: ???
==182== by 0x9E91367: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA660DFF: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6B3669: ???
==182== by 0xA6B3627: ???
==182== by 0xA6B366C: ???
==182== by 0x4A8312F: ???
==182== by 0xA6B3627: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF8403: ???
==182== by 0xA66119C: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xA66119C: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA66136F: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF83BF: ???
==182== by 0xA661CAE: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA661CAE: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6EDAF1: ???
==182== by 0xA6EDAA7: ???
==182== by 0xA6EDAF7: ???
==182== by 0x4A8312F: ???
==182== by 0xA6EDAA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA241404: ???
==182== by 0xA2413C7: ???
==182== by 0xA241407: ???
==182== by 0x4A8312F: ???
==182== by 0xA2413C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA2096D7: ???
==182== by 0xA209697: ???
==182== by 0xA2096DC: ???
==182== by 0x4A8312F: ???
==182== by 0xA209697: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA75E510: ???
==182== by 0xA75E4C7: ???
==182== by 0xA75E513: ???
==182== by 0x4A8312F: ???
==182== by 0xA75E4C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA64DF23: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA762776: ???
==182== by 0xA762737: ???
==182== by 0xA762779: ???
==182== by 0x4A8312F: ???
==182== by 0xA762737: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA2FE8CF: ???
==182== by 0xA2FE867: ???
==182== by 0xA2FE8D2: ???
==182== by 0x4A8312F: ???
==182== by 0xA2FE867: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xA2F9DFB: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x62694C2F6372732E: ???
==182== by 0x7365542F79726171: ???
==182== by 0x736C6974552F7373: ???
==182== by 0x614379656E6F4D2E: ???
==182== by 0x6F6974616C75636B: ???
==182== by 0x702E74736554736D: ???
==182== by 0x657A796B: ???
==182== by 0xAFBFD7F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB064135: ???
==182== by 0xB0640C7: ???
==182== by 0xB064138: ???
==182== by 0x4A8312F: ???
==182== by 0xB0640C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB178D00: ???
==182== by 0xB178CD7: ???
==182== by 0xB178D03: ???
==182== by 0x4A8312F: ???
==182== by 0xB178CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0D1553: ???
==182== by 0xB0D1527: ???
==182== by 0xB0D1558: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D1527: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x62694C2F6372732E: ???
==182== by 0x6C61562F79726171: ???
==182== by 0x7463656A624F6574: ???
==182== by 0x702E657461442F72: ???
==182== by 0x7F: ???
==182== by 0x1101: ???
==182== by 0x4F6EA44ED4641442: ???
==182== by 0x1FFEFFB1BF: ???
==182== by 0xD: ???
==182== by 0x1FFEFFB12F: ???
==182== by 0x4045629: fstatat (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB20C501: ???
==182== by 0xB20C4D7: ???
==182== by 0xB20C504: ???
==182== by 0x4A8312F: ???
==182== by 0xB20C4D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0C6B44: ???
==182== by 0xB0C6B17: ???
==182== by 0xB0C6B49: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6B17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0C6C5F: ???
==182== by 0xB0C6C27: ???
==182== by 0xB0C6C64: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6C27: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF8403: ???
==182== by 0xB0C6EF0: ???
==182== by 0xB0C6EC7: ???
==182== by 0xB0C6F43: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6EC7: ???
==182== Address 0xb0c6f3f is 143 bytes inside a block of size 152 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xB0C6EF0: ???
==182== by 0xB0C6EC7: ???
==182== by 0xB0C6F43: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6EC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7BF093D: ???
==182== by 0x7BF08B7: ???
==182== by 0x7BF0940: ???
==182== by 0x4A8312F: ???
==182== by 0x7BF08B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xAF79BF0: ???
==182== by 0xAF79B67: ???
==182== by 0xAF79BF5: ???
==182== by 0x4A8312F: ???
==182== by 0xAF79B67: ???
==182==
==182==
==182== More than 100 errors detected. Subsequent errors
==182== will still be recorded, but in less detail than before.
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB39C0ED: ???
==182== by 0xB39C0C7: ???
==182== by 0xB39C0F0: ???
==182== by 0x4A8312F: ???
==182== by 0xB39C0C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB39DB8E: ???
==182== by 0xB39DB57: ???
==182== by 0xB39DB91: ???
==182== by 0x4A8312F: ???
==182== by 0xB39DB57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0D3741: ???
==182== by 0xB0D3707: ???
==182== by 0xB0D3746: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D3707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB268CAD: ???
==182== by 0xB268C87: ???
==182== by 0xB268CB0: ???
==182== by 0x4A8312F: ???
==182== by 0xB268C87: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF526D: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E84: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D3E67: ???
==182== Address 0xb0d3e7e is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF5296: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E84: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D3E67: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF526D: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C1601: ???
==182== by 0x4A8312F: ???
==182== by 0xB1C15D7: ???
==182== Address 0xb1c15fe is 62 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x5C3E32: compile_filename (in /usr/local/bin/php)
==182== by 0x645BA6: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF5296: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C1601: ???
==182== by 0x4A8312F: ???
==182== by 0xB1C15D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF5296: ???
==182== by 0xB0D55D7: ???
==182== by 0xB0D55D7: ???
==182== by 0xB0D55FA: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D55D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF526D: ???
==182== by 0xB0D54D7: ???
==182== by 0xB0D54D7: ???
==182== by 0xB0D54F5: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D54D7: ???
==182== Address 0xb0d54ee is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB25B6BA: ???
==182== by 0xB25B697: ???
==182== by 0xB25B6BD: ???
==182== by 0x4A8312F: ???
==182== by 0xB25B697: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF8403: ???
==182== by 0xB1B78BD: ???
==182== by 0xB1B7897: ???
==182== by 0xB1B78C2: ???
==182== by 0x4A8312F: ???
==182== by 0xB1B7897: ???
==182== Address 0xb1b78bf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xB1B78BD: ???
==182== by 0xB1B7897: ???
==182== by 0xB1B78C2: ???
==182== by 0x4A8312F: ???
==182== by 0xB1B7897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB423634: ???
==182== by 0xB423617: ???
==182== by 0xB423637: ???
==182== by 0x4A8312F: ???
==182== by 0xB423617: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB1DC327: ???
==182== by 0xB1DC307: ???
==182== by 0xB1DC32C: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DC307: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF46C5: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE85: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DCE67: ???
==182== Address 0xb1dce7e is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF46EE: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE85: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DCE67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB50B5A5: ???
==182== by 0xB50B587: ???
==182== by 0xB50B5A8: ???
==182== by 0x4A8312F: ???
==182== by 0xB50B587: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB4E4C77: ???
==182== by 0xB4E4C77: ???
==182== by 0xB4E4C86: ???
==182== by 0x4A8312F: ???
==182== by 0xB4E4C77: ???
==182== Address 0xb4e4c7f is 31 bytes inside a block of size 40 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB58B677: ???
==182== by 0xB58B677: ???
==182== by 0xB58B6AA: ???
==182== by 0x4A8312F: ???
==182== by 0xB58B677: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB298FC7: ???
==182== by 0xB298FC7: ???
==182== by 0xB298FD6: ???
==182== by 0x4A8312F: ???
==182== by 0xB298FC7: ???
==182== Address 0xb298fcf is 31 bytes inside a block of size 40 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB577847: ???
==182== by 0xB577847: ???
==182== by 0xB57787A: ???
==182== by 0x4A8312F: ???
==182== by 0xB577847: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB22: ???
==182== by 0x4A8312F: ???
==182== by 0xB57EB07: ???
==182== Address 0xb57eb1f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB22: ???
==182== by 0x4A8312F: ???
==182== by 0xB57EB07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5873A7: ???
==182== by 0xB5873A7: ???
==182== by 0xB5873DC: ???
==182== by 0x4A8312F: ???
==182== by 0xB5873A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB58C9F7: ???
==182== by 0xB58C9F7: ???
==182== by 0xB58CA18: ???
==182== by 0x4A8312F: ???
==182== by 0xB58C9F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB58CF07: ???
==182== by 0xB58CF07: ???
==182== by 0xB58CF38: ???
==182== by 0x4A8312F: ???
==182== by 0xB58CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB597827: ???
==182== by 0xB597827: ???
==182== by 0xB597858: ???
==182== by 0x4A8312F: ???
==182== by 0xB597827: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5A5C17: ???
==182== by 0xB5A5C17: ???
==182== by 0xB5A5C4C: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A5C17: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86D5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A86A7: ???
==182== Address 0xb5a86cf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86D5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A86A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5A33D7: ???
==182== by 0xB5A33D7: ???
==182== by 0xB5A3409: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A33D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47E3: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B47B7: ???
==182== Address 0xb5b47df is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47E3: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B47B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B3DD7: ???
==182== by 0xB5B3DD7: ???
==182== by 0xB5B3E07: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B3DD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB59A357: ???
==182== by 0xB59A357: ???
==182== by 0xB59A385: ???
==182== by 0x4A8312F: ???
==182== by 0xB59A357: ???
==182== Address 0xb59a37f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB59A357: ???
==182== by 0xB59A357: ???
==182== by 0xB59A385: ???
==182== by 0x4A8312F: ???
==182== by 0xB59A357: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB63: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BEB37: ???
==182== Address 0xb5beb5f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB63: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BEB37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BEE37: ???
==182== by 0xB5BEE37: ???
==182== by 0xB5BEE69: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BEE37: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5BF6B7: ???
==182== by 0xB5BF6B7: ???
==182== by 0xB5BF6E6: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BF6B7: ???
==182== Address 0xb5bf6df is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DE5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B0DB7: ???
==182== Address 0xb5b0ddf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DE5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B0DB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B1D27: ???
==182== by 0xB5B1D27: ???
==182== by 0xB5B1D56: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B1D27: ???
==182== Address 0xb5b1d4f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8F14: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B8EE7: ???
==182== Address 0xb5b8f0f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8F14: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B8EE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BAB47: ???
==182== by 0xB5BAB47: ???
==182== by 0xB5BAB7B: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BAB47: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B6400: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B63C7: ???
==182== Address 0xb5b63ff is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B6400: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B63C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD340: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BD307: ???
==182== Address 0xb5bd33f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD340: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BD307: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2535: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C2507: ???
==182== Address 0xb5c252f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2535: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C2507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5C4127: ???
==182== by 0xB5C4127: ???
==182== by 0xB5C4157: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C4127: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D52: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C5D27: ???
==182== Address 0xb5c5d4f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D52: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C5D27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5D56C7: ???
==182== by 0xB5D56C7: ???
==182== by 0xB5D56EC: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D56C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6361: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D6337: ???
==182== Address 0xb5d635f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6361: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D6337: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5CBAB7: ???
==182== by 0xB5CBAB7: ???
==182== by 0xB5CBAFB: ???
==182== by 0x4A8312F: ???
==182== by 0xB5CBAB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5EADC7: ???
==182== by 0xB5EADC7: ???
==182== by 0xB5EADFA: ???
==182== by 0x4A8312F: ???
==182== by 0xB5EADC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5ECDB7: ???
==182== by 0xB5ECDB7: ???
==182== by 0xB5ECDEA: ???
==182== by 0x4A8312F: ???
==182== by 0xB5ECDB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5F7857: ???
==182== by 0xB5F7857: ???
==182== by 0xB5F788C: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F7857: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5F90D7: ???
==182== by 0xB5F90D7: ???
==182== by 0xB5F911A: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F90D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA265: ???
==182== by 0x4A8312F: ???
==182== by 0xB5FA227: ???
==182== Address 0xb5fa25f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA265: ???
==182== by 0x4A8312F: ???
==182== by 0xB5FA227: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5D90D7: ???
==182== by 0xB5D90D7: ???
==182== by 0xB5D9118: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D90D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB607FF7: ???
==182== by 0xB607FF7: ???
==182== by 0xB608024: ???
==182== by 0x4A8312F: ???
==182== by 0xB607FF7: ???
==182== Address 0xb60801f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB607FF7: ???
==182== by 0xB607FF7: ???
==182== by 0xB608024: ???
==182== by 0x4A8312F: ???
==182== by 0xB607FF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60B217: ???
==182== by 0xB60B217: ???
==182== by 0xB60B247: ???
==182== by 0x4A8312F: ???
==182== by 0xB60B217: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AF5: ???
==182== by 0x4A8312F: ???
==182== by 0xB609AC7: ???
==182== Address 0xb609aef is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AF5: ???
==182== by 0x4A8312F: ???
==182== by 0xB609AC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6089D7: ???
==182== by 0xB6089D7: ???
==182== by 0xB608A08: ???
==182== by 0x4A8312F: ???
==182== by 0xB6089D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB60B877: ???
==182== by 0xB60B877: ???
==182== by 0xB60B8B4: ???
==182== by 0x4A8312F: ???
==182== by 0xB60B877: ???
==182== Address 0xb60b8af is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60B877: ???
==182== by 0xB60B877: ???
==182== by 0xB60B8B4: ???
==182== by 0x4A8312F: ???
==182== by 0xB60B877: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60D6D7: ???
==182== by 0xB60D6D7: ???
==182== by 0xB60D709: ???
==182== by 0x4A8312F: ???
==182== by 0xB60D6D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB60DE97: ???
==182== by 0xB60DE97: ???
==182== by 0xB60DEC6: ???
==182== by 0x4A8312F: ???
==182== by 0xB60DE97: ???
==182== Address 0xb60debf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB608DE7: ???
==182== by 0xB608DE7: ???
==182== by 0xB608E19: ???
==182== by 0x4A8312F: ???
==182== by 0xB608DE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60F3B7: ???
==182== by 0xB60F3B7: ???
==182== by 0xB60F3E8: ???
==182== by 0x4A8312F: ???
==182== by 0xB60F3B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB604DA7: ???
==182== by 0xB604DA7: ???
==182== by 0xB604DC7: ???
==182== by 0x4A8312F: ???
==182== by 0xB604DA7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB61C797: ???
==182== by 0xB61C797: ???
==182== by 0xB61C7B3: ???
==182== by 0x4A8312F: ???
==182== by 0xB61C797: ???
==182== Address 0xb61c7af is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB61C797: ???
==182== by 0xB61C797: ???
==182== by 0xB61C7B3: ???
==182== by 0x4A8312F: ???
==182== by 0xB61C797: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB6259E7: ???
==182== by 0xB6259E7: ???
==182== by 0xB625A00: ???
==182== by 0x4A8312F: ???
==182== by 0xB6259E7: ???
==182== Address 0xb6259ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6259E7: ???
==182== by 0xB6259E7: ???
==182== by 0xB625A00: ???
==182== by 0x4A8312F: ???
==182== by 0xB6259E7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB619A07: ???
==182== by 0xB619A07: ???
==182== by 0xB619A24: ???
==182== by 0x4A8312F: ???
==182== by 0xB619A07: ???
==182== Address 0xb619a1f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB619A07: ???
==182== by 0xB619A07: ???
==182== by 0xB619A24: ???
==182== by 0x4A8312F: ???
==182== by 0xB619A07: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB61A907: ???
==182== by 0xB61A907: ???
==182== by 0xB61A924: ???
==182== by 0x4A8312F: ???
==182== by 0xB61A907: ???
==182== Address 0xb61a91f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB61A907: ???
==182== by 0xB61A907: ???
==182== by 0xB61A924: ???
==182== by 0x4A8312F: ???
==182== by 0xB61A907: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5F4C87: ???
==182== by 0xB5F4C87: ???
==182== by 0xB5F4CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F4C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5CA2C7: ???
==182== by 0xB5CA2C7: ???
==182== by 0xB5CA2EA: ???
==182== by 0x4A8312F: ???
==182== by 0xB5CA2C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63D6A7: ???
==182== by 0xB63D6A7: ???
==182== by 0xB63D6C6: ???
==182== by 0x4A8312F: ???
==182== by 0xB63D6A7: ???
==182== Address 0xb63d6bf is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB633667: ???
==182== by 0xB633667: ???
==182== by 0xB633692: ???
==182== by 0x4A8312F: ???
==182== by 0xB633667: ???
==182== Address 0xb63368f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB633667: ???
==182== by 0xB633667: ???
==182== by 0xB633692: ???
==182== by 0x4A8312F: ???
==182== by 0xB633667: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB648207: ???
==182== by 0xB648207: ???
==182== by 0xB648229: ???
==182== by 0x4A8312F: ???
==182== by 0xB648207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB61C827: ???
==182== by 0xB61C827: ???
==182== by 0xB61C84B: ???
==182== by 0x4A8312F: ???
==182== by 0xB61C827: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB632BE7: ???
==182== by 0xB632BE7: ???
==182== by 0xB632C04: ???
==182== by 0x4A8312F: ???
==182== by 0xB632BE7: ???
==182== Address 0xb632bff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB632BE7: ???
==182== by 0xB632BE7: ???
==182== by 0xB632C04: ???
==182== by 0x4A8312F: ???
==182== by 0xB632BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB632647: ???
==182== by 0xB632647: ???
==182== by 0xB63268A: ???
==182== by 0x4A8312F: ???
==182== by 0xB632647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB642CD7: ???
==182== by 0xB642CD7: ???
==182== by 0xB642D1B: ???
==182== by 0x4A8312F: ???
==182== by 0xB642CD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63C527: ???
==182== by 0xB63C527: ???
==182== by 0xB63C555: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C527: ???
==182== Address 0xb63c54f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63C527: ???
==182== by 0xB63C527: ???
==182== by 0xB63C555: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C527: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63C907: ???
==182== by 0xB63C907: ???
==182== by 0xB63C944: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C907: ???
==182== Address 0xb63c93f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63C907: ???
==182== by 0xB63C907: ???
==182== by 0xB63C944: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C907: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB639A57: ???
==182== by 0xB639A57: ???
==182== by 0xB639A87: ???
==182== by 0x4A8312F: ???
==182== by 0xB639A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63ACF7: ???
==182== by 0xB63ACF7: ???
==182== by 0xB63AD29: ???
==182== by 0x4A8312F: ???
==182== by 0xB63ACF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6342D7: ???
==182== by 0xB6342D7: ???
==182== by 0xB6342F8: ???
==182== by 0x4A8312F: ???
==182== by 0xB6342D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB661307: ???
==182== by 0xB661307: ???
==182== by 0xB661356: ???
==182== by 0x4A8312F: ???
==182== by 0xB661307: ???
==182== Address 0xb66134f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63CFA7: ???
==182== by 0xB63CFA7: ???
==182== by 0xB63D00B: ???
==182== by 0x4A8312F: ???
==182== by 0xB63CFA7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E631: ???
==182== by 0x4A8312F: ???
==182== by 0xB65E5D7: ???
==182== Address 0xb65e62f is 111 bytes inside a block of size 120 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E631: ???
==182== by 0x4A8312F: ???
==182== by 0xB65E5D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB65F437: ???
==182== by 0xB65F437: ???
==182== by 0xB65F4A5: ???
==182== by 0x4A8312F: ???
==182== by 0xB65F437: ???
==182== Address 0xb65f49f is 127 bytes inside a block of size 136 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB65F437: ???
==182== by 0xB65F437: ???
==182== by 0xB65F4A5: ???
==182== by 0x4A8312F: ???
==182== by 0xB65F437: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63DE97: ???
==182== by 0xB63DE97: ???
==182== by 0xB63DEC9: ???
==182== by 0x4A8312F: ???
==182== by 0xB63DE97: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F422: ???
==182== by 0x4A8312F: ???
==182== by 0xB63F3D7: ???
==182== Address 0xb63f41f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F422: ???
==182== by 0x4A8312F: ???
==182== by 0xB63F3D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB667587: ???
==182== by 0xB667587: ???
==182== by 0xB6675B7: ???
==182== by 0x4A8312F: ???
==182== by 0xB667587: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB67AA57: ???
==182== by 0xB67AA57: ???
==182== by 0xB67AA7B: ???
==182== by 0x4A8312F: ???
==182== by 0xB67AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB67E967: ???
==182== by 0xB67E967: ???
==182== by 0xB67E988: ???
==182== by 0x4A8312F: ???
==182== by 0xB67E967: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB673C47: ???
==182== by 0xB673C47: ???
==182== by 0xB673C84: ???
==182== by 0x4A8312F: ???
==182== by 0xB673C47: ???
==182== Address 0xb673c7f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB673C47: ???
==182== by 0xB673C47: ???
==182== by 0xB673C84: ???
==182== by 0x4A8312F: ???
==182== by 0xB673C47: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB640627: ???
==182== by 0xB640627: ???
==182== by 0xB640656: ???
==182== by 0x4A8312F: ???
==182== by 0xB640627: ???
==182== Address 0xb64064f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6424B7: ???
==182== by 0xB6424B7: ???
==182== by 0xB64250C: ???
==182== by 0x4A8312F: ???
==182== by 0xB6424B7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB645617: ???
==182== by 0xB645617: ???
==182== by 0xB645646: ???
==182== by 0x4A8312F: ???
==182== by 0xB645617: ???
==182== Address 0xb64563f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB67F2F7: ???
==182== by 0xB67F2F7: ???
==182== by 0xB67F328: ???
==182== by 0x4A8312F: ???
==182== by 0xB67F2F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB68D2C7: ???
==182== by 0xB68D2C7: ???
==182== by 0xB68D2E9: ???
==182== by 0x4A8312F: ???
==182== by 0xB68D2C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBEA2A23: ???
==182== by 0xBEA2A07: ???
==182== by 0xBEA2A26: ???
==182== by 0x4A8312F: ???
==182== by 0xBEA2A07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xBEA569A: ???
==182== by 0xBEA5627: ???
==182== by 0xBEA56A0: ???
==182== by 0x4A8312F: ???
==182== by 0xBEA5627: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7AB37F: ???
==182== by 0xB7AB317: ???
==182== by 0xB7AB385: ???
==182== by 0x4A8312F: ???
==182== by 0xB7AB317: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBEA7BFF: ???
==182== by 0xBEA7B57: ???
==182== by 0xBEA7C05: ???
==182== by 0x4A8312F: ???
==182== by 0xBEA7B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB800657: ???
==182== by 0xB800657: ???
==182== by 0xB8006C1: ???
==182== by 0x4A8312F: ???
==182== by 0xB800657: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB86D0B6: ???
==182== by 0xB86D097: ???
==182== by 0xB86D0BC: ???
==182== by 0x4A8312F: ???
==182== by 0xB86D097: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBEC48A3: ???
==182== by 0xBEC4887: ???
==182== by 0xBEC48A9: ???
==182== by 0x4A8312F: ???
==182== by 0xBEC4887: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x6165522F6372732E: ???
==182== by 0x542F6C65646F4D63: ???
==182== by 0x6172472F73747364: ???
==182== by 0x6363412F4C51686F: ???
==182== by 0x2F676E69746E756E: ???
==182== by 0x69746E756F636340: ???
==182== by 0x696E6167724F676D: ???
==182== by 0x75516E6F69746179: ???
==182== by 0x2E74736554797264: ???
==182== by 0x7070612F7273752E: ???
==182== by 0x6165522F6372732E: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8D0AC0: ???
==182== by 0xB8D0AA7: ???
==182== by 0xB8D0AC3: ???
==182== by 0x4A8312F: ???
==182== by 0xB8D0AA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7A3B22: ???
==182== by 0xB7A3AE7: ???
==182== by 0xB7A3B25: ???
==182== by 0x4A8312F: ???
==182== by 0xB7A3AE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8DF2F2: ???
==182== by 0xB8DF2B7: ???
==182== by 0xB8DF2F5: ???
==182== by 0x4A8312F: ???
==182== by 0xB8DF2B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E1950: ???
==182== by 0xB8E1937: ???
==182== by 0xB8E1953: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E1937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E38D0: ???
==182== by 0xB8E38B7: ???
==182== by 0xB8E38D3: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E38B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E5042: ???
==182== by 0xB8E5007: ???
==182== by 0xB8E5045: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E5007: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8CC27A: ???
==182== by 0xB8CC257: ???
==182== by 0xB8CC27D: ???
==182== by 0x4A8312F: ???
==182== by 0xB8CC257: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB8E8757: ???
==182== by 0xB8E8757: ???
==182== by 0xB8E8778: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E8757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9B7050: ???
==182== by 0xB9B7037: ???
==182== by 0xB9B7053: ???
==182== by 0x4A8312F: ???
==182== by 0xB9B7037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D0B6A0: ???
==182== by 0x7D0B687: ???
==182== by 0x7D0B6A3: ???
==182== by 0x4A8312F: ???
==182== by 0x7D0B687: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D25F90: ???
==182== by 0x7D25F77: ???
==182== by 0x7D25F93: ???
==182== by 0x4A8312F: ???
==182== by 0x7D25F77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x48B2AF0: ???
==182== by 0x48B2AD7: ???
==182== by 0x48B2AF3: ???
==182== by 0x4A8312F: ???
==182== by 0x48B2AD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4C06C60: ???
==182== by 0x4C06C47: ???
==182== by 0x4C06C63: ???
==182== by 0x4A8312F: ???
==182== by 0x4C06C47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C20B70: ???
==182== by 0x7C20B57: ???
==182== by 0x7C20B73: ???
==182== by 0x4A8312F: ???
==182== by 0x7C20B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C77150: ???
==182== by 0x7C77137: ???
==182== by 0x7C77153: ???
==182== by 0x4A8312F: ???
==182== by 0x7C77137: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA53CB40: ???
==182== by 0xA53CB27: ???
==182== by 0xA53CB43: ???
==182== by 0x4A8312F: ???
==182== by 0xA53CB27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0E6220: ???
==182== by 0xA0E6207: ???
==182== by 0xA0E6223: ???
==182== by 0x4A8312F: ???
==182== by 0xA0E6207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA181610: ???
==182== by 0xA1815F7: ???
==182== by 0xA181613: ???
==182== by 0x4A8312F: ???
==182== by 0xA1815F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA21A800: ???
==182== by 0xA21A7E7: ???
==182== by 0xA21A803: ???
==182== by 0x4A8312F: ???
==182== by 0xA21A7E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA07AA60: ???
==182== by 0xA07AA47: ???
==182== by 0xA07AA63: ???
==182== by 0x4A8312F: ???
==182== by 0xA07AA47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA22AC20: ???
==182== by 0xA22AC07: ???
==182== by 0xA22AC23: ???
==182== by 0x4A8312F: ???
==182== by 0xA22AC07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA22CB10: ???
==182== by 0xA22CAF7: ???
==182== by 0xA22CB13: ???
==182== by 0x4A8312F: ???
==182== by 0xA22CAF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA39ADD0: ???
==182== by 0xA39ADB7: ???
==182== by 0xA39ADD3: ???
==182== by 0x4A8312F: ???
==182== by 0xA39ADB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA44FA40: ???
==182== by 0xA44FA27: ???
==182== by 0xA44FA43: ???
==182== by 0x4A8312F: ???
==182== by 0xA44FA27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAA1E380: ???
==182== by 0xAA1E367: ???
==182== by 0xAA1E383: ???
==182== by 0x4A8312F: ???
==182== by 0xAA1E367: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA97DD00: ???
==182== by 0xA97DCE7: ???
==182== by 0xA97DD03: ???
==182== by 0x4A8312F: ???
==182== by 0xA97DCE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA98C960: ???
==182== by 0xA98C947: ???
==182== by 0xA98C963: ???
==182== by 0x4A8312F: ???
==182== by 0xA98C947: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA9F7510: ???
==182== by 0xA9F74F7: ???
==182== by 0xA9F7513: ???
==182== by 0x4A8312F: ???
==182== by 0xA9F74F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA93FD40: ???
==182== by 0xA93FD27: ???
==182== by 0xA93FD43: ???
==182== by 0x4A8312F: ???
==182== by 0xA93FD27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA5D1C60: ???
==182== by 0xA5D1C47: ???
==182== by 0xA5D1C63: ???
==182== by 0x4A8312F: ???
==182== by 0xA5D1C47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6392D0: ???
==182== by 0xA6392B7: ???
==182== by 0xA6392D3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6392B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAB12720: ???
==182== by 0xAB12707: ???
==182== by 0xAB12723: ???
==182== by 0x4A8312F: ???
==182== by 0xAB12707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA1EAD60: ???
==182== by 0xA1EAD47: ???
==182== by 0xA1EAD63: ???
==182== by 0x4A8312F: ???
==182== by 0xA1EAD47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA780500: ???
==182== by 0xA7804E7: ???
==182== by 0xA780503: ???
==182== by 0x4A8312F: ???
==182== by 0xA7804E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF1B830: ???
==182== by 0xAF1B817: ???
==182== by 0xAF1B833: ???
==182== by 0x4A8312F: ???
==182== by 0xAF1B817: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF0F050: ???
==182== by 0xAF0F037: ???
==182== by 0xAF0F053: ???
==182== by 0x4A8312F: ???
==182== by 0xAF0F037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAFCF390: ???
==182== by 0xAFCF377: ???
==182== by 0xAFCF393: ???
==182== by 0x4A8312F: ???
==182== by 0xAFCF377: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB12E880: ???
==182== by 0xB12E867: ???
==182== by 0xB12E883: ???
==182== by 0x4A8312F: ???
==182== by 0xB12E867: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1700D0: ???
==182== by 0xB1700B7: ???
==182== by 0xB1700D3: ???
==182== by 0x4A8312F: ???
==182== by 0xB1700B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB22D52E: ???
==182== by 0xB22D4F7: ???
==182== by 0xB22D531: ???
==182== by 0x4A8312F: ???
==182== by 0xB22D4F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB26AC6E: ???
==182== by 0xB26AC37: ???
==182== by 0xB26AC71: ???
==182== by 0x4A8312F: ???
==182== by 0xB26AC37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB44B30E: ???
==182== by 0xB44B2D7: ???
==182== by 0xB44B311: ???
==182== by 0x4A8312F: ???
==182== by 0xB44B2D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB4522CE: ???
==182== by 0xB452297: ???
==182== by 0xB4522D1: ???
==182== by 0x4A8312F: ???
==182== by 0xB452297: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB445F6D: ???
==182== by 0xB445F47: ???
==182== by 0xB445F70: ???
==182== by 0x4A8312F: ???
==182== by 0xB445F47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB440F1D: ???
==182== by 0xB440EF7: ???
==182== by 0xB440F20: ???
==182== by 0x4A8312F: ???
==182== by 0xB440EF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB461838: ???
==182== by 0xB4617D7: ???
==182== by 0xB46183B: ???
==182== by 0x4A8312F: ???
==182== by 0xB4617D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB467DD6: ???
==182== by 0xB467DA7: ???
==182== by 0xB467DD9: ???
==182== by 0x4A8312F: ???
==182== by 0xB467DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB389910: ???
==182== by 0xB3898D7: ???
==182== by 0xB389913: ???
==182== by 0x4A8312F: ???
==182== by 0xB3898D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1CDCC9: ???
==182== by 0xB1CDCB7: ???
==182== by 0xB1CDCCC: ???
==182== by 0x4A8312F: ???
==182== by 0xB1CDCB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA3B84A9: ???
==182== by 0xA3B8497: ???
==182== by 0xA3B84AC: ???
==182== by 0x4A8312F: ???
==182== by 0xA3B8497: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB203216: ???
==182== by 0xB2031E7: ???
==182== by 0xB203218: ???
==182== by 0x4A8312F: ???
==182== by 0xB2031E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB464946: ???
==182== by 0xB464917: ???
==182== by 0xB464948: ???
==182== by 0x4A8312F: ???
==182== by 0xB464917: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB27D0B6: ???
==182== by 0xB27D087: ???
==182== by 0xB27D0B8: ???
==182== by 0x4A8312F: ???
==182== by 0xB27D087: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4662A6: ???
==182== by 0xB466277: ???
==182== by 0xB4662A8: ???
==182== by 0x4A8312F: ???
==182== by 0xB466277: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4634D6: ???
==182== by 0xB4634A7: ???
==182== by 0xB4634D8: ???
==182== by 0x4A8312F: ???
==182== by 0xB4634A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4644E6: ???
==182== by 0xB4644B7: ???
==182== by 0xB4644E8: ???
==182== by 0x4A8312F: ???
==182== by 0xB4644B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB416DD6: ???
==182== by 0xB416DA7: ???
==182== by 0xB416DD8: ???
==182== by 0x4A8312F: ???
==182== by 0xB416DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF896D: ???
==182== by 0xB416DD6: ???
==182== by 0xB416DA7: ???
==182== by 0xB416DD8: ???
==182== by 0x4A8312F: ???
==182== by 0xB416DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE2F5FF: ???
==182== by 0xBE2F5D7: ???
==182== by 0xBE2F602: ???
==182== by 0x4A8312F: ???
==182== by 0xBE2F5D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE2FC32: ???
==182== by 0xBE2FC17: ???
==182== by 0xBE2FC35: ???
==182== by 0x4A8312F: ???
==182== by 0xBE2FC17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB47E37E: ???
==182== by 0xB47E327: ???
==182== by 0xB47E381: ???
==182== by 0x4A8312F: ???
==182== by 0xB47E327: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB488193: ???
==182== by 0xB488137: ???
==182== by 0xB488196: ???
==182== by 0x4A8312F: ???
==182== by 0xB488137: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB394B76: ???
==182== by 0xB394B57: ???
==182== by 0xB394B79: ???
==182== by 0x4A8312F: ???
==182== by 0xB394B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4C3A76: ???
==182== by 0xB4C3A57: ???
==182== by 0xB4C3A79: ???
==182== by 0x4A8312F: ???
==182== by 0xB4C3A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB55D6C6: ???
==182== by 0xB55D6A7: ???
==182== by 0xB55D6C9: ???
==182== by 0x4A8312F: ???
==182== by 0xB55D6A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4E59A6: ???
==182== by 0xB4E5987: ???
==182== by 0xB4E59A9: ???
==182== by 0x4A8312F: ???
==182== by 0xB4E5987: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5582E6: ???
==182== by 0xB5582C7: ???
==182== by 0xB5582E9: ???
==182== by 0x4A8312F: ???
==182== by 0xB5582C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5E12D6: ???
==182== by 0xB5E12B7: ???
==182== by 0xB5E12D9: ???
==182== by 0x4A8312F: ???
==182== by 0xB5E12B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5FBC06: ???
==182== by 0xB5FBBE7: ???
==182== by 0xB5FBC09: ???
==182== by 0x4A8312F: ???
==182== by 0xB5FBBE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4E313A: ???
==182== by 0xB4E3117: ???
==182== by 0xB4E313D: ???
==182== by 0x4A8312F: ???
==182== by 0xB4E3117: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB668866: ???
==182== by 0xB668847: ???
==182== by 0xB668869: ???
==182== by 0x4A8312F: ???
==182== by 0xB668847: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB706056: ???
==182== by 0xB706037: ???
==182== by 0xB706059: ???
==182== by 0x4A8312F: ???
==182== by 0xB706037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB678FBD: ???
==182== by 0xB678F97: ???
==182== by 0xB678FC0: ???
==182== by 0x4A8312F: ???
==182== by 0xB678F97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB82EF46: ???
==182== by 0xB82EF27: ???
==182== by 0xB82EF49: ???
==182== by 0x4A8312F: ???
==182== by 0xB82EF27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB831106: ???
==182== by 0xB8310E7: ???
==182== by 0xB831109: ???
==182== by 0x4A8312F: ???
==182== by 0xB8310E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB831CEA: ???
==182== by 0xB831CC7: ???
==182== by 0xB831CED: ???
==182== by 0x4A8312F: ???
==182== by 0xB831CC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB8E55BE: ???
==182== by 0xB8E5587: ???
==182== by 0xB8E55C1: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E5587: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9568C6: ???
==182== by 0xB9568A7: ???
==182== by 0xB9568C9: ???
==182== by 0x4A8312F: ???
==182== by 0xB9568A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9626A6: ???
==182== by 0xB962687: ???
==182== by 0xB9626A9: ???
==182== by 0x4A8312F: ???
==182== by 0xB962687: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB956DC6: ???
==182== by 0xB956DA7: ???
==182== by 0xB956DC9: ???
==182== by 0x4A8312F: ???
==182== by 0xB956DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF00E96: ???
==182== by 0xBF00E67: ???
==182== by 0xBF00E98: ???
==182== by 0x4A8312F: ???
==182== by 0xBF00E67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB962E66: ???
==182== by 0xB962E37: ???
==182== by 0xB962E68: ???
==182== by 0x4A8312F: ???
==182== by 0xB962E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB966266: ???
==182== by 0xB966237: ???
==182== by 0xB966268: ???
==182== by 0x4A8312F: ???
==182== by 0xB966237: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF016F6: ???
==182== by 0xBF016C7: ???
==182== by 0xBF016F8: ???
==182== by 0x4A8312F: ???
==182== by 0xBF016C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB91CAB6: ???
==182== by 0xB91CA87: ???
==182== by 0xB91CAB8: ???
==182== by 0x4A8312F: ???
==182== by 0xB91CA87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB98C252: ???
==182== by 0xB98C237: ???
==182== by 0xB98C255: ???
==182== by 0x4A8312F: ???
==182== by 0xB98C237: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB98E622: ???
==182== by 0xB98E607: ???
==182== by 0xB98E625: ???
==182== by 0x4A8312F: ???
==182== by 0xB98E607: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB923125: ???
==182== by 0xB9230C7: ???
==182== by 0xB923128: ???
==182== by 0x4A8312F: ???
==182== by 0xB9230C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB98E17E: ???
==182== by 0xB98E147: ???
==182== by 0xB98E181: ???
==182== by 0x4A8312F: ???
==182== by 0xB98E147: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9D11D6: ???
==182== by 0xB9D11B7: ???
==182== by 0xB9D11D9: ???
==182== by 0x4A8312F: ???
==182== by 0xB9D11B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9D5FD6: ???
==182== by 0xB9D5FB7: ???
==182== by 0xB9D5FD9: ???
==182== by 0x4A8312F: ???
==182== by 0xB9D5FB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB010A26: ???
==182== by 0xB0109F7: ???
==182== by 0xB010A28: ???
==182== by 0x4A8312F: ???
==182== by 0xB0109F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB017CB6: ???
==182== by 0xB017C87: ???
==182== by 0xB017CB8: ???
==182== by 0x4A8312F: ???
==182== by 0xB017C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB950A86: ???
==182== by 0xB950A57: ???
==182== by 0xB950A88: ???
==182== by 0x4A8312F: ???
==182== by 0xB950A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9EB086: ???
==182== by 0xB9EB057: ???
==182== by 0xB9EB088: ???
==182== by 0x4A8312F: ???
==182== by 0xB9EB057: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB94E1E6: ???
==182== by 0xB94E1B7: ???
==182== by 0xB94E1E8: ???
==182== by 0x4A8312F: ???
==182== by 0xB94E1B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CF3092: ???
==182== by 0x7CF3077: ???
==182== by 0x7CF3095: ???
==182== by 0x4A8312F: ???
==182== by 0x7CF3077: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CFAAF2: ???
==182== by 0x7CFAAD7: ???
==182== by 0x7CFAAF5: ???
==182== by 0x4A8312F: ???
==182== by 0x7CFAAD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D14C65: ???
==182== by 0x7D14C07: ???
==182== by 0x7D14C68: ???
==182== by 0x4A8312F: ???
==182== by 0x7D14C07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7D853EE: ???
==182== by 0x7D853B7: ???
==182== by 0x7D853F1: ???
==182== by 0x4A8312F: ???
==182== by 0x7D853B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7DA42C6: ???
==182== by 0x7DA42A7: ???
==182== by 0x7DA42C9: ???
==182== by 0x4A8312F: ???
==182== by 0x7DA42A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7DB7C16: ???
==182== by 0x7DB7BF7: ???
==182== by 0x7DB7C19: ???
==182== by 0x4A8312F: ???
==182== by 0x7DB7BF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D1C986: ???
==182== by 0x7D1C957: ???
==182== by 0x7D1C988: ???
==182== by 0x4A8312F: ???
==182== by 0x7D1C957: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D1E0F6: ???
==182== by 0x7D1E0C7: ???
==182== by 0x7D1E0F8: ???
==182== by 0x4A8312F: ???
==182== by 0x7D1E0C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9EFFC6: ???
==182== by 0xB9EFF97: ???
==182== by 0xB9EFFC8: ???
==182== by 0x4A8312F: ???
==182== by 0xB9EFF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9F0DC6: ???
==182== by 0xB9F0D97: ???
==182== by 0xB9F0DC8: ???
==182== by 0x4A8312F: ???
==182== by 0xB9F0D97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CE08F6: ???
==182== by 0x7CE08C7: ???
==182== by 0x7CE08F8: ???
==182== by 0x4A8312F: ???
==182== by 0x7CE08C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1A3E52: ???
==182== by 0xB1A3E37: ???
==182== by 0xB1A3E55: ???
==182== by 0x4A8312F: ???
==182== by 0xB1A3E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1A5A82: ???
==182== by 0xB1A5A67: ???
==182== by 0xB1A5A85: ???
==182== by 0x4A8312F: ???
==182== by 0xB1A5A67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA6D705: ???
==182== by 0xBA6D6A7: ???
==182== by 0xBA6D708: ???
==182== by 0x4A8312F: ???
==182== by 0xBA6D6A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x48E5E6E: ???
==182== by 0x48E5E37: ???
==182== by 0x48E5E71: ???
==182== by 0x4A8312F: ???
==182== by 0x48E5E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBAD0086: ???
==182== by 0xBAD0067: ???
==182== by 0xBAD0089: ???
==182== by 0x4A8312F: ???
==182== by 0xBAD0067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4982E96: ???
==182== by 0x4982E77: ???
==182== by 0x4982E99: ???
==182== by 0x4A8312F: ???
==182== by 0x4982E77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4A8F7A6: ???
==182== by 0x4A8F777: ???
==182== by 0x4A8F7A8: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F777: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF50A56: ???
==182== by 0xBF50A27: ???
==182== by 0xBF50A58: ???
==182== by 0x4A8312F: ???
==182== by 0xBF50A27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4A91016: ???
==182== by 0x4A90FE7: ???
==182== by 0x4A91018: ???
==182== by 0x4A8312F: ???
==182== by 0x4A90FE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF4DFF2: ???
==182== by 0xBF4DFD7: ???
==182== by 0xBF4DFF5: ???
==182== by 0x4A8312F: ???
==182== by 0xBF4DFD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF66762: ???
==182== by 0xBF66747: ???
==182== by 0xBF66765: ???
==182== by 0x4A8312F: ???
==182== by 0xBF66747: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBAEEBE5: ???
==182== by 0xBAEEB87: ???
==182== by 0xBAEEBE8: ???
==182== by 0x4A8312F: ???
==182== by 0xBAEEB87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x4CAA99E: ???
==182== by 0x4CAA967: ???
==182== by 0x4CAA9A1: ???
==182== by 0x4A8312F: ???
==182== by 0x4CAA967: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x4C94A5E: ???
==182== by 0x4C949C7: ???
==182== by 0x4C94A61: ???
==182== by 0x4A8312F: ???
==182== by 0x4C949C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4BFD886: ???
==182== by 0x4BFD867: ???
==182== by 0x4BFD889: ???
==182== by 0x4A8312F: ???
==182== by 0x4BFD867: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4C96F76: ???
==182== by 0x4C96F57: ???
==182== by 0x4C96F79: ???
==182== by 0x4A8312F: ???
==182== by 0x4C96F57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4A77CC6: ???
==182== by 0x4A77C97: ???
==182== by 0x4A77CC8: ???
==182== by 0x4A8312F: ???
==182== by 0x4A77C97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBAF4FD6: ???
==182== by 0xBAF4FA7: ???
==182== by 0xBAF4FD8: ???
==182== by 0x4A8312F: ???
==182== by 0xBAF4FA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B3E626: ???
==182== by 0x4B3E5F7: ???
==182== by 0x4B3E628: ???
==182== by 0x4A8312F: ???
==182== by 0x4B3E5F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B36EC6: ???
==182== by 0x4B36E97: ???
==182== by 0x4B36EC8: ???
==182== by 0x4A8312F: ???
==182== by 0x4B36E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B37826: ???
==182== by 0x4B377F7: ???
==182== by 0x4B37828: ???
==182== by 0x4A8312F: ???
==182== by 0x4B377F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF90D82: ???
==182== by 0xBF90D67: ???
==182== by 0xBF90D85: ???
==182== by 0x4A8312F: ???
==182== by 0xBF90D67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C34DC2: ???
==182== by 0x7C34DA7: ???
==182== by 0x7C34DC5: ???
==182== by 0x4A8312F: ???
==182== by 0x7C34DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B80D85: ???
==182== by 0x4B80D27: ???
==182== by 0x4B80D88: ???
==182== by 0x4A8312F: ???
==182== by 0x4B80D27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C0B0A6: ???
==182== by 0x7C0B087: ???
==182== by 0x7C0B0A9: ???
==182== by 0x4A8312F: ???
==182== by 0x7C0B087: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBFA10B6: ???
==182== by 0xBFA1097: ???
==182== by 0xBFA10B9: ???
==182== by 0x4A8312F: ???
==182== by 0xBFA1097: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9EE2D66: ???
==182== by 0x9EE2D47: ???
==182== by 0x9EE2D69: ???
==182== by 0x4A8312F: ???
==182== by 0x9EE2D47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F624D6: ???
==182== by 0x9F624B7: ???
==182== by 0x9F624D9: ???
==182== by 0x4A8312F: ???
==182== by 0x9F624B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F7FF36: ???
==182== by 0x9F7FF17: ???
==182== by 0x9F7FF39: ???
==182== by 0x4A8312F: ???
==182== by 0x9F7FF17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F82CA6: ???
==182== by 0x9F82C87: ???
==182== by 0x9F82CA9: ???
==182== by 0x4A8312F: ???
==182== by 0x9F82C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0AB1F6: ???
==182== by 0xA0AB1D7: ???
==182== by 0xA0AB1F9: ???
==182== by 0x4A8312F: ???
==182== by 0xA0AB1D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0DFAB6: ???
==182== by 0xA0DFA97: ???
==182== by 0xA0DFAB9: ???
==182== by 0x4A8312F: ???
==182== by 0xA0DFA97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA24C176: ???
==182== by 0xA24C157: ???
==182== by 0xA24C179: ???
==182== by 0x4A8312F: ???
==182== by 0xA24C157: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA220206: ???
==182== by 0xA2201E7: ???
==182== by 0xA220209: ???
==182== by 0x4A8312F: ???
==182== by 0xA2201E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA09F546: ???
==182== by 0xA09F527: ???
==182== by 0xA09F549: ???
==182== by 0x4A8312F: ???
==182== by 0xA09F527: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0E2A76: ???
==182== by 0xA0E2A57: ???
==182== by 0xA0E2A79: ???
==182== by 0x4A8312F: ???
==182== by 0xA0E2A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA233DC6: ???
==182== by 0xA233DA7: ???
==182== by 0xA233DC9: ???
==182== by 0x4A8312F: ???
==182== by 0xA233DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA2487E6: ???
==182== by 0xA2487C7: ???
==182== by 0xA2487E9: ???
==182== by 0x4A8312F: ???
==182== by 0xA2487C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA44D4A6: ???
==182== by 0xA44D487: ???
==182== by 0xA44D4A9: ???
==182== by 0x4A8312F: ???
==182== by 0xA44D487: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA451E76: ???
==182== by 0xA451E57: ???
==182== by 0xA451E79: ???
==182== by 0x4A8312F: ???
==182== by 0xA451E57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA44ED76: ???
==182== by 0xA44ED57: ???
==182== by 0xA44ED79: ???
==182== by 0x4A8312F: ???
==182== by 0xA44ED57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9E53666: ???
==182== by 0x9E53647: ???
==182== by 0x9E53669: ???
==182== by 0x4A8312F: ???
==182== by 0x9E53647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA908876: ???
==182== by 0xA908857: ???
==182== by 0xA908879: ???
==182== by 0x4A8312F: ???
==182== by 0xA908857: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA90A6D6: ???
==182== by 0xA90A6B7: ???
==182== by 0xA90A6D9: ???
==182== by 0x4A8312F: ???
==182== by 0xA90A6B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAA30A66: ???
==182== by 0xAA30A47: ???
==182== by 0xAA30A69: ???
==182== by 0x4A8312F: ???
==182== by 0xAA30A47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA95D236: ???
==182== by 0xA95D217: ???
==182== by 0xA95D239: ???
==182== by 0x4A8312F: ???
==182== by 0xA95D217: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAB0CEA6: ???
==182== by 0xAB0CE87: ???
==182== by 0xAB0CEA9: ???
==182== by 0x4A8312F: ???
==182== by 0xAB0CE87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAA94976: ???
==182== by 0xAA94957: ???
==182== by 0xAA94979: ???
==182== by 0x4A8312F: ???
==182== by 0xAA94957: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAA9B6F6: ???
==182== by 0xAA9B6D7: ???
==182== by 0xAA9B6F9: ???
==182== by 0x4A8312F: ???
==182== by 0xAA9B6D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAC37A5F: ???
==182== by 0xAC37A17: ???
==182== by 0xAC37A62: ???
==182== by 0x4A8312F: ???
==182== by 0xAC37A17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAC380A6: ???
==182== by 0xAC38077: ???
==182== by 0xAC380A8: ???
==182== by 0x4A8312F: ???
==182== by 0xAC38077: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xACC2E96: ???
==182== by 0xACC2E67: ???
==182== by 0xACC2E98: ???
==182== by 0x4A8312F: ???
==182== by 0xACC2E67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6BE686: ???
==182== by 0xA6BE657: ???
==182== by 0xA6BE688: ???
==182== by 0x4A8312F: ???
==182== by 0xA6BE657: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6B21E6: ???
==182== by 0xA6B21B7: ???
==182== by 0xA6B21E8: ???
==182== by 0x4A8312F: ???
==182== by 0xA6B21B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xACA95C4: ???
==182== by 0xACA95A7: ???
==182== by 0xACA95C7: ???
==182== by 0x4A8312F: ???
==182== by 0xACA95A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xC156CA4: ???
==182== by 0xC156C87: ???
==182== by 0xC156CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xC156C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA778E97: ???
==182== by 0xA778E67: ???
==182== by 0xA778E9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA778E67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xACF8066: ???
==182== by 0xACF8047: ???
==182== by 0xACF8069: ???
==182== by 0x4A8312F: ???
==182== by 0xACF8047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA77C5F6: ???
==182== by 0xA77C5D7: ???
==182== by 0xA77C5F9: ???
==182== by 0x4A8312F: ???
==182== by 0xA77C5D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA71F51F: ???
==182== by 0xA71F4F7: ???
==182== by 0xA71F522: ???
==182== by 0x4A8312F: ???
==182== by 0xA71F4F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xAE2F8EE: ???
==182== by 0xAE2F897: ???
==182== by 0xAE2F8F1: ???
==182== by 0x4A8312F: ???
==182== by 0xAE2F897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAE02EB3: ???
==182== by 0xAE02E57: ???
==182== by 0xAE02EB6: ???
==182== by 0x4A8312F: ???
==182== by 0xAE02E57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7F68A7: ???
==182== by 0xA7F6877: ???
==182== by 0xA7F68AA: ???
==182== by 0x4A8312F: ???
==182== by 0xA7F6877: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAEFE948: ???
==182== by 0xAEFE8D7: ???
==182== by 0xAEFE94B: ???
==182== by 0x4A8312F: ???
==182== by 0xAEFE8D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA784146: ???
==182== by 0xA784127: ???
==182== by 0xA784149: ???
==182== by 0x4A8312F: ???
==182== by 0xA784127: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA812236: ???
==182== by 0xA812217: ???
==182== by 0xA812239: ???
==182== by 0x4A8312F: ???
==182== by 0xA812217: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7AAE66: ???
==182== by 0xA7AAE47: ???
==182== by 0xA7AAE69: ???
==182== by 0x4A8312F: ???
==182== by 0xA7AAE47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF2AC26: ???
==182== by 0xAF2AC07: ???
==182== by 0xAF2AC29: ???
==182== by 0x4A8312F: ???
==182== by 0xAF2AC07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7F4877: ???
==182== by 0xA7F4847: ???
==182== by 0xA7F487A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7F4847: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7F83CF: ???
==182== by 0xA7F83A7: ???
==182== by 0xA7F83D2: ???
==182== by 0x4A8312F: ???
==182== by 0xA7F83A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xADBFDB6: ???
==182== by 0xADBFD67: ???
==182== by 0xADBFDB9: ???
==182== by 0x4A8312F: ???
==182== by 0xADBFD67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7FA8B7: ???
==182== by 0xA7FA887: ???
==182== by 0xA7FA8BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA7FA887: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7FD207: ???
==182== by 0xA7FD1D7: ???
==182== by 0xA7FD20A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7FD1D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAFDC597: ???
==182== by 0xAFDC567: ???
==182== by 0xAFDC59A: ???
==182== by 0x4A8312F: ???
==182== by 0xAFDC567: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAD5253F: ???
==182== by 0xAD52517: ???
==182== by 0xAD52542: ???
==182== by 0x4A8312F: ???
==182== by 0xAD52517: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAEF9596: ???
==182== by 0xAEF9577: ???
==182== by 0xAEF9599: ???
==182== by 0x4A8312F: ???
==182== by 0xAEF9577: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB046086: ???
==182== by 0xB046067: ???
==182== by 0xB046089: ???
==182== by 0x4A8312F: ???
==182== by 0xB046067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAFC5A36: ???
==182== by 0xAFC5A17: ???
==182== by 0xAFC5A39: ???
==182== by 0x4A8312F: ???
==182== by 0xAFC5A17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF99B87: ???
==182== by 0xAF99B57: ???
==182== by 0xAF99B8A: ???
==182== by 0x4A8312F: ???
==182== by 0xAF99B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB143F66: ???
==182== by 0xB143F47: ???
==182== by 0xB143F69: ???
==182== by 0x4A8312F: ???
==182== by 0xB143F47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB0B4B66: ???
==182== by 0xB0B4B47: ???
==182== by 0xB0B4B69: ???
==182== by 0x4A8312F: ???
==182== by 0xB0B4B47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB0D4146: ???
==182== by 0xB0D4127: ???
==182== by 0xB0D4149: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D4127: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB159EB6: ???
==182== by 0xB159E97: ???
==182== by 0xB159EB9: ???
==182== by 0x4A8312F: ???
==182== by 0xB159E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB0E321F: ???
==182== by 0xB0E31E7: ???
==182== by 0xB0E3222: ???
==182== by 0x4A8312F: ???
==182== by 0xB0E31E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB21AA37: ???
==182== by 0xB21AA07: ???
==182== by 0xB21AA3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB21AA07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB2205F7: ???
==182== by 0xB2205C7: ???
==182== by 0xB2205FA: ???
==182== by 0x4A8312F: ???
==182== by 0xB2205C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB245A16: ???
==182== by 0xB2459F7: ???
==182== by 0xB245A19: ???
==182== by 0x4A8312F: ???
==182== by 0xB2459F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB363066: ???
==182== by 0xB363047: ???
==182== by 0xB363069: ???
==182== by 0x4A8312F: ???
==182== by 0xB363047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB21A1B6: ???
==182== by 0xB21A197: ???
==182== by 0xB21A1B9: ???
==182== by 0x4A8312F: ???
==182== by 0xB21A197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB248AC6: ???
==182== by 0xB248AA7: ???
==182== by 0xB248AC9: ???
==182== by 0x4A8312F: ???
==182== by 0xB248AA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB241CB7: ???
==182== by 0xB241C87: ???
==182== by 0xB241CBA: ???
==182== by 0x4A8312F: ???
==182== by 0xB241C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB372E16: ???
==182== by 0xB372DF7: ???
==182== by 0xB372E19: ???
==182== by 0x4A8312F: ???
==182== by 0xB372DF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB25B526: ???
==182== by 0xB25B507: ???
==182== by 0xB25B529: ???
==182== by 0x4A8312F: ???
==182== by 0xB25B507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xA5AD06E: ???
==182== by 0xA5AD037: ???
==182== by 0xA5AD071: ???
==182== by 0x4A8312F: ???
==182== by 0xA5AD037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB398986: ???
==182== by 0xB398967: ???
==182== by 0xB398989: ???
==182== by 0x4A8312F: ???
==182== by 0xB398967: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1DD066: ???
==182== by 0xB1DD047: ???
==182== by 0xB1DD069: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DD047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB42C4B6: ???
==182== by 0xB42C497: ???
==182== by 0xB42C4B9: ???
==182== by 0x4A8312F: ???
==182== by 0xB42C497: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xC4ADEB6: ???
==182== by 0xC4ADE87: ???
==182== by 0xC4ADEB8: ???
==182== by 0x4A8312F: ???
==182== by 0xC4ADE87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xC4AEDD6: ???
==182== by 0xC4AEDA7: ???
==182== by 0xC4AEDD8: ???
==182== by 0x4A8312F: ???
==182== by 0xC4AEDA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB411976: ???
==182== by 0xB411947: ???
==182== by 0xB411978: ???
==182== by 0x4A8312F: ???
==182== by 0xB411947: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xC4AFBF6: ???
==182== by 0xC4AFBC7: ???
==182== by 0xC4AFBF8: ???
==182== by 0x4A8312F: ???
==182== by 0xC4AFBC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE1ECE6: ???
==182== by 0xBE1ECB7: ???
==182== by 0xBE1ECE8: ???
==182== by 0x4A8312F: ???
==182== by 0xBE1ECB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE1FC06: ???
==182== by 0xBE1FBD7: ???
==182== by 0xBE1FC08: ???
==182== by 0x4A8312F: ???
==182== by 0xBE1FBD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE2CB92: ???
==182== by 0xBE2CB77: ???
==182== by 0xBE2CB95: ???
==182== by 0x4A8312F: ???
==182== by 0xBE2CB77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE2CF32: ???
==182== by 0xBE2CF17: ???
==182== by 0xBE2CF35: ???
==182== by 0x4A8312F: ???
==182== by 0xBE2CF17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xADA6CE5: ???
==182== by 0xADA6C87: ???
==182== by 0xADA6CE8: ???
==182== by 0x4A8312F: ???
==182== by 0xADA6C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB537C17: ???
==182== by 0xB537BE7: ???
==182== by 0xB537C1A: ???
==182== by 0x4A8312F: ???
==182== by 0xB537BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB53778E: ???
==182== by 0xB537757: ???
==182== by 0xB537791: ???
==182== by 0x4A8312F: ???
==182== by 0xB537757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5D7106: ???
==182== by 0xB5D70E7: ???
==182== by 0xB5D7109: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D70E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5E41C6: ???
==182== by 0xB5E4197: ???
==182== by 0xB5E41C8: ???
==182== by 0x4A8312F: ???
==182== by 0xB5E4197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5E6446: ???
==182== by 0xB5E6417: ???
==182== by 0xB5E6448: ???
==182== by 0x4A8312F: ???
==182== by 0xB5E6417: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5F8876: ???
==182== by 0xB5F8847: ???
==182== by 0xB5F8878: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F8847: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4B9D06: ???
==182== by 0xB4B9CD7: ???
==182== by 0xB4B9D08: ???
==182== by 0x4A8312F: ???
==182== by 0xB4B9CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5D99C6: ???
==182== by 0xB5D9997: ???
==182== by 0xB5D99C8: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D9997: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB587532: ???
==182== by 0xB587517: ???
==182== by 0xB587535: ???
==182== by 0x4A8312F: ???
==182== by 0xB587517: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB578F62: ???
==182== by 0xB578F47: ???
==182== by 0xB578F65: ???
==182== by 0x4A8312F: ???
==182== by 0xB578F47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB631115: ???
==182== by 0xB6310B7: ???
==182== by 0xB631118: ???
==182== by 0x4A8312F: ???
==182== by 0xB6310B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB68711E: ???
==182== by 0xB6870E7: ???
==182== by 0xB687121: ???
==182== by 0x4A8312F: ???
==182== by 0xB6870E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB6E25F6: ???
==182== by 0xB6E25D7: ???
==182== by 0xB6E25F9: ???
==182== by 0x4A8312F: ???
==182== by 0xB6E25D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB6C82B6: ???
==182== by 0xB6C8287: ???
==182== by 0xB6C82B8: ???
==182== by 0x4A8312F: ???
==182== by 0xB6C8287: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB709A26: ???
==182== by 0xB7099F7: ???
==182== by 0xB709A28: ???
==182== by 0x4A8312F: ???
==182== by 0xB7099F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB6D7236: ???
==182== by 0xB6D7207: ???
==182== by 0xB6D7238: ???
==182== by 0x4A8312F: ???
==182== by 0xB6D7207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB70FA16: ???
==182== by 0xB70F9E7: ???
==182== by 0xB70FA18: ???
==182== by 0x4A8312F: ???
==182== by 0xB70F9E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB716666: ???
==182== by 0xB716637: ???
==182== by 0xB716668: ???
==182== by 0x4A8312F: ???
==182== by 0xB716637: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB726842: ???
==182== by 0xB726827: ???
==182== by 0xB726845: ???
==182== by 0x4A8312F: ???
==182== by 0xB726827: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB29CDE2: ???
==182== by 0xB29CDC7: ???
==182== by 0xB29CDE5: ???
==182== by 0x4A8312F: ???
==182== by 0xB29CDC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7195B5: ???
==182== by 0xB719557: ???
==182== by 0xB7195B8: ???
==182== by 0x4A8312F: ???
==182== by 0xB719557: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB7EC03E: ???
==182== by 0xB7EC007: ???
==182== by 0xB7EC041: ???
==182== by 0x4A8312F: ???
==182== by 0xB7EC007: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB829436: ???
==182== by 0xB829417: ???
==182== by 0xB829439: ???
==182== by 0x4A8312F: ???
==182== by 0xB829417: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB80C856: ???
==182== by 0xB80C827: ???
==182== by 0xB80C858: ???
==182== by 0x4A8312F: ???
==182== by 0xB80C827: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB871A66: ???
==182== by 0xB871A37: ???
==182== by 0xB871A68: ???
==182== by 0x4A8312F: ???
==182== by 0xB871A37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7822A6: ???
==182== by 0xB782277: ???
==182== by 0xB7822A8: ???
==182== by 0x4A8312F: ???
==182== by 0xB782277: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB78D826: ???
==182== by 0xB78D7F7: ???
==182== by 0xB78D828: ???
==182== by 0x4A8312F: ???
==182== by 0xB78D7F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE944B6: ???
==182== by 0xBE94487: ???
==182== by 0xBE944B8: ???
==182== by 0x4A8312F: ???
==182== by 0xBE94487: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7C1CC2: ???
==182== by 0xB7C1CA7: ???
==182== by 0xB7C1CC5: ???
==182== by 0x4A8312F: ???
==182== by 0xB7C1CA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB89B042: ???
==182== by 0xB89B027: ???
==182== by 0xB89B045: ???
==182== by 0x4A8312F: ???
==182== by 0xB89B027: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE7BB25: ???
==182== by 0xBE7BAC7: ???
==182== by 0xBE7BB28: ???
==182== by 0x4A8312F: ???
==182== by 0xBE7BAC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB7D208E: ???
==182== by 0xB7D2057: ???
==182== by 0xB7D2091: ???
==182== by 0x4A8312F: ???
==182== by 0xB7D2057: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7E58F6: ???
==182== by 0xB7E58D7: ???
==182== by 0xB7E58F9: ???
==182== by 0x4A8312F: ???
==182== by 0xB7E58D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7CB546: ???
==182== by 0xB7CB517: ???
==182== by 0xB7CB548: ???
==182== by 0x4A8312F: ???
==182== by 0xB7CB517: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB957B16: ???
==182== by 0xB957AE7: ???
==182== by 0xB957B18: ???
==182== by 0x4A8312F: ???
==182== by 0xB957AE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E7086: ???
==182== by 0xB8E7057: ???
==182== by 0xB8E7088: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E7057: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9593D6: ???
==182== by 0xB9593A7: ???
==182== by 0xB9593D8: ???
==182== by 0x4A8312F: ???
==182== by 0xB9593A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8DCB66: ???
==182== by 0xB8DCB37: ???
==182== by 0xB8DCB68: ???
==182== by 0x4A8312F: ???
==182== by 0xB8DCB37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8A55E2: ???
==182== by 0xB8A55C7: ???
==182== by 0xB8A55E5: ???
==182== by 0x4A8312F: ???
==182== by 0xB8A55C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8AE8F2: ???
==182== by 0xB8AE8D7: ???
==182== by 0xB8AE8F5: ???
==182== by 0x4A8312F: ???
==182== by 0xB8AE8D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB966FF5: ???
==182== by 0xB966F97: ???
==182== by 0xB966FF8: ???
==182== by 0x4A8312F: ???
==182== by 0xB966F97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB9542CE: ???
==182== by 0xB954297: ???
==182== by 0xB9542D1: ???
==182== by 0x4A8312F: ???
==182== by 0xB954297: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB99E186: ???
==182== by 0xB99E167: ???
==182== by 0xB99E189: ???
==182== by 0x4A8312F: ???
==182== by 0xB99E167: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C84766: ???
==182== by 0x7C84737: ???
==182== by 0x7C84768: ???
==182== by 0x4A8312F: ???
==182== by 0x7C84737: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB01C756: ???
==182== by 0xB01C727: ???
==182== by 0xB01C758: ???
==182== by 0x4A8312F: ???
==182== by 0xB01C727: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB031766: ???
==182== by 0xB031737: ???
==182== by 0xB031768: ???
==182== by 0x4A8312F: ???
==182== by 0xB031737: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB01CE76: ???
==182== by 0xB01CE47: ???
==182== by 0xB01CE78: ???
==182== by 0x4A8312F: ???
==182== by 0xB01CE47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB025946: ???
==182== by 0xB025917: ???
==182== by 0xB025948: ???
==182== by 0x4A8312F: ???
==182== by 0xB025917: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9C0A92: ???
==182== by 0xB9C0A77: ???
==182== by 0xB9C0A95: ???
==182== by 0x4A8312F: ???
==182== by 0xB9C0A77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB91D012: ???
==182== by 0xB91CFF7: ???
==182== by 0xB91D015: ???
==182== by 0x4A8312F: ???
==182== by 0xB91CFF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB931D85: ???
==182== by 0xB931D27: ???
==182== by 0xB931D88: ???
==182== by 0x4A8312F: ???
==182== by 0xB931D27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7D4A96E: ???
==182== by 0x7D4A937: ???
==182== by 0x7D4A971: ???
==182== by 0x4A8312F: ???
==182== by 0x7D4A937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA0F466: ???
==182== by 0xBA0F447: ???
==182== by 0xBA0F469: ???
==182== by 0x4A8312F: ???
==182== by 0xBA0F447: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA00A36: ???
==182== by 0xBA00A07: ???
==182== by 0xBA00A38: ???
==182== by 0x4A8312F: ???
==182== by 0xBA00A07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA03176: ???
==182== by 0xBA03147: ???
==182== by 0xBA03178: ???
==182== by 0x4A8312F: ???
==182== by 0xBA03147: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7DB3186: ???
==182== by 0x7DB3157: ???
==182== by 0x7DB3188: ???
==182== by 0x4A8312F: ???
==182== by 0x7DB3157: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA11D66: ???
==182== by 0xBA11D37: ???
==182== by 0xBA11D68: ???
==182== by 0x4A8312F: ???
==182== by 0xBA11D37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9EDC46: ???
==182== by 0xB9EDC17: ???
==182== by 0xB9EDC48: ???
==182== by 0x4A8312F: ???
==182== by 0xB9EDC17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D4BF62: ???
==182== by 0x7D4BF47: ???
==182== by 0x7D4BF65: ???
==182== by 0x4A8312F: ???
==182== by 0x7D4BF47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA452E2: ???
==182== by 0xBA452C7: ???
==182== by 0xBA452E5: ???
==182== by 0x4A8312F: ???
==182== by 0xBA452C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D0D255: ???
==182== by 0x7D0D1F7: ???
==182== by 0x7D0D258: ???
==182== by 0x4A8312F: ???
==182== by 0x7D0D1F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x49362D7: ???
==182== by 0x49362A7: ???
==182== by 0x49362DA: ???
==182== by 0x4A8312F: ???
==182== by 0x49362A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B48B77: ???
==182== by 0x4B48B47: ???
==182== by 0x4B48B7A: ???
==182== by 0x4A8312F: ???
==182== by 0x4B48B47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B48D2F: ???
==182== by 0x4B48D07: ???
==182== by 0x4B48D32: ???
==182== by 0x4A8312F: ???
==182== by 0x4B48D07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7B90C2F: ???
==182== by 0x7B90C07: ???
==182== by 0x7B90C32: ???
==182== by 0x4A8312F: ???
==182== by 0x7B90C07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C1D0CF: ???
==182== by 0x7C1D0A7: ???
==182== by 0x7C1D0D2: ???
==182== by 0x4A8312F: ???
==182== by 0x7C1D0A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C00A9F: ???
==182== by 0x7C00A77: ???
==182== by 0x7C00AA2: ???
==182== by 0x4A8312F: ???
==182== by 0x7C00A77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C1346F: ???
==182== by 0x7C13447: ???
==182== by 0x7C13472: ???
==182== by 0x4A8312F: ???
==182== by 0x7C13447: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C1442F: ???
==182== by 0x7C14407: ???
==182== by 0x7C14432: ???
==182== by 0x4A8312F: ???
==182== by 0x7C14407: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9DFEB27: ???
==182== by 0x9DFEAF7: ???
==182== by 0x9DFEB2A: ???
==182== by 0x4A8312F: ???
==182== by 0x9DFEAF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9E120CF: ???
==182== by 0x9E120A7: ???
==182== by 0x9E120D2: ???
==182== by 0x4A8312F: ???
==182== by 0x9E120A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9E12C3F: ???
==182== by 0x9E12C17: ???
==182== by 0x9E12C42: ???
==182== by 0x4A8312F: ???
==182== by 0x9E12C17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9E220A5: ???
==182== by 0x9E22087: ???
==182== by 0x9E220A8: ???
==182== by 0x4A8312F: ???
==182== by 0x9E22087: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9FF73C7: ???
==182== by 0x9FF7397: ???
==182== by 0x9FF73CA: ???
==182== by 0x4A8312F: ???
==182== by 0x9FF7397: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F44137: ???
==182== by 0x9F44107: ???
==182== by 0x9F4413A: ???
==182== by 0x4A8312F: ???
==182== by 0x9F44107: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F5E76F: ???
==182== by 0x9F5E747: ???
==182== by 0x9F5E772: ???
==182== by 0x4A8312F: ???
==182== by 0x9F5E747: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F6EEFF: ???
==182== by 0x9F6EED7: ???
==182== by 0x9F6EF02: ???
==182== by 0x4A8312F: ???
==182== by 0x9F6EED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F707CF: ???
==182== by 0x9F707A7: ???
==182== by 0x9F707D2: ???
==182== by 0x4A8312F: ???
==182== by 0x9F707A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F71F0F: ???
==182== by 0x9F71EE7: ???
==182== by 0x9F71F12: ???
==182== by 0x4A8312F: ???
==182== by 0x9F71EE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6606D6: ???
==182== by 0xA6606B7: ???
==182== by 0xA6606D9: ???
==182== by 0x4A8312F: ???
==182== by 0xA6606B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA1568B7: ???
==182== by 0xA156887: ???
==182== by 0xA1568BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA156887: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA154596: ???
==182== by 0xA154577: ???
==182== by 0xA154599: ???
==182== by 0x4A8312F: ???
==182== by 0xA154577: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0F7E76: ???
==182== by 0xA0F7E57: ???
==182== by 0xA0F7E79: ???
==182== by 0x4A8312F: ???
==182== by 0xA0F7E57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA2EA5D6: ???
==182== by 0xA2EA5B7: ???
==182== by 0xA2EA5D9: ???
==182== by 0x4A8312F: ???
==182== by 0xA2EA5B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA818E56: ???
==182== by 0xA818E37: ???
==182== by 0xA818E59: ???
==182== by 0x4A8312F: ???
==182== by 0xA818E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA06AFC7: ???
==182== by 0xA06AF97: ???
==182== by 0xA06AFCA: ???
==182== by 0x4A8312F: ???
==182== by 0xA06AF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA09BD16: ???
==182== by 0xA09BCF7: ???
==182== by 0xA09BD19: ???
==182== by 0x4A8312F: ???
==182== by 0xA09BCF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0636F6: ???
==182== by 0xA0636D7: ???
==182== by 0xA0636F9: ???
==182== by 0x4A8312F: ???
==182== by 0xA0636D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA09C606: ???
==182== by 0xA09C5E7: ???
==182== by 0xA09C609: ???
==182== by 0x4A8312F: ???
==182== by 0xA09C5E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9E68EE7: ???
==182== by 0x9E68EB7: ???
==182== by 0x9E68EEA: ???
==182== by 0x4A8312F: ???
==182== by 0x9E68EB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA271516: ???
==182== by 0xA2714F7: ???
==182== by 0xA271519: ???
==182== by 0x4A8312F: ???
==182== by 0xA2714F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBD883F6: ???
==182== by 0xBD883D7: ???
==182== by 0xBD883F9: ???
==182== by 0x4A8312F: ???
==182== by 0xBD883D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9FC1767: ???
==182== by 0x9FC1737: ???
==182== by 0x9FC176A: ???
==182== by 0x4A8312F: ???
==182== by 0x9FC1737: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9E53677: ???
==182== by 0x9E53647: ???
==182== by 0x9E5367A: ???
==182== by 0x4A8312F: ???
==182== by 0x9E53647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA516DF7: ???
==182== by 0xA516DC7: ???
==182== by 0xA516DFA: ???
==182== by 0x4A8312F: ???
==182== by 0xA516DC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA93A937: ???
==182== by 0xA93A907: ???
==182== by 0xA93A93A: ???
==182== by 0x4A8312F: ???
==182== by 0xA93A907: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA5685D6: ???
==182== by 0xA5685B7: ???
==182== by 0xA5685D9: ???
==182== by 0x4A8312F: ???
==182== by 0xA5685B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA568816: ???
==182== by 0xA5687F7: ???
==182== by 0xA568819: ???
==182== by 0x4A8312F: ???
==182== by 0xA5687F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA56ACCF: ???
==182== by 0xA56ACA7: ???
==182== by 0xA56ACD2: ???
==182== by 0x4A8312F: ???
==182== by 0xA56ACA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA56FBEF: ???
==182== by 0xA56FBC7: ???
==182== by 0xA56FBF2: ???
==182== by 0x4A8312F: ???
==182== by 0xA56FBC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0E0A97: ???
==182== by 0xA0E0A67: ???
==182== by 0xA0E0A9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA0E0A67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6644D7: ???
==182== by 0xA6644A7: ???
==182== by 0xA6644DA: ???
==182== by 0x4A8312F: ???
==182== by 0xA6644A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6EC437: ???
==182== by 0xA6EC407: ???
==182== by 0xA6EC43A: ???
==182== by 0x4A8312F: ???
==182== by 0xA6EC407: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7620A7: ???
==182== by 0xA762077: ???
==182== by 0xA7620AA: ???
==182== by 0x4A8312F: ???
==182== by 0xA762077: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA7D06A7: ???
==182== by 0xA7D0677: ???
==182== by 0xA7D06AA: ???
==182== by 0x4A8312F: ???
==182== by 0xA7D0677: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAFD46DF: ???
==182== by 0xAFD46C7: ???
==182== by 0xAFD46E2: ???
==182== by 0x4A8312F: ???
==182== by 0xAFD46C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xAE37C17: ???
==182== by 0xAE37C17: ???
==182== by 0xAE37C37: ???
==182== by 0x4A8312F: ???
==182== by 0xAE37C17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7FDE: ???
==182== by 0xAE37C36: ???
==182== by 0xAE37C17: ???
==182== by 0xAE37C37: ???
==182== by 0x4A8312F: ???
==182== by 0xAE37C17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF0EE50: ???
==182== by 0xAF0EE27: ???
==182== by 0xAF0EE53: ???
==182== by 0x4A8312F: ???
==182== by 0xAF0EE27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB001037: ???
==182== by 0xB001037: ???
==182== by 0xB00106A: ???
==182== by 0x4A8312F: ???
==182== by 0xB001037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA126E87: ???
==182== by 0xA126E87: ???
==182== by 0xA126EBA: ???
==182== by 0x4A8312F: ???
==182== by 0xA126E87: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA1D6207: ???
==182== by 0xA1D6207: ???
==182== by 0xA1D6233: ???
==182== by 0x4A8312F: ???
==182== by 0xA1D6207: ???
==182== Address 0xa1d622f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA1D6207: ???
==182== by 0xA1D6207: ???
==182== by 0xA1D6233: ???
==182== by 0x4A8312F: ???
==182== by 0xA1D6207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xAD19857: ???
==182== by 0xAD19857: ???
==182== by 0xAD1989C: ???
==182== by 0x4A8312F: ???
==182== by 0xAD19857: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xAFEB017: ???
==182== by 0xAFEB017: ???
==182== by 0xAFEB062: ???
==182== by 0x4A8312F: ???
==182== by 0xAFEB017: ???
==182== Address 0xafeb05f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xAFEB017: ???
==182== by 0xAFEB017: ???
==182== by 0xAFEB062: ???
==182== by 0x4A8312F: ???
==182== by 0xAFEB017: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA7F2127: ???
==182== by 0xA7F2127: ???
==182== by 0xA7F2170: ???
==182== by 0x4A8312F: ???
==182== by 0xA7F2127: ???
==182== Address 0xa7f216f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA7F2127: ???
==182== by 0xA7F2127: ???
==182== by 0xA7F2170: ???
==182== by 0x4A8312F: ???
==182== by 0xA7F2127: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA8049B7: ???
==182== by 0xA8049B7: ???
==182== by 0xA804A01: ???
==182== by 0x4A8312F: ???
==182== by 0xA8049B7: ???
==182== Address 0xa8049ff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA8049B7: ???
==182== by 0xA8049B7: ???
==182== by 0xA804A01: ???
==182== by 0x4A8312F: ???
==182== by 0xA8049B7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xAD87F77: ???
==182== by 0xAD87F77: ???
==182== by 0xAD87FC1: ???
==182== by 0x4A8312F: ???
==182== by 0xAD87F77: ???
==182== Address 0xad87fbf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xAD87F77: ???
==182== by 0xAD87F77: ???
==182== by 0xAD87FC1: ???
==182== by 0x4A8312F: ???
==182== by 0xAD87F77: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xAD9DEA7: ???
==182== by 0xAD9DEA7: ???
==182== by 0xAD9DEF1: ???
==182== by 0x4A8312F: ???
==182== by 0xAD9DEA7: ???
==182== Address 0xad9deef is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xAD9DEA7: ???
==182== by 0xAD9DEA7: ???
==182== by 0xAD9DEF1: ???
==182== by 0x4A8312F: ???
==182== by 0xAD9DEA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA1DFB77: ???
==182== by 0xA1DFB77: ???
==182== by 0xA1DFBB7: ???
==182== by 0x4A8312F: ???
==182== by 0xA1DFB77: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xAFFE117: ???
==182== by 0xAFFE117: ???
==182== by 0xAFFE162: ???
==182== by 0x4A8312F: ???
==182== by 0xAFFE117: ???
==182== Address 0xaffe15f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xAFFE117: ???
==182== by 0xAFFE117: ???
==182== by 0xAFFE162: ???
==182== by 0x4A8312F: ???
==182== by 0xAFFE117: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB09A627: ???
==182== by 0xB09A627: ???
==182== by 0xB09A66C: ???
==182== by 0x4A8312F: ???
==182== by 0xB09A627: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB0AA487: ???
==182== by 0xB0AA487: ???
==182== by 0xB0AA4BC: ???
==182== by 0x4A8312F: ???
==182== by 0xB0AA487: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x726F432F6372732E: ???
==182== by 0x2F73747365542F64: ???
==182== by 0x7274736172666E48: ???
==182== by 0x432F657275746374: ???
==182== by 0x4965727473616460: ???
==182== by 0x61432F74726F706C: ???
==182== by 0x6150657274736163: ???
==182== by 0x7473655472657371: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB14AAE0: ???
==182== by 0xB14AAB7: ???
==182== by 0xB14AAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xB14AAB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0F70F3: ???
==182== by 0xB0F70C7: ???
==182== by 0xB0F70F8: ???
==182== by 0x4A8312F: ???
==182== by 0xB0F70C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x646F4D2F6372732E: ???
==182== by 0x616461432F656C74: ???
==182== by 0x6F706D4965727472: ???
==182== by 0x69616D6F442F7471: ???
==182== by 0x7473616461432F6D: ???
==182== by 0x74726F706D496571: ???
==182== by 0x2F737365636F724F: ???
==182== by 0x6A624F65756C6155: ???
==182== by 0x6C6165522F746364: ???
==182== by 0xB1DB60F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB1E9C0D: ???
==182== by 0xB1E9BE7: ???
==182== by 0xB1E9C10: ???
==182== by 0x4A8312F: ???
==182== by 0xB1E9BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB1EA64E: ???
==182== by 0xB1EA627: ???
==182== by 0xB1EA651: ???
==182== by 0x4A8312F: ???
==182== by 0xB1EA627: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xAFFD121: ???
==182== by 0xAFFD0F7: ???
==182== by 0xAFFD126: ???
==182== by 0x4A8312F: ???
==182== by 0xAFFD0F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB1CE4BD: ???
==182== by 0xB1CE497: ???
==182== by 0xB1CE4C0: ???
==182== by 0x4A8312F: ???
==182== by 0xB1CE497: ???
==182==
==182== Invalid read of size 16
==182== at 0xC613AFD: ???
==182== by 0xAF68207: ???
==182== by 0xAF68207: ???
==182== by 0xAF68250: ???
==182== by 0x4A8312F: ???
==182== by 0xAF68207: ???
==182== Address 0xaf6824e is 94 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC613B26: ???
==182== by 0xAF68207: ???
==182== by 0xAF68207: ???
==182== by 0xAF68250: ???
==182== by 0x4A8312F: ???
==182== by 0xAF68207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC613B26: ???
==182== by 0xB0FA8F7: ???
==182== by 0xB0FA8F7: ???
==182== by 0xB0FA949: ???
==182== by 0x4A8312F: ???
==182== by 0xB0FA8F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC613B26: ???
==182== by 0xB0FA6C7: ???
==182== by 0xB0FA6C7: ???
==182== by 0xB0FA719: ???
==182== by 0x4A8312F: ???
==182== by 0xB0FA6C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA538B47: ???
==182== by 0xA538B47: ???
==182== by 0xA538B86: ???
==182== by 0x4A8312F: ???
==182== by 0xA538B47: ???
==182== Address 0xa538b7f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA44F0D7: ???
==182== by 0xA44F0D7: ???
==182== by 0xA44F116: ???
==182== by 0x4A8312F: ???
==182== by 0xA44F0D7: ???
==182== Address 0xa44f10f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA450187: ???
==182== by 0xA450187: ???
==182== by 0xA4501CA: ???
==182== by 0x4A8312F: ???
==182== by 0xA450187: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB178807: ???
==182== by 0xB178807: ???
==182== by 0xB17885A: ???
==182== by 0x4A8312F: ???
==182== by 0xB178807: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xADA6DF2: ???
==182== by 0xADA6DC7: ???
==182== by 0xADA6DF5: ???
==182== by 0x4A8312F: ???
==182== by 0xADA6DC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB57BE41: ???
==182== by 0xB57BE17: ???
==182== by 0xB57BE44: ???
==182== by 0x4A8312F: ???
==182== by 0xB57BE17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xC1FB2E7: ???
==182== by 0xC1FB2E7: ???
==182== by 0xC1FB31D: ???
==182== by 0x4A8312F: ???
==182== by 0xC1FB2E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5F3529: ???
==182== by 0xB5F34D7: ???
==182== by 0xB5F352C: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F34D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB705CDD: ???
==182== by 0xB705CB7: ???
==182== by 0xB705CE0: ???
==182== by 0x4A8312F: ???
==182== by 0xB705CB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB7CB807: ???
==182== by 0xB7CB807: ???
==182== by 0xB7CB86C: ???
==182== by 0x4A8312F: ???
==182== by 0xB7CB807: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB7F3877: ???
==182== by 0xB7F3877: ???
==182== by 0xB7F38DC: ???
==182== by 0x4A8312F: ???
==182== by 0xB7F3877: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB78B047: ???
==182== by 0xB78B047: ???
==182== by 0xB78B098: ???
==182== by 0x4A8312F: ???
==182== by 0xB78B047: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB816DB7: ???
==182== by 0xB816DB7: ???
==182== by 0xB816E04: ???
==182== by 0x4A8312F: ???
==182== by 0xB816DB7: ???
==182== Address 0xb816dff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB816DB7: ???
==182== by 0xB816DB7: ???
==182== by 0xB816E04: ???
==182== by 0x4A8312F: ???
==182== by 0xB816DB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9EC7290: ???
==182== by 0x9EC7267: ???
==182== by 0x9EC7296: ???
==182== by 0x4A8312F: ???
==182== by 0x9EC7267: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB8B649E: ???
==182== by 0xB8B6487: ???
==182== by 0xB8B64A4: ???
==182== by 0x4A8312F: ???
==182== by 0xB8B6487: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9636C5: ???
==182== by 0xB9636A7: ???
==182== by 0xB9636CB: ???
==182== by 0x4A8312F: ???
==182== by 0xB9636A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB986AE5: ???
==182== by 0xB986AC7: ???
==182== by 0xB986AEB: ???
==182== by 0x4A8312F: ???
==182== by 0xB986AC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB993515: ???
==182== by 0xB9934F7: ???
==182== by 0xB99351B: ???
==182== by 0x4A8312F: ???
==182== by 0xB9934F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB983F10: ???
==182== by 0xB983EA7: ???
==182== by 0xB983F16: ???
==182== by 0x4A8312F: ???
==182== by 0xB983EA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB94748A: ???
==182== by 0xB947457: ???
==182== by 0xB947490: ???
==182== by 0x4A8312F: ???
==182== by 0xB947457: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB99A23A: ???
==182== by 0xB99A207: ???
==182== by 0xB99A240: ???
==182== by 0x4A8312F: ???
==182== by 0xB99A207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB979D6F: ???
==182== by 0xB979D57: ???
==182== by 0xB979D75: ???
==182== by 0x4A8312F: ???
==182== by 0xB979D57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E7DA7: ???
==182== by 0xB8E7D87: ???
==182== by 0xB8E7DAD: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E7D87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB945F37: ???
==182== by 0xB945F37: ???
==182== by 0xB945F76: ???
==182== by 0x4A8312F: ???
==182== by 0xB945F37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB975227: ???
==182== by 0xB975227: ???
==182== by 0xB97524A: ???
==182== by 0x4A8312F: ???
==182== by 0xB975227: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB9C1D17: ???
==182== by 0xB9C1D17: ???
==182== by 0xB9C1D3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB9C1D17: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB909947: ???
==182== by 0xB909947: ???
==182== by 0xB909971: ???
==182== by 0x4A8312F: ???
==182== by 0xB909947: ???
==182== Address 0xb90996f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB909947: ???
==182== by 0xB909947: ???
==182== by 0xB909971: ???
==182== by 0x4A8312F: ???
==182== by 0xB909947: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7CF304E: ???
==182== by 0x7CF3027: ???
==182== by 0x7CF3051: ???
==182== by 0x4A8312F: ???
==182== by 0x7CF3027: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CFF555: ???
==182== by 0x7CFF527: ???
==182== by 0x7CFF558: ???
==182== by 0x4A8312F: ???
==182== by 0x7CFF527: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xBAA0787: ???
==182== by 0xBAA0787: ???
==182== by 0xBAA07D0: ???
==182== by 0x4A8312F: ???
==182== by 0xBAA0787: ???
==182== Address 0xbaa07cf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xBAA0787: ???
==182== by 0xBAA0787: ???
==182== by 0xBAA07D0: ???
==182== by 0x4A8312F: ???
==182== by 0xBAA0787: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xBA7B0A7: ???
==182== by 0xBA7B0A7: ???
==182== by 0xBA7B0F0: ???
==182== by 0x4A8312F: ???
==182== by 0xBA7B0A7: ???
==182== Address 0xba7b0ef is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xBA7B0A7: ???
==182== by 0xBA7B0A7: ???
==182== by 0xBA7B0F0: ???
==182== by 0x4A8312F: ???
==182== by 0xBA7B0A7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0x4B3B867: ???
==182== by 0x4B3B867: ???
==182== by 0x4B3B885: ???
==182== by 0x4A8312F: ???
==182== by 0x4B3B867: ???
==182== Address 0x4b3b87f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0x4B3B867: ???
==182== by 0x4B3B867: ???
==182== by 0x4B3B885: ???
==182== by 0x4A8312F: ???
==182== by 0x4B3B867: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0x4C0E3E7: ???
==182== by 0x4C0E3E7: ???
==182== by 0x4C0E405: ???
==182== by 0x4A8312F: ???
==182== by 0x4C0E3E7: ???
==182== Address 0x4c0e3ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0x4C0E3E7: ???
==182== by 0x4C0E3E7: ???
==182== by 0x4C0E405: ???
==182== by 0x4A8312F: ???
==182== by 0x4C0E3E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B7A880: ???
==182== by 0x4B7A857: ???
==182== by 0x4B7A883: ???
==182== by 0x4A8312F: ???
==182== by 0x4B7A857: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B7B765: ???
==182== by 0x4B7B6F7: ???
==182== by 0x4B7B768: ???
==182== by 0x4A8312F: ???
==182== by 0x4B7B6F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x4B7BD0D: ???
==182== by 0x4B7BCE7: ???
==182== by 0x4B7BD10: ???
==182== by 0x4A8312F: ???
==182== by 0x4B7BCE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B7D3BF: ???
==182== by 0x4B7D357: ???
==182== by 0x4B7D3C2: ???
==182== by 0x4A8312F: ???
==182== by 0x4B7D357: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xBA86177: ???
==182== by 0xBA86177: ???
==182== by 0xBA861A1: ???
==182== by 0x4A8312F: ???
==182== by 0xBA86177: ???
==182== Address 0xba8619f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xBA86177: ???
==182== by 0xBA86177: ???
==182== by 0xBA861A1: ???
==182== by 0x4A8312F: ???
==182== by 0xBA86177: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xBB11377: ???
==182== by 0xBB11377: ???
==182== by 0xBB113A1: ???
==182== by 0x4A8312F: ???
==182== by 0xBB11377: ???
==182== Address 0xbb1139f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xBB11377: ???
==182== by 0xBB11377: ???
==182== by 0xBB113A1: ???
==182== by 0x4A8312F: ???
==182== by 0xBB11377: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60F85D: ???
==182== by 0xBB4C737: ???
==182== by 0xBB4C737: ???
==182== by 0xBB4C776: ???
==182== by 0x4A8312F: ???
==182== by 0xBB4C737: ???
==182== Address 0xbb4c76e is 78 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php)
==182== by 0x5E9324: ??? (in /usr/local/bin/php)
==182== by 0x5EA3C6: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xBF603AD: ???
==182== by 0xBF60377: ???
==182== by 0xBF603B0: ???
==182== by 0x4A8312F: ???
==182== by 0xBF60377: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA38BEC7: ???
==182== by 0xA38BEC7: ???
==182== by 0xA38BEE8: ???
==182== by 0x4A8312F: ???
==182== by 0xA38BEC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA38BEC7: ???
==182== by 0xA38BEC7: ???
==182== by 0xA38BEE8: ???
==182== by 0x4A8312F: ???
==182== by 0xA38BEC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA38CE67: ???
==182== by 0xA38CE67: ???
==182== by 0xA38CE88: ???
==182== by 0x4A8312F: ???
==182== by 0xA38CE67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA38CE67: ???
==182== by 0xA38CE67: ???
==182== by 0xA38CE88: ???
==182== by 0x4A8312F: ???
==182== by 0xA38CE67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA38DF47: ???
==182== by 0xA38DF47: ???
==182== by 0xA38DF68: ???
==182== by 0x4A8312F: ???
==182== by 0xA38DF47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA38DF47: ???
==182== by 0xA38DF47: ???
==182== by 0xA38DF68: ???
==182== by 0x4A8312F: ???
==182== by 0xA38DF47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xAB2C0C7: ???
==182== by 0xAB2C0C7: ???
==182== by 0xAB2C11B: ???
==182== by 0x4A8312F: ???
==182== by 0xAB2C0C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF63: ???
==182== by 0xA3BBE49: ???
==182== by 0xA3BBDF7: ???
==182== by 0xA3BBE50: ???
==182== by 0x4A8312F: ???
==182== by 0xA3BBDF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECEA: ???
==182== by 0x4A8312F: ???
==182== by 0xA5AECE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECEA: ???
==182== by 0x4A8312F: ???
==182== by 0xA5AECE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECEA: ???
==182== by 0x4A8312F: ???
==182== by 0xA5AECE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECEA: ???
==182== by 0x4A8312F: ???
==182== by 0xA5AECE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECE7: ???
==182== by 0xA5AECEA: ???
==182== by 0x4A8312F: ???
==182== by 0xA5AECE7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182== Address 0xc13cb1f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182== Address 0xc13cb1f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182== Address 0xc13cb1f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182== Address 0xc13cb1f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182== Address 0xc13cb1f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CAD7: ???
==182== by 0xC13CB24: ???
==182== by 0x4A8312F: ???
==182== by 0xC13CAD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182== Address 0xa660dff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182== Address 0xa660dff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182== Address 0xa660dff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182== Address 0xa660dff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA660DB7: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA661157: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182== Address 0xa66136f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182== Address 0xa66136f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182== Address 0xa66136f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182== Address 0xa66136f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA661327: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA661C67: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182== Address 0xa66202f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182== Address 0xa66202f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182== Address 0xa66202f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182== Address 0xa66202f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA662017: ???
==182== by 0xA662017: ???
==182== by 0xA662033: ???
==182== by 0x4A8312F: ???
==182== by 0xA662017: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182== Address 0xa6620af is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182== Address 0xa6620af is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182== Address 0xa6620af is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182== Address 0xa6620af is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA662097: ???
==182== by 0xA662097: ???
==182== by 0xA6620B3: ???
==182== by 0x4A8312F: ???
==182== by 0xA662097: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182== Address 0xa6623df is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182== Address 0xa6623df is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182== Address 0xa6623df is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182== Address 0xa6623df is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623C7: ???
==182== by 0xA6623E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6623C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182== Address 0xa66245f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182== Address 0xa66245f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182== Address 0xa66245f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182== Address 0xa66245f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA662447: ???
==182== by 0xA662447: ???
==182== by 0xA662463: ???
==182== by 0x4A8312F: ???
==182== by 0xA662447: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB2FACD1: ???
==182== by 0xB2FAC87: ???
==182== by 0xB2FACD7: ???
==182== by 0x4A8312F: ???
==182== by 0xB2FAC87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ED0C: ???
==182== by 0x4A8312F: ???
==182== by 0xA66ECB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ED0C: ???
==182== by 0x4A8312F: ???
==182== by 0xA66ECB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ED0C: ???
==182== by 0x4A8312F: ???
==182== by 0xA66ECB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ECB7: ???
==182== by 0xA66ED0C: ???
==182== by 0x4A8312F: ???
==182== by 0xA66ECB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xC1BB827: ???
==182== by 0xC1BB827: ???
==182== by 0xC1BB87B: ???
==182== by 0x4A8312F: ???
==182== by 0xC1BB827: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD1A: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD1A: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD1A: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD1A: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD17: ???
==182== by 0xB36DD1A: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD17: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182== Address 0xb36ddbf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182== Address 0xb36ddbf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182== Address 0xb36ddbf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182== Address 0xb36ddbf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182== Address 0xb36ddbf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DD77: ???
==182== by 0xB36DDC4: ???
==182== by 0x4A8312F: ???
==182== by 0xB36DD77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF35: ???
==182== by 0xA660E00: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA93A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA93A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA93A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA93A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA937: ???
==182== by 0xB7BA93A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA99A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA997: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA99A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA997: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA99A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA997: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA99A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA997: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA997: ???
==182== by 0xB7BA99A: ???
==182== by 0x4A8312F: ???
==182== by 0xB7BA997: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB64B: ???
==182== by 0x4A8312F: ???
==182== by 0xB7EB647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB64B: ???
==182== by 0x4A8312F: ???
==182== by 0xB7EB647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB64B: ???
==182== by 0x4A8312F: ???
==182== by 0xB7EB647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB64B: ???
==182== by 0x4A8312F: ???
==182== by 0xB7EB647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB647: ???
==182== by 0xB7EB64B: ???
==182== by 0x4A8312F: ???
==182== by 0xB7EB647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF63: ???
==182== by 0xA66119D: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB929B37: ???
==182== by 0xB929B37: ???
==182== by 0xB929B3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB929B37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB929B37: ???
==182== by 0xB929B37: ???
==182== by 0xB929B3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB929B37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB929B37: ???
==182== by 0xB929B37: ???
==182== by 0xB929B3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB929B37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB929B37: ???
==182== by 0xB929B37: ???
==182== by 0xB929B3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB929B37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB929B37: ???
==182== by 0xB929B37: ???
==182== by 0xB929B3A: ???
==182== by 0x4A8312F: ???
==182== by 0xB929B37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF9A: ???
==182== by 0x4A8312F: ???
==182== by 0xB92CF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF9A: ???
==182== by 0x4A8312F: ???
==182== by 0xB92CF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF9A: ???
==182== by 0x4A8312F: ???
==182== by 0xB92CF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF9A: ???
==182== by 0x4A8312F: ???
==182== by 0xB92CF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF97: ???
==182== by 0xB92CF9A: ???
==182== by 0x4A8312F: ???
==182== by 0xB92CF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9FC: ???
==182== by 0x4A8312F: ???
==182== by 0xB97E9D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9FC: ???
==182== by 0x4A8312F: ???
==182== by 0xB97E9D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9FC: ???
==182== by 0x4A8312F: ???
==182== by 0xB97E9D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9FC: ???
==182== by 0x4A8312F: ???
==182== by 0xB97E9D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9D7: ???
==182== by 0xB97E9FC: ???
==182== by 0x4A8312F: ???
==182== by 0xB97E9D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xB999E97: ???
==182== by 0xB999E97: ???
==182== by 0xB999E9B: ???
==182== by 0x4A8312F: ???
==182== by 0xB999E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xB999E97: ???
==182== by 0xB999E97: ???
==182== by 0xB999E9B: ???
==182== by 0x4A8312F: ???
==182== by 0xB999E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xB999E97: ???
==182== by 0xB999E97: ???
==182== by 0xB999E9B: ???
==182== by 0x4A8312F: ???
==182== by 0xB999E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xB999E97: ???
==182== by 0xB999E97: ???
==182== by 0xB999E9B: ???
==182== by 0x4A8312F: ???
==182== by 0xB999E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xB999E97: ???
==182== by 0xB999E97: ???
==182== by 0xB999E9B: ???
==182== by 0x4A8312F: ???
==182== by 0xB999E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF35: ???
==182== by 0xA661370: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B75A: ???
==182== by 0x4A8312F: ???
==182== by 0x7C6B757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B75A: ???
==182== by 0x4A8312F: ???
==182== by 0x7C6B757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B75A: ???
==182== by 0x4A8312F: ???
==182== by 0x7C6B757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B75A: ???
==182== by 0x4A8312F: ???
==182== by 0x7C6B757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B757: ???
==182== by 0x7C6B75A: ???
==182== by 0x4A8312F: ???
==182== by 0x7C6B757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEAA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CEA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEAA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CEA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEAA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CEA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEAA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CEA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEA7: ???
==182== by 0x7D5CEAA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CEA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF0B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF0B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF0B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF0B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF07: ???
==182== by 0x7D5CF0B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D5CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF35: ???
==182== by 0xA661CAF: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D940A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D940A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D940A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D940A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940A7: ???
==182== by 0x7D940AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D940A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D94707: ???
==182== by 0x7D94707: ???
==182== by 0x7D9470A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D94707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D94707: ???
==182== by 0x7D94707: ???
==182== by 0x7D9470A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D94707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D94707: ???
==182== by 0x7D94707: ???
==182== by 0x7D9470A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D94707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D94707: ???
==182== by 0x7D94707: ???
==182== by 0x7D9470A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D94707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D94707: ???
==182== by 0x7D94707: ???
==182== by 0x7D9470A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D94707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA754537: ???
==182== by 0xA754537: ???
==182== by 0xA75453B: ???
==182== by 0x4A8312F: ???
==182== by 0xA754537: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA754537: ???
==182== by 0xA754537: ???
==182== by 0xA75453B: ???
==182== by 0x4A8312F: ???
==182== by 0xA754537: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xA754537: ???
==182== by 0xA754537: ???
==182== by 0xA75453B: ???
==182== by 0x4A8312F: ???
==182== by 0xA754537: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xA754537: ???
==182== by 0xA754537: ???
==182== by 0xA75453B: ???
==182== by 0x4A8312F: ???
==182== by 0xA754537: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xA754537: ???
==182== by 0xA754537: ???
==182== by 0xA75453B: ???
==182== by 0x4A8312F: ???
==182== by 0xA754537: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA209697: ???
==182== by 0xA209697: ???
==182== by 0xA2096DC: ???
==182== by 0x4A8312F: ???
==182== by 0xA209697: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA209697: ???
==182== by 0xA209697: ???
==182== by 0xA2096DC: ???
==182== by 0x4A8312F: ???
==182== by 0xA209697: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182== Address 0xa72a94f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182== Address 0xa72a94f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182== Address 0xa72a94f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182== Address 0xa72a94f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA72A937: ???
==182== by 0xA72A937: ???
==182== by 0xA72A953: ???
==182== by 0x4A8312F: ???
==182== by 0xA72A937: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182== Address 0xa72badf is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182== Address 0xa72badf is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182== Address 0xa72badf is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182== Address 0xa72badf is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAC7: ???
==182== by 0xA72BAE3: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BAC7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182== Address 0xa72bb5f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182== Address 0xa72bb5f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182== Address 0xa72bb5f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182== Address 0xa72bb5f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB47: ???
==182== by 0xA72BB63: ???
==182== by 0x4A8312F: ???
==182== by 0xA72BB47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB619D81: ???
==182== by 0xB619D37: ???
==182== by 0xB619D87: ???
==182== by 0x4A8312F: ???
==182== by 0xB619D37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7DBC047: ???
==182== by 0x7DBC047: ???
==182== by 0x7DBC09B: ???
==182== by 0x4A8312F: ???
==182== by 0x7DBC047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D87897: ???
==182== by 0x7D87897: ???
==182== by 0x7D8789A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D87897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D87897: ???
==182== by 0x7D87897: ???
==182== by 0x7D8789A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D87897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D87897: ???
==182== by 0x7D87897: ???
==182== by 0x7D8789A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D87897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D87897: ???
==182== by 0x7D87897: ???
==182== by 0x7D8789A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D87897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D87897: ???
==182== by 0x7D87897: ???
==182== by 0x7D8789A: ???
==182== by 0x4A8312F: ???
==182== by 0x7D87897: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182== Address 0xb03e0bf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182== Address 0xb03e0bf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182== Address 0xb03e0bf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182== Address 0xb03e0bf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182== Address 0xb03e0bf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xB03E077: ???
==182== by 0xB03E077: ???
==182== by 0xB03E0C4: ???
==182== by 0x4A8312F: ???
==182== by 0xB03E077: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF35: ???
==182== by 0xA2096D8: ???
==182== by 0xA209697: ???
==182== by 0xA2096DC: ???
==182== by 0x4A8312F: ???
==182== by 0xA209697: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B5A: ???
==182== by 0x4A8312F: ???
==182== by 0xAD46B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B5A: ???
==182== by 0x4A8312F: ???
==182== by 0xAD46B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B5A: ???
==182== by 0x4A8312F: ???
==182== by 0xAD46B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B5A: ???
==182== by 0x4A8312F: ???
==182== by 0xAD46B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B57: ???
==182== by 0xAD46B5A: ???
==182== by 0x4A8312F: ???
==182== by 0xAD46B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D2F9A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D2F9A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D2F9A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D2F9A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9A7: ???
==182== by 0x7D2F9AA: ???
==182== by 0x4A8312F: ???
==182== by 0x7D2F9A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xBA02C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xBA02C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xBA02C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xBA02C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02C87: ???
==182== by 0xBA02CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xBA02C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA5B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D3AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA5B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D3AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA5B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D3AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA5B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D3AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA57: ???
==182== by 0x7D3AA5B: ???
==182== by 0x4A8312F: ???
==182== by 0x7D3AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF35: ???
==182== by 0xA64DF24: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7DFC97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7DFC97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7DFC97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7DFC97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC97: ???
==182== by 0xA7DFC9A: ???
==182== by 0x4A8312F: ???
==182== by 0xA7DFC97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7BA: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F7B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7BA: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F7B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7BA: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F7B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7BA: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F7B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7B7: ???
==182== by 0x4A8F7BA: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F7B7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182== Address 0xbee647f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182== Address 0xbee647f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182== Address 0xbee647f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182== Address 0xbee647f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182== Address 0xbee647f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6457: ???
==182== by 0xBEE6483: ???
==182== by 0x4A8312F: ???
==182== by 0xBEE6457: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E019B: ???
==182== by 0x4A8312F: ???
==182== by 0xA7E0197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E019B: ???
==182== by 0x4A8312F: ???
==182== by 0xA7E0197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E019B: ???
==182== by 0x4A8312F: ???
==182== by 0xA7E0197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E019B: ???
==182== by 0x4A8312F: ???
==182== by 0xA7E0197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E0197: ???
==182== by 0xA7E019B: ???
==182== by 0x4A8312F: ???
==182== by 0xA7E0197: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CDA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C45CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CDA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C45CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CDA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C45CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CDA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C45CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CD7: ???
==182== by 0x4C45CDA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C45CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BEA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C73BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BEA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C73BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BEA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C73BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BEA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C73BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BE7: ???
==182== by 0x4C73BEA: ???
==182== by 0x4A8312F: ???
==182== by 0x4C73BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772D9: ???
==182== by 0x4A8312F: ???
==182== by 0x4C772B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772D9: ???
==182== by 0x4A8312F: ???
==182== by 0x4C772B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772D9: ???
==182== by 0x4A8312F: ???
==182== by 0x4C772B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772D9: ???
==182== by 0x4A8312F: ???
==182== by 0x4C772B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772B7: ???
==182== by 0x4C772D9: ???
==182== by 0x4A8312F: ???
==182== by 0x4C772B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E8B: ???
==182== by 0x4A8312F: ???
==182== by 0x4C80E87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E8B: ???
==182== by 0x4A8312F: ???
==182== by 0x4C80E87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E8B: ???
==182== by 0x4A8312F: ???
==182== by 0x4C80E87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E8B: ???
==182== by 0x4A8312F: ???
==182== by 0x4C80E87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E87: ???
==182== by 0x4C80E8B: ???
==182== by 0x4A8312F: ???
==182== by 0x4C80E87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA74371: ???
==182== by 0xBA74327: ???
==182== by 0xBA74377: ???
==182== by 0x4A8312F: ???
==182== by 0xBA74327: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x49C6187: ???
==182== by 0x49C6187: ???
==182== by 0x49C61DB: ???
==182== by 0x4A8312F: ???
==182== by 0x49C6187: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F3A: ???
==182== by 0x4A8312F: ???
==182== by 0x7B55F37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F3A: ???
==182== by 0x4A8312F: ???
==182== by 0x7B55F37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F3A: ???
==182== by 0x4A8312F: ???
==182== by 0x7B55F37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F3A: ???
==182== by 0x4A8312F: ???
==182== by 0x7B55F37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F37: ???
==182== by 0x7B55F3A: ???
==182== by 0x4A8312F: ???
==182== by 0x7B55F37: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182== Address 0x4c8efff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182== Address 0x4c8efff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182== Address 0x4c8efff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182== Address 0x4c8efff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182== Address 0x4c8efff is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8EFB7: ???
==182== by 0x4C8F004: ???
==182== by 0x4A8312F: ???
==182== by 0x4C8EFB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EFD1: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182== Address 0xa2f7aef is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EFEA: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60EBA9: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182== Address 0xa2f7aef is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60EBC2: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E781: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182== Address 0xa2f7aef is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E79A: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60E389: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182== Address 0xa2f7aef is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60E3A2: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AD7: ???
==182== by 0xA2F7AF3: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F7AD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x9EE6847: ???
==182== by 0x9EE6847: ???
==182== by 0x9EE689B: ???
==182== by 0x4A8312F: ???
==182== by 0x9EE6847: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549EA: ???
==182== by 0x4A8312F: ???
==182== by 0x9F549E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549EA: ???
==182== by 0x4A8312F: ???
==182== by 0x9F549E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549EA: ???
==182== by 0x4A8312F: ???
==182== by 0x9F549E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549EA: ???
==182== by 0x4A8312F: ???
==182== by 0x9F549E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549E7: ???
==182== by 0x9F549EA: ???
==182== by 0x4A8312F: ???
==182== by 0x9F549E7: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182== Address 0x9e9039f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182== Address 0x9e9039f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182== Address 0x9e9039f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182== Address 0x9e9039f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182== Address 0x9e9039f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0x9E90357: ???
==182== by 0x9E90357: ???
==182== by 0x9E903A4: ???
==182== by 0x4A8312F: ???
==182== by 0x9E90357: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60DF35: ???
==182== by 0xA2F9E43: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA2009B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA2009B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA2009B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA2009B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009B7: ???
==182== by 0xA2009BA: ???
==182== by 0x4A8312F: ???
==182== by 0xA2009B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8527: ???
==182== by 0x4A8312F: ???
==182== by 0xBDA8507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8527: ???
==182== by 0x4A8312F: ???
==182== by 0xBDA8507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8527: ???
==182== by 0x4A8312F: ???
==182== by 0xBDA8507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8527: ???
==182== by 0x4A8312F: ???
==182== by 0xBDA8507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8507: ???
==182== by 0xBDA8527: ???
==182== by 0x4A8312F: ???
==182== by 0xBDA8507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA18A717: ???
==182== by 0xA18A717: ???
==182== by 0xA18A71A: ???
==182== by 0x4A8312F: ???
==182== by 0xA18A717: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA18A717: ???
==182== by 0xA18A717: ???
==182== by 0xA18A71A: ???
==182== by 0x4A8312F: ???
==182== by 0xA18A717: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B6DA: ???
==182== by 0xA18A717: ???
==182== by 0xA18A717: ???
==182== by 0xA18A71A: ???
==182== by 0x4A8312F: ???
==182== by 0xA18A717: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA0A: ???
==182== by 0xA18A717: ???
==182== by 0xA18A717: ???
==182== by 0xA18A71A: ???
==182== by 0x4A8312F: ???
==182== by 0xA18A717: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A0A: ???
==182== by 0xA18A717: ???
==182== by 0xA18A717: ???
==182== by 0xA18A71A: ???
==182== by 0x4A8312F: ???
==182== by 0xA18A717: ???
==182==
==182== Invalid read of size 16
==182== at 0xC60D618: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE4A6: ???
==182== by 0x4A8312F: ???
==182== by 0xA3FE487: ???
==182== Address 0xa3fe49f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Invalid read of size 16
==182== at 0xCA1C0FC: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE4A6: ???
==182== by 0x4A8312F: ???
==182== by 0xA3FE487: ???
==182== Address 0xa3fe49f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Invalid read of size 16
==182== at 0xCA2B6F0: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE4A6: ???
==182== by 0x4A8312F: ???
==182== by 0xA3FE487: ???
==182== Address 0xa3fe49f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Invalid read of size 16
==182== at 0xCA2AA24: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE4A6: ???
==182== by 0x4A8312F: ???
==182== by 0xA3FE487: ???
==182== Address 0xa3fe49f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Invalid read of size 16
==182== at 0xCA29A24: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE487: ???
==182== by 0xA3FE4A6: ???
==182== by 0x4A8312F: ???
==182== by 0xA3FE487: ???
==182== Address 0xa3fe49f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x3F2912: php_pcre_split_impl (in /usr/local/bin/php)
==182== by 0x3F364C: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182== by 0x401C1F4: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0x401C1CD: ??? (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D631: ???
==182== by 0xA436047: ???
==182== by 0xA436047: ???
==182== by 0xA436069: ???
==182== by 0x4A8312F: ???
==182== by 0xA436047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C115: ???
==182== by 0xA436047: ???
==182== by 0xA436047: ???
==182== by 0xA436069: ???
==182== by 0x4A8312F: ???
==182== by 0xA436047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2B709: ???
==182== by 0xA436047: ???
==182== by 0xA436047: ???
==182== by 0xA436069: ???
==182== by 0x4A8312F: ???
==182== by 0xA436047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA2AA3D: ???
==182== by 0xA436047: ???
==182== by 0xA436047: ???
==182== by 0xA436069: ???
==182== by 0x4A8312F: ???
==182== by 0xA436047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA29A3D: ???
==182== by 0xA436047: ???
==182== by 0xA436047: ???
==182== by 0xA436069: ???
==182== by 0x4A8312F: ???
==182== by 0xA436047: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xC60D602: ???
==182== by 0xA087DB7: ???
==182== by 0xA087DB7: ???
==182== by 0xA087DBB: ???
==182== by 0x4A8312F: ???
==182== by 0xA087DB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xCA1C0E2: ???
==182== by 0xA087DB7: ???
==182== by 0xA087DB7: ???
==182== by 0xA087DBB: ???
==182== by 0x4A8312F: ???
==182== by 0xA087DB7: ???
==182==
==182==
==182== More than 1000 different errors detected. I'm not reporting any more.
==182== Final error counts will be inaccurate. Go fix your program!
==182== Rerun with --error-limit=no to disable this cutoff. Note
==182== that errors may occur in your program without prior warning from
==182== Valgrind, because errors are no longer being displayed.
==182==
==182==
==182== Process terminating with default action of signal 11 (SIGSEGV): dumping core
==182== General Protection Fault
==182== at 0x62CDC6: zend_std_get_gc (in /usr/local/bin/php)
==182== by 0x620E6F: zend_gc_collect_cycles (in /usr/local/bin/php)
==182== by 0x61FE46: ??? (in /usr/local/bin/php)
==182== by 0x67FB6B: execute_ex (in /usr/local/bin/php)
==182== by 0x625BF1: zend_generator_resume (in /usr/local/bin/php)
==182== by 0x626691: ??? (in /usr/local/bin/php)
==182== by 0x67FC4D: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182== by 0x5FB703: zend_execute_scripts (in /usr/local/bin/php)
==182== by 0x59D287: php_execute_script (in /usr/local/bin/php)
==182== by 0x683117: ??? (in /usr/local/bin/php)
==182== by 0x347776: ??? (in /usr/local/bin/php)
==182==
==182== HEAP SUMMARY:
==182== in use at exit: 148,138,334 bytes in 740,368 blocks
==182== total heap usage: 17,532,682 allocs, 16,792,314 frees, 3,571,019,206 bytes allocated
==182==
==182== LEAK SUMMARY:
==182== definitely lost: 907,512 bytes in 6,138 blocks
==182== indirectly lost: 22,888 bytes in 385 blocks
==182== possibly lost: 91,814,997 bytes in 385,458 blocks
==182== still reachable: 55,392,937 bytes in 348,387 blocks
==182== suppressed: 0 bytes in 0 blocks
==182== Rerun with --leak-check=full to see details of leaked memory
==182==
==182== Use --track-origins=yes to see where uninitialised values come from
==182== For lists of detected and suppressed errors, rerun with: -s
==182== ERROR SUMMARY: 1397 errors from 1000 contexts (suppressed: 74520 from 188)
Segmentation fault (core dumped)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment