Skip to content

Instantly share code, notes, and snippets.

@enumag

enumag/valgrind.txt Secret

Created Jun 15, 2020
Embed
What would you like to do?
PHP Bug #79646 Segmentation fault in garbage collector
==182== Memcheck, a memory error detector
==182== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==182== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info
==182== Command: php vendor/bin/phpunit
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x267: ???
==182== by 0x266: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x48E6205: ???
==182== by 0x1CE: ???
==182== by 0x97: ???
==182== by 0x404ED16: strlcat (in /lib/ld-musl-x86_64.so.1)
==182== by 0x48E6205: ???
==182== by 0x13103DF: ???
==182== by 0x266: ???
==182== by 0x131783F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x64616F6C6F747560: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x7265736F706D6F62: ???
==182== by 0x616F6C6F7475612E: ???
==182== by 0x702E6C6165725F63: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x7265736F706D6F62: ???
==182== by 0x6F4C7373616C432E: ???
==182== by 0x7068702E72656460: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F6E61747370686F: ???
==182== by 0x2F6E61747370686F: ???
==182== by 0x61727473746F6F61: ???
==182== by 0x4F6EA44E00000005: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F7362616C63796C: ???
==182== by 0x706F632D70656563: ???
==182== by 0x65442F6372732F78: ???
==182== by 0x642F79706F437064: ???
==182== by 0x79706F635F706564: ???
==182== by 0x4F6EA44ED4641442: ???
==182== by 0x1FFEFFB84F: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F74696E7570686F: ???
==182== by 0x2F74696E7570686F: ???
==182== by 0x6D6172462F637272: ???
==182== by 0x73412F6B726F7764: ???
==182== by 0x6E75462F74726572: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x1FFEFFB84F: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x6C6C6966796C6F6F: ???
==182== by 0x622F30387068702C: ???
==182== by 0x7061727473746F6E: ???
==182== by 0x6E75462F74726572: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x1FFE007067: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x7461636572706563: ???
==182== by 0x746E6F632D6E6F68: ???
==182== by 0x75662F7374636171: ???
==182== by 0x702E6E6F6974636D: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x1FFE007067: ???
==182== by 0x13181BF: ???
==182== by 0x7C63FAF: ???
==182== by 0x7C60CAF: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6D612F7068706D60: ???
==182== by 0x75662F62696C2F6F: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0xAB07FA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6D612F7068706D60: ???
==182== by 0x6E492F62696C2F6F: ???
==182== by 0x662F6C616E726573: ???
==182== by 0x736E6F6974636E74: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x79622F7068706D60: ???
==182== by 0x61657274732D6573: ???
==182== by 0x75662F62696C2F6C: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x642F736E6F697462: ???
==182== by 0x7068702E706D74: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x522F676E69727472: ???
==182== by 0x73656372756F7364: ???
==182== by 0x6F6974636E75662E: ???
==182== by 0x727473746F6F622E: ???
==182== by 0x7068702E7060: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x72742F7963617273: ???
==182== by 0x2F6372732F796360: ???
==182== by 0x68732F7963617253: ???
==182== by 0x2E7374756374726E: ???
==182== by 0x72007068702E736D: ???
==182== by 0x7068702E7060: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x79732F7068706D60: ???
==182== by 0x662F6372732F636D: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x2E7374756374726E: ???
==182== by 0x720070680070686F: ???
==182== by 0x7068702E7060: ???
==182== by 0x1FFEFFB70F: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E4868: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F73616E696D616B: ???
==182== by 0x2D73616E696D616B: ???
==182== by 0x6D617266646E6579: ???
==182== by 0x72622D6B726F7764: ???
==182== by 0x6372732F65676468: ???
==182== by 0x616F6C6F7475612E: ???
==182== by 0x1F00000003: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5D86EC: ??? (in /usr/local/bin/php)
==182== by 0x5E059D: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x64616F6C6F747560: ???
==182== by 0x608497: zend_hash_update (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x65732F7068706D60: ???
==182== by 0x74617A696C616971: ???
==182== by 0x2F6372732F6E6F68: ???
==182== by 0x6E6F6974636E7565: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x61702F7068706D60: ???
==182== by 0x6C2F6C656C6C6171: ???
==182== by 0x65746E6F432F6268: ???
==182== by 0x74636E75662F7477: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0xACB9BDF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x69662F7068706D60: ???
==182== by 0x662F6372732F656B: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x6974636E75662F71: ???
==182== by 0x7068702E736E6E: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x646E617265766163: ???
==182== by 0x6E6462696C2F6D6E: ???
==182== by 0x75662F6372732F72: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x7068702E706171: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6E642F7068706D60: ???
==182== by 0x75662F62696C2F72: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x7068700070686F: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x752F65756761656B: ???
==182== by 0x65737261702D6971: ???
==182== by 0x75662F6372732F71: ???
==182== by 0x5F736E6F6974636D: ???
==182== by 0x2E6564756C636E68: ???
==182== by 0xACB9AFF: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x74682F7068706D60: ???
==182== by 0x662F6372732F7073: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x2E6564750070686F: ???
==182== by 0x70686F: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6F732F7068706D60: ???
==182== by 0x6372732F74656B62: ???
==182== by 0x6F6974636E75662E: ???
==182== by 0x2E736E007068702D: ???
==182== by 0x2E6564750070686F: ???
==182== by 0x70686F: ???
==182== by 0xE4D9AF: ??? (in /usr/local/bin/php)
==182== by 0x5DF332: ??? (in /usr/local/bin/php)
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x746E6575716F6C64: ???
==182== by 0x732F796E6F68702E: ???
==182== by 0x6974696E692F6371: ???
==182== by 0x68702E657A696C60: ???
==182== by 0x1FFEFFB6FF: ???
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182== by 0x5E4044: ??? (in /usr/local/bin/php)
==182== by 0x5E9B29: ??? (in /usr/local/bin/php)
==182== by 0x5E047D: ??? (in /usr/local/bin/php)
==182== by 0x5E3C2C: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6F6C2F7068706D60: ???
==182== by 0x75662F6372732F66: ???
==182== by 0x2E736E6F6974636D: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0x10FF: ???
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x65722F7068706D60: ???
==182== by 0x706164612D746360: ???
==182== by 0x2F6374652F726573: ???
==182== by 0x2E79726F74636145: ???
==182== by 0x10FF: ???
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x74682F7068706D60: ???
==182== by 0x6E65696C632D7073: ???
==182== by 0x6E492F6372732F73: ???
==182== by 0x662F6C616E726573: ???
==182== by 0x736E6F6974636E74: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x752F7965736D6171: ???
==182== by 0x2F6372732F646974: ???
==182== by 0x6E6F6974636E7565: ???
==182== by 0x662F6C616E726573: ???
==182== by 0x736E6F6974636E74: ???
==182== by 0x7068702D: ???
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x74682F7068706D60: ???
==182== by 0x65767265732D7073: ???
==182== by 0x694D2F6372732F71: ???
==182== by 0x65726177656C6463: ???
==182== by 0x6F6974636E75662E: ???
==182== by 0x7068702D: ???
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x746E6575716F6C64: ???
==182== by 0x702D796E6F68702E: ???
==182== by 0x732F74696E757067: ???
==182== by 0x6974696E692F6371: ???
==182== by 0x68702E657A696C60: ???
==182== by 0x7068702E736D: ???
==182== by 0x3F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x61662F63696B696D: ???
==182== by 0x6574756F722D7472: ???
==182== by 0x6E75662F6372732E: ???
==182== by 0x702E736E6F697462: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0x580043FF: vgMemCheck_new_block (mc_malloc_wrappers.c:387)
==182== by 0x48A1849: realloc (vg_replace_malloc.c:836)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x6F702F7068706D60: ???
==182== by 0x732F736572677472: ???
==182== by 0x74636E75662F6371: ???
==182== by 0x7068702E736E6F68: ???
==182== by 0x7068702E73007067: ???
==182== by 0x580043FF: vgMemCheck_new_block (mc_malloc_wrappers.c:387)
==182== by 0x48A1849: realloc (vg_replace_malloc.c:836)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F6769666E6F632E: ???
==182== by 0x61727473746F6F61: ???
==182== by 0x2: ???
==182== by 0x1FFEFFBAFF: ???
==182== by 0x5B91B9: _php_stream_fopen (in /usr/local/bin/php)
==182== by 0x1FFEFFCBFF: ???
==182== by 0x9E33F97: ???
==182== by 0x9E33F97: ???
==182== by 0x3: ???
==182== by 0x7BA317F: ???
==182== by 0xBB6B90F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x64616F6C6F747560: ???
==182== by 0x1FFEFFB6F7: ???
==182== by 0x4094D83: ???
==182== by 0x404E07A: ??? (in /lib/ld-musl-x86_64.so.1)
==182== by 0xBB5CB5F: ???
==182== by 0x7FFFFFFFFFFFFFFF: ???
==182== by 0xBA96BAF: ???
==182== by 0xBB524EF: ???
==182== by 0xBB607AB: ???
==182== by 0xFFFFFFFFFFFFFFFE: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x442F766E65746F63: ???
==182== by 0x68702E766E65746E: ???
==182== by 0x6C6C6F430070686F: ???
==182== by 0x702E6E6F69746364: ???
==182== by 0x706870007067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x61682D726F727264: ???
==182== by 0x65442F72656C646D: ???
==182== by 0x7373616C43677561: ???
==182== by 0x702E726564616F4B: ???
==182== by 0x5E4564: ??? (in /usr/local/bin/php)
==182== by 0x5E3AE6: ??? (in /usr/local/bin/php)
==182== by 0xBBD3E7F: ???
==182== by 0x1102: ???
==182== by 0x58004737: vgMemCheck___builtin_vec_delete (mc_malloc_wrappers.c:530)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F676F6C2F72736F: ???
==182== by 0x2F676F4C2F72734F: ???
==182== by 0x6C6576654C676F4B: ???
==182== by 0x4F6EA44ED4641442: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F78796E6F626576: ???
==182== by 0x2D6C716870617266: ???
==182== by 0x2F6372732F70686F: ???
==182== by 0x2E4C516870617246: ???
==182== by 0xA1E333F: ???
==182== by 0x89: ???
==182== by 0xA6CAFE7: ???
==182== by 0x78: ???
==182== by 0x1FFEFFB8BF: ???
==182== by 0xA1E333F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F74696E7570686F: ???
==182== by 0x656C69662D70686F: ???
==182== by 0x6F7461726574692C: ???
==182== by 0x61462F6372732F71: ???
==182== by 0x7068702E65646162: ???
==182== by 0x58004485: vgMemCheck_new_block (mc_malloc_wrappers.c:400)
==182== by 0x27: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9F2: ???
==182== by 0x4A8312F: ???
==182== by 0xA36A9C7: ???
==182== Address 0xa36a9ef is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9C7: ???
==182== by 0xA36A9F2: ???
==182== by 0x4A8312F: ???
==182== by 0xA36A9C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E102: ???
==182== by 0x4A8312F: ???
==182== by 0xA36E0D7: ???
==182== Address 0xa36e0ff is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E0D7: ???
==182== by 0xA36E102: ???
==182== by 0x4A8312F: ???
==182== by 0xA36E0D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA3715A7: ???
==182== by 0xA3715A7: ???
==182== by 0xA3715D7: ???
==182== by 0x4A8312F: ???
==182== by 0xA3715A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA374117: ???
==182== by 0xA374117: ???
==182== by 0xA37414C: ???
==182== by 0x4A8312F: ???
==182== by 0xA374117: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37B067: ???
==182== by 0xA37B067: ???
==182== by 0xA37B091: ???
==182== by 0x4A8312F: ???
==182== by 0xA37B067: ???
==182== Address 0xa37b08f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37B067: ???
==182== by 0xA37B067: ???
==182== by 0xA37B091: ???
==182== by 0x4A8312F: ???
==182== by 0xA37B067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA374547: ???
==182== by 0xA374547: ???
==182== by 0xA374567: ???
==182== by 0x4A8312F: ???
==182== by 0xA374547: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37B7E7: ???
==182== by 0xA37B7E7: ???
==182== by 0xA37B806: ???
==182== by 0x4A8312F: ???
==182== by 0xA37B7E7: ???
==182== Address 0xa37b7ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DCA4: ???
==182== by 0x4A8312F: ???
==182== by 0xA37DC87: ???
==182== Address 0xa37dc9f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DC87: ???
==182== by 0xA37DCA4: ???
==182== by 0x4A8312F: ???
==182== by 0xA37DC87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37F087: ???
==182== by 0xA37F087: ???
==182== by 0xA37F0A7: ???
==182== by 0x4A8312F: ???
==182== by 0xA37F087: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB42: ???
==182== by 0x4A8312F: ???
==182== by 0xA37FB27: ???
==182== Address 0xa37fb3f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB27: ???
==182== by 0xA37FB42: ???
==182== by 0x4A8312F: ???
==182== by 0xA37FB27: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xA3807E7: ???
==182== by 0xA3807E7: ???
==182== by 0xA380802: ???
==182== by 0x4A8312F: ???
==182== by 0xA3807E7: ???
==182== Address 0xa3807ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xA3807E7: ???
==182== by 0xA3807E7: ???
==182== by 0xA380802: ???
==182== by 0x4A8312F: ???
==182== by 0xA3807E7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF9235: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31CA3: ???
==182== by 0x4A8312F: ???
==182== by 0x7C31C67: ???
==182== Address 0x7c31c9e is 78 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php)
==182== by 0x5E0CA1: ??? (in /usr/local/bin/php)
==182== by 0x5E9AE9: ??? (in /usr/local/bin/php)
==182== by 0x5E047D: ??? (in /usr/local/bin/php)
==182== by 0x5E4F12: ??? (in /usr/local/bin/php)
==182== by 0x5E7725: ??? (in /usr/local/bin/php)
==182== by 0x5E8716: ??? (in /usr/local/bin/php)
==182== by 0x5E77FE: ??? (in /usr/local/bin/php)
==182== by 0x5E8D4F: ??? (in /usr/local/bin/php)
==182== by 0x5E7813: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF9266: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31C67: ???
==182== by 0x7C31CA3: ???
==182== by 0x4A8312F: ???
==182== by 0x7C31C67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAC012A0: ???
==182== by 0xAC01287: ???
==182== by 0xAC012A3: ???
==182== by 0x4A8312F: ???
==182== by 0xAC01287: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xABFC400: ???
==182== by 0xABFC3E7: ???
==182== by 0xABFC403: ???
==182== by 0x4A8312F: ???
==182== by 0xABFC3E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA62A9E0: ???
==182== by 0xA62A9C7: ???
==182== by 0xA62A9E3: ???
==182== by 0x4A8312F: ???
==182== by 0xA62A9C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x62694C2F6372732E: ???
==182== by 0x7365542F79726171: ???
==182== by 0x6F666D79532F7373: ???
==182== by 0x74736E6F432F796D: ???
==182== by 0x61422F746E696171: ???
==182== by 0x6E756F6363416B6D: ???
==182== by 0x746164696C615673: ???
==182== by 0x702E74736554726E: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x2F726F646E65762E: ???
==182== by 0x2F796E6F666D7972: ???
==182== by 0x6F746164696C6175: ???
==182== by 0x432F747365542F71: ???
==182== by 0x6E69617274736E6E: ???
==182== by 0x746164696C615673: ???
==182== by 0x614374736554726E: ???
==182== by 0xF: ???
==182== by 0x5EE72A57: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF7641: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88E4: ???
==182== by 0x4A8312F: ???
==182== by 0xA2D88C7: ???
==182== Address 0xa2d88de is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x5C3E32: compile_filename (in /usr/local/bin/php)
==182== by 0x645BA6: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88C7: ???
==182== by 0xA2D88E4: ???
==182== by 0x4A8312F: ???
==182== by 0xA2D88C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0x4A7A9B7: ???
==182== by 0x4A7A9B7: ???
==182== by 0x4A7A9C8: ???
==182== by 0x4A8312F: ???
==182== by 0x4A7A9B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0xA5BD7E7: ???
==182== by 0xA5BD7E7: ???
==182== by 0xA5BD807: ???
==182== by 0x4A8312F: ???
==182== by 0xA5BD7E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0xAB67CC7: ???
==182== by 0xAB67CC7: ???
==182== by 0xAB67CE7: ???
==182== by 0x4A8312F: ???
==182== by 0xAB67CC7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF7641: ???
==182== by 0x9E91367: ???
==182== by 0x9E91367: ???
==182== by 0x9E91384: ???
==182== by 0x4A8312F: ???
==182== by 0x9E91367: ???
==182== Address 0x9e9137e is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5DA1AE: ??? (in /usr/local/bin/php)
==182== by 0x5E0CA1: ??? (in /usr/local/bin/php)
==182== by 0x5E9AE9: ??? (in /usr/local/bin/php)
==182== by 0x5E047D: ??? (in /usr/local/bin/php)
==182== by 0x5E4814: ??? (in /usr/local/bin/php)
==182== by 0x5E3B74: ??? (in /usr/local/bin/php)
==182== by 0x5E059D: ??? (in /usr/local/bin/php)
==182== by 0x5E68F6: ??? (in /usr/local/bin/php)
==182== by 0x5E04DD: ??? (in /usr/local/bin/php)
==182== by 0x5E768E: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF7666: ???
==182== by 0x9E91367: ???
==182== by 0x9E91367: ???
==182== by 0x9E91384: ???
==182== by 0x4A8312F: ???
==182== by 0x9E91367: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA660DFF: ???
==182== by 0xA660DB7: ???
==182== by 0xA660E04: ???
==182== by 0x4A8312F: ???
==182== by 0xA660DB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6B3669: ???
==182== by 0xA6B3627: ???
==182== by 0xA6B366C: ???
==182== by 0x4A8312F: ???
==182== by 0xA6B3627: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF8403: ???
==182== by 0xA66119C: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182== Address 0xa66119f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xA66119C: ???
==182== by 0xA661157: ???
==182== by 0xA6611A1: ???
==182== by 0x4A8312F: ???
==182== by 0xA661157: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA66136F: ???
==182== by 0xA661327: ???
==182== by 0xA661374: ???
==182== by 0x4A8312F: ???
==182== by 0xA661327: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF83BF: ???
==182== by 0xA661CAE: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182== Address 0xa661caf is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA661CAE: ???
==182== by 0xA661C67: ???
==182== by 0xA661CB3: ???
==182== by 0x4A8312F: ???
==182== by 0xA661C67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6EDAF1: ???
==182== by 0xA6EDAA7: ???
==182== by 0xA6EDAF7: ???
==182== by 0x4A8312F: ???
==182== by 0xA6EDAA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA241404: ???
==182== by 0xA2413C7: ???
==182== by 0xA241407: ???
==182== by 0x4A8312F: ???
==182== by 0xA2413C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA2096D7: ???
==182== by 0xA209697: ???
==182== by 0xA2096DC: ???
==182== by 0x4A8312F: ???
==182== by 0xA209697: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA75E510: ???
==182== by 0xA75E4C7: ???
==182== by 0xA75E513: ???
==182== by 0x4A8312F: ???
==182== by 0xA75E4C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xA64DF23: ???
==182== by 0xA64DED7: ???
==182== by 0xA64DF28: ???
==182== by 0x4A8312F: ???
==182== by 0xA64DED7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA762776: ???
==182== by 0xA762737: ???
==182== by 0xA762779: ???
==182== by 0x4A8312F: ???
==182== by 0xA762737: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA2FE8CF: ???
==182== by 0xA2FE867: ???
==182== by 0xA2FE8D2: ???
==182== by 0x4A8312F: ???
==182== by 0xA2FE867: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xA2F9DFB: ???
==182== by 0xA2F9DD7: ???
==182== by 0xA2F9E47: ???
==182== by 0x4A8312F: ???
==182== by 0xA2F9DD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x62694C2F6372732E: ???
==182== by 0x7365542F79726171: ???
==182== by 0x736C6974552F7373: ???
==182== by 0x614379656E6F4D2E: ???
==182== by 0x6F6974616C75636B: ???
==182== by 0x702E74736554736D: ???
==182== by 0x657A796B: ???
==182== by 0xAFBFD7F: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB064135: ???
==182== by 0xB0640C7: ???
==182== by 0xB064138: ???
==182== by 0x4A8312F: ???
==182== by 0xB0640C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB178D00: ???
==182== by 0xB178CD7: ???
==182== by 0xB178D03: ???
==182== by 0x4A8312F: ???
==182== by 0xB178CD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0D1553: ???
==182== by 0xB0D1527: ???
==182== by 0xB0D1558: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D1527: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x62694C2F6372732E: ???
==182== by 0x6C61562F79726171: ???
==182== by 0x7463656A624F6574: ???
==182== by 0x702E657461442F72: ???
==182== by 0x7F: ???
==182== by 0x1101: ???
==182== by 0x4F6EA44ED4641442: ???
==182== by 0x1FFEFFB1BF: ???
==182== by 0xD: ???
==182== by 0x1FFEFFB12F: ???
==182== by 0x4045629: fstatat (in /lib/ld-musl-x86_64.so.1)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB20C501: ???
==182== by 0xB20C4D7: ???
==182== by 0xB20C504: ???
==182== by 0x4A8312F: ???
==182== by 0xB20C4D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0C6B44: ???
==182== by 0xB0C6B17: ???
==182== by 0xB0C6B49: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6B17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0C6C5F: ???
==182== by 0xB0C6C27: ???
==182== by 0xB0C6C64: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6C27: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF8403: ???
==182== by 0xB0C6EF0: ???
==182== by 0xB0C6EC7: ???
==182== by 0xB0C6F43: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6EC7: ???
==182== Address 0xb0c6f3f is 143 bytes inside a block of size 152 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xB0C6EF0: ???
==182== by 0xB0C6EC7: ???
==182== by 0xB0C6F43: ???
==182== by 0x4A8312F: ???
==182== by 0xB0C6EC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7BF093D: ???
==182== by 0x7BF08B7: ???
==182== by 0x7BF0940: ???
==182== by 0x4A8312F: ???
==182== by 0x7BF08B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xAF79BF0: ???
==182== by 0xAF79B67: ???
==182== by 0xAF79BF5: ???
==182== by 0x4A8312F: ???
==182== by 0xAF79B67: ???
==182==
==182==
==182== More than 100 errors detected. Subsequent errors
==182== will still be recorded, but in less detail than before.
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB39C0ED: ???
==182== by 0xB39C0C7: ???
==182== by 0xB39C0F0: ???
==182== by 0x4A8312F: ???
==182== by 0xB39C0C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB39DB8E: ???
==182== by 0xB39DB57: ???
==182== by 0xB39DB91: ???
==182== by 0x4A8312F: ???
==182== by 0xB39DB57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB0D3741: ???
==182== by 0xB0D3707: ???
==182== by 0xB0D3746: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D3707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB268CAD: ???
==182== by 0xB268C87: ???
==182== by 0xB268CB0: ???
==182== by 0x4A8312F: ???
==182== by 0xB268C87: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF526D: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E84: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D3E67: ???
==182== Address 0xb0d3e7e is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF5296: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E67: ???
==182== by 0xB0D3E84: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D3E67: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF526D: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C1601: ???
==182== by 0x4A8312F: ???
==182== by 0xB1C15D7: ???
==182== Address 0xb1c15fe is 62 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x5C3E32: compile_filename (in /usr/local/bin/php)
==182== by 0x645BA6: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF5296: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C15D7: ???
==182== by 0xB1C1601: ???
==182== by 0x4A8312F: ???
==182== by 0xB1C15D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF5296: ???
==182== by 0xB0D55D7: ???
==182== by 0xB0D55D7: ???
==182== by 0xB0D55FA: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D55D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF526D: ???
==182== by 0xB0D54D7: ???
==182== by 0xB0D54D7: ???
==182== by 0xB0D54F5: ???
==182== by 0x4A8312F: ???
==182== by 0xB0D54D7: ???
==182== Address 0xb0d54ee is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB25B6BA: ???
==182== by 0xB25B697: ???
==182== by 0xB25B6BD: ???
==182== by 0x4A8312F: ???
==182== by 0xB25B697: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF8403: ???
==182== by 0xB1B78BD: ???
==182== by 0xB1B7897: ???
==182== by 0xB1B78C2: ???
==182== by 0x4A8312F: ???
==182== by 0xB1B7897: ???
==182== Address 0xb1b78bf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x5C70BA: lex_scan (in /usr/local/bin/php)
==182== by 0x5DB979: ??? (in /usr/local/bin/php)
==182== by 0x5BFDF9: zendparse (in /usr/local/bin/php)
==182== by 0x5C2689: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182== by 0x678B55: execute_ex (in /usr/local/bin/php)
==182== by 0x68108C: zend_execute (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF841C: ???
==182== by 0xB1B78BD: ???
==182== by 0xB1B7897: ???
==182== by 0xB1B78C2: ???
==182== by 0x4A8312F: ???
==182== by 0xB1B7897: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB423634: ???
==182== by 0xB423617: ???
==182== by 0xB423637: ???
==182== by 0x4A8312F: ???
==182== by 0xB423617: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF83ED: ???
==182== by 0xB1DC327: ???
==182== by 0xB1DC307: ???
==182== by 0xB1DC32C: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DC307: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF46C5: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE85: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DCE67: ???
==182== Address 0xb1dce7e is 46 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x623F0F: ??? (in /usr/local/bin/php)
==182== by 0x5DDD11: ??? (in /usr/local/bin/php)
==182== by 0x5E77CA: ??? (in /usr/local/bin/php)
==182== by 0x5EA37B: ??? (in /usr/local/bin/php)
==182== by 0x5EA3EF: ??? (in /usr/local/bin/php)
==182== by 0x5C2703: ??? (in /usr/local/bin/php)
==182== by 0x5C3DB9: compile_file (in /usr/local/bin/php)
==182== by 0x4AD2CA: ??? (in /usr/local/bin/php)
==182== by 0x645DA0: ??? (in /usr/local/bin/php)
==182== by 0x661A39: ??? (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF46EE: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE67: ???
==182== by 0xB1DCE85: ???
==182== by 0x4A8312F: ???
==182== by 0xB1DCE67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB50B5A5: ???
==182== by 0xB50B587: ???
==182== by 0xB50B5A8: ???
==182== by 0x4A8312F: ???
==182== by 0xB50B587: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB4E4C77: ???
==182== by 0xB4E4C77: ???
==182== by 0xB4E4C86: ???
==182== by 0x4A8312F: ???
==182== by 0xB4E4C77: ???
==182== Address 0xb4e4c7f is 31 bytes inside a block of size 40 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB58B677: ???
==182== by 0xB58B677: ???
==182== by 0xB58B6AA: ???
==182== by 0x4A8312F: ???
==182== by 0xB58B677: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB298FC7: ???
==182== by 0xB298FC7: ???
==182== by 0xB298FD6: ???
==182== by 0x4A8312F: ???
==182== by 0xB298FC7: ???
==182== Address 0xb298fcf is 31 bytes inside a block of size 40 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E352A: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x6178BA: zend_user_it_rewind (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB577847: ???
==182== by 0xB577847: ???
==182== by 0xB57787A: ???
==182== by 0x4A8312F: ???
==182== by 0xB577847: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB22: ???
==182== by 0x4A8312F: ???
==182== by 0xB57EB07: ???
==182== Address 0xb57eb1f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB07: ???
==182== by 0xB57EB22: ???
==182== by 0x4A8312F: ???
==182== by 0xB57EB07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5873A7: ???
==182== by 0xB5873A7: ???
==182== by 0xB5873DC: ???
==182== by 0x4A8312F: ???
==182== by 0xB5873A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB58C9F7: ???
==182== by 0xB58C9F7: ???
==182== by 0xB58CA18: ???
==182== by 0x4A8312F: ???
==182== by 0xB58C9F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB58CF07: ???
==182== by 0xB58CF07: ???
==182== by 0xB58CF38: ???
==182== by 0x4A8312F: ???
==182== by 0xB58CF07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB597827: ???
==182== by 0xB597827: ???
==182== by 0xB597858: ???
==182== by 0x4A8312F: ???
==182== by 0xB597827: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5A5C17: ???
==182== by 0xB5A5C17: ???
==182== by 0xB5A5C4C: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A5C17: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86D5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A86A7: ???
==182== Address 0xb5a86cf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86A7: ???
==182== by 0xB5A86D5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A86A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5A33D7: ???
==182== by 0xB5A33D7: ???
==182== by 0xB5A3409: ???
==182== by 0x4A8312F: ???
==182== by 0xB5A33D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47E3: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B47B7: ???
==182== Address 0xb5b47df is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47B7: ???
==182== by 0xB5B47E3: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B47B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B3DD7: ???
==182== by 0xB5B3DD7: ???
==182== by 0xB5B3E07: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B3DD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB59A357: ???
==182== by 0xB59A357: ???
==182== by 0xB59A385: ???
==182== by 0x4A8312F: ???
==182== by 0xB59A357: ???
==182== Address 0xb59a37f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB59A357: ???
==182== by 0xB59A357: ???
==182== by 0xB59A385: ???
==182== by 0x4A8312F: ???
==182== by 0xB59A357: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB63: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BEB37: ???
==182== Address 0xb5beb5f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB37: ???
==182== by 0xB5BEB63: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BEB37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BEE37: ???
==182== by 0xB5BEE37: ???
==182== by 0xB5BEE69: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BEE37: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5BF6B7: ???
==182== by 0xB5BF6B7: ???
==182== by 0xB5BF6E6: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BF6B7: ???
==182== Address 0xb5bf6df is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DE5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B0DB7: ???
==182== Address 0xb5b0ddf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DB7: ???
==182== by 0xB5B0DE5: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B0DB7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B1D27: ???
==182== by 0xB5B1D27: ???
==182== by 0xB5B1D56: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B1D27: ???
==182== Address 0xb5b1d4f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8F14: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B8EE7: ???
==182== Address 0xb5b8f0f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8EE7: ???
==182== by 0xB5B8F14: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B8EE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BAB47: ???
==182== by 0xB5BAB47: ???
==182== by 0xB5BAB7B: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BAB47: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B6400: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B63C7: ???
==182== Address 0xb5b63ff is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B63C7: ???
==182== by 0xB5B6400: ???
==182== by 0x4A8312F: ???
==182== by 0xB5B63C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD340: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BD307: ???
==182== Address 0xb5bd33f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD307: ???
==182== by 0xB5BD340: ???
==182== by 0x4A8312F: ???
==182== by 0xB5BD307: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2535: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C2507: ???
==182== Address 0xb5c252f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2507: ???
==182== by 0xB5C2535: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C2507: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5C4127: ???
==182== by 0xB5C4127: ???
==182== by 0xB5C4157: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C4127: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D52: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C5D27: ???
==182== Address 0xb5c5d4f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D27: ???
==182== by 0xB5C5D52: ???
==182== by 0x4A8312F: ???
==182== by 0xB5C5D27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5D56C7: ???
==182== by 0xB5D56C7: ???
==182== by 0xB5D56EC: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D56C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6361: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D6337: ???
==182== Address 0xb5d635f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6337: ???
==182== by 0xB5D6361: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D6337: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5CBAB7: ???
==182== by 0xB5CBAB7: ???
==182== by 0xB5CBAFB: ???
==182== by 0x4A8312F: ???
==182== by 0xB5CBAB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5EADC7: ???
==182== by 0xB5EADC7: ???
==182== by 0xB5EADFA: ???
==182== by 0x4A8312F: ???
==182== by 0xB5EADC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5ECDB7: ???
==182== by 0xB5ECDB7: ???
==182== by 0xB5ECDEA: ???
==182== by 0x4A8312F: ???
==182== by 0xB5ECDB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5F7857: ???
==182== by 0xB5F7857: ???
==182== by 0xB5F788C: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F7857: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5F90D7: ???
==182== by 0xB5F90D7: ???
==182== by 0xB5F911A: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F90D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA265: ???
==182== by 0x4A8312F: ???
==182== by 0xB5FA227: ???
==182== Address 0xb5fa25f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA227: ???
==182== by 0xB5FA265: ???
==182== by 0x4A8312F: ???
==182== by 0xB5FA227: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5D90D7: ???
==182== by 0xB5D90D7: ???
==182== by 0xB5D9118: ???
==182== by 0x4A8312F: ???
==182== by 0xB5D90D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB607FF7: ???
==182== by 0xB607FF7: ???
==182== by 0xB608024: ???
==182== by 0x4A8312F: ???
==182== by 0xB607FF7: ???
==182== Address 0xb60801f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB607FF7: ???
==182== by 0xB607FF7: ???
==182== by 0xB608024: ???
==182== by 0x4A8312F: ???
==182== by 0xB607FF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60B217: ???
==182== by 0xB60B217: ???
==182== by 0xB60B247: ???
==182== by 0x4A8312F: ???
==182== by 0xB60B217: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AF5: ???
==182== by 0x4A8312F: ???
==182== by 0xB609AC7: ???
==182== Address 0xb609aef is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AC7: ???
==182== by 0xB609AF5: ???
==182== by 0x4A8312F: ???
==182== by 0xB609AC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6089D7: ???
==182== by 0xB6089D7: ???
==182== by 0xB608A08: ???
==182== by 0x4A8312F: ???
==182== by 0xB6089D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB60B877: ???
==182== by 0xB60B877: ???
==182== by 0xB60B8B4: ???
==182== by 0x4A8312F: ???
==182== by 0xB60B877: ???
==182== Address 0xb60b8af is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60B877: ???
==182== by 0xB60B877: ???
==182== by 0xB60B8B4: ???
==182== by 0x4A8312F: ???
==182== by 0xB60B877: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60D6D7: ???
==182== by 0xB60D6D7: ???
==182== by 0xB60D709: ???
==182== by 0x4A8312F: ???
==182== by 0xB60D6D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB60DE97: ???
==182== by 0xB60DE97: ???
==182== by 0xB60DEC6: ???
==182== by 0x4A8312F: ???
==182== by 0xB60DE97: ???
==182== Address 0xb60debf is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB608DE7: ???
==182== by 0xB608DE7: ???
==182== by 0xB608E19: ???
==182== by 0x4A8312F: ???
==182== by 0xB608DE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB60F3B7: ???
==182== by 0xB60F3B7: ???
==182== by 0xB60F3E8: ???
==182== by 0x4A8312F: ???
==182== by 0xB60F3B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB604DA7: ???
==182== by 0xB604DA7: ???
==182== by 0xB604DC7: ???
==182== by 0x4A8312F: ???
==182== by 0xB604DA7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB61C797: ???
==182== by 0xB61C797: ???
==182== by 0xB61C7B3: ???
==182== by 0x4A8312F: ???
==182== by 0xB61C797: ???
==182== Address 0xb61c7af is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB61C797: ???
==182== by 0xB61C797: ???
==182== by 0xB61C7B3: ???
==182== by 0x4A8312F: ???
==182== by 0xB61C797: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB6259E7: ???
==182== by 0xB6259E7: ???
==182== by 0xB625A00: ???
==182== by 0x4A8312F: ???
==182== by 0xB6259E7: ???
==182== Address 0xb6259ff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6259E7: ???
==182== by 0xB6259E7: ???
==182== by 0xB625A00: ???
==182== by 0x4A8312F: ???
==182== by 0xB6259E7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB619A07: ???
==182== by 0xB619A07: ???
==182== by 0xB619A24: ???
==182== by 0x4A8312F: ???
==182== by 0xB619A07: ???
==182== Address 0xb619a1f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB619A07: ???
==182== by 0xB619A07: ???
==182== by 0xB619A24: ???
==182== by 0x4A8312F: ???
==182== by 0xB619A07: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB61A907: ???
==182== by 0xB61A907: ???
==182== by 0xB61A924: ???
==182== by 0x4A8312F: ???
==182== by 0xB61A907: ???
==182== Address 0xb61a91f is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB61A907: ???
==182== by 0xB61A907: ???
==182== by 0xB61A924: ???
==182== by 0x4A8312F: ???
==182== by 0xB61A907: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5F4C87: ???
==182== by 0xB5F4C87: ???
==182== by 0xB5F4CA7: ???
==182== by 0x4A8312F: ???
==182== by 0xB5F4C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB5CA2C7: ???
==182== by 0xB5CA2C7: ???
==182== by 0xB5CA2EA: ???
==182== by 0x4A8312F: ???
==182== by 0xB5CA2C7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63D6A7: ???
==182== by 0xB63D6A7: ???
==182== by 0xB63D6C6: ???
==182== by 0x4A8312F: ???
==182== by 0xB63D6A7: ???
==182== Address 0xb63d6bf is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB633667: ???
==182== by 0xB633667: ???
==182== by 0xB633692: ???
==182== by 0x4A8312F: ???
==182== by 0xB633667: ???
==182== Address 0xb63368f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB633667: ???
==182== by 0xB633667: ???
==182== by 0xB633692: ???
==182== by 0x4A8312F: ???
==182== by 0xB633667: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB648207: ???
==182== by 0xB648207: ???
==182== by 0xB648229: ???
==182== by 0x4A8312F: ???
==182== by 0xB648207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB61C827: ???
==182== by 0xB61C827: ???
==182== by 0xB61C84B: ???
==182== by 0x4A8312F: ???
==182== by 0xB61C827: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB632BE7: ???
==182== by 0xB632BE7: ???
==182== by 0xB632C04: ???
==182== by 0x4A8312F: ???
==182== by 0xB632BE7: ???
==182== Address 0xb632bff is 47 bytes inside a block of size 56 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB632BE7: ???
==182== by 0xB632BE7: ???
==182== by 0xB632C04: ???
==182== by 0x4A8312F: ???
==182== by 0xB632BE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB632647: ???
==182== by 0xB632647: ???
==182== by 0xB63268A: ???
==182== by 0x4A8312F: ???
==182== by 0xB632647: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB642CD7: ???
==182== by 0xB642CD7: ???
==182== by 0xB642D1B: ???
==182== by 0x4A8312F: ???
==182== by 0xB642CD7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63C527: ???
==182== by 0xB63C527: ???
==182== by 0xB63C555: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C527: ???
==182== Address 0xb63c54f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63C527: ???
==182== by 0xB63C527: ???
==182== by 0xB63C555: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C527: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63C907: ???
==182== by 0xB63C907: ???
==182== by 0xB63C944: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C907: ???
==182== Address 0xb63c93f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63C907: ???
==182== by 0xB63C907: ???
==182== by 0xB63C944: ???
==182== by 0x4A8312F: ???
==182== by 0xB63C907: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB639A57: ???
==182== by 0xB639A57: ???
==182== by 0xB639A87: ???
==182== by 0x4A8312F: ???
==182== by 0xB639A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63ACF7: ???
==182== by 0xB63ACF7: ???
==182== by 0xB63AD29: ???
==182== by 0x4A8312F: ???
==182== by 0xB63ACF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6342D7: ???
==182== by 0xB6342D7: ???
==182== by 0xB6342F8: ???
==182== by 0x4A8312F: ???
==182== by 0xB6342D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB661307: ???
==182== by 0xB661307: ???
==182== by 0xB661356: ???
==182== by 0x4A8312F: ???
==182== by 0xB661307: ???
==182== Address 0xb66134f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63CFA7: ???
==182== by 0xB63CFA7: ???
==182== by 0xB63D00B: ???
==182== by 0x4A8312F: ???
==182== by 0xB63CFA7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E631: ???
==182== by 0x4A8312F: ???
==182== by 0xB65E5D7: ???
==182== Address 0xb65e62f is 111 bytes inside a block of size 120 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E5D7: ???
==182== by 0xB65E631: ???
==182== by 0x4A8312F: ???
==182== by 0xB65E5D7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB65F437: ???
==182== by 0xB65F437: ???
==182== by 0xB65F4A5: ???
==182== by 0x4A8312F: ???
==182== by 0xB65F437: ???
==182== Address 0xb65f49f is 127 bytes inside a block of size 136 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB65F437: ???
==182== by 0xB65F437: ???
==182== by 0xB65F4A5: ???
==182== by 0x4A8312F: ???
==182== by 0xB65F437: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63DE97: ???
==182== by 0xB63DE97: ???
==182== by 0xB63DEC9: ???
==182== by 0x4A8312F: ???
==182== by 0xB63DE97: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F422: ???
==182== by 0x4A8312F: ???
==182== by 0xB63F3D7: ???
==182== Address 0xb63f41f is 95 bytes inside a block of size 104 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F3D7: ???
==182== by 0xB63F422: ???
==182== by 0x4A8312F: ???
==182== by 0xB63F3D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB667587: ???
==182== by 0xB667587: ???
==182== by 0xB6675B7: ???
==182== by 0x4A8312F: ???
==182== by 0xB667587: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB67AA57: ???
==182== by 0xB67AA57: ???
==182== by 0xB67AA7B: ???
==182== by 0x4A8312F: ???
==182== by 0xB67AA57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB67E967: ???
==182== by 0xB67E967: ???
==182== by 0xB67E988: ???
==182== by 0x4A8312F: ???
==182== by 0xB67E967: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB673C47: ???
==182== by 0xB673C47: ???
==182== by 0xB673C84: ???
==182== by 0x4A8312F: ???
==182== by 0xB673C47: ???
==182== Address 0xb673c7f is 79 bytes inside a block of size 88 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB673C47: ???
==182== by 0xB673C47: ???
==182== by 0xB673C84: ???
==182== by 0x4A8312F: ???
==182== by 0xB673C47: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB640627: ???
==182== by 0xB640627: ???
==182== by 0xB640656: ???
==182== by 0x4A8312F: ???
==182== by 0xB640627: ???
==182== Address 0xb64064f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB6424B7: ???
==182== by 0xB6424B7: ???
==182== by 0xB64250C: ???
==182== by 0x4A8312F: ???
==182== by 0xB6424B7: ???
==182==
==182== Invalid read of size 16
==182== at 0xBDF97E1: ???
==182== by 0xB645617: ???
==182== by 0xB645617: ???
==182== by 0xB645646: ???
==182== by 0x4A8312F: ???
==182== by 0xB645617: ???
==182== Address 0xb64563f is 63 bytes inside a block of size 72 alloc'd
==182== at 0x489F72A: malloc (vg_replace_malloc.c:309)
==182== by 0x5D30B8: __zend_malloc (in /usr/local/bin/php)
==182== by 0x53ACA6: ??? (in /usr/local/bin/php)
==182== by 0x540AA6: ??? (in /usr/local/bin/php)
==182== by 0x5411E6: ??? (in /usr/local/bin/php)
==182== by 0x67BF73: execute_ex (in /usr/local/bin/php)
==182== by 0x5ED108: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x4E38FA: ??? (in /usr/local/bin/php)
==182== by 0x5ED026: zend_call_function (in /usr/local/bin/php)
==182== by 0x617373: zend_call_method (in /usr/local/bin/php)
==182== by 0x61786A: zend_user_it_move_forward (in /usr/local/bin/php)
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB67F2F7: ???
==182== by 0xB67F2F7: ???
==182== by 0xB67F328: ???
==182== by 0x4A8312F: ???
==182== by 0xB67F2F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF97FA: ???
==182== by 0xB68D2C7: ???
==182== by 0xB68D2C7: ???
==182== by 0xB68D2E9: ???
==182== by 0x4A8312F: ???
==182== by 0xB68D2C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBEA2A23: ???
==182== by 0xBEA2A07: ???
==182== by 0xBEA2A26: ???
==182== by 0x4A8312F: ???
==182== by 0xBEA2A07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xBEA569A: ???
==182== by 0xBEA5627: ???
==182== by 0xBEA56A0: ???
==182== by 0x4A8312F: ???
==182== by 0xBEA5627: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7AB37F: ???
==182== by 0xB7AB317: ???
==182== by 0xB7AB385: ???
==182== by 0x4A8312F: ???
==182== by 0xB7AB317: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBEA7BFF: ???
==182== by 0xBEA7B57: ???
==182== by 0xBEA7C05: ???
==182== by 0x4A8312F: ???
==182== by 0xBEA7B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB800657: ???
==182== by 0xB800657: ???
==182== by 0xB8006C1: ???
==182== by 0x4A8312F: ???
==182== by 0xB800657: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB86D0B6: ???
==182== by 0xB86D097: ???
==182== by 0xB86D0BC: ???
==182== by 0x4A8312F: ???
==182== by 0xB86D097: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBEC48A3: ???
==182== by 0xBEC4887: ???
==182== by 0xBEC48A9: ???
==182== by 0x4A8312F: ???
==182== by 0xBEC4887: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0x404EDA2: strlcpy (in /lib/ld-musl-x86_64.so.1)
==182== by 0x6165522F6372732E: ???
==182== by 0x542F6C65646F4D63: ???
==182== by 0x6172472F73747364: ???
==182== by 0x6363412F4C51686F: ???
==182== by 0x2F676E69746E756E: ???
==182== by 0x69746E756F636340: ???
==182== by 0x696E6167724F676D: ???
==182== by 0x75516E6F69746179: ???
==182== by 0x2E74736554797264: ???
==182== by 0x7070612F7273752E: ???
==182== by 0x6165522F6372732E: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8D0AC0: ???
==182== by 0xB8D0AA7: ???
==182== by 0xB8D0AC3: ???
==182== by 0x4A8312F: ???
==182== by 0xB8D0AA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB7A3B22: ???
==182== by 0xB7A3AE7: ???
==182== by 0xB7A3B25: ???
==182== by 0x4A8312F: ???
==182== by 0xB7A3AE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8DF2F2: ???
==182== by 0xB8DF2B7: ???
==182== by 0xB8DF2F5: ???
==182== by 0x4A8312F: ???
==182== by 0xB8DF2B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E1950: ???
==182== by 0xB8E1937: ???
==182== by 0xB8E1953: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E1937: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E38D0: ???
==182== by 0xB8E38B7: ???
==182== by 0xB8E38D3: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E38B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8E5042: ???
==182== by 0xB8E5007: ???
==182== by 0xB8E5045: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E5007: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB8CC27A: ???
==182== by 0xB8CC257: ???
==182== by 0xB8CC27D: ???
==182== by 0x4A8312F: ???
==182== by 0xB8CC257: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB8E8757: ???
==182== by 0xB8E8757: ???
==182== by 0xB8E8778: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E8757: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9B7050: ???
==182== by 0xB9B7037: ???
==182== by 0xB9B7053: ???
==182== by 0x4A8312F: ???
==182== by 0xB9B7037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D0B6A0: ???
==182== by 0x7D0B687: ???
==182== by 0x7D0B6A3: ???
==182== by 0x4A8312F: ???
==182== by 0x7D0B687: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D25F90: ???
==182== by 0x7D25F77: ???
==182== by 0x7D25F93: ???
==182== by 0x4A8312F: ???
==182== by 0x7D25F77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x48B2AF0: ???
==182== by 0x48B2AD7: ???
==182== by 0x48B2AF3: ???
==182== by 0x4A8312F: ???
==182== by 0x48B2AD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4C06C60: ???
==182== by 0x4C06C47: ???
==182== by 0x4C06C63: ???
==182== by 0x4A8312F: ???
==182== by 0x4C06C47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C20B70: ???
==182== by 0x7C20B57: ???
==182== by 0x7C20B73: ???
==182== by 0x4A8312F: ???
==182== by 0x7C20B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C77150: ???
==182== by 0x7C77137: ???
==182== by 0x7C77153: ???
==182== by 0x4A8312F: ???
==182== by 0x7C77137: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA53CB40: ???
==182== by 0xA53CB27: ???
==182== by 0xA53CB43: ???
==182== by 0x4A8312F: ???
==182== by 0xA53CB27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0E6220: ???
==182== by 0xA0E6207: ???
==182== by 0xA0E6223: ???
==182== by 0x4A8312F: ???
==182== by 0xA0E6207: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA181610: ???
==182== by 0xA1815F7: ???
==182== by 0xA181613: ???
==182== by 0x4A8312F: ???
==182== by 0xA1815F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA21A800: ???
==182== by 0xA21A7E7: ???
==182== by 0xA21A803: ???
==182== by 0x4A8312F: ???
==182== by 0xA21A7E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA07AA60: ???
==182== by 0xA07AA47: ???
==182== by 0xA07AA63: ???
==182== by 0x4A8312F: ???
==182== by 0xA07AA47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA22AC20: ???
==182== by 0xA22AC07: ???
==182== by 0xA22AC23: ???
==182== by 0x4A8312F: ???
==182== by 0xA22AC07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA22CB10: ???
==182== by 0xA22CAF7: ???
==182== by 0xA22CB13: ???
==182== by 0x4A8312F: ???
==182== by 0xA22CAF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA39ADD0: ???
==182== by 0xA39ADB7: ???
==182== by 0xA39ADD3: ???
==182== by 0x4A8312F: ???
==182== by 0xA39ADB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA44FA40: ???
==182== by 0xA44FA27: ???
==182== by 0xA44FA43: ???
==182== by 0x4A8312F: ???
==182== by 0xA44FA27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAA1E380: ???
==182== by 0xAA1E367: ???
==182== by 0xAA1E383: ???
==182== by 0x4A8312F: ???
==182== by 0xAA1E367: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA97DD00: ???
==182== by 0xA97DCE7: ???
==182== by 0xA97DD03: ???
==182== by 0x4A8312F: ???
==182== by 0xA97DCE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA98C960: ???
==182== by 0xA98C947: ???
==182== by 0xA98C963: ???
==182== by 0x4A8312F: ???
==182== by 0xA98C947: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA9F7510: ???
==182== by 0xA9F74F7: ???
==182== by 0xA9F7513: ???
==182== by 0x4A8312F: ???
==182== by 0xA9F74F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA93FD40: ???
==182== by 0xA93FD27: ???
==182== by 0xA93FD43: ???
==182== by 0x4A8312F: ???
==182== by 0xA93FD27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA5D1C60: ???
==182== by 0xA5D1C47: ???
==182== by 0xA5D1C63: ???
==182== by 0x4A8312F: ???
==182== by 0xA5D1C47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA6392D0: ???
==182== by 0xA6392B7: ???
==182== by 0xA6392D3: ???
==182== by 0x4A8312F: ???
==182== by 0xA6392B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAB12720: ???
==182== by 0xAB12707: ???
==182== by 0xAB12723: ???
==182== by 0x4A8312F: ???
==182== by 0xAB12707: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA1EAD60: ???
==182== by 0xA1EAD47: ???
==182== by 0xA1EAD63: ???
==182== by 0x4A8312F: ???
==182== by 0xA1EAD47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA780500: ???
==182== by 0xA7804E7: ???
==182== by 0xA780503: ???
==182== by 0x4A8312F: ???
==182== by 0xA7804E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF1B830: ???
==182== by 0xAF1B817: ???
==182== by 0xAF1B833: ???
==182== by 0x4A8312F: ???
==182== by 0xAF1B817: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAF0F050: ???
==182== by 0xAF0F037: ???
==182== by 0xAF0F053: ???
==182== by 0x4A8312F: ???
==182== by 0xAF0F037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xAFCF390: ???
==182== by 0xAFCF377: ???
==182== by 0xAFCF393: ???
==182== by 0x4A8312F: ???
==182== by 0xAFCF377: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB12E880: ???
==182== by 0xB12E867: ???
==182== by 0xB12E883: ???
==182== by 0x4A8312F: ???
==182== by 0xB12E867: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1700D0: ???
==182== by 0xB1700B7: ???
==182== by 0xB1700D3: ???
==182== by 0x4A8312F: ???
==182== by 0xB1700B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB22D52E: ???
==182== by 0xB22D4F7: ???
==182== by 0xB22D531: ???
==182== by 0x4A8312F: ???
==182== by 0xB22D4F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB26AC6E: ???
==182== by 0xB26AC37: ???
==182== by 0xB26AC71: ???
==182== by 0x4A8312F: ???
==182== by 0xB26AC37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB44B30E: ???
==182== by 0xB44B2D7: ???
==182== by 0xB44B311: ???
==182== by 0x4A8312F: ???
==182== by 0xB44B2D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB4522CE: ???
==182== by 0xB452297: ???
==182== by 0xB4522D1: ???
==182== by 0x4A8312F: ???
==182== by 0xB452297: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB445F6D: ???
==182== by 0xB445F47: ???
==182== by 0xB445F70: ???
==182== by 0x4A8312F: ???
==182== by 0xB445F47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB440F1D: ???
==182== by 0xB440EF7: ???
==182== by 0xB440F20: ???
==182== by 0x4A8312F: ???
==182== by 0xB440EF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB461838: ???
==182== by 0xB4617D7: ???
==182== by 0xB46183B: ???
==182== by 0x4A8312F: ???
==182== by 0xB4617D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB467DD6: ???
==182== by 0xB467DA7: ???
==182== by 0xB467DD9: ???
==182== by 0x4A8312F: ???
==182== by 0xB467DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB389910: ???
==182== by 0xB3898D7: ???
==182== by 0xB389913: ???
==182== by 0x4A8312F: ???
==182== by 0xB3898D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1CDCC9: ???
==182== by 0xB1CDCB7: ???
==182== by 0xB1CDCCC: ???
==182== by 0x4A8312F: ???
==182== by 0xB1CDCB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA3B84A9: ???
==182== by 0xA3B8497: ???
==182== by 0xA3B84AC: ???
==182== by 0x4A8312F: ???
==182== by 0xA3B8497: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB203216: ???
==182== by 0xB2031E7: ???
==182== by 0xB203218: ???
==182== by 0x4A8312F: ???
==182== by 0xB2031E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB464946: ???
==182== by 0xB464917: ???
==182== by 0xB464948: ???
==182== by 0x4A8312F: ???
==182== by 0xB464917: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB27D0B6: ???
==182== by 0xB27D087: ???
==182== by 0xB27D0B8: ???
==182== by 0x4A8312F: ???
==182== by 0xB27D087: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4662A6: ???
==182== by 0xB466277: ???
==182== by 0xB4662A8: ???
==182== by 0x4A8312F: ???
==182== by 0xB466277: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4634D6: ???
==182== by 0xB4634A7: ???
==182== by 0xB4634D8: ???
==182== by 0x4A8312F: ???
==182== by 0xB4634A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4644E6: ???
==182== by 0xB4644B7: ???
==182== by 0xB4644E8: ???
==182== by 0x4A8312F: ???
==182== by 0xB4644B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB416DD6: ???
==182== by 0xB416DA7: ???
==182== by 0xB416DD8: ???
==182== by 0x4A8312F: ???
==182== by 0xB416DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF896D: ???
==182== by 0xB416DD6: ???
==182== by 0xB416DA7: ???
==182== by 0xB416DD8: ???
==182== by 0x4A8312F: ???
==182== by 0xB416DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE2F5FF: ???
==182== by 0xBE2F5D7: ???
==182== by 0xBE2F602: ???
==182== by 0x4A8312F: ???
==182== by 0xBE2F5D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBE2FC32: ???
==182== by 0xBE2FC17: ???
==182== by 0xBE2FC35: ???
==182== by 0x4A8312F: ???
==182== by 0xBE2FC17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB47E37E: ???
==182== by 0xB47E327: ???
==182== by 0xB47E381: ???
==182== by 0x4A8312F: ???
==182== by 0xB47E327: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB488193: ???
==182== by 0xB488137: ???
==182== by 0xB488196: ???
==182== by 0x4A8312F: ???
==182== by 0xB488137: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB394B76: ???
==182== by 0xB394B57: ???
==182== by 0xB394B79: ???
==182== by 0x4A8312F: ???
==182== by 0xB394B57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4C3A76: ???
==182== by 0xB4C3A57: ???
==182== by 0xB4C3A79: ???
==182== by 0x4A8312F: ???
==182== by 0xB4C3A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB55D6C6: ???
==182== by 0xB55D6A7: ???
==182== by 0xB55D6C9: ???
==182== by 0x4A8312F: ???
==182== by 0xB55D6A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4E59A6: ???
==182== by 0xB4E5987: ???
==182== by 0xB4E59A9: ???
==182== by 0x4A8312F: ???
==182== by 0xB4E5987: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5582E6: ???
==182== by 0xB5582C7: ???
==182== by 0xB5582E9: ???
==182== by 0x4A8312F: ???
==182== by 0xB5582C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5E12D6: ???
==182== by 0xB5E12B7: ???
==182== by 0xB5E12D9: ???
==182== by 0x4A8312F: ???
==182== by 0xB5E12B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB5FBC06: ???
==182== by 0xB5FBBE7: ???
==182== by 0xB5FBC09: ???
==182== by 0x4A8312F: ???
==182== by 0xB5FBBE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB4E313A: ???
==182== by 0xB4E3117: ???
==182== by 0xB4E313D: ???
==182== by 0x4A8312F: ???
==182== by 0xB4E3117: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB668866: ???
==182== by 0xB668847: ???
==182== by 0xB668869: ???
==182== by 0x4A8312F: ???
==182== by 0xB668847: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB706056: ???
==182== by 0xB706037: ???
==182== by 0xB706059: ???
==182== by 0x4A8312F: ???
==182== by 0xB706037: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB678FBD: ???
==182== by 0xB678F97: ???
==182== by 0xB678FC0: ???
==182== by 0x4A8312F: ???
==182== by 0xB678F97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB82EF46: ???
==182== by 0xB82EF27: ???
==182== by 0xB82EF49: ???
==182== by 0x4A8312F: ???
==182== by 0xB82EF27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB831106: ???
==182== by 0xB8310E7: ???
==182== by 0xB831109: ???
==182== by 0x4A8312F: ???
==182== by 0xB8310E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB831CEA: ???
==182== by 0xB831CC7: ???
==182== by 0xB831CED: ???
==182== by 0x4A8312F: ???
==182== by 0xB831CC7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB8E55BE: ???
==182== by 0xB8E5587: ???
==182== by 0xB8E55C1: ???
==182== by 0x4A8312F: ???
==182== by 0xB8E5587: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9568C6: ???
==182== by 0xB9568A7: ???
==182== by 0xB9568C9: ???
==182== by 0x4A8312F: ???
==182== by 0xB9568A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9626A6: ???
==182== by 0xB962687: ???
==182== by 0xB9626A9: ???
==182== by 0x4A8312F: ???
==182== by 0xB962687: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB956DC6: ???
==182== by 0xB956DA7: ???
==182== by 0xB956DC9: ???
==182== by 0x4A8312F: ???
==182== by 0xB956DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF00E96: ???
==182== by 0xBF00E67: ???
==182== by 0xBF00E98: ???
==182== by 0x4A8312F: ???
==182== by 0xBF00E67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB962E66: ???
==182== by 0xB962E37: ???
==182== by 0xB962E68: ???
==182== by 0x4A8312F: ???
==182== by 0xB962E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB966266: ???
==182== by 0xB966237: ???
==182== by 0xB966268: ???
==182== by 0x4A8312F: ???
==182== by 0xB966237: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF016F6: ???
==182== by 0xBF016C7: ???
==182== by 0xBF016F8: ???
==182== by 0x4A8312F: ???
==182== by 0xBF016C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB91CAB6: ???
==182== by 0xB91CA87: ???
==182== by 0xB91CAB8: ???
==182== by 0x4A8312F: ???
==182== by 0xB91CA87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB98C252: ???
==182== by 0xB98C237: ???
==182== by 0xB98C255: ???
==182== by 0x4A8312F: ???
==182== by 0xB98C237: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB98E622: ???
==182== by 0xB98E607: ???
==182== by 0xB98E625: ???
==182== by 0x4A8312F: ???
==182== by 0xB98E607: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB923125: ???
==182== by 0xB9230C7: ???
==182== by 0xB923128: ???
==182== by 0x4A8312F: ???
==182== by 0xB9230C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0xB98E17E: ???
==182== by 0xB98E147: ???
==182== by 0xB98E181: ???
==182== by 0x4A8312F: ???
==182== by 0xB98E147: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9D11D6: ???
==182== by 0xB9D11B7: ???
==182== by 0xB9D11D9: ???
==182== by 0x4A8312F: ???
==182== by 0xB9D11B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9D5FD6: ???
==182== by 0xB9D5FB7: ???
==182== by 0xB9D5FD9: ???
==182== by 0x4A8312F: ???
==182== by 0xB9D5FB7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB010A26: ???
==182== by 0xB0109F7: ???
==182== by 0xB010A28: ???
==182== by 0x4A8312F: ???
==182== by 0xB0109F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB017CB6: ???
==182== by 0xB017C87: ???
==182== by 0xB017CB8: ???
==182== by 0x4A8312F: ???
==182== by 0xB017C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB950A86: ???
==182== by 0xB950A57: ???
==182== by 0xB950A88: ???
==182== by 0x4A8312F: ???
==182== by 0xB950A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9EB086: ???
==182== by 0xB9EB057: ???
==182== by 0xB9EB088: ???
==182== by 0x4A8312F: ???
==182== by 0xB9EB057: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB94E1E6: ???
==182== by 0xB94E1B7: ???
==182== by 0xB94E1E8: ???
==182== by 0x4A8312F: ???
==182== by 0xB94E1B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CF3092: ???
==182== by 0x7CF3077: ???
==182== by 0x7CF3095: ???
==182== by 0x4A8312F: ???
==182== by 0x7CF3077: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CFAAF2: ???
==182== by 0x7CFAAD7: ???
==182== by 0x7CFAAF5: ???
==182== by 0x4A8312F: ???
==182== by 0x7CFAAD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D14C65: ???
==182== by 0x7D14C07: ???
==182== by 0x7D14C68: ???
==182== by 0x4A8312F: ???
==182== by 0x7D14C07: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x7D853EE: ???
==182== by 0x7D853B7: ???
==182== by 0x7D853F1: ???
==182== by 0x4A8312F: ???
==182== by 0x7D853B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7DA42C6: ???
==182== by 0x7DA42A7: ???
==182== by 0x7DA42C9: ???
==182== by 0x4A8312F: ???
==182== by 0x7DA42A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7DB7C16: ???
==182== by 0x7DB7BF7: ???
==182== by 0x7DB7C19: ???
==182== by 0x4A8312F: ???
==182== by 0x7DB7BF7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D1C986: ???
==182== by 0x7D1C957: ???
==182== by 0x7D1C988: ???
==182== by 0x4A8312F: ???
==182== by 0x7D1C957: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7D1E0F6: ???
==182== by 0x7D1E0C7: ???
==182== by 0x7D1E0F8: ???
==182== by 0x4A8312F: ???
==182== by 0x7D1E0C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9EFFC6: ???
==182== by 0xB9EFF97: ???
==182== by 0xB9EFFC8: ???
==182== by 0x4A8312F: ???
==182== by 0xB9EFF97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB9F0DC6: ???
==182== by 0xB9F0D97: ???
==182== by 0xB9F0DC8: ???
==182== by 0x4A8312F: ???
==182== by 0xB9F0D97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7CE08F6: ???
==182== by 0x7CE08C7: ???
==182== by 0x7CE08F8: ???
==182== by 0x4A8312F: ???
==182== by 0x7CE08C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1A3E52: ???
==182== by 0xB1A3E37: ???
==182== by 0xB1A3E55: ???
==182== by 0x4A8312F: ???
==182== by 0xB1A3E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xB1A5A82: ???
==182== by 0xB1A5A67: ???
==182== by 0xB1A5A85: ???
==182== by 0x4A8312F: ???
==182== by 0xB1A5A67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBA6D705: ???
==182== by 0xBA6D6A7: ???
==182== by 0xBA6D708: ???
==182== by 0x4A8312F: ???
==182== by 0xBA6D6A7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x48E5E6E: ???
==182== by 0x48E5E37: ???
==182== by 0x48E5E71: ???
==182== by 0x4A8312F: ???
==182== by 0x48E5E37: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBAD0086: ???
==182== by 0xBAD0067: ???
==182== by 0xBAD0089: ???
==182== by 0x4A8312F: ???
==182== by 0xBAD0067: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4982E96: ???
==182== by 0x4982E77: ???
==182== by 0x4982E99: ???
==182== by 0x4A8312F: ???
==182== by 0x4982E77: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4A8F7A6: ???
==182== by 0x4A8F777: ???
==182== by 0x4A8F7A8: ???
==182== by 0x4A8312F: ???
==182== by 0x4A8F777: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF50A56: ???
==182== by 0xBF50A27: ???
==182== by 0xBF50A58: ???
==182== by 0x4A8312F: ???
==182== by 0xBF50A27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4A91016: ???
==182== by 0x4A90FE7: ???
==182== by 0x4A91018: ???
==182== by 0x4A8312F: ???
==182== by 0x4A90FE7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF4DFF2: ???
==182== by 0xBF4DFD7: ???
==182== by 0xBF4DFF5: ???
==182== by 0x4A8312F: ???
==182== by 0xBF4DFD7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF66762: ???
==182== by 0xBF66747: ???
==182== by 0xBF66765: ???
==182== by 0x4A8312F: ???
==182== by 0xBF66747: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBAEEBE5: ???
==182== by 0xBAEEB87: ???
==182== by 0xBAEEBE8: ???
==182== by 0x4A8312F: ???
==182== by 0xBAEEB87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x4CAA99E: ???
==182== by 0x4CAA967: ???
==182== by 0x4CAA9A1: ???
==182== by 0x4A8312F: ???
==182== by 0x4CAA967: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8962: ???
==182== by 0x4C94A5E: ???
==182== by 0x4C949C7: ???
==182== by 0x4C94A61: ???
==182== by 0x4A8312F: ???
==182== by 0x4C949C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4BFD886: ???
==182== by 0x4BFD867: ???
==182== by 0x4BFD889: ???
==182== by 0x4A8312F: ???
==182== by 0x4BFD867: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4C96F76: ???
==182== by 0x4C96F57: ???
==182== by 0x4C96F79: ???
==182== by 0x4A8312F: ???
==182== by 0x4C96F57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4A77CC6: ???
==182== by 0x4A77C97: ???
==182== by 0x4A77CC8: ???
==182== by 0x4A8312F: ???
==182== by 0x4A77C97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBAF4FD6: ???
==182== by 0xBAF4FA7: ???
==182== by 0xBAF4FD8: ???
==182== by 0x4A8312F: ???
==182== by 0xBAF4FA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B3E626: ???
==182== by 0x4B3E5F7: ???
==182== by 0x4B3E628: ???
==182== by 0x4A8312F: ???
==182== by 0x4B3E5F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B36EC6: ???
==182== by 0x4B36E97: ???
==182== by 0x4B36EC8: ???
==182== by 0x4A8312F: ???
==182== by 0x4B36E97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B37826: ???
==182== by 0x4B377F7: ???
==182== by 0x4B37828: ???
==182== by 0x4A8312F: ???
==182== by 0x4B377F7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBF90D82: ???
==182== by 0xBF90D67: ???
==182== by 0xBF90D85: ???
==182== by 0x4A8312F: ???
==182== by 0xBF90D67: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C34DC2: ???
==182== by 0x7C34DA7: ???
==182== by 0x7C34DC5: ???
==182== by 0x4A8312F: ???
==182== by 0x7C34DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x4B80D85: ???
==182== by 0x4B80D27: ???
==182== by 0x4B80D88: ???
==182== by 0x4A8312F: ???
==182== by 0x4B80D27: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x7C0B0A6: ???
==182== by 0x7C0B087: ???
==182== by 0x7C0B0A9: ???
==182== by 0x4A8312F: ???
==182== by 0x7C0B087: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xBFA10B6: ???
==182== by 0xBFA1097: ???
==182== by 0xBFA10B9: ???
==182== by 0x4A8312F: ???
==182== by 0xBFA1097: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9EE2D66: ???
==182== by 0x9EE2D47: ???
==182== by 0x9EE2D69: ???
==182== by 0x4A8312F: ???
==182== by 0x9EE2D47: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F624D6: ???
==182== by 0x9F624B7: ???
==182== by 0x9F624D9: ???
==182== by 0x4A8312F: ???
==182== by 0x9F624B7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F7FF36: ???
==182== by 0x9F7FF17: ???
==182== by 0x9F7FF39: ???
==182== by 0x4A8312F: ???
==182== by 0x9F7FF17: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0x9F82CA6: ???
==182== by 0x9F82C87: ???
==182== by 0x9F82CA9: ???
==182== by 0x4A8312F: ???
==182== by 0x9F82C87: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0AB1F6: ???
==182== by 0xA0AB1D7: ???
==182== by 0xA0AB1F9: ???
==182== by 0x4A8312F: ???
==182== by 0xA0AB1D7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0DFAB6: ???
==182== by 0xA0DFA97: ???
==182== by 0xA0DFAB9: ???
==182== by 0x4A8312F: ???
==182== by 0xA0DFA97: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA24C176: ???
==182== by 0xA24C157: ???
==182== by 0xA24C179: ???
==182== by 0x4A8312F: ???
==182== by 0xA24C157: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA220206: ???
==182== by 0xA2201E7: ???
==182== by 0xA220209: ???
==182== by 0x4A8312F: ???
==182== by 0xA2201E7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA09F546: ???
==182== by 0xA09F527: ???
==182== by 0xA09F549: ???
==182== by 0x4A8312F: ???
==182== by 0xA09F527: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA0E2A76: ???
==182== by 0xA0E2A57: ???
==182== by 0xA0E2A79: ???
==182== by 0x4A8312F: ???
==182== by 0xA0E2A57: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA233DC6: ???
==182== by 0xA233DA7: ???
==182== by 0xA233DC9: ???
==182== by 0x4A8312F: ???
==182== by 0xA233DA7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA2487E6: ???
==182== by 0xA2487C7: ???
==182== by 0xA2487E9: ???
==182== by 0x4A8312F: ???
==182== by 0xA2487C7: ???
==182==
==182== Conditional jump or move depends on uninitialised value(s)
==182== at 0xBDF8940: ???
==182== by 0xA44D4A6: ???
==182== by 0xA44D487: ???
==182== by 0xA44D4A9: ???
==182== by 0x4A8312F: ???