==7983== Memcheck, a memory error detector ==7983== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==7983== Using Valgrind-3.16.1 and LibVEX; rerun with -h for copyright info ==7983== Command: php -d xdebug.mode=develop ./test.php ==7983== /home/eater/test.php:3: array(1) { [0] => array(4) { 'function' => string(6) "{main}" 'file' => string(20) "/home/eater/test.php" 'line' => int(0) 'params' => array(0) { } } } ==7983== Warning: client switching stacks? SP change: 0x1ffeffbfe0 --> 0x6e47fc0 ==7983== to suppress, use: --max-stackframe=137306521632 or greater /home/eater/test.php:5: array(2) { [0] => array(2) { 'function' => string(9) "{closure}" 'args' => array(0) { } } [1] => array(7) { 'file' => string(20) "/home/eater/test.php" 'line' => int(9) 'function' => string(5) "start" 'class' => string(5) "Fiber" 'object' => class Fiber#1 (0) { } 'type' => string(2) "->" 'args' => array(0) { } } } ==7983== Invalid read of size 1 ==7983== at 0x60FDA75: zend_string_copy (zend_string.h:191) ==7983== by 0x60FDA75: zif_xdebug_get_function_stack (stack.c:1069) ==7983== by 0x60D991C: xdebug_execute_internal (base.c:897) ==7983== by 0x5D1B1B: ZEND_DO_FCALL_SPEC_RETVAL_USED_HANDLER (zend_vm_execute.h:1872) ==7983== by 0x5D1B1B: execute_ex (zend_vm_execute.h:54541) ==7983== by 0x60D9081: xdebug_execute_ex (base.c:779) ==7983== by 0x55A7CF: zend_call_function (zend_execute_API.c:896) ==7983== by 0x5FD132: zend_fiber_execute (zend_fibers.c:475) ==7983== by 0x5FDE66: zend_fiber_trampoline (zend_fibers.c:287) ==7983== Address 0x4 is not stack'd, malloc'd or (recently) free'd ==7983== ==7983== ==7983== Process terminating with default action of signal 11 (SIGSEGV) ==7983== Access not within mapped region at address 0x4 ==7983== at 0x60FDA75: zend_string_copy (zend_string.h:191) ==7983== by 0x60FDA75: zif_xdebug_get_function_stack (stack.c:1069) ==7983== by 0x60D991C: xdebug_execute_internal (base.c:897) ==7983== by 0x5D1B1B: ZEND_DO_FCALL_SPEC_RETVAL_USED_HANDLER (zend_vm_execute.h:1872) ==7983== by 0x5D1B1B: execute_ex (zend_vm_execute.h:54541) ==7983== by 0x60D9081: xdebug_execute_ex (base.c:779) ==7983== by 0x55A7CF: zend_call_function (zend_execute_API.c:896) ==7983== by 0x5FD132: zend_fiber_execute (zend_fibers.c:475) ==7983== by 0x5FDE66: zend_fiber_trampoline (zend_fibers.c:287) ==7983== If you believe this happened as a result of a stack ==7983== overflow in your program's main thread (unlikely but ==7983== possible), you can try to increase the size of the ==7983== main thread stack using the --main-stacksize= flag. ==7983== The main thread stack size used in this run was 8388608. ==7983== ==7983== HEAP SUMMARY: ==7983== in use at exit: 3,045,394 bytes in 23,119 blocks ==7983== total heap usage: 25,596 allocs, 2,477 frees, 4,089,403 bytes allocated ==7983== ==7983== LEAK SUMMARY: ==7983== definitely lost: 28,280 bytes in 884 blocks ==7983== indirectly lost: 1,065 bytes in 2 blocks ==7983== possibly lost: 2,133,914 bytes in 17,183 blocks ==7983== still reachable: 882,135 bytes in 5,050 blocks ==7983== suppressed: 0 bytes in 0 blocks ==7983== Rerun with --leak-check=full to see details of leaked memory ==7983== ==7983== For lists of detected and suppressed errors, rerun with: -s ==7983== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)