==8169== Memcheck, a memory error detector ==8169== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==8169== Using Valgrind-3.19.0 and LibVEX; rerun with -h for copyright info ==8169== Command: php -d zend_extension=xdebug.so -d xdebug.mode=coverage fibers.php ==8169== ==8169== Warning: client switching stacks? SP change: 0x1ffeffcd28 --> 0x8d12fb8 ==8169== to suppress, use: --max-stackframe=137274236272 or greater ==8169== Warning: client switching stacks? SP change: 0x8d12b88 --> 0x8f13fb8 ==8169== to suppress, use: --max-stackframe=2102320 or greater ==8169== Warning: client switching stacks? SP change: 0x8f13ee8 --> 0x8d12b88 ==8169== to suppress, use: --max-stackframe=2102112 or greater ==8169== further instances of this message will not be shown. bool(true) ==8169== Invalid read of size 8 ==8169== at 0x8633FBD: xdebug_code_coverage_end_of_function (code_coverage.c:729) ==8169== by 0x86345AB: xdebug_coverage_execute_ex_end (code_coverage.c:1072) ==8169== by 0x861E45A: xdebug_execute_user_code_end (base.c:814) ==8169== by 0x6D08E5: zend_observer_fcall_end (in /usr/local/bin/php) ==8169== by 0x34277B: ??? (in /usr/local/bin/php) ==8169== by 0x69FB62: execute_ex (in /usr/local/bin/php) ==8169== by 0x62D2BE: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x87BE44F: ??? ==8169== Address 0x88301b8 is 8 bytes inside a block of size 24 free'd ==8169== at 0x484417B: free (vg_replace_malloc.c:872) ==8169== by 0x8633FF6: xdebug_code_coverage_end_of_function (code_coverage.c:737) ==8169== by 0x86345AB: xdebug_coverage_execute_ex_end (code_coverage.c:1072) ==8169== by 0x861E45A: xdebug_execute_user_code_end (base.c:814) ==8169== by 0x6D08E5: zend_observer_fcall_end (in /usr/local/bin/php) ==8169== by 0x34277B: ??? (in /usr/local/bin/php) ==8169== by 0x69FB62: execute_ex (in /usr/local/bin/php) ==8169== by 0x62D2BE: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x882130F: ??? ==8169== Block was alloc'd at ==8169== at 0x48465EF: calloc (vg_replace_malloc.c:1328) ==8169== by 0x8631CF9: xdebug_path_new (branch_info.c:208) ==8169== by 0x8633EB3: xdebug_code_coverage_start_of_function (code_coverage.c:701) ==8169== by 0x863445D: xdebug_coverage_execute_ex (code_coverage.c:1051) ==8169== by 0x861F71A: xdebug_execute_user_code_begin (base.c:784) ==8169== by 0x6D05BA: ??? (in /usr/local/bin/php) ==8169== by 0x62D2B0: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x882130F: ??? ==8169== ==8169== Invalid read of size 8 ==8169== at 0x8631D74: xdebug_path_free (branch_info.c:222) ==8169== by 0x8633FF6: xdebug_code_coverage_end_of_function (code_coverage.c:737) ==8169== by 0x86345AB: xdebug_coverage_execute_ex_end (code_coverage.c:1072) ==8169== by 0x861E45A: xdebug_execute_user_code_end (base.c:814) ==8169== by 0x6D08E5: zend_observer_fcall_end (in /usr/local/bin/php) ==8169== by 0x34277B: ??? (in /usr/local/bin/php) ==8169== by 0x69FB62: execute_ex (in /usr/local/bin/php) ==8169== by 0x62D2BE: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x87BE44F: ??? ==8169== Address 0x88301b8 is 8 bytes inside a block of size 24 free'd ==8169== at 0x484417B: free (vg_replace_malloc.c:872) ==8169== by 0x8633FF6: xdebug_code_coverage_end_of_function (code_coverage.c:737) ==8169== by 0x86345AB: xdebug_coverage_execute_ex_end (code_coverage.c:1072) ==8169== by 0x861E45A: xdebug_execute_user_code_end (base.c:814) ==8169== by 0x6D08E5: zend_observer_fcall_end (in /usr/local/bin/php) ==8169== by 0x34277B: ??? (in /usr/local/bin/php) ==8169== by 0x69FB62: execute_ex (in /usr/local/bin/php) ==8169== by 0x62D2BE: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x882130F: ??? ==8169== Block was alloc'd at ==8169== at 0x48465EF: calloc (vg_replace_malloc.c:1328) ==8169== by 0x8631CF9: xdebug_path_new (branch_info.c:208) ==8169== by 0x8633EB3: xdebug_code_coverage_start_of_function (code_coverage.c:701) ==8169== by 0x863445D: xdebug_coverage_execute_ex (code_coverage.c:1051) ==8169== by 0x861F71A: xdebug_execute_user_code_begin (base.c:784) ==8169== by 0x6D05BA: ??? (in /usr/local/bin/php) ==8169== by 0x62D2B0: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x882130F: ??? ==8169== ==8169== Invalid free() / delete / delete[] / realloc() ==8169== at 0x484417B: free (vg_replace_malloc.c:872) ==8169== by 0x8633FF6: xdebug_code_coverage_end_of_function (code_coverage.c:737) ==8169== by 0x86345AB: xdebug_coverage_execute_ex_end (code_coverage.c:1072) ==8169== by 0x861E45A: xdebug_execute_user_code_end (base.c:814) ==8169== by 0x6D08E5: zend_observer_fcall_end (in /usr/local/bin/php) ==8169== by 0x34277B: ??? (in /usr/local/bin/php) ==8169== by 0x69FB62: execute_ex (in /usr/local/bin/php) ==8169== by 0x62D2BE: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x87BE44F: ??? ==8169== Address 0x88301b0 is 0 bytes inside a block of size 24 free'd ==8169== at 0x484417B: free (vg_replace_malloc.c:872) ==8169== by 0x8633FF6: xdebug_code_coverage_end_of_function (code_coverage.c:737) ==8169== by 0x86345AB: xdebug_coverage_execute_ex_end (code_coverage.c:1072) ==8169== by 0x861E45A: xdebug_execute_user_code_end (base.c:814) ==8169== by 0x6D08E5: zend_observer_fcall_end (in /usr/local/bin/php) ==8169== by 0x34277B: ??? (in /usr/local/bin/php) ==8169== by 0x69FB62: execute_ex (in /usr/local/bin/php) ==8169== by 0x62D2BE: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x882130F: ??? ==8169== Block was alloc'd at ==8169== at 0x48465EF: calloc (vg_replace_malloc.c:1328) ==8169== by 0x8631CF9: xdebug_path_new (branch_info.c:208) ==8169== by 0x8633EB3: xdebug_code_coverage_start_of_function (code_coverage.c:701) ==8169== by 0x863445D: xdebug_coverage_execute_ex (code_coverage.c:1051) ==8169== by 0x861F71A: xdebug_execute_user_code_begin (base.c:784) ==8169== by 0x6D05BA: ??? (in /usr/local/bin/php) ==8169== by 0x62D2B0: zend_call_function (in /usr/local/bin/php) ==8169== by 0x6D253C: ??? (in /usr/local/bin/php) ==8169== by 0x6D34CD: ??? (in /usr/local/bin/php) ==8169== by 0x882130F: ??? ==8169== bool(true) ==8169== ==8169== HEAP SUMMARY: ==8169== in use at exit: 6,908 bytes in 18 blocks ==8169== total heap usage: 24,658 allocs, 24,641 frees, 3,685,051 bytes allocated ==8169== ==8169== LEAK SUMMARY: ==8169== definitely lost: 24 bytes in 1 blocks ==8169== indirectly lost: 0 bytes in 0 blocks ==8169== possibly lost: 0 bytes in 0 blocks ==8169== still reachable: 6,884 bytes in 17 blocks ==8169== suppressed: 0 bytes in 0 blocks ==8169== Rerun with --leak-check=full to see details of leaked memory ==8169== ==8169== For lists of detected and suppressed errors, rerun with: -s ==8169== ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)