zsh-workers
 help / color / mirror / code / Atom feed
* Complex config triggering Segfault in pattern matching code.
@ 2014-12-13 19:49 Jonathan H
  2014-12-13 23:28 ` Bart Schaefer
  0 siblings, 1 reply; 14+ messages in thread
From: Jonathan H @ 2014-12-13 19:49 UTC (permalink / raw)
  To: zsh-workers

[-- Attachment #1: Type: text/plain, Size: 413 bytes --]

Hello,

I have a very large ZSH config, which causes random segfaults a few times a day.

I've attached the coredump, which points to pattern matching code in
the "-command-" completer. I compiled zsh with all the debugging flags
I could find.

The relevant part of my config (which changes this behavior) can be
found at "modules/16_zstyle.zsh" in
http://github.com/PythonNut/zsh-config .

Is this a bug in ZSH?

[-- Attachment #2: core.zsh.1000.b4e42e969ef94190a997f3e52f011e51.6718.1418496582000000.lz4 --]
[-- Type: application/octet-stream, Size: 1849773 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-13 19:49 Complex config triggering Segfault in pattern matching code Jonathan H
@ 2014-12-13 23:28 ` Bart Schaefer
  2014-12-13 23:36   ` Jonathan H
  0 siblings, 1 reply; 14+ messages in thread
From: Bart Schaefer @ 2014-12-13 23:28 UTC (permalink / raw)
  To: Jonathan H, zsh-workers

On Dec 13, 11:49am, Jonathan H wrote:
}
} I've attached the coredump

This doesn't help at all, because it's not usable without the same binary
environment where the crash occurred.  The output of the "where" command
in GDB or the equivalent stack backtrace from another debugger is what
you should send.

Also we need to know the specific version of zsh (echo $ZSH_PATCHLEVEL
for example) and usually also the operating system you're using.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-13 23:28 ` Bart Schaefer
@ 2014-12-13 23:36   ` Jonathan H
  2014-12-14  4:40     ` Bart Schaefer
  0 siblings, 1 reply; 14+ messages in thread
From: Jonathan H @ 2014-12-13 23:36 UTC (permalink / raw)
  To: Bart Schaefer; +Cc: zsh-workers

[-- Attachment #1: Type: text/plain, Size: 788 bytes --]

Ah, thank you.

$ZSH_PATCHLEVEL == "zsh-5.0.7-0-g208bded"
$(uname -a) == "Linux protogon.localdomain 3.17.6-1-ARCH #1 SMP
PREEMPT Sun Dec 7 23:43:32 UTC 2014 x86_64 GNU/Linux"

I've attached the output of gdb backtrace, watch and the headers.

On Sat, Dec 13, 2014 at 3:28 PM, Bart Schaefer
<schaefer@brasslantern.com> wrote:
> On Dec 13, 11:49am, Jonathan H wrote:
> }
> } I've attached the coredump
>
> This doesn't help at all, because it's not usable without the same binary
> environment where the crash occurred.  The output of the "where" command
> in GDB or the equivalent stack backtrace from another debugger is what
> you should send.
>
> Also we need to know the specific version of zsh (echo $ZSH_PATCHLEVEL
> for example) and usually also the operating system you're using.

[-- Attachment #2: zsh_gdb_backtrace.txt --]
[-- Type: text/plain, Size: 42984 bytes --]

(gdb) backtrace
#0  0x000000000047c267 in charrefinc (x=0x6cc968 <patinput>,
y=0x7fb1f7d8a355 <error: Cannot access memory at address 0x7fb1f7d8a355>,
z=0x7fff4c43fd0c) at pattern.c:1900
#1  0x000000000047d4af in patmatch (prog=0x1e1a968) at pattern.c:2536
#2  0x000000000047cc98 in pattryrefs (prog=0x1e1a930,
string=0x7fb1f7d907b0 ":completion::complete:-command-::", stringlen=33,
unmetalen=33, patoffset=0, nump=0x0, begp=0x0, endp=0x0) at pattern.c:2277
#3  0x000000000047c42a in pattry (prog=0x1e1a930,
string=0x7fb1f7d907b0 ":completion::complete:-command-::")
at pattern.c:1996
#4  0x00007fb1f6359dff in lookupstyle (
ctxt=0x7fb1f7d907b0 ":completion::complete:-command-::",
style=0x7fb1f7d90798 "tag-order") at zutil.c:429
#5  0x00007fb1f635a79e in bin_zstyle (nam=0x7fb1f7d90768 "zstyle",
args=0x7fb1f7d907d8, ops=0x7fff4c4402f0, func=0) at zutil.c:631
#6  0x000000000040efc3 in execbuiltin (args=0x7fb1f7d906d8,
bn=0x7fb1f655f600 <bintab+192>) at builtin.c:450
#7  0x000000000042d8ea in execcmd (state=0x7fff4c441770, input=0, output=0,
how=2, last1=2) at exec.c:3378
#8  0x0000000000428ca1 in execpline2 (state=0x7fff4c441770, pcode=2819,
how=2, input=0, output=0, last1=0) at exec.c:1697
---Type <return> to continue, or q <return> to quit---
#9  0x0000000000427fd3 in execpline (state=0x7fff4c441770, slcode=7234,
how=2, last1=0) at exec.c:1484
#10 0x00000000004278c7 in execlist (state=0x7fff4c441770, dont_change_job=1,
exiting=0) at exec.c:1308
#11 0x000000000045689e in execif (state=0x7fff4c441770, do_exec=0)
at loop.c:525
#12 0x000000000042d732 in execcmd (state=0x7fff4c441770, input=0, output=0,
how=2, last1=2) at exec.c:3336
#13 0x0000000000428ca1 in execpline2 (state=0x7fff4c441770, pcode=2627,
how=2, input=0, output=0, last1=0) at exec.c:1697
#14 0x0000000000427fd3 in execpline (state=0x7fff4c441770, slcode=87042,
how=2, last1=0) at exec.c:1484
#15 0x0000000000427757 in execlist (state=0x7fff4c441770, dont_change_job=1,
exiting=0) at exec.c:1267
#16 0x000000000045689e in execif (state=0x7fff4c441770, do_exec=0)
at loop.c:525
#17 0x000000000042d732 in execcmd (state=0x7fff4c441770, input=0, output=0,
how=2, last1=2) at exec.c:3336
#18 0x0000000000428ca1 in execpline2 (state=0x7fff4c441770, pcode=1027,
how=2, input=0, output=0, last1=0) at exec.c:1697
#19 0x0000000000427fd3 in execpline (state=0x7fff4c441770, slcode=193538,
---Type <return> to continue, or q <return> to quit---
how=2, last1=0) at exec.c:1484
#20 0x0000000000427757 in execlist (state=0x7fff4c441770, dont_change_job=1,
exiting=0) at exec.c:1267
#21 0x000000000042717d in execode (p=0x205cba0, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#22 0x000000000043129a in runshfunc (prog=0x205cba0, wrap=0x0,
name=0x7fb1f7d8fee0 "_tags") at exec.c:5040
#23 0x00007fb1f656baa6 in comp_wrapper (prog=0x205cba0, w=0x0,
name=0x7fb1f7d8fee0 "_tags") at complete.c:1455
#24 0x00000000004311fd in runshfunc (prog=0x205cba0,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d8fee0 "_tags") at exec.c:5025
#25 0x0000000000430e77 in doshfunc (shfunc=0x1d427c0,
doshargs=0x7fb1f7d8fe68, noreturnval=0) at exec.c:4920
#26 0x00000000004302fc in execshfunc (shf=0x1d427c0, args=0x7fb1f7d8fe68)
at exec.c:4557
#27 0x000000000042d8c2 in execcmd (state=0x7fff4c442f50, input=0, output=0,
how=2, last1=2) at exec.c:3373
#28 0x0000000000428ca1 in execpline2 (state=0x7fff4c442f50, pcode=7427,
how=2, input=0, output=0, last1=0) at exec.c:1697
#29 0x0000000000427fd3 in execpline (state=0x7fff4c442f50, slcode=4098,
how=2, last1=0) at exec.c:1484
---Type <return> to continue, or q <return> to quit---
#30 0x0000000000427757 in execlist (state=0x7fff4c442f50, dont_change_job=1,
exiting=0) at exec.c:1267
#31 0x0000000000455a4b in execfor (state=0x7fff4c442f50, do_exec=0)
at loop.c:164
#32 0x000000000042d732 in execcmd (state=0x7fff4c442f50, input=0, output=0,
how=2, last1=2) at exec.c:3336
#33 0x0000000000428ca1 in execpline2 (state=0x7fff4c442f50, pcode=6403,
how=2, input=0, output=0, last1=0) at exec.c:1697
#34 0x0000000000427fd3 in execpline (state=0x7fff4c442f50, slcode=256002,
how=2, last1=0) at exec.c:1484
#35 0x0000000000427757 in execlist (state=0x7fff4c442f50, dont_change_job=1,
exiting=0) at exec.c:1267
#36 0x0000000000455a4b in execfor (state=0x7fff4c442f50, do_exec=0)
at loop.c:164
#37 0x000000000042d732 in execcmd (state=0x7fff4c442f50, input=0, output=0,
how=2, last1=2) at exec.c:3336
#38 0x0000000000428ca1 in execpline2 (state=0x7fff4c442f50, pcode=5955,
how=2, input=0, output=0, last1=0) at exec.c:1697
#39 0x0000000000427fd3 in execpline (state=0x7fff4c442f50, slcode=304130,
how=2, last1=0) at exec.c:1484
#40 0x0000000000427757 in execlist (state=0x7fff4c442f50, dont_change_job=1,
---Type <return> to continue, or q <return> to quit---
exiting=0) at exec.c:1267
#41 0x000000000042717d in execode (p=0x1d27540, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#42 0x000000000043129a in runshfunc (prog=0x1d27540, wrap=0x0,
name=0x7fb1f7d970f8 "_files") at exec.c:5040
#43 0x00007fb1f656baa6 in comp_wrapper (prog=0x1d27540, w=0x0,
name=0x7fb1f7d970f8 "_files") at complete.c:1455
#44 0x00000000004311fd in runshfunc (prog=0x1d27540,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d970f8 "_files")
at exec.c:5025
#45 0x0000000000430e77 in doshfunc (shfunc=0x1d02220,
doshargs=0x7fb1f7d970b0, noreturnval=0) at exec.c:4920
#46 0x00000000004302fc in execshfunc (shf=0x1d02220, args=0x7fb1f7d970b0)
at exec.c:4557
#47 0x000000000042d8c2 in execcmd (state=0x7fff4c443950, input=0, output=0,
how=2, last1=2) at exec.c:3373
#48 0x0000000000428ca1 in execpline2 (state=0x7fff4c443950, pcode=323, how=2,
input=0, output=0, last1=0) at exec.c:1697
#49 0x0000000000427fd3 in execpline (state=0x7fff4c443950, slcode=3074,
how=2, last1=0) at exec.c:1484
#50 0x0000000000427757 in execlist (state=0x7fff4c443950, dont_change_job=1,
---Type <return> to continue, or q <return> to quit---
exiting=0) at exec.c:1267
#51 0x000000000042717d in execode (p=0x1e1f300, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#52 0x000000000043129a in runshfunc (prog=0x1e1f300, wrap=0x0,
name=0x7fb1f7d96f98 "_cmd") at exec.c:5040
#53 0x00007fb1f656baa6 in comp_wrapper (prog=0x1e1f300, w=0x0,
name=0x7fb1f7d96f98 "_cmd") at complete.c:1455
#54 0x00000000004311fd in runshfunc (prog=0x1e1f300,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d96f98 "_cmd") at exec.c:5025
#55 0x0000000000430e77 in doshfunc (shfunc=0x1e10a90,
doshargs=0x7fb1f7d96f50, noreturnval=0) at exec.c:4920
#56 0x00000000004302fc in execshfunc (shf=0x1e10a90, args=0x7fb1f7d96f50)
at exec.c:4557
#57 0x000000000042d8c2 in execcmd (state=0x7fff4c444350, input=0, output=0,
how=18, last1=2) at exec.c:3373
#58 0x0000000000428ca1 in execpline2 (state=0x7fff4c444350, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#59 0x0000000000427fd3 in execpline (state=0x7fff4c444350, slcode=3074,
how=18, last1=0) at exec.c:1484
#60 0x0000000000427757 in execlist (state=0x7fff4c444350, dont_change_job=1,
exiting=0) at exec.c:1267
---Type <return> to continue, or q <return> to quit---
#61 0x000000000042717d in execode (p=0x7fb1f7d96ee0, dont_change_job=1,
exiting=0, context=0x4a155f "eval") at exec.c:1073
#62 0x000000000041f8d6 in eval (argv=0x7fb1f7d96e78) at builtin.c:5034
#63 0x000000000041feaa in bin_eval (nam=0x7fb1f7d96e60 "eval",
argv=0x7fb1f7d96e78, ops=0x7fff4c444440, func=14) at builtin.c:5199
#64 0x000000000040efc3 in execbuiltin (args=0x7fb1f7d96e18,
bn=0x6be540 <builtins+1472>) at builtin.c:450
#65 0x000000000042d8ea in execcmd (state=0x7fff4c445240, input=0, output=0,
how=2, last1=2) at exec.c:3378
#66 0x0000000000428ca1 in execpline2 (state=0x7fff4c445240, pcode=2179,
how=2, input=0, output=0, last1=0) at exec.c:1697
#67 0x0000000000427fd3 in execpline (state=0x7fff4c445240, slcode=4130,
how=2, last1=0) at exec.c:1484
#68 0x000000000042779b in execlist (state=0x7fff4c445240, dont_change_job=1,
exiting=0) at exec.c:1275
#69 0x000000000045689e in execif (state=0x7fff4c445240, do_exec=0)
at loop.c:525
#70 0x000000000042d732 in execcmd (state=0x7fff4c445240, input=0, output=0,
how=2, last1=2) at exec.c:3336
#71 0x0000000000428ca1 in execpline2 (state=0x7fff4c445240, pcode=1923,
how=2, input=0, output=0, last1=0) at exec.c:1697
---Type <return> to continue, or q <return> to quit---
#72 0x0000000000427fd3 in execpline (state=0x7fff4c445240, slcode=43010,
how=2, last1=0) at exec.c:1484
#73 0x0000000000427757 in execlist (state=0x7fff4c445240, dont_change_job=1,
exiting=0) at exec.c:1267
#74 0x000000000042717d in execode (p=0x2053f10, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#75 0x000000000043129a in runshfunc (prog=0x2053f10, wrap=0x0,
name=0x7fb1f7d96b30 "_normal") at exec.c:5040
#76 0x00007fb1f656baa6 in comp_wrapper (prog=0x2053f10, w=0x0,
name=0x7fb1f7d96b30 "_normal") at complete.c:1455
#77 0x00000000004311fd in runshfunc (prog=0x2053f10,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d96b30 "_normal")
at exec.c:5025
#78 0x0000000000430e77 in doshfunc (shfunc=0x1d260c0,
doshargs=0x7fb1f7d96ac8, noreturnval=0) at exec.c:4920
#79 0x00000000004302fc in execshfunc (shf=0x1d260c0, args=0x7fb1f7d96ac8)
at exec.c:4557
#80 0x000000000042d8c2 in execcmd (state=0x7fff4c4462c0, input=0, output=0,
how=2, last1=2) at exec.c:3373
#81 0x0000000000428ca1 in execpline2 (state=0x7fff4c4462c0, pcode=7555,
how=2, input=0, output=0, last1=0) at exec.c:1697
---Type <return> to continue, or q <return> to quit---
#82 0x0000000000427fd3 in execpline (state=0x7fff4c4462c0, slcode=4130,
how=2, last1=0) at exec.c:1484
#83 0x000000000042779b in execlist (state=0x7fff4c4462c0, dont_change_job=1,
exiting=0) at exec.c:1275
#84 0x000000000045689e in execif (state=0x7fff4c4462c0, do_exec=0)
at loop.c:525
#85 0x000000000042d732 in execcmd (state=0x7fff4c4462c0, input=0, output=0,
how=2, last1=2) at exec.c:3336
#86 0x0000000000428ca1 in execpline2 (state=0x7fff4c4462c0, pcode=7427,
how=2, input=0, output=0, last1=0) at exec.c:1697
#87 0x0000000000427fd3 in execpline (state=0x7fff4c4462c0, slcode=114690,
how=2, last1=0) at exec.c:1484
#88 0x0000000000427757 in execlist (state=0x7fff4c4462c0, dont_change_job=1,
exiting=0) at exec.c:1267
#89 0x000000000042717d in execode (p=0x1d25b60, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#90 0x000000000043129a in runshfunc (prog=0x1d25b60, wrap=0x0,
name=0x7fb1f7d96450 "_complete") at exec.c:5040
#91 0x00007fb1f656baa6 in comp_wrapper (prog=0x1d25b60, w=0x0,
name=0x7fb1f7d96450 "_complete") at complete.c:1455
#92 0x00000000004311fd in runshfunc (prog=0x1d25b60,
---Type <return> to continue, or q <return> to quit---
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d96450 "_complete")
at exec.c:5025
#93 0x0000000000430e77 in doshfunc (shfunc=0x1cf0730,
doshargs=0x7fb1f7d963e8, noreturnval=0) at exec.c:4920
#94 0x00000000004302fc in execshfunc (shf=0x1cf0730, args=0x7fb1f7d963e8)
at exec.c:4557
#95 0x000000000042d8c2 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=18, last1=2) at exec.c:3373
#96 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=11459,
how=18, input=0, output=0, last1=0) at exec.c:1697
#97 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=3074,
how=18, last1=0) at exec.c:1484
#98 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#99 0x000000000045680a in execif (state=0x7fff4c448120, do_exec=0)
at loop.c:510
#100 0x000000000042d732 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=2, last1=2) at exec.c:3336
#101 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=11139,
how=2, input=0, output=0, last1=0) at exec.c:1697
#102 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=48130,
---Type <return> to continue, or q <return> to quit---
how=2, last1=0) at exec.c:1484
#103 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#104 0x0000000000455a4b in execfor (state=0x7fff4c448120, do_exec=0)
at loop.c:164
#105 0x000000000042d732 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=2, last1=2) at exec.c:3336
#106 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=10627,
how=2, input=0, output=0, last1=0) at exec.c:1697
#107 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=90114,
how=2, last1=0) at exec.c:1484
#108 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#109 0x0000000000455a4b in execfor (state=0x7fff4c448120, do_exec=0)
at loop.c:164
#110 0x000000000042d732 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=2, last1=2) at exec.c:3336
#111 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=9155,
how=2, input=0, output=0, last1=0) at exec.c:1697
#112 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=220162,
how=2, last1=0) at exec.c:1484
---Type <return> to continue, or q <return> to quit---
#113 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#114 0x000000000042717d in execode (p=0x203fc60, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#115 0x000000000043129a in runshfunc (prog=0x203fc60, wrap=0x0,
name=0x7fb1f7f32050 "_main_complete") at exec.c:5040
#116 0x00007fb1f656baa6 in comp_wrapper (prog=0x203fc60, w=0x0,
name=0x7fb1f7f32050 "_main_complete") at complete.c:1455
#117 0x00000000004311fd in runshfunc (prog=0x203fc60,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7f32050 "_main_complete")
at exec.c:5025
#118 0x0000000000430e77 in doshfunc (shfunc=0x1d1b320, doshargs=0x0,
noreturnval=1) at exec.c:4920
#119 0x00007fb1f656e5e9 in callcompfunc (s=0x7fb1f7f38ab0 "l",
fn=0x2088190 "_main_complete") at compcore.c:840
#120 0x00007fb1f656eebd in makecomplist (s=0x7fb1f7f38ab0 "l", incmd=1, lst=0)
at compcore.c:989
#121 0x00007fb1f656ca18 in do_completion (dummy=0x7fb1f69da8e8 <zlehooks+40>,
dat=0x7fff4c448650) at compcore.c:349
#122 0x000000000045e10a in runhookdef (h=0x7fb1f69da8e8 <zlehooks+40>,
d=0x7fff4c448650) at module.c:996
---Type <return> to continue, or q <return> to quit---
#123 0x00007fb1f67c2687 in docompletion (s=0x203a7e0 "l", lst=0, incmd=1)
at zle_tricky.c:2260
#124 0x00007fb1f67be0aa in docomplete (lst=0) at zle_tricky.c:864
#125 0x00007fb1f67bc564 in completeword (args=0x7fb1f69daea8 <zlenoargs>)
at zle_tricky.c:232
#126 0x00007fb1f67bc445 in completecall (args=0x7fb1f7f38918)
at zle_tricky.c:208
#127 0x00007fb1f67aab43 in execzlefunc (func=0x7fb1f69d7430 <thingies+880>,
args=0x7fb1f7f38918, set_bindk=0) at zle_main.c:1381
#128 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f388e0 "zle",
args=0x7fb1f7f38918, ops=0x7fff4c448a00, func=0 '\000')
at zle_thingy.c:711
#129 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f388e0 "zle",
args=0x7fb1f7f38910, ops=0x7fff4c448a00, func=0) at zle_thingy.c:382
#130 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f388a8,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#131 0x000000000042d8ea in execcmd (state=0x7fff4c449180, input=0, output=0,
how=18, last1=2) at exec.c:3378
#132 0x0000000000428ca1 in execpline2 (state=0x7fff4c449180, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#133 0x0000000000427fd3 in execpline (state=0x7fff4c449180, slcode=3074,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#134 0x0000000000427757 in execlist (state=0x7fff4c449180, dont_change_job=1,
exiting=0) at exec.c:1267
#135 0x000000000042717d in execode (p=0x1cb0760, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#136 0x000000000043129a in runshfunc (prog=0x1cb0760, wrap=0x0,
name=0x7fb1f7f38800 "with-afu-compfuncs") at exec.c:5040
#137 0x0000000000430e77 in doshfunc (shfunc=0x1cb0ae0,
doshargs=0x7fb1f7f38738, noreturnval=0) at exec.c:4920
#138 0x00000000004302fc in execshfunc (shf=0x1cb0ae0, args=0x7fb1f7f38738)
at exec.c:4557
#139 0x000000000042d8c2 in execcmd (state=0x7fff4c449a70, input=0, output=0,
how=18, last1=2) at exec.c:3373
#140 0x0000000000428ca1 in execpline2 (state=0x7fff4c449a70, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#141 0x0000000000427fd3 in execpline (state=0x7fff4c449a70, slcode=4098,
how=18, last1=0) at exec.c:1484
#142 0x0000000000427757 in execlist (state=0x7fff4c449a70, dont_change_job=1,
exiting=0) at exec.c:1267
#143 0x000000000042717d in execode (p=0x1cb07a0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#144 0x000000000043129a in runshfunc (prog=0x1cb07a0, wrap=0x0,
name=0x7fb1f7f38548 "with-afu-completer-vars") at exec.c:5040
#145 0x0000000000430e77 in doshfunc (shfunc=0x1cb0c40,
doshargs=0x7fb1f7f38478, noreturnval=0) at exec.c:4920
#146 0x00000000004302fc in execshfunc (shf=0x1cb0c40, args=0x7fb1f7f38478)
at exec.c:4557
#147 0x000000000042d8c2 in execcmd (state=0x7fff4c44aa00, input=0, output=0,
how=18, last1=2) at exec.c:3373
#148 0x0000000000428ca1 in execpline2 (state=0x7fff4c44aa00, pcode=1219,
how=18, input=0, output=0, last1=0) at exec.c:1697
#149 0x0000000000427fd3 in execpline (state=0x7fff4c44aa00, slcode=3074,
how=18, last1=0) at exec.c:1484
#150 0x0000000000427757 in execlist (state=0x7fff4c44aa00, dont_change_job=1,
exiting=0) at exec.c:1267
#151 0x0000000000456df1 in exectry (state=0x7fff4c44aa00, do_exec=0)
at loop.c:658
#152 0x000000000042d732 in execcmd (state=0x7fff4c44aa00, input=0, output=0,
how=18, last1=2) at exec.c:3336
#153 0x0000000000428ca1 in execpline2 (state=0x7fff4c44aa00, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#154 0x0000000000427fd3 in execpline (state=0x7fff4c44aa00, slcode=106498,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#155 0x0000000000427757 in execlist (state=0x7fff4c44aa00, dont_change_job=1,
exiting=0) at exec.c:1267
#156 0x000000000042717d in execode (p=0x1cac5e0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#157 0x000000000043129a in runshfunc (prog=0x1cac5e0, wrap=0x0,
name=0x7fb1f7f37f78 "with-afu-region-highlight-saving") at exec.c:5040
#158 0x0000000000430e77 in doshfunc (shfunc=0x1cac680,
doshargs=0x7fb1f7f37e58, noreturnval=0) at exec.c:4920
#159 0x00000000004302fc in execshfunc (shf=0x1cac680, args=0x7fb1f7f37e58)
at exec.c:4557
#160 0x000000000042d8c2 in execcmd (state=0x7fff4c44b2f0, input=0, output=0,
how=2, last1=2) at exec.c:3373
#161 0x0000000000428ca1 in execpline2 (state=0x7fff4c44b2f0, pcode=323,
how=2, input=0, output=0, last1=0) at exec.c:1697
#162 0x0000000000427fd3 in execpline (state=0x7fff4c44b2f0, slcode=6146,
how=2, last1=0) at exec.c:1484
#163 0x0000000000427757 in execlist (state=0x7fff4c44b2f0, dont_change_job=1,
exiting=0) at exec.c:1267
#164 0x000000000042717d in execode (p=0x1cb1970, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#165 0x000000000043129a in runshfunc (prog=0x1cb1970, wrap=0x0,
name=0x7fb1f7f37d30 "auto-fu") at exec.c:5040
#166 0x0000000000430e77 in doshfunc (shfunc=0x1cb1860,
doshargs=0x7fb1f7f37ca0, noreturnval=0) at exec.c:4920
#167 0x00000000004302fc in execshfunc (shf=0x1cb1860, args=0x7fb1f7f37ca0)
at exec.c:4557
#168 0x000000000042d8c2 in execcmd (state=0x7fff4c44bbe0, input=0, output=0,
how=2, last1=2) at exec.c:3373
#169 0x0000000000428ca1 in execpline2 (state=0x7fff4c44bbe0, pcode=3075,
how=2, input=0, output=0, last1=0) at exec.c:1697
#170 0x0000000000427fd3 in execpline (state=0x7fff4c44bbe0, slcode=4098,
how=2, last1=0) at exec.c:1484
#171 0x0000000000427757 in execlist (state=0x7fff4c44bbe0, dont_change_job=1,
exiting=0) at exec.c:1267
#172 0x000000000042717d in execode (p=0x1cb0d60, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#173 0x000000000043129a in runshfunc (prog=0x1cb0d60, wrap=0x0,
name=0x7fb1f7f375b8 "with-afu-menuselecting-handling") at exec.c:5040
#174 0x0000000000430e77 in doshfunc (shfunc=0x1cb06a0,
doshargs=0x7fb1f7f37508, noreturnval=0) at exec.c:4920
#175 0x00000000004302fc in execshfunc (shf=0x1cb06a0, args=0x7fb1f7f37508)
---Type <return> to continue, or q <return> to quit---
at exec.c:4557
#176 0x000000000042d8c2 in execcmd (state=0x7fff4c44cb40, input=0, output=0,
how=2, last1=2) at exec.c:3373
#177 0x0000000000428ca1 in execpline2 (state=0x7fff4c44cb40, pcode=259,
how=2, input=0, output=0, last1=0) at exec.c:1697
#178 0x0000000000427fd3 in execpline (state=0x7fff4c44cb40, slcode=4098,
how=2, last1=0) at exec.c:1484
#179 0x0000000000427757 in execlist (state=0x7fff4c44cb40, dont_change_job=1,
exiting=0) at exec.c:1267
#180 0x000000000042514d in execcursh (state=0x7fff4c44cb40, do_exec=0)
at exec.c:421
#181 0x000000000042d732 in execcmd (state=0x7fff4c44cb40, input=0, output=0,
how=2, last1=2) at exec.c:3336
#182 0x0000000000428ca1 in execpline2 (state=0x7fff4c44cb40, pcode=259,
how=2, input=0, output=0, last1=0) at exec.c:1697
#183 0x0000000000427fd3 in execpline (state=0x7fff4c44cb40, slcode=16386,
how=2, last1=0) at exec.c:1484
#184 0x0000000000427757 in execlist (state=0x7fff4c44cb40, dont_change_job=1,
exiting=0) at exec.c:1267
#185 0x000000000042717d in execode (p=0x1cb0700, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#186 0x000000000043129a in runshfunc (prog=0x1cb0700, wrap=0x0,
name=0x7fb1f7f37390 "auto-fu-maybe") at exec.c:5040
#187 0x0000000000430e77 in doshfunc (shfunc=0x1cb09b0,
doshargs=0x7fb1f7f37330, noreturnval=0) at exec.c:4920
#188 0x00000000004302fc in execshfunc (shf=0x1cb09b0, args=0x7fb1f7f37330)
at exec.c:4557
#189 0x000000000042d8c2 in execcmd (state=0x7fff4c44daa0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#190 0x0000000000428ca1 in execpline2 (state=0x7fff4c44daa0, pcode=1155,
how=18, input=0, output=0, last1=0) at exec.c:1697
#191 0x0000000000427fd3 in execpline (state=0x7fff4c44daa0, slcode=3074,
how=18, last1=0) at exec.c:1484
#192 0x0000000000427757 in execlist (state=0x7fff4c44daa0, dont_change_job=1,
exiting=0) at exec.c:1267
#193 0x000000000042514d in execcursh (state=0x7fff4c44daa0, do_exec=0)
at exec.c:421
#194 0x000000000042d732 in execcmd (state=0x7fff4c44daa0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#195 0x0000000000428ca1 in execpline2 (state=0x7fff4c44daa0, pcode=1155,
how=18, input=0, output=0, last1=0) at exec.c:1697
#196 0x0000000000427fd3 in execpline (state=0x7fff4c44daa0, slcode=9218,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#197 0x0000000000427757 in execlist (state=0x7fff4c44daa0, dont_change_job=1,
exiting=0) at exec.c:1267
#198 0x000000000042717d in execode (p=0x1cad690, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#199 0x000000000043129a in runshfunc (prog=0x1cad690, wrap=0x0,
name=0x7fb1f7f4deb0 "with-afu") at exec.c:5040
#200 0x0000000000430e77 in doshfunc (shfunc=0x1cad130,
doshargs=0x7fb1f7f4dae8, noreturnval=0) at exec.c:4920
#201 0x00000000004302fc in execshfunc (shf=0x1cad130, args=0x7fb1f7f4dae8)
at exec.c:4557
#202 0x000000000042d8c2 in execcmd (state=0x7fff4c44ea00, input=0, output=0,
how=2, last1=2) at exec.c:3373
#203 0x0000000000428ca1 in execpline2 (state=0x7fff4c44ea00, pcode=451,
how=2, input=0, output=0, last1=0) at exec.c:1697
#204 0x0000000000427fd3 in execpline (state=0x7fff4c44ea00, slcode=5122,
how=2, last1=0) at exec.c:1484
#205 0x0000000000427757 in execlist (state=0x7fff4c44ea00, dont_change_job=1,
exiting=0) at exec.c:1267
#206 0x000000000042514d in execcursh (state=0x7fff4c44ea00, do_exec=0)
at exec.c:421
---Type <return> to continue, or q <return> to quit---
#207 0x000000000042d732 in execcmd (state=0x7fff4c44ea00, input=0, output=0,
how=2, last1=2) at exec.c:3336
#208 0x0000000000428ca1 in execpline2 (state=0x7fff4c44ea00, pcode=451,
how=2, input=0, output=0, last1=0) at exec.c:1697
#209 0x0000000000427fd3 in execpline (state=0x7fff4c44ea00, slcode=17410,
how=2, last1=0) at exec.c:1484
#210 0x0000000000427757 in execlist (state=0x7fff4c44ea00, dont_change_job=1,
exiting=0) at exec.c:1267
#211 0x000000000042717d in execode (p=0x1cadd60, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#212 0x000000000043129a in runshfunc (prog=0x1cadd60, wrap=0x0,
name=0x7fb1f7f4d200 "with-afu-zsh-syntax-highlighting") at exec.c:5040
#213 0x0000000000430e77 in doshfunc (shfunc=0x1cad900,
doshargs=0x7fb1f7f4cf58, noreturnval=0) at exec.c:4920
#214 0x00000000004302fc in execshfunc (shf=0x1cad900, args=0x7fb1f7f4cf58)
at exec.c:4557
#215 0x000000000042d8c2 in execcmd (state=0x7fff4c44f2f0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#216 0x0000000000428ca1 in execpline2 (state=0x7fff4c44f2f0, pcode=67,
how=18, input=0, output=0, last1=0) at exec.c:1697
#217 0x0000000000427fd3 in execpline (state=0x7fff4c44f2f0, slcode=4098,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#218 0x0000000000427757 in execlist (state=0x7fff4c44f2f0, dont_change_job=1,
exiting=0) at exec.c:1267
#219 0x000000000042717d in execode (p=0x1cadbb0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#220 0x000000000043129a in runshfunc (prog=0x1cadbb0, wrap=0x0,
name=0x7fb1f7f4ceb8 "with-afu-resume") at exec.c:5040
#221 0x0000000000430e77 in doshfunc (shfunc=0x1cadc80,
doshargs=0x7fb1f7f4cc50, noreturnval=0) at exec.c:4920
#222 0x00000000004302fc in execshfunc (shf=0x1cadc80, args=0x7fb1f7f4cc50)
at exec.c:4557
#223 0x000000000042d8c2 in execcmd (state=0x7fff4c450280, input=0, output=0,
how=2, last1=2) at exec.c:3373
#224 0x0000000000428ca1 in execpline2 (state=0x7fff4c450280, pcode=771,
how=2, input=0, output=0, last1=0) at exec.c:1697
#225 0x0000000000427fd3 in execpline (state=0x7fff4c450280, slcode=3074,
how=2, last1=0) at exec.c:1484
#226 0x0000000000427757 in execlist (state=0x7fff4c450280, dont_change_job=1,
exiting=0) at exec.c:1267
#227 0x0000000000456df1 in exectry (state=0x7fff4c450280, do_exec=0)
at loop.c:658
---Type <return> to continue, or q <return> to quit---
#228 0x000000000042d732 in execcmd (state=0x7fff4c450280, input=0, output=0,
how=2, last1=2) at exec.c:3336
#229 0x0000000000428ca1 in execpline2 (state=0x7fff4c450280, pcode=259,
how=2, input=0, output=0, last1=0) at exec.c:1697
#230 0x0000000000427fd3 in execpline (state=0x7fff4c450280, slcode=62466,
how=2, last1=0) at exec.c:1484
#231 0x0000000000427757 in execlist (state=0x7fff4c450280, dont_change_job=1,
exiting=0) at exec.c:1267
#232 0x000000000042717d in execode (p=0x1cae690, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#233 0x000000000043129a in runshfunc (prog=0x1cae690, wrap=0x0,
name=0x7fb1f7f4ca98 "with-afu-magic-insert") at exec.c:5040
#234 0x0000000000430e77 in doshfunc (shfunc=0x1cae730,
doshargs=0x7fb1f7f4c7f8, noreturnval=0) at exec.c:4920
#235 0x00000000004302fc in execshfunc (shf=0x1cae730, args=0x7fb1f7f4c7f8)
at exec.c:4557
#236 0x000000000042d8c2 in execcmd (state=0x7fff4c450b70, input=0, output=0,
how=18, last1=2) at exec.c:3373
#237 0x0000000000428ca1 in execpline2 (state=0x7fff4c450b70, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#238 0x0000000000427fd3 in execpline (state=0x7fff4c450b70, slcode=5122,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#239 0x0000000000427757 in execlist (state=0x7fff4c450b70, dont_change_job=1,
exiting=0) at exec.c:1267
#240 0x000000000042717d in execode (p=0x1cae4c0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#241 0x000000000043129a in runshfunc (prog=0x1cae4c0, wrap=0x0,
name=0x7fb1f7f4c7b0 "with-afu-magic-insert~") at exec.c:5040
#242 0x0000000000430e77 in doshfunc (shfunc=0x1cae560,
doshargs=0x7fb1f7f4c540, noreturnval=1) at exec.c:4920
#243 0x00007fb1f67aaee8 in execzlefunc (func=0x1cad180, args=0x7fb1f7f4c538,
set_bindk=0) at zle_main.c:1422
#244 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4c2e0 "zle",
args=0x7fb1f7f4c4e0, ops=0x7fff4c451040, func=0 '\000')
at zle_thingy.c:711
#245 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4c2e0 "zle",
args=0x7fb1f7f4c4d0, ops=0x7fff4c451040, func=0) at zle_thingy.c:382
#246 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4c250,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#247 0x000000000042d8ea in execcmd (state=0x7fff4c4517c0, input=0, output=0,
how=18, last1=2) at exec.c:3378
#248 0x0000000000428ca1 in execpline2 (state=0x7fff4c4517c0, pcode=67,
---Type <return> to continue, or q <return> to quit---
how=18, input=0, output=0, last1=0) at exec.c:1697
#249 0x0000000000427fd3 in execpline (state=0x7fff4c4517c0, slcode=7170,
how=18, last1=0) at exec.c:1484
#250 0x0000000000427757 in execlist (state=0x7fff4c4517c0, dont_change_job=1,
exiting=0) at exec.c:1267
#251 0x000000000042717d in execode (p=0x1cad7c0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#252 0x000000000043129a in runshfunc (prog=0x1cad7c0, wrap=0x0,
name=0x7fb1f7f4c210 "with-afu~") at exec.c:5040
#253 0x0000000000430e77 in doshfunc (shfunc=0x1cad850,
doshargs=0x7fb1f7f4bfe8, noreturnval=0) at exec.c:4920
#254 0x00000000004302fc in execshfunc (shf=0x1cad850, args=0x7fb1f7f4bfe8)
at exec.c:4557
#255 0x000000000042d8c2 in execcmd (state=0x7fff4c4520b0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#256 0x0000000000428ca1 in execpline2 (state=0x7fff4c4520b0, pcode=67,
how=18, input=0, output=0, last1=0) at exec.c:1697
#257 0x0000000000427fd3 in execpline (state=0x7fff4c4520b0, slcode=13314,
how=18, last1=0) at exec.c:1484
#258 0x0000000000427757 in execlist (state=0x7fff4c4520b0, dont_change_job=1,
exiting=0) at exec.c:1267
---Type <return> to continue, or q <return> to quit---
#259 0x000000000042717d in execode (p=0x1d9bf70, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#260 0x000000000043129a in runshfunc (prog=0x1d9bf70, wrap=0x0,
name=0x7fb1f7f4bfa8 "afu+self-insert") at exec.c:5040
#261 0x0000000000430e77 in doshfunc (shfunc=0x1d9a270, doshargs=0x0,
noreturnval=1) at exec.c:4920
#262 0x00007fb1f67aaee8 in execzlefunc (func=0x1d9a560, args=0x7fb1f7f4bf78,
set_bindk=0) at zle_main.c:1422
#263 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4bf30 "zle",
args=0x7fb1f7f4bf78, ops=0x7fff4c452580, func=0 '\000')
at zle_thingy.c:711
#264 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4bf30 "zle",
args=0x7fb1f7f4bf70, ops=0x7fff4c452580, func=0) at zle_thingy.c:382
#265 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4bed0,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#266 0x000000000042d8ea in execcmd (state=0x7fff4c453380, input=0, output=0,
how=18, last1=2) at exec.c:3378
#267 0x0000000000428ca1 in execpline2 (state=0x7fff4c453380, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#268 0x0000000000427fd3 in execpline (state=0x7fff4c453380, slcode=5122,
how=18, last1=0) at exec.c:1484
---Type <return> to continue, or q <return> to quit---
#269 0x0000000000427757 in execlist (state=0x7fff4c453380, dont_change_job=1,
exiting=0) at exec.c:1267
#270 0x000000000045689e in execif (state=0x7fff4c453380, do_exec=0)
at loop.c:525
#271 0x000000000042d732 in execcmd (state=0x7fff4c453380, input=0, output=0,
how=18, last1=2) at exec.c:3336
#272 0x0000000000428ca1 in execpline2 (state=0x7fff4c453380, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#273 0x0000000000427fd3 in execpline (state=0x7fff4c453380, slcode=22530,
how=18, last1=0) at exec.c:1484
#274 0x0000000000427757 in execlist (state=0x7fff4c453380, dont_change_job=1,
exiting=0) at exec.c:1267
#275 0x000000000042717d in execode (p=0x1da1830, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#276 0x000000000043129a in runshfunc (prog=0x1da1830, wrap=0x0,
name=0x7fb1f7f4bd38 "self-insert-by-keymap") at exec.c:5040
#277 0x0000000000430e77 in doshfunc (shfunc=0x1d9bf20, doshargs=0x0,
noreturnval=1) at exec.c:4920
#278 0x00007fb1f67aaee8 in execzlefunc (func=0x7fb1f69d7ed0 <thingies+3600>,
args=0x7fb1f69daea8 <zlenoargs>, set_bindk=0) at zle_main.c:1422
#279 0x00007fb1f67a9e21 in zlecore () at zle_main.c:1106
---Type <return> to continue, or q <return> to quit---
#280 0x00007fb1f67ac80a in recursiveedit (args=0x7fb1f7f4ba70)
at zle_main.c:1819
#281 0x00007fb1f67aabb5 in execzlefunc (func=0x7fb1f69d9960 <thingies+10400>,
args=0x7fb1f7f4ba70, set_bindk=0) at zle_main.c:1388
#282 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4ba38 "zle",
args=0x7fb1f7f4ba70, ops=0x7fff4c453a40, func=0 '\000')
at zle_thingy.c:711
#283 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4ba38 "zle",
args=0x7fb1f7f4ba60, ops=0x7fff4c453a40, func=0) at zle_thingy.c:382
#284 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4b9a0,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#285 0x000000000042d8ea in execcmd (state=0x7fff4c4541c0, input=0, output=0,
how=2, last1=2) at exec.c:3378
#286 0x0000000000428ca1 in execpline2 (state=0x7fff4c4541c0, pcode=67, how=2,
input=0, output=0, last1=0) at exec.c:1697
#287 0x0000000000427fd3 in execpline (state=0x7fff4c4541c0, slcode=7202,
how=2, last1=0) at exec.c:1484
#288 0x000000000042779b in execlist (state=0x7fff4c4541c0, dont_change_job=1,
exiting=0) at exec.c:1275
#289 0x000000000042717d in execode (p=0x1c6c590, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#290 0x000000000043129a in runshfunc (prog=0x1c6c590, wrap=0x0,
name=0x7fb1f7f4b928 "_zsh_highlight_widget_recursive-edit") at exec.c:5040
#291 0x0000000000430e77 in doshfunc (shfunc=0x1c6c8f0, doshargs=0x0,
noreturnval=1) at exec.c:4920
#292 0x00007fb1f67aaee8 in execzlefunc (func=0x7fb1f69d7de0 <thingies+3360>,
args=0x7fb1f7f4b840, set_bindk=0) at zle_main.c:1422
#293 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4b800 "zle",
args=0x7fb1f7f4b840, ops=0x7fff4c454690, func=0 '\000')
at zle_thingy.c:711
#294 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4b800 "zle",
args=0x7fb1f7f4b828, ops=0x7fff4c454690, func=0) at zle_thingy.c:382
#295 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4b788,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#296 0x000000000042d8ea in execcmd (state=0x7fff4c454e10, input=0, output=0,
how=2, last1=2) at exec.c:3378
#297 0x0000000000428ca1 in execpline2 (state=0x7fff4c454e10, pcode=195,
how=2, input=0, output=0, last1=0) at exec.c:1697
#298 0x0000000000427fd3 in execpline (state=0x7fff4c454e10, slcode=6210,
how=2, last1=0) at exec.c:1484
#299 0x00000000004278c7 in execlist (state=0x7fff4c454e10, dont_change_job=1,
exiting=0) at exec.c:1308
---Type <return> to continue, or q <return> to quit---
#300 0x000000000042717d in execode (p=0x1d73a00, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#301 0x000000000043129a in runshfunc (prog=0x1d73a00, wrap=0x0,
name=0x7fb1f7f4b6a0 "afu-recursive-edit-and-accept") at exec.c:5040
#302 0x0000000000430e77 in doshfunc (shfunc=0x1ca7150,
doshargs=0x7fb1f7f4b610, noreturnval=0) at exec.c:4920
#303 0x00000000004302fc in execshfunc (shf=0x1ca7150, args=0x7fb1f7f4b610)
at exec.c:4557
#304 0x000000000042d8c2 in execcmd (state=0x7fff4c455da0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#305 0x0000000000428ca1 in execpline2 (state=0x7fff4c455da0, pcode=771,
how=18, input=0, output=0, last1=0) at exec.c:1697
#306 0x0000000000427fd3 in execpline (state=0x7fff4c455da0, slcode=3074,
how=18, last1=0) at exec.c:1484
#307 0x0000000000427757 in execlist (state=0x7fff4c455da0, dont_change_job=1,
exiting=0) at exec.c:1267
#308 0x0000000000456df1 in exectry (state=0x7fff4c455da0, do_exec=0)
at loop.c:658
#309 0x000000000042d732 in execcmd (state=0x7fff4c455da0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#310 0x0000000000428ca1 in execpline2 (state=0x7fff4c455da0, pcode=259,
---Type <return> to continue, or q <return> to quit---
how=18, input=0, output=0, last1=0) at exec.c:1697
#311 0x0000000000427fd3 in execpline (state=0x7fff4c455da0, slcode=60418,
how=18, last1=0) at exec.c:1484
#312 0x0000000000427757 in execlist (state=0x7fff4c455da0, dont_change_job=1,
exiting=0) at exec.c:1267
#313 0x000000000042717d in execode (p=0x1d73ef0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#314 0x000000000043129a in runshfunc (prog=0x1d73ef0, wrap=0x0,
name=0x7fb1f7f4b278 "afu-line-init") at exec.c:5040
#315 0x0000000000430e77 in doshfunc (shfunc=0x1ca7730,
doshargs=0x7fb1f7f4b210, noreturnval=0) at exec.c:4920
#316 0x00000000004302fc in execshfunc (shf=0x1ca7730, args=0x7fb1f7f4b210)
at exec.c:4557
#317 0x000000000042d8c2 in execcmd (state=0x7fff4c4573a0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#318 0x0000000000428ca1 in execpline2 (state=0x7fff4c4573a0, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#319 0x0000000000427fd3 in execpline (state=0x7fff4c4573a0, slcode=3074,
how=18, last1=0) at exec.c:1484
#320 0x0000000000427757 in execlist (state=0x7fff4c4573a0, dont_change_job=1,
exiting=0) at exec.c:1267
---Type <return> to continue, or q <return> to quit---
#321 0x000000000042514d in execcursh (state=0x7fff4c4573a0, do_exec=0)
at exec.c:421
#322 0x000000000042d732 in execcmd (state=0x7fff4c4573a0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#323 0x0000000000428ca1 in execpline2 (state=0x7fff4c4573a0, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#324 0x0000000000427fd3 in execpline (state=0x7fff4c4573a0, slcode=9218,
how=18, last1=0) at exec.c:1484
#325 0x0000000000427757 in execlist (state=0x7fff4c4573a0, dont_change_job=1,
exiting=0) at exec.c:1267
#326 0x0000000000456df1 in exectry (state=0x7fff4c4573a0, do_exec=0)
at loop.c:658
#327 0x000000000042d732 in execcmd (state=0x7fff4c4573a0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#328 0x0000000000428ca1 in execpline2 (state=0x7fff4c4573a0, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#329 0x0000000000427fd3 in execpline (state=0x7fff4c4573a0, slcode=25602,
how=18, last1=0) at exec.c:1484
#330 0x0000000000427757 in execlist (state=0x7fff4c4573a0, dont_change_job=1,
exiting=0) at exec.c:1267
#331 0x000000000042717d in execode (p=0x1d24f70, dont_change_job=1,
---Type <return> to continue, or q <return> to quit---
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#332 0x000000000043129a in runshfunc (prog=0x1d24f70, wrap=0x0,
name=0x7fb1f7f4b198 "with-afu-zle-rebinding") at exec.c:5040
#333 0x0000000000430e77 in doshfunc (shfunc=0x203f680,
doshargs=0x7fb1f7f4b0e8, noreturnval=0) at exec.c:4920
#334 0x00000000004302fc in execshfunc (shf=0x203f680, args=0x7fb1f7f4b0e8)
at exec.c:4557
#335 0x000000000042d8c2 in execcmd (state=0x7fff4c457c90, input=0, output=0,
how=18, last1=2) at exec.c:3373
#336 0x0000000000428ca1 in execpline2 (state=0x7fff4c457c90, pcode=515,
how=18, input=0, output=0, last1=0) at exec.c:1697
#337 0x0000000000427fd3 in execpline (state=0x7fff4c457c90, slcode=3074,
how=18, last1=0) at exec.c:1484
#338 0x0000000000427757 in execlist (state=0x7fff4c457c90, dont_change_job=1,
exiting=0) at exec.c:1267
#339 0x000000000042717d in execode (p=0x1ca7a30, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#340 0x000000000043129a in runshfunc (prog=0x1ca7a30, wrap=0x0,
name=0x7fb1f7f4af78 "with-afu-trapint") at exec.c:5040
#341 0x0000000000430e77 in doshfunc (shfunc=0x1ca78d0,
doshargs=0x7fb1f7f4aea8, noreturnval=0) at exec.c:4920
---Type <return> to continue, or q <return> to quit---
#342 0x00000000004302fc in execshfunc (shf=0x1ca78d0, args=0x7fb1f7f4aea8)
at exec.c:4557
#343 0x000000000042d8c2 in execcmd (state=0x7fff4c458580, input=0, output=0,
how=18, last1=2) at exec.c:3373
#344 0x0000000000428ca1 in execpline2 (state=0x7fff4c458580, pcode=67,
how=18, input=0, output=0, last1=0) at exec.c:1697
#345 0x0000000000427fd3 in execpline (state=0x7fff4c458580, slcode=5122,
how=18, last1=0) at exec.c:1484
#346 0x0000000000427757 in execlist (state=0x7fff4c458580, dont_change_job=1,
exiting=0) at exec.c:1267
#347 0x000000000042717d in execode (p=0x1ca8a40, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#348 0x000000000043129a in runshfunc (prog=0x1ca8a40, wrap=0x0,
name=0x7fb1f7f4ae68 "auto-fu-init") at exec.c:5040
#349 0x0000000000430e77 in doshfunc (shfunc=0x1ca8d80,
doshargs=0x7fb1f7f4ae08, noreturnval=0) at exec.c:4920
#350 0x00000000004302fc in execshfunc (shf=0x1ca8d80, args=0x7fb1f7f4ae08)
at exec.c:4557
#351 0x000000000042d8c2 in execcmd (state=0x7fff4c4594f0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#352 0x0000000000428ca1 in execpline2 (state=0x7fff4c4594f0, pcode=195,
---Type <return> to continue, or q <return> to quit---
how=18, input=0, output=0, last1=0) at exec.c:1697
#353 0x0000000000427fd3 in execpline (state=0x7fff4c4594f0, slcode=3074,
how=18, last1=0) at exec.c:1484
#354 0x0000000000427757 in execlist (state=0x7fff4c4594f0, dont_change_job=1,
exiting=0) at exec.c:1267
#355 0x000000000045689e in execif (state=0x7fff4c4594f0, do_exec=0)
at loop.c:525
#356 0x000000000042d732 in execcmd (state=0x7fff4c4594f0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#357 0x0000000000428ca1 in execpline2 (state=0x7fff4c4594f0, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#358 0x0000000000427fd3 in execpline (state=0x7fff4c4594f0, slcode=12290,
how=18, last1=0) at exec.c:1484
#359 0x0000000000427757 in execlist (state=0x7fff4c4594f0, dont_change_job=1,
exiting=0) at exec.c:1267
#360 0x000000000042717d in execode (p=0x1c91ba0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#361 0x000000000043129a in runshfunc (prog=0x1c91ba0, wrap=0x0,
name=0x7fb1f7f4ad78 "zle-line-init") at exec.c:5040
#362 0x0000000000430e77 in doshfunc (shfunc=0x1c91c50, doshargs=0x0,
noreturnval=1) at exec.c:4920
---Type <return> to continue, or q <return> to quit---
#363 0x00007fb1f67aaee8 in execzlefunc (func=0x1da26c0, args=0x7fff4c4598f0,
set_bindk=1) at zle_main.c:1422
#364 0x00007fb1f67c7da7 in zlecallhook (name=0x7fb1f67cdda0 "zle-line-init",
arg=0x0) at zle_utils.c:1706
#365 0x00007fb1f67aa6ee in zleread (lp=0x6d2af0 <prompt>,
rp=0x6d2b28 <rprompt>, flags=3, context=0,
init=0x7fb1f67cdda0 "zle-line-init",
finish=0x7fb1f67cdd90 "zle-line-finish") at zle_main.c:1285
#366 0x00007fb1f67acd80 in zle_main_entry (cmd=1, ap=0x7fff4c459b10)
at zle_main.c:1950
#367 0x000000000044857d in zleentry (cmd=1) at init.c:1482
#368 0x000000000044922c in inputline () at input.c:285
#369 0x00000000004490a5 in ingetc () at input.c:221
#370 0x000000000043d5be in ihgetc () at hist.c:282
#371 0x00000000004520ea in gettok () at lex.c:720
#372 0x0000000000451899 in zshlex () at lex.c:401
#373 0x0000000000470c12 in parse_event () at parse.c:454
#374 0x00000000004452d8 in loop (toplevel=1, justonce=0) at init.c:132
#375 0x0000000000448a76 in zsh_main (argc=1, argv=0x7fff4c459ec8)
at init.c:1638
#376 0x000000000040e546 in main (argc=1, argv=0x7fff4c459ec8) at ./main.c:93

[-- Attachment #3: zsh_gdb_header.txt --]
[-- Type: text/plain, Size: 1469 bytes --]

PID: 6718 (zsh)
UID: 1000 (pythonnut)
GID: 100 (users)
Signal: 11 (SEGV)
Timestamp: Sat 2014-12-13 18:49:42 UTC (4h 43min ago)
Command Line: Downloads/cauldron/zsh/bin/zsh
Executable: /home/pythonnut/Downloads/cauldron/zsh/bin/zsh
Control Group: /user.slice/user-1000.slice/session-c4.scope
Unit: session-c4.scope
Slice: user-1000.slice
Session: c4
Owner UID: 1000 (pythonnut)
Boot ID: b4e42e969ef94190a997f3e52f011e51
Machine ID: be7f3553b57b4e2c889c633f23a1b3a4
Hostname: protogon.localdomain
Coredump: /var/lib/systemd/coredump/core.zsh.1000.b4e42e969ef94190a997f3e52f011e51.6718.1418496582000000.lz4
Message: Process 6718 (zsh) of user 1000 dumped core.

GNU gdb (GDB) 7.8.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-unknown-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /home/pythonnut/Downloads/cauldron/zsh/bin/zsh...done.
[New LWP 6718]


[-- Attachment #4: zsh_gdb_where.txt --]
[-- Type: text/plain, Size: 42980 bytes --]

(gdb) where
#0  0x000000000047c267 in charrefinc (x=0x6cc968 <patinput>,
y=0x7fb1f7d8a355 <error: Cannot access memory at address 0x7fb1f7d8a355>,
z=0x7fff4c43fd0c) at pattern.c:1900
#1  0x000000000047d4af in patmatch (prog=0x1e1a968) at pattern.c:2536
#2  0x000000000047cc98 in pattryrefs (prog=0x1e1a930,
string=0x7fb1f7d907b0 ":completion::complete:-command-::", stringlen=33,
unmetalen=33, patoffset=0, nump=0x0, begp=0x0, endp=0x0) at pattern.c:2277
#3  0x000000000047c42a in pattry (prog=0x1e1a930,
string=0x7fb1f7d907b0 ":completion::complete:-command-::")
at pattern.c:1996
#4  0x00007fb1f6359dff in lookupstyle (
ctxt=0x7fb1f7d907b0 ":completion::complete:-command-::",
style=0x7fb1f7d90798 "tag-order") at zutil.c:429
#5  0x00007fb1f635a79e in bin_zstyle (nam=0x7fb1f7d90768 "zstyle",
args=0x7fb1f7d907d8, ops=0x7fff4c4402f0, func=0) at zutil.c:631
#6  0x000000000040efc3 in execbuiltin (args=0x7fb1f7d906d8,
bn=0x7fb1f655f600 <bintab+192>) at builtin.c:450
#7  0x000000000042d8ea in execcmd (state=0x7fff4c441770, input=0, output=0,
how=2, last1=2) at exec.c:3378
#8  0x0000000000428ca1 in execpline2 (state=0x7fff4c441770, pcode=2819,
how=2, input=0, output=0, last1=0) at exec.c:1697
---Type <return> to continue, or q <return> to quit---
#9  0x0000000000427fd3 in execpline (state=0x7fff4c441770, slcode=7234,
how=2, last1=0) at exec.c:1484
#10 0x00000000004278c7 in execlist (state=0x7fff4c441770, dont_change_job=1,
exiting=0) at exec.c:1308
#11 0x000000000045689e in execif (state=0x7fff4c441770, do_exec=0)
at loop.c:525
#12 0x000000000042d732 in execcmd (state=0x7fff4c441770, input=0, output=0,
how=2, last1=2) at exec.c:3336
#13 0x0000000000428ca1 in execpline2 (state=0x7fff4c441770, pcode=2627,
how=2, input=0, output=0, last1=0) at exec.c:1697
#14 0x0000000000427fd3 in execpline (state=0x7fff4c441770, slcode=87042,
how=2, last1=0) at exec.c:1484
#15 0x0000000000427757 in execlist (state=0x7fff4c441770, dont_change_job=1,
exiting=0) at exec.c:1267
#16 0x000000000045689e in execif (state=0x7fff4c441770, do_exec=0)
at loop.c:525
#17 0x000000000042d732 in execcmd (state=0x7fff4c441770, input=0, output=0,
how=2, last1=2) at exec.c:3336
#18 0x0000000000428ca1 in execpline2 (state=0x7fff4c441770, pcode=1027,
how=2, input=0, output=0, last1=0) at exec.c:1697
#19 0x0000000000427fd3 in execpline (state=0x7fff4c441770, slcode=193538,
---Type <return> to continue, or q <return> to quit---
how=2, last1=0) at exec.c:1484
#20 0x0000000000427757 in execlist (state=0x7fff4c441770, dont_change_job=1,
exiting=0) at exec.c:1267
#21 0x000000000042717d in execode (p=0x205cba0, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#22 0x000000000043129a in runshfunc (prog=0x205cba0, wrap=0x0,
name=0x7fb1f7d8fee0 "_tags") at exec.c:5040
#23 0x00007fb1f656baa6 in comp_wrapper (prog=0x205cba0, w=0x0,
name=0x7fb1f7d8fee0 "_tags") at complete.c:1455
#24 0x00000000004311fd in runshfunc (prog=0x205cba0,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d8fee0 "_tags") at exec.c:5025
#25 0x0000000000430e77 in doshfunc (shfunc=0x1d427c0,
doshargs=0x7fb1f7d8fe68, noreturnval=0) at exec.c:4920
#26 0x00000000004302fc in execshfunc (shf=0x1d427c0, args=0x7fb1f7d8fe68)
at exec.c:4557
#27 0x000000000042d8c2 in execcmd (state=0x7fff4c442f50, input=0, output=0,
how=2, last1=2) at exec.c:3373
#28 0x0000000000428ca1 in execpline2 (state=0x7fff4c442f50, pcode=7427,
how=2, input=0, output=0, last1=0) at exec.c:1697
#29 0x0000000000427fd3 in execpline (state=0x7fff4c442f50, slcode=4098,
how=2, last1=0) at exec.c:1484
---Type <return> to continue, or q <return> to quit---
#30 0x0000000000427757 in execlist (state=0x7fff4c442f50, dont_change_job=1,
exiting=0) at exec.c:1267
#31 0x0000000000455a4b in execfor (state=0x7fff4c442f50, do_exec=0)
at loop.c:164
#32 0x000000000042d732 in execcmd (state=0x7fff4c442f50, input=0, output=0,
how=2, last1=2) at exec.c:3336
#33 0x0000000000428ca1 in execpline2 (state=0x7fff4c442f50, pcode=6403,
how=2, input=0, output=0, last1=0) at exec.c:1697
#34 0x0000000000427fd3 in execpline (state=0x7fff4c442f50, slcode=256002,
how=2, last1=0) at exec.c:1484
#35 0x0000000000427757 in execlist (state=0x7fff4c442f50, dont_change_job=1,
exiting=0) at exec.c:1267
#36 0x0000000000455a4b in execfor (state=0x7fff4c442f50, do_exec=0)
at loop.c:164
#37 0x000000000042d732 in execcmd (state=0x7fff4c442f50, input=0, output=0,
how=2, last1=2) at exec.c:3336
#38 0x0000000000428ca1 in execpline2 (state=0x7fff4c442f50, pcode=5955,
how=2, input=0, output=0, last1=0) at exec.c:1697
#39 0x0000000000427fd3 in execpline (state=0x7fff4c442f50, slcode=304130,
how=2, last1=0) at exec.c:1484
#40 0x0000000000427757 in execlist (state=0x7fff4c442f50, dont_change_job=1,
---Type <return> to continue, or q <return> to quit---
exiting=0) at exec.c:1267
#41 0x000000000042717d in execode (p=0x1d27540, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#42 0x000000000043129a in runshfunc (prog=0x1d27540, wrap=0x0,
name=0x7fb1f7d970f8 "_files") at exec.c:5040
#43 0x00007fb1f656baa6 in comp_wrapper (prog=0x1d27540, w=0x0,
name=0x7fb1f7d970f8 "_files") at complete.c:1455
#44 0x00000000004311fd in runshfunc (prog=0x1d27540,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d970f8 "_files")
at exec.c:5025
#45 0x0000000000430e77 in doshfunc (shfunc=0x1d02220,
doshargs=0x7fb1f7d970b0, noreturnval=0) at exec.c:4920
#46 0x00000000004302fc in execshfunc (shf=0x1d02220, args=0x7fb1f7d970b0)
at exec.c:4557
#47 0x000000000042d8c2 in execcmd (state=0x7fff4c443950, input=0, output=0,
how=2, last1=2) at exec.c:3373
#48 0x0000000000428ca1 in execpline2 (state=0x7fff4c443950, pcode=323, how=2,
input=0, output=0, last1=0) at exec.c:1697
#49 0x0000000000427fd3 in execpline (state=0x7fff4c443950, slcode=3074,
how=2, last1=0) at exec.c:1484
#50 0x0000000000427757 in execlist (state=0x7fff4c443950, dont_change_job=1,
---Type <return> to continue, or q <return> to quit---
exiting=0) at exec.c:1267
#51 0x000000000042717d in execode (p=0x1e1f300, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#52 0x000000000043129a in runshfunc (prog=0x1e1f300, wrap=0x0,
name=0x7fb1f7d96f98 "_cmd") at exec.c:5040
#53 0x00007fb1f656baa6 in comp_wrapper (prog=0x1e1f300, w=0x0,
name=0x7fb1f7d96f98 "_cmd") at complete.c:1455
#54 0x00000000004311fd in runshfunc (prog=0x1e1f300,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d96f98 "_cmd") at exec.c:5025
#55 0x0000000000430e77 in doshfunc (shfunc=0x1e10a90,
doshargs=0x7fb1f7d96f50, noreturnval=0) at exec.c:4920
#56 0x00000000004302fc in execshfunc (shf=0x1e10a90, args=0x7fb1f7d96f50)
at exec.c:4557
#57 0x000000000042d8c2 in execcmd (state=0x7fff4c444350, input=0, output=0,
how=18, last1=2) at exec.c:3373
#58 0x0000000000428ca1 in execpline2 (state=0x7fff4c444350, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#59 0x0000000000427fd3 in execpline (state=0x7fff4c444350, slcode=3074,
how=18, last1=0) at exec.c:1484
#60 0x0000000000427757 in execlist (state=0x7fff4c444350, dont_change_job=1,
exiting=0) at exec.c:1267
---Type <return> to continue, or q <return> to quit---
#61 0x000000000042717d in execode (p=0x7fb1f7d96ee0, dont_change_job=1,
exiting=0, context=0x4a155f "eval") at exec.c:1073
#62 0x000000000041f8d6 in eval (argv=0x7fb1f7d96e78) at builtin.c:5034
#63 0x000000000041feaa in bin_eval (nam=0x7fb1f7d96e60 "eval",
argv=0x7fb1f7d96e78, ops=0x7fff4c444440, func=14) at builtin.c:5199
#64 0x000000000040efc3 in execbuiltin (args=0x7fb1f7d96e18,
bn=0x6be540 <builtins+1472>) at builtin.c:450
#65 0x000000000042d8ea in execcmd (state=0x7fff4c445240, input=0, output=0,
how=2, last1=2) at exec.c:3378
#66 0x0000000000428ca1 in execpline2 (state=0x7fff4c445240, pcode=2179,
how=2, input=0, output=0, last1=0) at exec.c:1697
#67 0x0000000000427fd3 in execpline (state=0x7fff4c445240, slcode=4130,
how=2, last1=0) at exec.c:1484
#68 0x000000000042779b in execlist (state=0x7fff4c445240, dont_change_job=1,
exiting=0) at exec.c:1275
#69 0x000000000045689e in execif (state=0x7fff4c445240, do_exec=0)
at loop.c:525
#70 0x000000000042d732 in execcmd (state=0x7fff4c445240, input=0, output=0,
how=2, last1=2) at exec.c:3336
#71 0x0000000000428ca1 in execpline2 (state=0x7fff4c445240, pcode=1923,
how=2, input=0, output=0, last1=0) at exec.c:1697
---Type <return> to continue, or q <return> to quit---
#72 0x0000000000427fd3 in execpline (state=0x7fff4c445240, slcode=43010,
how=2, last1=0) at exec.c:1484
#73 0x0000000000427757 in execlist (state=0x7fff4c445240, dont_change_job=1,
exiting=0) at exec.c:1267
#74 0x000000000042717d in execode (p=0x2053f10, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#75 0x000000000043129a in runshfunc (prog=0x2053f10, wrap=0x0,
name=0x7fb1f7d96b30 "_normal") at exec.c:5040
#76 0x00007fb1f656baa6 in comp_wrapper (prog=0x2053f10, w=0x0,
name=0x7fb1f7d96b30 "_normal") at complete.c:1455
#77 0x00000000004311fd in runshfunc (prog=0x2053f10,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d96b30 "_normal")
at exec.c:5025
#78 0x0000000000430e77 in doshfunc (shfunc=0x1d260c0,
doshargs=0x7fb1f7d96ac8, noreturnval=0) at exec.c:4920
#79 0x00000000004302fc in execshfunc (shf=0x1d260c0, args=0x7fb1f7d96ac8)
at exec.c:4557
#80 0x000000000042d8c2 in execcmd (state=0x7fff4c4462c0, input=0, output=0,
how=2, last1=2) at exec.c:3373
#81 0x0000000000428ca1 in execpline2 (state=0x7fff4c4462c0, pcode=7555,
how=2, input=0, output=0, last1=0) at exec.c:1697
---Type <return> to continue, or q <return> to quit---
#82 0x0000000000427fd3 in execpline (state=0x7fff4c4462c0, slcode=4130,
how=2, last1=0) at exec.c:1484
#83 0x000000000042779b in execlist (state=0x7fff4c4462c0, dont_change_job=1,
exiting=0) at exec.c:1275
#84 0x000000000045689e in execif (state=0x7fff4c4462c0, do_exec=0)
at loop.c:525
#85 0x000000000042d732 in execcmd (state=0x7fff4c4462c0, input=0, output=0,
how=2, last1=2) at exec.c:3336
#86 0x0000000000428ca1 in execpline2 (state=0x7fff4c4462c0, pcode=7427,
how=2, input=0, output=0, last1=0) at exec.c:1697
#87 0x0000000000427fd3 in execpline (state=0x7fff4c4462c0, slcode=114690,
how=2, last1=0) at exec.c:1484
#88 0x0000000000427757 in execlist (state=0x7fff4c4462c0, dont_change_job=1,
exiting=0) at exec.c:1267
#89 0x000000000042717d in execode (p=0x1d25b60, dont_change_job=1, exiting=0,
context=0x4a46c0 "shfunc") at exec.c:1073
#90 0x000000000043129a in runshfunc (prog=0x1d25b60, wrap=0x0,
name=0x7fb1f7d96450 "_complete") at exec.c:5040
#91 0x00007fb1f656baa6 in comp_wrapper (prog=0x1d25b60, w=0x0,
name=0x7fb1f7d96450 "_complete") at complete.c:1455
#92 0x00000000004311fd in runshfunc (prog=0x1d25b60,
---Type <return> to continue, or q <return> to quit---
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7d96450 "_complete")
at exec.c:5025
#93 0x0000000000430e77 in doshfunc (shfunc=0x1cf0730,
doshargs=0x7fb1f7d963e8, noreturnval=0) at exec.c:4920
#94 0x00000000004302fc in execshfunc (shf=0x1cf0730, args=0x7fb1f7d963e8)
at exec.c:4557
#95 0x000000000042d8c2 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=18, last1=2) at exec.c:3373
#96 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=11459,
how=18, input=0, output=0, last1=0) at exec.c:1697
#97 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=3074,
how=18, last1=0) at exec.c:1484
#98 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#99 0x000000000045680a in execif (state=0x7fff4c448120, do_exec=0)
at loop.c:510
#100 0x000000000042d732 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=2, last1=2) at exec.c:3336
#101 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=11139,
how=2, input=0, output=0, last1=0) at exec.c:1697
#102 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=48130,
---Type <return> to continue, or q <return> to quit---
how=2, last1=0) at exec.c:1484
#103 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#104 0x0000000000455a4b in execfor (state=0x7fff4c448120, do_exec=0)
at loop.c:164
#105 0x000000000042d732 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=2, last1=2) at exec.c:3336
#106 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=10627,
how=2, input=0, output=0, last1=0) at exec.c:1697
#107 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=90114,
how=2, last1=0) at exec.c:1484
#108 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#109 0x0000000000455a4b in execfor (state=0x7fff4c448120, do_exec=0)
at loop.c:164
#110 0x000000000042d732 in execcmd (state=0x7fff4c448120, input=0, output=0,
how=2, last1=2) at exec.c:3336
#111 0x0000000000428ca1 in execpline2 (state=0x7fff4c448120, pcode=9155,
how=2, input=0, output=0, last1=0) at exec.c:1697
#112 0x0000000000427fd3 in execpline (state=0x7fff4c448120, slcode=220162,
how=2, last1=0) at exec.c:1484
---Type <return> to continue, or q <return> to quit---
#113 0x0000000000427757 in execlist (state=0x7fff4c448120, dont_change_job=1,
exiting=0) at exec.c:1267
#114 0x000000000042717d in execode (p=0x203fc60, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#115 0x000000000043129a in runshfunc (prog=0x203fc60, wrap=0x0,
name=0x7fb1f7f32050 "_main_complete") at exec.c:5040
#116 0x00007fb1f656baa6 in comp_wrapper (prog=0x203fc60, w=0x0,
name=0x7fb1f7f32050 "_main_complete") at complete.c:1455
#117 0x00000000004311fd in runshfunc (prog=0x203fc60,
wrap=0x7fb1f67898a0 <wrapper>, name=0x7fb1f7f32050 "_main_complete")
at exec.c:5025
#118 0x0000000000430e77 in doshfunc (shfunc=0x1d1b320, doshargs=0x0,
noreturnval=1) at exec.c:4920
#119 0x00007fb1f656e5e9 in callcompfunc (s=0x7fb1f7f38ab0 "l",
fn=0x2088190 "_main_complete") at compcore.c:840
#120 0x00007fb1f656eebd in makecomplist (s=0x7fb1f7f38ab0 "l", incmd=1, lst=0)
at compcore.c:989
#121 0x00007fb1f656ca18 in do_completion (dummy=0x7fb1f69da8e8 <zlehooks+40>,
dat=0x7fff4c448650) at compcore.c:349
#122 0x000000000045e10a in runhookdef (h=0x7fb1f69da8e8 <zlehooks+40>,
d=0x7fff4c448650) at module.c:996
---Type <return> to continue, or q <return> to quit---
#123 0x00007fb1f67c2687 in docompletion (s=0x203a7e0 "l", lst=0, incmd=1)
at zle_tricky.c:2260
#124 0x00007fb1f67be0aa in docomplete (lst=0) at zle_tricky.c:864
#125 0x00007fb1f67bc564 in completeword (args=0x7fb1f69daea8 <zlenoargs>)
at zle_tricky.c:232
#126 0x00007fb1f67bc445 in completecall (args=0x7fb1f7f38918)
at zle_tricky.c:208
#127 0x00007fb1f67aab43 in execzlefunc (func=0x7fb1f69d7430 <thingies+880>,
args=0x7fb1f7f38918, set_bindk=0) at zle_main.c:1381
#128 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f388e0 "zle",
args=0x7fb1f7f38918, ops=0x7fff4c448a00, func=0 '\000')
at zle_thingy.c:711
#129 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f388e0 "zle",
args=0x7fb1f7f38910, ops=0x7fff4c448a00, func=0) at zle_thingy.c:382
#130 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f388a8,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#131 0x000000000042d8ea in execcmd (state=0x7fff4c449180, input=0, output=0,
how=18, last1=2) at exec.c:3378
#132 0x0000000000428ca1 in execpline2 (state=0x7fff4c449180, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#133 0x0000000000427fd3 in execpline (state=0x7fff4c449180, slcode=3074,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#134 0x0000000000427757 in execlist (state=0x7fff4c449180, dont_change_job=1,
exiting=0) at exec.c:1267
#135 0x000000000042717d in execode (p=0x1cb0760, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#136 0x000000000043129a in runshfunc (prog=0x1cb0760, wrap=0x0,
name=0x7fb1f7f38800 "with-afu-compfuncs") at exec.c:5040
#137 0x0000000000430e77 in doshfunc (shfunc=0x1cb0ae0,
doshargs=0x7fb1f7f38738, noreturnval=0) at exec.c:4920
#138 0x00000000004302fc in execshfunc (shf=0x1cb0ae0, args=0x7fb1f7f38738)
at exec.c:4557
#139 0x000000000042d8c2 in execcmd (state=0x7fff4c449a70, input=0, output=0,
how=18, last1=2) at exec.c:3373
#140 0x0000000000428ca1 in execpline2 (state=0x7fff4c449a70, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#141 0x0000000000427fd3 in execpline (state=0x7fff4c449a70, slcode=4098,
how=18, last1=0) at exec.c:1484
#142 0x0000000000427757 in execlist (state=0x7fff4c449a70, dont_change_job=1,
exiting=0) at exec.c:1267
#143 0x000000000042717d in execode (p=0x1cb07a0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#144 0x000000000043129a in runshfunc (prog=0x1cb07a0, wrap=0x0,
name=0x7fb1f7f38548 "with-afu-completer-vars") at exec.c:5040
#145 0x0000000000430e77 in doshfunc (shfunc=0x1cb0c40,
doshargs=0x7fb1f7f38478, noreturnval=0) at exec.c:4920
#146 0x00000000004302fc in execshfunc (shf=0x1cb0c40, args=0x7fb1f7f38478)
at exec.c:4557
#147 0x000000000042d8c2 in execcmd (state=0x7fff4c44aa00, input=0, output=0,
how=18, last1=2) at exec.c:3373
#148 0x0000000000428ca1 in execpline2 (state=0x7fff4c44aa00, pcode=1219,
how=18, input=0, output=0, last1=0) at exec.c:1697
#149 0x0000000000427fd3 in execpline (state=0x7fff4c44aa00, slcode=3074,
how=18, last1=0) at exec.c:1484
#150 0x0000000000427757 in execlist (state=0x7fff4c44aa00, dont_change_job=1,
exiting=0) at exec.c:1267
#151 0x0000000000456df1 in exectry (state=0x7fff4c44aa00, do_exec=0)
at loop.c:658
#152 0x000000000042d732 in execcmd (state=0x7fff4c44aa00, input=0, output=0,
how=18, last1=2) at exec.c:3336
#153 0x0000000000428ca1 in execpline2 (state=0x7fff4c44aa00, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#154 0x0000000000427fd3 in execpline (state=0x7fff4c44aa00, slcode=106498,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#155 0x0000000000427757 in execlist (state=0x7fff4c44aa00, dont_change_job=1,
exiting=0) at exec.c:1267
#156 0x000000000042717d in execode (p=0x1cac5e0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#157 0x000000000043129a in runshfunc (prog=0x1cac5e0, wrap=0x0,
name=0x7fb1f7f37f78 "with-afu-region-highlight-saving") at exec.c:5040
#158 0x0000000000430e77 in doshfunc (shfunc=0x1cac680,
doshargs=0x7fb1f7f37e58, noreturnval=0) at exec.c:4920
#159 0x00000000004302fc in execshfunc (shf=0x1cac680, args=0x7fb1f7f37e58)
at exec.c:4557
#160 0x000000000042d8c2 in execcmd (state=0x7fff4c44b2f0, input=0, output=0,
how=2, last1=2) at exec.c:3373
#161 0x0000000000428ca1 in execpline2 (state=0x7fff4c44b2f0, pcode=323,
how=2, input=0, output=0, last1=0) at exec.c:1697
#162 0x0000000000427fd3 in execpline (state=0x7fff4c44b2f0, slcode=6146,
how=2, last1=0) at exec.c:1484
#163 0x0000000000427757 in execlist (state=0x7fff4c44b2f0, dont_change_job=1,
exiting=0) at exec.c:1267
#164 0x000000000042717d in execode (p=0x1cb1970, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#165 0x000000000043129a in runshfunc (prog=0x1cb1970, wrap=0x0,
name=0x7fb1f7f37d30 "auto-fu") at exec.c:5040
#166 0x0000000000430e77 in doshfunc (shfunc=0x1cb1860,
doshargs=0x7fb1f7f37ca0, noreturnval=0) at exec.c:4920
#167 0x00000000004302fc in execshfunc (shf=0x1cb1860, args=0x7fb1f7f37ca0)
at exec.c:4557
#168 0x000000000042d8c2 in execcmd (state=0x7fff4c44bbe0, input=0, output=0,
how=2, last1=2) at exec.c:3373
#169 0x0000000000428ca1 in execpline2 (state=0x7fff4c44bbe0, pcode=3075,
how=2, input=0, output=0, last1=0) at exec.c:1697
#170 0x0000000000427fd3 in execpline (state=0x7fff4c44bbe0, slcode=4098,
how=2, last1=0) at exec.c:1484
#171 0x0000000000427757 in execlist (state=0x7fff4c44bbe0, dont_change_job=1,
exiting=0) at exec.c:1267
#172 0x000000000042717d in execode (p=0x1cb0d60, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#173 0x000000000043129a in runshfunc (prog=0x1cb0d60, wrap=0x0,
name=0x7fb1f7f375b8 "with-afu-menuselecting-handling") at exec.c:5040
#174 0x0000000000430e77 in doshfunc (shfunc=0x1cb06a0,
doshargs=0x7fb1f7f37508, noreturnval=0) at exec.c:4920
#175 0x00000000004302fc in execshfunc (shf=0x1cb06a0, args=0x7fb1f7f37508)
---Type <return> to continue, or q <return> to quit---
at exec.c:4557
#176 0x000000000042d8c2 in execcmd (state=0x7fff4c44cb40, input=0, output=0,
how=2, last1=2) at exec.c:3373
#177 0x0000000000428ca1 in execpline2 (state=0x7fff4c44cb40, pcode=259,
how=2, input=0, output=0, last1=0) at exec.c:1697
#178 0x0000000000427fd3 in execpline (state=0x7fff4c44cb40, slcode=4098,
how=2, last1=0) at exec.c:1484
#179 0x0000000000427757 in execlist (state=0x7fff4c44cb40, dont_change_job=1,
exiting=0) at exec.c:1267
#180 0x000000000042514d in execcursh (state=0x7fff4c44cb40, do_exec=0)
at exec.c:421
#181 0x000000000042d732 in execcmd (state=0x7fff4c44cb40, input=0, output=0,
how=2, last1=2) at exec.c:3336
#182 0x0000000000428ca1 in execpline2 (state=0x7fff4c44cb40, pcode=259,
how=2, input=0, output=0, last1=0) at exec.c:1697
#183 0x0000000000427fd3 in execpline (state=0x7fff4c44cb40, slcode=16386,
how=2, last1=0) at exec.c:1484
#184 0x0000000000427757 in execlist (state=0x7fff4c44cb40, dont_change_job=1,
exiting=0) at exec.c:1267
#185 0x000000000042717d in execode (p=0x1cb0700, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#186 0x000000000043129a in runshfunc (prog=0x1cb0700, wrap=0x0,
name=0x7fb1f7f37390 "auto-fu-maybe") at exec.c:5040
#187 0x0000000000430e77 in doshfunc (shfunc=0x1cb09b0,
doshargs=0x7fb1f7f37330, noreturnval=0) at exec.c:4920
#188 0x00000000004302fc in execshfunc (shf=0x1cb09b0, args=0x7fb1f7f37330)
at exec.c:4557
#189 0x000000000042d8c2 in execcmd (state=0x7fff4c44daa0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#190 0x0000000000428ca1 in execpline2 (state=0x7fff4c44daa0, pcode=1155,
how=18, input=0, output=0, last1=0) at exec.c:1697
#191 0x0000000000427fd3 in execpline (state=0x7fff4c44daa0, slcode=3074,
how=18, last1=0) at exec.c:1484
#192 0x0000000000427757 in execlist (state=0x7fff4c44daa0, dont_change_job=1,
exiting=0) at exec.c:1267
#193 0x000000000042514d in execcursh (state=0x7fff4c44daa0, do_exec=0)
at exec.c:421
#194 0x000000000042d732 in execcmd (state=0x7fff4c44daa0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#195 0x0000000000428ca1 in execpline2 (state=0x7fff4c44daa0, pcode=1155,
how=18, input=0, output=0, last1=0) at exec.c:1697
#196 0x0000000000427fd3 in execpline (state=0x7fff4c44daa0, slcode=9218,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#197 0x0000000000427757 in execlist (state=0x7fff4c44daa0, dont_change_job=1,
exiting=0) at exec.c:1267
#198 0x000000000042717d in execode (p=0x1cad690, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#199 0x000000000043129a in runshfunc (prog=0x1cad690, wrap=0x0,
name=0x7fb1f7f4deb0 "with-afu") at exec.c:5040
#200 0x0000000000430e77 in doshfunc (shfunc=0x1cad130,
doshargs=0x7fb1f7f4dae8, noreturnval=0) at exec.c:4920
#201 0x00000000004302fc in execshfunc (shf=0x1cad130, args=0x7fb1f7f4dae8)
at exec.c:4557
#202 0x000000000042d8c2 in execcmd (state=0x7fff4c44ea00, input=0, output=0,
how=2, last1=2) at exec.c:3373
#203 0x0000000000428ca1 in execpline2 (state=0x7fff4c44ea00, pcode=451,
how=2, input=0, output=0, last1=0) at exec.c:1697
#204 0x0000000000427fd3 in execpline (state=0x7fff4c44ea00, slcode=5122,
how=2, last1=0) at exec.c:1484
#205 0x0000000000427757 in execlist (state=0x7fff4c44ea00, dont_change_job=1,
exiting=0) at exec.c:1267
#206 0x000000000042514d in execcursh (state=0x7fff4c44ea00, do_exec=0)
at exec.c:421
---Type <return> to continue, or q <return> to quit---
#207 0x000000000042d732 in execcmd (state=0x7fff4c44ea00, input=0, output=0,
how=2, last1=2) at exec.c:3336
#208 0x0000000000428ca1 in execpline2 (state=0x7fff4c44ea00, pcode=451,
how=2, input=0, output=0, last1=0) at exec.c:1697
#209 0x0000000000427fd3 in execpline (state=0x7fff4c44ea00, slcode=17410,
how=2, last1=0) at exec.c:1484
#210 0x0000000000427757 in execlist (state=0x7fff4c44ea00, dont_change_job=1,
exiting=0) at exec.c:1267
#211 0x000000000042717d in execode (p=0x1cadd60, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#212 0x000000000043129a in runshfunc (prog=0x1cadd60, wrap=0x0,
name=0x7fb1f7f4d200 "with-afu-zsh-syntax-highlighting") at exec.c:5040
#213 0x0000000000430e77 in doshfunc (shfunc=0x1cad900,
doshargs=0x7fb1f7f4cf58, noreturnval=0) at exec.c:4920
#214 0x00000000004302fc in execshfunc (shf=0x1cad900, args=0x7fb1f7f4cf58)
at exec.c:4557
#215 0x000000000042d8c2 in execcmd (state=0x7fff4c44f2f0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#216 0x0000000000428ca1 in execpline2 (state=0x7fff4c44f2f0, pcode=67,
how=18, input=0, output=0, last1=0) at exec.c:1697
#217 0x0000000000427fd3 in execpline (state=0x7fff4c44f2f0, slcode=4098,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#218 0x0000000000427757 in execlist (state=0x7fff4c44f2f0, dont_change_job=1,
exiting=0) at exec.c:1267
#219 0x000000000042717d in execode (p=0x1cadbb0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#220 0x000000000043129a in runshfunc (prog=0x1cadbb0, wrap=0x0,
name=0x7fb1f7f4ceb8 "with-afu-resume") at exec.c:5040
#221 0x0000000000430e77 in doshfunc (shfunc=0x1cadc80,
doshargs=0x7fb1f7f4cc50, noreturnval=0) at exec.c:4920
#222 0x00000000004302fc in execshfunc (shf=0x1cadc80, args=0x7fb1f7f4cc50)
at exec.c:4557
#223 0x000000000042d8c2 in execcmd (state=0x7fff4c450280, input=0, output=0,
how=2, last1=2) at exec.c:3373
#224 0x0000000000428ca1 in execpline2 (state=0x7fff4c450280, pcode=771,
how=2, input=0, output=0, last1=0) at exec.c:1697
#225 0x0000000000427fd3 in execpline (state=0x7fff4c450280, slcode=3074,
how=2, last1=0) at exec.c:1484
#226 0x0000000000427757 in execlist (state=0x7fff4c450280, dont_change_job=1,
exiting=0) at exec.c:1267
#227 0x0000000000456df1 in exectry (state=0x7fff4c450280, do_exec=0)
at loop.c:658
---Type <return> to continue, or q <return> to quit---
#228 0x000000000042d732 in execcmd (state=0x7fff4c450280, input=0, output=0,
how=2, last1=2) at exec.c:3336
#229 0x0000000000428ca1 in execpline2 (state=0x7fff4c450280, pcode=259,
how=2, input=0, output=0, last1=0) at exec.c:1697
#230 0x0000000000427fd3 in execpline (state=0x7fff4c450280, slcode=62466,
how=2, last1=0) at exec.c:1484
#231 0x0000000000427757 in execlist (state=0x7fff4c450280, dont_change_job=1,
exiting=0) at exec.c:1267
#232 0x000000000042717d in execode (p=0x1cae690, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#233 0x000000000043129a in runshfunc (prog=0x1cae690, wrap=0x0,
name=0x7fb1f7f4ca98 "with-afu-magic-insert") at exec.c:5040
#234 0x0000000000430e77 in doshfunc (shfunc=0x1cae730,
doshargs=0x7fb1f7f4c7f8, noreturnval=0) at exec.c:4920
#235 0x00000000004302fc in execshfunc (shf=0x1cae730, args=0x7fb1f7f4c7f8)
at exec.c:4557
#236 0x000000000042d8c2 in execcmd (state=0x7fff4c450b70, input=0, output=0,
how=18, last1=2) at exec.c:3373
#237 0x0000000000428ca1 in execpline2 (state=0x7fff4c450b70, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#238 0x0000000000427fd3 in execpline (state=0x7fff4c450b70, slcode=5122,
---Type <return> to continue, or q <return> to quit---
how=18, last1=0) at exec.c:1484
#239 0x0000000000427757 in execlist (state=0x7fff4c450b70, dont_change_job=1,
exiting=0) at exec.c:1267
#240 0x000000000042717d in execode (p=0x1cae4c0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#241 0x000000000043129a in runshfunc (prog=0x1cae4c0, wrap=0x0,
name=0x7fb1f7f4c7b0 "with-afu-magic-insert~") at exec.c:5040
#242 0x0000000000430e77 in doshfunc (shfunc=0x1cae560,
doshargs=0x7fb1f7f4c540, noreturnval=1) at exec.c:4920
#243 0x00007fb1f67aaee8 in execzlefunc (func=0x1cad180, args=0x7fb1f7f4c538,
set_bindk=0) at zle_main.c:1422
#244 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4c2e0 "zle",
args=0x7fb1f7f4c4e0, ops=0x7fff4c451040, func=0 '\000')
at zle_thingy.c:711
#245 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4c2e0 "zle",
args=0x7fb1f7f4c4d0, ops=0x7fff4c451040, func=0) at zle_thingy.c:382
#246 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4c250,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#247 0x000000000042d8ea in execcmd (state=0x7fff4c4517c0, input=0, output=0,
how=18, last1=2) at exec.c:3378
#248 0x0000000000428ca1 in execpline2 (state=0x7fff4c4517c0, pcode=67,
---Type <return> to continue, or q <return> to quit---
how=18, input=0, output=0, last1=0) at exec.c:1697
#249 0x0000000000427fd3 in execpline (state=0x7fff4c4517c0, slcode=7170,
how=18, last1=0) at exec.c:1484
#250 0x0000000000427757 in execlist (state=0x7fff4c4517c0, dont_change_job=1,
exiting=0) at exec.c:1267
#251 0x000000000042717d in execode (p=0x1cad7c0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#252 0x000000000043129a in runshfunc (prog=0x1cad7c0, wrap=0x0,
name=0x7fb1f7f4c210 "with-afu~") at exec.c:5040
#253 0x0000000000430e77 in doshfunc (shfunc=0x1cad850,
doshargs=0x7fb1f7f4bfe8, noreturnval=0) at exec.c:4920
#254 0x00000000004302fc in execshfunc (shf=0x1cad850, args=0x7fb1f7f4bfe8)
at exec.c:4557
#255 0x000000000042d8c2 in execcmd (state=0x7fff4c4520b0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#256 0x0000000000428ca1 in execpline2 (state=0x7fff4c4520b0, pcode=67,
how=18, input=0, output=0, last1=0) at exec.c:1697
#257 0x0000000000427fd3 in execpline (state=0x7fff4c4520b0, slcode=13314,
how=18, last1=0) at exec.c:1484
#258 0x0000000000427757 in execlist (state=0x7fff4c4520b0, dont_change_job=1,
exiting=0) at exec.c:1267
---Type <return> to continue, or q <return> to quit---
#259 0x000000000042717d in execode (p=0x1d9bf70, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#260 0x000000000043129a in runshfunc (prog=0x1d9bf70, wrap=0x0,
name=0x7fb1f7f4bfa8 "afu+self-insert") at exec.c:5040
#261 0x0000000000430e77 in doshfunc (shfunc=0x1d9a270, doshargs=0x0,
noreturnval=1) at exec.c:4920
#262 0x00007fb1f67aaee8 in execzlefunc (func=0x1d9a560, args=0x7fb1f7f4bf78,
set_bindk=0) at zle_main.c:1422
#263 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4bf30 "zle",
args=0x7fb1f7f4bf78, ops=0x7fff4c452580, func=0 '\000')
at zle_thingy.c:711
#264 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4bf30 "zle",
args=0x7fb1f7f4bf70, ops=0x7fff4c452580, func=0) at zle_thingy.c:382
#265 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4bed0,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#266 0x000000000042d8ea in execcmd (state=0x7fff4c453380, input=0, output=0,
how=18, last1=2) at exec.c:3378
#267 0x0000000000428ca1 in execpline2 (state=0x7fff4c453380, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#268 0x0000000000427fd3 in execpline (state=0x7fff4c453380, slcode=5122,
how=18, last1=0) at exec.c:1484
---Type <return> to continue, or q <return> to quit---
#269 0x0000000000427757 in execlist (state=0x7fff4c453380, dont_change_job=1,
exiting=0) at exec.c:1267
#270 0x000000000045689e in execif (state=0x7fff4c453380, do_exec=0)
at loop.c:525
#271 0x000000000042d732 in execcmd (state=0x7fff4c453380, input=0, output=0,
how=18, last1=2) at exec.c:3336
#272 0x0000000000428ca1 in execpline2 (state=0x7fff4c453380, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#273 0x0000000000427fd3 in execpline (state=0x7fff4c453380, slcode=22530,
how=18, last1=0) at exec.c:1484
#274 0x0000000000427757 in execlist (state=0x7fff4c453380, dont_change_job=1,
exiting=0) at exec.c:1267
#275 0x000000000042717d in execode (p=0x1da1830, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#276 0x000000000043129a in runshfunc (prog=0x1da1830, wrap=0x0,
name=0x7fb1f7f4bd38 "self-insert-by-keymap") at exec.c:5040
#277 0x0000000000430e77 in doshfunc (shfunc=0x1d9bf20, doshargs=0x0,
noreturnval=1) at exec.c:4920
#278 0x00007fb1f67aaee8 in execzlefunc (func=0x7fb1f69d7ed0 <thingies+3600>,
args=0x7fb1f69daea8 <zlenoargs>, set_bindk=0) at zle_main.c:1422
#279 0x00007fb1f67a9e21 in zlecore () at zle_main.c:1106
---Type <return> to continue, or q <return> to quit---
#280 0x00007fb1f67ac80a in recursiveedit (args=0x7fb1f7f4ba70)
at zle_main.c:1819
#281 0x00007fb1f67aabb5 in execzlefunc (func=0x7fb1f69d9960 <thingies+10400>,
args=0x7fb1f7f4ba70, set_bindk=0) at zle_main.c:1388
#282 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4ba38 "zle",
args=0x7fb1f7f4ba70, ops=0x7fff4c453a40, func=0 '\000')
at zle_thingy.c:711
#283 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4ba38 "zle",
args=0x7fb1f7f4ba60, ops=0x7fff4c453a40, func=0) at zle_thingy.c:382
#284 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4b9a0,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#285 0x000000000042d8ea in execcmd (state=0x7fff4c4541c0, input=0, output=0,
how=2, last1=2) at exec.c:3378
#286 0x0000000000428ca1 in execpline2 (state=0x7fff4c4541c0, pcode=67, how=2,
input=0, output=0, last1=0) at exec.c:1697
#287 0x0000000000427fd3 in execpline (state=0x7fff4c4541c0, slcode=7202,
how=2, last1=0) at exec.c:1484
#288 0x000000000042779b in execlist (state=0x7fff4c4541c0, dont_change_job=1,
exiting=0) at exec.c:1275
#289 0x000000000042717d in execode (p=0x1c6c590, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
---Type <return> to continue, or q <return> to quit---
#290 0x000000000043129a in runshfunc (prog=0x1c6c590, wrap=0x0,
name=0x7fb1f7f4b928 "_zsh_highlight_widget_recursive-edit") at exec.c:5040
#291 0x0000000000430e77 in doshfunc (shfunc=0x1c6c8f0, doshargs=0x0,
noreturnval=1) at exec.c:4920
#292 0x00007fb1f67aaee8 in execzlefunc (func=0x7fb1f69d7de0 <thingies+3360>,
args=0x7fb1f7f4b840, set_bindk=0) at zle_main.c:1422
#293 0x00007fb1f67bbb2d in bin_zle_call (name=0x7fb1f7f4b800 "zle",
args=0x7fb1f7f4b840, ops=0x7fff4c454690, func=0 '\000')
at zle_thingy.c:711
#294 0x00007fb1f67babe2 in bin_zle (name=0x7fb1f7f4b800 "zle",
args=0x7fb1f7f4b828, ops=0x7fff4c454690, func=0) at zle_thingy.c:382
#295 0x000000000040efc3 in execbuiltin (args=0x7fb1f7f4b788,
bn=0x7fb1f69da880 <bintab+128>) at builtin.c:450
#296 0x000000000042d8ea in execcmd (state=0x7fff4c454e10, input=0, output=0,
how=2, last1=2) at exec.c:3378
#297 0x0000000000428ca1 in execpline2 (state=0x7fff4c454e10, pcode=195,
how=2, input=0, output=0, last1=0) at exec.c:1697
#298 0x0000000000427fd3 in execpline (state=0x7fff4c454e10, slcode=6210,
how=2, last1=0) at exec.c:1484
#299 0x00000000004278c7 in execlist (state=0x7fff4c454e10, dont_change_job=1,
exiting=0) at exec.c:1308
---Type <return> to continue, or q <return> to quit---
#300 0x000000000042717d in execode (p=0x1d73a00, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#301 0x000000000043129a in runshfunc (prog=0x1d73a00, wrap=0x0,
name=0x7fb1f7f4b6a0 "afu-recursive-edit-and-accept") at exec.c:5040
#302 0x0000000000430e77 in doshfunc (shfunc=0x1ca7150,
doshargs=0x7fb1f7f4b610, noreturnval=0) at exec.c:4920
#303 0x00000000004302fc in execshfunc (shf=0x1ca7150, args=0x7fb1f7f4b610)
at exec.c:4557
#304 0x000000000042d8c2 in execcmd (state=0x7fff4c455da0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#305 0x0000000000428ca1 in execpline2 (state=0x7fff4c455da0, pcode=771,
how=18, input=0, output=0, last1=0) at exec.c:1697
#306 0x0000000000427fd3 in execpline (state=0x7fff4c455da0, slcode=3074,
how=18, last1=0) at exec.c:1484
#307 0x0000000000427757 in execlist (state=0x7fff4c455da0, dont_change_job=1,
exiting=0) at exec.c:1267
#308 0x0000000000456df1 in exectry (state=0x7fff4c455da0, do_exec=0)
at loop.c:658
#309 0x000000000042d732 in execcmd (state=0x7fff4c455da0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#310 0x0000000000428ca1 in execpline2 (state=0x7fff4c455da0, pcode=259,
---Type <return> to continue, or q <return> to quit---
how=18, input=0, output=0, last1=0) at exec.c:1697
#311 0x0000000000427fd3 in execpline (state=0x7fff4c455da0, slcode=60418,
how=18, last1=0) at exec.c:1484
#312 0x0000000000427757 in execlist (state=0x7fff4c455da0, dont_change_job=1,
exiting=0) at exec.c:1267
#313 0x000000000042717d in execode (p=0x1d73ef0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#314 0x000000000043129a in runshfunc (prog=0x1d73ef0, wrap=0x0,
name=0x7fb1f7f4b278 "afu-line-init") at exec.c:5040
#315 0x0000000000430e77 in doshfunc (shfunc=0x1ca7730,
doshargs=0x7fb1f7f4b210, noreturnval=0) at exec.c:4920
#316 0x00000000004302fc in execshfunc (shf=0x1ca7730, args=0x7fb1f7f4b210)
at exec.c:4557
#317 0x000000000042d8c2 in execcmd (state=0x7fff4c4573a0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#318 0x0000000000428ca1 in execpline2 (state=0x7fff4c4573a0, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#319 0x0000000000427fd3 in execpline (state=0x7fff4c4573a0, slcode=3074,
how=18, last1=0) at exec.c:1484
#320 0x0000000000427757 in execlist (state=0x7fff4c4573a0, dont_change_job=1,
exiting=0) at exec.c:1267
---Type <return> to continue, or q <return> to quit---
#321 0x000000000042514d in execcursh (state=0x7fff4c4573a0, do_exec=0)
at exec.c:421
#322 0x000000000042d732 in execcmd (state=0x7fff4c4573a0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#323 0x0000000000428ca1 in execpline2 (state=0x7fff4c4573a0, pcode=259,
how=18, input=0, output=0, last1=0) at exec.c:1697
#324 0x0000000000427fd3 in execpline (state=0x7fff4c4573a0, slcode=9218,
how=18, last1=0) at exec.c:1484
#325 0x0000000000427757 in execlist (state=0x7fff4c4573a0, dont_change_job=1,
exiting=0) at exec.c:1267
#326 0x0000000000456df1 in exectry (state=0x7fff4c4573a0, do_exec=0)
at loop.c:658
#327 0x000000000042d732 in execcmd (state=0x7fff4c4573a0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#328 0x0000000000428ca1 in execpline2 (state=0x7fff4c4573a0, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#329 0x0000000000427fd3 in execpline (state=0x7fff4c4573a0, slcode=25602,
how=18, last1=0) at exec.c:1484
#330 0x0000000000427757 in execlist (state=0x7fff4c4573a0, dont_change_job=1,
exiting=0) at exec.c:1267
#331 0x000000000042717d in execode (p=0x1d24f70, dont_change_job=1,
---Type <return> to continue, or q <return> to quit---
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#332 0x000000000043129a in runshfunc (prog=0x1d24f70, wrap=0x0,
name=0x7fb1f7f4b198 "with-afu-zle-rebinding") at exec.c:5040
#333 0x0000000000430e77 in doshfunc (shfunc=0x203f680,
doshargs=0x7fb1f7f4b0e8, noreturnval=0) at exec.c:4920
#334 0x00000000004302fc in execshfunc (shf=0x203f680, args=0x7fb1f7f4b0e8)
at exec.c:4557
#335 0x000000000042d8c2 in execcmd (state=0x7fff4c457c90, input=0, output=0,
how=18, last1=2) at exec.c:3373
#336 0x0000000000428ca1 in execpline2 (state=0x7fff4c457c90, pcode=515,
how=18, input=0, output=0, last1=0) at exec.c:1697
#337 0x0000000000427fd3 in execpline (state=0x7fff4c457c90, slcode=3074,
how=18, last1=0) at exec.c:1484
#338 0x0000000000427757 in execlist (state=0x7fff4c457c90, dont_change_job=1,
exiting=0) at exec.c:1267
#339 0x000000000042717d in execode (p=0x1ca7a30, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#340 0x000000000043129a in runshfunc (prog=0x1ca7a30, wrap=0x0,
name=0x7fb1f7f4af78 "with-afu-trapint") at exec.c:5040
#341 0x0000000000430e77 in doshfunc (shfunc=0x1ca78d0,
doshargs=0x7fb1f7f4aea8, noreturnval=0) at exec.c:4920
---Type <return> to continue, or q <return> to quit---
#342 0x00000000004302fc in execshfunc (shf=0x1ca78d0, args=0x7fb1f7f4aea8)
at exec.c:4557
#343 0x000000000042d8c2 in execcmd (state=0x7fff4c458580, input=0, output=0,
how=18, last1=2) at exec.c:3373
#344 0x0000000000428ca1 in execpline2 (state=0x7fff4c458580, pcode=67,
how=18, input=0, output=0, last1=0) at exec.c:1697
#345 0x0000000000427fd3 in execpline (state=0x7fff4c458580, slcode=5122,
how=18, last1=0) at exec.c:1484
#346 0x0000000000427757 in execlist (state=0x7fff4c458580, dont_change_job=1,
exiting=0) at exec.c:1267
#347 0x000000000042717d in execode (p=0x1ca8a40, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#348 0x000000000043129a in runshfunc (prog=0x1ca8a40, wrap=0x0,
name=0x7fb1f7f4ae68 "auto-fu-init") at exec.c:5040
#349 0x0000000000430e77 in doshfunc (shfunc=0x1ca8d80,
doshargs=0x7fb1f7f4ae08, noreturnval=0) at exec.c:4920
#350 0x00000000004302fc in execshfunc (shf=0x1ca8d80, args=0x7fb1f7f4ae08)
at exec.c:4557
#351 0x000000000042d8c2 in execcmd (state=0x7fff4c4594f0, input=0, output=0,
how=18, last1=2) at exec.c:3373
#352 0x0000000000428ca1 in execpline2 (state=0x7fff4c4594f0, pcode=195,
---Type <return> to continue, or q <return> to quit---
how=18, input=0, output=0, last1=0) at exec.c:1697
#353 0x0000000000427fd3 in execpline (state=0x7fff4c4594f0, slcode=3074,
how=18, last1=0) at exec.c:1484
#354 0x0000000000427757 in execlist (state=0x7fff4c4594f0, dont_change_job=1,
exiting=0) at exec.c:1267
#355 0x000000000045689e in execif (state=0x7fff4c4594f0, do_exec=0)
at loop.c:525
#356 0x000000000042d732 in execcmd (state=0x7fff4c4594f0, input=0, output=0,
how=18, last1=2) at exec.c:3336
#357 0x0000000000428ca1 in execpline2 (state=0x7fff4c4594f0, pcode=131,
how=18, input=0, output=0, last1=0) at exec.c:1697
#358 0x0000000000427fd3 in execpline (state=0x7fff4c4594f0, slcode=12290,
how=18, last1=0) at exec.c:1484
#359 0x0000000000427757 in execlist (state=0x7fff4c4594f0, dont_change_job=1,
exiting=0) at exec.c:1267
#360 0x000000000042717d in execode (p=0x1c91ba0, dont_change_job=1,
exiting=0, context=0x4a46c0 "shfunc") at exec.c:1073
#361 0x000000000043129a in runshfunc (prog=0x1c91ba0, wrap=0x0,
name=0x7fb1f7f4ad78 "zle-line-init") at exec.c:5040
#362 0x0000000000430e77 in doshfunc (shfunc=0x1c91c50, doshargs=0x0,
noreturnval=1) at exec.c:4920
---Type <return> to continue, or q <return> to quit---
#363 0x00007fb1f67aaee8 in execzlefunc (func=0x1da26c0, args=0x7fff4c4598f0,
set_bindk=1) at zle_main.c:1422
#364 0x00007fb1f67c7da7 in zlecallhook (name=0x7fb1f67cdda0 "zle-line-init",
arg=0x0) at zle_utils.c:1706
#365 0x00007fb1f67aa6ee in zleread (lp=0x6d2af0 <prompt>,
rp=0x6d2b28 <rprompt>, flags=3, context=0,
init=0x7fb1f67cdda0 "zle-line-init",
finish=0x7fb1f67cdd90 "zle-line-finish") at zle_main.c:1285
#366 0x00007fb1f67acd80 in zle_main_entry (cmd=1, ap=0x7fff4c459b10)
at zle_main.c:1950
#367 0x000000000044857d in zleentry (cmd=1) at init.c:1482
#368 0x000000000044922c in inputline () at input.c:285
#369 0x00000000004490a5 in ingetc () at input.c:221
#370 0x000000000043d5be in ihgetc () at hist.c:282
#371 0x00000000004520ea in gettok () at lex.c:720
#372 0x0000000000451899 in zshlex () at lex.c:401
#373 0x0000000000470c12 in parse_event () at parse.c:454
#374 0x00000000004452d8 in loop (toplevel=1, justonce=0) at init.c:132
#375 0x0000000000448a76 in zsh_main (argc=1, argv=0x7fff4c459ec8)
at init.c:1638
#376 0x000000000040e546 in main (argc=1, argv=0x7fff4c459ec8) at ./main.c:93

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-13 23:36   ` Jonathan H
@ 2014-12-14  4:40     ` Bart Schaefer
  2014-12-14 18:20       ` Peter Stephenson
  0 siblings, 1 reply; 14+ messages in thread
From: Bart Schaefer @ 2014-12-14  4:40 UTC (permalink / raw)
  To: Jonathan H, zsh-workers

On Dec 13,  3:36pm, Jonathan H wrote:
}
} $ZSH_PATCHLEVEL == "zsh-5.0.7-0-g208bded"
} $(uname -a) == "Linux protogon.localdomain 3.17.6-1-ARCH #1 SMP
} PREEMPT Sun Dec 7 23:43:32 UTC 2014 x86_64 GNU/Linux"
} 
} I've attached the output of gdb backtrace, watch and the headers.

OK, thanks.  If you look closely at that backtrace, you'll see that the
shell is actually inside the zle-line-init widget, which means that the
entire editor is just starting up:

#364 "zle-line-init", arg=0x0) at zle_utils.c:1706

This calls through here:

#348 "auto-fu-init") at exec.c:5040
...
#332 "with-afu-zle-rebinding") at exec.c:5040
...
#314 "afu-line-init") at exec.c:5040
...
#301 "afu-recursive-edit-and-accept") at exec.c:5040
...
#290 "_zsh_highlight_widget_recursive-edit") at exec.c:5040
...
#280 recursiveedit (args=0x7fb1f7f4ba70) at zle_main.c:181


So at this point we haven't even finished initializing ZLE yet, but one of
these "auto-fu" functions has recursively invoked it.  This is a recipe for 
disaster if ever I saw one.  I suspect recursive-edit should simply throw
an error if it's invoked from zle-line-init, but PWS may be able to speak
better to this.

At this point we're already either hosed or about to be because ZLE isn't
ready to be re-entered yet within zle-line-init, but just to follow the
rest of the way:

#276 "self-insert-by-keymap") at exec.c:5040
...
#260 "afu+self-insert") at exec.c:5040
...
#252 "with-afu~") at exec.c:5040
...
#241 "with-afu-magic-insert~") at exec.c:5040
...
#233 "with-afu-magic-insert") at exec.c:5040
...
#220 "with-afu-resume") at exec.c:5040
...
#212 "with-afu-zsh-syntax-highlighting") at exec.c:5040

Oh-my-zsh syntax highlighting is known to tickle several subtle crash-
inducing memory errors, so if this function's name means anything, then
combined with the ill-timed recursive-edit this is most likely where
something gets scrambled and we're just waiting for the other shoe to
drop ... but on we go:

#199 "with-afu") at exec.c:5040
...
#186 "auto-fu-maybe") at exec.c:5040
...
#173 "with-afu-menuselecting-handling") at exec.c:5040
...
#165 "auto-fu") at exec.c:5040
...
#157 "with-afu-region-highlight-saving") at exec.c:5040
...
#144 "with-afu-completer-vars") at exec.c:5040
...
#136 "with-afu-compfuncs") at exec.c:5040
...
#126 completecall (args=0x7fb1f7f38918) at zle_tricky.c:208

So now we're in a recursive edit before ZLE has finished initialzing, and
completion is being invoked on something (I have no idea what at this point
because either the buffer is empty or one of those other auto-fu functions
stuffed something into it, probably with-afu-resume).

After this on down it's just ordinary completion, passing through your _cmd
function which tries every possible sort of completion one after the other
without checking whether the previous one found anything.  I don't know if
that's really what you meant for it to do.

Anyway, the location of the crash is just where the badly-freed or in some
other way abused chunk of memory, from some previous error, finally gets
re-used.  It's like shoulder pain during a heart attack; not the real
problem at all.

I hadn't seen auto-fu before but it appears to be a rewrite of the old
incremental-complete-word functions.  I'm mildly surprised to see that
it's using the keymap+widget technique, I didn't think anyone had even
noticed that existed.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-14  4:40     ` Bart Schaefer
@ 2014-12-14 18:20       ` Peter Stephenson
  2014-12-14 18:43         ` Bart Schaefer
  2014-12-15 21:20         ` Jonathan H
  0 siblings, 2 replies; 14+ messages in thread
From: Peter Stephenson @ 2014-12-14 18:20 UTC (permalink / raw)
  To: zsh-workers; +Cc: Jonathan H

On Sat, 13 Dec 2014 20:40:32 -0800
Bart Schaefer <schaefer@brasslantern.com> wrote:
> On Dec 13,  3:36pm, Jonathan H wrote:
> }
> } $ZSH_PATCHLEVEL == "zsh-5.0.7-0-g208bded"
> } $(uname -a) == "Linux protogon.localdomain 3.17.6-1-ARCH #1 SMP
> } PREEMPT Sun Dec 7 23:43:32 UTC 2014 x86_64 GNU/Linux"
> } 
> } I've attached the output of gdb backtrace, watch and the headers.
> 
> OK, thanks.  If you look closely at that backtrace, you'll see that the
> shell is actually inside the zle-line-init widget, which means that the
> entire editor is just starting up:
> 
> #364 "zle-line-init", arg=0x0) at zle_utils.c:1706
> 
> This calls through here:
>...
> #280 recursiveedit (args=0x7fb1f7f4ba70) at zle_main.c:181
> 
> So at this point we haven't even finished initializing ZLE yet, but one of
> these "auto-fu" functions has recursively invoked it.  This is a recipe for 
> disaster if ever I saw one.  I suspect recursive-edit should simply throw
> an error if it's invoked from zle-line-init, but PWS may be able to speak
> better to this.

I'm not actually what would go wrong here.

After zle-line-init runs (in zleread),the next thing we do is zrefresh()
and then zlecore().  So I think it *has* finished initialising ---
zrefresh() and zlecore() are the stuff that we can only do when zsh is
set up and we can do them at this point.

Indeed, zlecore() is basically what recursive-edit does, although
there's quite lot in the way in the hook stuff in execzlefunc().  So if
something's going wrong here it's the hooking rather than the not being
started that should prevent a recursive edit.  But I still don't know
what it is we can't allow because of what.

> At this point we're already either hosed or about to be because ZLE isn't
> ready to be re-entered yet within zle-line-init

I don't actually see why not, as I said above.

> Oh-my-zsh syntax highlighting is known to tickle several subtle crash-
> inducing memory errors

This is probably more to the point.

> #126 completecall (args=0x7fb1f7f38918) at zle_tricky.c:208

This is utterly bizarre, but, again, I'm not really sure what the core
shell should be disallowing.  It's up to the user rather than the shell
not to complete anything before they've even started up the command
line...

> Anyway, the location of the crash is just where the badly-freed or in some
> other way abused chunk of memory, from some previous error, finally gets
> re-used.

Would it be possible to run valgrind on this, if it's sufficiently
reproducible?

pws


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-14 18:20       ` Peter Stephenson
@ 2014-12-14 18:43         ` Bart Schaefer
  2014-12-15 21:20         ` Jonathan H
  1 sibling, 0 replies; 14+ messages in thread
From: Bart Schaefer @ 2014-12-14 18:43 UTC (permalink / raw)
  To: zsh-workers

On Dec 14,  6:20pm, Peter Stephenson wrote:
}
} Bart Schaefer <schaefer@brasslantern.com> wrote:
} > #280 recursiveedit (args=0x7fb1f7f4ba70) at zle_main.c:181
} > 
} > So at this point we haven't even finished initializing ZLE yet, but one of
} > these "auto-fu" functions has recursively invoked it.  This is a recipe for 
} > disaster if ever I saw one.
} 
} After zle-line-init runs (in zleread),the next thing we do is zrefresh()
} and then zlecore().  So I think it *has* finished initialising ---
} zrefresh() and zlecore() are the stuff that we can only do when zsh is
} set up and we can do them at this point.

OK; that is after all why I invoked you ... (turn three times counter-
clockwise, then fling salt over your right shoulder and ...)

} > #126 completecall (args=0x7fb1f7f38918) at zle_tricky.c:208
} 
} This is utterly bizarre, but, again, I'm not really sure what the core
} shell should be disallowing.  It's up to the user rather than the shell
} not to complete anything before they've even started up the command
} line...

After thinking about this, it occurred to me that we're inside recursive-
edit, so probably the stack has grown and shrunk several times as input
was typed before we got the trace that led to this particular error.  So
the buffer likely wasn't empty after all.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-14 18:20       ` Peter Stephenson
  2014-12-14 18:43         ` Bart Schaefer
@ 2014-12-15 21:20         ` Jonathan H
  2014-12-15 23:39           ` Bart Schaefer
  1 sibling, 1 reply; 14+ messages in thread
From: Jonathan H @ 2014-12-15 21:20 UTC (permalink / raw)
  To: Peter Stephenson; +Cc: zsh-workers

[-- Attachment #1: Type: text/plain, Size: 3029 bytes --]

It usually is, but for some reason I can't get it to crash in
valgrind. I forgot to tell you guys, but the crashes happen more often
when the user types rapidly. (Race condition related maybe).

Anyway, here's the STDERR from "valgrind -v -v". It shows some errors
or something so maybe it's still of use. I'll post if I can get it to
crash though.



On Sun, Dec 14, 2014 at 10:20 AM, Peter Stephenson
<p.w.stephenson@ntlworld.com> wrote:
> On Sat, 13 Dec 2014 20:40:32 -0800
> Bart Schaefer <schaefer@brasslantern.com> wrote:
>> On Dec 13,  3:36pm, Jonathan H wrote:
>> }
>> } $ZSH_PATCHLEVEL == "zsh-5.0.7-0-g208bded"
>> } $(uname -a) == "Linux protogon.localdomain 3.17.6-1-ARCH #1 SMP
>> } PREEMPT Sun Dec 7 23:43:32 UTC 2014 x86_64 GNU/Linux"
>> }
>> } I've attached the output of gdb backtrace, watch and the headers.
>>
>> OK, thanks.  If you look closely at that backtrace, you'll see that the
>> shell is actually inside the zle-line-init widget, which means that the
>> entire editor is just starting up:
>>
>> #364 "zle-line-init", arg=0x0) at zle_utils.c:1706
>>
>> This calls through here:
>>...
>> #280 recursiveedit (args=0x7fb1f7f4ba70) at zle_main.c:181
>>
>> So at this point we haven't even finished initializing ZLE yet, but one of
>> these "auto-fu" functions has recursively invoked it.  This is a recipe for
>> disaster if ever I saw one.  I suspect recursive-edit should simply throw
>> an error if it's invoked from zle-line-init, but PWS may be able to speak
>> better to this.
>
> I'm not actually what would go wrong here.
>
> After zle-line-init runs (in zleread),the next thing we do is zrefresh()
> and then zlecore().  So I think it *has* finished initialising ---
> zrefresh() and zlecore() are the stuff that we can only do when zsh is
> set up and we can do them at this point.
>
> Indeed, zlecore() is basically what recursive-edit does, although
> there's quite lot in the way in the hook stuff in execzlefunc().  So if
> something's going wrong here it's the hooking rather than the not being
> started that should prevent a recursive edit.  But I still don't know
> what it is we can't allow because of what.
>
>> At this point we're already either hosed or about to be because ZLE isn't
>> ready to be re-entered yet within zle-line-init
>
> I don't actually see why not, as I said above.
>
>> Oh-my-zsh syntax highlighting is known to tickle several subtle crash-
>> inducing memory errors
>
> This is probably more to the point.
>
>> #126 completecall (args=0x7fb1f7f38918) at zle_tricky.c:208
>
> This is utterly bizarre, but, again, I'm not really sure what the core
> shell should be disallowing.  It's up to the user rather than the shell
> not to complete anything before they've even started up the command
> line...
>
>> Anyway, the location of the crash is just where the badly-freed or in some
>> other way abused chunk of memory, from some previous error, finally gets
>> re-used.
>
> Would it be possible to run valgrind on this, if it's sufficiently
> reproducible?
>
> pws

[-- Attachment #2: zsh_valgrind.log --]
[-- Type: application/octet-stream, Size: 4332058 bytes --]

==7806== Memcheck, a memory error detector
==7806== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==7806== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==7806== Command: ./zsh
==7806== 
--7806-- Valgrind options:
--7806--    -v
--7806--    -v
--7806-- Contents of /proc/version:
--7806--   Linux version 3.17.6-1-ARCH (builduser@foutrelis) (gcc version 4.9.2 (GCC) ) #1 SMP PREEMPT Sun Dec 7 23:43:32 UTC 2014
--7806-- Arch and hwcaps: AMD64, LittleEndian, amd64-rdtscp-sse3
--7806-- Page sizes: currently 4096, max supported 4096
--7806-- Valgrind library directory: /usr/lib/valgrind
--7806-- TT/TC: VG_(init_tt_tc) (startup of code management)
--7806-- TT/TC: cache: 16 sectors of 27597024 bytes each = 441552384 total
--7806-- TT/TC: table: 16 tables  of 12580032 bytes each = 201280512 total
--7806-- TT/TC: table: 65521 entries each = 1048336 total entries max occupancy 681408 (65%)
==7806== Adding active redirection:
--7806--     new: 0xffffffffff600000 (???                 ) R-> (0000.0) 0x380c1e33 ???
==7806== Adding active redirection:
--7806--     new: 0xffffffffff600400 (???                 ) R-> (0000.0) 0x380c1e3d ???
==7806== Adding active redirection:
--7806--     new: 0xffffffffff600800 (???                 ) R-> (0000.0) 0x380c1e47 ???
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/bin/zsh
--7806--    svma 0x000040e430, avma 0x000040e430
--7806-- Reading syms from /usr/lib/ld-2.20.so
--7806--    svma 0x0000000bc0, avma 0x0004000bc0
--7806-- summarise_context(loc_start = 0x10): cannot summarise(why=1):   
0x3c0: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x3c7): cannot summarise(why=1):   
0x4ce: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x4d3): cannot summarise(why=1):   
0x7c0: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x7c7): cannot summarise(why=1):   
0x8c0: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x8c5): cannot summarise(why=1):   
0x974: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x97b): cannot summarise(why=1):   
0xa1c: [0]={ 56(r3) { u  u  u  c-56 u  u  u  u  u  u  u  u  u  u  u  u  c-8 u  u  u  }
--7806-- summarise_context(loc_start = 0x2d): cannot summarise(why=1):   
0x4a: [0]={ 0(r5) { u  u  u  c0 u  u  r9 r8 u  u  u  u  c16 c24 c32 c40 r1 u  u  u  }
==7806== Adding active redirection:
--7806--     new: 0x04018ad0 (strlen              ) R-> (0000.0) 0x380c1e51 ???
--7806-- Reading syms from /usr/lib/valgrind/memcheck-amd64-linux
--7806--    svma 0x0038000150, avma 0x0038000150
--7806--    object doesn't have a symbol table
--7806--    object doesn't have a dynamic symbol table
--7806-- Scheduler: using generic scheduler lock implementation.
--7806-- Reading suppressions file: /usr/lib/valgrind/default.supp
==7806== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7806-by-pythonnut-on-???
==7806== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7806-by-pythonnut-on-???
==7806== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7806-by-pythonnut-on-???
==7806== 
==7806== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7806== don't want to do, unless you know exactly what you're doing,
==7806== or are doing some strange experiment):
==7806==   /usr/lib/valgrind/../../bin/vgdb --pid=7806 ...command...
==7806== 
==7806== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7806==   /path/to/gdb ./zsh
==7806== and then give GDB the following command
==7806==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7806
==7806== --pid is optional if only one valgrind process is running
==7806== 
--7806-- TT/TC: initialise sector 0
--7806-- REDIR: 0x4018ad0 (ld-linux-x86-64.so.2:strlen) redirected to 0x380c1e51 (???)
--7806-- Reading syms from /usr/lib/valgrind/vgpreload_core-amd64-linux.so
--7806--    svma 0x00000005d0, avma 0x0004a245d0
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so
--7806--    svma 0x00000038e0, avma 0x0004c298e0
--7806--    object doesn't have a symbol table
==7806== Adding active redirection:
--7806--     new: 0x04018880 (index               ) R-> (2002.0) 0x04c2d180 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x04018880 (index               ) R-> (2002.0) 0x04c2d180 index
--7806--     new: 0x04018880 (index               ) R-> (2002.0) 0x04c2d140 strchr
==7806== Adding active redirection:
--7806--     new: 0x04018aa0 (strcmp              ) R-> (2016.0) 0x04c2e680 strcmp
==7806== WARNING: new redirection conflicts with existing -- ignoring it
--7806--     old: 0x04018ad0 (strlen              ) R-> (0000.0) 0x380c1e51 ???
--7806--     new: 0x04018ad0 (strlen              ) R-> (2007.0) 0x04c2d5d0 strlen
==7806== Adding active redirection:
--7806--     new: 0x040197c0 (mempcpy             ) R-> (2029.0) 0x04c311d0 mempcpy
==7806== Adding active redirection:
--7806--     new: 0x04019910 (stpcpy              ) R-> (2020.0) 0x04c30560 stpcpy
--7806-- REDIR: 0x4018880 (ld-linux-x86-64.so.2:index) redirected to 0x4c2d180 (index)
--7806-- REDIR: 0x4018aa0 (ld-linux-x86-64.so.2:strcmp) redirected to 0x4c2e680 (strcmp)
--7806-- REDIR: 0x40197c0 (ld-linux-x86-64.so.2:mempcpy) redirected to 0x4c311d0 (mempcpy)
--7806-- Reading syms from /usr/lib/libgdbm.so.4.0.0
--7806--    svma 0x0000002c60, avma 0x0004e38c60
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libdl-2.20.so
--7806--    svma 0x0000000ed0, avma 0x0005042ed0
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libncursesw.so.5.9
--7806--    svma 0x0000015130, avma 0x000525b130
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/librt-2.20.so
--7806--    svma 0x00000022f0, avma 0x00054b02f0
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libm-2.20.so
--7806--    svma 0x0000005580, avma 0x00056bb580
--7806--    object doesn't have a symbol table
--7806-- Reading syms from /usr/lib/libc-2.20.so
--7806--    svma 0x000001f4d0, avma 0x00059da4d0
--7806-- summarise_context(loc_start = 0x33): cannot summarise(why=1):   
0x50: [0]={ 0(r5) { u  u  u  c0 u  u  r9 r8 u  u  u  u  c16 c24 c32 c40 r1 u  u  u  }
--7806-- summarise_context(loc_start = 0x35): cannot summarise(why=1):   
0x7d: [0]={ 0(r5) { u  u  u  c128 u  u  c120 c160 u  u  u  u  c72 c80 c88 c96 c168 u  u  u  }
--7806-- summarise_context(loc_start = 0x1): cannot summarise(why=2):   
0x25: [0]={ 0(r7) { u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  r5 u  u  u  }
--7806-- summarise_context(loc_start = 0x25): cannot summarise(why=2):   
0x4b: [0]={ 8(r7) { u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  u  r5 u  u  u  }
--7806-- summarise_context(loc_start = 0x83): cannot summarise(why=1):   
0xa0: [0]={ 0(r5) { u  u  u  c0 u  u  r9 r8 u  u  u  u  c16 c24 c32 c40 r1 u  u  u  }
==7806== Adding active redirection:
--7806--     new: 0x059f0be0 (putenv              ) W-> (0000.0) 0x04c31930 putenv
==7806== Adding active redirection:
--7806--     new: 0x059f1030 (setenv              ) W-> (0000.0) 0x04c31a70 setenv
==7806== Adding active redirection:
--7806--     new: 0x059f1090 (unsetenv            ) W-> (0000.0) 0x04c319d0 unsetenv
==7806== Adding active redirection:
--7806--     new: 0x05a37440 (malloc              ) R-> (1001.0) 0x04c29f20 malloc
==7806== Adding active redirection:
--7806--     new: 0x05a376b0 (malloc_get_state    ) R-> (1018.0) 0x04c29e10 malloc_get_state
==7806== Adding active redirection:
--7806--     new: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b190 free
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b190 free
--7806--     new: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b3a0 cfree
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b190 free
--7806--     new: 0x05a37b10 (free                ) R-> (1005.0) 0x04c2b3a0 cfree
==7806== Adding active redirection:
--7806--     new: 0x05a37bb0 (realloc             ) R-> (1009.0) 0x04c2c220 realloc
==7806== Adding active redirection:
--7806--     new: 0x05a37e70 (memalign            ) R-> (1011.0) 0x04c2c480 memalign
==7806== Adding active redirection:
--7806--     new: 0x05a37e80 (calloc              ) R-> (1007.0) 0x04c2c000 calloc
==7806== Adding active redirection:
--7806--     new: 0x05a381b0 (malloc_usable_size  ) R-> (1017.0) 0x04c2c7c0 malloc_usable_size
==7806== Adding active redirection:
--7806--     new: 0x05a38290 (mallopt             ) R-> (1014.0) 0x04c29da0 mallopt
==7806== Adding active redirection:
--7806--     new: 0x05a389a0 (malloc_set_state    ) R-> (1018.0) 0x04c29e20 malloc_set_state
==7806== Adding active redirection:
--7806--     new: 0x05a38ef0 (valloc              ) R-> (1012.0) 0x04c2c590 valloc
==7806== Adding active redirection:
--7806--     new: 0x05a38f40 (pvalloc             ) R-> (1018.0) 0x04c29e00 pvalloc
==7806== Adding active redirection:
--7806--     new: 0x05a38fc0 (malloc_trim         ) R-> (1015.0) 0x04c29de0 malloc_trim
==7806== Adding active redirection:
--7806--     new: 0x05a39280 (mallinfo            ) R-> (1020.0) 0x04c2cb80 mallinfo
==7806== Adding active redirection:
--7806--     new: 0x05a393a0 (malloc_stats        ) R-> (1019.0) 0x04c29e30 malloc_stats
==7806== Adding active redirection:
--7806--     new: 0x05a39580 (posix_memalign      ) R-> (1016.0) 0x04c2c610 posix_memalign
==7806== Adding active redirection:
--7806--     new: 0x05a3afc0 (strcat              ) R-> (2003.0) 0x04c2d1c0 strcat
==7806== Adding active redirection:
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
==7806== Adding active redirection:
--7806--     new: 0x05a3b1c0 (index               ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1c0 (index               ) R-> (2002.0) 0x04c2d080 index
--7806--     new: 0x05a3b1c0 (index               ) R-> (2002.0) 0x04c2cf80 strchr
==7806== Adding active redirection:
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d000 __strchr_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3b410 (strcmp              ) R-> (2016.0) 0x04c2e540 strcmp
==7806== Adding active redirection:
--7806--     new: 0x05a3b450 (__GI_strcmp         ) R-> (2016.0) 0x04c2e590 __GI_strcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b450 (__GI_strcmp         ) R-> (2016.0) 0x04c2e590 __GI_strcmp
--7806--     new: 0x05a3b450 (__GI_strcmp         ) R-> (2016.0) 0x04c2e5e0 __strcmp_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3c8a0 (strcpy              ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Adding active redirection:
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
==7806== Adding active redirection:
--7806--     new: 0x05a3c9c0 (strcspn             ) R-> (2033.0) 0x04c315d0 strcspn
==7806== Adding active redirection:
--7806--     new: 0x05a3ce70 (strlen              ) R-> (2007.0) 0x04c2d510 strlen
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3ce70 (strlen              ) R-> (2007.0) 0x04c2d510 strlen
--7806--     new: 0x05a3ce70 (strlen              ) R-> (2007.0) 0x04c2d530 __GI_strlen
==7806== Adding active redirection:
--7806--     new: 0x05a3d030 (strnlen             ) R-> (2006.0) 0x04c2d490 strnlen
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d030 (strnlen             ) R-> (2006.0) 0x04c2d490 strnlen
--7806--     new: 0x05a3d030 (strnlen             ) R-> (2006.0) 0x04c2d4d0 __GI_strnlen
==7806== Adding active redirection:
--7806--     new: 0x05a3d250 (strncat             ) R-> (2004.0) 0x04c2d380 strncat
==7806== Adding active redirection:
--7806--     new: 0x05a3d290 (strncmp             ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Adding active redirection:
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dd30 __strncmp_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3eb30 (strncpy             ) R-> (2009.0) 0x04c2d790 strncpy
==7806== Adding active redirection:
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce90 __GI_strrchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce30 strrchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce60 rindex
--7806--     new: 0x05a3eb70 (rindex              ) R-> (2001.0) 0x04c2ce30 strrchr
==7806== Adding active redirection:
--7806--     new: 0x05a3ee60 (strpbrk             ) R-> (2032.0) 0x04c31570 strpbrk
==7806== Adding active redirection:
--7806--     new: 0x05a3f1d0 (strspn              ) R-> (2034.0) 0x04c31640 strspn
==7806== Adding active redirection:
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a3fc40 (strstr              ) R-> (2031.0) 0x04c313c0 strstr
==7806== Adding active redirection:
--7806--     new: 0x05a3fe80 (memchr              ) R-> (2017.0) 0x04c2e720 memchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3fe80 (memchr              ) R-> (2017.0) 0x04c2e720 memchr
--7806--     new: 0x05a3fe80 (memchr              ) R-> (2017.0) 0x04c2e760 __GI_memchr
==7806== Adding active redirection:
--7806--     new: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c300d0 bcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c300d0 bcmp
--7806--     new: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c2ffd0 memcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c300d0 bcmp
--7806--     new: 0x05a401d0 (bcmp                ) R-> (2019.0) 0x04c2ffd0 memcmp
==7806== Adding active redirection:
--7806--     new: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30010 __GI_memcmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30010 __GI_memcmp
--7806--     new: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30050 __memcmp_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c30a90 __GI_memmove
==7806== Adding active redirection:
--7806--     new: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806--     new: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c30810 memmove
==7806== Ignoring lower priority redirection:
--7806--     old: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806--     new: 0x05a40790 (memcpy@GLIBC_2.2.5  ) R-> (2018.0) 0x04c2ed70 memcpy
==7806== Adding active redirection:
--7806--     new: 0x05a407f0 (memset              ) R-> (2021.0) 0x04c30760 memset
==7806== Adding active redirection:
--7806--     new: 0x05a40960 (mempcpy             ) R-> (2029.0) 0x04c30f00 mempcpy
==7806== Adding active redirection:
--7806--     new: 0x05a40e20 (bcopy               ) R-> (2023.0) 0x04c30d10 bcopy
==7806== Adding active redirection:
--7806--     new: 0x05a40e60 (stpcpy              ) R-> (2020.0) 0x04c30150 stpcpy
==7806== Adding active redirection:
--7806--     new: 0x05a40ea0 (__GI_stpcpy         ) R-> (2020.0) 0x04c30220 __GI_stpcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40ea0 (__GI_stpcpy         ) R-> (2020.0) 0x04c30220 __GI_stpcpy
--7806--     new: 0x05a40ea0 (__GI_stpcpy         ) R-> (2020.0) 0x04c302f0 __stpcpy_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a40f80 (stpncpy             ) R-> (2042.0) 0x04c30630 stpncpy
==7806== Adding active redirection:
--7806--     new: 0x05a40fc0 (strcasecmp_l        ) R-> (2014.0) 0x04c2e090 strcasecmp_l
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40fc0 (strcasecmp_l        ) R-> (2014.0) 0x04c2e090 strcasecmp_l
--7806--     new: 0x05a40fc0 (strcasecmp_l        ) R-> (2014.0) 0x04c2e120 __GI_strcasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a41010 (strcasecmp          ) R-> (2012.0) 0x04c2de10 strcasecmp
==7806== Adding active redirection:
--7806--     new: 0x05a41080 (__GI___strcasecmp_l ) R-> (2014.0) 0x04c2e1b0 __GI___strcasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a432b0 (strncasecmp_l       ) R-> (2015.0) 0x04c2e240 strncasecmp_l
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a432b0 (strncasecmp_l       ) R-> (2015.0) 0x04c2e240 strncasecmp_l
--7806--     new: 0x05a432b0 (strncasecmp_l       ) R-> (2015.0) 0x04c2e340 __GI_strncasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a43300 (strncasecmp         ) R-> (2013.0) 0x04c2def0 strncasecmp
==7806== Adding active redirection:
--7806--     new: 0x05a43370 (__GI___strncasecmp_l) R-> (2015.0) 0x04c2e440 __GI___strncasecmp_l
==7806== Adding active redirection:
--7806--     new: 0x05a459e0 (memcpy@@GLIBC_2.14  ) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a459e0 (memcpy@@GLIBC_2.14  ) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
--7806--     new: 0x05a459e0 (memcpy@@GLIBC_2.14  ) R-> (2018.0) 0x04c2ed70 memcpy
==7806== Adding active redirection:
--7806--     new: 0x05a45a50 (__GI_memcpy         ) R-> (2018.0) 0x04c2f080 __GI_memcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a45a50 (__GI_memcpy         ) R-> (2018.0) 0x04c2f080 __GI_memcpy
--7806--     new: 0x05a45a50 (__GI_memcpy         ) R-> (2018.0) 0x04c2f390 __memcpy_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a46f30 (strcasestr          ) R-> (2035.0) 0x04c316b0 strcasestr
==7806== Adding active redirection:
--7806--     new: 0x05a477a0 (rawmemchr           ) R-> (2026.0) 0x04c30e20 rawmemchr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a477a0 (rawmemchr           ) R-> (2026.0) 0x04c30e20 rawmemchr
--7806--     new: 0x05a477a0 (rawmemchr           ) R-> (2026.0) 0x04c30e40 __GI___rawmemchr
==7806== Adding active redirection:
--7806--     new: 0x05a479b0 (strchrnul           ) R-> (2025.0) 0x04c30df0 strchrnul
==7806== Adding active redirection:
--7806--     new: 0x05a4ae20 (memrchr             ) R-> (2036.0) 0x04c2e7a0 memrchr
==7806== Adding active redirection:
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d9f0 __strncpy_sse2
==7806== Adding active redirection:
--7806--     new: 0x05a50bc0 (__strncpy_sse2_unali) R-> (2009.0) 0x04c2db20 __strncpy_sse2_unaligned
==7806== Adding active redirection:
--7806--     new: 0x05a51ba0 (__stpcpy_sse2_unalig) R-> (2020.0) 0x04c303c0 __stpcpy_sse2_unaligned
==7806== Adding active redirection:
--7806--     new: 0x05a55790 (wcschr              ) R-> (2040.0) 0x04c318d0 wcschr
==7806== Adding active redirection:
--7806--     new: 0x05a55920 (wcscmp              ) R-> (2038.0) 0x04c317b0 wcscmp
==7806== Adding active redirection:
--7806--     new: 0x05a565f0 (wcscpy              ) R-> (2039.0) 0x04c31800 wcscpy
==7806== Adding active redirection:
--7806--     new: 0x05a566b0 (wcslen              ) R-> (2037.0) 0x04c31790 wcslen
==7806== Adding active redirection:
--7806--     new: 0x05a56c00 (wcsrchr             ) R-> (2041.0) 0x04c31900 wcsrchr
==7806== Adding active redirection:
--7806--     new: 0x05ab0d00 (__memcpy_chk        ) R-> (2030.0) 0x04c312c0 __memcpy_chk
==7806== Adding active redirection:
--7806--     new: 0x05ab0d70 (__memmove_chk       ) R-> (2024.0) 0x04c30d70 __memmove_chk
==7806== Adding active redirection:
--7806--     new: 0x05ab0e50 (__stpcpy_chk        ) R-> (2028.0) 0x04c30eb0 __stpcpy_chk
==7806== Adding active redirection:
--7806--     new: 0x05ab1020 (__strcpy_chk        ) R-> (2027.0) 0x04c30e60 __strcpy_chk
==7806== Adding active redirection:
--7806--     new: 0x05ad9400 (__strcmp_sse42      ) R-> (2016.0) 0x04c2e630 __strcmp_sse42
==7806== Adding active redirection:
--7806--     new: 0x05ada1b0 (__strncmp_sse42     ) R-> (2011.0) 0x04c2dda0 __strncmp_sse42
==7806== Adding active redirection:
--7806--     new: 0x05b02b50 (__memcmp_sse4_1     ) R-> (2019.0) 0x04c30090 __memcmp_sse4_1
==7806== Adding active redirection:
--7806--     new: 0x05b04fc0 (__strchr_sse2_no_bsf) R-> (2002.0) 0x04c2d040 __strchr_sse2_no_bsf
--7806-- Reading syms from /usr/lib/libpthread-2.20.so
--7806--    svma 0x0000005a70, avma 0x0005d63a70
--7806-- REDIR: 0x5a41010 (libc.so.6:strcasecmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a41070 (__strcasecmp_sse2   ) R-> (2012.0) 0x04c2de10 strcasecmp
--7806-- REDIR: 0x5a43300 (libc.so.6:strncasecmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a43360 (__strncasecmp_sse2  ) R-> (2013.0) 0x04c2def0 strncasecmp
--7806-- REDIR: 0x5a40790 (libc.so.6:memcpy@GLIBC_2.2.5) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c30a90 __GI_memmove
--7806--     new: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- REDIR: 0x5a3eb70 (libc.so.6:rindex) redirected to 0x4c2ce60 (rindex)
--7806-- REDIR: 0x5a3b450 (libc.so.6:__GI_strcmp) redirected to 0x4c2e590 (__GI_strcmp)
--7806-- REDIR: 0x5a3ce70 (libc.so.6:strlen) redirected to 0x4c2d510 (strlen)
--7806-- REDIR: 0x5a3d2e0 (libc.so.6:__GI_strncmp) redirected to 0x4c2dcc0 (__GI_strncmp)
--7806-- REDIR: 0x5a3b1f0 (libc.so.6:__GI_strchr) redirected to 0x4c2cfc0 (__GI_strchr)
--7806-- REDIR: 0x5a3fe80 (libc.so.6:memchr) redirected to 0x4c2e720 (memchr)
--7806-- REDIR: 0x5a479b0 (libc.so.6:strchrnul) redirected to 0x4c30df0 (strchrnul)
--7806-- REDIR: 0x5a37440 (libc.so.6:malloc) redirected to 0x4c29f20 (malloc)
--7806-- REDIR: 0x5a45a50 (libc.so.6:__GI_memcpy) redirected to 0x4c2f080 (__GI_memcpy)
--7806-- REDIR: 0x5a37b10 (libc.so.6:free) redirected to 0x4c2b190 (free)
--7806-- REDIR: 0x5a407f0 (libc.so.6:memset) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a40860 (__GI_memset         ) R-> (2021.0) 0x04c30760 memset
--7806-- REDIR: 0x5a40860 (libc.so.6:__GI_memset) redirected to 0x4c30760 (memset)
--7806-- REDIR: 0x5a3b1c0 (libc.so.6:index) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
--7806-- REDIR: 0x5a3b410 (libc.so.6:strcmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a4b720 (__strcmp_sse2_unalig) R-> (2016.0) 0x04c2e540 strcmp
--7806-- REDIR: 0x5a4b720 (libc.so.6:__strcmp_sse2_unaligned) redirected to 0x4c2e540 (strcmp)
--7806-- REDIR: 0x5a3c8a0 (libc.so.6:strcpy) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0x5a3c8e0 (libc.so.6:__GI_strcpy) redirected to 0x4c2d6c0 (__GI_strcpy)
--7806-- REDIR: 0xffffffffff600000 (???:???) redirected to 0x380c1e33 (???)
--7806-- REDIR: 0x5a3f790 (libc.so.6:__GI_strstr) redirected to 0x4c31450 (__strstr_sse2)
--7806-- REDIR: 0x5a40ea0 (libc.so.6:__GI_stpcpy) redirected to 0x4c30220 (__GI_stpcpy)
--7806-- REDIR: 0x5a37e80 (libc.so.6:calloc) redirected to 0x4c2c000 (calloc)
--7806-- Reading syms from /usr/lib/libnss_files-2.20.so
--7806--    svma 0x0000002290, avma 0x000637c290
--7806--    object doesn't have a symbol table
--7806-- REDIR: 0x5a459e0 (libc.so.6:memcpy@@GLIBC_2.14) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a4b9d0 (__memcpy_sse2_unalig) R-> (2018.0) 0x04c2ea60 memcpy@@GLIBC_2.14
--7806-- REDIR: 0x5a4b9d0 (libc.so.6:__memcpy_sse2_unaligned) redirected to 0x4c2ea60 (memcpy@@GLIBC_2.14)
--7806-- REDIR: 0x5a40210 (libc.so.6:__GI_memcmp) redirected to 0x4c30010 (__GI_memcmp)
--7806-- REDIR: 0x5a3d030 (libc.so.6:strnlen) redirected to 0x4c2d490 (strnlen)
--7806-- REDIR: 0x5a477a0 (libc.so.6:rawmemchr) redirected to 0x4c30e20 (rawmemchr)
--7806-- REDIR: 0x5a4b610 (libc.so.6:__GI_strncpy) redirected to 0x4c2d8c0 (__GI_strncpy)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0xffffffffff600400 (???:???) redirected to 0x380c1e3d (???)
--7806-- REDIR: 0x5a37bb0 (libc.so.6:realloc) redirected to 0x4c2c220 (realloc)
--7806-- REDIR: 0x5a3eb30 (libc.so.6:strncpy) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d790 strncpy
--7806-- REDIR: 0x5a3d290 (libc.so.6:strncmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
--7806-- REDIR: 0x59f1030 (libc.so.6:setenv) redirected to 0x4c31a70 (setenv)
client request: code 4d430005,  addr 0xFFEFFFACC,  len 4
client request: code 4d430005,  addr 0xFFEFFF7CC,  len 4
client request: code 4d430005,  addr 0xFFEFFF7CC,  len 4
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/newuser.so
--7806--    svma 0x0000000880, avma 0x0006587880
--7806-- Discarding syms at 0x6587880-0x6587b9a in /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/newuser.so due to munmap()
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c30a90 __GI_memmove
--7806--     new: 0x05a40610 (__GI_memmove        ) R-> (2018.1) 0x04c2e7e0 memcpy@GLIBC_2.2.5
--7806-- REDIR: 0x5a40610 (libc.so.6:__GI_memmove) redirected to 0x4c30a90 (__GI_memmove)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
client request: code 4d430005,  addr 0xFFEFFEDDC,  len 4
--7807-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7807== Ignoring duplicate redirection:
--7807--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7807--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--7807-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF5F5C,  len 4
==7807== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7807-by-pythonnut-on-???
==7807== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7807-by-pythonnut-on-???
==7807== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7807-by-pythonnut-on-???
==7807== 
==7807== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7807== don't want to do, unless you know exactly what you're doing,
==7807== or are doing some strange experiment):
==7807==   /usr/lib/valgrind/../../bin/vgdb --pid=7807 ...command...
==7807== 
==7807== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7807==   /path/to/gdb ./zsh
==7807== and then give GDB the following command
==7807==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7807
==7807== --pid is optional if only one valgrind process is running
==7807== 
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zle.so
--7806--    svma 0x0000016120, avma 0x000659d120
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
--7806-- REDIR: 0x5a3fc40 (libc.so.6:strstr) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/complete.so
--7806--    svma 0x0000008930, avma 0x00067e1930
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zutil.so
--7806--    svma 0x0000001e30, avma 0x0006a04e30
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d790 strncpy
--7806-- REDIR: 0x5a3f1d0 (libc.so.6:strspn) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a3f200 (__GI_strspn         ) R-> (2034.0) 0x04c31640 strspn
--7806-- REDIR: 0x5a3f200 (libc.so.6:__GI_strspn) redirected to 0x4c31640 (strspn)
--7806-- REDIR: 0x5a401d0 (libc.so.6:bcmp) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c30010 __GI_memcmp
--7806--     new: 0x05a40210 (__GI_memcmp         ) R-> (2019.0) 0x04c300d0 bcmp
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/parameter.so
--7806--    svma 0x0000003070, avma 0x0006c0f070
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/stat.so
--7806--    svma 0x0000001180, avma 0x0006e18180
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
--7818-- Caught __NR_exit; running __libc_freeres()
==7818== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7818-by-pythonnut-on-???
==7818== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7818-by-pythonnut-on-???
==7818== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7818-by-pythonnut-on-???
==7818== 
==7818== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7818== don't want to do, unless you know exactly what you're doing,
==7818== or are doing some strange experiment):
==7818==   /usr/lib/valgrind/../../bin/vgdb --pid=7818 ...command...
==7818== 
==7818== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7818==   /path/to/gdb ./zsh
==7818== and then give GDB the following command
==7818==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7818
==7818== --pid is optional if only one valgrind process is running
==7818== 
--7818-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7818== 
==7818== HEAP SUMMARY:
==7818==     in use at exit: 479,663 bytes in 12,406 blocks
==7818==   total heap usage: 51,306 allocs, 38,900 frees, 5,584,812 bytes allocated
==7818== 
==7818== Searching for pointers to 12,406 not-freed blocks
--7818--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7818--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7818--   Scanning root segment: 0x4022000..0x4043fff (139264)
--7818--   Scanning root segment: 0x4049000..0x404cfff (16384)
--7818--   Scanning root segment: 0x4222000..0x4222fff (4096)
--7818--   Scanning root segment: 0x4223000..0x4223fff (4096)
--7818--   Scanning root segment: 0x4224000..0x4224fff (4096)
--7818--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7818--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7818--   Scanning root segment: 0x5041000..0x5041fff (4096)
--7818--   Scanning root segment: 0x5245000..0x5245fff (4096)
--7818--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--7818--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--7818--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7818--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--7818--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7818--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7818--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7818--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7818--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7818--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7818--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7818--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7818--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7818--   Scanning root segment: 0x701a000..0x701afff (4096)
--7818--   Scanning root segment: 0xffeff8000..0xfff000fff (36864)
==7818== Checked 877,968 bytes
==7818== 
==7818== LEAK SUMMARY:
==7818==    definitely lost: 0 bytes in 0 blocks
==7818==    indirectly lost: 0 bytes in 0 blocks
==7818==      possibly lost: 0 bytes in 0 blocks
==7818==    still reachable: 479,663 bytes in 12,406 blocks
==7818==         suppressed: 0 bytes in 0 blocks
==7818== Rerun with --leak-check=full to see details of leaked memory
==7818== 
==7818== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7818== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7877== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-7877-by-pythonnut-on-???
==7877== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-7877-by-pythonnut-on-???
==7877== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-7877-by-pythonnut-on-???
==7877== 
==7877== TO CONTROL THIS PROCESS USING vgdb (which you probably
==7877== don't want to do, unless you know exactly what you're doing,
==7877== or are doing some strange experiment):
==7877==   /usr/lib/valgrind/../../bin/vgdb --pid=7877 ...command...
==7877== 
==7877== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==7877==   /path/to/gdb ./zsh
==7877== and then give GDB the following command
==7877==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=7877
==7877== --pid is optional if only one valgrind process is running
==7877== 
--7877-- Caught __NR_exit; running __libc_freeres()
--7877-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7877== 
==7877== HEAP SUMMARY:
==7877==     in use at exit: 479,997 bytes in 12,413 blocks
==7877==   total heap usage: 51,337 allocs, 38,924 frees, 5,586,425 bytes allocated
==7877== 
==7877== Searching for pointers to 12,413 not-freed blocks
--7877--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7877--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7877--   Scanning root segment: 0x4022000..0x4043fff (139264)
--7877--   Scanning root segment: 0x4049000..0x404cfff (16384)
--7877--   Scanning root segment: 0x4222000..0x4222fff (4096)
--7877--   Scanning root segment: 0x4223000..0x4223fff (4096)
--7877--   Scanning root segment: 0x4224000..0x4224fff (4096)
--7877--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7877--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7877--   Scanning root segment: 0x5041000..0x5041fff (4096)
--7877--   Scanning root segment: 0x5245000..0x5245fff (4096)
--7877--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--7877--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--7877--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7877--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--7877--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7877--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7877--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7877--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7877--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7877--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7877--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7877--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7877--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7877--   Scanning root segment: 0x701a000..0x701afff (4096)
--7877--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==7877== Checked 878,168 bytes
==7877== 
==7877== LEAK SUMMARY:
==7877==    definitely lost: 0 bytes in 0 blocks
==7877==    indirectly lost: 0 bytes in 0 blocks
==7877==      possibly lost: 0 bytes in 0 blocks
==7877==    still reachable: 479,997 bytes in 12,413 blocks
==7877==         suppressed: 0 bytes in 0 blocks
==7877== Rerun with --leak-check=full to see details of leaked memory
==7877== 
==7877== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7877== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8031-- Caught __NR_exit; running __libc_freeres()
==8031== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8031-by-pythonnut-on-???
==8031== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8031-by-pythonnut-on-???
==8031== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8031-by-pythonnut-on-???
==8031== 
==8031== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8031== don't want to do, unless you know exactly what you're doing,
==8031== or are doing some strange experiment):
==8031==   /usr/lib/valgrind/../../bin/vgdb --pid=8031 ...command...
==8031== 
==8031== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8031==   /path/to/gdb ./zsh
==8031== and then give GDB the following command
==8031==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8031
==8031== --pid is optional if only one valgrind process is running
==8031== 
--8031-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8031== 
==8031== HEAP SUMMARY:
==8031==     in use at exit: 498,989 bytes in 12,948 blocks
==8031==   total heap usage: 56,969 allocs, 44,021 frees, 6,125,903 bytes allocated
==8031== 
==8031== Searching for pointers to 12,948 not-freed blocks
--8031--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8031--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8031--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8031--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8031--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8031--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8031--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8031--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8031--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8031--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8031--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8031--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8031--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8031--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8031--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8031--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8031--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8031--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8031--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8031--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8031--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8031--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8031--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8031--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8031--   Scanning root segment: 0x701a000..0x701afff (4096)
--8031--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8031== Checked 896,056 bytes
==8031== 
==8031== LEAK SUMMARY:
==8031==    definitely lost: 0 bytes in 0 blocks
==8031==    indirectly lost: 0 bytes in 0 blocks
==8031==      possibly lost: 0 bytes in 0 blocks
==8031==    still reachable: 498,989 bytes in 12,948 blocks
==8031==         suppressed: 0 bytes in 0 blocks
==8031== Rerun with --leak-check=full to see details of leaked memory
==8031== 
==8031== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8031== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8036-- Caught __NR_exit; running __libc_freeres()
==8036== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8036-by-pythonnut-on-???
==8036== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8036-by-pythonnut-on-???
==8036== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8036-by-pythonnut-on-???
==8036== 
==8036== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8036== don't want to do, unless you know exactly what you're doing,
==8036== or are doing some strange experiment):
==8036==   /usr/lib/valgrind/../../bin/vgdb --pid=8036 ...command...
==8036== 
==8036== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8036==   /path/to/gdb ./zsh
==8036== and then give GDB the following command
==8036==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8036
==8036== --pid is optional if only one valgrind process is running
==8036== 
--8036-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8036== 
==8036== HEAP SUMMARY:
==8036==     in use at exit: 499,480 bytes in 12,963 blocks
==8036==   total heap usage: 57,118 allocs, 44,155 frees, 6,136,379 bytes allocated
==8036== 
==8036== Searching for pointers to 12,963 not-freed blocks
--8036--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8036--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8036--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8036--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8036--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8036--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8036--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8036--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8036--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8036--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8036--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8036--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8036--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8036--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8036--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8036--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8036--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8036--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8036--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8036--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8036--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8036--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8036--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8036--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8036--   Scanning root segment: 0x701a000..0x701afff (4096)
--8036--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8036== Checked 896,472 bytes
==8036== 
==8036== LEAK SUMMARY:
==8036==    definitely lost: 0 bytes in 0 blocks
==8036==    indirectly lost: 0 bytes in 0 blocks
==8036==      possibly lost: 0 bytes in 0 blocks
==8036==    still reachable: 499,480 bytes in 12,963 blocks
==8036==         suppressed: 0 bytes in 0 blocks
==8036== Rerun with --leak-check=full to see details of leaked memory
==8036== 
==8036== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8036== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8038-- Caught __NR_exit; running __libc_freeres()
==8038== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8038-by-pythonnut-on-???
==8038== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8038-by-pythonnut-on-???
==8038== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8038-by-pythonnut-on-???
==8038== 
==8038== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8038== don't want to do, unless you know exactly what you're doing,
==8038== or are doing some strange experiment):
==8038==   /usr/lib/valgrind/../../bin/vgdb --pid=8038 ...command...
==8038== 
==8038== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8038==   /path/to/gdb ./zsh
==8038== and then give GDB the following command
==8038==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8038
==8038== --pid is optional if only one valgrind process is running
==8038== 
--8038-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8038== 
==8038== HEAP SUMMARY:
==8038==     in use at exit: 500,165 bytes in 12,984 blocks
==8038==   total heap usage: 57,303 allocs, 44,319 frees, 6,152,151 bytes allocated
==8038== 
==8038== Searching for pointers to 12,984 not-freed blocks
--8038--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8038--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8038--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8038--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8038--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8038--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8038--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8038--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8038--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8038--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8038--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8038--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8038--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8038--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8038--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8038--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8038--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8038--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8038--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8038--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8038--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8038--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8038--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8038--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8038--   Scanning root segment: 0x701a000..0x701afff (4096)
--8038--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8038== Checked 897,080 bytes
==8038== 
==8038== LEAK SUMMARY:
==8038==    definitely lost: 0 bytes in 0 blocks
==8038==    indirectly lost: 0 bytes in 0 blocks
==8038==      possibly lost: 0 bytes in 0 blocks
==8038==    still reachable: 500,165 bytes in 12,984 blocks
==8038==         suppressed: 0 bytes in 0 blocks
==8038== Rerun with --leak-check=full to see details of leaked memory
==8038== 
==8038== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8038== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8049-- Caught __NR_exit; running __libc_freeres()
==8049== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8049-by-pythonnut-on-???
==8049== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8049-by-pythonnut-on-???
==8049== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8049-by-pythonnut-on-???
==8049== 
==8049== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8049== don't want to do, unless you know exactly what you're doing,
==8049== or are doing some strange experiment):
==8049==   /usr/lib/valgrind/../../bin/vgdb --pid=8049 ...command...
==8049== 
==8049== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8049==   /path/to/gdb ./zsh
==8049== and then give GDB the following command
==8049==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8049
==8049== --pid is optional if only one valgrind process is running
==8049== 
--8049-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8049== 
==8049== HEAP SUMMARY:
==8049==     in use at exit: 503,703 bytes in 13,082 blocks
==8049==   total heap usage: 58,181 allocs, 45,099 frees, 6,240,064 bytes allocated
==8049== 
==8049== Searching for pointers to 13,082 not-freed blocks
--8049--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8049--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8049--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8049--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8049--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8049--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8049--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8049--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8049--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8049--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8049--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8049--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8049--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8049--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8049--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8049--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8049--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8049--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8049--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8049--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8049--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8049--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8049--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8049--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8049--   Scanning root segment: 0x701a000..0x701afff (4096)
--8049--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8049== Checked 900,440 bytes
==8049== 
==8049== LEAK SUMMARY:
==8049==    definitely lost: 0 bytes in 0 blocks
==8049==    indirectly lost: 0 bytes in 0 blocks
==8049==      possibly lost: 0 bytes in 0 blocks
==8049==    still reachable: 503,703 bytes in 13,082 blocks
==8049==         suppressed: 0 bytes in 0 blocks
==8049== Rerun with --leak-check=full to see details of leaked memory
==8049== 
==8049== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8049== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8050-- Caught __NR_exit; running __libc_freeres()
==8050== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8050-by-pythonnut-on-???
==8050== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8050-by-pythonnut-on-???
==8050== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8050-by-pythonnut-on-???
==8050== 
==8050== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8050== don't want to do, unless you know exactly what you're doing,
==8050== or are doing some strange experiment):
==8050==   /usr/lib/valgrind/../../bin/vgdb --pid=8050 ...command...
==8050== 
==8050== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8050==   /path/to/gdb ./zsh
==8050== and then give GDB the following command
==8050==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8050
==8050== --pid is optional if only one valgrind process is running
==8050== 
--8050-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8050== 
==8050== HEAP SUMMARY:
==8050==     in use at exit: 504,109 bytes in 13,096 blocks
==8050==   total heap usage: 58,329 allocs, 45,233 frees, 6,250,460 bytes allocated
==8050== 
==8050== Searching for pointers to 13,096 not-freed blocks
--8050--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8050--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8050--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8050--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8050--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8050--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8050--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8050--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8050--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8050--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8050--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8050--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8050--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8050--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8050--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8050--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8050--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8050--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8050--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8050--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8050--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8050--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8050--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8050--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8050--   Scanning root segment: 0x701a000..0x701afff (4096)
--8050--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8050== Checked 900,784 bytes
==8050== 
==8050== LEAK SUMMARY:
==8050==    definitely lost: 0 bytes in 0 blocks
==8050==    indirectly lost: 0 bytes in 0 blocks
==8050==      possibly lost: 0 bytes in 0 blocks
==8050==    still reachable: 504,109 bytes in 13,096 blocks
==8050==         suppressed: 0 bytes in 0 blocks
==8050== Rerun with --leak-check=full to see details of leaked memory
==8050== 
==8050== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8050== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8051-- Caught __NR_exit; running __libc_freeres()
==8051== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8051-by-pythonnut-on-???
==8051== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8051-by-pythonnut-on-???
==8051== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8051-by-pythonnut-on-???
==8051== 
==8051== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8051== don't want to do, unless you know exactly what you're doing,
==8051== or are doing some strange experiment):
==8051==   /usr/lib/valgrind/../../bin/vgdb --pid=8051 ...command...
==8051== 
==8051== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8051==   /path/to/gdb ./zsh
==8051== and then give GDB the following command
==8051==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8051
==8051== --pid is optional if only one valgrind process is running
==8051== 
--8051-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8051== 
==8051== HEAP SUMMARY:
==8051==     in use at exit: 542,450 bytes in 14,039 blocks
==8051==   total heap usage: 69,083 allocs, 55,044 frees, 7,240,905 bytes allocated
==8051== 
==8051== Searching for pointers to 14,039 not-freed blocks
--8051--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8051--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8051--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8051--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8051--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8051--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8051--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8051--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8051--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8051--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8051--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8051--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8051--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8051--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8051--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8051--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8051--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8051--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8051--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8051--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8051--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8051--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8051--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8051--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8051--   Scanning root segment: 0x701a000..0x701afff (4096)
--8051--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8051== Checked 936,992 bytes
==8051== 
==8051== LEAK SUMMARY:
==8051==    definitely lost: 0 bytes in 0 blocks
==8051==    indirectly lost: 0 bytes in 0 blocks
==8051==      possibly lost: 0 bytes in 0 blocks
==8051==    still reachable: 542,450 bytes in 14,039 blocks
==8051==         suppressed: 0 bytes in 0 blocks
==8051== Rerun with --leak-check=full to see details of leaked memory
==8051== 
==8051== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8051== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8052== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8052-by-pythonnut-on-???
==8052== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8052-by-pythonnut-on-???
==8052== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8052-by-pythonnut-on-???
==8052== 
==8052== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8052== don't want to do, unless you know exactly what you're doing,
==8052== or are doing some strange experiment):
==8052==   /usr/lib/valgrind/../../bin/vgdb --pid=8052 ...command...
==8052== 
==8052== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8052==   /path/to/gdb ./zsh
==8052== and then give GDB the following command
==8052==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8052
==8052== --pid is optional if only one valgrind process is running
==8052== 
--8052-- Caught __NR_exit; running __libc_freeres()
--8052-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8052== 
==8052== HEAP SUMMARY:
==8052==     in use at exit: 542,979 bytes in 14,059 blocks
==8052==   total heap usage: 69,251 allocs, 55,192 frees, 7,251,964 bytes allocated
==8052== 
==8052== Searching for pointers to 14,059 not-freed blocks
--8052--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8052--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8052--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8052--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8052--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8052--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8052--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8052--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8052--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8052--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8052--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8052--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8052--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8052--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8052--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8052--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8052--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8052--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8052--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8052--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8052--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8052--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8052--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8052--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8052--   Scanning root segment: 0x701a000..0x701afff (4096)
--8052--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8052== Checked 937,456 bytes
==8052== 
==8052== LEAK SUMMARY:
==8052==    definitely lost: 0 bytes in 0 blocks
==8052==    indirectly lost: 0 bytes in 0 blocks
==8052==      possibly lost: 0 bytes in 0 blocks
==8052==    still reachable: 542,979 bytes in 14,059 blocks
==8052==         suppressed: 0 bytes in 0 blocks
==8052== Rerun with --leak-check=full to see details of leaked memory
==8052== 
==8052== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8052== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8053-- Caught __NR_exit; running __libc_freeres()
==8053== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8053-by-pythonnut-on-???
==8053== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8053-by-pythonnut-on-???
==8053== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8053-by-pythonnut-on-???
==8053== 
==8053== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8053== don't want to do, unless you know exactly what you're doing,
==8053== or are doing some strange experiment):
==8053==   /usr/lib/valgrind/../../bin/vgdb --pid=8053 ...command...
==8053== 
==8053== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8053==   /path/to/gdb ./zsh
==8053== and then give GDB the following command
==8053==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8053
==8053== --pid is optional if only one valgrind process is running
==8053== 
--8053-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8053== 
==8053== HEAP SUMMARY:
==8053==     in use at exit: 543,239 bytes in 14,065 blocks
==8053==   total heap usage: 69,281 allocs, 55,216 frees, 7,253,498 bytes allocated
==8053== 
==8053== Searching for pointers to 14,065 not-freed blocks
--8053--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8053--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8053--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8053--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8053--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8053--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8053--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8053--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8053--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8053--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8053--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8053--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8053--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8053--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8053--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8053--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8053--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8053--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8053--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8053--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8053--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8053--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8053--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8053--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8053--   Scanning root segment: 0x701a000..0x701afff (4096)
--8053--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8053== Checked 937,592 bytes
==8053== 
==8053== LEAK SUMMARY:
==8053==    definitely lost: 0 bytes in 0 blocks
==8053==    indirectly lost: 0 bytes in 0 blocks
==8053==      possibly lost: 0 bytes in 0 blocks
==8053==    still reachable: 543,239 bytes in 14,065 blocks
==8053==         suppressed: 0 bytes in 0 blocks
==8053== Rerun with --leak-check=full to see details of leaked memory
==8053== 
==8053== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8053== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8054== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8054-by-pythonnut-on-???
==8054== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8054-by-pythonnut-on-???
==8054== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8054-by-pythonnut-on-???
==8054== 
==8054== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8054== don't want to do, unless you know exactly what you're doing,
==8054== or are doing some strange experiment):
==8054==   /usr/lib/valgrind/../../bin/vgdb --pid=8054 ...command...
==8054== 
==8054== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8054==   /path/to/gdb ./zsh
==8054== and then give GDB the following command
==8054==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8054
==8054== --pid is optional if only one valgrind process is running
==8054== 
--8054-- Caught __NR_exit; running __libc_freeres()
--8054-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8054== 
==8054== HEAP SUMMARY:
==8054==     in use at exit: 575,564 bytes in 15,016 blocks
==8054==   total heap usage: 78,805 allocs, 63,789 frees, 8,203,968 bytes allocated
==8054== 
==8054== Searching for pointers to 15,016 not-freed blocks
--8054--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8054--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8054--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8054--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8054--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8054--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8054--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8054--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8054--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8054--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8054--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8054--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8054--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8054--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8054--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8054--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8054--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8054--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8054--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8054--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8054--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8054--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8054--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8054--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8054--   Scanning root segment: 0x701a000..0x701afff (4096)
--8054--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8054== Checked 967,848 bytes
==8054== 
==8054== LEAK SUMMARY:
==8054==    definitely lost: 0 bytes in 0 blocks
==8054==    indirectly lost: 0 bytes in 0 blocks
==8054==      possibly lost: 0 bytes in 0 blocks
==8054==    still reachable: 575,564 bytes in 15,016 blocks
==8054==         suppressed: 0 bytes in 0 blocks
==8054== Rerun with --leak-check=full to see details of leaked memory
==8054== 
==8054== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8054== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8056-- Caught __NR_exit; running __libc_freeres()
==8056== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8056-by-pythonnut-on-???
==8056== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8056-by-pythonnut-on-???
==8056== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8056-by-pythonnut-on-???
==8056== 
==8056== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8056== don't want to do, unless you know exactly what you're doing,
==8056== or are doing some strange experiment):
==8056==   /usr/lib/valgrind/../../bin/vgdb --pid=8056 ...command...
==8056== 
==8056== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8056==   /path/to/gdb ./zsh
==8056== and then give GDB the following command
==8056==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8056
==8056== --pid is optional if only one valgrind process is running
==8056== 
--8056-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8056== 
==8056== HEAP SUMMARY:
==8056==     in use at exit: 575,833 bytes in 15,022 blocks
==8056==   total heap usage: 78,835 allocs, 63,813 frees, 8,205,527 bytes allocated
==8056== 
==8056== Searching for pointers to 15,022 not-freed blocks
--8056--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8056--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8056--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8056--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8056--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8056--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8056--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8056--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8056--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8056--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8056--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8056--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8056--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8056--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8056--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8056--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8056--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8056--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8056--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8056--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8056--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8056--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8056--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8056--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8056--   Scanning root segment: 0x701a000..0x701afff (4096)
--8056--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8056== Checked 967,984 bytes
==8056== 
==8056== LEAK SUMMARY:
==8056==    definitely lost: 0 bytes in 0 blocks
==8056==    indirectly lost: 0 bytes in 0 blocks
==8056==      possibly lost: 0 bytes in 0 blocks
==8056==    still reachable: 575,833 bytes in 15,022 blocks
==8056==         suppressed: 0 bytes in 0 blocks
==8056== Rerun with --leak-check=full to see details of leaked memory
==8056== 
==8056== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8056== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8143-- Caught __NR_exit; running __libc_freeres()
==8143== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8143-by-pythonnut-on-???
==8143== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8143-by-pythonnut-on-???
==8143== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8143-by-pythonnut-on-???
==8143== 
==8143== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8143== don't want to do, unless you know exactly what you're doing,
==8143== or are doing some strange experiment):
==8143==   /usr/lib/valgrind/../../bin/vgdb --pid=8143 ...command...
==8143== 
==8143== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8143==   /path/to/gdb ./zsh
==8143== and then give GDB the following command
==8143==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8143
==8143== --pid is optional if only one valgrind process is running
==8143== 
--8143-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8143== 
==8143== HEAP SUMMARY:
==8143==     in use at exit: 627,473 bytes in 16,376 blocks
==8143==   total heap usage: 92,846 allocs, 76,470 frees, 9,597,128 bytes allocated
==8143== 
==8143== Searching for pointers to 16,376 not-freed blocks
--8143--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8143--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8143--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8143--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8143--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8143--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8143--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8143--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8143--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8143--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8143--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8143--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8143--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8143--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8143--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8143--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8143--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8143--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8143--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8143--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8143--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8143--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8143--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8143--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8143--   Scanning root segment: 0x701a000..0x701afff (4096)
--8143--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8143== Checked 1,016,464 bytes
==8143== 
==8143== LEAK SUMMARY:
==8143==    definitely lost: 0 bytes in 0 blocks
==8143==    indirectly lost: 0 bytes in 0 blocks
==8143==      possibly lost: 0 bytes in 0 blocks
==8143==    still reachable: 627,473 bytes in 16,376 blocks
==8143==         suppressed: 0 bytes in 0 blocks
==8143== Rerun with --leak-check=full to see details of leaked memory
==8143== 
==8143== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8143== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8144-- Caught __NR_exit; running __libc_freeres()
==8144== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8144-by-pythonnut-on-???
==8144== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8144-by-pythonnut-on-???
==8144== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8144-by-pythonnut-on-???
==8144== 
==8144== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8144== don't want to do, unless you know exactly what you're doing,
==8144== or are doing some strange experiment):
==8144==   /usr/lib/valgrind/../../bin/vgdb --pid=8144 ...command...
==8144== 
==8144== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8144==   /path/to/gdb ./zsh
==8144== and then give GDB the following command
==8144==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8144
==8144== --pid is optional if only one valgrind process is running
==8144== 
--8144-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8144== 
==8144== HEAP SUMMARY:
==8144==     in use at exit: 638,116 bytes in 16,696 blocks
==8144==   total heap usage: 95,969 allocs, 79,273 frees, 9,911,953 bytes allocated
==8144== 
==8144== Searching for pointers to 16,696 not-freed blocks
--8144--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8144--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8144--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8144--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8144--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8144--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8144--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8144--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8144--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8144--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8144--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8144--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8144--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8144--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8144--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8144--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8144--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8144--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8144--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8144--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8144--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8144--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8144--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8144--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8144--   Scanning root segment: 0x701a000..0x701afff (4096)
--8144--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8144== Checked 1,026,440 bytes
==8144== 
==8144== LEAK SUMMARY:
==8144==    definitely lost: 0 bytes in 0 blocks
==8144==    indirectly lost: 0 bytes in 0 blocks
==8144==      possibly lost: 0 bytes in 0 blocks
==8144==    still reachable: 638,116 bytes in 16,696 blocks
==8144==         suppressed: 0 bytes in 0 blocks
==8144== Rerun with --leak-check=full to see details of leaked memory
==8144== 
==8144== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8144== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8145== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8145-by-pythonnut-on-???
==8145== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8145-by-pythonnut-on-???
==8145== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8145-by-pythonnut-on-???
==8145== 
==8145== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8145== don't want to do, unless you know exactly what you're doing,
==8145== or are doing some strange experiment):
==8145==   /usr/lib/valgrind/../../bin/vgdb --pid=8145 ...command...
==8145== 
==8145== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8145==   /path/to/gdb ./zsh
==8145== and then give GDB the following command
==8145==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8145
==8145== --pid is optional if only one valgrind process is running
==8145== 
--8145-- Caught __NR_exit; running __libc_freeres()
--8145-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8145== 
==8145== HEAP SUMMARY:
==8145==     in use at exit: 680,981 bytes in 17,979 blocks
==8145==   total heap usage: 109,039 allocs, 91,060 frees, 11,231,634 bytes allocated
==8145== 
==8145== Searching for pointers to 17,979 not-freed blocks
--8145--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8145--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8145--   Scanning root segment: 0x4022000..0x4043fff (139264)
--8145--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8145--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8145--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8145--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8145--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8145--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8145--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8145--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8145--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8145--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8145--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8145--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8145--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8145--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8145--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8145--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8145--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8145--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8145--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8145--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8145--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8145--   Scanning root segment: 0x701a000..0x701afff (4096)
--8145--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8145== Checked 1,066,368 bytes
==8145== 
==8145== LEAK SUMMARY:
==8145==    definitely lost: 0 bytes in 0 blocks
==8145==    indirectly lost: 0 bytes in 0 blocks
==8145==      possibly lost: 0 bytes in 0 blocks
==8145==    still reachable: 680,981 bytes in 17,979 blocks
==8145==         suppressed: 0 bytes in 0 blocks
==8145== Rerun with --leak-check=full to see details of leaked memory
==8145== 
==8145== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8145== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8155== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8155-by-pythonnut-on-???
==8155== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8155-by-pythonnut-on-???
==8155== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8155-by-pythonnut-on-???
==8155== 
==8155== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8155== don't want to do, unless you know exactly what you're doing,
==8155== or are doing some strange experiment):
==8155==   /usr/lib/valgrind/../../bin/vgdb --pid=8155 ...command...
==8155== 
==8155== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8155==   /path/to/gdb ./zsh
==8155== and then give GDB the following command
==8155==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8155
==8155== --pid is optional if only one valgrind process is running
==8155== 
--8155-- Caught __NR_exit; running __libc_freeres()
--8155-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8155== 
==8155== HEAP SUMMARY:
==8155==     in use at exit: 862,691 bytes in 21,780 blocks
==8155==   total heap usage: 152,151 allocs, 130,371 frees, 16,612,056 bytes allocated
==8155== 
==8155== Searching for pointers to 21,780 not-freed blocks
--8155--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8155--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8155--   Scanning root segment: 0x4022000..0x4047fff (155648)
--8155--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8155--   Scanning root segment: 0x41d6000..0x41f9fff (147456)
--8155--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8155--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8155--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8155--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8155--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8155--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8155--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8155--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8155--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8155--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8155--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8155--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8155--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8155--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8155--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8155--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8155--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8155--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8155--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8155--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8155--   Scanning root segment: 0x701a000..0x701afff (4096)
--8155--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8155== Checked 1,398,384 bytes
==8155== 
==8155== LEAK SUMMARY:
==8155==    definitely lost: 0 bytes in 0 blocks
==8155==    indirectly lost: 0 bytes in 0 blocks
==8155==      possibly lost: 0 bytes in 0 blocks
==8155==    still reachable: 862,691 bytes in 21,780 blocks
==8155==         suppressed: 0 bytes in 0 blocks
==8155== Rerun with --leak-check=full to see details of leaked memory
==8155== 
==8155== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8155== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8157== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8157-by-pythonnut-on-???
==8157== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8157-by-pythonnut-on-???
==8157== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8157-by-pythonnut-on-???
==8157== 
==8157== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8157== don't want to do, unless you know exactly what you're doing,
==8157== or are doing some strange experiment):
==8157==   /usr/lib/valgrind/../../bin/vgdb --pid=8157 ...command...
==8157== 
==8157== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8157==   /path/to/gdb ./zsh
==8157== and then give GDB the following command
==8157==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8157
==8157== --pid is optional if only one valgrind process is running
==8157== 
--8157-- Caught __NR_exit; running __libc_freeres()
--8157-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8157== 
==8157== HEAP SUMMARY:
==8157==     in use at exit: 863,443 bytes in 21,801 blocks
==8157==   total heap usage: 153,088 allocs, 131,287 frees, 16,653,254 bytes allocated
==8157== 
==8157== Searching for pointers to 21,801 not-freed blocks
--8157--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8157--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8157--   Scanning root segment: 0x4022000..0x4047fff (155648)
--8157--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8157--   Scanning root segment: 0x41d6000..0x41fdfff (163840)
--8157--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8157--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8157--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8157--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8157--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8157--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8157--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8157--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8157--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8157--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8157--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8157--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8157--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8157--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8157--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8157--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8157--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8157--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8157--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8157--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8157--   Scanning root segment: 0x701a000..0x701afff (4096)
--8157--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8157== Checked 1,415,360 bytes
==8157== 
==8157== LEAK SUMMARY:
==8157==    definitely lost: 0 bytes in 0 blocks
==8157==    indirectly lost: 0 bytes in 0 blocks
==8157==      possibly lost: 0 bytes in 0 blocks
==8157==    still reachable: 863,443 bytes in 21,801 blocks
==8157==         suppressed: 0 bytes in 0 blocks
==8157== Rerun with --leak-check=full to see details of leaked memory
==8157== 
==8157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8158== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8158-by-pythonnut-on-???
==8158== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8158-by-pythonnut-on-???
==8158== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8158-by-pythonnut-on-???
==8158== 
==8158== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8158== don't want to do, unless you know exactly what you're doing,
==8158== or are doing some strange experiment):
==8158==   /usr/lib/valgrind/../../bin/vgdb --pid=8158 ...command...
==8158== 
==8158== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8158==   /path/to/gdb ./zsh
==8158== and then give GDB the following command
==8158==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8158
==8158== --pid is optional if only one valgrind process is running
==8158== 
--8158-- Caught __NR_exit; running __libc_freeres()
--8158-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8158== 
==8158== HEAP SUMMARY:
==8158==     in use at exit: 864,675 bytes in 21,852 blocks
==8158==   total heap usage: 153,090 allocs, 131,238 frees, 16,802,348 bytes allocated
==8158== 
==8158== Searching for pointers to 21,852 not-freed blocks
--8158--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8158--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8158--   Scanning root segment: 0x4022000..0x4047fff (155648)
--8158--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8158--   Scanning root segment: 0x41d6000..0x41fdfff (163840)
--8158--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8158--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8158--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8158--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8158--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8158--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8158--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8158--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8158--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8158--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8158--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8158--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8158--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8158--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8158--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8158--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8158--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8158--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8158--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8158--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8158--   Scanning root segment: 0x701a000..0x701afff (4096)
--8158--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8158== Checked 1,417,104 bytes
==8158== 
==8158== LEAK SUMMARY:
==8158==    definitely lost: 0 bytes in 0 blocks
==8158==    indirectly lost: 0 bytes in 0 blocks
==8158==      possibly lost: 0 bytes in 0 blocks
==8158==    still reachable: 864,675 bytes in 21,852 blocks
==8158==         suppressed: 0 bytes in 0 blocks
==8158== Rerun with --leak-check=full to see details of leaked memory
==8158== 
==8158== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8158== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8209== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8209-by-pythonnut-on-???
==8209== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8209-by-pythonnut-on-???
==8209== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8209-by-pythonnut-on-???
==8209== 
==8209== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8209== don't want to do, unless you know exactly what you're doing,
==8209== or are doing some strange experiment):
==8209==   /usr/lib/valgrind/../../bin/vgdb --pid=8209 ...command...
==8209== 
==8209== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8209==   /path/to/gdb ./zsh
==8209== and then give GDB the following command
==8209==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8209
==8209== --pid is optional if only one valgrind process is running
==8209== 
--8209-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8209== Ignoring duplicate redirection:
--8209--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8209--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--8209-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF32BC,  len 4
==8210== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8210-by-pythonnut-on-???
==8210== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8210-by-pythonnut-on-???
==8210== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8210-by-pythonnut-on-???
==8210== 
==8210== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8210== don't want to do, unless you know exactly what you're doing,
==8210== or are doing some strange experiment):
==8210==   /usr/lib/valgrind/../../bin/vgdb --pid=8210 ...command...
==8210== 
==8210== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8210==   /path/to/gdb ./zsh
==8210== and then give GDB the following command
==8210==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8210
==8210== --pid is optional if only one valgrind process is running
==8210== 
--8210-- Caught __NR_exit; running __libc_freeres()
--8210-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8210== 
==8210== HEAP SUMMARY:
==8210==     in use at exit: 879,508 bytes in 22,704 blocks
==8210==   total heap usage: 621,350 allocs, 598,646 frees, 26,661,890 bytes allocated
==8210== 
==8210== Searching for pointers to 22,704 not-freed blocks
--8210--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8210--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8210--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8210--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8210--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8210--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8210--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8210--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8210--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8210--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8210--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8210--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8210--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8210--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8210--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8210--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8210--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8210--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8210--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8210--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8210--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8210--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8210--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8210--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8210--   Scanning root segment: 0x701a000..0x701afff (4096)
--8210--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8210== Checked 1,134,104 bytes
==8210== 
==8210== LEAK SUMMARY:
==8210==    definitely lost: 0 bytes in 0 blocks
==8210==    indirectly lost: 0 bytes in 0 blocks
==8210==      possibly lost: 0 bytes in 0 blocks
==8210==    still reachable: 879,508 bytes in 22,704 blocks
==8210==         suppressed: 0 bytes in 0 blocks
==8210== Rerun with --leak-check=full to see details of leaked memory
==8210== 
==8210== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8210== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/complist.so
--7806--    svma 0x0000003850, avma 0x000a83e850
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/sched.so
--7806--    svma 0x0000000f70, avma 0x000aa4bf70
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/mathfunc.so
--7806--    svma 0x0000001fb0, avma 0x000ac4ffb0
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/terminfo.so
--7806--    svma 0x0000000e40, avma 0x000ae53e40
--8212-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8212== Ignoring duplicate redirection:
--8212--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8212--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--8212-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF30FC,  len 4
--8211-- Caught __NR_exit; running __libc_freeres()
==8211== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8211-by-pythonnut-on-???
==8211== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8211-by-pythonnut-on-???
==8211== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8211-by-pythonnut-on-???
==8211== 
==8211== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8211== don't want to do, unless you know exactly what you're doing,
==8211== or are doing some strange experiment):
==8211==   /usr/lib/valgrind/../../bin/vgdb --pid=8211 ...command...
==8211== 
==8211== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8211==   /path/to/gdb ./zsh
==8211== and then give GDB the following command
==8211==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8211
==8211== --pid is optional if only one valgrind process is running
==8211== 
--8211-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8211== 
==8211== HEAP SUMMARY:
==8211==     in use at exit: 718,129 bytes in 18,932 blocks
==8211==   total heap usage: 621,743 allocs, 602,811 frees, 26,759,404 bytes allocated
==8211== 
==8211== Searching for pointers to 18,932 not-freed blocks
--8211--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8211--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8211--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8211--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8211--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8211--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8211--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8211--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8211--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8211--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8211--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8211--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8211--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8211--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8211--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8211--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8211--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8211--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8211--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8211--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8211--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8211--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8211--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8211--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8211--   Scanning root segment: 0x701a000..0x701afff (4096)
--8211--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8211--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8211--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8211--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8211--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8211== Checked 1,005,584 bytes
==8211== 
==8211== LEAK SUMMARY:
==8211==    definitely lost: 0 bytes in 0 blocks
==8211==    indirectly lost: 0 bytes in 0 blocks
==8211==      possibly lost: 0 bytes in 0 blocks
==8211==    still reachable: 718,129 bytes in 18,932 blocks
==8211==         suppressed: 0 bytes in 0 blocks
==8211== Rerun with --leak-check=full to see details of leaked memory
==8211== 
==8211== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8211== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDD7C,  len 4
client request: code 4d430005,  addr 0xFFEFFDFDC,  len 4
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFD69C,  len 4
client request: code 4d430005,  addr 0xFFEFFD01C,  len 4
==8213== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8213-by-pythonnut-on-???
==8213== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8213-by-pythonnut-on-???
==8213== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8213-by-pythonnut-on-???
==8213== 
==8213== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8213== don't want to do, unless you know exactly what you're doing,
==8213== or are doing some strange experiment):
==8213==   /usr/lib/valgrind/../../bin/vgdb --pid=8213 ...command...
==8213== 
==8213== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8213==   /path/to/gdb ./zsh
==8213== and then give GDB the following command
==8213==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8213
==8213== --pid is optional if only one valgrind process is running
==8213== 
--8214-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==8214== Ignoring duplicate redirection:
--8214--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8214--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--8214-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
client request: code 4d430005,  addr 0xFFEFF47DC,  len 4
--8213-- Caught __NR_exit; running __libc_freeres()
--8213-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8213== 
==8213== HEAP SUMMARY:
==8213==     in use at exit: 719,784 bytes in 18,979 blocks
==8213==   total heap usage: 628,783 allocs, 609,804 frees, 27,045,303 bytes allocated
==8213== 
==8213== Searching for pointers to 18,979 not-freed blocks
--8213--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8213--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8213--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8213--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8213--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8213--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8213--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8213--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8213--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8213--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8213--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8213--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8213--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8213--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8213--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8213--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8213--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8213--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8213--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8213--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8213--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8213--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8213--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8213--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8213--   Scanning root segment: 0x701a000..0x701afff (4096)
--8213--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8213--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8213--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8213--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8213--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8213== Checked 998,600 bytes
==8213== 
==8213== LEAK SUMMARY:
==8213==    definitely lost: 208 bytes in 1 blocks
==8213==    indirectly lost: 6,756 bytes in 7 blocks
==8213==      possibly lost: 0 bytes in 0 blocks
==8213==    still reachable: 712,820 bytes in 18,971 blocks
==8213==         suppressed: 0 bytes in 0 blocks
==8213== Rerun with --leak-check=full to see details of leaked memory
==8213== 
==8213== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8213== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
--7806-- REDIR: 0x5a3afc0 (libc.so.6:strcat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
--7806-- REDIR: 0x5a3b000 (libc.so.6:__GI_strcat) redirected to 0x4c2d2a0 (__GI_strcat)
==8216== Ignoring duplicate redirection:
--8216--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--8216--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005,  addr 0xFFEFF331C,  len 4
--8215-- Caught __NR_exit; running __libc_freeres()
==8215== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8215-by-pythonnut-on-???
==8215== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8215-by-pythonnut-on-???
==8215== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8215-by-pythonnut-on-???
==8215== 
==8215== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8215== don't want to do, unless you know exactly what you're doing,
==8215== or are doing some strange experiment):
==8215==   /usr/lib/valgrind/../../bin/vgdb --pid=8215 ...command...
==8215== 
==8215== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8215==   /path/to/gdb ./zsh
==8215== and then give GDB the following command
==8215==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8215
==8215== --pid is optional if only one valgrind process is running
==8215== 
--8215-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8215== 
==8215== HEAP SUMMARY:
==8215==     in use at exit: 749,767 bytes in 19,808 blocks
==8215==   total heap usage: 631,089 allocs, 611,281 frees, 27,558,234 bytes allocated
==8215== 
==8215== Searching for pointers to 19,808 not-freed blocks
--8215--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8215--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8215--   Scanning root segment: 0x4022000..0x402bfff (40960)
--8215--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8215--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8215--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8215--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8215--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8215--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8215--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8215--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8215--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8215--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8215--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8215--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8215--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8215--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8215--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8215--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8215--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8215--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8215--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8215--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8215--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8215--   Scanning root segment: 0x701a000..0x701afff (4096)
--8215--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8215--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8215--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8215--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8215--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8215== Checked 1,044,800 bytes
==8215== 
==8215== LEAK SUMMARY:
==8215==    definitely lost: 208 bytes in 1 blocks
==8215==    indirectly lost: 6,756 bytes in 7 blocks
==8215==      possibly lost: 0 bytes in 0 blocks
==8215==    still reachable: 742,803 bytes in 19,800 blocks
==8215==         suppressed: 0 bytes in 0 blocks
==8215== Rerun with --leak-check=full to see details of leaked memory
==8215== 
==8215== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8215== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFD2FC,  len 4
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005,  addr 0xFFEFF4EDC,  len 4
==8218== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8218-by-pythonnut-on-???
==8218== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8218-by-pythonnut-on-???
==8218== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8218-by-pythonnut-on-???
==8218== 
==8218== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8218== don't want to do, unless you know exactly what you're doing,
==8218== or are doing some strange experiment):
==8218==   /usr/lib/valgrind/../../bin/vgdb --pid=8218 ...command...
==8218== 
==8218== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8218==   /path/to/gdb ./zsh
==8218== and then give GDB the following command
==8218==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8218
==8218== --pid is optional if only one valgrind process is running
==8218== 
==8219== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8219-by-pythonnut-on-???
==8219== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8219-by-pythonnut-on-???
==8219== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8219-by-pythonnut-on-???
==8219== 
==8219== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8219== don't want to do, unless you know exactly what you're doing,
==8219== or are doing some strange experiment):
==8219==   /usr/lib/valgrind/../../bin/vgdb --pid=8219 ...command...
==8219== 
==8219== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8219==   /path/to/gdb ./zsh
==8219== and then give GDB the following command
==8219==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8219
==8219== --pid is optional if only one valgrind process is running
==8219== 
--8219-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1B4C,  len 4
--8219-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8219== 
==8219== HEAP SUMMARY:
==8219==     in use at exit: 767,979 bytes in 20,157 blocks
==8219==   total heap usage: 631,898 allocs, 611,741 frees, 27,681,728 bytes allocated
==8219== 
==8219== Searching for pointers to 20,157 not-freed blocks
--8219--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8219--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8219--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8219--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8219--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8219--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8219--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8219--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8219--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8219--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8219--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8219--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8219--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8219--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8219--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8219--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8219--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8219--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8219--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8219--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8219--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8219--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8219--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8219--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8219--   Scanning root segment: 0x701a000..0x701afff (4096)
--8219--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8219--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8219--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8219--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8219--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8219== Checked 1,048,304 bytes
==8219== 
==8219== LEAK SUMMARY:
==8219==    definitely lost: 208 bytes in 1 blocks
==8219==    indirectly lost: 6,756 bytes in 7 blocks
==8219==      possibly lost: 0 bytes in 0 blocks
==8219==    still reachable: 761,015 bytes in 20,149 blocks
==8219==         suppressed: 0 bytes in 0 blocks
==8219== Rerun with --leak-check=full to see details of leaked memory
==8219== 
==8219== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8219== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8218-- Caught __NR_exit; running __libc_freeres()
--8218-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8218== 
==8218== HEAP SUMMARY:
==8218==     in use at exit: 767,915 bytes in 20,154 blocks
==8218==   total heap usage: 631,899 allocs, 611,745 frees, 27,679,296 bytes allocated
==8218== 
==8218== Searching for pointers to 20,154 not-freed blocks
--8218--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8218--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8218--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8218--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8218--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8218--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8218--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8218--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8218--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8218--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8218--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8218--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8218--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8218--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8218--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8218--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8218--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8218--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8218--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8218--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8218--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8218--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8218--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8218--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8218--   Scanning root segment: 0x701a000..0x701afff (4096)
--8218--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8218--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8218--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8218--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8218--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8218== Checked 1,047,632 bytes
==8218== 
==8218== LEAK SUMMARY:
==8218==    definitely lost: 208 bytes in 1 blocks
==8218==    indirectly lost: 6,756 bytes in 7 blocks
==8218==      possibly lost: 0 bytes in 0 blocks
==8218==    still reachable: 760,951 bytes in 20,146 blocks
==8218==         suppressed: 0 bytes in 0 blocks
==8218== Rerun with --leak-check=full to see details of leaked memory
==8218== 
==8218== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8218== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8221== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8221-by-pythonnut-on-???
==8221== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8221-by-pythonnut-on-???
==8221== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8221-by-pythonnut-on-???
==8221== 
==8221== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8221== don't want to do, unless you know exactly what you're doing,
==8221== or are doing some strange experiment):
==8221==   /usr/lib/valgrind/../../bin/vgdb --pid=8221 ...command...
==8221== 
==8221== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8221==   /path/to/gdb ./zsh
==8221== and then give GDB the following command
==8221==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8221
==8221== --pid is optional if only one valgrind process is running
==8221== 
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
--8221-- Caught __NR_exit; running __libc_freeres()
--8221-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8221== 
==8221== HEAP SUMMARY:
==8221==     in use at exit: 795,488 bytes in 20,256 blocks
==8221==   total heap usage: 633,053 allocs, 612,797 frees, 27,910,165 bytes allocated
==8221== 
==8221== Searching for pointers to 20,256 not-freed blocks
--8221--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8221--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8221--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8221--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8221--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8221--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8221--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8221--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8221--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8221--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8221--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8221--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8221--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8221--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8221--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8221--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8221--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8221--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8221--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8221--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8221--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8221--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8221--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8221--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8221--   Scanning root segment: 0x701a000..0x701afff (4096)
--8221--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8221--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8221--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8221--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8221--   Scanning root segment: 0xffeff0000..0xfff000fff (69632)
==8221== Checked 1,080,656 bytes
==8221== 
==8221== LEAK SUMMARY:
==8221==    definitely lost: 208 bytes in 1 blocks
==8221==    indirectly lost: 6,756 bytes in 7 blocks
==8221==      possibly lost: 0 bytes in 0 blocks
==8221==    still reachable: 788,524 bytes in 20,248 blocks
==8221==         suppressed: 0 bytes in 0 blocks
==8221== Rerun with --leak-check=full to see details of leaked memory
==8221== 
==8221== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8221== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF101C,  len 4
--8223-- Caught __NR_exit; running __libc_freeres()
==8223== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8223-by-pythonnut-on-???
==8223== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8223-by-pythonnut-on-???
==8223== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8223-by-pythonnut-on-???
==8223== 
==8223== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8223== don't want to do, unless you know exactly what you're doing,
==8223== or are doing some strange experiment):
==8223==   /usr/lib/valgrind/../../bin/vgdb --pid=8223 ...command...
==8223== 
==8223== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8223==   /path/to/gdb ./zsh
==8223== and then give GDB the following command
==8223==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8223
==8223== --pid is optional if only one valgrind process is running
==8223== 
--8223-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8223== 
==8223== HEAP SUMMARY:
==8223==     in use at exit: 801,704 bytes in 20,404 blocks
==8223==   total heap usage: 633,358 allocs, 612,954 frees, 27,956,293 bytes allocated
==8223== 
==8223== Searching for pointers to 20,404 not-freed blocks
--8223--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8223--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8223--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8223--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8223--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8223--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8223--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8223--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8223--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8223--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8223--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8223--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8223--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8223--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8223--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8223--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8223--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8223--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8223--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8223--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8223--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8223--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8223--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8223--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8223--   Scanning root segment: 0x701a000..0x701afff (4096)
--8223--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8223--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8223--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8223--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8223--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8223== Checked 1,081,968 bytes
==8223== 
==8223== LEAK SUMMARY:
==8223==    definitely lost: 208 bytes in 1 blocks
==8223==    indirectly lost: 6,756 bytes in 7 blocks
==8223==      possibly lost: 0 bytes in 0 blocks
==8223==    still reachable: 794,740 bytes in 20,396 blocks
==8223==         suppressed: 0 bytes in 0 blocks
==8223== Rerun with --leak-check=full to see details of leaked memory
==8223== 
==8223== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8223== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/compctl.so
--7806--    svma 0x0000004520, avma 0x000b059520
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/zleparameter.so
--7806--    svma 0x0000000c10, avma 0x000b269c10
==8224== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8224-by-pythonnut-on-???
==8224== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8224-by-pythonnut-on-???
==8224== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8224-by-pythonnut-on-???
==8224== 
==8224== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8224== don't want to do, unless you know exactly what you're doing,
==8224== or are doing some strange experiment):
==8224==   /usr/lib/valgrind/../../bin/vgdb --pid=8224 ...command...
==8224== 
==8224== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8224==   /path/to/gdb ./zsh
==8224== and then give GDB the following command
==8224==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8224
==8224== --pid is optional if only one valgrind process is running
==8224== 
--8224-- Caught __NR_exit; running __libc_freeres()
--8224-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8224== 
==8224== HEAP SUMMARY:
==8224==     in use at exit: 812,534 bytes in 20,451 blocks
==8224==   total heap usage: 633,776 allocs, 613,325 frees, 28,080,935 bytes allocated
==8224== 
==8224== Searching for pointers to 20,451 not-freed blocks
--8224--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8224--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8224--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8224--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8224--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8224--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8224--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8224--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8224--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8224--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8224--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8224--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8224--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8224--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8224--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8224--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8224--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8224--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8224--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8224--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8224--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8224--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8224--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8224--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8224--   Scanning root segment: 0x701a000..0x701afff (4096)
--8224--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8224--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8224--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8224--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8224--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8224--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8224--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8224== Checked 1,102,368 bytes
==8224== 
==8224== LEAK SUMMARY:
==8224==    definitely lost: 208 bytes in 1 blocks
==8224==    indirectly lost: 6,756 bytes in 7 blocks
==8224==      possibly lost: 0 bytes in 0 blocks
==8224==    still reachable: 805,570 bytes in 20,443 blocks
==8224==         suppressed: 0 bytes in 0 blocks
==8224== Rerun with --leak-check=full to see details of leaked memory
==8224== 
==8224== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8224== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
client request: code 4d430005,  addr 0xFFEFF211C,  len 4
--8225-- Caught __NR_exit; running __libc_freeres()
==8225== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8225-by-pythonnut-on-???
==8225== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8225-by-pythonnut-on-???
==8225== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8225-by-pythonnut-on-???
==8225== 
==8225== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8225== don't want to do, unless you know exactly what you're doing,
==8225== or are doing some strange experiment):
==8225==   /usr/lib/valgrind/../../bin/vgdb --pid=8225 ...command...
==8225== 
==8225== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8225==   /path/to/gdb ./zsh
==8225== and then give GDB the following command
==8225==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8225
==8225== --pid is optional if only one valgrind process is running
==8225== 
--8225-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8225== 
==8225== HEAP SUMMARY:
==8225==     in use at exit: 915,268 bytes in 22,030 blocks
==8225==   total heap usage: 640,170 allocs, 618,140 frees, 29,935,089 bytes allocated
==8225== 
==8225== Searching for pointers to 22,030 not-freed blocks
--8225--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8225--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8225--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8225--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8225--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8225--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8225--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8225--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8225--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8225--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8225--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8225--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8225--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8225--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8225--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8225--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8225--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8225--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8225--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8225--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8225--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8225--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8225--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8225--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8225--   Scanning root segment: 0x701a000..0x701afff (4096)
--8225--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8225--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8225--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8225--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8225--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8225--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8225--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8225== Checked 1,195,632 bytes
==8225== 
==8225== LEAK SUMMARY:
==8225==    definitely lost: 232 bytes in 2 blocks
==8225==    indirectly lost: 6,811 bytes in 10 blocks
==8225==      possibly lost: 0 bytes in 0 blocks
==8225==    still reachable: 908,225 bytes in 22,018 blocks
==8225==         suppressed: 0 bytes in 0 blocks
==8225== Rerun with --leak-check=full to see details of leaked memory
==8225== 
==8225== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8225== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8228== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8228-by-pythonnut-on-???
==8228== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8228-by-pythonnut-on-???
==8228== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8228-by-pythonnut-on-???
==8228== 
==8228== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8228== don't want to do, unless you know exactly what you're doing,
==8228== or are doing some strange experiment):
==8228==   /usr/lib/valgrind/../../bin/vgdb --pid=8228 ...command...
==8228== 
==8228== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8228==   /path/to/gdb ./zsh
==8228== and then give GDB the following command
==8228==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8228
==8228== --pid is optional if only one valgrind process is running
==8228== 
client request: code 4d430005,  addr 0xFFEFF211C,  len 4
==8227== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8227-by-pythonnut-on-???
==8227== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8227-by-pythonnut-on-???
==8227== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8227-by-pythonnut-on-???
==8227== 
==8227== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8227== don't want to do, unless you know exactly what you're doing,
==8227== or are doing some strange experiment):
==8227==   /usr/lib/valgrind/../../bin/vgdb --pid=8227 ...command...
==8227== 
==8227== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8227==   /path/to/gdb ./zsh
==8227== and then give GDB the following command
==8227==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8227
==8227== --pid is optional if only one valgrind process is running
==8227== 
--8227-- Caught __NR_exit; running __libc_freeres()
--8227-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8227== 
==8227== HEAP SUMMARY:
==8227==     in use at exit: 916,266 bytes in 22,042 blocks
==8227==   total heap usage: 640,230 allocs, 618,188 frees, 29,947,079 bytes allocated
==8227== 
==8227== Searching for pointers to 22,042 not-freed blocks
--8227--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8227--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8227--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8227--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8227--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8227--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8227--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8227--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8227--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8227--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8227--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8227--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8227--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8227--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8227--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8227--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8227--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8227--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8227--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8227--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8227--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8227--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8227--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8227--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8227--   Scanning root segment: 0x701a000..0x701afff (4096)
--8227--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8227--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8227--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8227--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8227--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8227--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8227--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8227== Checked 1,196,536 bytes
==8227== 
==8227== LEAK SUMMARY:
==8227==    definitely lost: 247 bytes in 3 blocks
==8227==    indirectly lost: 6,811 bytes in 10 blocks
==8227==      possibly lost: 0 bytes in 0 blocks
==8227==    still reachable: 909,208 bytes in 22,029 blocks
==8227==         suppressed: 0 bytes in 0 blocks
==8227== Rerun with --leak-check=full to see details of leaked memory
==8227== 
==8227== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8227== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8230== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8230-by-pythonnut-on-???
==8230== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8230-by-pythonnut-on-???
==8230== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8230-by-pythonnut-on-???
==8230== 
==8230== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8230== don't want to do, unless you know exactly what you're doing,
==8230== or are doing some strange experiment):
==8230==   /usr/lib/valgrind/../../bin/vgdb --pid=8230 ...command...
==8230== 
==8230== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8230==   /path/to/gdb ./zsh
==8230== and then give GDB the following command
==8230==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8230
==8230== --pid is optional if only one valgrind process is running
==8230== 
client request: code 4d430005,  addr 0xFFEFF211C,  len 4
--8229-- Caught __NR_exit; running __libc_freeres()
==8229== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8229-by-pythonnut-on-???
==8229== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8229-by-pythonnut-on-???
==8229== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8229-by-pythonnut-on-???
==8229== 
==8229== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8229== don't want to do, unless you know exactly what you're doing,
==8229== or are doing some strange experiment):
==8229==   /usr/lib/valgrind/../../bin/vgdb --pid=8229 ...command...
==8229== 
==8229== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8229==   /path/to/gdb ./zsh
==8229== and then give GDB the following command
==8229==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8229
==8229== --pid is optional if only one valgrind process is running
==8229== 
--8229-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8229== 
==8229== HEAP SUMMARY:
==8229==     in use at exit: 917,159 bytes in 22,053 blocks
==8229==   total heap usage: 640,290 allocs, 618,237 frees, 29,959,130 bytes allocated
==8229== 
==8229== Searching for pointers to 22,053 not-freed blocks
--8229--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8229--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8229--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8229--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8229--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8229--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8229--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8229--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8229--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8229--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8229--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8229--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8229--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8229--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8229--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8229--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8229--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8229--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8229--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8229--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8229--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8229--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8229--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8229--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8229--   Scanning root segment: 0x701a000..0x701afff (4096)
--8229--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8229--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8229--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8229--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8229--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8229--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8229--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8229== Checked 1,197,368 bytes
==8229== 
==8229== LEAK SUMMARY:
==8229==    definitely lost: 262 bytes in 4 blocks
==8229==    indirectly lost: 6,811 bytes in 10 blocks
==8229==      possibly lost: 0 bytes in 0 blocks
==8229==    still reachable: 910,086 bytes in 22,039 blocks
==8229==         suppressed: 0 bytes in 0 blocks
==8229== Rerun with --leak-check=full to see details of leaked memory
==8229== 
==8229== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8229== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8232== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8232-by-pythonnut-on-???
==8232== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8232-by-pythonnut-on-???
==8232== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8232-by-pythonnut-on-???
==8232== 
==8232== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8232== don't want to do, unless you know exactly what you're doing,
==8232== or are doing some strange experiment):
==8232==   /usr/lib/valgrind/../../bin/vgdb --pid=8232 ...command...
==8232== 
==8232== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8232==   /path/to/gdb ./zsh
==8232== and then give GDB the following command
==8232==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8232
==8232== --pid is optional if only one valgrind process is running
==8232== 
client request: code 4d430005,  addr 0xFFEFF2C1C,  len 4
--8231-- Caught __NR_exit; running __libc_freeres()
==8231== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8231-by-pythonnut-on-???
==8231== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8231-by-pythonnut-on-???
==8231== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8231-by-pythonnut-on-???
==8231== 
==8231== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8231== don't want to do, unless you know exactly what you're doing,
==8231== or are doing some strange experiment):
==8231==   /usr/lib/valgrind/../../bin/vgdb --pid=8231 ...command...
==8231== 
==8231== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8231==   /path/to/gdb ./zsh
==8231== and then give GDB the following command
==8231==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8231
==8231== --pid is optional if only one valgrind process is running
==8231== 
--8231-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8231== 
==8231== HEAP SUMMARY:
==8231==     in use at exit: 928,525 bytes in 22,140 blocks
==8231==   total heap usage: 640,572 allocs, 618,432 frees, 30,014,567 bytes allocated
==8231== 
==8231== Searching for pointers to 22,140 not-freed blocks
--8231--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8231--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8231--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8231--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8231--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8231--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8231--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8231--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8231--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8231--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8231--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8231--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8231--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8231--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8231--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8231--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8231--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8231--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8231--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8231--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8231--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8231--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8231--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8231--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8231--   Scanning root segment: 0x701a000..0x701afff (4096)
--8231--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8231--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8231--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8231--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8231--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8231--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8231--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8231== Checked 1,207,704 bytes
==8231== 
==8231== LEAK SUMMARY:
==8231==    definitely lost: 253 bytes in 4 blocks
==8231==    indirectly lost: 6,756 bytes in 7 blocks
==8231==      possibly lost: 0 bytes in 0 blocks
==8231==    still reachable: 921,516 bytes in 22,129 blocks
==8231==         suppressed: 0 bytes in 0 blocks
==8231== Rerun with --leak-check=full to see details of leaked memory
==8231== 
==8231== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8231== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8234== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8234-by-pythonnut-on-???
==8234== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8234-by-pythonnut-on-???
==8234== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8234-by-pythonnut-on-???
==8234== 
==8234== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8234== don't want to do, unless you know exactly what you're doing,
==8234== or are doing some strange experiment):
==8234==   /usr/lib/valgrind/../../bin/vgdb --pid=8234 ...command...
==8234== 
==8234== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8234==   /path/to/gdb ./zsh
==8234== and then give GDB the following command
==8234==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8234
==8234== --pid is optional if only one valgrind process is running
==8234== 
client request: code 4d430005,  addr 0xFFEFF2C1C,  len 4
==8233== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8233-by-pythonnut-on-???
==8233== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8233-by-pythonnut-on-???
==8233== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8233-by-pythonnut-on-???
==8233== 
==8233== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8233== don't want to do, unless you know exactly what you're doing,
==8233== or are doing some strange experiment):
==8233==   /usr/lib/valgrind/../../bin/vgdb --pid=8233 ...command...
==8233== 
==8233== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8233==   /path/to/gdb ./zsh
==8233== and then give GDB the following command
==8233==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8233
==8233== --pid is optional if only one valgrind process is running
==8233== 
--8233-- Caught __NR_exit; running __libc_freeres()
--8233-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8233== 
==8233== HEAP SUMMARY:
==8233==     in use at exit: 962,024 bytes in 22,425 blocks
==8233==   total heap usage: 641,708 allocs, 619,283 frees, 30,204,805 bytes allocated
==8233== 
==8233== Searching for pointers to 22,425 not-freed blocks
--8233--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8233--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8233--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8233--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8233--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8233--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8233--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8233--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8233--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8233--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8233--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8233--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8233--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8233--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8233--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8233--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8233--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8233--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8233--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8233--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8233--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8233--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8233--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8233--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8233--   Scanning root segment: 0x701a000..0x701afff (4096)
--8233--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8233--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8233--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8233--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8233--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8233--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8233--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8233== Checked 1,240,176 bytes
==8233== 
==8233== LEAK SUMMARY:
==8233==    definitely lost: 253 bytes in 4 blocks
==8233==    indirectly lost: 6,756 bytes in 7 blocks
==8233==      possibly lost: 0 bytes in 0 blocks
==8233==    still reachable: 955,015 bytes in 22,414 blocks
==8233==         suppressed: 0 bytes in 0 blocks
==8233== Rerun with --leak-check=full to see details of leaked memory
==8233== 
==8233== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8233== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8236== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8236-by-pythonnut-on-???
==8236== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8236-by-pythonnut-on-???
==8236== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8236-by-pythonnut-on-???
==8236== 
==8236== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8236== don't want to do, unless you know exactly what you're doing,
==8236== or are doing some strange experiment):
==8236==   /usr/lib/valgrind/../../bin/vgdb --pid=8236 ...command...
==8236== 
==8236== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8236==   /path/to/gdb ./zsh
==8236== and then give GDB the following command
==8236==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8236
==8236== --pid is optional if only one valgrind process is running
==8236== 
client request: code 4d430005,  addr 0xFFEFF2C1C,  len 4
==8235== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8235-by-pythonnut-on-???
==8235== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8235-by-pythonnut-on-???
==8235== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8235-by-pythonnut-on-???
==8235== 
==8235== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8235== don't want to do, unless you know exactly what you're doing,
==8235== or are doing some strange experiment):
==8235==   /usr/lib/valgrind/../../bin/vgdb --pid=8235 ...command...
==8235== 
==8235== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8235==   /path/to/gdb ./zsh
==8235== and then give GDB the following command
==8235==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8235
==8235== --pid is optional if only one valgrind process is running
==8235== 
--8235-- Caught __NR_exit; running __libc_freeres()
--8235-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8235== 
==8235== HEAP SUMMARY:
==8235==     in use at exit: 962,495 bytes in 22,430 blocks
==8235==   total heap usage: 641,757 allocs, 619,327 frees, 30,213,406 bytes allocated
==8235== 
==8235== Searching for pointers to 22,430 not-freed blocks
--8235--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8235--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8235--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8235--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8235--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8235--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8235--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8235--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8235--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8235--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8235--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8235--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8235--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8235--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8235--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8235--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8235--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8235--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8235--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8235--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8235--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8235--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8235--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8235--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8235--   Scanning root segment: 0x701a000..0x701afff (4096)
--8235--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8235--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8235--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8235--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8235--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8235--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8235--   Scanning root segment: 0xffeff7000..0xfff000fff (40960)
==8235== Checked 1,240,608 bytes
==8235== 
==8235== LEAK SUMMARY:
==8235==    definitely lost: 253 bytes in 4 blocks
==8235==    indirectly lost: 6,756 bytes in 7 blocks
==8235==      possibly lost: 0 bytes in 0 blocks
==8235==    still reachable: 955,486 bytes in 22,419 blocks
==8235==         suppressed: 0 bytes in 0 blocks
==8235== Rerun with --leak-check=full to see details of leaked memory
==8235== 
==8235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8237-- Caught __NR_exit; running __libc_freeres()
==8237== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8237-by-pythonnut-on-???
==8237== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8237-by-pythonnut-on-???
==8237== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8237-by-pythonnut-on-???
==8237== 
==8237== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8237== don't want to do, unless you know exactly what you're doing,
==8237== or are doing some strange experiment):
==8237==   /usr/lib/valgrind/../../bin/vgdb --pid=8237 ...command...
==8237== 
==8237== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8237==   /path/to/gdb ./zsh
==8237== and then give GDB the following command
==8237==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8237
==8237== --pid is optional if only one valgrind process is running
==8237== 
--8237-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8237== 
==8237== HEAP SUMMARY:
==8237==     in use at exit: 1,020,245 bytes in 23,340 blocks
==8237==   total heap usage: 645,597 allocs, 622,257 frees, 30,544,478 bytes allocated
==8237== 
==8237== Searching for pointers to 23,340 not-freed blocks
--8237--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8237--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8237--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8237--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8237--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8237--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8237--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8237--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8237--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8237--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8237--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8237--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8237--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8237--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8237--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8237--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8237--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8237--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8237--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8237--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8237--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8237--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8237--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8237--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8237--   Scanning root segment: 0x701a000..0x701afff (4096)
--8237--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8237--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8237--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8237--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8237--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8237--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8237--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8237== Checked 1,302,272 bytes
==8237== 
==8237== LEAK SUMMARY:
==8237==    definitely lost: 253 bytes in 4 blocks
==8237==    indirectly lost: 6,756 bytes in 7 blocks
==8237==      possibly lost: 0 bytes in 0 blocks
==8237==    still reachable: 1,013,236 bytes in 23,329 blocks
==8237==         suppressed: 0 bytes in 0 blocks
==8237== Rerun with --leak-check=full to see details of leaked memory
==8237== 
==8237== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8237== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8238== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8238-by-pythonnut-on-???
==8238== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8238-by-pythonnut-on-???
==8238== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8238-by-pythonnut-on-???
==8238== 
==8238== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8238== don't want to do, unless you know exactly what you're doing,
==8238== or are doing some strange experiment):
==8238==   /usr/lib/valgrind/../../bin/vgdb --pid=8238 ...command...
==8238== 
==8238== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8238==   /path/to/gdb ./zsh
==8238== and then give GDB the following command
==8238==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8238
==8238== --pid is optional if only one valgrind process is running
==8238== 
--8238-- Caught __NR_exit; running __libc_freeres()
--8238-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8238== 
==8238== HEAP SUMMARY:
==8238==     in use at exit: 1,020,615 bytes in 23,345 blocks
==8238==   total heap usage: 645,622 allocs, 622,277 frees, 30,550,850 bytes allocated
==8238== 
==8238== Searching for pointers to 23,345 not-freed blocks
--8238--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8238--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8238--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8238--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8238--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8238--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8238--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8238--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8238--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8238--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8238--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8238--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8238--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8238--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8238--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8238--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8238--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8238--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8238--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8238--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8238--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8238--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8238--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8238--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8238--   Scanning root segment: 0x701a000..0x701afff (4096)
--8238--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8238--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8238--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8238--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8238--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8238--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8238--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8238== Checked 1,302,624 bytes
==8238== 
==8238== LEAK SUMMARY:
==8238==    definitely lost: 253 bytes in 4 blocks
==8238==    indirectly lost: 6,756 bytes in 7 blocks
==8238==      possibly lost: 0 bytes in 0 blocks
==8238==    still reachable: 1,013,606 bytes in 23,334 blocks
==8238==         suppressed: 0 bytes in 0 blocks
==8238== Rerun with --leak-check=full to see details of leaked memory
==8238== 
==8238== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8238== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8239-- Caught __NR_exit; running __libc_freeres()
==8239== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8239-by-pythonnut-on-???
==8239== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8239-by-pythonnut-on-???
==8239== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8239-by-pythonnut-on-???
==8239== 
==8239== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8239== don't want to do, unless you know exactly what you're doing,
==8239== or are doing some strange experiment):
==8239==   /usr/lib/valgrind/../../bin/vgdb --pid=8239 ...command...
==8239== 
==8239== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8239==   /path/to/gdb ./zsh
==8239== and then give GDB the following command
==8239==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8239
==8239== --pid is optional if only one valgrind process is running
==8239== 
--8239-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8239== 
==8239== HEAP SUMMARY:
==8239==     in use at exit: 1,021,010 bytes in 23,350 blocks
==8239==   total heap usage: 645,647 allocs, 622,297 frees, 30,557,329 bytes allocated
==8239== 
==8239== Searching for pointers to 23,350 not-freed blocks
--8239--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8239--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8239--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8239--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8239--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8239--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8239--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8239--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8239--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8239--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8239--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8239--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8239--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8239--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8239--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8239--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8239--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8239--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8239--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8239--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8239--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8239--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8239--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8239--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8239--   Scanning root segment: 0x701a000..0x701afff (4096)
--8239--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8239--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8239--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8239--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8239--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8239--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8239--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8239== Checked 1,302,160 bytes
==8239== 
==8239== LEAK SUMMARY:
==8239==    definitely lost: 253 bytes in 4 blocks
==8239==    indirectly lost: 6,756 bytes in 7 blocks
==8239==      possibly lost: 0 bytes in 0 blocks
==8239==    still reachable: 1,014,001 bytes in 23,339 blocks
==8239==         suppressed: 0 bytes in 0 blocks
==8239== Rerun with --leak-check=full to see details of leaked memory
==8239== 
==8239== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8239== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8240-- Caught __NR_exit; running __libc_freeres()
==8240== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8240-by-pythonnut-on-???
==8240== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8240-by-pythonnut-on-???
==8240== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8240-by-pythonnut-on-???
==8240== 
==8240== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8240== don't want to do, unless you know exactly what you're doing,
==8240== or are doing some strange experiment):
==8240==   /usr/lib/valgrind/../../bin/vgdb --pid=8240 ...command...
==8240== 
==8240== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8240==   /path/to/gdb ./zsh
==8240== and then give GDB the following command
==8240==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8240
==8240== --pid is optional if only one valgrind process is running
==8240== 
--8240-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8240== 
==8240== HEAP SUMMARY:
==8240==     in use at exit: 1,021,390 bytes in 23,355 blocks
==8240==   total heap usage: 645,672 allocs, 622,317 frees, 30,563,757 bytes allocated
==8240== 
==8240== Searching for pointers to 23,355 not-freed blocks
--8240--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8240--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8240--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8240--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8240--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8240--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8240--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8240--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8240--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8240--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8240--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8240--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8240--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8240--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8240--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8240--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8240--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8240--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8240--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8240--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8240--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8240--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8240--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8240--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8240--   Scanning root segment: 0x701a000..0x701afff (4096)
--8240--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8240--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8240--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8240--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8240--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8240--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8240--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8240== Checked 1,302,520 bytes
==8240== 
==8240== LEAK SUMMARY:
==8240==    definitely lost: 253 bytes in 4 blocks
==8240==    indirectly lost: 6,756 bytes in 7 blocks
==8240==      possibly lost: 0 bytes in 0 blocks
==8240==    still reachable: 1,014,381 bytes in 23,344 blocks
==8240==         suppressed: 0 bytes in 0 blocks
==8240== Rerun with --leak-check=full to see details of leaked memory
==8240== 
==8240== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8240== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8241-- Caught __NR_exit; running __libc_freeres()
==8241== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8241-by-pythonnut-on-???
==8241== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8241-by-pythonnut-on-???
==8241== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8241-by-pythonnut-on-???
==8241== 
==8241== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8241== don't want to do, unless you know exactly what you're doing,
==8241== or are doing some strange experiment):
==8241==   /usr/lib/valgrind/../../bin/vgdb --pid=8241 ...command...
==8241== 
==8241== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8241==   /path/to/gdb ./zsh
==8241== and then give GDB the following command
==8241==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8241
==8241== --pid is optional if only one valgrind process is running
==8241== 
--8241-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8241== 
==8241== HEAP SUMMARY:
==8241==     in use at exit: 1,021,749 bytes in 23,360 blocks
==8241==   total heap usage: 645,697 allocs, 622,337 frees, 30,570,114 bytes allocated
==8241== 
==8241== Searching for pointers to 23,360 not-freed blocks
--8241--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8241--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8241--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8241--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8241--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8241--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8241--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8241--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8241--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8241--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8241--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8241--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8241--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8241--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8241--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8241--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8241--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8241--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8241--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8241--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8241--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8241--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8241--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8241--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8241--   Scanning root segment: 0x701a000..0x701afff (4096)
--8241--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8241--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8241--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8241--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8241--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8241--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8241--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8241== Checked 1,302,864 bytes
==8241== 
==8241== LEAK SUMMARY:
==8241==    definitely lost: 253 bytes in 4 blocks
==8241==    indirectly lost: 6,756 bytes in 7 blocks
==8241==      possibly lost: 0 bytes in 0 blocks
==8241==    still reachable: 1,014,740 bytes in 23,349 blocks
==8241==         suppressed: 0 bytes in 0 blocks
==8241== Rerun with --leak-check=full to see details of leaked memory
==8241== 
==8241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8242-- Caught __NR_exit; running __libc_freeres()
==8242== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8242-by-pythonnut-on-???
==8242== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8242-by-pythonnut-on-???
==8242== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8242-by-pythonnut-on-???
==8242== 
==8242== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8242== don't want to do, unless you know exactly what you're doing,
==8242== or are doing some strange experiment):
==8242==   /usr/lib/valgrind/../../bin/vgdb --pid=8242 ...command...
==8242== 
==8242== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8242==   /path/to/gdb ./zsh
==8242== and then give GDB the following command
==8242==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8242
==8242== --pid is optional if only one valgrind process is running
==8242== 
--8242-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8242== 
==8242== HEAP SUMMARY:
==8242==     in use at exit: 1,022,120 bytes in 23,365 blocks
==8242==   total heap usage: 645,722 allocs, 622,357 frees, 30,576,527 bytes allocated
==8242== 
==8242== Searching for pointers to 23,365 not-freed blocks
--8242--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8242--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8242--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8242--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8242--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8242--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8242--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8242--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8242--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8242--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8242--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8242--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8242--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8242--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8242--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8242--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8242--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8242--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8242--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8242--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8242--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8242--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8242--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8242--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8242--   Scanning root segment: 0x701a000..0x701afff (4096)
--8242--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8242--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8242--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8242--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8242--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8242--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8242--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8242== Checked 1,303,216 bytes
==8242== 
==8242== LEAK SUMMARY:
==8242==    definitely lost: 253 bytes in 4 blocks
==8242==    indirectly lost: 6,756 bytes in 7 blocks
==8242==      possibly lost: 0 bytes in 0 blocks
==8242==    still reachable: 1,015,111 bytes in 23,354 blocks
==8242==         suppressed: 0 bytes in 0 blocks
==8242== Rerun with --leak-check=full to see details of leaked memory
==8242== 
==8242== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8242== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8243== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8243-by-pythonnut-on-???
==8243== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8243-by-pythonnut-on-???
==8243== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8243-by-pythonnut-on-???
==8243== 
==8243== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8243== don't want to do, unless you know exactly what you're doing,
==8243== or are doing some strange experiment):
==8243==   /usr/lib/valgrind/../../bin/vgdb --pid=8243 ...command...
==8243== 
==8243== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8243==   /path/to/gdb ./zsh
==8243== and then give GDB the following command
==8243==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8243
==8243== --pid is optional if only one valgrind process is running
==8243== 
--8243-- Caught __NR_exit; running __libc_freeres()
--8243-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8243== 
==8243== HEAP SUMMARY:
==8243==     in use at exit: 1,022,475 bytes in 23,370 blocks
==8243==   total heap usage: 645,747 allocs, 622,377 frees, 30,582,880 bytes allocated
==8243== 
==8243== Searching for pointers to 23,370 not-freed blocks
--8243--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8243--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8243--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8243--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8243--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8243--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8243--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8243--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8243--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8243--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8243--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8243--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8243--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8243--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8243--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8243--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8243--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8243--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8243--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8243--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8243--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8243--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8243--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8243--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8243--   Scanning root segment: 0x701a000..0x701afff (4096)
--8243--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8243--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8243--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8243--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8243--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8243--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8243--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8243== Checked 1,303,552 bytes
==8243== 
==8243== LEAK SUMMARY:
==8243==    definitely lost: 253 bytes in 4 blocks
==8243==    indirectly lost: 6,756 bytes in 7 blocks
==8243==      possibly lost: 0 bytes in 0 blocks
==8243==    still reachable: 1,015,466 bytes in 23,359 blocks
==8243==         suppressed: 0 bytes in 0 blocks
==8243== Rerun with --leak-check=full to see details of leaked memory
==8243== 
==8243== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8243== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8244== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8244-by-pythonnut-on-???
==8244== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8244-by-pythonnut-on-???
==8244== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8244-by-pythonnut-on-???
==8244== 
==8244== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8244== don't want to do, unless you know exactly what you're doing,
==8244== or are doing some strange experiment):
==8244==   /usr/lib/valgrind/../../bin/vgdb --pid=8244 ...command...
==8244== 
==8244== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8244==   /path/to/gdb ./zsh
==8244== and then give GDB the following command
==8244==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8244
==8244== --pid is optional if only one valgrind process is running
==8244== 
--8244-- Caught __NR_exit; running __libc_freeres()
--8244-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8244== 
==8244== HEAP SUMMARY:
==8244==     in use at exit: 1,022,829 bytes in 23,375 blocks
==8244==   total heap usage: 645,772 allocs, 622,397 frees, 30,589,236 bytes allocated
==8244== 
==8244== Searching for pointers to 23,375 not-freed blocks
--8244--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8244--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8244--   Scanning root segment: 0x4022000..0x4028fff (28672)
--8244--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8244--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8244--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8244--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8244--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8244--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8244--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8244--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8244--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8244--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8244--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8244--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8244--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8244--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8244--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8244--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8244--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8244--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8244--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8244--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8244--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8244--   Scanning root segment: 0x701a000..0x701afff (4096)
--8244--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8244--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8244--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8244--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8244--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8244--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8244--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8244== Checked 1,303,888 bytes
==8244== 
==8244== LEAK SUMMARY:
==8244==    definitely lost: 253 bytes in 4 blocks
==8244==    indirectly lost: 6,756 bytes in 7 blocks
==8244==      possibly lost: 0 bytes in 0 blocks
==8244==    still reachable: 1,015,820 bytes in 23,364 blocks
==8244==         suppressed: 0 bytes in 0 blocks
==8244== Rerun with --leak-check=full to see details of leaked memory
==8244== 
==8244== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8244== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8245== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8245-by-pythonnut-on-???
==8245== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8245-by-pythonnut-on-???
==8245== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8245-by-pythonnut-on-???
==8245== 
==8245== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8245== don't want to do, unless you know exactly what you're doing,
==8245== or are doing some strange experiment):
==8245==   /usr/lib/valgrind/../../bin/vgdb --pid=8245 ...command...
==8245== 
==8245== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8245==   /path/to/gdb ./zsh
==8245== and then give GDB the following command
==8245==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8245
==8245== --pid is optional if only one valgrind process is running
==8245== 
--8245-- Caught __NR_exit; running __libc_freeres()
--8245-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8245== 
==8245== HEAP SUMMARY:
==8245==     in use at exit: 1,022,166 bytes in 23,346 blocks
==8245==   total heap usage: 645,880 allocs, 622,534 frees, 30,596,379 bytes allocated
==8245== 
==8245== Searching for pointers to 23,346 not-freed blocks
--8245--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8245--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8245--   Scanning root segment: 0x4022000..0x402cfff (45056)
--8245--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8245--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8245--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8245--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8245--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8245--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8245--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8245--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8245--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8245--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8245--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8245--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8245--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8245--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8245--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8245--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8245--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8245--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8245--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8245--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8245--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8245--   Scanning root segment: 0x701a000..0x701afff (4096)
--8245--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8245--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8245--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8245--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8245--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8245--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8245--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8245== Checked 1,317,568 bytes
==8245== 
==8245== LEAK SUMMARY:
==8245==    definitely lost: 253 bytes in 4 blocks
==8245==    indirectly lost: 6,756 bytes in 7 blocks
==8245==      possibly lost: 0 bytes in 0 blocks
==8245==    still reachable: 1,015,157 bytes in 23,335 blocks
==8245==         suppressed: 0 bytes in 0 blocks
==8245== Rerun with --leak-check=full to see details of leaked memory
==8245== 
==8245== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8245== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
--8246-- Caught __NR_exit; running __libc_freeres()
==8246== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8246-by-pythonnut-on-???
==8246== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8246-by-pythonnut-on-???
==8246== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8246-by-pythonnut-on-???
==8246== 
==8246== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8246== don't want to do, unless you know exactly what you're doing,
==8246== or are doing some strange experiment):
==8246==   /usr/lib/valgrind/../../bin/vgdb --pid=8246 ...command...
==8246== 
==8246== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8246==   /path/to/gdb ./zsh
==8246== and then give GDB the following command
==8246==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8246
==8246== --pid is optional if only one valgrind process is running
==8246== 
--8246-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8246== 
==8246== HEAP SUMMARY:
==8246==     in use at exit: 1,022,143 bytes in 23,346 blocks
==8246==   total heap usage: 645,835 allocs, 622,489 frees, 30,597,901 bytes allocated
==8246== 
==8246== Searching for pointers to 23,346 not-freed blocks
--8246--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8246--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8246--   Scanning root segment: 0x4022000..0x402cfff (45056)
--8246--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8246--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8246--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8246--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8246--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8246--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8246--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8246--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8246--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8246--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8246--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8246--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8246--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8246--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8246--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8246--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8246--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8246--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8246--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8246--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8246--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8246--   Scanning root segment: 0x701a000..0x701afff (4096)
--8246--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8246--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8246--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8246--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8246--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8246--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8246--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8246== Checked 1,317,576 bytes
==8246== 
==8246== LEAK SUMMARY:
==8246==    definitely lost: 253 bytes in 4 blocks
==8246==    indirectly lost: 6,756 bytes in 7 blocks
==8246==      possibly lost: 0 bytes in 0 blocks
==8246==    still reachable: 1,015,134 bytes in 23,335 blocks
==8246==         suppressed: 0 bytes in 0 blocks
==8246== Rerun with --leak-check=full to see details of leaked memory
==8246== 
==8246== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==8246== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
client request: code 4d430100,  addr 0x4C31E1E,  len 67288356
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806==    by 0x488CD0: stringsubst (subst.c:301)
==7806==    by 0x48801B: prefork (subst.c:77)
==7806==    by 0x42B318: execcmd (exec.c:2619)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x427756: execlist (exec.c:1267)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x4302FB: execshfunc (exec.c:4557)
==7806==    by 0x42D8C1: execcmd (exec.c:3373)
==7806== 
==8247== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8247-by-pythonnut-on-???
==8247== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8247-by-pythonnut-on-???
==8247== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8247-by-pythonnut-on-???
==8247== 
==8247== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8247== don't want to do, unless you know exactly what you're doing,
==8247== or are doing some strange experiment):
==8247==   /usr/lib/valgrind/../../bin/vgdb --pid=8247 ...command...
==8247== 
==8247== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8247==   /path/to/gdb ./zsh
==8247== and then give GDB the following command
==8247==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8247
==8247== --pid is optional if only one valgrind process is running
==8247== 
--8247-- Caught __NR_exit; running __libc_freeres()
--8247-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8247== 
==8247== HEAP SUMMARY:
==8247==     in use at exit: 1,049,587 bytes in 23,943 blocks
==8247==   total heap usage: 648,207 allocs, 624,264 frees, 30,758,770 bytes allocated
==8247== 
==8247== Searching for pointers to 23,943 not-freed blocks
--8247--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8247--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8247--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8247--   Scanning root segment: 0x402a000..0x402efff (20480)
--8247--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8247--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8247--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8247--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8247--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8247--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8247--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8247--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8247--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8247--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8247--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8247--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8247--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8247--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8247--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8247--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8247--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8247--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8247--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8247--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8247--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8247--   Scanning root segment: 0x701a000..0x701afff (4096)
--8247--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8247--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8247--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8247--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8247--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8247--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8247--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8247== Checked 1,339,768 bytes
==8247== 
==8247== LEAK SUMMARY:
==8247==    definitely lost: 253 bytes in 4 blocks
==8247==    indirectly lost: 6,756 bytes in 7 blocks
==8247==      possibly lost: 0 bytes in 0 blocks
==8247==    still reachable: 1,042,578 bytes in 23,932 blocks
==8247==         suppressed: 0 bytes in 0 blocks
==8247== Rerun with --leak-check=full to see details of leaked memory
==8247== 
==8247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8247== 
==8247== 1 errors in context 1 of 1:
==8247== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8247==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8247==    by 0x488CD0: stringsubst (subst.c:301)
==8247==    by 0x48801B: prefork (subst.c:77)
==8247==    by 0x42B318: execcmd (exec.c:2619)
==8247==    by 0x428CA0: execpline2 (exec.c:1697)
==8247==    by 0x427FD2: execpline (exec.c:1484)
==8247==    by 0x427756: execlist (exec.c:1267)
==8247==    by 0x42717C: execode (exec.c:1073)
==8247==    by 0x431299: runshfunc (exec.c:5040)
==8247==    by 0x430E76: doshfunc (exec.c:4920)
==8247==    by 0x4302FB: execshfunc (exec.c:4557)
==8247==    by 0x42D8C1: execcmd (exec.c:3373)
==8247== 
==8247== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
==8249== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8249-by-pythonnut-on-???
==8249== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8249-by-pythonnut-on-???
==8249== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8249-by-pythonnut-on-???
==8249== 
==8249== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8249== don't want to do, unless you know exactly what you're doing,
==8249== or are doing some strange experiment):
==8249==   /usr/lib/valgrind/../../bin/vgdb --pid=8249 ...command...
==8249== 
==8249== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8249==   /path/to/gdb ./zsh
==8249== and then give GDB the following command
==8249==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8249
==8249== --pid is optional if only one valgrind process is running
==8249== 
--8248-- Caught __NR_exit; running __libc_freeres()
==8248== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8248-by-pythonnut-on-???
==8248== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8248-by-pythonnut-on-???
==8248== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8248-by-pythonnut-on-???
==8248== 
==8248== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8248== don't want to do, unless you know exactly what you're doing,
==8248== or are doing some strange experiment):
==8248==   /usr/lib/valgrind/../../bin/vgdb --pid=8248 ...command...
==8248== 
==8248== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8248==   /path/to/gdb ./zsh
==8248== and then give GDB the following command
==8248==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8248
==8248== --pid is optional if only one valgrind process is running
==8248== 
--8248-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8248== 
==8248== HEAP SUMMARY:
==8248==     in use at exit: 1,059,265 bytes in 24,034 blocks
==8248==   total heap usage: 648,836 allocs, 624,802 frees, 30,848,298 bytes allocated
==8248== 
==8248== Searching for pointers to 24,034 not-freed blocks
--8248--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8248--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8248--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8248--   Scanning root segment: 0x402a000..0x402afff (4096)
--8248--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8248--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8248--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8248--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8248--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8248--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8248--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8248--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8248--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8248--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8248--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8248--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8248--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8248--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8248--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8248--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8248--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8248--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8248--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8248--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8248--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8248--   Scanning root segment: 0x701a000..0x701afff (4096)
--8248--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8248--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8248--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8248--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8248--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8248--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8248--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8248== Checked 1,331,856 bytes
==8248== 
==8248== LEAK SUMMARY:
==8248==    definitely lost: 253 bytes in 4 blocks
==8248==    indirectly lost: 6,756 bytes in 7 blocks
==8248==      possibly lost: 0 bytes in 0 blocks
==8248==    still reachable: 1,052,256 bytes in 24,023 blocks
==8248==         suppressed: 0 bytes in 0 blocks
==8248== Rerun with --leak-check=full to see details of leaked memory
==8248== 
==8248== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8248== 
==8248== 1 errors in context 1 of 1:
==8248== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8248==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8248==    by 0x488CD0: stringsubst (subst.c:301)
==8248==    by 0x48801B: prefork (subst.c:77)
==8248==    by 0x42B318: execcmd (exec.c:2619)
==8248==    by 0x428CA0: execpline2 (exec.c:1697)
==8248==    by 0x427FD2: execpline (exec.c:1484)
==8248==    by 0x427756: execlist (exec.c:1267)
==8248==    by 0x42717C: execode (exec.c:1073)
==8248==    by 0x431299: runshfunc (exec.c:5040)
==8248==    by 0x430E76: doshfunc (exec.c:4920)
==8248==    by 0x4302FB: execshfunc (exec.c:4557)
==8248==    by 0x42D8C1: execcmd (exec.c:3373)
==8248== 
==8248== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8251== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8251-by-pythonnut-on-???
==8251== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8251-by-pythonnut-on-???
==8251== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8251-by-pythonnut-on-???
==8251== 
==8251== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8251== don't want to do, unless you know exactly what you're doing,
==8251== or are doing some strange experiment):
==8251==   /usr/lib/valgrind/../../bin/vgdb --pid=8251 ...command...
==8251== 
==8251== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8251==   /path/to/gdb ./zsh
==8251== and then give GDB the following command
==8251==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8251
==8251== --pid is optional if only one valgrind process is running
==8251== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8250-- Caught __NR_exit; running __libc_freeres()
==8250== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8250-by-pythonnut-on-???
==8250== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8250-by-pythonnut-on-???
==8250== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8250-by-pythonnut-on-???
==8250== 
==8250== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8250== don't want to do, unless you know exactly what you're doing,
==8250== or are doing some strange experiment):
==8250==   /usr/lib/valgrind/../../bin/vgdb --pid=8250 ...command...
==8250== 
==8250== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8250==   /path/to/gdb ./zsh
==8250== and then give GDB the following command
==8250==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8250
==8250== --pid is optional if only one valgrind process is running
==8250== 
--8250-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8250== 
==8250== HEAP SUMMARY:
==8250==     in use at exit: 1,059,633 bytes in 24,043 blocks
==8250==   total heap usage: 648,870 allocs, 624,827 frees, 30,854,873 bytes allocated
==8250== 
==8250== Searching for pointers to 24,043 not-freed blocks
--8250--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8250--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8250--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8250--   Scanning root segment: 0x402a000..0x402afff (4096)
--8250--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8250--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8250--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8250--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8250--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8250--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8250--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8250--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8250--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8250--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8250--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8250--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8250--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8250--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8250--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8250--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8250--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8250--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8250--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8250--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8250--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8250--   Scanning root segment: 0x701a000..0x701afff (4096)
--8250--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8250--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8250--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8250--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8250--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8250--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8250--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8250== Checked 1,332,200 bytes
==8250== 
==8250== LEAK SUMMARY:
==8250==    definitely lost: 253 bytes in 4 blocks
==8250==    indirectly lost: 6,756 bytes in 7 blocks
==8250==      possibly lost: 0 bytes in 0 blocks
==8250==    still reachable: 1,052,624 bytes in 24,032 blocks
==8250==         suppressed: 0 bytes in 0 blocks
==8250== Rerun with --leak-check=full to see details of leaked memory
==8250== 
==8250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8250== 
==8250== 1 errors in context 1 of 1:
==8250== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8250==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8250==    by 0x488CD0: stringsubst (subst.c:301)
==8250==    by 0x48801B: prefork (subst.c:77)
==8250==    by 0x42B318: execcmd (exec.c:2619)
==8250==    by 0x428CA0: execpline2 (exec.c:1697)
==8250==    by 0x427FD2: execpline (exec.c:1484)
==8250==    by 0x427756: execlist (exec.c:1267)
==8250==    by 0x42717C: execode (exec.c:1073)
==8250==    by 0x431299: runshfunc (exec.c:5040)
==8250==    by 0x430E76: doshfunc (exec.c:4920)
==8250==    by 0x4302FB: execshfunc (exec.c:4557)
==8250==    by 0x42D8C1: execcmd (exec.c:3373)
==8250== 
==8250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8253== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8253-by-pythonnut-on-???
==8253== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8253-by-pythonnut-on-???
==8253== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8253-by-pythonnut-on-???
==8253== 
==8253== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8253== don't want to do, unless you know exactly what you're doing,
==8253== or are doing some strange experiment):
==8253==   /usr/lib/valgrind/../../bin/vgdb --pid=8253 ...command...
==8253== 
==8253== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8253==   /path/to/gdb ./zsh
==8253== and then give GDB the following command
==8253==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8253
==8253== --pid is optional if only one valgrind process is running
==8253== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8252-- Caught __NR_exit; running __libc_freeres()
==8252== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8252-by-pythonnut-on-???
==8252== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8252-by-pythonnut-on-???
==8252== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8252-by-pythonnut-on-???
==8252== 
==8252== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8252== don't want to do, unless you know exactly what you're doing,
==8252== or are doing some strange experiment):
==8252==   /usr/lib/valgrind/../../bin/vgdb --pid=8252 ...command...
==8252== 
==8252== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8252==   /path/to/gdb ./zsh
==8252== and then give GDB the following command
==8252==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8252
==8252== --pid is optional if only one valgrind process is running
==8252== 
--8252-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8252== 
==8252== HEAP SUMMARY:
==8252==     in use at exit: 1,060,067 bytes in 24,052 blocks
==8252==   total heap usage: 648,904 allocs, 624,852 frees, 30,861,449 bytes allocated
==8252== 
==8252== Searching for pointers to 24,052 not-freed blocks
--8252--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8252--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8252--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8252--   Scanning root segment: 0x402a000..0x402afff (4096)
--8252--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8252--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8252--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8252--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8252--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8252--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8252--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8252--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8252--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8252--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8252--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8252--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8252--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8252--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8252--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8252--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8252--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8252--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8252--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8252--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8252--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8252--   Scanning root segment: 0x701a000..0x701afff (4096)
--8252--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8252--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8252--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8252--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8252--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8252--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8252--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8252== Checked 1,332,568 bytes
==8252== 
==8252== LEAK SUMMARY:
==8252==    definitely lost: 253 bytes in 4 blocks
==8252==    indirectly lost: 6,756 bytes in 7 blocks
==8252==      possibly lost: 0 bytes in 0 blocks
==8252==    still reachable: 1,053,058 bytes in 24,041 blocks
==8252==         suppressed: 0 bytes in 0 blocks
==8252== Rerun with --leak-check=full to see details of leaked memory
==8252== 
==8252== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8252== 
==8252== 1 errors in context 1 of 1:
==8252== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8252==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8252==    by 0x488CD0: stringsubst (subst.c:301)
==8252==    by 0x48801B: prefork (subst.c:77)
==8252==    by 0x42B318: execcmd (exec.c:2619)
==8252==    by 0x428CA0: execpline2 (exec.c:1697)
==8252==    by 0x427FD2: execpline (exec.c:1484)
==8252==    by 0x427756: execlist (exec.c:1267)
==8252==    by 0x42717C: execode (exec.c:1073)
==8252==    by 0x431299: runshfunc (exec.c:5040)
==8252==    by 0x430E76: doshfunc (exec.c:4920)
==8252==    by 0x4302FB: execshfunc (exec.c:4557)
==8252==    by 0x42D8C1: execcmd (exec.c:3373)
==8252== 
==8252== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8255-by-pythonnut-on-???
==8255== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8255-by-pythonnut-on-???
==8255== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8255-by-pythonnut-on-???
==8255== 
==8255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8255== don't want to do, unless you know exactly what you're doing,
==8255== or are doing some strange experiment):
==8255==   /usr/lib/valgrind/../../bin/vgdb --pid=8255 ...command...
==8255== 
==8255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8255==   /path/to/gdb ./zsh
==8255== and then give GDB the following command
==8255==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8255
==8255== --pid is optional if only one valgrind process is running
==8255== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8254-- Caught __NR_exit; running __libc_freeres()
==8254== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8254-by-pythonnut-on-???
==8254== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8254-by-pythonnut-on-???
==8254== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8254-by-pythonnut-on-???
==8254== 
==8254== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8254== don't want to do, unless you know exactly what you're doing,
==8254== or are doing some strange experiment):
==8254==   /usr/lib/valgrind/../../bin/vgdb --pid=8254 ...command...
==8254== 
==8254== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8254==   /path/to/gdb ./zsh
==8254== and then give GDB the following command
==8254==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8254
==8254== --pid is optional if only one valgrind process is running
==8254== 
--8254-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8254== 
==8254== HEAP SUMMARY:
==8254==     in use at exit: 1,060,500 bytes in 24,061 blocks
==8254==   total heap usage: 648,938 allocs, 624,877 frees, 30,868,028 bytes allocated
==8254== 
==8254== Searching for pointers to 24,061 not-freed blocks
--8254--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8254--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8254--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8254--   Scanning root segment: 0x402a000..0x402afff (4096)
--8254--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8254--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8254--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8254--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8254--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8254--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8254--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8254--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8254--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8254--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8254--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8254--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8254--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8254--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8254--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8254--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8254--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8254--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8254--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8254--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8254--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8254--   Scanning root segment: 0x701a000..0x701afff (4096)
--8254--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8254--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8254--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8254--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8254--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8254--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8254--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8254== Checked 1,332,960 bytes
==8254== 
==8254== LEAK SUMMARY:
==8254==    definitely lost: 253 bytes in 4 blocks
==8254==    indirectly lost: 6,756 bytes in 7 blocks
==8254==      possibly lost: 0 bytes in 0 blocks
==8254==    still reachable: 1,053,491 bytes in 24,050 blocks
==8254==         suppressed: 0 bytes in 0 blocks
==8254== Rerun with --leak-check=full to see details of leaked memory
==8254== 
==8254== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8254== 
==8254== 1 errors in context 1 of 1:
==8254== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8254==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8254==    by 0x488CD0: stringsubst (subst.c:301)
==8254==    by 0x48801B: prefork (subst.c:77)
==8254==    by 0x42B318: execcmd (exec.c:2619)
==8254==    by 0x428CA0: execpline2 (exec.c:1697)
==8254==    by 0x427FD2: execpline (exec.c:1484)
==8254==    by 0x427756: execlist (exec.c:1267)
==8254==    by 0x42717C: execode (exec.c:1073)
==8254==    by 0x431299: runshfunc (exec.c:5040)
==8254==    by 0x430E76: doshfunc (exec.c:4920)
==8254==    by 0x4302FB: execshfunc (exec.c:4557)
==8254==    by 0x42D8C1: execcmd (exec.c:3373)
==8254== 
==8254== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8257== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8257-by-pythonnut-on-???
==8257== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8257-by-pythonnut-on-???
==8257== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8257-by-pythonnut-on-???
==8257== 
==8257== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8257== don't want to do, unless you know exactly what you're doing,
==8257== or are doing some strange experiment):
==8257==   /usr/lib/valgrind/../../bin/vgdb --pid=8257 ...command...
==8257== 
==8257== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8257==   /path/to/gdb ./zsh
==8257== and then give GDB the following command
==8257==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8257
==8257== --pid is optional if only one valgrind process is running
==8257== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8256-- Caught __NR_exit; running __libc_freeres()
==8256== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8256-by-pythonnut-on-???
==8256== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8256-by-pythonnut-on-???
==8256== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8256-by-pythonnut-on-???
==8256== 
==8256== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8256== don't want to do, unless you know exactly what you're doing,
==8256== or are doing some strange experiment):
==8256==   /usr/lib/valgrind/../../bin/vgdb --pid=8256 ...command...
==8256== 
==8256== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8256==   /path/to/gdb ./zsh
==8256== and then give GDB the following command
==8256==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8256
==8256== --pid is optional if only one valgrind process is running
==8256== 
--8256-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8256== 
==8256== HEAP SUMMARY:
==8256==     in use at exit: 1,060,941 bytes in 24,070 blocks
==8256==   total heap usage: 648,972 allocs, 624,902 frees, 30,874,614 bytes allocated
==8256== 
==8256== Searching for pointers to 24,070 not-freed blocks
--8256--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8256--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8256--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8256--   Scanning root segment: 0x402a000..0x402afff (4096)
--8256--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8256--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8256--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8256--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8256--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8256--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8256--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8256--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8256--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8256--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8256--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8256--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8256--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8256--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8256--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8256--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8256--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8256--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8256--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8256--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8256--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8256--   Scanning root segment: 0x701a000..0x701afff (4096)
--8256--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8256--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8256--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8256--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8256--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8256--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8256--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8256== Checked 1,333,352 bytes
==8256== 
==8256== LEAK SUMMARY:
==8256==    definitely lost: 253 bytes in 4 blocks
==8256==    indirectly lost: 6,756 bytes in 7 blocks
==8256==      possibly lost: 0 bytes in 0 blocks
==8256==    still reachable: 1,053,932 bytes in 24,059 blocks
==8256==         suppressed: 0 bytes in 0 blocks
==8256== Rerun with --leak-check=full to see details of leaked memory
==8256== 
==8256== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8256== 
==8256== 1 errors in context 1 of 1:
==8256== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8256==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8256==    by 0x488CD0: stringsubst (subst.c:301)
==8256==    by 0x48801B: prefork (subst.c:77)
==8256==    by 0x42B318: execcmd (exec.c:2619)
==8256==    by 0x428CA0: execpline2 (exec.c:1697)
==8256==    by 0x427FD2: execpline (exec.c:1484)
==8256==    by 0x427756: execlist (exec.c:1267)
==8256==    by 0x42717C: execode (exec.c:1073)
==8256==    by 0x431299: runshfunc (exec.c:5040)
==8256==    by 0x430E76: doshfunc (exec.c:4920)
==8256==    by 0x4302FB: execshfunc (exec.c:4557)
==8256==    by 0x42D8C1: execcmd (exec.c:3373)
==8256== 
==8256== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8259-by-pythonnut-on-???
==8259== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8259-by-pythonnut-on-???
==8259== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8259-by-pythonnut-on-???
==8259== 
==8259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8259== don't want to do, unless you know exactly what you're doing,
==8259== or are doing some strange experiment):
==8259==   /usr/lib/valgrind/../../bin/vgdb --pid=8259 ...command...
==8259== 
==8259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8259==   /path/to/gdb ./zsh
==8259== and then give GDB the following command
==8259==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8259
==8259== --pid is optional if only one valgrind process is running
==8259== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8258-- Caught __NR_exit; running __libc_freeres()
==8258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8258-by-pythonnut-on-???
==8258== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8258-by-pythonnut-on-???
==8258== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8258-by-pythonnut-on-???
==8258== 
==8258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8258== don't want to do, unless you know exactly what you're doing,
==8258== or are doing some strange experiment):
==8258==   /usr/lib/valgrind/../../bin/vgdb --pid=8258 ...command...
==8258== 
==8258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8258==   /path/to/gdb ./zsh
==8258== and then give GDB the following command
==8258==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8258
==8258== --pid is optional if only one valgrind process is running
==8258== 
--8258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8258== 
==8258== HEAP SUMMARY:
==8258==     in use at exit: 1,061,377 bytes in 24,079 blocks
==8258==   total heap usage: 649,006 allocs, 624,927 frees, 30,881,205 bytes allocated
==8258== 
==8258== Searching for pointers to 24,079 not-freed blocks
--8258--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8258--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8258--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8258--   Scanning root segment: 0x402a000..0x402afff (4096)
--8258--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8258--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8258--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8258--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8258--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8258--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8258--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8258--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8258--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8258--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8258--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8258--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8258--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8258--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8258--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8258--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8258--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8258--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8258--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8258--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8258--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8258--   Scanning root segment: 0x701a000..0x701afff (4096)
--8258--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8258--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8258--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8258--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8258--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8258--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8258--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8258== Checked 1,333,752 bytes
==8258== 
==8258== LEAK SUMMARY:
==8258==    definitely lost: 253 bytes in 4 blocks
==8258==    indirectly lost: 6,756 bytes in 7 blocks
==8258==      possibly lost: 0 bytes in 0 blocks
==8258==    still reachable: 1,054,368 bytes in 24,068 blocks
==8258==         suppressed: 0 bytes in 0 blocks
==8258== Rerun with --leak-check=full to see details of leaked memory
==8258== 
==8258== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8258== 
==8258== 1 errors in context 1 of 1:
==8258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8258==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8258==    by 0x488CD0: stringsubst (subst.c:301)
==8258==    by 0x48801B: prefork (subst.c:77)
==8258==    by 0x42B318: execcmd (exec.c:2619)
==8258==    by 0x428CA0: execpline2 (exec.c:1697)
==8258==    by 0x427FD2: execpline (exec.c:1484)
==8258==    by 0x427756: execlist (exec.c:1267)
==8258==    by 0x42717C: execode (exec.c:1073)
==8258==    by 0x431299: runshfunc (exec.c:5040)
==8258==    by 0x430E76: doshfunc (exec.c:4920)
==8258==    by 0x4302FB: execshfunc (exec.c:4557)
==8258==    by 0x42D8C1: execcmd (exec.c:3373)
==8258== 
==8258== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8261-by-pythonnut-on-???
==8261== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8261-by-pythonnut-on-???
==8261== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8261-by-pythonnut-on-???
==8261== 
==8261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8261== don't want to do, unless you know exactly what you're doing,
==8261== or are doing some strange experiment):
==8261==   /usr/lib/valgrind/../../bin/vgdb --pid=8261 ...command...
==8261== 
==8261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8261==   /path/to/gdb ./zsh
==8261== and then give GDB the following command
==8261==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8261
==8261== --pid is optional if only one valgrind process is running
==8261== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8260-- Caught __NR_exit; running __libc_freeres()
==8260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8260-by-pythonnut-on-???
==8260== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8260-by-pythonnut-on-???
==8260== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8260-by-pythonnut-on-???
==8260== 
==8260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8260== don't want to do, unless you know exactly what you're doing,
==8260== or are doing some strange experiment):
==8260==   /usr/lib/valgrind/../../bin/vgdb --pid=8260 ...command...
==8260== 
==8260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8260==   /path/to/gdb ./zsh
==8260== and then give GDB the following command
==8260==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8260
==8260== --pid is optional if only one valgrind process is running
==8260== 
--8260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8260== 
==8260== HEAP SUMMARY:
==8260==     in use at exit: 1,061,829 bytes in 24,088 blocks
==8260==   total heap usage: 649,040 allocs, 624,952 frees, 30,887,811 bytes allocated
==8260== 
==8260== Searching for pointers to 24,088 not-freed blocks
--8260--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8260--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8260--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8260--   Scanning root segment: 0x402a000..0x402afff (4096)
--8260--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8260--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8260--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8260--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8260--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8260--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8260--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8260--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8260--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8260--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8260--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8260--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8260--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8260--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8260--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8260--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8260--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8260--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8260--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8260--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8260--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8260--   Scanning root segment: 0x701a000..0x701afff (4096)
--8260--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8260--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8260--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8260--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8260--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8260--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8260--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8260== Checked 1,334,128 bytes
==8260== 
==8260== LEAK SUMMARY:
==8260==    definitely lost: 253 bytes in 4 blocks
==8260==    indirectly lost: 6,756 bytes in 7 blocks
==8260==      possibly lost: 0 bytes in 0 blocks
==8260==    still reachable: 1,054,820 bytes in 24,077 blocks
==8260==         suppressed: 0 bytes in 0 blocks
==8260== Rerun with --leak-check=full to see details of leaked memory
==8260== 
==8260== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8260== 
==8260== 1 errors in context 1 of 1:
==8260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8260==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8260==    by 0x488CD0: stringsubst (subst.c:301)
==8260==    by 0x48801B: prefork (subst.c:77)
==8260==    by 0x42B318: execcmd (exec.c:2619)
==8260==    by 0x428CA0: execpline2 (exec.c:1697)
==8260==    by 0x427FD2: execpline (exec.c:1484)
==8260==    by 0x427756: execlist (exec.c:1267)
==8260==    by 0x42717C: execode (exec.c:1073)
==8260==    by 0x431299: runshfunc (exec.c:5040)
==8260==    by 0x430E76: doshfunc (exec.c:4920)
==8260==    by 0x4302FB: execshfunc (exec.c:4557)
==8260==    by 0x42D8C1: execcmd (exec.c:3373)
==8260== 
==8260== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8263-by-pythonnut-on-???
==8263== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8263-by-pythonnut-on-???
==8263== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8263-by-pythonnut-on-???
==8263== 
==8263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8263== don't want to do, unless you know exactly what you're doing,
==8263== or are doing some strange experiment):
==8263==   /usr/lib/valgrind/../../bin/vgdb --pid=8263 ...command...
==8263== 
==8263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8263==   /path/to/gdb ./zsh
==8263== and then give GDB the following command
==8263==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8263
==8263== --pid is optional if only one valgrind process is running
==8263== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8262-- Caught __NR_exit; running __libc_freeres()
==8262== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8262-by-pythonnut-on-???
==8262== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8262-by-pythonnut-on-???
==8262== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8262-by-pythonnut-on-???
==8262== 
==8262== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8262== don't want to do, unless you know exactly what you're doing,
==8262== or are doing some strange experiment):
==8262==   /usr/lib/valgrind/../../bin/vgdb --pid=8262 ...command...
==8262== 
==8262== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8262==   /path/to/gdb ./zsh
==8262== and then give GDB the following command
==8262==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8262
==8262== --pid is optional if only one valgrind process is running
==8262== 
--8262-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8262== 
==8262== HEAP SUMMARY:
==8262==     in use at exit: 1,062,276 bytes in 24,097 blocks
==8262==   total heap usage: 649,074 allocs, 624,977 frees, 30,894,430 bytes allocated
==8262== 
==8262== Searching for pointers to 24,097 not-freed blocks
--8262--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8262--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8262--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8262--   Scanning root segment: 0x402a000..0x402afff (4096)
--8262--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8262--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8262--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8262--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8262--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8262--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8262--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8262--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8262--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8262--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8262--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8262--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8262--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8262--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8262--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8262--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8262--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8262--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8262--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8262--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8262--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8262--   Scanning root segment: 0x701a000..0x701afff (4096)
--8262--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8262--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8262--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8262--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8262--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8262--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8262--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8262== Checked 1,334,536 bytes
==8262== 
==8262== LEAK SUMMARY:
==8262==    definitely lost: 253 bytes in 4 blocks
==8262==    indirectly lost: 6,756 bytes in 7 blocks
==8262==      possibly lost: 0 bytes in 0 blocks
==8262==    still reachable: 1,055,267 bytes in 24,086 blocks
==8262==         suppressed: 0 bytes in 0 blocks
==8262== Rerun with --leak-check=full to see details of leaked memory
==8262== 
==8262== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8262== 
==8262== 1 errors in context 1 of 1:
==8262== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8262==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8262==    by 0x488CD0: stringsubst (subst.c:301)
==8262==    by 0x48801B: prefork (subst.c:77)
==8262==    by 0x42B318: execcmd (exec.c:2619)
==8262==    by 0x428CA0: execpline2 (exec.c:1697)
==8262==    by 0x427FD2: execpline (exec.c:1484)
==8262==    by 0x427756: execlist (exec.c:1267)
==8262==    by 0x42717C: execode (exec.c:1073)
==8262==    by 0x431299: runshfunc (exec.c:5040)
==8262==    by 0x430E76: doshfunc (exec.c:4920)
==8262==    by 0x4302FB: execshfunc (exec.c:4557)
==8262==    by 0x42D8C1: execcmd (exec.c:3373)
==8262== 
==8262== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8264== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8264-by-pythonnut-on-???
==8264== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8264-by-pythonnut-on-???
==8264== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8264-by-pythonnut-on-???
==8264== 
==8264== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8264== don't want to do, unless you know exactly what you're doing,
==8264== or are doing some strange experiment):
==8264==   /usr/lib/valgrind/../../bin/vgdb --pid=8264 ...command...
==8264== 
==8264== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8264==   /path/to/gdb ./zsh
==8264== and then give GDB the following command
==8264==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8264
==8264== --pid is optional if only one valgrind process is running
==8264== 
==8265== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8265-by-pythonnut-on-???
==8265== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8265-by-pythonnut-on-???
==8265== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8265-by-pythonnut-on-???
==8265== 
==8265== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8265== don't want to do, unless you know exactly what you're doing,
==8265== or are doing some strange experiment):
==8265==   /usr/lib/valgrind/../../bin/vgdb --pid=8265 ...command...
==8265== 
==8265== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8265==   /path/to/gdb ./zsh
==8265== and then give GDB the following command
==8265==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8265
==8265== --pid is optional if only one valgrind process is running
==8265== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8264-- Caught __NR_exit; running __libc_freeres()
--8264-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8264== 
==8264== HEAP SUMMARY:
==8264==     in use at exit: 1,071,976 bytes in 24,211 blocks
==8264==   total heap usage: 649,502 allocs, 625,291 frees, 30,944,986 bytes allocated
==8264== 
==8264== Searching for pointers to 24,211 not-freed blocks
--8264--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8264--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8264--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8264--   Scanning root segment: 0x402a000..0x402efff (20480)
--8264--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8264--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8264--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8264--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8264--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8264--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8264--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8264--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8264--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8264--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8264--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8264--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8264--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8264--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8264--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8264--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8264--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8264--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8264--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8264--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8264--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8264--   Scanning root segment: 0x701a000..0x701afff (4096)
--8264--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8264--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8264--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8264--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8264--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8264--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8264--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8264== Checked 1,361,544 bytes
==8264== 
==8264== LEAK SUMMARY:
==8264==    definitely lost: 253 bytes in 4 blocks
==8264==    indirectly lost: 6,756 bytes in 7 blocks
==8264==      possibly lost: 0 bytes in 0 blocks
==8264==    still reachable: 1,064,967 bytes in 24,200 blocks
==8264==         suppressed: 0 bytes in 0 blocks
==8264== Rerun with --leak-check=full to see details of leaked memory
==8264== 
==8264== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8264== 
==8264== 1 errors in context 1 of 1:
==8264== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8264==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8264==    by 0x488CD0: stringsubst (subst.c:301)
==8264==    by 0x48801B: prefork (subst.c:77)
==8264==    by 0x42B318: execcmd (exec.c:2619)
==8264==    by 0x428CA0: execpline2 (exec.c:1697)
==8264==    by 0x427FD2: execpline (exec.c:1484)
==8264==    by 0x427756: execlist (exec.c:1267)
==8264==    by 0x42717C: execode (exec.c:1073)
==8264==    by 0x431299: runshfunc (exec.c:5040)
==8264==    by 0x430E76: doshfunc (exec.c:4920)
==8264==    by 0x4302FB: execshfunc (exec.c:4557)
==8264==    by 0x42D8C1: execcmd (exec.c:3373)
==8264== 
==8264== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8266-by-pythonnut-on-???
==8266== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8266-by-pythonnut-on-???
==8266== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8266-by-pythonnut-on-???
==8266== 
==8266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8266== don't want to do, unless you know exactly what you're doing,
==8266== or are doing some strange experiment):
==8266==   /usr/lib/valgrind/../../bin/vgdb --pid=8266 ...command...
==8266== 
==8266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8266==   /path/to/gdb ./zsh
==8266== and then give GDB the following command
==8266==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8266
==8266== --pid is optional if only one valgrind process is running
==8266== 
==8267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8267-by-pythonnut-on-???
==8267== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8267-by-pythonnut-on-???
==8267== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8267-by-pythonnut-on-???
==8267== 
==8267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8267== don't want to do, unless you know exactly what you're doing,
==8267== or are doing some strange experiment):
==8267==   /usr/lib/valgrind/../../bin/vgdb --pid=8267 ...command...
==8267== 
==8267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8267==   /path/to/gdb ./zsh
==8267== and then give GDB the following command
==8267==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8267
==8267== --pid is optional if only one valgrind process is running
==8267== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8266-- Caught __NR_exit; running __libc_freeres()
--8266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8266== 
==8266== HEAP SUMMARY:
==8266==     in use at exit: 1,075,241 bytes in 24,288 blocks
==8266==   total heap usage: 649,725 allocs, 625,437 frees, 30,960,698 bytes allocated
==8266== 
==8266== Searching for pointers to 24,288 not-freed blocks
--8266--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8266--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8266--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8266--   Scanning root segment: 0x402a000..0x402efff (20480)
--8266--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8266--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8266--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8266--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8266--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8266--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8266--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8266--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8266--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8266--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8266--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8266--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8266--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8266--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8266--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8266--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8266--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8266--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8266--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8266--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8266--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8266--   Scanning root segment: 0x701a000..0x701afff (4096)
--8266--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8266--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8266--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8266--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8266--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8266--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8266--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8266== Checked 1,364,512 bytes
==8266== 
==8266== LEAK SUMMARY:
==8266==    definitely lost: 253 bytes in 4 blocks
==8266==    indirectly lost: 6,756 bytes in 7 blocks
==8266==      possibly lost: 0 bytes in 0 blocks
==8266==    still reachable: 1,068,232 bytes in 24,277 blocks
==8266==         suppressed: 0 bytes in 0 blocks
==8266== Rerun with --leak-check=full to see details of leaked memory
==8266== 
==8266== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8266== 
==8266== 1 errors in context 1 of 1:
==8266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8266==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8266==    by 0x488CD0: stringsubst (subst.c:301)
==8266==    by 0x48801B: prefork (subst.c:77)
==8266==    by 0x42B318: execcmd (exec.c:2619)
==8266==    by 0x428CA0: execpline2 (exec.c:1697)
==8266==    by 0x427FD2: execpline (exec.c:1484)
==8266==    by 0x427756: execlist (exec.c:1267)
==8266==    by 0x42717C: execode (exec.c:1073)
==8266==    by 0x431299: runshfunc (exec.c:5040)
==8266==    by 0x430E76: doshfunc (exec.c:4920)
==8266==    by 0x4302FB: execshfunc (exec.c:4557)
==8266==    by 0x42D8C1: execcmd (exec.c:3373)
==8266== 
==8266== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8268== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8268-by-pythonnut-on-???
==8268== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8268-by-pythonnut-on-???
==8268== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8268-by-pythonnut-on-???
==8268== 
==8268== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8268== don't want to do, unless you know exactly what you're doing,
==8268== or are doing some strange experiment):
==8268==   /usr/lib/valgrind/../../bin/vgdb --pid=8268 ...command...
==8268== 
==8268== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8268==   /path/to/gdb ./zsh
==8268== and then give GDB the following command
==8268==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8268
==8268== --pid is optional if only one valgrind process is running
==8268== 
==8269== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8269-by-pythonnut-on-???
==8269== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8269-by-pythonnut-on-???
==8269== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8269-by-pythonnut-on-???
==8269== 
==8269== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8269== don't want to do, unless you know exactly what you're doing,
==8269== or are doing some strange experiment):
==8269==   /usr/lib/valgrind/../../bin/vgdb --pid=8269 ...command...
==8269== 
==8269== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8269==   /path/to/gdb ./zsh
==8269== and then give GDB the following command
==8269==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8269
==8269== --pid is optional if only one valgrind process is running
==8269== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8268-- Caught __NR_exit; running __libc_freeres()
--8268-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8268== 
==8268== HEAP SUMMARY:
==8268==     in use at exit: 1,077,748 bytes in 24,347 blocks
==8268==   total heap usage: 649,895 allocs, 625,548 frees, 30,974,459 bytes allocated
==8268== 
==8268== Searching for pointers to 24,347 not-freed blocks
--8268--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8268--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8268--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8268--   Scanning root segment: 0x402a000..0x402efff (20480)
--8268--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8268--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8268--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8268--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8268--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8268--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8268--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8268--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8268--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8268--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8268--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8268--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8268--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8268--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8268--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8268--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8268--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8268--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8268--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8268--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8268--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8268--   Scanning root segment: 0x701a000..0x701afff (4096)
--8268--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8268--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8268--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8268--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8268--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8268--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8268--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8268== Checked 1,366,792 bytes
==8268== 
==8268== LEAK SUMMARY:
==8268==    definitely lost: 253 bytes in 4 blocks
==8268==    indirectly lost: 6,756 bytes in 7 blocks
==8268==      possibly lost: 0 bytes in 0 blocks
==8268==    still reachable: 1,070,739 bytes in 24,336 blocks
==8268==         suppressed: 0 bytes in 0 blocks
==8268== Rerun with --leak-check=full to see details of leaked memory
==8268== 
==8268== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8268== 
==8268== 1 errors in context 1 of 1:
==8268== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8268==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8268==    by 0x488CD0: stringsubst (subst.c:301)
==8268==    by 0x48801B: prefork (subst.c:77)
==8268==    by 0x42B318: execcmd (exec.c:2619)
==8268==    by 0x428CA0: execpline2 (exec.c:1697)
==8268==    by 0x427FD2: execpline (exec.c:1484)
==8268==    by 0x427756: execlist (exec.c:1267)
==8268==    by 0x42717C: execode (exec.c:1073)
==8268==    by 0x431299: runshfunc (exec.c:5040)
==8268==    by 0x430E76: doshfunc (exec.c:4920)
==8268==    by 0x4302FB: execshfunc (exec.c:4557)
==8268==    by 0x42D8C1: execcmd (exec.c:3373)
==8268== 
==8268== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8270-by-pythonnut-on-???
==8270== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8270-by-pythonnut-on-???
==8270== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8270-by-pythonnut-on-???
==8270== 
==8270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8270== don't want to do, unless you know exactly what you're doing,
==8270== or are doing some strange experiment):
==8270==   /usr/lib/valgrind/../../bin/vgdb --pid=8270 ...command...
==8270== 
==8270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8270==   /path/to/gdb ./zsh
==8270== and then give GDB the following command
==8270==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8270
==8270== --pid is optional if only one valgrind process is running
==8270== 
==8271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8271-by-pythonnut-on-???
==8271== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8271-by-pythonnut-on-???
==8271== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8271-by-pythonnut-on-???
==8271== 
==8271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8271== don't want to do, unless you know exactly what you're doing,
==8271== or are doing some strange experiment):
==8271==   /usr/lib/valgrind/../../bin/vgdb --pid=8271 ...command...
==8271== 
==8271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8271==   /path/to/gdb ./zsh
==8271== and then give GDB the following command
==8271==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8271
==8271== --pid is optional if only one valgrind process is running
==8271== 
client request: code 4d430005,  addr 0xFFEFF230C,  len 4
--8270-- Caught __NR_exit; running __libc_freeres()
--8270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8270== 
==8270== HEAP SUMMARY:
==8270==     in use at exit: 1,081,028 bytes in 24,425 blocks
==8270==   total heap usage: 650,119 allocs, 625,694 frees, 30,990,186 bytes allocated
==8270== 
==8270== Searching for pointers to 24,425 not-freed blocks
--8270--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8270--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8270--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8270--   Scanning root segment: 0x402a000..0x402efff (20480)
--8270--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8270--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8270--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8270--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8270--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8270--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8270--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8270--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8270--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8270--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8270--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8270--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8270--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8270--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8270--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8270--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8270--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8270--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8270--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8270--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8270--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8270--   Scanning root segment: 0x701a000..0x701afff (4096)
--8270--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8270--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8270--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8270--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8270--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8270--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8270--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8270== Checked 1,369,784 bytes
==8270== 
==8270== LEAK SUMMARY:
==8270==    definitely lost: 253 bytes in 4 blocks
==8270==    indirectly lost: 6,756 bytes in 7 blocks
==8270==      possibly lost: 0 bytes in 0 blocks
==8270==    still reachable: 1,074,019 bytes in 24,414 blocks
==8270==         suppressed: 0 bytes in 0 blocks
==8270== Rerun with --leak-check=full to see details of leaked memory
==8270== 
==8270== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8270== 
==8270== 1 errors in context 1 of 1:
==8270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8270==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8270==    by 0x488CD0: stringsubst (subst.c:301)
==8270==    by 0x48801B: prefork (subst.c:77)
==8270==    by 0x42B318: execcmd (exec.c:2619)
==8270==    by 0x428CA0: execpline2 (exec.c:1697)
==8270==    by 0x427FD2: execpline (exec.c:1484)
==8270==    by 0x427756: execlist (exec.c:1267)
==8270==    by 0x42717C: execode (exec.c:1073)
==8270==    by 0x431299: runshfunc (exec.c:5040)
==8270==    by 0x430E76: doshfunc (exec.c:4920)
==8270==    by 0x4302FB: execshfunc (exec.c:4557)
==8270==    by 0x42D8C1: execcmd (exec.c:3373)
==8270== 
==8270== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8273-by-pythonnut-on-???
==8273== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8273-by-pythonnut-on-???
==8273== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8273-by-pythonnut-on-???
==8273== 
==8273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8273== don't want to do, unless you know exactly what you're doing,
==8273== or are doing some strange experiment):
==8273==   /usr/lib/valgrind/../../bin/vgdb --pid=8273 ...command...
==8273== 
==8273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8273==   /path/to/gdb ./zsh
==8273== and then give GDB the following command
==8273==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8273
==8273== --pid is optional if only one valgrind process is running
==8273== 
client request: code 4d430005,  addr 0xFFEFF19BC,  len 4
--8272-- Caught __NR_exit; running __libc_freeres()
==8272== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8272-by-pythonnut-on-???
==8272== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8272-by-pythonnut-on-???
==8272== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8272-by-pythonnut-on-???
==8272== 
==8272== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8272== don't want to do, unless you know exactly what you're doing,
==8272== or are doing some strange experiment):
==8272==   /usr/lib/valgrind/../../bin/vgdb --pid=8272 ...command...
==8272== 
==8272== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8272==   /path/to/gdb ./zsh
==8272== and then give GDB the following command
==8272==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8272
==8272== --pid is optional if only one valgrind process is running
==8272== 
--8272-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8272== 
==8272== HEAP SUMMARY:
==8272==     in use at exit: 1,088,028 bytes in 24,535 blocks
==8272==   total heap usage: 650,478 allocs, 625,943 frees, 31,021,020 bytes allocated
==8272== 
==8272== Searching for pointers to 24,535 not-freed blocks
--8272--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8272--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8272--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8272--   Scanning root segment: 0x402a000..0x402efff (20480)
--8272--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8272--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8272--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8272--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8272--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8272--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8272--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8272--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8272--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8272--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8272--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8272--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8272--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8272--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8272--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8272--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8272--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8272--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8272--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8272--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8272--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8272--   Scanning root segment: 0x701a000..0x701afff (4096)
--8272--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8272--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8272--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8272--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8272--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8272--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8272--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8272== Checked 1,377,312 bytes
==8272== 
==8272== LEAK SUMMARY:
==8272==    definitely lost: 253 bytes in 4 blocks
==8272==    indirectly lost: 6,756 bytes in 7 blocks
==8272==      possibly lost: 0 bytes in 0 blocks
==8272==    still reachable: 1,081,019 bytes in 24,524 blocks
==8272==         suppressed: 0 bytes in 0 blocks
==8272== Rerun with --leak-check=full to see details of leaked memory
==8272== 
==8272== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8272== 
==8272== 1 errors in context 1 of 1:
==8272== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8272==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8272==    by 0x488CD0: stringsubst (subst.c:301)
==8272==    by 0x48801B: prefork (subst.c:77)
==8272==    by 0x42B318: execcmd (exec.c:2619)
==8272==    by 0x428CA0: execpline2 (exec.c:1697)
==8272==    by 0x427FD2: execpline (exec.c:1484)
==8272==    by 0x427756: execlist (exec.c:1267)
==8272==    by 0x42717C: execode (exec.c:1073)
==8272==    by 0x431299: runshfunc (exec.c:5040)
==8272==    by 0x430E76: doshfunc (exec.c:4920)
==8272==    by 0x4302FB: execshfunc (exec.c:4557)
==8272==    by 0x42D8C1: execcmd (exec.c:3373)
==8272== 
==8272== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8274-by-pythonnut-on-???
==8274== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8274-by-pythonnut-on-???
==8274== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8274-by-pythonnut-on-???
==8274== 
==8274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8274== don't want to do, unless you know exactly what you're doing,
==8274== or are doing some strange experiment):
==8274==   /usr/lib/valgrind/../../bin/vgdb --pid=8274 ...command...
==8274== 
==8274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8274==   /path/to/gdb ./zsh
==8274== and then give GDB the following command
==8274==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8274
==8274== --pid is optional if only one valgrind process is running
==8274== 
==8275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8275-by-pythonnut-on-???
==8275== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8275-by-pythonnut-on-???
==8275== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8275-by-pythonnut-on-???
==8275== 
==8275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8275== don't want to do, unless you know exactly what you're doing,
==8275== or are doing some strange experiment):
==8275==   /usr/lib/valgrind/../../bin/vgdb --pid=8275 ...command...
==8275== 
==8275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8275==   /path/to/gdb ./zsh
==8275== and then give GDB the following command
==8275==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8275
==8275== --pid is optional if only one valgrind process is running
==8275== 
client request: code 4d430005,  addr 0xFFEFF19BC,  len 4
--8274-- Caught __NR_exit; running __libc_freeres()
--8274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8274== 
==8274== HEAP SUMMARY:
==8274==     in use at exit: 1,090,207 bytes in 24,578 blocks
==8274==   total heap usage: 650,601 allocs, 626,023 frees, 31,032,284 bytes allocated
==8274== 
==8274== Searching for pointers to 24,578 not-freed blocks
--8274--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8274--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8274--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8274--   Scanning root segment: 0x402a000..0x402efff (20480)
--8274--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8274--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8274--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8274--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8274--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8274--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8274--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8274--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8274--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8274--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8274--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8274--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8274--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8274--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8274--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8274--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8274--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8274--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8274--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8274--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8274--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8274--   Scanning root segment: 0x701a000..0x701afff (4096)
--8274--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8274--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8274--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8274--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8274--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8274--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8274--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8274== Checked 1,379,288 bytes
==8274== 
==8274== LEAK SUMMARY:
==8274==    definitely lost: 253 bytes in 4 blocks
==8274==    indirectly lost: 6,756 bytes in 7 blocks
==8274==      possibly lost: 0 bytes in 0 blocks
==8274==    still reachable: 1,083,198 bytes in 24,567 blocks
==8274==         suppressed: 0 bytes in 0 blocks
==8274== Rerun with --leak-check=full to see details of leaked memory
==8274== 
==8274== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8274== 
==8274== 1 errors in context 1 of 1:
==8274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8274==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8274==    by 0x488CD0: stringsubst (subst.c:301)
==8274==    by 0x48801B: prefork (subst.c:77)
==8274==    by 0x42B318: execcmd (exec.c:2619)
==8274==    by 0x428CA0: execpline2 (exec.c:1697)
==8274==    by 0x427FD2: execpline (exec.c:1484)
==8274==    by 0x427756: execlist (exec.c:1267)
==8274==    by 0x42717C: execode (exec.c:1073)
==8274==    by 0x431299: runshfunc (exec.c:5040)
==8274==    by 0x430E76: doshfunc (exec.c:4920)
==8274==    by 0x4302FB: execshfunc (exec.c:4557)
==8274==    by 0x42D8C1: execcmd (exec.c:3373)
==8274== 
==8274== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8276-by-pythonnut-on-???
==8276== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8276-by-pythonnut-on-???
==8276== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8276-by-pythonnut-on-???
==8276== 
==8276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8276== don't want to do, unless you know exactly what you're doing,
==8276== or are doing some strange experiment):
==8276==   /usr/lib/valgrind/../../bin/vgdb --pid=8276 ...command...
==8276== 
==8276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8276==   /path/to/gdb ./zsh
==8276== and then give GDB the following command
==8276==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8276
==8276== --pid is optional if only one valgrind process is running
==8276== 
==8277== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8277-by-pythonnut-on-???
==8277== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8277-by-pythonnut-on-???
==8277== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8277-by-pythonnut-on-???
==8277== 
==8277== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8277== don't want to do, unless you know exactly what you're doing,
==8277== or are doing some strange experiment):
==8277==   /usr/lib/valgrind/../../bin/vgdb --pid=8277 ...command...
==8277== 
==8277== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8277==   /path/to/gdb ./zsh
==8277== and then give GDB the following command
==8277==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8277
==8277== --pid is optional if only one valgrind process is running
==8277== 
client request: code 4d430005,  addr 0xFFEFF19BC,  len 4
--8276-- Caught __NR_exit; running __libc_freeres()
--8276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8276== 
==8276== HEAP SUMMARY:
==8276==     in use at exit: 1,092,386 bytes in 24,621 blocks
==8276==   total heap usage: 650,724 allocs, 626,103 frees, 31,043,548 bytes allocated
==8276== 
==8276== Searching for pointers to 24,621 not-freed blocks
--8276--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8276--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8276--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8276--   Scanning root segment: 0x402a000..0x402efff (20480)
--8276--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8276--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8276--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8276--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8276--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8276--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8276--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8276--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8276--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8276--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8276--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8276--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8276--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8276--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8276--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8276--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8276--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8276--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8276--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8276--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8276--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8276--   Scanning root segment: 0x701a000..0x701afff (4096)
--8276--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8276--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8276--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8276--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8276--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8276--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8276--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8276== Checked 1,381,280 bytes
==8276== 
==8276== LEAK SUMMARY:
==8276==    definitely lost: 253 bytes in 4 blocks
==8276==    indirectly lost: 6,756 bytes in 7 blocks
==8276==      possibly lost: 0 bytes in 0 blocks
==8276==    still reachable: 1,085,377 bytes in 24,610 blocks
==8276==         suppressed: 0 bytes in 0 blocks
==8276== Rerun with --leak-check=full to see details of leaked memory
==8276== 
==8276== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8276== 
==8276== 1 errors in context 1 of 1:
==8276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8276==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8276==    by 0x488CD0: stringsubst (subst.c:301)
==8276==    by 0x48801B: prefork (subst.c:77)
==8276==    by 0x42B318: execcmd (exec.c:2619)
==8276==    by 0x428CA0: execpline2 (exec.c:1697)
==8276==    by 0x427FD2: execpline (exec.c:1484)
==8276==    by 0x427756: execlist (exec.c:1267)
==8276==    by 0x42717C: execode (exec.c:1073)
==8276==    by 0x431299: runshfunc (exec.c:5040)
==8276==    by 0x430E76: doshfunc (exec.c:4920)
==8276==    by 0x4302FB: execshfunc (exec.c:4557)
==8276==    by 0x42D8C1: execcmd (exec.c:3373)
==8276== 
==8276== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8279== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8279-by-pythonnut-on-???
==8279== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8279-by-pythonnut-on-???
==8279== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8279-by-pythonnut-on-???
==8279== 
==8279== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8279== don't want to do, unless you know exactly what you're doing,
==8279== or are doing some strange experiment):
==8279==   /usr/lib/valgrind/../../bin/vgdb --pid=8279 ...command...
==8279== 
==8279== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8279==   /path/to/gdb ./zsh
==8279== and then give GDB the following command
==8279==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8279
==8279== --pid is optional if only one valgrind process is running
==8279== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8278-- Caught __NR_exit; running __libc_freeres()
==8278== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8278-by-pythonnut-on-???
==8278== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8278-by-pythonnut-on-???
==8278== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8278-by-pythonnut-on-???
==8278== 
==8278== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8278== don't want to do, unless you know exactly what you're doing,
==8278== or are doing some strange experiment):
==8278==   /usr/lib/valgrind/../../bin/vgdb --pid=8278 ...command...
==8278== 
==8278== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8278==   /path/to/gdb ./zsh
==8278== and then give GDB the following command
==8278==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8278
==8278== --pid is optional if only one valgrind process is running
==8278== 
--8278-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8278== 
==8278== HEAP SUMMARY:
==8278==     in use at exit: 1,105,102 bytes in 24,785 blocks
==8278==   total heap usage: 651,324 allocs, 626,539 frees, 31,127,303 bytes allocated
==8278== 
==8278== Searching for pointers to 24,785 not-freed blocks
--8278--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8278--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8278--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8278--   Scanning root segment: 0x402a000..0x402afff (4096)
--8278--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8278--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8278--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8278--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8278--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8278--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8278--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8278--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8278--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8278--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8278--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8278--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8278--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8278--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8278--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8278--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8278--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8278--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8278--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8278--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8278--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8278--   Scanning root segment: 0x701a000..0x701afff (4096)
--8278--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8278--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8278--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8278--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8278--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8278--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8278--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8278== Checked 1,374,592 bytes
==8278== 
==8278== LEAK SUMMARY:
==8278==    definitely lost: 253 bytes in 4 blocks
==8278==    indirectly lost: 6,756 bytes in 7 blocks
==8278==      possibly lost: 0 bytes in 0 blocks
==8278==    still reachable: 1,098,093 bytes in 24,774 blocks
==8278==         suppressed: 0 bytes in 0 blocks
==8278== Rerun with --leak-check=full to see details of leaked memory
==8278== 
==8278== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8278== 
==8278== 1 errors in context 1 of 1:
==8278== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8278==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8278==    by 0x488CD0: stringsubst (subst.c:301)
==8278==    by 0x48801B: prefork (subst.c:77)
==8278==    by 0x42B318: execcmd (exec.c:2619)
==8278==    by 0x428CA0: execpline2 (exec.c:1697)
==8278==    by 0x427FD2: execpline (exec.c:1484)
==8278==    by 0x427756: execlist (exec.c:1267)
==8278==    by 0x42717C: execode (exec.c:1073)
==8278==    by 0x431299: runshfunc (exec.c:5040)
==8278==    by 0x430E76: doshfunc (exec.c:4920)
==8278==    by 0x4302FB: execshfunc (exec.c:4557)
==8278==    by 0x42D8C1: execcmd (exec.c:3373)
==8278== 
==8278== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8281-by-pythonnut-on-???
==8281== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8281-by-pythonnut-on-???
==8281== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8281-by-pythonnut-on-???
==8281== 
==8281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8281== don't want to do, unless you know exactly what you're doing,
==8281== or are doing some strange experiment):
==8281==   /usr/lib/valgrind/../../bin/vgdb --pid=8281 ...command...
==8281== 
==8281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8281==   /path/to/gdb ./zsh
==8281== and then give GDB the following command
==8281==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8281
==8281== --pid is optional if only one valgrind process is running
==8281== 
client request: code 4d430005,  addr 0xFFEFF328C,  len 4
--8280-- Caught __NR_exit; running __libc_freeres()
==8280== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8280-by-pythonnut-on-???
==8280== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8280-by-pythonnut-on-???
==8280== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8280-by-pythonnut-on-???
==8280== 
==8280== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8280== don't want to do, unless you know exactly what you're doing,
==8280== or are doing some strange experiment):
==8280==   /usr/lib/valgrind/../../bin/vgdb --pid=8280 ...command...
==8280== 
==8280== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8280==   /path/to/gdb ./zsh
==8280== and then give GDB the following command
==8280==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8280
==8280== --pid is optional if only one valgrind process is running
==8280== 
--8280-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8280== 
==8280== HEAP SUMMARY:
==8280==     in use at exit: 1,106,139 bytes in 24,808 blocks
==8280==   total heap usage: 651,404 allocs, 626,596 frees, 31,137,884 bytes allocated
==8280== 
==8280== Searching for pointers to 24,808 not-freed blocks
--8280--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8280--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8280--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8280--   Scanning root segment: 0x402a000..0x402afff (4096)
--8280--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8280--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8280--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8280--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8280--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8280--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8280--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8280--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8280--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8280--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8280--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8280--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8280--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8280--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8280--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8280--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8280--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8280--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8280--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8280--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8280--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8280--   Scanning root segment: 0x701a000..0x701afff (4096)
--8280--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8280--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8280--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8280--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8280--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8280--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8280--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8280== Checked 1,375,520 bytes
==8280== 
==8280== LEAK SUMMARY:
==8280==    definitely lost: 253 bytes in 4 blocks
==8280==    indirectly lost: 6,756 bytes in 7 blocks
==8280==      possibly lost: 0 bytes in 0 blocks
==8280==    still reachable: 1,099,130 bytes in 24,797 blocks
==8280==         suppressed: 0 bytes in 0 blocks
==8280== Rerun with --leak-check=full to see details of leaked memory
==8280== 
==8280== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8280== 
==8280== 1 errors in context 1 of 1:
==8280== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8280==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8280==    by 0x488CD0: stringsubst (subst.c:301)
==8280==    by 0x48801B: prefork (subst.c:77)
==8280==    by 0x42B318: execcmd (exec.c:2619)
==8280==    by 0x428CA0: execpline2 (exec.c:1697)
==8280==    by 0x427FD2: execpline (exec.c:1484)
==8280==    by 0x427756: execlist (exec.c:1267)
==8280==    by 0x42717C: execode (exec.c:1073)
==8280==    by 0x431299: runshfunc (exec.c:5040)
==8280==    by 0x430E76: doshfunc (exec.c:4920)
==8280==    by 0x4302FB: execshfunc (exec.c:4557)
==8280==    by 0x42D8C1: execcmd (exec.c:3373)
==8280== 
==8280== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8282-- Caught __NR_exit; running __libc_freeres()
==8282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8282-by-pythonnut-on-???
==8282== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8282-by-pythonnut-on-???
==8282== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8282-by-pythonnut-on-???
==8282== 
==8282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8282== don't want to do, unless you know exactly what you're doing,
==8282== or are doing some strange experiment):
==8282==   /usr/lib/valgrind/../../bin/vgdb --pid=8282 ...command...
==8282== 
==8282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8282==   /path/to/gdb ./zsh
==8282== and then give GDB the following command
==8282==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8282
==8282== --pid is optional if only one valgrind process is running
==8282== 
--8282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8282== 
==8282== HEAP SUMMARY:
==8282==     in use at exit: 1,131,951 bytes in 25,095 blocks
==8282==   total heap usage: 652,467 allocs, 627,372 frees, 31,313,535 bytes allocated
==8282== 
==8282== Searching for pointers to 25,095 not-freed blocks
--8282--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8282--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8282--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8282--   Scanning root segment: 0x402a000..0x402efff (20480)
--8282--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8282--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8282--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8282--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8282--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8282--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8282--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8282--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8282--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8282--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8282--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8282--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8282--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8282--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8282--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8282--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8282--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8282--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8282--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8282--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8282--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8282--   Scanning root segment: 0x701a000..0x701afff (4096)
--8282--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8282--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8282--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8282--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8282--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8282--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8282--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8282== Checked 1,421,936 bytes
==8282== 
==8282== LEAK SUMMARY:
==8282==    definitely lost: 253 bytes in 4 blocks
==8282==    indirectly lost: 6,756 bytes in 7 blocks
==8282==      possibly lost: 0 bytes in 0 blocks
==8282==    still reachable: 1,124,942 bytes in 25,084 blocks
==8282==         suppressed: 0 bytes in 0 blocks
==8282== Rerun with --leak-check=full to see details of leaked memory
==8282== 
==8282== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8282== 
==8282== 1 errors in context 1 of 1:
==8282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8282==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8282==    by 0x488CD0: stringsubst (subst.c:301)
==8282==    by 0x48801B: prefork (subst.c:77)
==8282==    by 0x42B318: execcmd (exec.c:2619)
==8282==    by 0x428CA0: execpline2 (exec.c:1697)
==8282==    by 0x427FD2: execpline (exec.c:1484)
==8282==    by 0x427756: execlist (exec.c:1267)
==8282==    by 0x42717C: execode (exec.c:1073)
==8282==    by 0x431299: runshfunc (exec.c:5040)
==8282==    by 0x430E76: doshfunc (exec.c:4920)
==8282==    by 0x4302FB: execshfunc (exec.c:4557)
==8282==    by 0x42D8C1: execcmd (exec.c:3373)
==8282== 
==8282== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8284== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8284-by-pythonnut-on-???
==8284== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8284-by-pythonnut-on-???
==8284== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8284-by-pythonnut-on-???
==8284== 
==8284== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8284== don't want to do, unless you know exactly what you're doing,
==8284== or are doing some strange experiment):
==8284==   /usr/lib/valgrind/../../bin/vgdb --pid=8284 ...command...
==8284== 
==8284== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8284==   /path/to/gdb ./zsh
==8284== and then give GDB the following command
==8284==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8284
==8284== --pid is optional if only one valgrind process is running
==8284== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8284-- Caught __NR_exit; running __libc_freeres()
--8284-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8284== 
==8284== HEAP SUMMARY:
==8284==     in use at exit: 1,132,259 bytes in 25,096 blocks
==8284==   total heap usage: 652,570 allocs, 627,474 frees, 31,321,123 bytes allocated
==8284== 
==8284== Searching for pointers to 25,096 not-freed blocks
--8284--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8284--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8284--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8284--   Scanning root segment: 0x402a000..0x402efff (20480)
--8284--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8284--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8284--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8284--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8284--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8284--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8284--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8284--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8284--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8284--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8284--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8284--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8284--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8284--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8284--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8284--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8284--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8284--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8284--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8284--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8284--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8284--   Scanning root segment: 0x701a000..0x701afff (4096)
--8284--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8284--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8284--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8284--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8284--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8284--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8284--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8284== Checked 1,422,216 bytes
==8284== 
==8284== LEAK SUMMARY:
==8284==    definitely lost: 253 bytes in 4 blocks
==8284==    indirectly lost: 6,756 bytes in 7 blocks
==8284==      possibly lost: 0 bytes in 0 blocks
==8284==    still reachable: 1,125,250 bytes in 25,085 blocks
==8284==         suppressed: 0 bytes in 0 blocks
==8284== Rerun with --leak-check=full to see details of leaked memory
==8284== 
==8284== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8284== 
==8284== 1 errors in context 1 of 1:
==8284== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8284==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8284==    by 0x488CD0: stringsubst (subst.c:301)
==8284==    by 0x48801B: prefork (subst.c:77)
==8284==    by 0x42B318: execcmd (exec.c:2619)
==8284==    by 0x428CA0: execpline2 (exec.c:1697)
==8284==    by 0x427FD2: execpline (exec.c:1484)
==8284==    by 0x427756: execlist (exec.c:1267)
==8284==    by 0x42717C: execode (exec.c:1073)
==8284==    by 0x431299: runshfunc (exec.c:5040)
==8284==    by 0x430E76: doshfunc (exec.c:4920)
==8284==    by 0x4302FB: execshfunc (exec.c:4557)
==8284==    by 0x42D8C1: execcmd (exec.c:3373)
==8284== 
==8284== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8287== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8287-by-pythonnut-on-???
==8287== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8287-by-pythonnut-on-???
==8287== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8287-by-pythonnut-on-???
==8287== 
==8287== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8287== don't want to do, unless you know exactly what you're doing,
==8287== or are doing some strange experiment):
==8287==   /usr/lib/valgrind/../../bin/vgdb --pid=8287 ...command...
==8287== 
==8287== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8287==   /path/to/gdb ./zsh
==8287== and then give GDB the following command
==8287==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8287
==8287== --pid is optional if only one valgrind process is running
==8287== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8286-- Caught __NR_exit; running __libc_freeres()
==8286== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8286-by-pythonnut-on-???
==8286== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8286-by-pythonnut-on-???
==8286== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8286-by-pythonnut-on-???
==8286== 
==8286== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8286== don't want to do, unless you know exactly what you're doing,
==8286== or are doing some strange experiment):
==8286==   /usr/lib/valgrind/../../bin/vgdb --pid=8286 ...command...
==8286== 
==8286== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8286==   /path/to/gdb ./zsh
==8286== and then give GDB the following command
==8286==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8286
==8286== --pid is optional if only one valgrind process is running
==8286== 
--8286-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8286== 
==8286== HEAP SUMMARY:
==8286==     in use at exit: 1,132,681 bytes in 25,104 blocks
==8286==   total heap usage: 652,672 allocs, 627,568 frees, 31,328,589 bytes allocated
==8286== 
==8286== Searching for pointers to 25,104 not-freed blocks
--8286--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8286--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8286--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8286--   Scanning root segment: 0x402a000..0x402efff (20480)
--8286--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8286--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8286--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8286--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8286--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8286--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8286--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8286--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8286--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8286--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8286--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8286--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8286--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8286--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8286--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8286--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8286--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8286--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8286--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8286--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8286--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8286--   Scanning root segment: 0x701a000..0x701afff (4096)
--8286--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8286--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8286--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8286--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8286--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8286--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8286--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8286== Checked 1,422,600 bytes
==8286== 
==8286== LEAK SUMMARY:
==8286==    definitely lost: 253 bytes in 4 blocks
==8286==    indirectly lost: 6,756 bytes in 7 blocks
==8286==      possibly lost: 0 bytes in 0 blocks
==8286==    still reachable: 1,125,672 bytes in 25,093 blocks
==8286==         suppressed: 0 bytes in 0 blocks
==8286== Rerun with --leak-check=full to see details of leaked memory
==8286== 
==8286== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8286== 
==8286== 1 errors in context 1 of 1:
==8286== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8286==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8286==    by 0x488CD0: stringsubst (subst.c:301)
==8286==    by 0x48801B: prefork (subst.c:77)
==8286==    by 0x42B318: execcmd (exec.c:2619)
==8286==    by 0x428CA0: execpline2 (exec.c:1697)
==8286==    by 0x427FD2: execpline (exec.c:1484)
==8286==    by 0x427756: execlist (exec.c:1267)
==8286==    by 0x42717C: execode (exec.c:1073)
==8286==    by 0x431299: runshfunc (exec.c:5040)
==8286==    by 0x430E76: doshfunc (exec.c:4920)
==8286==    by 0x4302FB: execshfunc (exec.c:4557)
==8286==    by 0x42D8C1: execcmd (exec.c:3373)
==8286== 
==8286== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8288-- Caught __NR_exit; running __libc_freeres()
==8288== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8288-by-pythonnut-on-???
==8288== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8288-by-pythonnut-on-???
==8288== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8288-by-pythonnut-on-???
==8288== 
==8288== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8288== don't want to do, unless you know exactly what you're doing,
==8288== or are doing some strange experiment):
==8288==   /usr/lib/valgrind/../../bin/vgdb --pid=8288 ...command...
==8288== 
==8288== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8288==   /path/to/gdb ./zsh
==8288== and then give GDB the following command
==8288==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8288
==8288== --pid is optional if only one valgrind process is running
==8288== 
--8288-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8288== 
==8288== HEAP SUMMARY:
==8288==     in use at exit: 1,133,042 bytes in 25,118 blocks
==8288==   total heap usage: 652,808 allocs, 627,690 frees, 31,338,338 bytes allocated
==8288== 
==8288== Searching for pointers to 25,118 not-freed blocks
--8288--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8288--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8288--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8288--   Scanning root segment: 0x402a000..0x402efff (20480)
--8288--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8288--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8288--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8288--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8288--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8288--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8288--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8288--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8288--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8288--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8288--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8288--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8288--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8288--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8288--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8288--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8288--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8288--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8288--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8288--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8288--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8288--   Scanning root segment: 0x701a000..0x701afff (4096)
--8288--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8288--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8288--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8288--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8288--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8288--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8288--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8288== Checked 1,422,984 bytes
==8288== 
==8288== LEAK SUMMARY:
==8288==    definitely lost: 253 bytes in 4 blocks
==8288==    indirectly lost: 6,756 bytes in 7 blocks
==8288==      possibly lost: 0 bytes in 0 blocks
==8288==    still reachable: 1,126,033 bytes in 25,107 blocks
==8288==         suppressed: 0 bytes in 0 blocks
==8288== Rerun with --leak-check=full to see details of leaked memory
==8288== 
==8288== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8288== 
==8288== 1 errors in context 1 of 1:
==8288== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8288==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8288==    by 0x488CD0: stringsubst (subst.c:301)
==8288==    by 0x48801B: prefork (subst.c:77)
==8288==    by 0x42B318: execcmd (exec.c:2619)
==8288==    by 0x428CA0: execpline2 (exec.c:1697)
==8288==    by 0x427FD2: execpline (exec.c:1484)
==8288==    by 0x427756: execlist (exec.c:1267)
==8288==    by 0x42717C: execode (exec.c:1073)
==8288==    by 0x431299: runshfunc (exec.c:5040)
==8288==    by 0x430E76: doshfunc (exec.c:4920)
==8288==    by 0x4302FB: execshfunc (exec.c:4557)
==8288==    by 0x42D8C1: execcmd (exec.c:3373)
==8288== 
==8288== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8290== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8290-by-pythonnut-on-???
==8290== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8290-by-pythonnut-on-???
==8290== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8290-by-pythonnut-on-???
==8290== 
==8290== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8290== don't want to do, unless you know exactly what you're doing,
==8290== or are doing some strange experiment):
==8290==   /usr/lib/valgrind/../../bin/vgdb --pid=8290 ...command...
==8290== 
==8290== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8290==   /path/to/gdb ./zsh
==8290== and then give GDB the following command
==8290==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8290
==8290== --pid is optional if only one valgrind process is running
==8290== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8290-- Caught __NR_exit; running __libc_freeres()
--8290-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8290== 
==8290== HEAP SUMMARY:
==8290==     in use at exit: 1,133,318 bytes in 25,119 blocks
==8290==   total heap usage: 652,910 allocs, 627,791 frees, 31,345,902 bytes allocated
==8290== 
==8290== Searching for pointers to 25,119 not-freed blocks
--8290--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8290--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8290--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8290--   Scanning root segment: 0x402a000..0x402efff (20480)
--8290--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8290--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8290--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8290--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8290--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8290--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8290--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8290--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8290--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8290--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8290--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8290--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8290--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8290--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8290--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8290--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8290--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8290--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8290--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8290--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8290--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8290--   Scanning root segment: 0x701a000..0x701afff (4096)
--8290--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8290--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8290--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8290--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8290--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8290--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8290--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8290== Checked 1,423,248 bytes
==8290== 
==8290== LEAK SUMMARY:
==8290==    definitely lost: 253 bytes in 4 blocks
==8290==    indirectly lost: 6,756 bytes in 7 blocks
==8290==      possibly lost: 0 bytes in 0 blocks
==8290==    still reachable: 1,126,309 bytes in 25,108 blocks
==8290==         suppressed: 0 bytes in 0 blocks
==8290== Rerun with --leak-check=full to see details of leaked memory
==8290== 
==8290== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8290== 
==8290== 1 errors in context 1 of 1:
==8290== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8290==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8290==    by 0x488CD0: stringsubst (subst.c:301)
==8290==    by 0x48801B: prefork (subst.c:77)
==8290==    by 0x42B318: execcmd (exec.c:2619)
==8290==    by 0x428CA0: execpline2 (exec.c:1697)
==8290==    by 0x427FD2: execpline (exec.c:1484)
==8290==    by 0x427756: execlist (exec.c:1267)
==8290==    by 0x42717C: execode (exec.c:1073)
==8290==    by 0x431299: runshfunc (exec.c:5040)
==8290==    by 0x430E76: doshfunc (exec.c:4920)
==8290==    by 0x4302FB: execshfunc (exec.c:4557)
==8290==    by 0x42D8C1: execcmd (exec.c:3373)
==8290== 
==8290== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8293== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8293-by-pythonnut-on-???
==8293== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8293-by-pythonnut-on-???
==8293== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8293-by-pythonnut-on-???
==8293== 
==8293== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8293== don't want to do, unless you know exactly what you're doing,
==8293== or are doing some strange experiment):
==8293==   /usr/lib/valgrind/../../bin/vgdb --pid=8293 ...command...
==8293== 
==8293== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8293==   /path/to/gdb ./zsh
==8293== and then give GDB the following command
==8293==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8293
==8293== --pid is optional if only one valgrind process is running
==8293== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
==8292== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8292-by-pythonnut-on-???
==8292== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8292-by-pythonnut-on-???
==8292== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8292-by-pythonnut-on-???
==8292== 
==8292== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8292== don't want to do, unless you know exactly what you're doing,
==8292== or are doing some strange experiment):
==8292==   /usr/lib/valgrind/../../bin/vgdb --pid=8292 ...command...
==8292== 
==8292== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8292==   /path/to/gdb ./zsh
==8292== and then give GDB the following command
==8292==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8292
==8292== --pid is optional if only one valgrind process is running
==8292== 
--8292-- Caught __NR_exit; running __libc_freeres()
--8292-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8292== 
==8292== HEAP SUMMARY:
==8292==     in use at exit: 1,133,889 bytes in 25,135 blocks
==8292==   total heap usage: 653,048 allocs, 627,913 frees, 31,355,820 bytes allocated
==8292== 
==8292== Searching for pointers to 25,135 not-freed blocks
--8292--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8292--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8292--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8292--   Scanning root segment: 0x402a000..0x402efff (20480)
--8292--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8292--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8292--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8292--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8292--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8292--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8292--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8292--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8292--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8292--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8292--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8292--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8292--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8292--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8292--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8292--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8292--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8292--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8292--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8292--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8292--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8292--   Scanning root segment: 0x701a000..0x701afff (4096)
--8292--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8292--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8292--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8292--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8292--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8292--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8292--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8292== Checked 1,423,704 bytes
==8292== 
==8292== LEAK SUMMARY:
==8292==    definitely lost: 253 bytes in 4 blocks
==8292==    indirectly lost: 6,756 bytes in 7 blocks
==8292==      possibly lost: 0 bytes in 0 blocks
==8292==    still reachable: 1,126,880 bytes in 25,124 blocks
==8292==         suppressed: 0 bytes in 0 blocks
==8292== Rerun with --leak-check=full to see details of leaked memory
==8292== 
==8292== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8292== 
==8292== 1 errors in context 1 of 1:
==8292== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8292==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8292==    by 0x488CD0: stringsubst (subst.c:301)
==8292==    by 0x48801B: prefork (subst.c:77)
==8292==    by 0x42B318: execcmd (exec.c:2619)
==8292==    by 0x428CA0: execpline2 (exec.c:1697)
==8292==    by 0x427FD2: execpline (exec.c:1484)
==8292==    by 0x427756: execlist (exec.c:1267)
==8292==    by 0x42717C: execode (exec.c:1073)
==8292==    by 0x431299: runshfunc (exec.c:5040)
==8292==    by 0x430E76: doshfunc (exec.c:4920)
==8292==    by 0x4302FB: execshfunc (exec.c:4557)
==8292==    by 0x42D8C1: execcmd (exec.c:3373)
==8292== 
==8292== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8295== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8295-by-pythonnut-on-???
==8295== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8295-by-pythonnut-on-???
==8295== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8295-by-pythonnut-on-???
==8295== 
==8295== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8295== don't want to do, unless you know exactly what you're doing,
==8295== or are doing some strange experiment):
==8295==   /usr/lib/valgrind/../../bin/vgdb --pid=8295 ...command...
==8295== 
==8295== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8295==   /path/to/gdb ./zsh
==8295== and then give GDB the following command
==8295==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8295
==8295== --pid is optional if only one valgrind process is running
==8295== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8294-- Caught __NR_exit; running __libc_freeres()
==8294== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8294-by-pythonnut-on-???
==8294== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8294-by-pythonnut-on-???
==8294== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8294-by-pythonnut-on-???
==8294== 
==8294== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8294== don't want to do, unless you know exactly what you're doing,
==8294== or are doing some strange experiment):
==8294==   /usr/lib/valgrind/../../bin/vgdb --pid=8294 ...command...
==8294== 
==8294== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8294==   /path/to/gdb ./zsh
==8294== and then give GDB the following command
==8294==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8294
==8294== --pid is optional if only one valgrind process is running
==8294== 
--8294-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8294== 
==8294== HEAP SUMMARY:
==8294==     in use at exit: 1,134,165 bytes in 25,136 blocks
==8294==   total heap usage: 653,151 allocs, 628,015 frees, 31,363,408 bytes allocated
==8294== 
==8294== Searching for pointers to 25,136 not-freed blocks
--8294--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8294--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8294--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8294--   Scanning root segment: 0x402a000..0x402efff (20480)
--8294--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8294--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8294--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8294--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8294--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8294--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8294--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8294--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8294--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8294--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8294--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8294--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8294--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8294--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8294--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8294--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8294--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8294--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8294--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8294--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8294--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8294--   Scanning root segment: 0x701a000..0x701afff (4096)
--8294--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8294--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8294--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8294--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8294--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8294--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8294--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8294== Checked 1,423,968 bytes
==8294== 
==8294== LEAK SUMMARY:
==8294==    definitely lost: 253 bytes in 4 blocks
==8294==    indirectly lost: 6,756 bytes in 7 blocks
==8294==      possibly lost: 0 bytes in 0 blocks
==8294==    still reachable: 1,127,156 bytes in 25,125 blocks
==8294==         suppressed: 0 bytes in 0 blocks
==8294== Rerun with --leak-check=full to see details of leaked memory
==8294== 
==8294== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8294== 
==8294== 1 errors in context 1 of 1:
==8294== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8294==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8294==    by 0x488CD0: stringsubst (subst.c:301)
==8294==    by 0x48801B: prefork (subst.c:77)
==8294==    by 0x42B318: execcmd (exec.c:2619)
==8294==    by 0x428CA0: execpline2 (exec.c:1697)
==8294==    by 0x427FD2: execpline (exec.c:1484)
==8294==    by 0x427756: execlist (exec.c:1267)
==8294==    by 0x42717C: execode (exec.c:1073)
==8294==    by 0x431299: runshfunc (exec.c:5040)
==8294==    by 0x430E76: doshfunc (exec.c:4920)
==8294==    by 0x4302FB: execshfunc (exec.c:4557)
==8294==    by 0x42D8C1: execcmd (exec.c:3373)
==8294== 
==8294== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8296-- Caught __NR_exit; running __libc_freeres()
==8296== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8296-by-pythonnut-on-???
==8296== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8296-by-pythonnut-on-???
==8296== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8296-by-pythonnut-on-???
==8296== 
==8296== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8296== don't want to do, unless you know exactly what you're doing,
==8296== or are doing some strange experiment):
==8296==   /usr/lib/valgrind/../../bin/vgdb --pid=8296 ...command...
==8296== 
==8296== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8296==   /path/to/gdb ./zsh
==8296== and then give GDB the following command
==8296==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8296
==8296== --pid is optional if only one valgrind process is running
==8296== 
--8296-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8296== 
==8296== HEAP SUMMARY:
==8296==     in use at exit: 1,134,587 bytes in 25,144 blocks
==8296==   total heap usage: 653,253 allocs, 628,109 frees, 31,370,874 bytes allocated
==8296== 
==8296== Searching for pointers to 25,144 not-freed blocks
--8296--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8296--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8296--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8296--   Scanning root segment: 0x402a000..0x402efff (20480)
--8296--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8296--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8296--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8296--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8296--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8296--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8296--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8296--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8296--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8296--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8296--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8296--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8296--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8296--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8296--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8296--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8296--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8296--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8296--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8296--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8296--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8296--   Scanning root segment: 0x701a000..0x701afff (4096)
--8296--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8296--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8296--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8296--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8296--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8296--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8296--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8296== Checked 1,424,352 bytes
==8296== 
==8296== LEAK SUMMARY:
==8296==    definitely lost: 253 bytes in 4 blocks
==8296==    indirectly lost: 6,756 bytes in 7 blocks
==8296==      possibly lost: 0 bytes in 0 blocks
==8296==    still reachable: 1,127,578 bytes in 25,133 blocks
==8296==         suppressed: 0 bytes in 0 blocks
==8296== Rerun with --leak-check=full to see details of leaked memory
==8296== 
==8296== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8296== 
==8296== 1 errors in context 1 of 1:
==8296== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8296==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8296==    by 0x488CD0: stringsubst (subst.c:301)
==8296==    by 0x48801B: prefork (subst.c:77)
==8296==    by 0x42B318: execcmd (exec.c:2619)
==8296==    by 0x428CA0: execpline2 (exec.c:1697)
==8296==    by 0x427FD2: execpline (exec.c:1484)
==8296==    by 0x427756: execlist (exec.c:1267)
==8296==    by 0x42717C: execode (exec.c:1073)
==8296==    by 0x431299: runshfunc (exec.c:5040)
==8296==    by 0x430E76: doshfunc (exec.c:4920)
==8296==    by 0x4302FB: execshfunc (exec.c:4557)
==8296==    by 0x42D8C1: execcmd (exec.c:3373)
==8296== 
==8296== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8298-- Caught __NR_exit; running __libc_freeres()
==8298== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8298-by-pythonnut-on-???
==8298== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8298-by-pythonnut-on-???
==8298== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8298-by-pythonnut-on-???
==8298== 
==8298== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8298== don't want to do, unless you know exactly what you're doing,
==8298== or are doing some strange experiment):
==8298==   /usr/lib/valgrind/../../bin/vgdb --pid=8298 ...command...
==8298== 
==8298== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8298==   /path/to/gdb ./zsh
==8298== and then give GDB the following command
==8298==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8298
==8298== --pid is optional if only one valgrind process is running
==8298== 
--8298-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8298== 
==8298== HEAP SUMMARY:
==8298==     in use at exit: 1,135,021 bytes in 25,159 blocks
==8298==   total heap usage: 653,390 allocs, 628,231 frees, 31,380,696 bytes allocated
==8298== 
==8298== Searching for pointers to 25,159 not-freed blocks
--8298--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8298--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8298--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8298--   Scanning root segment: 0x402a000..0x402efff (20480)
--8298--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8298--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8298--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8298--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8298--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8298--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8298--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8298--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8298--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8298--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8298--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8298--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8298--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8298--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8298--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8298--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8298--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8298--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8298--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8298--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8298--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8298--   Scanning root segment: 0x701a000..0x701afff (4096)
--8298--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8298--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8298--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8298--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8298--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8298--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8298--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8298== Checked 1,424,744 bytes
==8298== 
==8298== LEAK SUMMARY:
==8298==    definitely lost: 253 bytes in 4 blocks
==8298==    indirectly lost: 6,756 bytes in 7 blocks
==8298==      possibly lost: 0 bytes in 0 blocks
==8298==    still reachable: 1,128,012 bytes in 25,148 blocks
==8298==         suppressed: 0 bytes in 0 blocks
==8298== Rerun with --leak-check=full to see details of leaked memory
==8298== 
==8298== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8298== 
==8298== 1 errors in context 1 of 1:
==8298== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8298==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8298==    by 0x488CD0: stringsubst (subst.c:301)
==8298==    by 0x48801B: prefork (subst.c:77)
==8298==    by 0x42B318: execcmd (exec.c:2619)
==8298==    by 0x428CA0: execpline2 (exec.c:1697)
==8298==    by 0x427FD2: execpline (exec.c:1484)
==8298==    by 0x427756: execlist (exec.c:1267)
==8298==    by 0x42717C: execode (exec.c:1073)
==8298==    by 0x431299: runshfunc (exec.c:5040)
==8298==    by 0x430E76: doshfunc (exec.c:4920)
==8298==    by 0x4302FB: execshfunc (exec.c:4557)
==8298==    by 0x42D8C1: execcmd (exec.c:3373)
==8298== 
==8298== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8300== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8300-by-pythonnut-on-???
==8300== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8300-by-pythonnut-on-???
==8300== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8300-by-pythonnut-on-???
==8300== 
==8300== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8300== don't want to do, unless you know exactly what you're doing,
==8300== or are doing some strange experiment):
==8300==   /usr/lib/valgrind/../../bin/vgdb --pid=8300 ...command...
==8300== 
==8300== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8300==   /path/to/gdb ./zsh
==8300== and then give GDB the following command
==8300==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8300
==8300== --pid is optional if only one valgrind process is running
==8300== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8300-- Caught __NR_exit; running __libc_freeres()
--8300-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8300== 
==8300== HEAP SUMMARY:
==8300==     in use at exit: 1,135,297 bytes in 25,160 blocks
==8300==   total heap usage: 653,493 allocs, 628,333 frees, 31,388,284 bytes allocated
==8300== 
==8300== Searching for pointers to 25,160 not-freed blocks
--8300--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8300--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8300--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8300--   Scanning root segment: 0x402a000..0x402efff (20480)
--8300--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8300--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8300--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8300--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8300--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8300--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8300--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8300--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8300--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8300--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8300--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8300--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8300--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8300--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8300--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8300--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8300--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8300--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8300--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8300--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8300--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8300--   Scanning root segment: 0x701a000..0x701afff (4096)
--8300--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8300--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8300--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8300--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8300--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8300--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8300--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8300== Checked 1,425,008 bytes
==8300== 
==8300== LEAK SUMMARY:
==8300==    definitely lost: 253 bytes in 4 blocks
==8300==    indirectly lost: 6,756 bytes in 7 blocks
==8300==      possibly lost: 0 bytes in 0 blocks
==8300==    still reachable: 1,128,288 bytes in 25,149 blocks
==8300==         suppressed: 0 bytes in 0 blocks
==8300== Rerun with --leak-check=full to see details of leaked memory
==8300== 
==8300== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8300== 
==8300== 1 errors in context 1 of 1:
==8300== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8300==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8300==    by 0x488CD0: stringsubst (subst.c:301)
==8300==    by 0x48801B: prefork (subst.c:77)
==8300==    by 0x42B318: execcmd (exec.c:2619)
==8300==    by 0x428CA0: execpline2 (exec.c:1697)
==8300==    by 0x427FD2: execpline (exec.c:1484)
==8300==    by 0x427756: execlist (exec.c:1267)
==8300==    by 0x42717C: execode (exec.c:1073)
==8300==    by 0x431299: runshfunc (exec.c:5040)
==8300==    by 0x430E76: doshfunc (exec.c:4920)
==8300==    by 0x4302FB: execshfunc (exec.c:4557)
==8300==    by 0x42D8C1: execcmd (exec.c:3373)
==8300== 
==8300== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8303== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8303-by-pythonnut-on-???
==8303== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8303-by-pythonnut-on-???
==8303== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8303-by-pythonnut-on-???
==8303== 
==8303== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8303== don't want to do, unless you know exactly what you're doing,
==8303== or are doing some strange experiment):
==8303==   /usr/lib/valgrind/../../bin/vgdb --pid=8303 ...command...
==8303== 
==8303== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8303==   /path/to/gdb ./zsh
==8303== and then give GDB the following command
==8303==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8303
==8303== --pid is optional if only one valgrind process is running
==8303== 
client request: code 4d430005,  addr 0xFFEFEF49C,  len 4
--8302-- Caught __NR_exit; running __libc_freeres()
==8302== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8302-by-pythonnut-on-???
==8302== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8302-by-pythonnut-on-???
==8302== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8302-by-pythonnut-on-???
==8302== 
==8302== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8302== don't want to do, unless you know exactly what you're doing,
==8302== or are doing some strange experiment):
==8302==   /usr/lib/valgrind/../../bin/vgdb --pid=8302 ...command...
==8302== 
==8302== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8302==   /path/to/gdb ./zsh
==8302== and then give GDB the following command
==8302==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8302
==8302== --pid is optional if only one valgrind process is running
==8302== 
--8302-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8302== 
==8302== HEAP SUMMARY:
==8302==     in use at exit: 1,135,719 bytes in 25,168 blocks
==8302==   total heap usage: 653,595 allocs, 628,427 frees, 31,395,750 bytes allocated
==8302== 
==8302== Searching for pointers to 25,168 not-freed blocks
--8302--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8302--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8302--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8302--   Scanning root segment: 0x402a000..0x402efff (20480)
--8302--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8302--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8302--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8302--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8302--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8302--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8302--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8302--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8302--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8302--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8302--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8302--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8302--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8302--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8302--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8302--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8302--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8302--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8302--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8302--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8302--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8302--   Scanning root segment: 0x701a000..0x701afff (4096)
--8302--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8302--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8302--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8302--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8302--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8302--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8302--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8302== Checked 1,425,392 bytes
==8302== 
==8302== LEAK SUMMARY:
==8302==    definitely lost: 253 bytes in 4 blocks
==8302==    indirectly lost: 6,756 bytes in 7 blocks
==8302==      possibly lost: 0 bytes in 0 blocks
==8302==    still reachable: 1,128,710 bytes in 25,157 blocks
==8302==         suppressed: 0 bytes in 0 blocks
==8302== Rerun with --leak-check=full to see details of leaked memory
==8302== 
==8302== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8302== 
==8302== 1 errors in context 1 of 1:
==8302== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8302==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8302==    by 0x488CD0: stringsubst (subst.c:301)
==8302==    by 0x48801B: prefork (subst.c:77)
==8302==    by 0x42B318: execcmd (exec.c:2619)
==8302==    by 0x428CA0: execpline2 (exec.c:1697)
==8302==    by 0x427FD2: execpline (exec.c:1484)
==8302==    by 0x427756: execlist (exec.c:1267)
==8302==    by 0x42717C: execode (exec.c:1073)
==8302==    by 0x431299: runshfunc (exec.c:5040)
==8302==    by 0x430E76: doshfunc (exec.c:4920)
==8302==    by 0x4302FB: execshfunc (exec.c:4557)
==8302==    by 0x42D8C1: execcmd (exec.c:3373)
==8302== 
==8302== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8304== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8304-by-pythonnut-on-???
==8304== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8304-by-pythonnut-on-???
==8304== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8304-by-pythonnut-on-???
==8304== 
==8304== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8304== don't want to do, unless you know exactly what you're doing,
==8304== or are doing some strange experiment):
==8304==   /usr/lib/valgrind/../../bin/vgdb --pid=8304 ...command...
==8304== 
==8304== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8304==   /path/to/gdb ./zsh
==8304== and then give GDB the following command
==8304==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8304
==8304== --pid is optional if only one valgrind process is running
==8304== 
client request: code 4d430005,  addr 0xFFEFF10CC,  len 4
--8304-- Caught __NR_exit; running __libc_freeres()
--8304-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8304== 
==8304== HEAP SUMMARY:
==8304==     in use at exit: 1,135,001 bytes in 25,161 blocks
==8304==   total heap usage: 653,729 allocs, 628,568 frees, 31,408,086 bytes allocated
==8304== 
==8304== Searching for pointers to 25,161 not-freed blocks
--8304--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8304--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8304--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8304--   Scanning root segment: 0x402a000..0x402afff (4096)
--8304--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8304--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8304--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8304--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8304--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8304--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8304--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8304--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8304--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8304--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8304--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8304--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8304--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8304--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8304--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8304--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8304--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8304--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8304--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8304--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8304--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8304--   Scanning root segment: 0x701a000..0x701afff (4096)
--8304--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8304--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8304--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8304--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8304--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8304--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8304--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8304== Checked 1,406,216 bytes
==8304== 
==8304== LEAK SUMMARY:
==8304==    definitely lost: 253 bytes in 4 blocks
==8304==    indirectly lost: 6,756 bytes in 7 blocks
==8304==      possibly lost: 0 bytes in 0 blocks
==8304==    still reachable: 1,127,992 bytes in 25,150 blocks
==8304==         suppressed: 0 bytes in 0 blocks
==8304== Rerun with --leak-check=full to see details of leaked memory
==8304== 
==8304== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8304== 
==8304== 1 errors in context 1 of 1:
==8304== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8304==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8304==    by 0x488CD0: stringsubst (subst.c:301)
==8304==    by 0x48801B: prefork (subst.c:77)
==8304==    by 0x42B318: execcmd (exec.c:2619)
==8304==    by 0x428CA0: execpline2 (exec.c:1697)
==8304==    by 0x427FD2: execpline (exec.c:1484)
==8304==    by 0x427756: execlist (exec.c:1267)
==8304==    by 0x42717C: execode (exec.c:1073)
==8304==    by 0x431299: runshfunc (exec.c:5040)
==8304==    by 0x430E76: doshfunc (exec.c:4920)
==8304==    by 0x4302FB: execshfunc (exec.c:4557)
==8304==    by 0x42D8C1: execcmd (exec.c:3373)
==8304== 
==8304== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8307== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8307-by-pythonnut-on-???
==8307== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8307-by-pythonnut-on-???
==8307== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8307-by-pythonnut-on-???
==8307== 
==8307== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8307== don't want to do, unless you know exactly what you're doing,
==8307== or are doing some strange experiment):
==8307==   /usr/lib/valgrind/../../bin/vgdb --pid=8307 ...command...
==8307== 
==8307== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8307==   /path/to/gdb ./zsh
==8307== and then give GDB the following command
==8307==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8307
==8307== --pid is optional if only one valgrind process is running
==8307== 
client request: code 4d430005,  addr 0xFFEFF10CC,  len 4
--8306-- Caught __NR_exit; running __libc_freeres()
==8306== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8306-by-pythonnut-on-???
==8306== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8306-by-pythonnut-on-???
==8306== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8306-by-pythonnut-on-???
==8306== 
==8306== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8306== don't want to do, unless you know exactly what you're doing,
==8306== or are doing some strange experiment):
==8306==   /usr/lib/valgrind/../../bin/vgdb --pid=8306 ...command...
==8306== 
==8306== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8306==   /path/to/gdb ./zsh
==8306== and then give GDB the following command
==8306==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8306
==8306== --pid is optional if only one valgrind process is running
==8306== 
--8306-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8306== 
==8306== HEAP SUMMARY:
==8306==     in use at exit: 1,135,359 bytes in 25,169 blocks
==8306==   total heap usage: 653,830 allocs, 628,661 frees, 31,415,434 bytes allocated
==8306== 
==8306== Searching for pointers to 25,169 not-freed blocks
--8306--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8306--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8306--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8306--   Scanning root segment: 0x402a000..0x402afff (4096)
--8306--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8306--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8306--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8306--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8306--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8306--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8306--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8306--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8306--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8306--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8306--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8306--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8306--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8306--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8306--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8306--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8306--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8306--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8306--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8306--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8306--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8306--   Scanning root segment: 0x701a000..0x701afff (4096)
--8306--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8306--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8306--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8306--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8306--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8306--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8306--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8306== Checked 1,406,544 bytes
==8306== 
==8306== LEAK SUMMARY:
==8306==    definitely lost: 253 bytes in 4 blocks
==8306==    indirectly lost: 6,756 bytes in 7 blocks
==8306==      possibly lost: 0 bytes in 0 blocks
==8306==    still reachable: 1,128,350 bytes in 25,158 blocks
==8306==         suppressed: 0 bytes in 0 blocks
==8306== Rerun with --leak-check=full to see details of leaked memory
==8306== 
==8306== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8306== 
==8306== 1 errors in context 1 of 1:
==8306== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8306==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8306==    by 0x488CD0: stringsubst (subst.c:301)
==8306==    by 0x48801B: prefork (subst.c:77)
==8306==    by 0x42B318: execcmd (exec.c:2619)
==8306==    by 0x428CA0: execpline2 (exec.c:1697)
==8306==    by 0x427FD2: execpline (exec.c:1484)
==8306==    by 0x427756: execlist (exec.c:1267)
==8306==    by 0x42717C: execode (exec.c:1073)
==8306==    by 0x431299: runshfunc (exec.c:5040)
==8306==    by 0x430E76: doshfunc (exec.c:4920)
==8306==    by 0x4302FB: execshfunc (exec.c:4557)
==8306==    by 0x42D8C1: execcmd (exec.c:3373)
==8306== 
==8306== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF10CC,  len 4
--8308-- Caught __NR_exit; running __libc_freeres()
==8308== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8308-by-pythonnut-on-???
==8308== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8308-by-pythonnut-on-???
==8308== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8308-by-pythonnut-on-???
==8308== 
==8308== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8308== don't want to do, unless you know exactly what you're doing,
==8308== or are doing some strange experiment):
==8308==   /usr/lib/valgrind/../../bin/vgdb --pid=8308 ...command...
==8308== 
==8308== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8308==   /path/to/gdb ./zsh
==8308== and then give GDB the following command
==8308==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8308
==8308== --pid is optional if only one valgrind process is running
==8308== 
--8308-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8308== 
==8308== HEAP SUMMARY:
==8308==     in use at exit: 1,135,717 bytes in 25,177 blocks
==8308==   total heap usage: 653,931 allocs, 628,754 frees, 31,422,782 bytes allocated
==8308== 
==8308== Searching for pointers to 25,177 not-freed blocks
--8308--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8308--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8308--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8308--   Scanning root segment: 0x402a000..0x402afff (4096)
--8308--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8308--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8308--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8308--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8308--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8308--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8308--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8308--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8308--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8308--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8308--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8308--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8308--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8308--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8308--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8308--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8308--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8308--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8308--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8308--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8308--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8308--   Scanning root segment: 0x701a000..0x701afff (4096)
--8308--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8308--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8308--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8308--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8308--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8308--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8308--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8308== Checked 1,406,872 bytes
==8308== 
==8308== LEAK SUMMARY:
==8308==    definitely lost: 253 bytes in 4 blocks
==8308==    indirectly lost: 6,756 bytes in 7 blocks
==8308==      possibly lost: 0 bytes in 0 blocks
==8308==    still reachable: 1,128,708 bytes in 25,166 blocks
==8308==         suppressed: 0 bytes in 0 blocks
==8308== Rerun with --leak-check=full to see details of leaked memory
==8308== 
==8308== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8308== 
==8308== 1 errors in context 1 of 1:
==8308== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8308==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8308==    by 0x488CD0: stringsubst (subst.c:301)
==8308==    by 0x48801B: prefork (subst.c:77)
==8308==    by 0x42B318: execcmd (exec.c:2619)
==8308==    by 0x428CA0: execpline2 (exec.c:1697)
==8308==    by 0x427FD2: execpline (exec.c:1484)
==8308==    by 0x427756: execlist (exec.c:1267)
==8308==    by 0x42717C: execode (exec.c:1073)
==8308==    by 0x431299: runshfunc (exec.c:5040)
==8308==    by 0x430E76: doshfunc (exec.c:4920)
==8308==    by 0x4302FB: execshfunc (exec.c:4557)
==8308==    by 0x42D8C1: execcmd (exec.c:3373)
==8308== 
==8308== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF3F6C,  len 4
--8311-- Caught __NR_exit; running __libc_freeres()
==8311== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8311-by-pythonnut-on-???
==8311== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8311-by-pythonnut-on-???
==8311== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8311-by-pythonnut-on-???
==8311== 
==8311== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8311== don't want to do, unless you know exactly what you're doing,
==8311== or are doing some strange experiment):
==8311==   /usr/lib/valgrind/../../bin/vgdb --pid=8311 ...command...
==8311== 
==8311== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8311==   /path/to/gdb ./zsh
==8311== and then give GDB the following command
==8311==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8311
==8311== --pid is optional if only one valgrind process is running
==8311== 
client request: code 4d430005,  addr 0xFFEFF375C,  len 4
--8311-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8311== 
==8311== HEAP SUMMARY:
==8311==     in use at exit: 1,161,355 bytes in 25,415 blocks
==8311==   total heap usage: 655,635 allocs, 630,220 frees, 31,716,937 bytes allocated
==8311== 
==8311== Searching for pointers to 25,415 not-freed blocks
--8311--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8311--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8311--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8311--   Scanning root segment: 0x402c000..0x402cfff (4096)
--8311--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8311--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8311--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8311--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8311--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8311--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8311--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8311--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8311--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8311--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8311--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8311--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8311--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8311--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8311--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8311--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8311--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8311--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8311--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8311--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8311--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8311--   Scanning root segment: 0x701a000..0x701afff (4096)
--8311--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8311--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8311--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8311--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8311--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8311--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8311--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8311== Checked 1,430,560 bytes
==8311== 
==8311== LEAK SUMMARY:
==8311==    definitely lost: 253 bytes in 4 blocks
==8311==    indirectly lost: 6,756 bytes in 7 blocks
==8311==      possibly lost: 0 bytes in 0 blocks
==8311==    still reachable: 1,154,346 bytes in 25,404 blocks
==8311==         suppressed: 0 bytes in 0 blocks
==8311== Rerun with --leak-check=full to see details of leaked memory
==8311== 
==8311== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8311== 
==8311== 1 errors in context 1 of 1:
==8311== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8311==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8311==    by 0x488CD0: stringsubst (subst.c:301)
==8311==    by 0x48801B: prefork (subst.c:77)
==8311==    by 0x42B318: execcmd (exec.c:2619)
==8311==    by 0x428CA0: execpline2 (exec.c:1697)
==8311==    by 0x427FD2: execpline (exec.c:1484)
==8311==    by 0x427756: execlist (exec.c:1267)
==8311==    by 0x42717C: execode (exec.c:1073)
==8311==    by 0x431299: runshfunc (exec.c:5040)
==8311==    by 0x430E76: doshfunc (exec.c:4920)
==8311==    by 0x4302FB: execshfunc (exec.c:4557)
==8311==    by 0x42D8C1: execcmd (exec.c:3373)
==8311== 
==8311== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8313== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8313-by-pythonnut-on-???
==8313== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8313-by-pythonnut-on-???
==8313== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8313-by-pythonnut-on-???
==8313== 
==8313== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8313== don't want to do, unless you know exactly what you're doing,
==8313== or are doing some strange experiment):
==8313==   /usr/lib/valgrind/../../bin/vgdb --pid=8313 ...command...
==8313== 
==8313== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8313==   /path/to/gdb ./zsh
==8313== and then give GDB the following command
==8313==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8313
==8313== --pid is optional if only one valgrind process is running
==8313== 
--8313-- Caught __NR_exit; running __libc_freeres()
--8313-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8313== 
==8313== HEAP SUMMARY:
==8313==     in use at exit: 1,326,069 bytes in 29,207 blocks
==8313==   total heap usage: 715,401 allocs, 686,194 frees, 38,075,421 bytes allocated
==8313== 
==8313== Searching for pointers to 29,207 not-freed blocks
--8313--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8313--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8313--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8313--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8313--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8313--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8313--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8313--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8313--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8313--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8313--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8313--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8313--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8313--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8313--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8313--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8313--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8313--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8313--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8313--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8313--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8313--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8313--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8313--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8313--   Scanning root segment: 0x701a000..0x701afff (4096)
--8313--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8313--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8313--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8313--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8313--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8313--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8313--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8313== Checked 1,579,368 bytes
==8313== 
==8313== LEAK SUMMARY:
==8313==    definitely lost: 253 bytes in 4 blocks
==8313==    indirectly lost: 6,756 bytes in 7 blocks
==8313==      possibly lost: 0 bytes in 0 blocks
==8313==    still reachable: 1,319,060 bytes in 29,196 blocks
==8313==         suppressed: 0 bytes in 0 blocks
==8313== Rerun with --leak-check=full to see details of leaked memory
==8313== 
==8313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8313== 
==8313== 1 errors in context 1 of 1:
==8313== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8313==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8313==    by 0x488CD0: stringsubst (subst.c:301)
==8313==    by 0x48801B: prefork (subst.c:77)
==8313==    by 0x42B318: execcmd (exec.c:2619)
==8313==    by 0x428CA0: execpline2 (exec.c:1697)
==8313==    by 0x427FD2: execpline (exec.c:1484)
==8313==    by 0x427756: execlist (exec.c:1267)
==8313==    by 0x42717C: execode (exec.c:1073)
==8313==    by 0x431299: runshfunc (exec.c:5040)
==8313==    by 0x430E76: doshfunc (exec.c:4920)
==8313==    by 0x4302FB: execshfunc (exec.c:4557)
==8313==    by 0x42D8C1: execcmd (exec.c:3373)
==8313== 
==8313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8314-- Caught __NR_exit; running __libc_freeres()
==8314== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8314-by-pythonnut-on-???
==8314== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8314-by-pythonnut-on-???
==8314== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8314-by-pythonnut-on-???
==8314== 
==8314== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8314== don't want to do, unless you know exactly what you're doing,
==8314== or are doing some strange experiment):
==8314==   /usr/lib/valgrind/../../bin/vgdb --pid=8314 ...command...
==8314== 
==8314== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8314==   /path/to/gdb ./zsh
==8314== and then give GDB the following command
==8314==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8314
==8314== --pid is optional if only one valgrind process is running
==8314== 
--8314-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8314== 
==8314== HEAP SUMMARY:
==8314==     in use at exit: 1,298,980 bytes in 27,997 blocks
==8314==   total heap usage: 778,783 allocs, 750,786 frees, 44,652,824 bytes allocated
==8314== 
==8314== Searching for pointers to 27,997 not-freed blocks
--8314--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8314--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8314--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8314--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8314--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8314--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8314--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8314--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8314--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8314--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8314--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8314--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8314--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8314--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8314--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8314--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8314--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8314--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8314--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8314--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8314--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8314--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8314--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8314--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8314--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8314--   Scanning root segment: 0x701a000..0x701afff (4096)
--8314--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8314--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8314--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8314--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8314--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8314--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8314--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8314== Checked 1,583,896 bytes
==8314== 
==8314== LEAK SUMMARY:
==8314==    definitely lost: 253 bytes in 4 blocks
==8314==    indirectly lost: 6,756 bytes in 7 blocks
==8314==      possibly lost: 0 bytes in 0 blocks
==8314==    still reachable: 1,291,971 bytes in 27,986 blocks
==8314==         suppressed: 0 bytes in 0 blocks
==8314== Rerun with --leak-check=full to see details of leaked memory
==8314== 
==8314== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8314== 
==8314== 1 errors in context 1 of 1:
==8314== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8314==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8314==    by 0x488CD0: stringsubst (subst.c:301)
==8314==    by 0x48801B: prefork (subst.c:77)
==8314==    by 0x42B318: execcmd (exec.c:2619)
==8314==    by 0x428CA0: execpline2 (exec.c:1697)
==8314==    by 0x427FD2: execpline (exec.c:1484)
==8314==    by 0x427756: execlist (exec.c:1267)
==8314==    by 0x42717C: execode (exec.c:1073)
==8314==    by 0x431299: runshfunc (exec.c:5040)
==8314==    by 0x430E76: doshfunc (exec.c:4920)
==8314==    by 0x4302FB: execshfunc (exec.c:4557)
==8314==    by 0x42D8C1: execcmd (exec.c:3373)
==8314== 
==8314== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8315-- Caught __NR_exit; running __libc_freeres()
==8315== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8315-by-pythonnut-on-???
==8315== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8315-by-pythonnut-on-???
==8315== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8315-by-pythonnut-on-???
==8315== 
==8315== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8315== don't want to do, unless you know exactly what you're doing,
==8315== or are doing some strange experiment):
==8315==   /usr/lib/valgrind/../../bin/vgdb --pid=8315 ...command...
==8315== 
==8315== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8315==   /path/to/gdb ./zsh
==8315== and then give GDB the following command
==8315==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8315
==8315== --pid is optional if only one valgrind process is running
==8315== 
--8315-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8315== 
==8315== HEAP SUMMARY:
==8315==     in use at exit: 1,299,104 bytes in 27,998 blocks
==8315==   total heap usage: 778,890 allocs, 750,892 frees, 45,003,296 bytes allocated
==8315== 
==8315== Searching for pointers to 27,998 not-freed blocks
--8315--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8315--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8315--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8315--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8315--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8315--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8315--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8315--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8315--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8315--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8315--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8315--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8315--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8315--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8315--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8315--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8315--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8315--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8315--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8315--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8315--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8315--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8315--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8315--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8315--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8315--   Scanning root segment: 0x701a000..0x701afff (4096)
--8315--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8315--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8315--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8315--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8315--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8315--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8315--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8315== Checked 1,584,024 bytes
==8315== 
==8315== LEAK SUMMARY:
==8315==    definitely lost: 253 bytes in 4 blocks
==8315==    indirectly lost: 6,756 bytes in 7 blocks
==8315==      possibly lost: 0 bytes in 0 blocks
==8315==    still reachable: 1,292,095 bytes in 27,987 blocks
==8315==         suppressed: 0 bytes in 0 blocks
==8315== Rerun with --leak-check=full to see details of leaked memory
==8315== 
==8315== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8315== 
==8315== 1 errors in context 1 of 1:
==8315== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8315==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8315==    by 0x488CD0: stringsubst (subst.c:301)
==8315==    by 0x48801B: prefork (subst.c:77)
==8315==    by 0x42B318: execcmd (exec.c:2619)
==8315==    by 0x428CA0: execpline2 (exec.c:1697)
==8315==    by 0x427FD2: execpline (exec.c:1484)
==8315==    by 0x427756: execlist (exec.c:1267)
==8315==    by 0x42717C: execode (exec.c:1073)
==8315==    by 0x431299: runshfunc (exec.c:5040)
==8315==    by 0x430E76: doshfunc (exec.c:4920)
==8315==    by 0x4302FB: execshfunc (exec.c:4557)
==8315==    by 0x42D8C1: execcmd (exec.c:3373)
==8315== 
==8315== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8316-- Caught __NR_exit; running __libc_freeres()
==8316== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8316-by-pythonnut-on-???
==8316== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8316-by-pythonnut-on-???
==8316== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8316-by-pythonnut-on-???
==8316== 
==8316== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8316== don't want to do, unless you know exactly what you're doing,
==8316== or are doing some strange experiment):
==8316==   /usr/lib/valgrind/../../bin/vgdb --pid=8316 ...command...
==8316== 
==8316== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8316==   /path/to/gdb ./zsh
==8316== and then give GDB the following command
==8316==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8316
==8316== --pid is optional if only one valgrind process is running
==8316== 
--8316-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8316== 
==8316== HEAP SUMMARY:
==8316==     in use at exit: 1,299,068 bytes in 27,998 blocks
==8316==   total heap usage: 778,996 allocs, 750,998 frees, 45,353,616 bytes allocated
==8316== 
==8316== Searching for pointers to 27,998 not-freed blocks
--8316--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8316--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8316--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8316--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8316--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8316--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8316--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8316--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8316--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8316--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8316--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8316--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8316--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8316--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8316--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8316--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8316--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8316--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8316--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8316--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8316--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8316--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8316--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8316--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8316--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8316--   Scanning root segment: 0x701a000..0x701afff (4096)
--8316--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8316--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8316--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8316--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8316--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8316--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8316--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8316== Checked 1,583,976 bytes
==8316== 
==8316== LEAK SUMMARY:
==8316==    definitely lost: 253 bytes in 4 blocks
==8316==    indirectly lost: 6,756 bytes in 7 blocks
==8316==      possibly lost: 0 bytes in 0 blocks
==8316==    still reachable: 1,292,059 bytes in 27,987 blocks
==8316==         suppressed: 0 bytes in 0 blocks
==8316== Rerun with --leak-check=full to see details of leaked memory
==8316== 
==8316== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8316== 
==8316== 1 errors in context 1 of 1:
==8316== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8316==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8316==    by 0x488CD0: stringsubst (subst.c:301)
==8316==    by 0x48801B: prefork (subst.c:77)
==8316==    by 0x42B318: execcmd (exec.c:2619)
==8316==    by 0x428CA0: execpline2 (exec.c:1697)
==8316==    by 0x427FD2: execpline (exec.c:1484)
==8316==    by 0x427756: execlist (exec.c:1267)
==8316==    by 0x42717C: execode (exec.c:1073)
==8316==    by 0x431299: runshfunc (exec.c:5040)
==8316==    by 0x430E76: doshfunc (exec.c:4920)
==8316==    by 0x4302FB: execshfunc (exec.c:4557)
==8316==    by 0x42D8C1: execcmd (exec.c:3373)
==8316== 
==8316== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8317-- Caught __NR_exit; running __libc_freeres()
==8317== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8317-by-pythonnut-on-???
==8317== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8317-by-pythonnut-on-???
==8317== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8317-by-pythonnut-on-???
==8317== 
==8317== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8317== don't want to do, unless you know exactly what you're doing,
==8317== or are doing some strange experiment):
==8317==   /usr/lib/valgrind/../../bin/vgdb --pid=8317 ...command...
==8317== 
==8317== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8317==   /path/to/gdb ./zsh
==8317== and then give GDB the following command
==8317==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8317
==8317== --pid is optional if only one valgrind process is running
==8317== 
--8317-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8317== 
==8317== HEAP SUMMARY:
==8317==     in use at exit: 1,299,074 bytes in 27,998 blocks
==8317==   total heap usage: 779,102 allocs, 751,104 frees, 45,703,920 bytes allocated
==8317== 
==8317== Searching for pointers to 27,998 not-freed blocks
--8317--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8317--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8317--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8317--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8317--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8317--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8317--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8317--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8317--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8317--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8317--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8317--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8317--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8317--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8317--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8317--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8317--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8317--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8317--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8317--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8317--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8317--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8317--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8317--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8317--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8317--   Scanning root segment: 0x701a000..0x701afff (4096)
--8317--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8317--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8317--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8317--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8317--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8317--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8317--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8317== Checked 1,583,976 bytes
==8317== 
==8317== LEAK SUMMARY:
==8317==    definitely lost: 253 bytes in 4 blocks
==8317==    indirectly lost: 6,756 bytes in 7 blocks
==8317==      possibly lost: 0 bytes in 0 blocks
==8317==    still reachable: 1,292,065 bytes in 27,987 blocks
==8317==         suppressed: 0 bytes in 0 blocks
==8317== Rerun with --leak-check=full to see details of leaked memory
==8317== 
==8317== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8317== 
==8317== 1 errors in context 1 of 1:
==8317== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8317==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8317==    by 0x488CD0: stringsubst (subst.c:301)
==8317==    by 0x48801B: prefork (subst.c:77)
==8317==    by 0x42B318: execcmd (exec.c:2619)
==8317==    by 0x428CA0: execpline2 (exec.c:1697)
==8317==    by 0x427FD2: execpline (exec.c:1484)
==8317==    by 0x427756: execlist (exec.c:1267)
==8317==    by 0x42717C: execode (exec.c:1073)
==8317==    by 0x431299: runshfunc (exec.c:5040)
==8317==    by 0x430E76: doshfunc (exec.c:4920)
==8317==    by 0x4302FB: execshfunc (exec.c:4557)
==8317==    by 0x42D8C1: execcmd (exec.c:3373)
==8317== 
==8317== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8318-- Caught __NR_exit; running __libc_freeres()
==8318== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8318-by-pythonnut-on-???
==8318== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8318-by-pythonnut-on-???
==8318== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8318-by-pythonnut-on-???
==8318== 
==8318== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8318== don't want to do, unless you know exactly what you're doing,
==8318== or are doing some strange experiment):
==8318==   /usr/lib/valgrind/../../bin/vgdb --pid=8318 ...command...
==8318== 
==8318== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8318==   /path/to/gdb ./zsh
==8318== and then give GDB the following command
==8318==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8318
==8318== --pid is optional if only one valgrind process is running
==8318== 
--8318-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8318== 
==8318== HEAP SUMMARY:
==8318==     in use at exit: 1,299,074 bytes in 27,998 blocks
==8318==   total heap usage: 779,208 allocs, 751,210 frees, 46,054,228 bytes allocated
==8318== 
==8318== Searching for pointers to 27,998 not-freed blocks
--8318--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8318--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8318--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8318--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8318--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8318--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8318--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8318--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8318--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8318--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8318--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8318--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8318--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8318--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8318--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8318--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8318--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8318--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8318--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8318--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8318--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8318--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8318--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8318--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8318--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8318--   Scanning root segment: 0x701a000..0x701afff (4096)
--8318--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8318--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8318--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8318--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8318--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8318--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8318--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8318== Checked 1,583,976 bytes
==8318== 
==8318== LEAK SUMMARY:
==8318==    definitely lost: 253 bytes in 4 blocks
==8318==    indirectly lost: 6,756 bytes in 7 blocks
==8318==      possibly lost: 0 bytes in 0 blocks
==8318==    still reachable: 1,292,065 bytes in 27,987 blocks
==8318==         suppressed: 0 bytes in 0 blocks
==8318== Rerun with --leak-check=full to see details of leaked memory
==8318== 
==8318== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8318== 
==8318== 1 errors in context 1 of 1:
==8318== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8318==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8318==    by 0x488CD0: stringsubst (subst.c:301)
==8318==    by 0x48801B: prefork (subst.c:77)
==8318==    by 0x42B318: execcmd (exec.c:2619)
==8318==    by 0x428CA0: execpline2 (exec.c:1697)
==8318==    by 0x427FD2: execpline (exec.c:1484)
==8318==    by 0x427756: execlist (exec.c:1267)
==8318==    by 0x42717C: execode (exec.c:1073)
==8318==    by 0x431299: runshfunc (exec.c:5040)
==8318==    by 0x430E76: doshfunc (exec.c:4920)
==8318==    by 0x4302FB: execshfunc (exec.c:4557)
==8318==    by 0x42D8C1: execcmd (exec.c:3373)
==8318== 
==8318== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8319-- Caught __NR_exit; running __libc_freeres()
==8319== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8319-by-pythonnut-on-???
==8319== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8319-by-pythonnut-on-???
==8319== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8319-by-pythonnut-on-???
==8319== 
==8319== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8319== don't want to do, unless you know exactly what you're doing,
==8319== or are doing some strange experiment):
==8319==   /usr/lib/valgrind/../../bin/vgdb --pid=8319 ...command...
==8319== 
==8319== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8319==   /path/to/gdb ./zsh
==8319== and then give GDB the following command
==8319==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8319
==8319== --pid is optional if only one valgrind process is running
==8319== 
--8319-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8319== 
==8319== HEAP SUMMARY:
==8319==     in use at exit: 1,299,164 bytes in 27,998 blocks
==8319==   total heap usage: 779,314 allocs, 751,316 frees, 46,404,656 bytes allocated
==8319== 
==8319== Searching for pointers to 27,998 not-freed blocks
--8319--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8319--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8319--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8319--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8319--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8319--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8319--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8319--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8319--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8319--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8319--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8319--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8319--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8319--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8319--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8319--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8319--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8319--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8319--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8319--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8319--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8319--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8319--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8319--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8319--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8319--   Scanning root segment: 0x701a000..0x701afff (4096)
--8319--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8319--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8319--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8319--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8319--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8319--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8319--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8319== Checked 1,584,064 bytes
==8319== 
==8319== LEAK SUMMARY:
==8319==    definitely lost: 253 bytes in 4 blocks
==8319==    indirectly lost: 6,756 bytes in 7 blocks
==8319==      possibly lost: 0 bytes in 0 blocks
==8319==    still reachable: 1,292,155 bytes in 27,987 blocks
==8319==         suppressed: 0 bytes in 0 blocks
==8319== Rerun with --leak-check=full to see details of leaked memory
==8319== 
==8319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8319== 
==8319== 1 errors in context 1 of 1:
==8319== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8319==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8319==    by 0x488CD0: stringsubst (subst.c:301)
==8319==    by 0x48801B: prefork (subst.c:77)
==8319==    by 0x42B318: execcmd (exec.c:2619)
==8319==    by 0x428CA0: execpline2 (exec.c:1697)
==8319==    by 0x427FD2: execpline (exec.c:1484)
==8319==    by 0x427756: execlist (exec.c:1267)
==8319==    by 0x42717C: execode (exec.c:1073)
==8319==    by 0x431299: runshfunc (exec.c:5040)
==8319==    by 0x430E76: doshfunc (exec.c:4920)
==8319==    by 0x4302FB: execshfunc (exec.c:4557)
==8319==    by 0x42D8C1: execcmd (exec.c:3373)
==8319== 
==8319== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8320== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8320-by-pythonnut-on-???
==8320== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8320-by-pythonnut-on-???
==8320== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8320-by-pythonnut-on-???
==8320== 
==8320== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8320== don't want to do, unless you know exactly what you're doing,
==8320== or are doing some strange experiment):
==8320==   /usr/lib/valgrind/../../bin/vgdb --pid=8320 ...command...
==8320== 
==8320== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8320==   /path/to/gdb ./zsh
==8320== and then give GDB the following command
==8320==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8320
==8320== --pid is optional if only one valgrind process is running
==8320== 
--8320-- Caught __NR_exit; running __libc_freeres()
--8320-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8320== 
==8320== HEAP SUMMARY:
==8320==     in use at exit: 1,299,092 bytes in 27,998 blocks
==8320==   total heap usage: 779,420 allocs, 751,422 frees, 46,755,048 bytes allocated
==8320== 
==8320== Searching for pointers to 27,998 not-freed blocks
--8320--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8320--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8320--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8320--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8320--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8320--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8320--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8320--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8320--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8320--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8320--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8320--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8320--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8320--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8320--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8320--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8320--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8320--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8320--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8320--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8320--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8320--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8320--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8320--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8320--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8320--   Scanning root segment: 0x701a000..0x701afff (4096)
--8320--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8320--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8320--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8320--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8320--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8320--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8320--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8320== Checked 1,583,992 bytes
==8320== 
==8320== LEAK SUMMARY:
==8320==    definitely lost: 253 bytes in 4 blocks
==8320==    indirectly lost: 6,756 bytes in 7 blocks
==8320==      possibly lost: 0 bytes in 0 blocks
==8320==    still reachable: 1,292,083 bytes in 27,987 blocks
==8320==         suppressed: 0 bytes in 0 blocks
==8320== Rerun with --leak-check=full to see details of leaked memory
==8320== 
==8320== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8320== 
==8320== 1 errors in context 1 of 1:
==8320== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8320==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8320==    by 0x488CD0: stringsubst (subst.c:301)
==8320==    by 0x48801B: prefork (subst.c:77)
==8320==    by 0x42B318: execcmd (exec.c:2619)
==8320==    by 0x428CA0: execpline2 (exec.c:1697)
==8320==    by 0x427FD2: execpline (exec.c:1484)
==8320==    by 0x427756: execlist (exec.c:1267)
==8320==    by 0x42717C: execode (exec.c:1073)
==8320==    by 0x431299: runshfunc (exec.c:5040)
==8320==    by 0x430E76: doshfunc (exec.c:4920)
==8320==    by 0x4302FB: execshfunc (exec.c:4557)
==8320==    by 0x42D8C1: execcmd (exec.c:3373)
==8320== 
==8320== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8321-- Caught __NR_exit; running __libc_freeres()
==8321== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8321-by-pythonnut-on-???
==8321== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8321-by-pythonnut-on-???
==8321== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8321-by-pythonnut-on-???
==8321== 
==8321== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8321== don't want to do, unless you know exactly what you're doing,
==8321== or are doing some strange experiment):
==8321==   /usr/lib/valgrind/../../bin/vgdb --pid=8321 ...command...
==8321== 
==8321== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8321==   /path/to/gdb ./zsh
==8321== and then give GDB the following command
==8321==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8321
==8321== --pid is optional if only one valgrind process is running
==8321== 
--8321-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8321== 
==8321== HEAP SUMMARY:
==8321==     in use at exit: 1,299,092 bytes in 27,998 blocks
==8321==   total heap usage: 779,526 allocs, 751,528 frees, 47,105,392 bytes allocated
==8321== 
==8321== Searching for pointers to 27,998 not-freed blocks
--8321--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8321--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8321--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8321--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8321--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8321--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8321--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8321--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8321--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8321--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8321--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8321--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8321--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8321--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8321--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8321--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8321--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8321--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8321--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8321--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8321--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8321--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8321--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8321--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8321--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8321--   Scanning root segment: 0x701a000..0x701afff (4096)
--8321--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8321--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8321--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8321--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8321--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8321--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8321--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8321== Checked 1,583,992 bytes
==8321== 
==8321== LEAK SUMMARY:
==8321==    definitely lost: 253 bytes in 4 blocks
==8321==    indirectly lost: 6,756 bytes in 7 blocks
==8321==      possibly lost: 0 bytes in 0 blocks
==8321==    still reachable: 1,292,083 bytes in 27,987 blocks
==8321==         suppressed: 0 bytes in 0 blocks
==8321== Rerun with --leak-check=full to see details of leaked memory
==8321== 
==8321== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8321== 
==8321== 1 errors in context 1 of 1:
==8321== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8321==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8321==    by 0x488CD0: stringsubst (subst.c:301)
==8321==    by 0x48801B: prefork (subst.c:77)
==8321==    by 0x42B318: execcmd (exec.c:2619)
==8321==    by 0x428CA0: execpline2 (exec.c:1697)
==8321==    by 0x427FD2: execpline (exec.c:1484)
==8321==    by 0x427756: execlist (exec.c:1267)
==8321==    by 0x42717C: execode (exec.c:1073)
==8321==    by 0x431299: runshfunc (exec.c:5040)
==8321==    by 0x430E76: doshfunc (exec.c:4920)
==8321==    by 0x4302FB: execshfunc (exec.c:4557)
==8321==    by 0x42D8C1: execcmd (exec.c:3373)
==8321== 
==8321== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8322-- Caught __NR_exit; running __libc_freeres()
==8322== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8322-by-pythonnut-on-???
==8322== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8322-by-pythonnut-on-???
==8322== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8322-by-pythonnut-on-???
==8322== 
==8322== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8322== don't want to do, unless you know exactly what you're doing,
==8322== or are doing some strange experiment):
==8322==   /usr/lib/valgrind/../../bin/vgdb --pid=8322 ...command...
==8322== 
==8322== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8322==   /path/to/gdb ./zsh
==8322== and then give GDB the following command
==8322==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8322
==8322== --pid is optional if only one valgrind process is running
==8322== 
--8322-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8322== 
==8322== HEAP SUMMARY:
==8322==     in use at exit: 1,299,068 bytes in 27,998 blocks
==8322==   total heap usage: 779,632 allocs, 751,634 frees, 47,455,718 bytes allocated
==8322== 
==8322== Searching for pointers to 27,998 not-freed blocks
--8322--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8322--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8322--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8322--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8322--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8322--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8322--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8322--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8322--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8322--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8322--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8322--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8322--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8322--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8322--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8322--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8322--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8322--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8322--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8322--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8322--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8322--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8322--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8322--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8322--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8322--   Scanning root segment: 0x701a000..0x701afff (4096)
--8322--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8322--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8322--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8322--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8322--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8322--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8322--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8322== Checked 1,583,976 bytes
==8322== 
==8322== LEAK SUMMARY:
==8322==    definitely lost: 253 bytes in 4 blocks
==8322==    indirectly lost: 6,756 bytes in 7 blocks
==8322==      possibly lost: 0 bytes in 0 blocks
==8322==    still reachable: 1,292,059 bytes in 27,987 blocks
==8322==         suppressed: 0 bytes in 0 blocks
==8322== Rerun with --leak-check=full to see details of leaked memory
==8322== 
==8322== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8322== 
==8322== 1 errors in context 1 of 1:
==8322== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8322==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8322==    by 0x488CD0: stringsubst (subst.c:301)
==8322==    by 0x48801B: prefork (subst.c:77)
==8322==    by 0x42B318: execcmd (exec.c:2619)
==8322==    by 0x428CA0: execpline2 (exec.c:1697)
==8322==    by 0x427FD2: execpline (exec.c:1484)
==8322==    by 0x427756: execlist (exec.c:1267)
==8322==    by 0x42717C: execode (exec.c:1073)
==8322==    by 0x431299: runshfunc (exec.c:5040)
==8322==    by 0x430E76: doshfunc (exec.c:4920)
==8322==    by 0x4302FB: execshfunc (exec.c:4557)
==8322==    by 0x42D8C1: execcmd (exec.c:3373)
==8322== 
==8322== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8323-- Caught __NR_exit; running __libc_freeres()
==8323== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8323-by-pythonnut-on-???
==8323== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8323-by-pythonnut-on-???
==8323== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8323-by-pythonnut-on-???
==8323== 
==8323== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8323== don't want to do, unless you know exactly what you're doing,
==8323== or are doing some strange experiment):
==8323==   /usr/lib/valgrind/../../bin/vgdb --pid=8323 ...command...
==8323== 
==8323== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8323==   /path/to/gdb ./zsh
==8323== and then give GDB the following command
==8323==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8323
==8323== --pid is optional if only one valgrind process is running
==8323== 
--8323-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8323== 
==8323== HEAP SUMMARY:
==8323==     in use at exit: 1,299,140 bytes in 27,998 blocks
==8323==   total heap usage: 779,738 allocs, 751,740 frees, 47,806,110 bytes allocated
==8323== 
==8323== Searching for pointers to 27,998 not-freed blocks
--8323--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8323--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8323--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8323--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8323--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8323--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8323--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8323--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8323--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8323--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8323--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8323--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8323--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8323--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8323--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8323--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8323--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8323--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8323--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8323--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8323--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8323--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8323--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8323--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8323--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8323--   Scanning root segment: 0x701a000..0x701afff (4096)
--8323--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8323--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8323--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8323--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8323--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8323--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8323--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8323== Checked 1,584,040 bytes
==8323== 
==8323== LEAK SUMMARY:
==8323==    definitely lost: 253 bytes in 4 blocks
==8323==    indirectly lost: 6,756 bytes in 7 blocks
==8323==      possibly lost: 0 bytes in 0 blocks
==8323==    still reachable: 1,292,131 bytes in 27,987 blocks
==8323==         suppressed: 0 bytes in 0 blocks
==8323== Rerun with --leak-check=full to see details of leaked memory
==8323== 
==8323== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8323== 
==8323== 1 errors in context 1 of 1:
==8323== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8323==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8323==    by 0x488CD0: stringsubst (subst.c:301)
==8323==    by 0x48801B: prefork (subst.c:77)
==8323==    by 0x42B318: execcmd (exec.c:2619)
==8323==    by 0x428CA0: execpline2 (exec.c:1697)
==8323==    by 0x427FD2: execpline (exec.c:1484)
==8323==    by 0x427756: execlist (exec.c:1267)
==8323==    by 0x42717C: execode (exec.c:1073)
==8323==    by 0x431299: runshfunc (exec.c:5040)
==8323==    by 0x430E76: doshfunc (exec.c:4920)
==8323==    by 0x4302FB: execshfunc (exec.c:4557)
==8323==    by 0x42D8C1: execcmd (exec.c:3373)
==8323== 
==8323== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8324-- Caught __NR_exit; running __libc_freeres()
==8324== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8324-by-pythonnut-on-???
==8324== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8324-by-pythonnut-on-???
==8324== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8324-by-pythonnut-on-???
==8324== 
==8324== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8324== don't want to do, unless you know exactly what you're doing,
==8324== or are doing some strange experiment):
==8324==   /usr/lib/valgrind/../../bin/vgdb --pid=8324 ...command...
==8324== 
==8324== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8324==   /path/to/gdb ./zsh
==8324== and then give GDB the following command
==8324==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8324
==8324== --pid is optional if only one valgrind process is running
==8324== 
--8324-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8324== 
==8324== HEAP SUMMARY:
==8324==     in use at exit: 1,299,134 bytes in 27,998 blocks
==8324==   total heap usage: 779,844 allocs, 751,846 frees, 48,156,542 bytes allocated
==8324== 
==8324== Searching for pointers to 27,998 not-freed blocks
--8324--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8324--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8324--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8324--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8324--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8324--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8324--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8324--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8324--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8324--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8324--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8324--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8324--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8324--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8324--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8324--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8324--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8324--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8324--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8324--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8324--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8324--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8324--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8324--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8324--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8324--   Scanning root segment: 0x701a000..0x701afff (4096)
--8324--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8324--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8324--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8324--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8324--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8324--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8324--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8324== Checked 1,584,040 bytes
==8324== 
==8324== LEAK SUMMARY:
==8324==    definitely lost: 253 bytes in 4 blocks
==8324==    indirectly lost: 6,756 bytes in 7 blocks
==8324==      possibly lost: 0 bytes in 0 blocks
==8324==    still reachable: 1,292,125 bytes in 27,987 blocks
==8324==         suppressed: 0 bytes in 0 blocks
==8324== Rerun with --leak-check=full to see details of leaked memory
==8324== 
==8324== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8324== 
==8324== 1 errors in context 1 of 1:
==8324== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8324==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8324==    by 0x488CD0: stringsubst (subst.c:301)
==8324==    by 0x48801B: prefork (subst.c:77)
==8324==    by 0x42B318: execcmd (exec.c:2619)
==8324==    by 0x428CA0: execpline2 (exec.c:1697)
==8324==    by 0x427FD2: execpline (exec.c:1484)
==8324==    by 0x427756: execlist (exec.c:1267)
==8324==    by 0x42717C: execode (exec.c:1073)
==8324==    by 0x431299: runshfunc (exec.c:5040)
==8324==    by 0x430E76: doshfunc (exec.c:4920)
==8324==    by 0x4302FB: execshfunc (exec.c:4557)
==8324==    by 0x42D8C1: execcmd (exec.c:3373)
==8324== 
==8324== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8325-- Caught __NR_exit; running __libc_freeres()
==8325== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8325-by-pythonnut-on-???
==8325== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8325-by-pythonnut-on-???
==8325== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8325-by-pythonnut-on-???
==8325== 
==8325== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8325== don't want to do, unless you know exactly what you're doing,
==8325== or are doing some strange experiment):
==8325==   /usr/lib/valgrind/../../bin/vgdb --pid=8325 ...command...
==8325== 
==8325== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8325==   /path/to/gdb ./zsh
==8325== and then give GDB the following command
==8325==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8325
==8325== --pid is optional if only one valgrind process is running
==8325== 
--8325-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8325== 
==8325== HEAP SUMMARY:
==8325==     in use at exit: 1,299,140 bytes in 27,998 blocks
==8325==   total heap usage: 779,950 allocs, 751,952 frees, 48,506,978 bytes allocated
==8325== 
==8325== Searching for pointers to 27,998 not-freed blocks
--8325--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8325--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8325--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8325--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8325--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8325--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8325--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8325--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8325--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8325--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8325--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8325--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8325--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8325--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8325--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8325--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8325--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8325--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8325--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8325--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8325--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8325--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8325--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8325--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8325--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8325--   Scanning root segment: 0x701a000..0x701afff (4096)
--8325--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8325--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8325--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8325--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8325--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8325--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8325--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8325== Checked 1,584,040 bytes
==8325== 
==8325== LEAK SUMMARY:
==8325==    definitely lost: 253 bytes in 4 blocks
==8325==    indirectly lost: 6,756 bytes in 7 blocks
==8325==      possibly lost: 0 bytes in 0 blocks
==8325==    still reachable: 1,292,131 bytes in 27,987 blocks
==8325==         suppressed: 0 bytes in 0 blocks
==8325== Rerun with --leak-check=full to see details of leaked memory
==8325== 
==8325== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8325== 
==8325== 1 errors in context 1 of 1:
==8325== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8325==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8325==    by 0x488CD0: stringsubst (subst.c:301)
==8325==    by 0x48801B: prefork (subst.c:77)
==8325==    by 0x42B318: execcmd (exec.c:2619)
==8325==    by 0x428CA0: execpline2 (exec.c:1697)
==8325==    by 0x427FD2: execpline (exec.c:1484)
==8325==    by 0x427756: execlist (exec.c:1267)
==8325==    by 0x42717C: execode (exec.c:1073)
==8325==    by 0x431299: runshfunc (exec.c:5040)
==8325==    by 0x430E76: doshfunc (exec.c:4920)
==8325==    by 0x4302FB: execshfunc (exec.c:4557)
==8325==    by 0x42D8C1: execcmd (exec.c:3373)
==8325== 
==8325== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8326-- Caught __NR_exit; running __libc_freeres()
==8326== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8326-by-pythonnut-on-???
==8326== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8326-by-pythonnut-on-???
==8326== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8326-by-pythonnut-on-???
==8326== 
==8326== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8326== don't want to do, unless you know exactly what you're doing,
==8326== or are doing some strange experiment):
==8326==   /usr/lib/valgrind/../../bin/vgdb --pid=8326 ...command...
==8326== 
==8326== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8326==   /path/to/gdb ./zsh
==8326== and then give GDB the following command
==8326==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8326
==8326== --pid is optional if only one valgrind process is running
==8326== 
--8326-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8326== 
==8326== HEAP SUMMARY:
==8326==     in use at exit: 1,299,092 bytes in 27,998 blocks
==8326==   total heap usage: 780,056 allocs, 752,058 frees, 48,857,368 bytes allocated
==8326== 
==8326== Searching for pointers to 27,998 not-freed blocks
--8326--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8326--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8326--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8326--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8326--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8326--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8326--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8326--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8326--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8326--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8326--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8326--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8326--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8326--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8326--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8326--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8326--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8326--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8326--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8326--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8326--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8326--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8326--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8326--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8326--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8326--   Scanning root segment: 0x701a000..0x701afff (4096)
--8326--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8326--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8326--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8326--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8326--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8326--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8326--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8326== Checked 1,583,976 bytes
==8326== 
==8326== LEAK SUMMARY:
==8326==    definitely lost: 253 bytes in 4 blocks
==8326==    indirectly lost: 6,756 bytes in 7 blocks
==8326==      possibly lost: 0 bytes in 0 blocks
==8326==    still reachable: 1,292,083 bytes in 27,987 blocks
==8326==         suppressed: 0 bytes in 0 blocks
==8326== Rerun with --leak-check=full to see details of leaked memory
==8326== 
==8326== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8326== 
==8326== 1 errors in context 1 of 1:
==8326== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8326==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8326==    by 0x488CD0: stringsubst (subst.c:301)
==8326==    by 0x48801B: prefork (subst.c:77)
==8326==    by 0x42B318: execcmd (exec.c:2619)
==8326==    by 0x428CA0: execpline2 (exec.c:1697)
==8326==    by 0x427FD2: execpline (exec.c:1484)
==8326==    by 0x427756: execlist (exec.c:1267)
==8326==    by 0x42717C: execode (exec.c:1073)
==8326==    by 0x431299: runshfunc (exec.c:5040)
==8326==    by 0x430E76: doshfunc (exec.c:4920)
==8326==    by 0x4302FB: execshfunc (exec.c:4557)
==8326==    by 0x42D8C1: execcmd (exec.c:3373)
==8326== 
==8326== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8327-- Caught __NR_exit; running __libc_freeres()
==8327== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8327-by-pythonnut-on-???
==8327== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8327-by-pythonnut-on-???
==8327== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8327-by-pythonnut-on-???
==8327== 
==8327== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8327== don't want to do, unless you know exactly what you're doing,
==8327== or are doing some strange experiment):
==8327==   /usr/lib/valgrind/../../bin/vgdb --pid=8327 ...command...
==8327== 
==8327== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8327==   /path/to/gdb ./zsh
==8327== and then give GDB the following command
==8327==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8327
==8327== --pid is optional if only one valgrind process is running
==8327== 
--8327-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8327== 
==8327== HEAP SUMMARY:
==8327==     in use at exit: 1,299,146 bytes in 27,998 blocks
==8327==   total heap usage: 780,162 allocs, 752,164 frees, 49,207,784 bytes allocated
==8327== 
==8327== Searching for pointers to 27,998 not-freed blocks
--8327--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8327--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8327--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8327--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8327--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8327--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8327--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8327--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8327--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8327--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8327--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8327--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8327--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8327--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8327--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8327--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8327--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8327--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8327--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8327--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8327--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8327--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8327--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8327--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8327--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8327--   Scanning root segment: 0x701a000..0x701afff (4096)
--8327--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8327--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8327--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8327--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8327--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8327--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8327--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8327== Checked 1,584,048 bytes
==8327== 
==8327== LEAK SUMMARY:
==8327==    definitely lost: 253 bytes in 4 blocks
==8327==    indirectly lost: 6,756 bytes in 7 blocks
==8327==      possibly lost: 0 bytes in 0 blocks
==8327==    still reachable: 1,292,137 bytes in 27,987 blocks
==8327==         suppressed: 0 bytes in 0 blocks
==8327== Rerun with --leak-check=full to see details of leaked memory
==8327== 
==8327== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8327== 
==8327== 1 errors in context 1 of 1:
==8327== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8327==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8327==    by 0x488CD0: stringsubst (subst.c:301)
==8327==    by 0x48801B: prefork (subst.c:77)
==8327==    by 0x42B318: execcmd (exec.c:2619)
==8327==    by 0x428CA0: execpline2 (exec.c:1697)
==8327==    by 0x427FD2: execpline (exec.c:1484)
==8327==    by 0x427756: execlist (exec.c:1267)
==8327==    by 0x42717C: execode (exec.c:1073)
==8327==    by 0x431299: runshfunc (exec.c:5040)
==8327==    by 0x430E76: doshfunc (exec.c:4920)
==8327==    by 0x4302FB: execshfunc (exec.c:4557)
==8327==    by 0x42D8C1: execcmd (exec.c:3373)
==8327== 
==8327== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8328== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8328-by-pythonnut-on-???
==8328== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8328-by-pythonnut-on-???
==8328== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8328-by-pythonnut-on-???
==8328== 
==8328== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8328== don't want to do, unless you know exactly what you're doing,
==8328== or are doing some strange experiment):
==8328==   /usr/lib/valgrind/../../bin/vgdb --pid=8328 ...command...
==8328== 
==8328== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8328==   /path/to/gdb ./zsh
==8328== and then give GDB the following command
==8328==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8328
==8328== --pid is optional if only one valgrind process is running
==8328== 
--8328-- Caught __NR_exit; running __libc_freeres()
--8328-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8328== 
==8328== HEAP SUMMARY:
==8328==     in use at exit: 1,299,080 bytes in 27,998 blocks
==8328==   total heap usage: 780,268 allocs, 752,270 frees, 49,558,162 bytes allocated
==8328== 
==8328== Searching for pointers to 27,998 not-freed blocks
--8328--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8328--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8328--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8328--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8328--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8328--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8328--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8328--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8328--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8328--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8328--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8328--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8328--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8328--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8328--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8328--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8328--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8328--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8328--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8328--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8328--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8328--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8328--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8328--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8328--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8328--   Scanning root segment: 0x701a000..0x701afff (4096)
--8328--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8328--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8328--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8328--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8328--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8328--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8328--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8328== Checked 1,583,968 bytes
==8328== 
==8328== LEAK SUMMARY:
==8328==    definitely lost: 253 bytes in 4 blocks
==8328==    indirectly lost: 6,756 bytes in 7 blocks
==8328==      possibly lost: 0 bytes in 0 blocks
==8328==    still reachable: 1,292,071 bytes in 27,987 blocks
==8328==         suppressed: 0 bytes in 0 blocks
==8328== Rerun with --leak-check=full to see details of leaked memory
==8328== 
==8328== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8328== 
==8328== 1 errors in context 1 of 1:
==8328== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8328==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8328==    by 0x488CD0: stringsubst (subst.c:301)
==8328==    by 0x48801B: prefork (subst.c:77)
==8328==    by 0x42B318: execcmd (exec.c:2619)
==8328==    by 0x428CA0: execpline2 (exec.c:1697)
==8328==    by 0x427FD2: execpline (exec.c:1484)
==8328==    by 0x427756: execlist (exec.c:1267)
==8328==    by 0x42717C: execode (exec.c:1073)
==8328==    by 0x431299: runshfunc (exec.c:5040)
==8328==    by 0x430E76: doshfunc (exec.c:4920)
==8328==    by 0x4302FB: execshfunc (exec.c:4557)
==8328==    by 0x42D8C1: execcmd (exec.c:3373)
==8328== 
==8328== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8329== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8329-by-pythonnut-on-???
==8329== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8329-by-pythonnut-on-???
==8329== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8329-by-pythonnut-on-???
==8329== 
==8329== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8329== don't want to do, unless you know exactly what you're doing,
==8329== or are doing some strange experiment):
==8329==   /usr/lib/valgrind/../../bin/vgdb --pid=8329 ...command...
==8329== 
==8329== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8329==   /path/to/gdb ./zsh
==8329== and then give GDB the following command
==8329==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8329
==8329== --pid is optional if only one valgrind process is running
==8329== 
--8329-- Caught __NR_exit; running __libc_freeres()
--8329-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8329== 
==8329== HEAP SUMMARY:
==8329==     in use at exit: 1,299,086 bytes in 27,998 blocks
==8329==   total heap usage: 780,374 allocs, 752,376 frees, 49,908,490 bytes allocated
==8329== 
==8329== Searching for pointers to 27,998 not-freed blocks
--8329--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8329--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8329--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8329--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8329--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8329--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8329--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8329--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8329--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8329--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8329--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8329--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8329--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8329--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8329--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8329--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8329--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8329--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8329--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8329--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8329--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8329--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8329--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8329--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8329--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8329--   Scanning root segment: 0x701a000..0x701afff (4096)
--8329--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8329--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8329--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8329--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8329--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8329--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8329--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8329== Checked 1,583,968 bytes
==8329== 
==8329== LEAK SUMMARY:
==8329==    definitely lost: 253 bytes in 4 blocks
==8329==    indirectly lost: 6,756 bytes in 7 blocks
==8329==      possibly lost: 0 bytes in 0 blocks
==8329==    still reachable: 1,292,077 bytes in 27,987 blocks
==8329==         suppressed: 0 bytes in 0 blocks
==8329== Rerun with --leak-check=full to see details of leaked memory
==8329== 
==8329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8329== 
==8329== 1 errors in context 1 of 1:
==8329== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8329==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8329==    by 0x488CD0: stringsubst (subst.c:301)
==8329==    by 0x48801B: prefork (subst.c:77)
==8329==    by 0x42B318: execcmd (exec.c:2619)
==8329==    by 0x428CA0: execpline2 (exec.c:1697)
==8329==    by 0x427FD2: execpline (exec.c:1484)
==8329==    by 0x427756: execlist (exec.c:1267)
==8329==    by 0x42717C: execode (exec.c:1073)
==8329==    by 0x431299: runshfunc (exec.c:5040)
==8329==    by 0x430E76: doshfunc (exec.c:4920)
==8329==    by 0x4302FB: execshfunc (exec.c:4557)
==8329==    by 0x42D8C1: execcmd (exec.c:3373)
==8329== 
==8329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8330-- Caught __NR_exit; running __libc_freeres()
==8330== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8330-by-pythonnut-on-???
==8330== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8330-by-pythonnut-on-???
==8330== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8330-by-pythonnut-on-???
==8330== 
==8330== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8330== don't want to do, unless you know exactly what you're doing,
==8330== or are doing some strange experiment):
==8330==   /usr/lib/valgrind/../../bin/vgdb --pid=8330 ...command...
==8330== 
==8330== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8330==   /path/to/gdb ./zsh
==8330== and then give GDB the following command
==8330==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8330
==8330== --pid is optional if only one valgrind process is running
==8330== 
--8330-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8330== 
==8330== HEAP SUMMARY:
==8330==     in use at exit: 1,299,068 bytes in 27,998 blocks
==8330==   total heap usage: 780,480 allocs, 752,482 frees, 50,258,812 bytes allocated
==8330== 
==8330== Searching for pointers to 27,998 not-freed blocks
--8330--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8330--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8330--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8330--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8330--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8330--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8330--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8330--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8330--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8330--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8330--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8330--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8330--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8330--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8330--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8330--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8330--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8330--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8330--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8330--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8330--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8330--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8330--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8330--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8330--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8330--   Scanning root segment: 0x701a000..0x701afff (4096)
--8330--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8330--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8330--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8330--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8330--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8330--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8330--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8330== Checked 1,583,944 bytes
==8330== 
==8330== LEAK SUMMARY:
==8330==    definitely lost: 253 bytes in 4 blocks
==8330==    indirectly lost: 6,756 bytes in 7 blocks
==8330==      possibly lost: 0 bytes in 0 blocks
==8330==    still reachable: 1,292,059 bytes in 27,987 blocks
==8330==         suppressed: 0 bytes in 0 blocks
==8330== Rerun with --leak-check=full to see details of leaked memory
==8330== 
==8330== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8330== 
==8330== 1 errors in context 1 of 1:
==8330== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8330==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8330==    by 0x488CD0: stringsubst (subst.c:301)
==8330==    by 0x48801B: prefork (subst.c:77)
==8330==    by 0x42B318: execcmd (exec.c:2619)
==8330==    by 0x428CA0: execpline2 (exec.c:1697)
==8330==    by 0x427FD2: execpline (exec.c:1484)
==8330==    by 0x427756: execlist (exec.c:1267)
==8330==    by 0x42717C: execode (exec.c:1073)
==8330==    by 0x431299: runshfunc (exec.c:5040)
==8330==    by 0x430E76: doshfunc (exec.c:4920)
==8330==    by 0x4302FB: execshfunc (exec.c:4557)
==8330==    by 0x42D8C1: execcmd (exec.c:3373)
==8330== 
==8330== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8331== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8331-by-pythonnut-on-???
==8331== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8331-by-pythonnut-on-???
==8331== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8331-by-pythonnut-on-???
==8331== 
==8331== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8331== don't want to do, unless you know exactly what you're doing,
==8331== or are doing some strange experiment):
==8331==   /usr/lib/valgrind/../../bin/vgdb --pid=8331 ...command...
==8331== 
==8331== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8331==   /path/to/gdb ./zsh
==8331== and then give GDB the following command
==8331==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8331
==8331== --pid is optional if only one valgrind process is running
==8331== 
--8331-- Caught __NR_exit; running __libc_freeres()
--8331-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8331== 
==8331== HEAP SUMMARY:
==8331==     in use at exit: 1,299,086 bytes in 27,998 blocks
==8331==   total heap usage: 780,586 allocs, 752,588 frees, 50,609,146 bytes allocated
==8331== 
==8331== Searching for pointers to 27,998 not-freed blocks
--8331--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8331--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8331--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8331--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8331--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8331--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8331--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8331--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8331--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8331--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8331--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8331--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8331--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8331--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8331--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8331--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8331--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8331--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8331--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8331--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8331--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8331--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8331--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8331--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8331--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8331--   Scanning root segment: 0x701a000..0x701afff (4096)
--8331--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8331--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8331--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8331--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8331--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8331--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8331--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8331== Checked 1,583,968 bytes
==8331== 
==8331== LEAK SUMMARY:
==8331==    definitely lost: 253 bytes in 4 blocks
==8331==    indirectly lost: 6,756 bytes in 7 blocks
==8331==      possibly lost: 0 bytes in 0 blocks
==8331==    still reachable: 1,292,077 bytes in 27,987 blocks
==8331==         suppressed: 0 bytes in 0 blocks
==8331== Rerun with --leak-check=full to see details of leaked memory
==8331== 
==8331== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8331== 
==8331== 1 errors in context 1 of 1:
==8331== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8331==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8331==    by 0x488CD0: stringsubst (subst.c:301)
==8331==    by 0x48801B: prefork (subst.c:77)
==8331==    by 0x42B318: execcmd (exec.c:2619)
==8331==    by 0x428CA0: execpline2 (exec.c:1697)
==8331==    by 0x427FD2: execpline (exec.c:1484)
==8331==    by 0x427756: execlist (exec.c:1267)
==8331==    by 0x42717C: execode (exec.c:1073)
==8331==    by 0x431299: runshfunc (exec.c:5040)
==8331==    by 0x430E76: doshfunc (exec.c:4920)
==8331==    by 0x4302FB: execshfunc (exec.c:4557)
==8331==    by 0x42D8C1: execcmd (exec.c:3373)
==8331== 
==8331== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8332== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8332-by-pythonnut-on-???
==8332== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8332-by-pythonnut-on-???
==8332== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8332-by-pythonnut-on-???
==8332== 
==8332== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8332== don't want to do, unless you know exactly what you're doing,
==8332== or are doing some strange experiment):
==8332==   /usr/lib/valgrind/../../bin/vgdb --pid=8332 ...command...
==8332== 
==8332== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8332==   /path/to/gdb ./zsh
==8332== and then give GDB the following command
==8332==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8332
==8332== --pid is optional if only one valgrind process is running
==8332== 
--8332-- Caught __NR_exit; running __libc_freeres()
--8332-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8332== 
==8332== HEAP SUMMARY:
==8332==     in use at exit: 1,299,062 bytes in 27,998 blocks
==8332==   total heap usage: 780,692 allocs, 752,694 frees, 50,959,446 bytes allocated
==8332== 
==8332== Searching for pointers to 27,998 not-freed blocks
--8332--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8332--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8332--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8332--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8332--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8332--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8332--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8332--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8332--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8332--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8332--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8332--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8332--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8332--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8332--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8332--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8332--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8332--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8332--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8332--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8332--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8332--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8332--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8332--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8332--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8332--   Scanning root segment: 0x701a000..0x701afff (4096)
--8332--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8332--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8332--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8332--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8332--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8332--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8332--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8332== Checked 1,583,976 bytes
==8332== 
==8332== LEAK SUMMARY:
==8332==    definitely lost: 253 bytes in 4 blocks
==8332==    indirectly lost: 6,756 bytes in 7 blocks
==8332==      possibly lost: 0 bytes in 0 blocks
==8332==    still reachable: 1,292,053 bytes in 27,987 blocks
==8332==         suppressed: 0 bytes in 0 blocks
==8332== Rerun with --leak-check=full to see details of leaked memory
==8332== 
==8332== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8332== 
==8332== 1 errors in context 1 of 1:
==8332== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8332==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8332==    by 0x488CD0: stringsubst (subst.c:301)
==8332==    by 0x48801B: prefork (subst.c:77)
==8332==    by 0x42B318: execcmd (exec.c:2619)
==8332==    by 0x428CA0: execpline2 (exec.c:1697)
==8332==    by 0x427FD2: execpline (exec.c:1484)
==8332==    by 0x427756: execlist (exec.c:1267)
==8332==    by 0x42717C: execode (exec.c:1073)
==8332==    by 0x431299: runshfunc (exec.c:5040)
==8332==    by 0x430E76: doshfunc (exec.c:4920)
==8332==    by 0x4302FB: execshfunc (exec.c:4557)
==8332==    by 0x42D8C1: execcmd (exec.c:3373)
==8332== 
==8332== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8333-- Caught __NR_exit; running __libc_freeres()
==8333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8333-by-pythonnut-on-???
==8333== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8333-by-pythonnut-on-???
==8333== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8333-by-pythonnut-on-???
==8333== 
==8333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8333== don't want to do, unless you know exactly what you're doing,
==8333== or are doing some strange experiment):
==8333==   /usr/lib/valgrind/../../bin/vgdb --pid=8333 ...command...
==8333== 
==8333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8333==   /path/to/gdb ./zsh
==8333== and then give GDB the following command
==8333==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8333
==8333== --pid is optional if only one valgrind process is running
==8333== 
--8333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8333== 
==8333== HEAP SUMMARY:
==8333==     in use at exit: 1,299,086 bytes in 27,998 blocks
==8333==   total heap usage: 780,798 allocs, 752,800 frees, 51,309,762 bytes allocated
==8333== 
==8333== Searching for pointers to 27,998 not-freed blocks
--8333--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8333--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8333--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8333--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8333--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8333--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8333--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8333--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8333--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8333--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8333--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8333--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8333--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8333--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8333--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8333--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8333--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8333--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8333--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8333--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8333--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8333--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8333--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8333--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8333--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8333--   Scanning root segment: 0x701a000..0x701afff (4096)
--8333--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8333--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8333--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8333--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8333--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8333--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8333--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8333== Checked 1,584,000 bytes
==8333== 
==8333== LEAK SUMMARY:
==8333==    definitely lost: 253 bytes in 4 blocks
==8333==    indirectly lost: 6,756 bytes in 7 blocks
==8333==      possibly lost: 0 bytes in 0 blocks
==8333==    still reachable: 1,292,077 bytes in 27,987 blocks
==8333==         suppressed: 0 bytes in 0 blocks
==8333== Rerun with --leak-check=full to see details of leaked memory
==8333== 
==8333== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8333== 
==8333== 1 errors in context 1 of 1:
==8333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8333==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8333==    by 0x488CD0: stringsubst (subst.c:301)
==8333==    by 0x48801B: prefork (subst.c:77)
==8333==    by 0x42B318: execcmd (exec.c:2619)
==8333==    by 0x428CA0: execpline2 (exec.c:1697)
==8333==    by 0x427FD2: execpline (exec.c:1484)
==8333==    by 0x427756: execlist (exec.c:1267)
==8333==    by 0x42717C: execode (exec.c:1073)
==8333==    by 0x431299: runshfunc (exec.c:5040)
==8333==    by 0x430E76: doshfunc (exec.c:4920)
==8333==    by 0x4302FB: execshfunc (exec.c:4557)
==8333==    by 0x42D8C1: execcmd (exec.c:3373)
==8333== 
==8333== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8334-by-pythonnut-on-???
==8334== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8334-by-pythonnut-on-???
==8334== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8334-by-pythonnut-on-???
==8334== 
==8334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8334== don't want to do, unless you know exactly what you're doing,
==8334== or are doing some strange experiment):
==8334==   /usr/lib/valgrind/../../bin/vgdb --pid=8334 ...command...
==8334== 
==8334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8334==   /path/to/gdb ./zsh
==8334== and then give GDB the following command
==8334==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8334
==8334== --pid is optional if only one valgrind process is running
==8334== 
--8334-- Caught __NR_exit; running __libc_freeres()
--8334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8334== 
==8334== HEAP SUMMARY:
==8334==     in use at exit: 1,299,080 bytes in 27,998 blocks
==8334==   total heap usage: 780,904 allocs, 752,906 frees, 51,660,100 bytes allocated
==8334== 
==8334== Searching for pointers to 27,998 not-freed blocks
--8334--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8334--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8334--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8334--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8334--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8334--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8334--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8334--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8334--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8334--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8334--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8334--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8334--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8334--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8334--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8334--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8334--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8334--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8334--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8334--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8334--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8334--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8334--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8334--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8334--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8334--   Scanning root segment: 0x701a000..0x701afff (4096)
--8334--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8334--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8334--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8334--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8334--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8334--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8334--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8334== Checked 1,584,000 bytes
==8334== 
==8334== LEAK SUMMARY:
==8334==    definitely lost: 253 bytes in 4 blocks
==8334==    indirectly lost: 6,756 bytes in 7 blocks
==8334==      possibly lost: 0 bytes in 0 blocks
==8334==    still reachable: 1,292,071 bytes in 27,987 blocks
==8334==         suppressed: 0 bytes in 0 blocks
==8334== Rerun with --leak-check=full to see details of leaked memory
==8334== 
==8334== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8334== 
==8334== 1 errors in context 1 of 1:
==8334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8334==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8334==    by 0x488CD0: stringsubst (subst.c:301)
==8334==    by 0x48801B: prefork (subst.c:77)
==8334==    by 0x42B318: execcmd (exec.c:2619)
==8334==    by 0x428CA0: execpline2 (exec.c:1697)
==8334==    by 0x427FD2: execpline (exec.c:1484)
==8334==    by 0x427756: execlist (exec.c:1267)
==8334==    by 0x42717C: execode (exec.c:1073)
==8334==    by 0x431299: runshfunc (exec.c:5040)
==8334==    by 0x430E76: doshfunc (exec.c:4920)
==8334==    by 0x4302FB: execshfunc (exec.c:4557)
==8334==    by 0x42D8C1: execcmd (exec.c:3373)
==8334== 
==8334== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8335-by-pythonnut-on-???
==8335== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8335-by-pythonnut-on-???
==8335== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8335-by-pythonnut-on-???
==8335== 
==8335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8335== don't want to do, unless you know exactly what you're doing,
==8335== or are doing some strange experiment):
==8335==   /usr/lib/valgrind/../../bin/vgdb --pid=8335 ...command...
==8335== 
==8335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8335==   /path/to/gdb ./zsh
==8335== and then give GDB the following command
==8335==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8335
==8335== --pid is optional if only one valgrind process is running
==8335== 
--8335-- Caught __NR_exit; running __libc_freeres()
--8335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8335== 
==8335== HEAP SUMMARY:
==8335==     in use at exit: 1,299,080 bytes in 27,998 blocks
==8335==   total heap usage: 781,010 allocs, 753,012 frees, 52,010,420 bytes allocated
==8335== 
==8335== Searching for pointers to 27,998 not-freed blocks
--8335--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8335--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8335--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8335--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8335--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8335--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8335--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8335--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8335--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8335--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8335--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8335--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8335--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8335--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8335--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8335--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8335--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8335--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8335--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8335--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8335--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8335--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8335--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8335--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8335--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8335--   Scanning root segment: 0x701a000..0x701afff (4096)
--8335--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8335--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8335--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8335--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8335--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8335--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8335--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8335== Checked 1,584,000 bytes
==8335== 
==8335== LEAK SUMMARY:
==8335==    definitely lost: 253 bytes in 4 blocks
==8335==    indirectly lost: 6,756 bytes in 7 blocks
==8335==      possibly lost: 0 bytes in 0 blocks
==8335==    still reachable: 1,292,071 bytes in 27,987 blocks
==8335==         suppressed: 0 bytes in 0 blocks
==8335== Rerun with --leak-check=full to see details of leaked memory
==8335== 
==8335== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8335== 
==8335== 1 errors in context 1 of 1:
==8335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8335==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8335==    by 0x488CD0: stringsubst (subst.c:301)
==8335==    by 0x48801B: prefork (subst.c:77)
==8335==    by 0x42B318: execcmd (exec.c:2619)
==8335==    by 0x428CA0: execpline2 (exec.c:1697)
==8335==    by 0x427FD2: execpline (exec.c:1484)
==8335==    by 0x427756: execlist (exec.c:1267)
==8335==    by 0x42717C: execode (exec.c:1073)
==8335==    by 0x431299: runshfunc (exec.c:5040)
==8335==    by 0x430E76: doshfunc (exec.c:4920)
==8335==    by 0x4302FB: execshfunc (exec.c:4557)
==8335==    by 0x42D8C1: execcmd (exec.c:3373)
==8335== 
==8335== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8336-- Caught __NR_exit; running __libc_freeres()
==8336== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8336-by-pythonnut-on-???
==8336== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8336-by-pythonnut-on-???
==8336== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8336-by-pythonnut-on-???
==8336== 
==8336== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8336== don't want to do, unless you know exactly what you're doing,
==8336== or are doing some strange experiment):
==8336==   /usr/lib/valgrind/../../bin/vgdb --pid=8336 ...command...
==8336== 
==8336== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8336==   /path/to/gdb ./zsh
==8336== and then give GDB the following command
==8336==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8336
==8336== --pid is optional if only one valgrind process is running
==8336== 
--8336-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8336== 
==8336== HEAP SUMMARY:
==8336==     in use at exit: 1,299,098 bytes in 27,998 blocks
==8336==   total heap usage: 781,116 allocs, 753,118 frees, 52,360,764 bytes allocated
==8336== 
==8336== Searching for pointers to 27,998 not-freed blocks
--8336--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8336--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8336--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8336--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8336--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8336--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8336--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8336--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8336--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8336--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8336--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8336--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8336--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8336--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8336--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8336--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8336--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8336--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8336--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8336--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8336--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8336--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8336--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8336--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8336--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8336--   Scanning root segment: 0x701a000..0x701afff (4096)
--8336--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8336--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8336--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8336--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8336--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8336--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8336--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8336== Checked 1,584,000 bytes
==8336== 
==8336== LEAK SUMMARY:
==8336==    definitely lost: 253 bytes in 4 blocks
==8336==    indirectly lost: 6,756 bytes in 7 blocks
==8336==      possibly lost: 0 bytes in 0 blocks
==8336==    still reachable: 1,292,089 bytes in 27,987 blocks
==8336==         suppressed: 0 bytes in 0 blocks
==8336== Rerun with --leak-check=full to see details of leaked memory
==8336== 
==8336== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8336== 
==8336== 1 errors in context 1 of 1:
==8336== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8336==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8336==    by 0x488CD0: stringsubst (subst.c:301)
==8336==    by 0x48801B: prefork (subst.c:77)
==8336==    by 0x42B318: execcmd (exec.c:2619)
==8336==    by 0x428CA0: execpline2 (exec.c:1697)
==8336==    by 0x427FD2: execpline (exec.c:1484)
==8336==    by 0x427756: execlist (exec.c:1267)
==8336==    by 0x42717C: execode (exec.c:1073)
==8336==    by 0x431299: runshfunc (exec.c:5040)
==8336==    by 0x430E76: doshfunc (exec.c:4920)
==8336==    by 0x4302FB: execshfunc (exec.c:4557)
==8336==    by 0x42D8C1: execcmd (exec.c:3373)
==8336== 
==8336== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8337== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8337-by-pythonnut-on-???
==8337== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8337-by-pythonnut-on-???
==8337== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8337-by-pythonnut-on-???
==8337== 
==8337== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8337== don't want to do, unless you know exactly what you're doing,
==8337== or are doing some strange experiment):
==8337==   /usr/lib/valgrind/../../bin/vgdb --pid=8337 ...command...
==8337== 
==8337== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8337==   /path/to/gdb ./zsh
==8337== and then give GDB the following command
==8337==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8337
==8337== --pid is optional if only one valgrind process is running
==8337== 
--8337-- Caught __NR_exit; running __libc_freeres()
--8337-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8337== 
==8337== HEAP SUMMARY:
==8337==     in use at exit: 1,299,104 bytes in 27,998 blocks
==8337==   total heap usage: 781,222 allocs, 753,224 frees, 52,711,128 bytes allocated
==8337== 
==8337== Searching for pointers to 27,998 not-freed blocks
--8337--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8337--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8337--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8337--   Scanning root segment: 0x402e000..0x4031fff (16384)
--8337--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8337--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8337--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8337--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8337--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8337--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8337--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8337--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8337--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8337--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8337--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8337--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8337--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8337--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8337--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8337--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8337--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8337--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8337--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8337--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8337--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8337--   Scanning root segment: 0x701a000..0x701afff (4096)
--8337--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8337--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8337--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8337--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8337--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8337--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8337--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8337== Checked 1,584,024 bytes
==8337== 
==8337== LEAK SUMMARY:
==8337==    definitely lost: 253 bytes in 4 blocks
==8337==    indirectly lost: 6,756 bytes in 7 blocks
==8337==      possibly lost: 0 bytes in 0 blocks
==8337==    still reachable: 1,292,095 bytes in 27,987 blocks
==8337==         suppressed: 0 bytes in 0 blocks
==8337== Rerun with --leak-check=full to see details of leaked memory
==8337== 
==8337== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8337== 
==8337== 1 errors in context 1 of 1:
==8337== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8337==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8337==    by 0x488CD0: stringsubst (subst.c:301)
==8337==    by 0x48801B: prefork (subst.c:77)
==8337==    by 0x42B318: execcmd (exec.c:2619)
==8337==    by 0x428CA0: execpline2 (exec.c:1697)
==8337==    by 0x427FD2: execpline (exec.c:1484)
==8337==    by 0x427756: execlist (exec.c:1267)
==8337==    by 0x42717C: execode (exec.c:1073)
==8337==    by 0x431299: runshfunc (exec.c:5040)
==8337==    by 0x430E76: doshfunc (exec.c:4920)
==8337==    by 0x4302FB: execshfunc (exec.c:4557)
==8337==    by 0x42D8C1: execcmd (exec.c:3373)
==8337== 
==8337== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFDD5C,  len 4
client request: code 4d430005,  addr 0xFFEFFDC0C,  len 4
--8339-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF32CC,  len 4
==8339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8339-by-pythonnut-on-???
==8339== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8339-by-pythonnut-on-???
==8339== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8339-by-pythonnut-on-???
==8339== 
==8339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8339== don't want to do, unless you know exactly what you're doing,
==8339== or are doing some strange experiment):
==8339==   /usr/lib/valgrind/../../bin/vgdb --pid=8339 ...command...
==8339== 
==8339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8339==   /path/to/gdb ./zsh
==8339== and then give GDB the following command
==8339==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8339
==8339== --pid is optional if only one valgrind process is running
==8339== 
--8339-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8339== 
==8339== HEAP SUMMARY:
==8339==     in use at exit: 1,357,496 bytes in 28,690 blocks
==8339==   total heap usage: 786,800 allocs, 758,110 frees, 54,157,849 bytes allocated
==8339== 
==8339== Searching for pointers to 28,690 not-freed blocks
--8339--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8339--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8339--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8339--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8339--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8339--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8339--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8339--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8339--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8339--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8339--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8339--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8339--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8339--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8339--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8339--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8339--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8339--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8339--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8339--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8339--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8339--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8339--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8339--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8339--   Scanning root segment: 0x701a000..0x701afff (4096)
--8339--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8339--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8339--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8339--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8339--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8339--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8339--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8339== Checked 1,615,192 bytes
==8339== 
==8339== LEAK SUMMARY:
==8339==    definitely lost: 253 bytes in 4 blocks
==8339==    indirectly lost: 6,756 bytes in 7 blocks
==8339==      possibly lost: 0 bytes in 0 blocks
==8339==    still reachable: 1,350,487 bytes in 28,679 blocks
==8339==         suppressed: 0 bytes in 0 blocks
==8339== Rerun with --leak-check=full to see details of leaked memory
==8339== 
==8339== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8339== 
==8339== 1 errors in context 1 of 1:
==8339== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8339==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8339==    by 0x488CD0: stringsubst (subst.c:301)
==8339==    by 0x48801B: prefork (subst.c:77)
==8339==    by 0x42B318: execcmd (exec.c:2619)
==8339==    by 0x428CA0: execpline2 (exec.c:1697)
==8339==    by 0x427FD2: execpline (exec.c:1484)
==8339==    by 0x427756: execlist (exec.c:1267)
==8339==    by 0x42717C: execode (exec.c:1073)
==8339==    by 0x431299: runshfunc (exec.c:5040)
==8339==    by 0x430E76: doshfunc (exec.c:4920)
==8339==    by 0x4302FB: execshfunc (exec.c:4557)
==8339==    by 0x42D8C1: execcmd (exec.c:3373)
==8339== 
==8339== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8338-- Caught __NR_exit; running __libc_freeres()
==8338== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8338-by-pythonnut-on-???
==8338== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8338-by-pythonnut-on-???
==8338== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8338-by-pythonnut-on-???
==8338== 
==8338== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8338== don't want to do, unless you know exactly what you're doing,
==8338== or are doing some strange experiment):
==8338==   /usr/lib/valgrind/../../bin/vgdb --pid=8338 ...command...
==8338== 
==8338== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8338==   /path/to/gdb ./zsh
==8338== and then give GDB the following command
==8338==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8338
==8338== --pid is optional if only one valgrind process is running
==8338== 
--8338-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8338== 
==8338== HEAP SUMMARY:
==8338==     in use at exit: 1,357,432 bytes in 28,687 blocks
==8338==   total heap usage: 786,798 allocs, 758,111 frees, 54,157,608 bytes allocated
==8338== 
==8338== Searching for pointers to 28,687 not-freed blocks
--8338--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8338--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8338--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8338--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8338--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8338--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8338--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8338--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8338--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8338--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8338--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8338--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8338--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8338--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8338--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8338--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8338--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8338--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8338--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8338--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8338--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8338--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8338--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8338--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8338--   Scanning root segment: 0x701a000..0x701afff (4096)
--8338--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8338--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8338--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8338--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8338--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8338--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8338--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8338== Checked 1,614,504 bytes
==8338== 
==8338== LEAK SUMMARY:
==8338==    definitely lost: 253 bytes in 4 blocks
==8338==    indirectly lost: 6,756 bytes in 7 blocks
==8338==      possibly lost: 0 bytes in 0 blocks
==8338==    still reachable: 1,350,423 bytes in 28,676 blocks
==8338==         suppressed: 0 bytes in 0 blocks
==8338== Rerun with --leak-check=full to see details of leaked memory
==8338== 
==8338== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8338== 
==8338== 1 errors in context 1 of 1:
==8338== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8338==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8338==    by 0x488CD0: stringsubst (subst.c:301)
==8338==    by 0x48801B: prefork (subst.c:77)
==8338==    by 0x42B318: execcmd (exec.c:2619)
==8338==    by 0x428CA0: execpline2 (exec.c:1697)
==8338==    by 0x427FD2: execpline (exec.c:1484)
==8338==    by 0x427756: execlist (exec.c:1267)
==8338==    by 0x42717C: execode (exec.c:1073)
==8338==    by 0x431299: runshfunc (exec.c:5040)
==8338==    by 0x430E76: doshfunc (exec.c:4920)
==8338==    by 0x4302FB: execshfunc (exec.c:4557)
==8338==    by 0x42D8C1: execcmd (exec.c:3373)
==8338== 
==8338== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8341== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8341-by-pythonnut-on-???
==8341== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8341-by-pythonnut-on-???
==8341== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8341-by-pythonnut-on-???
==8341== 
==8341== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8341== don't want to do, unless you know exactly what you're doing,
==8341== or are doing some strange experiment):
==8341==   /usr/lib/valgrind/../../bin/vgdb --pid=8341 ...command...
==8341== 
==8341== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8341==   /path/to/gdb ./zsh
==8341== and then give GDB the following command
==8341==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8341
==8341== --pid is optional if only one valgrind process is running
==8341== 
--8341-- Caught __NR_exit; running __libc_freeres()
--8341-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8341== 
==8341== HEAP SUMMARY:
==8341==     in use at exit: 1,357,439 bytes in 28,687 blocks
==8341==   total heap usage: 786,813 allocs, 758,126 frees, 54,162,606 bytes allocated
==8341== 
==8341== Searching for pointers to 28,687 not-freed blocks
--8341--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8341--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8341--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8341--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8341--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8341--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8341--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8341--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8341--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8341--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8341--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8341--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8341--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8341--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8341--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8341--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8341--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8341--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8341--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8341--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8341--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8341--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8341--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8341--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8341--   Scanning root segment: 0x701a000..0x701afff (4096)
--8341--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8341--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8341--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8341--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8341--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8341--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8341--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8341== Checked 1,614,640 bytes
==8341== 
==8341== LEAK SUMMARY:
==8341==    definitely lost: 253 bytes in 4 blocks
==8341==    indirectly lost: 6,756 bytes in 7 blocks
==8341==      possibly lost: 0 bytes in 0 blocks
==8341==    still reachable: 1,350,430 bytes in 28,676 blocks
==8341==         suppressed: 0 bytes in 0 blocks
==8341== Rerun with --leak-check=full to see details of leaked memory
==8341== 
==8341== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8341== 
==8341== 1 errors in context 1 of 1:
==8341== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8341==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8341==    by 0x488CD0: stringsubst (subst.c:301)
==8341==    by 0x48801B: prefork (subst.c:77)
==8341==    by 0x42B318: execcmd (exec.c:2619)
==8341==    by 0x428CA0: execpline2 (exec.c:1697)
==8341==    by 0x427FD2: execpline (exec.c:1484)
==8341==    by 0x427756: execlist (exec.c:1267)
==8341==    by 0x42717C: execode (exec.c:1073)
==8341==    by 0x431299: runshfunc (exec.c:5040)
==8341==    by 0x430E76: doshfunc (exec.c:4920)
==8341==    by 0x4302FB: execshfunc (exec.c:4557)
==8341==    by 0x42D8C1: execcmd (exec.c:3373)
==8341== 
==8341== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8342-- Caught __NR_exit; running __libc_freeres()
==8342== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8342-by-pythonnut-on-???
==8342== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8342-by-pythonnut-on-???
==8342== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8342-by-pythonnut-on-???
==8342== 
==8342== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8342== don't want to do, unless you know exactly what you're doing,
==8342== or are doing some strange experiment):
==8342==   /usr/lib/valgrind/../../bin/vgdb --pid=8342 ...command...
==8342== 
==8342== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8342==   /path/to/gdb ./zsh
==8342== and then give GDB the following command
==8342==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8342
==8342== --pid is optional if only one valgrind process is running
==8342== 
--8342-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8342== 
==8342== HEAP SUMMARY:
==8342==     in use at exit: 1,357,535 bytes in 28,687 blocks
==8342==   total heap usage: 786,829 allocs, 758,142 frees, 54,167,393 bytes allocated
==8342== 
==8342== Searching for pointers to 28,687 not-freed blocks
--8342--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8342--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8342--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8342--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8342--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8342--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8342--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8342--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8342--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8342--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8342--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8342--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8342--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8342--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8342--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8342--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8342--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8342--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8342--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8342--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8342--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8342--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8342--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8342--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8342--   Scanning root segment: 0x701a000..0x701afff (4096)
--8342--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8342--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8342--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8342--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8342--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8342--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8342--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8342== Checked 1,612,144 bytes
==8342== 
==8342== LEAK SUMMARY:
==8342==    definitely lost: 253 bytes in 4 blocks
==8342==    indirectly lost: 6,756 bytes in 7 blocks
==8342==      possibly lost: 0 bytes in 0 blocks
==8342==    still reachable: 1,350,526 bytes in 28,676 blocks
==8342==         suppressed: 0 bytes in 0 blocks
==8342== Rerun with --leak-check=full to see details of leaked memory
==8342== 
==8342== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8342== 
==8342== 1 errors in context 1 of 1:
==8342== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8342==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8342==    by 0x488CD0: stringsubst (subst.c:301)
==8342==    by 0x48801B: prefork (subst.c:77)
==8342==    by 0x42B318: execcmd (exec.c:2619)
==8342==    by 0x428CA0: execpline2 (exec.c:1697)
==8342==    by 0x427FD2: execpline (exec.c:1484)
==8342==    by 0x427756: execlist (exec.c:1267)
==8342==    by 0x42717C: execode (exec.c:1073)
==8342==    by 0x431299: runshfunc (exec.c:5040)
==8342==    by 0x430E76: doshfunc (exec.c:4920)
==8342==    by 0x4302FB: execshfunc (exec.c:4557)
==8342==    by 0x42D8C1: execcmd (exec.c:3373)
==8342== 
==8342== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8343== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8343-by-pythonnut-on-???
==8343== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8343-by-pythonnut-on-???
==8343== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8343-by-pythonnut-on-???
==8343== 
==8343== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8343== don't want to do, unless you know exactly what you're doing,
==8343== or are doing some strange experiment):
==8343==   /usr/lib/valgrind/../../bin/vgdb --pid=8343 ...command...
==8343== 
==8343== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8343==   /path/to/gdb ./zsh
==8343== and then give GDB the following command
==8343==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8343
==8343== --pid is optional if only one valgrind process is running
==8343== 
--8343-- Caught __NR_exit; running __libc_freeres()
--8343-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8343== 
==8343== HEAP SUMMARY:
==8343==     in use at exit: 1,357,890 bytes in 28,694 blocks
==8343==   total heap usage: 786,878 allocs, 758,184 frees, 54,176,485 bytes allocated
==8343== 
==8343== Searching for pointers to 28,694 not-freed blocks
--8343--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8343--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8343--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8343--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8343--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8343--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8343--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8343--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8343--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8343--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8343--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8343--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8343--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8343--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8343--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8343--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8343--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8343--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8343--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8343--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8343--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8343--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8343--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8343--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8343--   Scanning root segment: 0x701a000..0x701afff (4096)
--8343--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8343--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8343--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8343--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8343--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8343--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8343--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8343== Checked 1,613,880 bytes
==8343== 
==8343== LEAK SUMMARY:
==8343==    definitely lost: 253 bytes in 4 blocks
==8343==    indirectly lost: 6,756 bytes in 7 blocks
==8343==      possibly lost: 0 bytes in 0 blocks
==8343==    still reachable: 1,350,881 bytes in 28,683 blocks
==8343==         suppressed: 0 bytes in 0 blocks
==8343== Rerun with --leak-check=full to see details of leaked memory
==8343== 
==8343== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8343== 
==8343== 1 errors in context 1 of 1:
==8343== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8343==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8343==    by 0x488CD0: stringsubst (subst.c:301)
==8343==    by 0x48801B: prefork (subst.c:77)
==8343==    by 0x42B318: execcmd (exec.c:2619)
==8343==    by 0x428CA0: execpline2 (exec.c:1697)
==8343==    by 0x427FD2: execpline (exec.c:1484)
==8343==    by 0x427756: execlist (exec.c:1267)
==8343==    by 0x42717C: execode (exec.c:1073)
==8343==    by 0x431299: runshfunc (exec.c:5040)
==8343==    by 0x430E76: doshfunc (exec.c:4920)
==8343==    by 0x4302FB: execshfunc (exec.c:4557)
==8343==    by 0x42D8C1: execcmd (exec.c:3373)
==8343== 
==8343== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8344-- Caught __NR_exit; running __libc_freeres()
==8344== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8344-by-pythonnut-on-???
==8344== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8344-by-pythonnut-on-???
==8344== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8344-by-pythonnut-on-???
==8344== 
==8344== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8344== don't want to do, unless you know exactly what you're doing,
==8344== or are doing some strange experiment):
==8344==   /usr/lib/valgrind/../../bin/vgdb --pid=8344 ...command...
==8344== 
==8344== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8344==   /path/to/gdb ./zsh
==8344== and then give GDB the following command
==8344==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8344
==8344== --pid is optional if only one valgrind process is running
==8344== 
--8344-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8344== 
==8344== HEAP SUMMARY:
==8344==     in use at exit: 1,357,732 bytes in 28,694 blocks
==8344==   total heap usage: 786,857 allocs, 758,163 frees, 54,174,179 bytes allocated
==8344== 
==8344== Searching for pointers to 28,694 not-freed blocks
--8344--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8344--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8344--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8344--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8344--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8344--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8344--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8344--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8344--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8344--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8344--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8344--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8344--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8344--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8344--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8344--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8344--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8344--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8344--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8344--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8344--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8344--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8344--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8344--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8344--   Scanning root segment: 0x701a000..0x701afff (4096)
--8344--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8344--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8344--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8344--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8344--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8344--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8344--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8344== Checked 1,612,256 bytes
==8344== 
==8344== LEAK SUMMARY:
==8344==    definitely lost: 253 bytes in 4 blocks
==8344==    indirectly lost: 6,756 bytes in 7 blocks
==8344==      possibly lost: 0 bytes in 0 blocks
==8344==    still reachable: 1,350,723 bytes in 28,683 blocks
==8344==         suppressed: 0 bytes in 0 blocks
==8344== Rerun with --leak-check=full to see details of leaked memory
==8344== 
==8344== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8344== 
==8344== 1 errors in context 1 of 1:
==8344== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8344==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8344==    by 0x488CD0: stringsubst (subst.c:301)
==8344==    by 0x48801B: prefork (subst.c:77)
==8344==    by 0x42B318: execcmd (exec.c:2619)
==8344==    by 0x428CA0: execpline2 (exec.c:1697)
==8344==    by 0x427FD2: execpline (exec.c:1484)
==8344==    by 0x427756: execlist (exec.c:1267)
==8344==    by 0x42717C: execode (exec.c:1073)
==8344==    by 0x431299: runshfunc (exec.c:5040)
==8344==    by 0x430E76: doshfunc (exec.c:4920)
==8344==    by 0x4302FB: execshfunc (exec.c:4557)
==8344==    by 0x42D8C1: execcmd (exec.c:3373)
==8344== 
==8344== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8345-by-pythonnut-on-???
==8345== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8345-by-pythonnut-on-???
==8345== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8345-by-pythonnut-on-???
==8345== 
==8345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8345== don't want to do, unless you know exactly what you're doing,
==8345== or are doing some strange experiment):
==8345==   /usr/lib/valgrind/../../bin/vgdb --pid=8345 ...command...
==8345== 
==8345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8345==   /path/to/gdb ./zsh
==8345== and then give GDB the following command
==8345==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8345
==8345== --pid is optional if only one valgrind process is running
==8345== 
--8345-- Caught __NR_exit; running __libc_freeres()
--8345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8345== 
==8345== HEAP SUMMARY:
==8345==     in use at exit: 1,357,756 bytes in 28,695 blocks
==8345==   total heap usage: 786,870 allocs, 758,175 frees, 54,176,862 bytes allocated
==8345== 
==8345== Searching for pointers to 28,695 not-freed blocks
--8345--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8345--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8345--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8345--   Scanning root segment: 0x4033000..0x4036fff (16384)
--8345--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8345--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8345--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8345--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8345--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8345--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8345--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8345--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8345--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8345--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8345--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8345--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8345--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8345--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8345--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8345--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8345--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8345--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8345--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8345--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8345--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8345--   Scanning root segment: 0x701a000..0x701afff (4096)
--8345--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8345--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8345--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8345--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8345--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8345--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8345--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8345== Checked 1,628,152 bytes
==8345== 
==8345== LEAK SUMMARY:
==8345==    definitely lost: 253 bytes in 4 blocks
==8345==    indirectly lost: 6,756 bytes in 7 blocks
==8345==      possibly lost: 0 bytes in 0 blocks
==8345==    still reachable: 1,350,747 bytes in 28,684 blocks
==8345==         suppressed: 0 bytes in 0 blocks
==8345== Rerun with --leak-check=full to see details of leaked memory
==8345== 
==8345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8345== 
==8345== 1 errors in context 1 of 1:
==8345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8345==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8345==    by 0x488CD0: stringsubst (subst.c:301)
==8345==    by 0x48801B: prefork (subst.c:77)
==8345==    by 0x42B318: execcmd (exec.c:2619)
==8345==    by 0x428CA0: execpline2 (exec.c:1697)
==8345==    by 0x427FD2: execpline (exec.c:1484)
==8345==    by 0x427756: execlist (exec.c:1267)
==8345==    by 0x42717C: execode (exec.c:1073)
==8345==    by 0x431299: runshfunc (exec.c:5040)
==8345==    by 0x430E76: doshfunc (exec.c:4920)
==8345==    by 0x4302FB: execshfunc (exec.c:4557)
==8345==    by 0x42D8C1: execcmd (exec.c:3373)
==8345== 
==8345== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8346-- Caught __NR_exit; running __libc_freeres()
==8346== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8346-by-pythonnut-on-???
==8346== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8346-by-pythonnut-on-???
==8346== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8346-by-pythonnut-on-???
==8346== 
==8346== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8346== don't want to do, unless you know exactly what you're doing,
==8346== or are doing some strange experiment):
==8346==   /usr/lib/valgrind/../../bin/vgdb --pid=8346 ...command...
==8346== 
==8346== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8346==   /path/to/gdb ./zsh
==8346== and then give GDB the following command
==8346==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8346
==8346== --pid is optional if only one valgrind process is running
==8346== 
--8346-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8346== 
==8346== HEAP SUMMARY:
==8346==     in use at exit: 1,363,150 bytes in 28,704 blocks
==8346==   total heap usage: 787,161 allocs, 758,457 frees, 54,207,028 bytes allocated
==8346== 
==8346== Searching for pointers to 28,704 not-freed blocks
--8346--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8346--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8346--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8346--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8346--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8346--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8346--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8346--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8346--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8346--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8346--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8346--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8346--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8346--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8346--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8346--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8346--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8346--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8346--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8346--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8346--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8346--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8346--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8346--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8346--   Scanning root segment: 0x701a000..0x701afff (4096)
--8346--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8346--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8346--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8346--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8346--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8346--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8346--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8346== Checked 1,617,864 bytes
==8346== 
==8346== LEAK SUMMARY:
==8346==    definitely lost: 253 bytes in 4 blocks
==8346==    indirectly lost: 6,756 bytes in 7 blocks
==8346==      possibly lost: 0 bytes in 0 blocks
==8346==    still reachable: 1,356,141 bytes in 28,693 blocks
==8346==         suppressed: 0 bytes in 0 blocks
==8346== Rerun with --leak-check=full to see details of leaked memory
==8346== 
==8346== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8346== 
==8346== 1 errors in context 1 of 1:
==8346== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8346==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8346==    by 0x488CD0: stringsubst (subst.c:301)
==8346==    by 0x48801B: prefork (subst.c:77)
==8346==    by 0x42B318: execcmd (exec.c:2619)
==8346==    by 0x428CA0: execpline2 (exec.c:1697)
==8346==    by 0x427FD2: execpline (exec.c:1484)
==8346==    by 0x427756: execlist (exec.c:1267)
==8346==    by 0x42717C: execode (exec.c:1073)
==8346==    by 0x431299: runshfunc (exec.c:5040)
==8346==    by 0x430E76: doshfunc (exec.c:4920)
==8346==    by 0x4302FB: execshfunc (exec.c:4557)
==8346==    by 0x42D8C1: execcmd (exec.c:3373)
==8346== 
==8346== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8347== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8347-by-pythonnut-on-???
==8347== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8347-by-pythonnut-on-???
==8347== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8347-by-pythonnut-on-???
==8347== 
==8347== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8347== don't want to do, unless you know exactly what you're doing,
==8347== or are doing some strange experiment):
==8347==   /usr/lib/valgrind/../../bin/vgdb --pid=8347 ...command...
==8347== 
==8347== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8347==   /path/to/gdb ./zsh
==8347== and then give GDB the following command
==8347==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8347
==8347== --pid is optional if only one valgrind process is running
==8347== 
==8347== Ignoring duplicate redirection:
--8347--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8347--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--8347-- Caught __NR_exit; running __libc_freeres()
--8347-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8347== 
==8347== HEAP SUMMARY:
==8347==     in use at exit: 1,365,095 bytes in 28,774 blocks
==8347==   total heap usage: 788,181 allocs, 759,407 frees, 54,946,126 bytes allocated
==8347== 
==8347== Searching for pointers to 28,774 not-freed blocks
--8347--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8347--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8347--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8347--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8347--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8347--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8347--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8347--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8347--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8347--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8347--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8347--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8347--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8347--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8347--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8347--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8347--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8347--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8347--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8347--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8347--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8347--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8347--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8347--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8347--   Scanning root segment: 0x701a000..0x701afff (4096)
--8347--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8347--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8347--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8347--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8347--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8347--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8347--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8347== Checked 1,619,312 bytes
==8347== 
==8347== LEAK SUMMARY:
==8347==    definitely lost: 253 bytes in 4 blocks
==8347==    indirectly lost: 6,756 bytes in 7 blocks
==8347==      possibly lost: 0 bytes in 0 blocks
==8347==    still reachable: 1,358,086 bytes in 28,763 blocks
==8347==         suppressed: 0 bytes in 0 blocks
==8347== Rerun with --leak-check=full to see details of leaked memory
==8347== 
==8347== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8347== 
==8347== 1 errors in context 1 of 1:
==8347== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8347==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8347==    by 0x488CD0: stringsubst (subst.c:301)
==8347==    by 0x48801B: prefork (subst.c:77)
==8347==    by 0x42B318: execcmd (exec.c:2619)
==8347==    by 0x428CA0: execpline2 (exec.c:1697)
==8347==    by 0x427FD2: execpline (exec.c:1484)
==8347==    by 0x427756: execlist (exec.c:1267)
==8347==    by 0x42717C: execode (exec.c:1073)
==8347==    by 0x431299: runshfunc (exec.c:5040)
==8347==    by 0x430E76: doshfunc (exec.c:4920)
==8347==    by 0x4302FB: execshfunc (exec.c:4557)
==8347==    by 0x42D8C1: execcmd (exec.c:3373)
==8347== 
==8347== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8349-by-pythonnut-on-???
==8349== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8349-by-pythonnut-on-???
==8349== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8349-by-pythonnut-on-???
==8349== 
==8349== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8349== don't want to do, unless you know exactly what you're doing,
==8349== or are doing some strange experiment):
==8349==   /usr/lib/valgrind/../../bin/vgdb --pid=8349 ...command...
==8349== 
==8349== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8349==   /path/to/gdb ./zsh
==8349== and then give GDB the following command
==8349==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8349
==8349== --pid is optional if only one valgrind process is running
==8349== 
==8350== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8350-by-pythonnut-on-???
==8350== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8350-by-pythonnut-on-???
==8350== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8350-by-pythonnut-on-???
==8350== 
==8350== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8350== don't want to do, unless you know exactly what you're doing,
==8350== or are doing some strange experiment):
==8350==   /usr/lib/valgrind/../../bin/vgdb --pid=8350 ...command...
==8350== 
==8350== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8350==   /path/to/gdb ./zsh
==8350== and then give GDB the following command
==8350==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8350
==8350== --pid is optional if only one valgrind process is running
==8350== 
==8351== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8351-by-pythonnut-on-???
==8351== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8351-by-pythonnut-on-???
==8351== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8351-by-pythonnut-on-???
==8351== 
==8351== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8351== don't want to do, unless you know exactly what you're doing,
==8351== or are doing some strange experiment):
==8351==   /usr/lib/valgrind/../../bin/vgdb --pid=8351 ...command...
==8351== 
==8351== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8351==   /path/to/gdb ./zsh
==8351== and then give GDB the following command
==8351==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8351
==8351== --pid is optional if only one valgrind process is running
==8351== 
==8351== Ignoring duplicate redirection:
--8351--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8351--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/system.so
--7806--    svma 0x00000021c0, avma 0x000b86d1c0
--7806-- REDIR: 0x5a3d250 (libc.so.6:strncat) redirected to 0x4a24740 (_vgnU_ifunc_wrapper)
==7806== Adding active redirection:
--7806--     new: 0x05a4b430 (__strncat_sse2      ) R-> (2004.0) 0x04c2d380 strncat
--7806-- REDIR: 0x5a4b430 (libc.so.6:__strncat_sse2) redirected to 0x4c2d380 (strncat)
--8351-- Caught __NR_exit; running __libc_freeres()
--8351-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8351== 
==8351== HEAP SUMMARY:
==8351==     in use at exit: 1,371,080 bytes in 28,988 blocks
==8351==   total heap usage: 788,409 allocs, 759,421 frees, 54,957,467 bytes allocated
==8351== 
==8351== Searching for pointers to 28,988 not-freed blocks
--8351--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8351--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8351--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8351--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8351--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8351--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8351--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8351--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8351--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8351--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8351--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8351--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8351--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8351--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8351--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8351--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8351--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8351--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8351--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8351--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8351--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8351--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8351--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8351--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8351--   Scanning root segment: 0x701a000..0x701afff (4096)
--8351--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8351--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8351--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8351--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8351--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8351--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8351--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8351== Checked 1,628,784 bytes
==8351== 
==8351== LEAK SUMMARY:
==8351==    definitely lost: 253 bytes in 4 blocks
==8351==    indirectly lost: 6,756 bytes in 7 blocks
==8351==      possibly lost: 0 bytes in 0 blocks
==8351==    still reachable: 1,364,071 bytes in 28,977 blocks
==8351==         suppressed: 0 bytes in 0 blocks
==8351== Rerun with --leak-check=full to see details of leaked memory
==8351== 
==8351== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8351== 
==8351== 1 errors in context 1 of 1:
==8351== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8351==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8351==    by 0x488CD0: stringsubst (subst.c:301)
==8351==    by 0x48801B: prefork (subst.c:77)
==8351==    by 0x42B318: execcmd (exec.c:2619)
==8351==    by 0x428CA0: execpline2 (exec.c:1697)
==8351==    by 0x427FD2: execpline (exec.c:1484)
==8351==    by 0x427756: execlist (exec.c:1267)
==8351==    by 0x42717C: execode (exec.c:1073)
==8351==    by 0x431299: runshfunc (exec.c:5040)
==8351==    by 0x430E76: doshfunc (exec.c:4920)
==8351==    by 0x4302FB: execshfunc (exec.c:4557)
==8351==    by 0x42D8C1: execcmd (exec.c:3373)
==8351== 
==8351== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8352== Ignoring duplicate redirection:
--8352--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8352--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8352-by-pythonnut-on-???
==8352== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8352-by-pythonnut-on-???
==8352== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8352-by-pythonnut-on-???
==8352== 
==8352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8352== don't want to do, unless you know exactly what you're doing,
==8352== or are doing some strange experiment):
==8352==   /usr/lib/valgrind/../../bin/vgdb --pid=8352 ...command...
==8352== 
==8352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8352==   /path/to/gdb ./zsh
==8352== and then give GDB the following command
==8352==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8352
==8352== --pid is optional if only one valgrind process is running
==8352== 
--8352-- Caught __NR_exit; running __libc_freeres()
--8352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8352== 
==8352== HEAP SUMMARY:
==8352==     in use at exit: 1,371,163 bytes in 28,999 blocks
==8352==   total heap usage: 787,678 allocs, 758,679 frees, 54,746,970 bytes allocated
==8352== 
==8352== Searching for pointers to 28,999 not-freed blocks
--8352--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8352--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8352--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8352--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8352--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8352--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8352--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8352--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8352--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8352--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8352--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8352--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8352--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8352--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8352--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8352--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8352--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8352--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8352--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8352--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8352--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8352--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8352--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8352--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8352--   Scanning root segment: 0x701a000..0x701afff (4096)
--8352--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8352--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8352--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8352--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8352--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8352--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8352--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8352== Checked 1,629,640 bytes
==8352== 
==8352== LEAK SUMMARY:
==8352==    definitely lost: 253 bytes in 4 blocks
==8352==    indirectly lost: 6,756 bytes in 7 blocks
==8352==      possibly lost: 0 bytes in 0 blocks
==8352==    still reachable: 1,364,154 bytes in 28,988 blocks
==8352==         suppressed: 0 bytes in 0 blocks
==8352== Rerun with --leak-check=full to see details of leaked memory
==8352== 
==8352== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8352== 
==8352== 1 errors in context 1 of 1:
==8352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8352==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8352==    by 0x488CD0: stringsubst (subst.c:301)
==8352==    by 0x48801B: prefork (subst.c:77)
==8352==    by 0x42B318: execcmd (exec.c:2619)
==8352==    by 0x428CA0: execpline2 (exec.c:1697)
==8352==    by 0x427FD2: execpline (exec.c:1484)
==8352==    by 0x427756: execlist (exec.c:1267)
==8352==    by 0x42717C: execode (exec.c:1073)
==8352==    by 0x431299: runshfunc (exec.c:5040)
==8352==    by 0x430E76: doshfunc (exec.c:4920)
==8352==    by 0x4302FB: execshfunc (exec.c:4557)
==8352==    by 0x42D8C1: execcmd (exec.c:3373)
==8352== 
==8352== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8353== Ignoring duplicate redirection:
--8353--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8353--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8353== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8353-by-pythonnut-on-???
==8353== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8353-by-pythonnut-on-???
==8353== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8353-by-pythonnut-on-???
==8353== 
==8353== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8353== don't want to do, unless you know exactly what you're doing,
==8353== or are doing some strange experiment):
==8353==   /usr/lib/valgrind/../../bin/vgdb --pid=8353 ...command...
==8353== 
==8353== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8353==   /path/to/gdb ./zsh
==8353== and then give GDB the following command
==8353==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8353
==8353== --pid is optional if only one valgrind process is running
==8353== 
--8353-- Caught __NR_exit; running __libc_freeres()
--8353-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8353== 
==8353== HEAP SUMMARY:
==8353==     in use at exit: 1,371,298 bytes in 29,001 blocks
==8353==   total heap usage: 787,715 allocs, 758,714 frees, 54,820,129 bytes allocated
==8353== 
==8353== Searching for pointers to 29,001 not-freed blocks
--8353--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8353--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8353--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8353--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8353--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8353--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8353--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8353--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8353--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8353--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8353--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8353--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8353--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8353--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8353--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8353--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8353--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8353--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8353--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8353--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8353--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8353--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8353--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8353--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8353--   Scanning root segment: 0x701a000..0x701afff (4096)
--8353--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8353--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8353--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8353--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8353--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8353--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8353--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8353== Checked 1,629,752 bytes
==8353== 
==8353== LEAK SUMMARY:
==8353==    definitely lost: 253 bytes in 4 blocks
==8353==    indirectly lost: 6,756 bytes in 7 blocks
==8353==      possibly lost: 0 bytes in 0 blocks
==8353==    still reachable: 1,364,289 bytes in 28,990 blocks
==8353==         suppressed: 0 bytes in 0 blocks
==8353== Rerun with --leak-check=full to see details of leaked memory
==8353== 
==8353== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8353== 
==8353== 1 errors in context 1 of 1:
==8353== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8353==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8353==    by 0x488CD0: stringsubst (subst.c:301)
==8353==    by 0x48801B: prefork (subst.c:77)
==8353==    by 0x42B318: execcmd (exec.c:2619)
==8353==    by 0x428CA0: execpline2 (exec.c:1697)
==8353==    by 0x427FD2: execpline (exec.c:1484)
==8353==    by 0x427756: execlist (exec.c:1267)
==8353==    by 0x42717C: execode (exec.c:1073)
==8353==    by 0x431299: runshfunc (exec.c:5040)
==8353==    by 0x430E76: doshfunc (exec.c:4920)
==8353==    by 0x4302FB: execshfunc (exec.c:4557)
==8353==    by 0x42D8C1: execcmd (exec.c:3373)
==8353== 
==8353== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8354== Ignoring duplicate redirection:
--8354--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8354--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8354== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8354-by-pythonnut-on-???
==8354== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8354-by-pythonnut-on-???
==8354== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8354-by-pythonnut-on-???
==8354== 
==8354== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8354== don't want to do, unless you know exactly what you're doing,
==8354== or are doing some strange experiment):
==8354==   /usr/lib/valgrind/../../bin/vgdb --pid=8354 ...command...
==8354== 
==8354== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8354==   /path/to/gdb ./zsh
==8354== and then give GDB the following command
==8354==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8354
==8354== --pid is optional if only one valgrind process is running
==8354== 
--8354-- Caught __NR_exit; running __libc_freeres()
--8354-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8354== 
==8354== HEAP SUMMARY:
==8354==     in use at exit: 1,371,296 bytes in 29,001 blocks
==8354==   total heap usage: 787,769 allocs, 758,768 frees, 55,516,661 bytes allocated
==8354== 
==8354== Searching for pointers to 29,001 not-freed blocks
--8354--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8354--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8354--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8354--   Scanning root segment: 0x4035000..0x4038fff (16384)
--8354--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8354--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8354--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8354--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8354--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8354--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8354--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8354--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8354--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8354--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8354--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8354--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8354--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8354--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8354--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8354--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8354--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8354--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8354--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8354--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8354--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8354--   Scanning root segment: 0x701a000..0x701afff (4096)
--8354--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8354--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8354--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8354--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8354--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8354--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8354--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8354== Checked 1,646,144 bytes
==8354== 
==8354== LEAK SUMMARY:
==8354==    definitely lost: 253 bytes in 4 blocks
==8354==    indirectly lost: 6,756 bytes in 7 blocks
==8354==      possibly lost: 0 bytes in 0 blocks
==8354==    still reachable: 1,364,287 bytes in 28,990 blocks
==8354==         suppressed: 0 bytes in 0 blocks
==8354== Rerun with --leak-check=full to see details of leaked memory
==8354== 
==8354== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8354== 
==8354== 1 errors in context 1 of 1:
==8354== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8354==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8354==    by 0x488CD0: stringsubst (subst.c:301)
==8354==    by 0x48801B: prefork (subst.c:77)
==8354==    by 0x42B318: execcmd (exec.c:2619)
==8354==    by 0x428CA0: execpline2 (exec.c:1697)
==8354==    by 0x427FD2: execpline (exec.c:1484)
==8354==    by 0x427756: execlist (exec.c:1267)
==8354==    by 0x42717C: execode (exec.c:1073)
==8354==    by 0x431299: runshfunc (exec.c:5040)
==8354==    by 0x430E76: doshfunc (exec.c:4920)
==8354==    by 0x4302FB: execshfunc (exec.c:4557)
==8354==    by 0x42D8C1: execcmd (exec.c:3373)
==8354== 
==8354== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8355== Ignoring duplicate redirection:
--8355--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8355--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8355== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8355-by-pythonnut-on-???
==8355== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8355-by-pythonnut-on-???
==8355== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8355-by-pythonnut-on-???
==8355== 
==8355== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8355== don't want to do, unless you know exactly what you're doing,
==8355== or are doing some strange experiment):
==8355==   /usr/lib/valgrind/../../bin/vgdb --pid=8355 ...command...
==8355== 
==8355== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8355==   /path/to/gdb ./zsh
==8355== and then give GDB the following command
==8355==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8355
==8355== --pid is optional if only one valgrind process is running
==8355== 
--8355-- Caught __NR_exit; running __libc_freeres()
--8355-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8355== 
==8355== HEAP SUMMARY:
==8355==     in use at exit: 1,371,296 bytes in 29,001 blocks
==8355==   total heap usage: 787,776 allocs, 758,775 frees, 54,833,386 bytes allocated
==8355== 
==8355== Searching for pointers to 29,001 not-freed blocks
--8355--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8355--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8355--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8355--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8355--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8355--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8355--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8355--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8355--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8355--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8355--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8355--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8355--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8355--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8355--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8355--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8355--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8355--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8355--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8355--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8355--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8355--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8355--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8355--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8355--   Scanning root segment: 0x701a000..0x701afff (4096)
--8355--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8355--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8355--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8355--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8355--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8355--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8355--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8355== Checked 1,629,752 bytes
==8355== 
==8355== LEAK SUMMARY:
==8355==    definitely lost: 253 bytes in 4 blocks
==8355==    indirectly lost: 6,756 bytes in 7 blocks
==8355==      possibly lost: 0 bytes in 0 blocks
==8355==    still reachable: 1,364,287 bytes in 28,990 blocks
==8355==         suppressed: 0 bytes in 0 blocks
==8355== Rerun with --leak-check=full to see details of leaked memory
==8355== 
==8355== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8355== 
==8355== 1 errors in context 1 of 1:
==8355== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8355==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8355==    by 0x488CD0: stringsubst (subst.c:301)
==8355==    by 0x48801B: prefork (subst.c:77)
==8355==    by 0x42B318: execcmd (exec.c:2619)
==8355==    by 0x428CA0: execpline2 (exec.c:1697)
==8355==    by 0x427FD2: execpline (exec.c:1484)
==8355==    by 0x427756: execlist (exec.c:1267)
==8355==    by 0x42717C: execode (exec.c:1073)
==8355==    by 0x431299: runshfunc (exec.c:5040)
==8355==    by 0x430E76: doshfunc (exec.c:4920)
==8355==    by 0x4302FB: execshfunc (exec.c:4557)
==8355==    by 0x42D8C1: execcmd (exec.c:3373)
==8355== 
==8355== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8356== Ignoring duplicate redirection:
--8356--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8356--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8356== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8356-by-pythonnut-on-???
==8356== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8356-by-pythonnut-on-???
==8356== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8356-by-pythonnut-on-???
==8356== 
==8356== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8356== don't want to do, unless you know exactly what you're doing,
==8356== or are doing some strange experiment):
==8356==   /usr/lib/valgrind/../../bin/vgdb --pid=8356 ...command...
==8356== 
==8356== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8356==   /path/to/gdb ./zsh
==8356== and then give GDB the following command
==8356==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8356
==8356== --pid is optional if only one valgrind process is running
==8356== 
--8356-- Caught __NR_exit; running __libc_freeres()
--8356-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8356== 
==8356== HEAP SUMMARY:
==8356==     in use at exit: 1,371,298 bytes in 29,001 blocks
==8356==   total heap usage: 787,813 allocs, 758,812 frees, 54,841,329 bytes allocated
==8356== 
==8356== Searching for pointers to 29,001 not-freed blocks
--8356--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8356--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8356--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8356--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8356--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8356--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8356--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8356--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8356--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8356--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8356--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8356--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8356--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8356--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8356--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8356--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8356--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8356--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8356--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8356--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8356--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8356--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8356--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8356--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8356--   Scanning root segment: 0x701a000..0x701afff (4096)
--8356--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8356--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8356--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8356--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8356--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8356--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8356--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8356== Checked 1,629,752 bytes
==8356== 
==8356== LEAK SUMMARY:
==8356==    definitely lost: 253 bytes in 4 blocks
==8356==    indirectly lost: 6,756 bytes in 7 blocks
==8356==      possibly lost: 0 bytes in 0 blocks
==8356==    still reachable: 1,364,289 bytes in 28,990 blocks
==8356==         suppressed: 0 bytes in 0 blocks
==8356== Rerun with --leak-check=full to see details of leaked memory
==8356== 
==8356== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8356== 
==8356== 1 errors in context 1 of 1:
==8356== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8356==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8356==    by 0x488CD0: stringsubst (subst.c:301)
==8356==    by 0x48801B: prefork (subst.c:77)
==8356==    by 0x42B318: execcmd (exec.c:2619)
==8356==    by 0x428CA0: execpline2 (exec.c:1697)
==8356==    by 0x427FD2: execpline (exec.c:1484)
==8356==    by 0x427756: execlist (exec.c:1267)
==8356==    by 0x42717C: execode (exec.c:1073)
==8356==    by 0x431299: runshfunc (exec.c:5040)
==8356==    by 0x430E76: doshfunc (exec.c:4920)
==8356==    by 0x4302FB: execshfunc (exec.c:4557)
==8356==    by 0x42D8C1: execcmd (exec.c:3373)
==8356== 
==8356== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8357== Ignoring duplicate redirection:
--8357--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8357--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8357== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8357-by-pythonnut-on-???
==8357== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8357-by-pythonnut-on-???
==8357== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8357-by-pythonnut-on-???
==8357== 
==8357== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8357== don't want to do, unless you know exactly what you're doing,
==8357== or are doing some strange experiment):
==8357==   /usr/lib/valgrind/../../bin/vgdb --pid=8357 ...command...
==8357== 
==8357== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8357==   /path/to/gdb ./zsh
==8357== and then give GDB the following command
==8357==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8357
==8357== --pid is optional if only one valgrind process is running
==8357== 
--8357-- Caught __NR_exit; running __libc_freeres()
--8357-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8357== 
==8357== HEAP SUMMARY:
==8357==     in use at exit: 1,371,297 bytes in 29,001 blocks
==8357==   total heap usage: 787,847 allocs, 758,846 frees, 54,881,543 bytes allocated
==8357== 
==8357== Searching for pointers to 29,001 not-freed blocks
--8357--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8357--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8357--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8357--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8357--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8357--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8357--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8357--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8357--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8357--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8357--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8357--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8357--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8357--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8357--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8357--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8357--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8357--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8357--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8357--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8357--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8357--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8357--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8357--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8357--   Scanning root segment: 0x701a000..0x701afff (4096)
--8357--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8357--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8357--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8357--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8357--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8357--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8357--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8357== Checked 1,629,752 bytes
==8357== 
==8357== LEAK SUMMARY:
==8357==    definitely lost: 253 bytes in 4 blocks
==8357==    indirectly lost: 6,756 bytes in 7 blocks
==8357==      possibly lost: 0 bytes in 0 blocks
==8357==    still reachable: 1,364,288 bytes in 28,990 blocks
==8357==         suppressed: 0 bytes in 0 blocks
==8357== Rerun with --leak-check=full to see details of leaked memory
==8357== 
==8357== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8357== 
==8357== 1 errors in context 1 of 1:
==8357== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8357==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8357==    by 0x488CD0: stringsubst (subst.c:301)
==8357==    by 0x48801B: prefork (subst.c:77)
==8357==    by 0x42B318: execcmd (exec.c:2619)
==8357==    by 0x428CA0: execpline2 (exec.c:1697)
==8357==    by 0x427FD2: execpline (exec.c:1484)
==8357==    by 0x427756: execlist (exec.c:1267)
==8357==    by 0x42717C: execode (exec.c:1073)
==8357==    by 0x431299: runshfunc (exec.c:5040)
==8357==    by 0x430E76: doshfunc (exec.c:4920)
==8357==    by 0x4302FB: execshfunc (exec.c:4557)
==8357==    by 0x42D8C1: execcmd (exec.c:3373)
==8357== 
==8357== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8359== Ignoring duplicate redirection:
--8359--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8359--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8359== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8359-by-pythonnut-on-???
==8359== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8359-by-pythonnut-on-???
==8359== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8359-by-pythonnut-on-???
==8359== 
==8359== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8359== don't want to do, unless you know exactly what you're doing,
==8359== or are doing some strange experiment):
==8359==   /usr/lib/valgrind/../../bin/vgdb --pid=8359 ...command...
==8359== 
==8359== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8359==   /path/to/gdb ./zsh
==8359== and then give GDB the following command
==8359==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8359
==8359== --pid is optional if only one valgrind process is running
==8359== 
==8358== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8358-by-pythonnut-on-???
==8358== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8358-by-pythonnut-on-???
==8358== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8358-by-pythonnut-on-???
==8358== 
==8358== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8358== don't want to do, unless you know exactly what you're doing,
==8358== or are doing some strange experiment):
==8358==   /usr/lib/valgrind/../../bin/vgdb --pid=8358 ...command...
==8358== 
==8358== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8358==   /path/to/gdb ./zsh
==8358== and then give GDB the following command
==8358==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8358
==8358== --pid is optional if only one valgrind process is running
==8358== 
--8359-- Caught __NR_exit; running __libc_freeres()
==8361== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8361-by-pythonnut-on-???
==8361== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8361-by-pythonnut-on-???
==8361== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8361-by-pythonnut-on-???
==8361== 
==8361== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8361== don't want to do, unless you know exactly what you're doing,
==8361== or are doing some strange experiment):
==8361==   /usr/lib/valgrind/../../bin/vgdb --pid=8361 ...command...
==8361== 
==8361== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8361==   /path/to/gdb ./zsh
==8361== and then give GDB the following command
==8361==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8361
==8361== --pid is optional if only one valgrind process is running
==8361== 
==8363== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8363-by-pythonnut-on-???
==8363== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8363-by-pythonnut-on-???
==8363== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8363-by-pythonnut-on-???
==8363== 
==8363== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8363== don't want to do, unless you know exactly what you're doing,
==8363== or are doing some strange experiment):
==8363==   /usr/lib/valgrind/../../bin/vgdb --pid=8363 ...command...
==8363== 
==8363== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8363==   /path/to/gdb ./zsh
==8363== and then give GDB the following command
==8363==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8363
==8363== --pid is optional if only one valgrind process is running
==8363== 
==8362== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8362-by-pythonnut-on-???
==8362== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8362-by-pythonnut-on-???
==8362== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8362-by-pythonnut-on-???
==8362== 
==8362== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8362== don't want to do, unless you know exactly what you're doing,
==8362== or are doing some strange experiment):
==8362==   /usr/lib/valgrind/../../bin/vgdb --pid=8362 ...command...
==8362== 
==8362== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8362==   /path/to/gdb ./zsh
==8362== and then give GDB the following command
==8362==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8362
==8362== --pid is optional if only one valgrind process is running
==8362== 
--8362-- Caught __NR_exit; running __libc_freeres()
--8359-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==8359== 
==8359== HEAP SUMMARY:
==8359==     in use at exit: 1,371,295 bytes in 29,001 blocks
==8359==   total heap usage: 787,888 allocs, 758,887 frees, 55,151,466 bytes allocated
==8359== 
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--8362-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8365-- Caught __NR_exit; running __libc_freeres()
==8359== Searching for pointers to 29,001 not-freed blocks
--8359--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8359--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8359--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8359--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8359--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8359--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8359--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8359--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8359--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8359--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8359--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8359--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8359--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8359--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8359--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8359--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8359--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8359--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8359--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8359--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8359--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8359--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8359--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8359--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8359--   Scanning root segment: 0x701a000..0x701afff (4096)
--8359--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8359--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8359--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8359--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8359--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8359--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8359--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8362== 
==8362== HEAP SUMMARY:
==8362==     in use at exit: 2,983,812 bytes in 68,326 blocks
==8362==   total heap usage: 830,638 allocs, 762,312 frees, 56,958,445 bytes allocated
==8362== 
==8365== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8365-by-pythonnut-on-???
==8365== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8365-by-pythonnut-on-???
==8365== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8365-by-pythonnut-on-???
==8365== 
==8365== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8365== don't want to do, unless you know exactly what you're doing,
==8365== or are doing some strange experiment):
==8365==   /usr/lib/valgrind/../../bin/vgdb --pid=8365 ...command...
==8365== 
==8365== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8365==   /path/to/gdb ./zsh
==8365== and then give GDB the following command
==8365==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8365
==8365== --pid is optional if only one valgrind process is running
==8365== 
--8365-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8359== Checked 1,629,752 bytes
==8359== 
==8365== 
==8362== Searching for pointers to 68,326 not-freed blocks
--8362--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8362--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8362--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8362--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8362--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8362--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8362--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8362--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8362--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8362--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8362--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8362--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8362--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8362--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8362--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8362--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8362--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8362--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8362--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8362--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8362--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==8365== HEAP SUMMARY:
==8365==     in use at exit: 2,985,160 bytes in 68,318 blocks
==8365==   total heap usage: 830,629 allocs, 762,311 frees, 57,167,913 bytes allocated
==8365== 
--8362--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8362--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8362--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8362--   Scanning root segment: 0x701a000..0x701afff (4096)
--8362--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8362--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8362--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8362--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8362--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8362--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8362--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8362--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8359== LEAK SUMMARY:
==8359==    definitely lost: 253 bytes in 4 blocks
==8359==    indirectly lost: 6,756 bytes in 7 blocks
==8359==      possibly lost: 0 bytes in 0 blocks
==8359==    still reachable: 1,364,286 bytes in 28,990 blocks
==8359==         suppressed: 0 bytes in 0 blocks
==8359== Rerun with --leak-check=full to see details of leaked memory
==8359== 
==8359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8359== 
==8359== 1 errors in context 1 of 1:
==8359== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8359==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8359==    by 0x488CD0: stringsubst (subst.c:301)
==8359==    by 0x48801B: prefork (subst.c:77)
==8359==    by 0x42B318: execcmd (exec.c:2619)
==8359==    by 0x428CA0: execpline2 (exec.c:1697)
==8359==    by 0x427FD2: execpline (exec.c:1484)
==8359==    by 0x427756: execlist (exec.c:1267)
==8359==    by 0x42717C: execode (exec.c:1073)
==8359==    by 0x431299: runshfunc (exec.c:5040)
==8359==    by 0x430E76: doshfunc (exec.c:4920)
==8359==    by 0x4302FB: execshfunc (exec.c:4557)
==8359==    by 0x42D8C1: execcmd (exec.c:3373)
==8359== 
==8359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8350-- Caught __NR_exit; running __libc_freeres()
==8365== Searching for pointers to 68,318 not-freed blocks
--8365--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8365--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8365--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8365--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8365--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8365--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8365--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8365--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8365--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8365--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8365--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8365--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8365--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8365--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8365--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8365--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8365--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8365--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8365--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8365--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8365--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8365--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8365--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8365--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8365--   Scanning root segment: 0x701a000..0x701afff (4096)
--8365--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8365--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8365--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8365--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8365--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8365--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8365--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8365--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
--8350-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8350== 
==8350== HEAP SUMMARY:
==8350==     in use at exit: 1,369,210 bytes in 28,920 blocks
==8350==   total heap usage: 787,830 allocs, 758,910 frees, 54,491,153 bytes allocated
==8350== 
==8350== Searching for pointers to 28,920 not-freed blocks
--8350--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8350--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8350--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8350--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8350--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8350--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8350--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8350--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8350--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8350--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8350--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8350--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8350--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8350--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8350--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8350--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8350--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8350--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8350--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8350--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8350--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8350--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8350--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8350--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8350--   Scanning root segment: 0x701a000..0x701afff (4096)
--8350--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8350--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8350--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8350--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8350--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8350--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8350--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8362== Checked 4,630,640 bytes
==8362== 
==8350== Checked 1,625,072 bytes
==8350== 
==8350== LEAK SUMMARY:
==8350==    definitely lost: 253 bytes in 4 blocks
==8350==    indirectly lost: 6,756 bytes in 7 blocks
==8350==      possibly lost: 0 bytes in 0 blocks
==8350==    still reachable: 1,362,201 bytes in 28,909 blocks
==8350==         suppressed: 0 bytes in 0 blocks
==8350== Rerun with --leak-check=full to see details of leaked memory
==8350== 
==8350== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8350== 
==8350== 1 errors in context 1 of 1:
==8350== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8350==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8350==    by 0x488CD0: stringsubst (subst.c:301)
==8350==    by 0x48801B: prefork (subst.c:77)
==8350==    by 0x42B318: execcmd (exec.c:2619)
==8350==    by 0x428CA0: execpline2 (exec.c:1697)
==8350==    by 0x427FD2: execpline (exec.c:1484)
==8350==    by 0x427756: execlist (exec.c:1267)
==8350==    by 0x42717C: execode (exec.c:1073)
==8350==    by 0x431299: runshfunc (exec.c:5040)
==8350==    by 0x430E76: doshfunc (exec.c:4920)
==8350==    by 0x4302FB: execshfunc (exec.c:4557)
==8350==    by 0x42D8C1: execcmd (exec.c:3373)
==8350== 
==8350== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== Ignoring duplicate redirection:
--8349--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--8349--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==8362== LEAK SUMMARY:
==8362==    definitely lost: 253 bytes in 4 blocks
==8362==    indirectly lost: 6,756 bytes in 7 blocks
==8362==      possibly lost: 0 bytes in 0 blocks
==8362==    still reachable: 2,976,803 bytes in 68,315 blocks
==8362==         suppressed: 0 bytes in 0 blocks
==8362== Rerun with --leak-check=full to see details of leaked memory
==8362== 
==8362== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8362== 
==8362== 1 errors in context 1 of 1:
==8362== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8362==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8362==    by 0x488CD0: stringsubst (subst.c:301)
==8362==    by 0x48801B: prefork (subst.c:77)
==8362==    by 0x42B318: execcmd (exec.c:2619)
==8362==    by 0x428CA0: execpline2 (exec.c:1697)
==8362==    by 0x427FD2: execpline (exec.c:1484)
==8362==    by 0x427756: execlist (exec.c:1267)
==8362==    by 0x42717C: execode (exec.c:1073)
==8362==    by 0x431299: runshfunc (exec.c:5040)
==8362==    by 0x430E76: doshfunc (exec.c:4920)
==8362==    by 0x4302FB: execshfunc (exec.c:4557)
==8362==    by 0x42D8C1: execcmd (exec.c:3373)
==8362== 
==8362== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8360-- Caught __NR_exit; running __libc_freeres()
==8360== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8360-by-pythonnut-on-???
==8360== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8360-by-pythonnut-on-???
==8360== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8360-by-pythonnut-on-???
==8360== 
==8360== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8360== don't want to do, unless you know exactly what you're doing,
==8360== or are doing some strange experiment):
==8360==   /usr/lib/valgrind/../../bin/vgdb --pid=8360 ...command...
==8360== 
==8360== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8360==   /path/to/gdb ./zsh
==8360== and then give GDB the following command
==8360==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8360
==8360== --pid is optional if only one valgrind process is running
==8360== 
==8365== Checked 4,637,680 bytes
==8365== 
--8349-- Caught __NR_exit; running __libc_freeres()
--8360-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8365== LEAK SUMMARY:
==8365==    definitely lost: 253 bytes in 4 blocks
==8365==    indirectly lost: 6,756 bytes in 7 blocks
==8365==      possibly lost: 0 bytes in 0 blocks
==8365==    still reachable: 2,978,151 bytes in 68,307 blocks
==8365==         suppressed: 0 bytes in 0 blocks
==8365== Rerun with --leak-check=full to see details of leaked memory
==8365== 
==8365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8365== 
==8365== 1 errors in context 1 of 1:
==8365== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8365==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8365==    by 0x488CD0: stringsubst (subst.c:301)
==8365==    by 0x48801B: prefork (subst.c:77)
==8365==    by 0x42B318: execcmd (exec.c:2619)
==8365==    by 0x428CA0: execpline2 (exec.c:1697)
==8365==    by 0x427FD2: execpline (exec.c:1484)
==8365==    by 0x427756: execlist (exec.c:1267)
==8365==    by 0x42717C: execode (exec.c:1073)
==8365==    by 0x431299: runshfunc (exec.c:5040)
==8365==    by 0x430E76: doshfunc (exec.c:4920)
==8365==    by 0x4302FB: execshfunc (exec.c:4557)
==8365==    by 0x42D8C1: execcmd (exec.c:3373)
==8365== 
==8365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8360== 
==8360== HEAP SUMMARY:
==8360==     in use at exit: 2,983,748 bytes in 68,323 blocks
==8360==   total heap usage: 830,636 allocs, 762,313 frees, 56,958,204 bytes allocated
==8360== 
==8367== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8367-by-pythonnut-on-???
==8367== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8367-by-pythonnut-on-???
==8367== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8367-by-pythonnut-on-???
==8367== 
==8367== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8367== don't want to do, unless you know exactly what you're doing,
==8367== or are doing some strange experiment):
==8367==   /usr/lib/valgrind/../../bin/vgdb --pid=8367 ...command...
==8367== 
==8367== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8367==   /path/to/gdb ./zsh
==8367== and then give GDB the following command
==8367==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8367
==8367== --pid is optional if only one valgrind process is running
==8367== 
--8367-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
--8349-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF8FCC,  len 4
==8349== 
==8349== HEAP SUMMARY:
==8349==     in use at exit: 1,367,122 bytes in 28,847 blocks
==8349==   total heap usage: 787,575 allocs, 758,728 frees, 54,449,232 bytes allocated
==8349== 
==8360== Searching for pointers to 68,323 not-freed blocks
--8360--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8349== Searching for pointers to 28,847 not-freed blocks
--8349--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8349--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8360--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8360--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8349--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8360--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8349--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8360--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8360--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8349--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8360--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8349--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8360--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8360--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8349--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8360--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8349--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8349--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8360--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8349--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8360--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8349--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8360--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8349--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8360--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8349--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8360--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8349--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8360--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8349--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8349--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8360--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8349--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8360--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8360--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8349--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8349--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8360--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8349--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8360--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8349--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8360--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8349--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8360--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8349--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8360--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8349--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8349--   Scanning root segment: 0x701a000..0x701afff (4096)
--8360--   Scanning root segment: 0x701a000..0x701afff (4096)
--8349--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8360--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8349--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8360--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8349--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8360--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8349--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8360--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8349--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8360--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8349--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8360--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8349--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8360--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8360--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
client request: code 4d430005,  addr 0xFFEFF5FBC,  len 4
==8349== Checked 1,621,968 bytes
==8349== 
==8349== LEAK SUMMARY:
==8349==    definitely lost: 253 bytes in 4 blocks
==8349==    indirectly lost: 6,756 bytes in 7 blocks
==8349==      possibly lost: 0 bytes in 0 blocks
==8349==    still reachable: 1,360,113 bytes in 28,836 blocks
==8349==         suppressed: 0 bytes in 0 blocks
==8349== Rerun with --leak-check=full to see details of leaked memory
==8349== 
==8349== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8349== 
==8349== 1 errors in context 1 of 1:
==8349== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8349==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8349==    by 0x488CD0: stringsubst (subst.c:301)
==8349==    by 0x48801B: prefork (subst.c:77)
==8349==    by 0x42B318: execcmd (exec.c:2619)
==8349==    by 0x428CA0: execpline2 (exec.c:1697)
==8349==    by 0x427FD2: execpline (exec.c:1484)
==8349==    by 0x427756: execlist (exec.c:1267)
==8349==    by 0x42717C: execode (exec.c:1073)
==8349==    by 0x431299: runshfunc (exec.c:5040)
==8349==    by 0x430E76: doshfunc (exec.c:4920)
==8349==    by 0x4302FB: execshfunc (exec.c:4557)
==8349==    by 0x42D8C1: execcmd (exec.c:3373)
==8349== 
==8349== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8348-by-pythonnut-on-???
==8348== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8348-by-pythonnut-on-???
==8348== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8348-by-pythonnut-on-???
==8348== 
==8348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8348== don't want to do, unless you know exactly what you're doing,
==8348== or are doing some strange experiment):
==8348==   /usr/lib/valgrind/../../bin/vgdb --pid=8348 ...command...
==8348== 
==8348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8348==   /path/to/gdb ./zsh
==8348== and then give GDB the following command
==8348==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8348
==8348== --pid is optional if only one valgrind process is running
==8348== 
--8369-- Caught __NR_exit; running __libc_freeres()
==8369== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8369-by-pythonnut-on-???
==8369== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8369-by-pythonnut-on-???
==8369== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8369-by-pythonnut-on-???
==8369== 
==8369== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8369== don't want to do, unless you know exactly what you're doing,
==8369== or are doing some strange experiment):
==8369==   /usr/lib/valgrind/../../bin/vgdb --pid=8369 ...command...
==8369== 
==8369== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8369==   /path/to/gdb ./zsh
==8369== and then give GDB the following command
==8369==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8369
==8369== --pid is optional if only one valgrind process is running
==8369== 
--8369-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8369== 
==8360== Checked 4,629,952 bytes
==8360== 
==8369== HEAP SUMMARY:
==8369==     in use at exit: 1,368,844 bytes in 28,914 blocks
==8369==   total heap usage: 787,567 allocs, 758,653 frees, 54,437,661 bytes allocated
==8369== 
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
==8369== Searching for pointers to 28,914 not-freed blocks
--8369--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8369--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8369--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8369--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8369--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8369--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8369--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8369--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8369--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8369--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8369--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8369--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8369--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8369--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8369--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8369--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8369--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8369--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8369--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8369--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8369--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8369--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8369--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8369--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8369--   Scanning root segment: 0x701a000..0x701afff (4096)
--8369--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8369--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8369--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8369--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8369--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8369--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8369--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
==8360== LEAK SUMMARY:
==8360==    definitely lost: 253 bytes in 4 blocks
==8360==    indirectly lost: 6,756 bytes in 7 blocks
==8360==      possibly lost: 0 bytes in 0 blocks
==8360==    still reachable: 2,976,739 bytes in 68,312 blocks
==8360==         suppressed: 0 bytes in 0 blocks
==8360== Rerun with --leak-check=full to see details of leaked memory
==8360== 
==8360== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8360== 
==8360== 1 errors in context 1 of 1:
==8360== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8360==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8360==    by 0x488CD0: stringsubst (subst.c:301)
==8360==    by 0x48801B: prefork (subst.c:77)
==8360==    by 0x42B318: execcmd (exec.c:2619)
==8360==    by 0x428CA0: execpline2 (exec.c:1697)
==8360==    by 0x427FD2: execpline (exec.c:1484)
==8360==    by 0x427756: execlist (exec.c:1267)
==8360==    by 0x42717C: execode (exec.c:1073)
==8360==    by 0x431299: runshfunc (exec.c:5040)
==8360==    by 0x430E76: doshfunc (exec.c:4920)
==8360==    by 0x4302FB: execshfunc (exec.c:4557)
==8360==    by 0x42D8C1: execcmd (exec.c:3373)
==8360== 
==8360== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF65AC,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==8369== Checked 1,625,320 bytes
==8369== 
--8370-- Caught __NR_exit; running __libc_freeres()
==8369== LEAK SUMMARY:
==8369==    definitely lost: 253 bytes in 4 blocks
==8369==    indirectly lost: 6,756 bytes in 7 blocks
==8369==      possibly lost: 0 bytes in 0 blocks
==8369==    still reachable: 1,361,835 bytes in 28,903 blocks
client request: code 4d430005,  addr 0xFFEFEC84C,  len 4
==8369==         suppressed: 0 bytes in 0 blocks
==8369== Rerun with --leak-check=full to see details of leaked memory
==8369== 
==8369== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8369== 
==8369== 1 errors in context 1 of 1:
==8369== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8369==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8369==    by 0x488CD0: stringsubst (subst.c:301)
==8369==    by 0x48801B: prefork (subst.c:77)
==8369==    by 0x42B318: execcmd (exec.c:2619)
==8369==    by 0x428CA0: execpline2 (exec.c:1697)
==8369==    by 0x427FD2: execpline (exec.c:1484)
==8369==    by 0x427756: execlist (exec.c:1267)
==8369==    by 0x42717C: execode (exec.c:1073)
==8369==    by 0x431299: runshfunc (exec.c:5040)
==8369==    by 0x430E76: doshfunc (exec.c:4920)
==8369==    by 0x4302FB: execshfunc (exec.c:4557)
==8369==    by 0x42D8C1: execcmd (exec.c:3373)
==8369== 
==8369== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8368== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8368-by-pythonnut-on-???
==8368== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8368-by-pythonnut-on-???
==8368== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8368-by-pythonnut-on-???
==8368== 
==8368== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8368== don't want to do, unless you know exactly what you're doing,
==8368== or are doing some strange experiment):
==8368==   /usr/lib/valgrind/../../bin/vgdb --pid=8368 ...command...
==8368== 
==8368== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8368==   /path/to/gdb ./zsh
==8368== and then give GDB the following command
==8368==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8368
==8368== --pid is optional if only one valgrind process is running
==8368== 
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==8370== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8370-by-pythonnut-on-???
==8370== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8370-by-pythonnut-on-???
==8370== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8370-by-pythonnut-on-???
==8370== 
==8370== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8370== don't want to do, unless you know exactly what you're doing,
==8370== or are doing some strange experiment):
==8370==   /usr/lib/valgrind/../../bin/vgdb --pid=8370 ...command...
==8370== 
==8370== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8370==   /path/to/gdb ./zsh
==8370== and then give GDB the following command
==8370==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8370
==8370== --pid is optional if only one valgrind process is running
==8370== 
==8372== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8372-by-pythonnut-on-???
==8372== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8372-by-pythonnut-on-???
==8372== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8372-by-pythonnut-on-???
==8372== 
==8372== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8372== don't want to do, unless you know exactly what you're doing,
==8372== or are doing some strange experiment):
==8372==   /usr/lib/valgrind/../../bin/vgdb --pid=8372 ...command...
==8372== 
==8372== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8372==   /path/to/gdb ./zsh
==8372== and then give GDB the following command
==8372==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8372
==8372== --pid is optional if only one valgrind process is running
==8372== 
--8370-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8373== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8373-by-pythonnut-on-???
==8373== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8373-by-pythonnut-on-???
==8373== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8373-by-pythonnut-on-???
==8373== 
==8373== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8373== don't want to do, unless you know exactly what you're doing,
==8373== or are doing some strange experiment):
==8373==   /usr/lib/valgrind/../../bin/vgdb --pid=8373 ...command...
==8373== 
==8373== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8373==   /path/to/gdb ./zsh
==8373== and then give GDB the following command
==8373==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8373
==8373== --pid is optional if only one valgrind process is running
==8373== 
==8370== 
==8370== HEAP SUMMARY:
==8370==     in use at exit: 2,983,755 bytes in 68,323 blocks
==8370==   total heap usage: 830,651 allocs, 762,328 frees, 56,963,202 bytes allocated
==8370== 
==8374== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8374-by-pythonnut-on-???
==8374== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8374-by-pythonnut-on-???
==8374== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8374-by-pythonnut-on-???
==8374== 
==8374== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8374== don't want to do, unless you know exactly what you're doing,
==8374== or are doing some strange experiment):
==8374==   /usr/lib/valgrind/../../bin/vgdb --pid=8374 ...command...
==8374== 
==8374== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8374==   /path/to/gdb ./zsh
==8374== and then give GDB the following command
==8374==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8374
==8374== --pid is optional if only one valgrind process is running
==8374== 
==8376== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8376-by-pythonnut-on-???
==8376== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8376-by-pythonnut-on-???
==8376== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8376-by-pythonnut-on-???
==8376== 
==8376== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8376== don't want to do, unless you know exactly what you're doing,
==8376== or are doing some strange experiment):
==8376==   /usr/lib/valgrind/../../bin/vgdb --pid=8376 ...command...
==8376== 
==8376== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8376==   /path/to/gdb ./zsh
==8376== and then give GDB the following command
==8376==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8376
==8376== --pid is optional if only one valgrind process is running
==8376== 
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
==8375== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8375-by-pythonnut-on-???
==8375== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8375-by-pythonnut-on-???
==8375== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8375-by-pythonnut-on-???
==8375== 
==8375== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8375== don't want to do, unless you know exactly what you're doing,
==8375== or are doing some strange experiment):
==8375==   /usr/lib/valgrind/../../bin/vgdb --pid=8375 ...command...
==8375== 
==8375== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8375==   /path/to/gdb ./zsh
==8375== and then give GDB the following command
==8375==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8375
==8375== --pid is optional if only one valgrind process is running
==8375== 
client request: code 4d430005,  addr 0xFFEFED4DC,  len 4
==8370== Searching for pointers to 68,323 not-freed blocks
--8370--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8370--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8370--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8370--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8370--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8370--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8370--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8370--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8370--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8370--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8370--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8370--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8370--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8370--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8370--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8370--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8370--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8370--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8375-- Caught __NR_exit; running __libc_freeres()
--8370--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8370--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8370--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8370--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8370--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8370--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8370--   Scanning root segment: 0x701a000..0x701afff (4096)
--8370--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8370--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8370--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8370--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8370--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8370--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8370--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8370--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8376-- Caught __NR_exit; running __libc_freeres()
--8375-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8375== 
==8375== HEAP SUMMARY:
==8375==     in use at exit: 3,016,891 bytes in 68,815 blocks
==8375==   total heap usage: 834,379 allocs, 765,564 frees, 58,903,628 bytes allocated
==8375== 
--8376-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8376== 
==8376== HEAP SUMMARY:
==8376==     in use at exit: 1,372,120 bytes in 28,983 blocks
==8376==   total heap usage: 787,704 allocs, 758,721 frees, 54,663,017 bytes allocated
==8376== 
==8376== Searching for pointers to 28,983 not-freed blocks
--8376--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8376--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8376--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8376--   Scanning root segment: 0x4035000..0x4038fff (16384)
--8376--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8376--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8376--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8376--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8376--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8376--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8376--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8376--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8376--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8376--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8376--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8376--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8376--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8376--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8376--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8376--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8376--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8376--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8376--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8376--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8376--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8376--   Scanning root segment: 0x701a000..0x701afff (4096)
--8376--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8376--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8376--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8376--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8376--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8376--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8376--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8375== Searching for pointers to 68,815 not-freed blocks
--8375--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8375--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8375--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8375--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8375--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8375--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8375--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8375--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8375--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8375--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8375--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8375--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8375--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8375--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8375--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8375--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8375--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8375--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8375--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8375--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8375--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8375--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8375--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8375--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8375--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8375--   Scanning root segment: 0x701a000..0x701afff (4096)
--8375--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8375--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8375--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8375--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8375--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8375--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8375--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8375--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8376== Checked 1,649,112 bytes
==8376== 
==8376== LEAK SUMMARY:
==8376==    definitely lost: 253 bytes in 4 blocks
==8376==    indirectly lost: 6,756 bytes in 7 blocks
==8376==      possibly lost: 0 bytes in 0 blocks
==8376==    still reachable: 1,365,111 bytes in 28,972 blocks
==8376==         suppressed: 0 bytes in 0 blocks
==8376== Rerun with --leak-check=full to see details of leaked memory
==8376== 
==8376== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8376== 
==8376== 1 errors in context 1 of 1:
==8376== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8376==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8376==    by 0x488CD0: stringsubst (subst.c:301)
==8376==    by 0x48801B: prefork (subst.c:77)
==8376==    by 0x42B318: execcmd (exec.c:2619)
==8376==    by 0x428CA0: execpline2 (exec.c:1697)
==8376==    by 0x427FD2: execpline (exec.c:1484)
==8376==    by 0x427756: execlist (exec.c:1267)
==8376==    by 0x42717C: execode (exec.c:1073)
==8376==    by 0x431299: runshfunc (exec.c:5040)
==8376==    by 0x430E76: doshfunc (exec.c:4920)
==8376==    by 0x4302FB: execshfunc (exec.c:4557)
==8376==    by 0x42D8C1: execcmd (exec.c:3373)
==8376== 
==8376== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8370== Checked 4,630,088 bytes
==8370== 
==8378== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8378-by-pythonnut-on-???
==8378== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8378-by-pythonnut-on-???
==8378== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8378-by-pythonnut-on-???
==8378== 
==8378== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8378== don't want to do, unless you know exactly what you're doing,
==8378== or are doing some strange experiment):
==8378==   /usr/lib/valgrind/../../bin/vgdb --pid=8378 ...command...
==8378== 
==8378== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8378==   /path/to/gdb ./zsh
==8378== and then give GDB the following command
==8378==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8378
==8378== --pid is optional if only one valgrind process is running
==8378== 
==8370== LEAK SUMMARY:
==8370==    definitely lost: 253 bytes in 4 blocks
==8370==    indirectly lost: 6,756 bytes in 7 blocks
==8370==      possibly lost: 0 bytes in 0 blocks
==8370==    still reachable: 2,976,746 bytes in 68,312 blocks
==8370==         suppressed: 0 bytes in 0 blocks
==8370== Rerun with --leak-check=full to see details of leaked memory
==8370== 
==8370== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8370== 
==8370== 1 errors in context 1 of 1:
==8370== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8370==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8370==    by 0x488CD0: stringsubst (subst.c:301)
==8370==    by 0x48801B: prefork (subst.c:77)
==8370==    by 0x42B318: execcmd (exec.c:2619)
==8370==    by 0x428CA0: execpline2 (exec.c:1697)
==8370==    by 0x427FD2: execpline (exec.c:1484)
==8370==    by 0x427756: execlist (exec.c:1267)
==8370==    by 0x42717C: execode (exec.c:1073)
==8370==    by 0x431299: runshfunc (exec.c:5040)
==8370==    by 0x430E76: doshfunc (exec.c:4920)
==8370==    by 0x4302FB: execshfunc (exec.c:4557)
==8370==    by 0x42D8C1: execcmd (exec.c:3373)
==8370== 
==8370== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8379== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8379-by-pythonnut-on-???
==8379== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8379-by-pythonnut-on-???
==8379== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8379-by-pythonnut-on-???
==8379== 
==8379== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8379== don't want to do, unless you know exactly what you're doing,
==8379== or are doing some strange experiment):
==8379==   /usr/lib/valgrind/../../bin/vgdb --pid=8379 ...command...
==8379== 
==8379== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8379==   /path/to/gdb ./zsh
==8379== and then give GDB the following command
==8379==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8379
==8379== --pid is optional if only one valgrind process is running
==8379== 
--8379-- Caught __NR_exit; running __libc_freeres()
--8380-- Caught __NR_exit; running __libc_freeres()
==8380== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8380-by-pythonnut-on-???
==8380== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8380-by-pythonnut-on-???
==8380== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8380-by-pythonnut-on-???
==8380== 
==8380== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8380== don't want to do, unless you know exactly what you're doing,
==8380== or are doing some strange experiment):
==8380==   /usr/lib/valgrind/../../bin/vgdb --pid=8380 ...command...
==8380== 
==8380== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8380==   /path/to/gdb ./zsh
==8380== and then give GDB the following command
==8380==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8380
==8380== --pid is optional if only one valgrind process is running
==8380== 
==8375== Checked 4,725,768 bytes
==8375== 
--8379-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8379== 
==8379== HEAP SUMMARY:
==8379==     in use at exit: 1,445,564 bytes in 28,990 blocks
==8379==   total heap usage: 787,712 allocs, 758,722 frees, 54,739,549 bytes allocated
==8379== 
--8380-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8380== 
==8375== LEAK SUMMARY:
==8375==    definitely lost: 253 bytes in 4 blocks
==8375==    indirectly lost: 6,756 bytes in 7 blocks
==8375==      possibly lost: 0 bytes in 0 blocks
==8375==    still reachable: 3,009,882 bytes in 68,804 blocks
==8375==         suppressed: 0 bytes in 0 blocks
==8375== Rerun with --leak-check=full to see details of leaked memory
==8375== 
==8375== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8375== 
==8375== 1 errors in context 1 of 1:
==8375== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8375==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8375==    by 0x488CD0: stringsubst (subst.c:301)
==8375==    by 0x48801B: prefork (subst.c:77)
==8375==    by 0x42B318: execcmd (exec.c:2619)
==8375==    by 0x428CA0: execpline2 (exec.c:1697)
==8375==    by 0x427FD2: execpline (exec.c:1484)
==8375==    by 0x427756: execlist (exec.c:1267)
==8375==    by 0x42717C: execode (exec.c:1073)
==8375==    by 0x431299: runshfunc (exec.c:5040)
==8375==    by 0x430E76: doshfunc (exec.c:4920)
==8375==    by 0x4302FB: execshfunc (exec.c:4557)
==8375==    by 0x42D8C1: execcmd (exec.c:3373)
==8375== 
==8375== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8380== HEAP SUMMARY:
==8380==     in use at exit: 2,983,915 bytes in 68,324 blocks
==8380==   total heap usage: 830,668 allocs, 762,344 frees, 56,968,053 bytes allocated
==8380== 
==8379== Searching for pointers to 28,990 not-freed blocks
--8379--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8379--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8379--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8379--   Scanning root segment: 0x4035000..0x4041fff (53248)
--8379--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8379--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--8379--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8379--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8379--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8379--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8379--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8379--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8379--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8379--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8379--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8379--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8379--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8379--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8379--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8379--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8379--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8379--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8379--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8379--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8379--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8379--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8379--   Scanning root segment: 0x701a000..0x701afff (4096)
--8379--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8379--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8379--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8379--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8379--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8379--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8379--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8373-- Caught __NR_exit; running __libc_freeres()
==8380== Searching for pointers to 68,324 not-freed blocks
--8380--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8380--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8380--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8380--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8380--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8380--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8380--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8380--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8380--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8380--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8380--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8380--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8380--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8380--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8380--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8380--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8380--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8380--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8380--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8380--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8380--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8380--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8380--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8380--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8380--   Scanning root segment: 0x701a000..0x701afff (4096)
--8380--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8380--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8380--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8380--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8380--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8380--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8380--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8380--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8373-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8379== Checked 1,834,064 bytes
==8379== 
==8373== 
==8373== HEAP SUMMARY:
==8373==     in use at exit: 3,014,741 bytes in 68,736 blocks
==8373==   total heap usage: 834,288 allocs, 765,552 frees, 58,704,829 bytes allocated
==8373== 
==8379== LEAK SUMMARY:
==8379==    definitely lost: 253 bytes in 4 blocks
==8379==    indirectly lost: 6,756 bytes in 7 blocks
==8379==      possibly lost: 0 bytes in 0 blocks
==8379==    still reachable: 1,438,555 bytes in 28,979 blocks
==8379==         suppressed: 0 bytes in 0 blocks
==8379== Rerun with --leak-check=full to see details of leaked memory
==8379== 
==8379== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8379== 
==8379== 1 errors in context 1 of 1:
==8379== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8379==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8379==    by 0x488CD0: stringsubst (subst.c:301)
==8379==    by 0x48801B: prefork (subst.c:77)
==8379==    by 0x42B318: execcmd (exec.c:2619)
==8379==    by 0x428CA0: execpline2 (exec.c:1697)
==8379==    by 0x427FD2: execpline (exec.c:1484)
==8379==    by 0x427756: execlist (exec.c:1267)
==8379==    by 0x42717C: execode (exec.c:1073)
==8379==    by 0x431299: runshfunc (exec.c:5040)
==8379==    by 0x430E76: doshfunc (exec.c:4920)
==8379==    by 0x4302FB: execshfunc (exec.c:4557)
==8379==    by 0x42D8C1: execcmd (exec.c:3373)
==8379== 
==8379== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8373== Searching for pointers to 68,736 not-freed blocks
--8373--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8373--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8373--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8373--   Scanning root segment: 0x4037000..0x403efff (32768)
--8373--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8373--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8373--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8373--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8373--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8373--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8373--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8373--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8373--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8373--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8373--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8373--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8373--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8373--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8373--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8373--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8373--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8373--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8373--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8373--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8373--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8373--   Scanning root segment: 0x701a000..0x701afff (4096)
--8373--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8373--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8373--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8373--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8373--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8373--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8373--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8373--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8380== Checked 4,629,432 bytes
==8380== 
==8380== LEAK SUMMARY:
==8380==    definitely lost: 253 bytes in 4 blocks
==8380==    indirectly lost: 6,756 bytes in 7 blocks
==8380==      possibly lost: 0 bytes in 0 blocks
==8380==    still reachable: 2,976,906 bytes in 68,313 blocks
==8380==         suppressed: 0 bytes in 0 blocks
==8380== Rerun with --leak-check=full to see details of leaked memory
==8380== 
==8380== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8380== 
==8380== 1 errors in context 1 of 1:
==8380== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8380==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8380==    by 0x488CD0: stringsubst (subst.c:301)
==8380==    by 0x48801B: prefork (subst.c:77)
==8380==    by 0x42B318: execcmd (exec.c:2619)
==8380==    by 0x428CA0: execpline2 (exec.c:1697)
==8380==    by 0x427FD2: execpline (exec.c:1484)
==8380==    by 0x427756: execlist (exec.c:1267)
==8380==    by 0x42717C: execode (exec.c:1073)
==8380==    by 0x431299: runshfunc (exec.c:5040)
==8380==    by 0x430E76: doshfunc (exec.c:4920)
==8380==    by 0x4302FB: execshfunc (exec.c:4557)
==8380==    by 0x42D8C1: execcmd (exec.c:3373)
==8380== 
==8380== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8381== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8381-by-pythonnut-on-???
==8381== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8381-by-pythonnut-on-???
==8381== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8381-by-pythonnut-on-???
==8381== 
==8381== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8381== don't want to do, unless you know exactly what you're doing,
==8381== or are doing some strange experiment):
==8381==   /usr/lib/valgrind/../../bin/vgdb --pid=8381 ...command...
==8381== 
==8381== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8381==   /path/to/gdb ./zsh
==8381== and then give GDB the following command
==8381==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8381
==8381== --pid is optional if only one valgrind process is running
==8381== 
==8373== Checked 4,705,520 bytes
==8373== 
==8373== LEAK SUMMARY:
==8373==    definitely lost: 253 bytes in 4 blocks
==8373==    indirectly lost: 6,756 bytes in 7 blocks
==8373==      possibly lost: 0 bytes in 0 blocks
==8373==    still reachable: 3,007,732 bytes in 68,725 blocks
==8373==         suppressed: 0 bytes in 0 blocks
==8373== Rerun with --leak-check=full to see details of leaked memory
==8373== 
==8373== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8373== 
==8373== 1 errors in context 1 of 1:
==8373== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8373==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8373==    by 0x488CD0: stringsubst (subst.c:301)
==8373==    by 0x48801B: prefork (subst.c:77)
==8373==    by 0x42B318: execcmd (exec.c:2619)
==8373==    by 0x428CA0: execpline2 (exec.c:1697)
==8373==    by 0x427FD2: execpline (exec.c:1484)
==8373==    by 0x427756: execlist (exec.c:1267)
==8373==    by 0x42717C: execode (exec.c:1073)
==8373==    by 0x431299: runshfunc (exec.c:5040)
==8373==    by 0x430E76: doshfunc (exec.c:4920)
==8373==    by 0x4302FB: execshfunc (exec.c:4557)
==8373==    by 0x42D8C1: execcmd (exec.c:3373)
==8373== 
==8373== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8381-- Caught __NR_exit; running __libc_freeres()
==8382== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8382-by-pythonnut-on-???
==8382== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8382-by-pythonnut-on-???
==8382== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8382-by-pythonnut-on-???
==8382== 
==8382== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8382== don't want to do, unless you know exactly what you're doing,
==8382== or are doing some strange experiment):
==8382==   /usr/lib/valgrind/../../bin/vgdb --pid=8382 ...command...
==8382== 
==8382== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8382==   /path/to/gdb ./zsh
==8382== and then give GDB the following command
==8382==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8382
==8382== --pid is optional if only one valgrind process is running
==8382== 
--8381-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8381== 
==8381== HEAP SUMMARY:
==8381==     in use at exit: 2,984,187 bytes in 68,329 blocks
==8381==   total heap usage: 830,716 allocs, 762,387 frees, 56,977,081 bytes allocated
==8381== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8383== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8383-by-pythonnut-on-???
==8383== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8383-by-pythonnut-on-???
==8383== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8383-by-pythonnut-on-???
==8383== 
==8383== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8383== don't want to do, unless you know exactly what you're doing,
==8383== or are doing some strange experiment):
==8383==   /usr/lib/valgrind/../../bin/vgdb --pid=8383 ...command...
==8383== 
==8383== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8383==   /path/to/gdb ./zsh
==8383== and then give GDB the following command
==8383==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8383
==8383== --pid is optional if only one valgrind process is running
==8383== 
--8383-- Caught __NR_exit; running __libc_freeres()
==8381== Searching for pointers to 68,329 not-freed blocks
--8381--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8381--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8381--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8381--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8381--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8381--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8381--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8381--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8381--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8381--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8381--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8381--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8381--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8381--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8381--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8381--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8381--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8381--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8381--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8381--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8381--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8381--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8381--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8381--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8381--   Scanning root segment: 0x701a000..0x701afff (4096)
--8381--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8381--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8381--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8381--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8381--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8381--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8381--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8381--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8383-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8383== 
==8383== HEAP SUMMARY:
==8383==     in use at exit: 3,017,094 bytes in 68,822 blocks
==8383==   total heap usage: 834,396 allocs, 765,574 frees, 58,873,765 bytes allocated
==8383== 
==8383== Searching for pointers to 68,822 not-freed blocks
--8383--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8383--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8383--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8383--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8383--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8383--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8383--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8383--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8383--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8383--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8383--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8383--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8383--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8383--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8383--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8383--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8383--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8383--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8383--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8383--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8383--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8383--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8383--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8383--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8383--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8383--   Scanning root segment: 0x701a000..0x701afff (4096)
--8383--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8383--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8383--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8383--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8383--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8383--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8383--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8383--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8381== Checked 4,631,072 bytes
==8381== 
==8381== LEAK SUMMARY:
==8381==    definitely lost: 253 bytes in 4 blocks
==8381==    indirectly lost: 6,756 bytes in 7 blocks
==8381==      possibly lost: 0 bytes in 0 blocks
==8381==    still reachable: 2,977,178 bytes in 68,318 blocks
==8381==         suppressed: 0 bytes in 0 blocks
==8381== Rerun with --leak-check=full to see details of leaked memory
==8381== 
==8381== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8381== 
==8381== 1 errors in context 1 of 1:
==8381== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8381==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8381==    by 0x488CD0: stringsubst (subst.c:301)
==8381==    by 0x48801B: prefork (subst.c:77)
==8381==    by 0x42B318: execcmd (exec.c:2619)
==8381==    by 0x428CA0: execpline2 (exec.c:1697)
==8381==    by 0x427FD2: execpline (exec.c:1484)
==8381==    by 0x427756: execlist (exec.c:1267)
==8381==    by 0x42717C: execode (exec.c:1073)
==8381==    by 0x431299: runshfunc (exec.c:5040)
==8381==    by 0x430E76: doshfunc (exec.c:4920)
==8381==    by 0x4302FB: execshfunc (exec.c:4557)
==8381==    by 0x42D8C1: execcmd (exec.c:3373)
==8381== 
==8381== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8384-by-pythonnut-on-???
==8384== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8384-by-pythonnut-on-???
==8384== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8384-by-pythonnut-on-???
==8384== 
==8384== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8384== don't want to do, unless you know exactly what you're doing,
==8384== or are doing some strange experiment):
==8384==   /usr/lib/valgrind/../../bin/vgdb --pid=8384 ...command...
==8384== 
==8384== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8384==   /path/to/gdb ./zsh
==8384== and then give GDB the following command
==8384==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8384
==8384== --pid is optional if only one valgrind process is running
==8384== 
--8384-- Caught __NR_exit; running __libc_freeres()
==8383== Checked 4,726,456 bytes
==8383== 
--8384-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8383== LEAK SUMMARY:
==8383==    definitely lost: 253 bytes in 4 blocks
==8383==    indirectly lost: 6,756 bytes in 7 blocks
==8383==      possibly lost: 0 bytes in 0 blocks
==8383==    still reachable: 3,010,085 bytes in 68,811 blocks
==8383==         suppressed: 0 bytes in 0 blocks
==8383== Rerun with --leak-check=full to see details of leaked memory
==8383== 
==8383== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8383== 
==8383== 1 errors in context 1 of 1:
==8383== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8383==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8383==    by 0x488CD0: stringsubst (subst.c:301)
==8383==    by 0x48801B: prefork (subst.c:77)
==8383==    by 0x42B318: execcmd (exec.c:2619)
==8383==    by 0x428CA0: execpline2 (exec.c:1697)
==8383==    by 0x427FD2: execpline (exec.c:1484)
==8383==    by 0x427756: execlist (exec.c:1267)
==8383==    by 0x42717C: execode (exec.c:1073)
==8383==    by 0x431299: runshfunc (exec.c:5040)
==8383==    by 0x430E76: doshfunc (exec.c:4920)
==8383==    by 0x4302FB: execshfunc (exec.c:4557)
==8383==    by 0x42D8C1: execcmd (exec.c:3373)
==8383== 
==8383== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== 
==8384== HEAP SUMMARY:
==8384==     in use at exit: 2,984,029 bytes in 68,329 blocks
==8384==   total heap usage: 830,695 allocs, 762,366 frees, 56,974,775 bytes allocated
==8384== 
--8382-- Caught __NR_exit; running __libc_freeres()
==8384== Searching for pointers to 68,329 not-freed blocks
--8384--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8384--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8384--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8384--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8384--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8384--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8384--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8384--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8384--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8384--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8384--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8384--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8384--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8384--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8384--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8384--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8384--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8384--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8384--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8384--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8384--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8384--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8384--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8382-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8384--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8384--   Scanning root segment: 0x701a000..0x701afff (4096)
--8384--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8384--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8384--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8384--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8384--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8384--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8384--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8384--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8382== 
==8382== HEAP SUMMARY:
==8382==     in use at exit: 3,014,954 bytes in 68,743 blocks
==8382==   total heap usage: 834,303 allocs, 765,560 frees, 58,707,706 bytes allocated
==8382== 
==8382== Searching for pointers to 68,743 not-freed blocks
--8382--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8382--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8382--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8382--   Scanning root segment: 0x4037000..0x403efff (32768)
--8382--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8382--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8382--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8382--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8382--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8382--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8382--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8382--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8382--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8382--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8382--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8382--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8382--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8382--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8382--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8382--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8382--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8382--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8382--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8382--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8382--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8382--   Scanning root segment: 0x701a000..0x701afff (4096)
--8382--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8382--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8382--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8382--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8382--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8382--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8382--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8382--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8378-- Caught __NR_exit; running __libc_freeres()
--8378-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8384== Checked 4,629,464 bytes
==8384== 
==8378== 
==8378== HEAP SUMMARY:
==8378==     in use at exit: 1,409,137 bytes in 28,990 blocks
==8378==   total heap usage: 791,430 allocs, 762,440 frees, 55,967,706 bytes allocated
==8378== 
==8378== Searching for pointers to 28,990 not-freed blocks
--8378--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8378--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8378--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8378--   Scanning root segment: 0x4035000..0x4041fff (53248)
--8378--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8378--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--8378--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8378--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8378--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8378--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8378--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8378--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8378--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8378--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8378--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8378--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8378--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8378--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8378--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8378--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8378--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8378--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8378--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8378--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8378--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8378--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8378--   Scanning root segment: 0x701a000..0x701afff (4096)
--8378--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8378--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8378--   Scanning root segment: 0xae51000..0xae52fff (8192)
==8384== LEAK SUMMARY:
==8384==    definitely lost: 253 bytes in 4 blocks
==8384==    indirectly lost: 6,756 bytes in 7 blocks
==8384==      possibly lost: 0 bytes in 0 blocks
==8384==    still reachable: 2,977,020 bytes in 68,318 blocks
==8384==         suppressed: 0 bytes in 0 blocks
==8384== Rerun with --leak-check=full to see details of leaked memory
==8384== 
--8378--   Scanning root segment: 0xb054000..0xb054fff (4096)
==8384== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8384== 
--8378--   Scanning root segment: 0xb268000..0xb268fff (4096)
==8384== 1 errors in context 1 of 1:
==8384== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8384==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8384==    by 0x488CD0: stringsubst (subst.c:301)
--8378--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==8384==    by 0x48801B: prefork (subst.c:77)
==8384==    by 0x42B318: execcmd (exec.c:2619)
==8384==    by 0x428CA0: execpline2 (exec.c:1697)
==8384==    by 0x427FD2: execpline (exec.c:1484)
--8378--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8384==    by 0x427756: execlist (exec.c:1267)
==8384==    by 0x42717C: execode (exec.c:1073)
==8384==    by 0x431299: runshfunc (exec.c:5040)
==8384==    by 0x430E76: doshfunc (exec.c:4920)
==8384==    by 0x4302FB: execshfunc (exec.c:4557)
==8384==    by 0x42D8C1: execcmd (exec.c:3373)
==8384== 
==8384== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8382== Checked 4,706,232 bytes
==8382== 
==8385== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8385-by-pythonnut-on-???
==8385== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8385-by-pythonnut-on-???
==8385== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8385-by-pythonnut-on-???
==8385== 
==8385== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8385== don't want to do, unless you know exactly what you're doing,
==8385== or are doing some strange experiment):
==8385==   /usr/lib/valgrind/../../bin/vgdb --pid=8385 ...command...
==8385== 
==8385== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8385==   /path/to/gdb ./zsh
==8385== and then give GDB the following command
==8385==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8385
==8385== --pid is optional if only one valgrind process is running
==8385== 
==8378== Checked 1,796,952 bytes
==8378== 
==8378== LEAK SUMMARY:
==8378==    definitely lost: 253 bytes in 4 blocks
==8378==    indirectly lost: 6,756 bytes in 7 blocks
==8378==      possibly lost: 0 bytes in 0 blocks
==8378==    still reachable: 1,402,128 bytes in 28,979 blocks
==8378==         suppressed: 0 bytes in 0 blocks
==8378== Rerun with --leak-check=full to see details of leaked memory
==8378== 
==8378== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8378== 
==8378== 1 errors in context 1 of 1:
==8378== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8378==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8378==    by 0x488CD0: stringsubst (subst.c:301)
==8378==    by 0x48801B: prefork (subst.c:77)
==8378==    by 0x42B318: execcmd (exec.c:2619)
==8378==    by 0x428CA0: execpline2 (exec.c:1697)
==8378==    by 0x427FD2: execpline (exec.c:1484)
==8378==    by 0x427756: execlist (exec.c:1267)
==8378==    by 0x42717C: execode (exec.c:1073)
==8378==    by 0x431299: runshfunc (exec.c:5040)
==8378==    by 0x430E76: doshfunc (exec.c:4920)
==8378==    by 0x4302FB: execshfunc (exec.c:4557)
==8378==    by 0x42D8C1: execcmd (exec.c:3373)
==8378== 
==8378== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8385-- Caught __NR_exit; running __libc_freeres()
==8382== LEAK SUMMARY:
==8382==    definitely lost: 253 bytes in 4 blocks
==8382==    indirectly lost: 6,756 bytes in 7 blocks
==8382==      possibly lost: 0 bytes in 0 blocks
==8382==    still reachable: 3,007,945 bytes in 68,732 blocks
==8382==         suppressed: 0 bytes in 0 blocks
==8382== Rerun with --leak-check=full to see details of leaked memory
==8382== 
==8382== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8382== 
==8382== 1 errors in context 1 of 1:
==8382== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8382==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8382==    by 0x488CD0: stringsubst (subst.c:301)
==8382==    by 0x48801B: prefork (subst.c:77)
==8382==    by 0x42B318: execcmd (exec.c:2619)
==8382==    by 0x428CA0: execpline2 (exec.c:1697)
==8382==    by 0x427FD2: execpline (exec.c:1484)
==8382==    by 0x427756: execlist (exec.c:1267)
==8382==    by 0x42717C: execode (exec.c:1073)
==8382==    by 0x431299: runshfunc (exec.c:5040)
==8382==    by 0x430E76: doshfunc (exec.c:4920)
==8382==    by 0x4302FB: execshfunc (exec.c:4557)
==8382==    by 0x42D8C1: execcmd (exec.c:3373)
==8382== 
==8382== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8386== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8386-by-pythonnut-on-???
==8386== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8386-by-pythonnut-on-???
==8386== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8386-by-pythonnut-on-???
==8386== 
==8386== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8386== don't want to do, unless you know exactly what you're doing,
==8386== or are doing some strange experiment):
==8386==   /usr/lib/valgrind/../../bin/vgdb --pid=8386 ...command...
==8386== 
==8386== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8386==   /path/to/gdb ./zsh
==8386== and then give GDB the following command
==8386==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8386
==8386== --pid is optional if only one valgrind process is running
==8386== 
--8385-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8387== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8387-by-pythonnut-on-???
==8387== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8387-by-pythonnut-on-???
==8387== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8387-by-pythonnut-on-???
==8387== 
==8387== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8387== don't want to do, unless you know exactly what you're doing,
==8387== or are doing some strange experiment):
==8387==   /usr/lib/valgrind/../../bin/vgdb --pid=8387 ...command...
==8387== 
==8387== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8387==   /path/to/gdb ./zsh
==8387== and then give GDB the following command
==8387==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8387
==8387== --pid is optional if only one valgrind process is running
==8387== 
==8385== 
==8385== HEAP SUMMARY:
==8385==     in use at exit: 2,984,064 bytes in 68,330 blocks
==8385==   total heap usage: 830,708 allocs, 762,378 frees, 56,977,469 bytes allocated
==8385== 
--8387-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE75C,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8388== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8388-by-pythonnut-on-???
==8388== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8388-by-pythonnut-on-???
==8388== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8388-by-pythonnut-on-???
==8388== 
==8388== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8388== don't want to do, unless you know exactly what you're doing,
==8388== or are doing some strange experiment):
==8388==   /usr/lib/valgrind/../../bin/vgdb --pid=8388 ...command...
==8388== 
==8388== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8388==   /path/to/gdb ./zsh
==8388== and then give GDB the following command
==8388==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8388
==8388== --pid is optional if only one valgrind process is running
==8388== 
--8389-- Caught __NR_exit; running __libc_freeres()
==8385== Searching for pointers to 68,330 not-freed blocks
--8385--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8385--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8385--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8385--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8385--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8385--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8385--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8385--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8385--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8385--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8385--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8385--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8385--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8385--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8385--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8385--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8385--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8385--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8385--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8385--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8385--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8385--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8385--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8385--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8385--   Scanning root segment: 0x701a000..0x701afff (4096)
--8385--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8385--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8385--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8385--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8385--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8385--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8385--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8385--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8387-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8388-- Caught __NR_exit; running __libc_freeres()
==8389== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8389-by-pythonnut-on-???
==8389== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8389-by-pythonnut-on-???
==8389== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8389-by-pythonnut-on-???
==8389== 
==8389== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8389== don't want to do, unless you know exactly what you're doing,
==8389== or are doing some strange experiment):
==8389==   /usr/lib/valgrind/../../bin/vgdb --pid=8389 ...command...
==8389== 
==8389== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8389==   /path/to/gdb ./zsh
==8389== and then give GDB the following command
==8389==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8389
==8389== --pid is optional if only one valgrind process is running
==8389== 
==8387== 
==8387== HEAP SUMMARY:
==8387==     in use at exit: 1,415,351 bytes in 28,990 blocks
==8387==   total heap usage: 787,717 allocs, 758,727 frees, 54,748,044 bytes allocated
==8387== 
--8389-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8387== Searching for pointers to 28,990 not-freed blocks
--8387--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8387--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8387--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8387--   Scanning root segment: 0x4035000..0x4041fff (53248)
--8387--   Scanning root segment: 0x4043000..0x4046fff (16384)
==8389== 
--8387--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8387--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--8387--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8387--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8387--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8387--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8387--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8387--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8387--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8387--   Scanning root segment: 0x54ac000..0x54acfff (4096)
==8389== HEAP SUMMARY:
==8389==     in use at exit: 1,393,879 bytes in 28,990 blocks
==8389==   total heap usage: 787,723 allocs, 758,733 frees, 54,750,164 bytes allocated
==8389== 
--8387--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8387--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8387--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8387--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8387--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8387--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8387--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8387--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8387--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8387--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8387--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8387--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8387--   Scanning root segment: 0x701a000..0x701afff (4096)
--8387--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8387--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8387--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8387--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8387--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8387--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8387--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8388-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8389== Searching for pointers to 28,990 not-freed blocks
--8389--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8389--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8389--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8389--   Scanning root segment: 0x4035000..0x4041fff (53248)
==8388== 
--8389--   Scanning root segment: 0x4043000..0x4046fff (16384)
--8389--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8389--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--8389--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8389--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8389--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8389--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8389--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8389--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8389--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8389--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8389--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8389--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8389--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8389--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8389--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8389--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8389--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8389--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8389--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8389--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8389--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8389--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8389--   Scanning root segment: 0x701a000..0x701afff (4096)
--8389--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8389--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8389--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8389--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8389--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8389--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8389--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8388== HEAP SUMMARY:
==8388==     in use at exit: 3,017,079 bytes in 68,822 blocks
==8388==   total heap usage: 834,406 allocs, 765,584 frees, 58,843,698 bytes allocated
==8388== 
==8387== Checked 1,937,992 bytes
==8387== 
==8388== Searching for pointers to 68,822 not-freed blocks
--8388--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8387== LEAK SUMMARY:
==8387==    definitely lost: 253 bytes in 4 blocks
==8387==    indirectly lost: 6,756 bytes in 7 blocks
==8387==      possibly lost: 0 bytes in 0 blocks
==8387==    still reachable: 1,408,342 bytes in 28,979 blocks
==8387==         suppressed: 0 bytes in 0 blocks
==8387== Rerun with --leak-check=full to see details of leaked memory
==8387== 
--8388--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==8387== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8387== 
==8387== 1 errors in context 1 of 1:
==8387== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8387==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8387==    by 0x488CD0: stringsubst (subst.c:301)
==8387==    by 0x48801B: prefork (subst.c:77)
==8387==    by 0x42B318: execcmd (exec.c:2619)
==8387==    by 0x428CA0: execpline2 (exec.c:1697)
==8387==    by 0x427FD2: execpline (exec.c:1484)
==8387==    by 0x427756: execlist (exec.c:1267)
==8387==    by 0x42717C: execode (exec.c:1073)
==8387==    by 0x431299: runshfunc (exec.c:5040)
==8387==    by 0x430E76: doshfunc (exec.c:4920)
==8387==    by 0x4302FB: execshfunc (exec.c:4557)
==8387==    by 0x42D8C1: execcmd (exec.c:3373)
==8387== 
==8387== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8388--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8388--   Scanning root segment: 0x4037000..0x4042fff (49152)
==8389== Checked 1,916,640 bytes
==8389== 
--8388--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8388--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8388--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8388--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8388--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8388--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8388--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8388--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8388--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8388--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8388--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8388--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8388--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8388--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8388--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8388--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8388--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8388--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8388--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8388--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8388--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8388--   Scanning root segment: 0x701a000..0x701afff (4096)
--8388--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8388--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8388--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8388--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8388--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8388--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8388--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8388--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8389== LEAK SUMMARY:
==8389==    definitely lost: 277 bytes in 5 blocks
==8389==    indirectly lost: 6,796 bytes in 9 blocks
==8389==      possibly lost: 0 bytes in 0 blocks
==8389==    still reachable: 1,386,806 bytes in 28,976 blocks
==8389==         suppressed: 0 bytes in 0 blocks
==8389== Rerun with --leak-check=full to see details of leaked memory
==8389== 
==8389== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8389== 
==8389== 1 errors in context 1 of 1:
==8389== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8389==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8389==    by 0x488CD0: stringsubst (subst.c:301)
==8389==    by 0x48801B: prefork (subst.c:77)
==8389==    by 0x42B318: execcmd (exec.c:2619)
==8389==    by 0x428CA0: execpline2 (exec.c:1697)
==8389==    by 0x427FD2: execpline (exec.c:1484)
==8389==    by 0x427756: execlist (exec.c:1267)
==8389==    by 0x42717C: execode (exec.c:1073)
==8389==    by 0x431299: runshfunc (exec.c:5040)
==8389==    by 0x430E76: doshfunc (exec.c:4920)
==8389==    by 0x4302FB: execshfunc (exec.c:4557)
==8389==    by 0x42D8C1: execcmd (exec.c:3373)
==8389== 
==8389== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8385== Checked 4,629,024 bytes
==8385== 
==8391== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8391-by-pythonnut-on-???
==8391== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8391-by-pythonnut-on-???
==8391== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8391-by-pythonnut-on-???
==8391== 
==8391== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8391== don't want to do, unless you know exactly what you're doing,
==8391== or are doing some strange experiment):
==8391==   /usr/lib/valgrind/../../bin/vgdb --pid=8391 ...command...
==8391== 
==8391== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8391==   /path/to/gdb ./zsh
==8391== and then give GDB the following command
==8391==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8391
==8391== --pid is optional if only one valgrind process is running
==8391== 
client request: code 4d430005,  addr 0xFFEFEF0DC,  len 4
==8385== LEAK SUMMARY:
==8385==    definitely lost: 253 bytes in 4 blocks
==8385==    indirectly lost: 6,756 bytes in 7 blocks
==8385==      possibly lost: 0 bytes in 0 blocks
==8385==    still reachable: 2,977,055 bytes in 68,319 blocks
==8385==         suppressed: 0 bytes in 0 blocks
==8385== Rerun with --leak-check=full to see details of leaked memory
==8385== 
==8385== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8385== 
==8385== 1 errors in context 1 of 1:
==8385== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8385==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8385==    by 0x488CD0: stringsubst (subst.c:301)
==8385==    by 0x48801B: prefork (subst.c:77)
==8385==    by 0x42B318: execcmd (exec.c:2619)
==8385==    by 0x428CA0: execpline2 (exec.c:1697)
==8385==    by 0x427FD2: execpline (exec.c:1484)
==8385==    by 0x427756: execlist (exec.c:1267)
==8385==    by 0x42717C: execode (exec.c:1073)
==8385==    by 0x431299: runshfunc (exec.c:5040)
==8385==    by 0x430E76: doshfunc (exec.c:4920)
==8385==    by 0x4302FB: execshfunc (exec.c:4557)
==8385==    by 0x42D8C1: execcmd (exec.c:3373)
==8385== 
==8385== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8374-- Caught __NR_exit; running __libc_freeres()
==8392== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8392-by-pythonnut-on-???
==8392== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8392-by-pythonnut-on-???
==8392== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8392-by-pythonnut-on-???
==8392== 
==8392== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8392== don't want to do, unless you know exactly what you're doing,
==8392== or are doing some strange experiment):
==8392==   /usr/lib/valgrind/../../bin/vgdb --pid=8392 ...command...
==8392== 
==8392== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8392==   /path/to/gdb ./zsh
==8392== and then give GDB the following command
==8392==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8392
==8392== --pid is optional if only one valgrind process is running
==8392== 
--8374-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8392-- Caught __NR_exit; running __libc_freeres()
==8374== 
==8374== HEAP SUMMARY:
==8374==     in use at exit: 1,371,697 bytes in 28,972 blocks
==8374==   total heap usage: 787,724 allocs, 758,752 frees, 54,750,732 bytes allocated
==8374== 
==8374== Searching for pointers to 28,972 not-freed blocks
--8374--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8374--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8374--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8374--   Scanning root segment: 0x4035000..0x4038fff (16384)
==8388== Checked 4,726,456 bytes
--8374--   Scanning root segment: 0x4049000..0x404cfff (16384)
==8388== 
--8374--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8374--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8374--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8374--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8374--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8374--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8374--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8374--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8374--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8374--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8374--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8374--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8374--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8374--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8374--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8374--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8374--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8374--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8374--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8374--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8374--   Scanning root segment: 0x701a000..0x701afff (4096)
--8374--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8374--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8374--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8374--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8374--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8374--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8374--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8392-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8392== 
==8388== LEAK SUMMARY:
==8388==    definitely lost: 253 bytes in 4 blocks
==8388==    indirectly lost: 6,756 bytes in 7 blocks
==8388==      possibly lost: 0 bytes in 0 blocks
==8388==    still reachable: 3,010,070 bytes in 68,811 blocks
==8388==         suppressed: 0 bytes in 0 blocks
==8388== Rerun with --leak-check=full to see details of leaked memory
==8388== 
==8388== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8388== 
==8388== 1 errors in context 1 of 1:
==8388== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8388==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8388==    by 0x488CD0: stringsubst (subst.c:301)
==8388==    by 0x48801B: prefork (subst.c:77)
==8388==    by 0x42B318: execcmd (exec.c:2619)
==8388==    by 0x428CA0: execpline2 (exec.c:1697)
==8388==    by 0x427FD2: execpline (exec.c:1484)
==8388==    by 0x427756: execlist (exec.c:1267)
==8388==    by 0x42717C: execode (exec.c:1073)
==8388==    by 0x431299: runshfunc (exec.c:5040)
==8388==    by 0x430E76: doshfunc (exec.c:4920)
==8388==    by 0x4302FB: execshfunc (exec.c:4557)
==8388==    by 0x42D8C1: execcmd (exec.c:3373)
==8388== 
==8388== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8392== HEAP SUMMARY:
==8392==     in use at exit: 2,982,589 bytes in 68,270 blocks
==8392==   total heap usage: 830,678 allocs, 762,408 frees, 56,980,498 bytes allocated
==8392== 
==8374== Checked 1,646,632 bytes
==8374== 
--8386-- Caught __NR_exit; running __libc_freeres()
==8374== LEAK SUMMARY:
==8374==    definitely lost: 253 bytes in 4 blocks
==8374==    indirectly lost: 6,756 bytes in 7 blocks
==8374==      possibly lost: 0 bytes in 0 blocks
==8374==    still reachable: 1,364,688 bytes in 28,961 blocks
==8374==         suppressed: 0 bytes in 0 blocks
==8374== Rerun with --leak-check=full to see details of leaked memory
==8374== 
==8374== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8374== 
==8374== 1 errors in context 1 of 1:
==8374== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8374==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8374==    by 0x488CD0: stringsubst (subst.c:301)
==8374==    by 0x48801B: prefork (subst.c:77)
==8374==    by 0x42B318: execcmd (exec.c:2619)
==8374==    by 0x428CA0: execpline2 (exec.c:1697)
==8374==    by 0x427FD2: execpline (exec.c:1484)
==8374==    by 0x427756: execlist (exec.c:1267)
==8374==    by 0x42717C: execode (exec.c:1073)
==8374==    by 0x431299: runshfunc (exec.c:5040)
==8374==    by 0x430E76: doshfunc (exec.c:4920)
==8374==    by 0x4302FB: execshfunc (exec.c:4557)
==8374==    by 0x42D8C1: execcmd (exec.c:3373)
==8374== 
==8374== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8386-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8392== Searching for pointers to 68,270 not-freed blocks
--8392--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8392--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8392--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8392--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8392--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8392--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8392--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8392--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8392--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8392--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8392--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8392--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8392--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8392--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8392--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8392--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8392--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8392--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8392--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8392--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8392--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8392--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8392--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8392--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8392--   Scanning root segment: 0x701a000..0x701afff (4096)
--8392--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8392--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8392--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8392--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8392--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8392--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8392--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8392--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8386== 
==8393== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8393-by-pythonnut-on-???
==8393== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8393-by-pythonnut-on-???
==8393== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8393-by-pythonnut-on-???
==8393== 
==8393== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8393== don't want to do, unless you know exactly what you're doing,
==8393== or are doing some strange experiment):
==8393==   /usr/lib/valgrind/../../bin/vgdb --pid=8393 ...command...
==8393== 
==8393== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8393==   /path/to/gdb ./zsh
==8393== and then give GDB the following command
==8393==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8393
==8393== --pid is optional if only one valgrind process is running
==8393== 
==8386== HEAP SUMMARY:
==8386==     in use at exit: 3,014,949 bytes in 68,743 blocks
==8386==   total heap usage: 834,313 allocs, 765,570 frees, 58,710,458 bytes allocated
==8386== 
--8393-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEFEDC,  len 4
==8386== Searching for pointers to 68,743 not-freed blocks
--8386--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8386--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8386--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8386--   Scanning root segment: 0x4037000..0x403efff (32768)
--8386--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8386--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8386--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8386--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8386--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8386--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8386--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8386--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8386--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8386--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8386--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8386--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8386--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8386--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8386--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8386--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8393-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8386--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8386--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8386--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8386--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8386--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8386--   Scanning root segment: 0x701a000..0x701afff (4096)
--8386--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8386--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8386--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8386--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8386--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8386--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8386--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8386--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8393== 
==8393== HEAP SUMMARY:
==8393==     in use at exit: 1,409,207 bytes in 28,973 blocks
==8393==   total heap usage: 787,688 allocs, 758,715 frees, 54,701,568 bytes allocated
==8393== 
==8393== Searching for pointers to 28,973 not-freed blocks
--8393--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8393--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8393--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8393--   Scanning root segment: 0x4035000..0x4038fff (16384)
--8393--   Scanning root segment: 0x403a000..0x4047fff (57344)
--8393--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8393--   Scanning root segment: 0x41d6000..0x41edfff (98304)
--8393--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8393--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8393--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8393--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8393--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8393--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8393--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8393--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8393--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8393--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8393--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8393--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8393--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8393--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8393--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8393--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8393--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8393--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8393--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8393--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8393--   Scanning root segment: 0x701a000..0x701afff (4096)
--8393--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8393--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8393--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8393--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8393--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8393--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8393--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8393== Checked 1,840,504 bytes
==8393== 
==8393== LEAK SUMMARY:
==8393==    definitely lost: 253 bytes in 4 blocks
==8393==    indirectly lost: 6,756 bytes in 7 blocks
==8393==      possibly lost: 0 bytes in 0 blocks
==8393==    still reachable: 1,402,198 bytes in 28,962 blocks
==8393==         suppressed: 0 bytes in 0 blocks
==8393== Rerun with --leak-check=full to see details of leaked memory
==8393== 
==8393== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8393== 
==8393== 1 errors in context 1 of 1:
==8393== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8393==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8393==    by 0x488CD0: stringsubst (subst.c:301)
==8393==    by 0x48801B: prefork (subst.c:77)
==8393==    by 0x42B318: execcmd (exec.c:2619)
==8393==    by 0x428CA0: execpline2 (exec.c:1697)
==8393==    by 0x427FD2: execpline (exec.c:1484)
==8393==    by 0x427756: execlist (exec.c:1267)
==8393==    by 0x42717C: execode (exec.c:1073)
==8393==    by 0x431299: runshfunc (exec.c:5040)
==8393==    by 0x430E76: doshfunc (exec.c:4920)
==8393==    by 0x4302FB: execshfunc (exec.c:4557)
==8393==    by 0x42D8C1: execcmd (exec.c:3373)
==8393== 
==8393== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8372-- Caught __NR_exit; running __libc_freeres()
==8392== Checked 4,628,456 bytes
==8392== 
==8392== LEAK SUMMARY:
==8392==    definitely lost: 253 bytes in 4 blocks
==8392==    indirectly lost: 6,756 bytes in 7 blocks
==8392==      possibly lost: 0 bytes in 0 blocks
==8392==    still reachable: 2,975,580 bytes in 68,259 blocks
==8392==         suppressed: 0 bytes in 0 blocks
==8392== Rerun with --leak-check=full to see details of leaked memory
==8392== 
==8392== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8392== 
==8392== 1 errors in context 1 of 1:
==8392== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8392==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8392==    by 0x488CD0: stringsubst (subst.c:301)
==8392==    by 0x48801B: prefork (subst.c:77)
==8392==    by 0x42B318: execcmd (exec.c:2619)
==8392==    by 0x428CA0: execpline2 (exec.c:1697)
==8392==    by 0x427FD2: execpline (exec.c:1484)
==8392==    by 0x427756: execlist (exec.c:1267)
==8392==    by 0x42717C: execode (exec.c:1073)
==8392==    by 0x431299: runshfunc (exec.c:5040)
==8392==    by 0x430E76: doshfunc (exec.c:4920)
==8392==    by 0x4302FB: execshfunc (exec.c:4557)
==8392==    by 0x42D8C1: execcmd (exec.c:3373)
==8392== 
==8392== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8372-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8386== Checked 4,706,224 bytes
==8386== 
==8372== 
==8372== HEAP SUMMARY:
==8372==     in use at exit: 1,370,462 bytes in 28,940 blocks
==8372==   total heap usage: 787,691 allocs, 758,751 frees, 54,702,144 bytes allocated
==8372== 
==8372== Searching for pointers to 28,940 not-freed blocks
--8372--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8372--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8372--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8372--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8372--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8372--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8372--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8372--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8372--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8372--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8372--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8372--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8372--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8372--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8372--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8372--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8372--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8372--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8372--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8372--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8372--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8372--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8372--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8372--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8372--   Scanning root segment: 0x701a000..0x701afff (4096)
--8372--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8372--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8372--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8372--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8372--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8372--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8372--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8386== LEAK SUMMARY:
==8386==    definitely lost: 253 bytes in 4 blocks
==8386==    indirectly lost: 6,756 bytes in 7 blocks
==8386==      possibly lost: 0 bytes in 0 blocks
==8386==    still reachable: 3,007,940 bytes in 68,732 blocks
==8386==         suppressed: 0 bytes in 0 blocks
==8386== Rerun with --leak-check=full to see details of leaked memory
==8386== 
==8386== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8386== 
==8386== 1 errors in context 1 of 1:
==8386== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8386==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8386==    by 0x488CD0: stringsubst (subst.c:301)
==8386==    by 0x48801B: prefork (subst.c:77)
==8386==    by 0x42B318: execcmd (exec.c:2619)
==8386==    by 0x428CA0: execpline2 (exec.c:1697)
==8386==    by 0x427FD2: execpline (exec.c:1484)
==8386==    by 0x427756: execlist (exec.c:1267)
==8386==    by 0x42717C: execode (exec.c:1073)
==8386==    by 0x431299: runshfunc (exec.c:5040)
==8386==    by 0x430E76: doshfunc (exec.c:4920)
==8386==    by 0x4302FB: execshfunc (exec.c:4557)
==8386==    by 0x42D8C1: execcmd (exec.c:3373)
==8386== 
==8386== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8395== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8395-by-pythonnut-on-???
==8395== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8395-by-pythonnut-on-???
==8395== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8395-by-pythonnut-on-???
==8395== 
==8395== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8395== don't want to do, unless you know exactly what you're doing,
==8395== or are doing some strange experiment):
==8395==   /usr/lib/valgrind/../../bin/vgdb --pid=8395 ...command...
==8395== 
==8395== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8395==   /path/to/gdb ./zsh
==8395== and then give GDB the following command
==8395==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8395
==8395== --pid is optional if only one valgrind process is running
==8395== 
==8372== Checked 1,627,256 bytes
==8372== 
==8372== LEAK SUMMARY:
==8372==    definitely lost: 253 bytes in 4 blocks
==8372==    indirectly lost: 6,756 bytes in 7 blocks
==8372==      possibly lost: 0 bytes in 0 blocks
==8372==    still reachable: 1,363,453 bytes in 28,929 blocks
==8372==         suppressed: 0 bytes in 0 blocks
==8372== Rerun with --leak-check=full to see details of leaked memory
==8372== 
==8372== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8372== 
==8372== 1 errors in context 1 of 1:
==8372== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8372==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8372==    by 0x488CD0: stringsubst (subst.c:301)
==8372==    by 0x48801B: prefork (subst.c:77)
==8372==    by 0x42B318: execcmd (exec.c:2619)
==8372==    by 0x428CA0: execpline2 (exec.c:1697)
==8372==    by 0x427FD2: execpline (exec.c:1484)
==8372==    by 0x427756: execlist (exec.c:1267)
==8372==    by 0x42717C: execode (exec.c:1073)
==8372==    by 0x431299: runshfunc (exec.c:5040)
==8372==    by 0x430E76: doshfunc (exec.c:4920)
==8372==    by 0x4302FB: execshfunc (exec.c:4557)
==8372==    by 0x42D8C1: execcmd (exec.c:3373)
==8372== 
==8372== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8396== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8396-by-pythonnut-on-???
==8396== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8396-by-pythonnut-on-???
==8396== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8396-by-pythonnut-on-???
==8396== 
==8396== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8396== don't want to do, unless you know exactly what you're doing,
==8396== or are doing some strange experiment):
==8396==   /usr/lib/valgrind/../../bin/vgdb --pid=8396 ...command...
==8396== 
==8396== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8396==   /path/to/gdb ./zsh
==8396== and then give GDB the following command
==8396==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8396
==8396== --pid is optional if only one valgrind process is running
==8396== 
--8396-- Caught __NR_exit; running __libc_freeres()
==8397== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8397-by-pythonnut-on-???
==8397== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8397-by-pythonnut-on-???
==8397== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8397-by-pythonnut-on-???
==8397== 
==8397== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8397== don't want to do, unless you know exactly what you're doing,
==8397== or are doing some strange experiment):
==8397==   /usr/lib/valgrind/../../bin/vgdb --pid=8397 ...command...
==8397== 
==8397== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8397==   /path/to/gdb ./zsh
==8397== and then give GDB the following command
==8397==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8397
==8397== --pid is optional if only one valgrind process is running
==8397== 
--8396-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8396== 
==8396== HEAP SUMMARY:
==8396==     in use at exit: 3,017,044 bytes in 68,822 blocks
==8396==   total heap usage: 834,418 allocs, 765,596 frees, 58,813,649 bytes allocated
==8396== 
--8397-- Caught __NR_exit; running __libc_freeres()
==8396== Searching for pointers to 68,822 not-freed blocks
--8396--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8396--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8396--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8396--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8396--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8396--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8396--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8396--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8396--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8396--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8396--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8396--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8396--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8396--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8396--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8396--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8396--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8396--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8396--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8396--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8396--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8396--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8396--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8396--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8396--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8396--   Scanning root segment: 0x701a000..0x701afff (4096)
--8396--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8396--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8396--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8396--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8396--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8396--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8396--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8396--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
--8397-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8397== 
==8397== HEAP SUMMARY:
==8397==     in use at exit: 3,006,086 bytes in 68,429 blocks
==8397==   total heap usage: 831,152 allocs, 762,723 frees, 57,041,470 bytes allocated
==8397== 
==8397== Searching for pointers to 68,429 not-freed blocks
--8397--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8397--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8397--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8397--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8397--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8397--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8397--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8397--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8397--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8397--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8397--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8397--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8397--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8397--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8397--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8397--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8397--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8397--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8397--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8397--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8397--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8397--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8397--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8397--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8397--   Scanning root segment: 0x701a000..0x701afff (4096)
--8397--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8397--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8397--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8397--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8397--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8397--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8397--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8397--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8396== Checked 4,726,424 bytes
==8396== 
==8396== LEAK SUMMARY:
==8396==    definitely lost: 253 bytes in 4 blocks
==8396==    indirectly lost: 6,756 bytes in 7 blocks
==8396==      possibly lost: 0 bytes in 0 blocks
==8396==    still reachable: 3,010,035 bytes in 68,811 blocks
==8396==         suppressed: 0 bytes in 0 blocks
==8396== Rerun with --leak-check=full to see details of leaked memory
==8396== 
==8396== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8396== 
==8396== 1 errors in context 1 of 1:
==8396== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8396==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8396==    by 0x488CD0: stringsubst (subst.c:301)
==8396==    by 0x48801B: prefork (subst.c:77)
==8396==    by 0x42B318: execcmd (exec.c:2619)
==8396==    by 0x428CA0: execpline2 (exec.c:1697)
==8396==    by 0x427FD2: execpline (exec.c:1484)
==8396==    by 0x427756: execlist (exec.c:1267)
==8396==    by 0x42717C: execode (exec.c:1073)
==8396==    by 0x431299: runshfunc (exec.c:5040)
==8396==    by 0x430E76: doshfunc (exec.c:4920)
==8396==    by 0x4302FB: execshfunc (exec.c:4557)
==8396==    by 0x42D8C1: execcmd (exec.c:3373)
==8396== 
==8396== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8395-- Caught __NR_exit; running __libc_freeres()
==8397== Checked 4,641,936 bytes
==8397== 
==8397== LEAK SUMMARY:
==8397==    definitely lost: 253 bytes in 4 blocks
==8397==    indirectly lost: 6,756 bytes in 7 blocks
==8397==      possibly lost: 0 bytes in 0 blocks
==8397==    still reachable: 2,999,077 bytes in 68,418 blocks
==8397==         suppressed: 0 bytes in 0 blocks
==8397== Rerun with --leak-check=full to see details of leaked memory
==8397== 
==8397== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8397== 
==8397== 1 errors in context 1 of 1:
==8397== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8397==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8397==    by 0x488CD0: stringsubst (subst.c:301)
==8397==    by 0x48801B: prefork (subst.c:77)
==8397==    by 0x42B318: execcmd (exec.c:2619)
==8397==    by 0x428CA0: execpline2 (exec.c:1697)
==8397==    by 0x427FD2: execpline (exec.c:1484)
==8397==    by 0x427756: execlist (exec.c:1267)
==8397==    by 0x42717C: execode (exec.c:1073)
==8397==    by 0x431299: runshfunc (exec.c:5040)
==8397==    by 0x430E76: doshfunc (exec.c:4920)
==8397==    by 0x4302FB: execshfunc (exec.c:4557)
==8397==    by 0x42D8C1: execcmd (exec.c:3373)
==8397== 
==8397== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8395-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8395== 
==8395== HEAP SUMMARY:
==8395==     in use at exit: 3,014,944 bytes in 68,743 blocks
==8395==   total heap usage: 834,325 allocs, 765,582 frees, 58,713,253 bytes allocated
==8395== 
==8398== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8398-by-pythonnut-on-???
==8398== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8398-by-pythonnut-on-???
==8398== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8398-by-pythonnut-on-???
==8398== 
==8398== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8398== don't want to do, unless you know exactly what you're doing,
==8398== or are doing some strange experiment):
==8398==   /usr/lib/valgrind/../../bin/vgdb --pid=8398 ...command...
==8398== 
==8398== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8398==   /path/to/gdb ./zsh
==8398== and then give GDB the following command
==8398==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8398
==8398== --pid is optional if only one valgrind process is running
==8398== 
==8395== Searching for pointers to 68,743 not-freed blocks
--8395--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8395--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8395--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8395--   Scanning root segment: 0x4037000..0x403efff (32768)
--8395--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8395--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8395--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8395--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8395--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8395--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8395--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8395--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8395--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8395--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8395--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8395--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8395--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8395--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8395--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8395--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8395--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8395--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8395--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8395--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8395--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8395--   Scanning root segment: 0x701a000..0x701afff (4096)
--8395--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8395--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8395--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8395--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8395--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8395--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8395--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8395--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8399-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==8399== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8399-by-pythonnut-on-???
==8399== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8399-by-pythonnut-on-???
==8399== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8399-by-pythonnut-on-???
==8399== 
==8399== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8399== don't want to do, unless you know exactly what you're doing,
==8399== or are doing some strange experiment):
==8399==   /usr/lib/valgrind/../../bin/vgdb --pid=8399 ...command...
==8399== 
==8399== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8399==   /path/to/gdb ./zsh
==8399== and then give GDB the following command
==8399==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8399
==8399== --pid is optional if only one valgrind process is running
==8399== 
--8399-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8399== 
==8399== HEAP SUMMARY:
==8399==     in use at exit: 3,010,269 bytes in 68,529 blocks
==8399==   total heap usage: 831,069 allocs, 762,540 frees, 57,027,560 bytes allocated
==8399== 
==8399== Searching for pointers to 68,529 not-freed blocks
--8399--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8399--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8399--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8399--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8399--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8399--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8399--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8399--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8399--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8399--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8399--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8399--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8399--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8399--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8399--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8399--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8399--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8399--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8399--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8399--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8399--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8399--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8399--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8399--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8399--   Scanning root segment: 0x701a000..0x701afff (4096)
--8399--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8399--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8399--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8399--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8399--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8399--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8399--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8399--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8395== Checked 4,706,224 bytes
==8395== 
==8395== LEAK SUMMARY:
==8395==    definitely lost: 253 bytes in 4 blocks
==8395==    indirectly lost: 6,756 bytes in 7 blocks
==8395==      possibly lost: 0 bytes in 0 blocks
==8395==    still reachable: 3,007,935 bytes in 68,732 blocks
==8395==         suppressed: 0 bytes in 0 blocks
==8395== Rerun with --leak-check=full to see details of leaked memory
==8395== 
==8395== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8395== 
==8395== 1 errors in context 1 of 1:
==8395== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8395==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8395==    by 0x488CD0: stringsubst (subst.c:301)
==8395==    by 0x48801B: prefork (subst.c:77)
==8395==    by 0x42B318: execcmd (exec.c:2619)
==8395==    by 0x428CA0: execpline2 (exec.c:1697)
==8395==    by 0x427FD2: execpline (exec.c:1484)
==8395==    by 0x427756: execlist (exec.c:1267)
==8395==    by 0x42717C: execode (exec.c:1073)
==8395==    by 0x431299: runshfunc (exec.c:5040)
==8395==    by 0x430E76: doshfunc (exec.c:4920)
==8395==    by 0x4302FB: execshfunc (exec.c:4557)
==8395==    by 0x42D8C1: execcmd (exec.c:3373)
==8395== 
==8395== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8401== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8401-by-pythonnut-on-???
==8401== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8401-by-pythonnut-on-???
==8401== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8401-by-pythonnut-on-???
==8401== 
==8401== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8401== don't want to do, unless you know exactly what you're doing,
==8401== or are doing some strange experiment):
==8401==   /usr/lib/valgrind/../../bin/vgdb --pid=8401 ...command...
==8401== 
==8401== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8401==   /path/to/gdb ./zsh
==8401== and then give GDB the following command
==8401==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8401
==8401== --pid is optional if only one valgrind process is running
==8401== 
==8402== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8402-by-pythonnut-on-???
==8402== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8402-by-pythonnut-on-???
==8402== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8402-by-pythonnut-on-???
==8402== 
==8402== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8402== don't want to do, unless you know exactly what you're doing,
==8402== or are doing some strange experiment):
==8402==   /usr/lib/valgrind/../../bin/vgdb --pid=8402 ...command...
==8402== 
==8402== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8402==   /path/to/gdb ./zsh
==8402== and then give GDB the following command
==8402==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8402
==8402== --pid is optional if only one valgrind process is running
==8402== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
--8402-- Caught __NR_exit; running __libc_freeres()
==8399== Checked 4,652,512 bytes
==8399== 
--8402-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8399== LEAK SUMMARY:
==8399==    definitely lost: 253 bytes in 4 blocks
==8399==    indirectly lost: 6,756 bytes in 7 blocks
==8399==      possibly lost: 0 bytes in 0 blocks
==8399==    still reachable: 3,003,260 bytes in 68,518 blocks
==8399==         suppressed: 0 bytes in 0 blocks
==8399== Rerun with --leak-check=full to see details of leaked memory
==8399== 
==8399== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8399== 
==8399== 1 errors in context 1 of 1:
==8399== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8399==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8399==    by 0x488CD0: stringsubst (subst.c:301)
==8399==    by 0x48801B: prefork (subst.c:77)
==8399==    by 0x42B318: execcmd (exec.c:2619)
==8399==    by 0x428CA0: execpline2 (exec.c:1697)
==8399==    by 0x427FD2: execpline (exec.c:1484)
==8399==    by 0x427756: execlist (exec.c:1267)
==8399==    by 0x42717C: execode (exec.c:1073)
==8399==    by 0x431299: runshfunc (exec.c:5040)
==8399==    by 0x430E76: doshfunc (exec.c:4920)
==8399==    by 0x4302FB: execshfunc (exec.c:4557)
==8399==    by 0x42D8C1: execcmd (exec.c:3373)
==8399== 
==8399== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8402== 
==8402== HEAP SUMMARY:
==8402==     in use at exit: 3,016,995 bytes in 68,822 blocks
==8402==   total heap usage: 834,429 allocs, 765,607 frees, 58,783,556 bytes allocated
==8402== 
--8398-- Caught __NR_exit; running __libc_freeres()
--8398-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8402== Searching for pointers to 68,822 not-freed blocks
--8402--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8402--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8402--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8402--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8402--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8402--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8402--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8402--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8402--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8402--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8402--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8402--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8402--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8402--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8402--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8402--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8402--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8402--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8402--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8402--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8402--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8402--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8402--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8402--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8402--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8402--   Scanning root segment: 0x701a000..0x701afff (4096)
--8402--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8402--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8402--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8402--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8402--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8402--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8402--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8402--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8398== 
==8398== HEAP SUMMARY:
==8398==     in use at exit: 3,010,205 bytes in 68,526 blocks
==8398==   total heap usage: 831,067 allocs, 762,541 frees, 57,027,319 bytes allocated
==8398== 
==8398== Searching for pointers to 68,526 not-freed blocks
--8398--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8398--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8398--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8398--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8398--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8398--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8398--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8398--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8398--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8398--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8398--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8398--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8398--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8398--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8398--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8398--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8398--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8398--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8398--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8398--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8398--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8398--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8398--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8398--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8398--   Scanning root segment: 0x701a000..0x701afff (4096)
--8398--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8398--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8398--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8398--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8398--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8398--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8398--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8398--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8402== Checked 4,726,376 bytes
==8402== 
==8402== LEAK SUMMARY:
==8402==    definitely lost: 253 bytes in 4 blocks
==8402==    indirectly lost: 6,756 bytes in 7 blocks
==8402==      possibly lost: 0 bytes in 0 blocks
==8402==    still reachable: 3,009,986 bytes in 68,811 blocks
==8402==         suppressed: 0 bytes in 0 blocks
==8402== Rerun with --leak-check=full to see details of leaked memory
==8402== 
==8402== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8402== 
==8402== 1 errors in context 1 of 1:
==8402== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8402==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8402==    by 0x488CD0: stringsubst (subst.c:301)
==8402==    by 0x48801B: prefork (subst.c:77)
==8402==    by 0x42B318: execcmd (exec.c:2619)
==8402==    by 0x428CA0: execpline2 (exec.c:1697)
==8402==    by 0x427FD2: execpline (exec.c:1484)
==8402==    by 0x427756: execlist (exec.c:1267)
==8402==    by 0x42717C: execode (exec.c:1073)
==8402==    by 0x431299: runshfunc (exec.c:5040)
==8402==    by 0x430E76: doshfunc (exec.c:4920)
==8402==    by 0x4302FB: execshfunc (exec.c:4557)
==8402==    by 0x42D8C1: execcmd (exec.c:3373)
==8402== 
==8402== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8401-- Caught __NR_exit; running __libc_freeres()
==8398== Checked 4,651,824 bytes
==8398== 
==8398== LEAK SUMMARY:
==8398==    definitely lost: 253 bytes in 4 blocks
==8398==    indirectly lost: 6,756 bytes in 7 blocks
==8398==      possibly lost: 0 bytes in 0 blocks
==8398==    still reachable: 3,003,196 bytes in 68,515 blocks
==8398==         suppressed: 0 bytes in 0 blocks
==8398== Rerun with --leak-check=full to see details of leaked memory
==8398== 
==8398== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8398== 
==8398== 1 errors in context 1 of 1:
==8398== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8398==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8398==    by 0x488CD0: stringsubst (subst.c:301)
==8398==    by 0x48801B: prefork (subst.c:77)
==8398==    by 0x42B318: execcmd (exec.c:2619)
==8398==    by 0x428CA0: execpline2 (exec.c:1697)
==8398==    by 0x427FD2: execpline (exec.c:1484)
==8398==    by 0x427756: execlist (exec.c:1267)
==8398==    by 0x42717C: execode (exec.c:1073)
==8398==    by 0x431299: runshfunc (exec.c:5040)
==8398==    by 0x430E76: doshfunc (exec.c:4920)
==8398==    by 0x4302FB: execshfunc (exec.c:4557)
==8398==    by 0x42D8C1: execcmd (exec.c:3373)
==8398== 
==8398== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8401-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8401== 
==8401== HEAP SUMMARY:
==8401==     in use at exit: 3,014,929 bytes in 68,743 blocks
==8401==   total heap usage: 834,336 allocs, 765,593 frees, 58,716,009 bytes allocated
==8401== 
--8403-- Caught __NR_exit; running __libc_freeres()
==8403== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8403-by-pythonnut-on-???
==8403== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8403-by-pythonnut-on-???
==8403== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8403-by-pythonnut-on-???
==8403== 
==8403== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8403== don't want to do, unless you know exactly what you're doing,
==8403== or are doing some strange experiment):
==8403==   /usr/lib/valgrind/../../bin/vgdb --pid=8403 ...command...
==8403== 
==8403== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8403==   /path/to/gdb ./zsh
==8403== and then give GDB the following command
==8403==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8403
==8403== --pid is optional if only one valgrind process is running
==8403== 
==8401== Searching for pointers to 68,743 not-freed blocks
--8401--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8401--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8401--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8401--   Scanning root segment: 0x4037000..0x403efff (32768)
--8401--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8401--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8401--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8401--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8401--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8401--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8401--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8401--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8401--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8401--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8401--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8401--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8401--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8401--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8401--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8401--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8401--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8401--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8401--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8401--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8401--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8401--   Scanning root segment: 0x701a000..0x701afff (4096)
--8401--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8401--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8401--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8401--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8401--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8401--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8401--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8401--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8403-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8403== 
==8403== HEAP SUMMARY:
==8403==     in use at exit: 3,010,212 bytes in 68,526 blocks
==8403==   total heap usage: 831,082 allocs, 762,556 frees, 57,032,317 bytes allocated
==8403== 
==8403== Searching for pointers to 68,526 not-freed blocks
--8403--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8403--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8403--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8403--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8403--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8403--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8403--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8403--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8403--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8403--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8403--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8403--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8403--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8403--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8403--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8403--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8403--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8403--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8403--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8403--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8403--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8403--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8403--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8403--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8403--   Scanning root segment: 0x701a000..0x701afff (4096)
--8403--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8403--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8403--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8403--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8403--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8403--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8403--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8403--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8401== Checked 4,706,208 bytes
==8401== 
==8401== LEAK SUMMARY:
==8401==    definitely lost: 253 bytes in 4 blocks
==8401==    indirectly lost: 6,756 bytes in 7 blocks
==8401==      possibly lost: 0 bytes in 0 blocks
==8401==    still reachable: 3,007,920 bytes in 68,732 blocks
==8401==         suppressed: 0 bytes in 0 blocks
==8401== Rerun with --leak-check=full to see details of leaked memory
==8401== 
==8401== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8401== 
==8401== 1 errors in context 1 of 1:
==8401== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8401==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8401==    by 0x488CD0: stringsubst (subst.c:301)
==8401==    by 0x48801B: prefork (subst.c:77)
==8401==    by 0x42B318: execcmd (exec.c:2619)
==8401==    by 0x428CA0: execpline2 (exec.c:1697)
==8401==    by 0x427FD2: execpline (exec.c:1484)
==8401==    by 0x427756: execlist (exec.c:1267)
==8401==    by 0x42717C: execode (exec.c:1073)
==8401==    by 0x431299: runshfunc (exec.c:5040)
==8401==    by 0x430E76: doshfunc (exec.c:4920)
==8401==    by 0x4302FB: execshfunc (exec.c:4557)
==8401==    by 0x42D8C1: execcmd (exec.c:3373)
==8401== 
==8401== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8404== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8404-by-pythonnut-on-???
==8404== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8404-by-pythonnut-on-???
==8404== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8404-by-pythonnut-on-???
==8404== 
==8404== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8404== don't want to do, unless you know exactly what you're doing,
==8404== or are doing some strange experiment):
==8404==   /usr/lib/valgrind/../../bin/vgdb --pid=8404 ...command...
==8404== 
==8404== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8404==   /path/to/gdb ./zsh
==8404== and then give GDB the following command
==8404==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8404
==8404== --pid is optional if only one valgrind process is running
==8404== 
==8405== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8405-by-pythonnut-on-???
==8405== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8405-by-pythonnut-on-???
==8405== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8405-by-pythonnut-on-???
==8405== 
==8405== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8405== don't want to do, unless you know exactly what you're doing,
==8405== or are doing some strange experiment):
==8405==   /usr/lib/valgrind/../../bin/vgdb --pid=8405 ...command...
==8405== 
==8405== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8405==   /path/to/gdb ./zsh
==8405== and then give GDB the following command
==8405==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8405
==8405== --pid is optional if only one valgrind process is running
==8405== 
==8403== Checked 4,651,960 bytes
==8403== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==8403== LEAK SUMMARY:
==8403==    definitely lost: 253 bytes in 4 blocks
==8403==    indirectly lost: 6,756 bytes in 7 blocks
==8403==      possibly lost: 0 bytes in 0 blocks
==8403==    still reachable: 3,003,203 bytes in 68,515 blocks
==8403==         suppressed: 0 bytes in 0 blocks
==8403== Rerun with --leak-check=full to see details of leaked memory
==8403== 
==8403== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8403== 
==8403== 1 errors in context 1 of 1:
==8403== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8403==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8403==    by 0x488CD0: stringsubst (subst.c:301)
==8403==    by 0x48801B: prefork (subst.c:77)
==8403==    by 0x42B318: execcmd (exec.c:2619)
==8403==    by 0x428CA0: execpline2 (exec.c:1697)
==8403==    by 0x427FD2: execpline (exec.c:1484)
==8403==    by 0x427756: execlist (exec.c:1267)
==8403==    by 0x42717C: execode (exec.c:1073)
==8403==    by 0x431299: runshfunc (exec.c:5040)
==8403==    by 0x430E76: doshfunc (exec.c:4920)
==8403==    by 0x4302FB: execshfunc (exec.c:4557)
==8403==    by 0x42D8C1: execcmd (exec.c:3373)
==8403== 
==8403== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8405-- Caught __NR_exit; running __libc_freeres()
--8406-- Caught __NR_exit; running __libc_freeres()
--8405-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8406== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8406-by-pythonnut-on-???
==8405== 
==8406== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8406-by-pythonnut-on-???
==8406== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8406-by-pythonnut-on-???
==8406== 
==8406== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8406== don't want to do, unless you know exactly what you're doing,
==8406== or are doing some strange experiment):
==8406==   /usr/lib/valgrind/../../bin/vgdb --pid=8406 ...command...
==8406== 
==8406== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8406==   /path/to/gdb ./zsh
==8406== and then give GDB the following command
==8406==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8406
==8406== --pid is optional if only one valgrind process is running
==8406== 
==8405== HEAP SUMMARY:
==8405==     in use at exit: 3,016,944 bytes in 68,822 blocks
==8405==   total heap usage: 834,440 allocs, 765,618 frees, 58,753,446 bytes allocated
==8405== 
--8406-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8406== 
==8406== HEAP SUMMARY:
==8406==     in use at exit: 3,010,308 bytes in 68,526 blocks
==8406==   total heap usage: 831,098 allocs, 762,572 frees, 57,037,104 bytes allocated
==8406== 
==8405== Searching for pointers to 68,822 not-freed blocks
--8405--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8405--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8405--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8405--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8405--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8405--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8405--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8405--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8405--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8405--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8405--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8405--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8405--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8405--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8405--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8405--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8405--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8405--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8405--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8405--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8405--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8405--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8405--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8405--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8405--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8405--   Scanning root segment: 0x701a000..0x701afff (4096)
--8405--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8405--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8405--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8405--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8405--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8405--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8405--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8405--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8406== Searching for pointers to 68,526 not-freed blocks
--8406--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8406--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8406--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8406--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8406--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8406--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8406--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8406--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8406--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8406--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8406--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8406--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8406--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8406--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8406--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8406--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8406--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8406--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8406--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8406--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8406--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8406--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8406--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8406--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8406--   Scanning root segment: 0x701a000..0x701afff (4096)
--8406--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8406--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8406--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8406--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8406--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8406--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8406--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8406--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8405== Checked 4,726,328 bytes
==8405== 
==8405== LEAK SUMMARY:
==8405==    definitely lost: 253 bytes in 4 blocks
==8405==    indirectly lost: 6,756 bytes in 7 blocks
==8405==      possibly lost: 0 bytes in 0 blocks
==8405==    still reachable: 3,009,935 bytes in 68,811 blocks
==8405==         suppressed: 0 bytes in 0 blocks
==8405== Rerun with --leak-check=full to see details of leaked memory
==8405== 
==8405== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8405== 
==8405== 1 errors in context 1 of 1:
==8405== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8405==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8405==    by 0x488CD0: stringsubst (subst.c:301)
==8405==    by 0x48801B: prefork (subst.c:77)
==8405==    by 0x42B318: execcmd (exec.c:2619)
==8405==    by 0x428CA0: execpline2 (exec.c:1697)
==8405==    by 0x427FD2: execpline (exec.c:1484)
==8405==    by 0x427756: execlist (exec.c:1267)
==8405==    by 0x42717C: execode (exec.c:1073)
==8405==    by 0x431299: runshfunc (exec.c:5040)
==8405==    by 0x430E76: doshfunc (exec.c:4920)
==8405==    by 0x4302FB: execshfunc (exec.c:4557)
==8405==    by 0x42D8C1: execcmd (exec.c:3373)
==8405== 
==8405== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8406== Checked 4,651,240 bytes
==8406== 
--8404-- Caught __NR_exit; running __libc_freeres()
==8406== LEAK SUMMARY:
==8406==    definitely lost: 253 bytes in 4 blocks
==8406==    indirectly lost: 6,756 bytes in 7 blocks
==8406==      possibly lost: 0 bytes in 0 blocks
==8406==    still reachable: 3,003,299 bytes in 68,515 blocks
==8406==         suppressed: 0 bytes in 0 blocks
==8406== Rerun with --leak-check=full to see details of leaked memory
==8406== 
==8406== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8406== 
==8406== 1 errors in context 1 of 1:
==8406== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8406==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8406==    by 0x488CD0: stringsubst (subst.c:301)
==8406==    by 0x48801B: prefork (subst.c:77)
==8406==    by 0x42B318: execcmd (exec.c:2619)
==8406==    by 0x428CA0: execpline2 (exec.c:1697)
==8406==    by 0x427FD2: execpline (exec.c:1484)
==8406==    by 0x427756: execlist (exec.c:1267)
==8406==    by 0x42717C: execode (exec.c:1073)
==8406==    by 0x431299: runshfunc (exec.c:5040)
==8406==    by 0x430E76: doshfunc (exec.c:4920)
==8406==    by 0x4302FB: execshfunc (exec.c:4557)
==8406==    by 0x42D8C1: execcmd (exec.c:3373)
==8406== 
==8406== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8404-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8404== 
==8404== HEAP SUMMARY:
==8404==     in use at exit: 3,014,912 bytes in 68,743 blocks
==8404==   total heap usage: 834,347 allocs, 765,604 frees, 58,718,748 bytes allocated
==8404== 
==8407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8407-by-pythonnut-on-???
==8407== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8407-by-pythonnut-on-???
==8407== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8407-by-pythonnut-on-???
==8407== 
==8407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8407== don't want to do, unless you know exactly what you're doing,
==8407== or are doing some strange experiment):
==8407==   /usr/lib/valgrind/../../bin/vgdb --pid=8407 ...command...
==8407== 
==8407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8407==   /path/to/gdb ./zsh
==8407== and then give GDB the following command
==8407==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8407
==8407== --pid is optional if only one valgrind process is running
==8407== 
--8407-- Caught __NR_exit; running __libc_freeres()
==8404== Searching for pointers to 68,743 not-freed blocks
--8404--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8404--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8404--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8404--   Scanning root segment: 0x4037000..0x403efff (32768)
--8404--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8404--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8404--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8404--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8404--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8404--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8404--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8404--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8404--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8404--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8404--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8404--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8404--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8404--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8404--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8404--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8404--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8404--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8404--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8404--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8404--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8404--   Scanning root segment: 0x701a000..0x701afff (4096)
--8404--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8404--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8404--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8404--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8404--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8404--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8404--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8404--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8407== 
==8407== HEAP SUMMARY:
==8407==     in use at exit: 3,010,614 bytes in 68,532 blocks
==8407==   total heap usage: 831,147 allocs, 762,615 frees, 57,046,184 bytes allocated
==8407== 
==8407== Searching for pointers to 68,532 not-freed blocks
--8407--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8407--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8407--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8407--   Scanning root segment: 0x4037000..0x403afff (16384)
--8407--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8407--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8407--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8407--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8407--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8407--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8407--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8407--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8407--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8407--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8407--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8407--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8407--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8407--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8407--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8407--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8407--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8407--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8407--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8407--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8407--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8407--   Scanning root segment: 0x701a000..0x701afff (4096)
--8407--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8407--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8407--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8407--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8407--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8407--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8407--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8407--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8404== Checked 4,706,200 bytes
==8404== 
==8404== LEAK SUMMARY:
==8404==    definitely lost: 253 bytes in 4 blocks
==8404==    indirectly lost: 6,756 bytes in 7 blocks
==8404==      possibly lost: 0 bytes in 0 blocks
==8404==    still reachable: 3,007,903 bytes in 68,732 blocks
==8404==         suppressed: 0 bytes in 0 blocks
==8404== Rerun with --leak-check=full to see details of leaked memory
==8404== 
==8404== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8404== 
==8404== 1 errors in context 1 of 1:
==8404== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8404==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8404==    by 0x488CD0: stringsubst (subst.c:301)
==8404==    by 0x48801B: prefork (subst.c:77)
==8404==    by 0x42B318: execcmd (exec.c:2619)
==8404==    by 0x428CA0: execpline2 (exec.c:1697)
==8404==    by 0x427FD2: execpline (exec.c:1484)
==8404==    by 0x427756: execlist (exec.c:1267)
==8404==    by 0x42717C: execode (exec.c:1073)
==8404==    by 0x431299: runshfunc (exec.c:5040)
==8404==    by 0x430E76: doshfunc (exec.c:4920)
==8404==    by 0x4302FB: execshfunc (exec.c:4557)
==8404==    by 0x42D8C1: execcmd (exec.c:3373)
==8404== 
==8404== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8408-by-pythonnut-on-???
==8408== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8408-by-pythonnut-on-???
==8408== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8408-by-pythonnut-on-???
==8408== 
==8408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8408== don't want to do, unless you know exactly what you're doing,
==8408== or are doing some strange experiment):
==8408==   /usr/lib/valgrind/../../bin/vgdb --pid=8408 ...command...
==8408== 
==8408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8408==   /path/to/gdb ./zsh
==8408== and then give GDB the following command
==8408==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8408
==8408== --pid is optional if only one valgrind process is running
==8408== 
==8407== Checked 4,667,840 bytes
==8407== 
==8409== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8409-by-pythonnut-on-???
==8407== LEAK SUMMARY:
==8409== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8409-by-pythonnut-on-???
==8407==    definitely lost: 253 bytes in 4 blocks
==8409== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8409-by-pythonnut-on-???
==8407==    indirectly lost: 6,756 bytes in 7 blocks
==8409== 
==8407==      possibly lost: 0 bytes in 0 blocks
==8409== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8409== don't want to do, unless you know exactly what you're doing,
==8409== or are doing some strange experiment):
==8409==   /usr/lib/valgrind/../../bin/vgdb --pid=8409 ...command...
==8407==    still reachable: 3,003,605 bytes in 68,521 blocks
==8409== 
==8407==         suppressed: 0 bytes in 0 blocks
==8407== Rerun with --leak-check=full to see details of leaked memory
==8409== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8409==   /path/to/gdb ./zsh
==8409== and then give GDB the following command
==8409==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8409
==8407== 
==8409== --pid is optional if only one valgrind process is running
==8409== 
==8407== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8407== 
==8407== 1 errors in context 1 of 1:
==8407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8407==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8407==    by 0x488CD0: stringsubst (subst.c:301)
==8407==    by 0x48801B: prefork (subst.c:77)
==8407==    by 0x42B318: execcmd (exec.c:2619)
==8407==    by 0x428CA0: execpline2 (exec.c:1697)
==8407==    by 0x427FD2: execpline (exec.c:1484)
==8407==    by 0x427756: execlist (exec.c:1267)
==8407==    by 0x42717C: execode (exec.c:1073)
==8407==    by 0x431299: runshfunc (exec.c:5040)
==8407==    by 0x430E76: doshfunc (exec.c:4920)
==8407==    by 0x4302FB: execshfunc (exec.c:4557)
==8407==    by 0x42D8C1: execcmd (exec.c:3373)
==8407== 
==8407== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
--8409-- Caught __NR_exit; running __libc_freeres()
--8410-- Caught __NR_exit; running __libc_freeres()
--8409-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8410== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8410-by-pythonnut-on-???
==8410== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8410-by-pythonnut-on-???
==8410== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8410-by-pythonnut-on-???
==8410== 
==8410== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8410== don't want to do, unless you know exactly what you're doing,
==8410== or are doing some strange experiment):
==8410==   /usr/lib/valgrind/../../bin/vgdb --pid=8410 ...command...
==8410== 
==8410== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8410==   /path/to/gdb ./zsh
==8410== and then give GDB the following command
==8410==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8410
==8410== --pid is optional if only one valgrind process is running
==8410== 
==8409== 
==8409== HEAP SUMMARY:
==8409==     in use at exit: 3,016,917 bytes in 68,822 blocks
==8409==   total heap usage: 834,450 allocs, 765,628 frees, 58,723,325 bytes allocated
==8409== 
--8410-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8410== 
==8410== HEAP SUMMARY:
==8410==     in use at exit: 3,010,518 bytes in 68,532 blocks
==8410==   total heap usage: 831,127 allocs, 762,595 frees, 57,043,954 bytes allocated
==8410== 
==8409== Searching for pointers to 68,822 not-freed blocks
--8409--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8409--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8409--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8409--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8409--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8409--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8409--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8409--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8409--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8409--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8409--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8409--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8409--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8409--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8409--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8409--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8409--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8409--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8409--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8409--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8409--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8409--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8409--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8409--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8409--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8409--   Scanning root segment: 0x701a000..0x701afff (4096)
--8409--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8409--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8409--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8409--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8409--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8409--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8409--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8409--   Scanning root segment: 0xffefed000..0xfff000fff (81920)
==8410== Searching for pointers to 68,532 not-freed blocks
--8410--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8410--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8410--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8410--   Scanning root segment: 0x4037000..0x403afff (16384)
--8410--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8410--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8410--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8410--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8410--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8410--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8410--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8410--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8410--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8410--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8410--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8410--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8410--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8410--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8410--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8410--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8410--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8410--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8410--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8410--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8410--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8410--   Scanning root segment: 0x701a000..0x701afff (4096)
--8410--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8410--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8410--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8410--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8410--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8410--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8410--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8410--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8409== Checked 4,726,288 bytes
==8409== 
==8409== LEAK SUMMARY:
==8409==    definitely lost: 253 bytes in 4 blocks
==8409==    indirectly lost: 6,756 bytes in 7 blocks
==8409==      possibly lost: 0 bytes in 0 blocks
==8409==    still reachable: 3,009,908 bytes in 68,811 blocks
==8409==         suppressed: 0 bytes in 0 blocks
==8409== Rerun with --leak-check=full to see details of leaked memory
==8409== 
==8409== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8409== 
==8409== 1 errors in context 1 of 1:
==8409== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8409==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8409==    by 0x488CD0: stringsubst (subst.c:301)
==8409==    by 0x48801B: prefork (subst.c:77)
==8409==    by 0x42B318: execcmd (exec.c:2619)
==8409==    by 0x428CA0: execpline2 (exec.c:1697)
==8409==    by 0x427FD2: execpline (exec.c:1484)
==8409==    by 0x427756: execlist (exec.c:1267)
==8409==    by 0x42717C: execode (exec.c:1073)
==8409==    by 0x431299: runshfunc (exec.c:5040)
==8409==    by 0x430E76: doshfunc (exec.c:4920)
==8409==    by 0x4302FB: execshfunc (exec.c:4557)
==8409==    by 0x42D8C1: execcmd (exec.c:3373)
==8409== 
==8409== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8410== Checked 4,667,728 bytes
==8410== 
--8408-- Caught __NR_exit; running __libc_freeres()
==8410== LEAK SUMMARY:
==8410==    definitely lost: 253 bytes in 4 blocks
==8410==    indirectly lost: 6,756 bytes in 7 blocks
==8410==      possibly lost: 0 bytes in 0 blocks
==8410==    still reachable: 3,003,509 bytes in 68,521 blocks
==8410==         suppressed: 0 bytes in 0 blocks
==8410== Rerun with --leak-check=full to see details of leaked memory
==8410== 
==8410== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8410== 
==8410== 1 errors in context 1 of 1:
==8410== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8410==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8410==    by 0x488CD0: stringsubst (subst.c:301)
==8410==    by 0x48801B: prefork (subst.c:77)
==8410==    by 0x42B318: execcmd (exec.c:2619)
==8410==    by 0x428CA0: execpline2 (exec.c:1697)
==8410==    by 0x427FD2: execpline (exec.c:1484)
==8410==    by 0x427756: execlist (exec.c:1267)
==8410==    by 0x42717C: execode (exec.c:1073)
==8410==    by 0x431299: runshfunc (exec.c:5040)
==8410==    by 0x430E76: doshfunc (exec.c:4920)
==8410==    by 0x4302FB: execshfunc (exec.c:4557)
==8410==    by 0x42D8C1: execcmd (exec.c:3373)
==8410== 
==8410== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8408== 
==8408== HEAP SUMMARY:
==8408==     in use at exit: 3,014,895 bytes in 68,743 blocks
==8408==   total heap usage: 834,357 allocs, 765,614 frees, 58,721,446 bytes allocated
==8408== 
==8411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8411-by-pythonnut-on-???
==8411== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8411-by-pythonnut-on-???
==8411== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8411-by-pythonnut-on-???
==8411== 
==8411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8411== don't want to do, unless you know exactly what you're doing,
==8411== or are doing some strange experiment):
==8411==   /usr/lib/valgrind/../../bin/vgdb --pid=8411 ...command...
==8411== 
==8411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8411==   /path/to/gdb ./zsh
==8411== and then give GDB the following command
==8411==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8411
==8411== --pid is optional if only one valgrind process is running
==8411== 
--8411-- Caught __NR_exit; running __libc_freeres()
==8408== Searching for pointers to 68,743 not-freed blocks
--8408--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8408--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8408--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8408--   Scanning root segment: 0x4037000..0x403efff (32768)
--8408--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8408--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8408--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8408--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8408--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8408--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8408--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8408--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8408--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8408--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8408--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8408--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8408--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8408--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8408--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8408--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8408--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8408--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8408--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8408--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8408--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8408--   Scanning root segment: 0x701a000..0x701afff (4096)
--8408--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8408--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8408--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8408--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8408--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8408--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8408--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8408--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8411== 
==8411== HEAP SUMMARY:
==8411==     in use at exit: 3,010,553 bytes in 68,533 blocks
==8411==   total heap usage: 831,140 allocs, 762,607 frees, 57,046,648 bytes allocated
==8411== 
==8411== Searching for pointers to 68,533 not-freed blocks
--8411--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8411--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8411--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8411--   Scanning root segment: 0x4037000..0x403afff (16384)
--8411--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8411--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8411--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8411--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8411--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8411--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8411--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8411--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8411--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8411--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8411--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8411--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8411--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8411--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8411--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8411--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8411--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8411--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8411--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8411--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8411--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8411--   Scanning root segment: 0x701a000..0x701afff (4096)
--8411--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8411--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8411--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8411--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8411--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8411--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8411--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8411--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8408== Checked 4,706,168 bytes
==8408== 
==8408== LEAK SUMMARY:
==8408==    definitely lost: 253 bytes in 4 blocks
==8408==    indirectly lost: 6,756 bytes in 7 blocks
==8408==      possibly lost: 0 bytes in 0 blocks
==8408==    still reachable: 3,007,886 bytes in 68,732 blocks
==8408==         suppressed: 0 bytes in 0 blocks
==8408== Rerun with --leak-check=full to see details of leaked memory
==8408== 
==8408== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8408== 
==8408== 1 errors in context 1 of 1:
==8408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8408==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8408==    by 0x488CD0: stringsubst (subst.c:301)
==8408==    by 0x48801B: prefork (subst.c:77)
==8408==    by 0x42B318: execcmd (exec.c:2619)
==8408==    by 0x428CA0: execpline2 (exec.c:1697)
==8408==    by 0x427FD2: execpline (exec.c:1484)
==8408==    by 0x427756: execlist (exec.c:1267)
==8408==    by 0x42717C: execode (exec.c:1073)
==8408==    by 0x431299: runshfunc (exec.c:5040)
==8408==    by 0x430E76: doshfunc (exec.c:4920)
==8408==    by 0x4302FB: execshfunc (exec.c:4557)
==8408==    by 0x42D8C1: execcmd (exec.c:3373)
==8408== 
==8408== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
client request: code 4d430005,  addr 0xFFEFF762C,  len 4
client request: code 4d430005,  addr 0xFFEFF762C,  len 4
==8411== Checked 4,667,248 bytes
==8411== 
client request: code 4d430005,  addr 0xFFEFF5D6C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF573C,  len 4
client request: code 4d430005,  addr 0xFFEFF5DCC,  len 4
client request: code 4d430005,  addr 0xFFEFF5DCC,  len 4
client request: code 4d430005,  addr 0xFFEFF5DCC,  len 4
client request: code 4d430005,  addr 0xFFEFF933C,  len 4
--8367-- Caught __NR_exit; running __libc_freeres()
==8411== LEAK SUMMARY:
==8411==    definitely lost: 253 bytes in 4 blocks
==8411==    indirectly lost: 6,756 bytes in 7 blocks
==8411==      possibly lost: 0 bytes in 0 blocks
==8411==    still reachable: 3,003,544 bytes in 68,522 blocks
==8411==         suppressed: 0 bytes in 0 blocks
==8411== Rerun with --leak-check=full to see details of leaked memory
==8411== 
==8411== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8411== 
==8411== 1 errors in context 1 of 1:
==8411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8411==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8411==    by 0x488CD0: stringsubst (subst.c:301)
==8411==    by 0x48801B: prefork (subst.c:77)
==8411==    by 0x42B318: execcmd (exec.c:2619)
==8411==    by 0x428CA0: execpline2 (exec.c:1697)
==8411==    by 0x427FD2: execpline (exec.c:1484)
==8411==    by 0x427756: execlist (exec.c:1267)
==8411==    by 0x42717C: execode (exec.c:1073)
==8411==    by 0x431299: runshfunc (exec.c:5040)
==8411==    by 0x430E76: doshfunc (exec.c:4920)
==8411==    by 0x4302FB: execshfunc (exec.c:4557)
==8411==    by 0x42D8C1: execcmd (exec.c:3373)
==8411== 
==8411== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==7806== Conditional jump or move depends on uninitialised value(s)
==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==7806==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==7806==    by 0x40EFC2: execbuiltin (builtin.c:450)
==7806==    by 0x42D8E9: execcmd (exec.c:3378)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x42779A: execlist (exec.c:1275)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==7806== 
--8367-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8367== 
==8367== HEAP SUMMARY:
==8367==     in use at exit: 3,011,560 bytes in 68,557 blocks
==8367==   total heap usage: 834,665 allocs, 766,108 frees, 58,773,806 bytes allocated
==8367== 
==8367== Searching for pointers to 68,557 not-freed blocks
--8367--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8367--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8367--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8367--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8367--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8367--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8367--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8367--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8367--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8367--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8367--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8367--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8367--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8367--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8367--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8367--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8367--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8367--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8367--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8367--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8367--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8367--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8367--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8367--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8367--   Scanning root segment: 0x701a000..0x701afff (4096)
--8367--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8367--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8367--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8367--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8367--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8367--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8367--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8367--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8367== Checked 4,663,160 bytes
==8367== 
==8367== LEAK SUMMARY:
==8367==    definitely lost: 253 bytes in 4 blocks
==8367==    indirectly lost: 6,756 bytes in 7 blocks
==8367==      possibly lost: 0 bytes in 0 blocks
==8367==    still reachable: 3,004,551 bytes in 68,546 blocks
==8367==         suppressed: 0 bytes in 0 blocks
==8367== Rerun with --leak-check=full to see details of leaked memory
==8367== 
==8367== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8367== 
==8367== 1 errors in context 1 of 1:
==8367== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8367==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8367==    by 0x488CD0: stringsubst (subst.c:301)
==8367==    by 0x48801B: prefork (subst.c:77)
==8367==    by 0x42B318: execcmd (exec.c:2619)
==8367==    by 0x428CA0: execpline2 (exec.c:1697)
==8367==    by 0x427FD2: execpline (exec.c:1484)
==8367==    by 0x427756: execlist (exec.c:1267)
==8367==    by 0x42717C: execode (exec.c:1073)
==8367==    by 0x431299: runshfunc (exec.c:5040)
==8367==    by 0x430E76: doshfunc (exec.c:4920)
==8367==    by 0x4302FB: execshfunc (exec.c:4557)
==8367==    by 0x42D8C1: execcmd (exec.c:3373)
==8367== 
==8367== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8363-- Caught __NR_exit; running __libc_freeres()
--8363-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8363== 
==8363== HEAP SUMMARY:
==8363==     in use at exit: 2,984,657 bytes in 68,307 blocks
==8363==   total heap usage: 830,648 allocs, 762,341 frees, 57,175,989 bytes allocated
==8363== 
==8363== Searching for pointers to 68,307 not-freed blocks
--8363--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8363--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8363--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8363--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8363--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8363--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8363--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8363--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8363--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8363--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8363--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8363--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8363--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8363--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8363--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8363--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8363--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8363--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8363--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8363--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8363--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8363--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8363--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8363--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8363--   Scanning root segment: 0x701a000..0x701afff (4096)
--8363--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8363--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8363--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8363--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8363--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8363--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8363--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8363--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8363== Checked 4,635,128 bytes
==8363== 
==8363== LEAK SUMMARY:
==8363==    definitely lost: 253 bytes in 4 blocks
==8363==    indirectly lost: 6,756 bytes in 7 blocks
==8363==      possibly lost: 0 bytes in 0 blocks
==8363==    still reachable: 2,977,648 bytes in 68,296 blocks
==8363==         suppressed: 0 bytes in 0 blocks
==8363== Rerun with --leak-check=full to see details of leaked memory
==8363== 
==8363== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8363== 
==8363== 1 errors in context 1 of 1:
==8363== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8363==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8363==    by 0x488CD0: stringsubst (subst.c:301)
==8363==    by 0x48801B: prefork (subst.c:77)
==8363==    by 0x42B318: execcmd (exec.c:2619)
==8363==    by 0x428CA0: execpline2 (exec.c:1697)
==8363==    by 0x427FD2: execpline (exec.c:1484)
==8363==    by 0x427756: execlist (exec.c:1267)
==8363==    by 0x42717C: execode (exec.c:1073)
==8363==    by 0x431299: runshfunc (exec.c:5040)
==8363==    by 0x430E76: doshfunc (exec.c:4920)
==8363==    by 0x4302FB: execshfunc (exec.c:4557)
==8363==    by 0x42D8C1: execcmd (exec.c:3373)
==8363== 
==8363== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8361-- Caught __NR_exit; running __libc_freeres()
--8361-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8361== 
==8361== HEAP SUMMARY:
==8361==     in use at exit: 2,983,798 bytes in 68,291 blocks
==8361==   total heap usage: 830,615 allocs, 762,324 frees, 57,166,116 bytes allocated
==8361== 
==8361== Searching for pointers to 68,291 not-freed blocks
--8361--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8361--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8361--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8361--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8361--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8361--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8361--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8361--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8361--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8361--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8361--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8361--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8361--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8361--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8361--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8361--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8361--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8361--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8361--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8361--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8361--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8361--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8361--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8361--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8361--   Scanning root segment: 0x701a000..0x701afff (4096)
--8361--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8361--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8361--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8361--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8361--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8361--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8361--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8361--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8361== Checked 4,631,120 bytes
==8361== 
==8361== LEAK SUMMARY:
==8361==    definitely lost: 253 bytes in 4 blocks
==8361==    indirectly lost: 6,756 bytes in 7 blocks
==8361==      possibly lost: 0 bytes in 0 blocks
==8361==    still reachable: 2,976,789 bytes in 68,280 blocks
==8361==         suppressed: 0 bytes in 0 blocks
==8361== Rerun with --leak-check=full to see details of leaked memory
==8361== 
==8361== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8361== 
==8361== 1 errors in context 1 of 1:
==8361== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8361==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8361==    by 0x488CD0: stringsubst (subst.c:301)
==8361==    by 0x48801B: prefork (subst.c:77)
==8361==    by 0x42B318: execcmd (exec.c:2619)
==8361==    by 0x428CA0: execpline2 (exec.c:1697)
==8361==    by 0x427FD2: execpline (exec.c:1484)
==8361==    by 0x427756: execlist (exec.c:1267)
==8361==    by 0x42717C: execode (exec.c:1073)
==8361==    by 0x431299: runshfunc (exec.c:5040)
==8361==    by 0x430E76: doshfunc (exec.c:4920)
==8361==    by 0x4302FB: execshfunc (exec.c:4557)
==8361==    by 0x42D8C1: execcmd (exec.c:3373)
==8361== 
==8361== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8412-by-pythonnut-on-???
==8412== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8412-by-pythonnut-on-???
==8412== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8412-by-pythonnut-on-???
==8412== 
==8412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8412== don't want to do, unless you know exactly what you're doing,
==8412== or are doing some strange experiment):
==8412==   /usr/lib/valgrind/../../bin/vgdb --pid=8412 ...command...
==8412== 
==8412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8412==   /path/to/gdb ./zsh
==8412== and then give GDB the following command
==8412==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8412
==8412== --pid is optional if only one valgrind process is running
==8412== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
--8413-- Caught __NR_exit; running __libc_freeres()
==8413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8413-by-pythonnut-on-???
==8413== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8413-by-pythonnut-on-???
==8413== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8413-by-pythonnut-on-???
==8413== 
==8413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8413== don't want to do, unless you know exactly what you're doing,
==8413== or are doing some strange experiment):
==8413==   /usr/lib/valgrind/../../bin/vgdb --pid=8413 ...command...
==8413== 
==8413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8413==   /path/to/gdb ./zsh
==8413== and then give GDB the following command
==8413==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8413
==8413== --pid is optional if only one valgrind process is running
==8413== 
--8413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8413== 
==8413== HEAP SUMMARY:
==8413==     in use at exit: 2,984,302 bytes in 68,303 blocks
==8413==   total heap usage: 830,603 allocs, 762,300 frees, 57,161,447 bytes allocated
==8413== 
==8413== Searching for pointers to 68,303 not-freed blocks
--8413--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8413--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8413--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8413--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8413--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8413--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8413--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8413--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8413--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8413--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8413--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8413--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8413--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8413--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8413--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8413--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8413--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8413--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8413--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8413--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8413--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8413--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8413--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8413--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8413--   Scanning root segment: 0x701a000..0x701afff (4096)
--8413--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8413--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8413--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8413--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8413--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8413--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8413--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8413--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8413== Checked 4,633,672 bytes
==8413== 
==8413== LEAK SUMMARY:
==8413==    definitely lost: 253 bytes in 4 blocks
==8413==    indirectly lost: 6,756 bytes in 7 blocks
==8413==      possibly lost: 0 bytes in 0 blocks
==8413==    still reachable: 2,977,293 bytes in 68,292 blocks
==8413==         suppressed: 0 bytes in 0 blocks
==8413== Rerun with --leak-check=full to see details of leaked memory
==8413== 
==8413== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8413== 
==8413== 1 errors in context 1 of 1:
==8413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8413==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8413==    by 0x488CD0: stringsubst (subst.c:301)
==8413==    by 0x48801B: prefork (subst.c:77)
==8413==    by 0x42B318: execcmd (exec.c:2619)
==8413==    by 0x428CA0: execpline2 (exec.c:1697)
==8413==    by 0x427FD2: execpline (exec.c:1484)
==8413==    by 0x427756: execlist (exec.c:1267)
==8413==    by 0x42717C: execode (exec.c:1073)
==8413==    by 0x431299: runshfunc (exec.c:5040)
==8413==    by 0x430E76: doshfunc (exec.c:4920)
==8413==    by 0x4302FB: execshfunc (exec.c:4557)
==8413==    by 0x42D8C1: execcmd (exec.c:3373)
==8413== 
==8413== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8415-by-pythonnut-on-???
==8415== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8415-by-pythonnut-on-???
==8415== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8415-by-pythonnut-on-???
==8415== 
==8415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8415== don't want to do, unless you know exactly what you're doing,
==8415== or are doing some strange experiment):
==8415==   /usr/lib/valgrind/../../bin/vgdb --pid=8415 ...command...
==8415== 
==8415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8415==   /path/to/gdb ./zsh
==8415== and then give GDB the following command
==8415==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8415
==8415== --pid is optional if only one valgrind process is running
==8415== 
--8415-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
client request: code 4d430005,  addr 0xFFEFFB37C,  len 4
client request: code 4d430005,  addr 0xFFEFF836C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF895C,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFEEBFC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
==8417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8417-by-pythonnut-on-???
==8417== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8417-by-pythonnut-on-???
==8417== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8417-by-pythonnut-on-???
==8417== 
==8417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8417== don't want to do, unless you know exactly what you're doing,
==8417== or are doing some strange experiment):
==8417==   /usr/lib/valgrind/../../bin/vgdb --pid=8417 ...command...
==8417== 
==8417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8417==   /path/to/gdb ./zsh
==8417== and then give GDB the following command
==8417==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8417
==8417== --pid is optional if only one valgrind process is running
==8417== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
==8418== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8418-by-pythonnut-on-???
==8418== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8418-by-pythonnut-on-???
==8418== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8418-by-pythonnut-on-???
==8418== 
==8418== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8418== don't want to do, unless you know exactly what you're doing,
==8418== or are doing some strange experiment):
==8418==   /usr/lib/valgrind/../../bin/vgdb --pid=8418 ...command...
==8418== 
==8418== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8418==   /path/to/gdb ./zsh
==8418== and then give GDB the following command
==8418==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8418
==8418== --pid is optional if only one valgrind process is running
==8418== 
--8418-- Caught __NR_exit; running __libc_freeres()
--8418-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8418== 
==8418== HEAP SUMMARY:
==8418==     in use at exit: 3,016,033 bytes in 68,800 blocks
==8418==   total heap usage: 834,352 allocs, 765,552 frees, 58,897,138 bytes allocated
==8418== 
==8418== Searching for pointers to 68,800 not-freed blocks
--8418--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8418--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8418--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8418--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8418--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8418--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8418--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8418--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8418--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8418--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8418--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8418--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8418--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8418--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8418--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8418--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8418--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8418--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8418--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8418--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8418--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8418--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8418--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8418--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8418--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8418--   Scanning root segment: 0x701a000..0x701afff (4096)
--8418--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8418--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8418--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8418--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8418--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8418--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8418--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8418--   Scanning root segment: 0xffeff0000..0xfff000fff (69632)
==8418== Checked 4,721,768 bytes
==8418== 
==8418== LEAK SUMMARY:
==8418==    definitely lost: 253 bytes in 4 blocks
==8418==    indirectly lost: 6,756 bytes in 7 blocks
==8418==      possibly lost: 0 bytes in 0 blocks
==8418==    still reachable: 3,009,024 bytes in 68,789 blocks
==8418==         suppressed: 0 bytes in 0 blocks
==8418== Rerun with --leak-check=full to see details of leaked memory
==8418== 
==8418== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8418== 
==8418== 1 errors in context 1 of 1:
==8418== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8418==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8418==    by 0x488CD0: stringsubst (subst.c:301)
==8418==    by 0x48801B: prefork (subst.c:77)
==8418==    by 0x42B318: execcmd (exec.c:2619)
==8418==    by 0x428CA0: execpline2 (exec.c:1697)
==8418==    by 0x427FD2: execpline (exec.c:1484)
==8418==    by 0x427756: execlist (exec.c:1267)
==8418==    by 0x42717C: execode (exec.c:1073)
==8418==    by 0x431299: runshfunc (exec.c:5040)
==8418==    by 0x430E76: doshfunc (exec.c:4920)
==8418==    by 0x4302FB: execshfunc (exec.c:4557)
==8418==    by 0x42D8C1: execcmd (exec.c:3373)
==8418== 
==8418== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8417-- Caught __NR_exit; running __libc_freeres()
--8417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8417== 
==8417== HEAP SUMMARY:
==8417==     in use at exit: 3,013,883 bytes in 68,721 blocks
==8417==   total heap usage: 834,261 allocs, 765,540 frees, 58,698,339 bytes allocated
==8417== 
==8417== Searching for pointers to 68,721 not-freed blocks
--8417--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8417--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8417--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8417--   Scanning root segment: 0x4037000..0x403efff (32768)
--8417--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8417--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8417--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8417--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8417--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8417--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8417--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8417--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8417--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8417--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8417--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8417--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8417--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8417--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8417--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8417--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8417--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8417--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8417--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8417--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8417--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8417--   Scanning root segment: 0x701a000..0x701afff (4096)
--8417--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8417--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8417--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8417--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8417--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8417--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8417--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8417--   Scanning root segment: 0xffeff4000..0xfff000fff (53248)
==8417== Checked 4,701,520 bytes
==8417== 
==8417== LEAK SUMMARY:
==8417==    definitely lost: 253 bytes in 4 blocks
==8417==    indirectly lost: 6,756 bytes in 7 blocks
==8417==      possibly lost: 0 bytes in 0 blocks
==8417==    still reachable: 3,006,874 bytes in 68,710 blocks
==8417==         suppressed: 0 bytes in 0 blocks
==8417== Rerun with --leak-check=full to see details of leaked memory
==8417== 
==8417== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8417== 
==8417== 1 errors in context 1 of 1:
==8417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8417==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8417==    by 0x488CD0: stringsubst (subst.c:301)
==8417==    by 0x48801B: prefork (subst.c:77)
==8417==    by 0x42B318: execcmd (exec.c:2619)
==8417==    by 0x428CA0: execpline2 (exec.c:1697)
==8417==    by 0x427FD2: execpline (exec.c:1484)
==8417==    by 0x427756: execlist (exec.c:1267)
==8417==    by 0x42717C: execode (exec.c:1073)
==8417==    by 0x431299: runshfunc (exec.c:5040)
==8417==    by 0x430E76: doshfunc (exec.c:4920)
==8417==    by 0x4302FB: execshfunc (exec.c:4557)
==8417==    by 0x42D8C1: execcmd (exec.c:3373)
==8417== 
==8417== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8419-by-pythonnut-on-???
==8419== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8419-by-pythonnut-on-???
==8419== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8419-by-pythonnut-on-???
==8419== 
==8419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8419== don't want to do, unless you know exactly what you're doing,
==8419== or are doing some strange experiment):
==8419==   /usr/lib/valgrind/../../bin/vgdb --pid=8419 ...command...
==8419== 
==8419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8419==   /path/to/gdb ./zsh
==8419== and then give GDB the following command
==8419==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8419
==8419== --pid is optional if only one valgrind process is running
==8419== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==8420== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8420-by-pythonnut-on-???
==8420== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8420-by-pythonnut-on-???
==8420== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8420-by-pythonnut-on-???
==8420== 
==8420== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8420== don't want to do, unless you know exactly what you're doing,
==8420== or are doing some strange experiment):
==8420==   /usr/lib/valgrind/../../bin/vgdb --pid=8420 ...command...
==8420== 
==8420== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8420==   /path/to/gdb ./zsh
==8420== and then give GDB the following command
==8420==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8420
==8420== --pid is optional if only one valgrind process is running
==8420== 
--8420-- Caught __NR_exit; running __libc_freeres()
--8420-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8420== 
==8420== HEAP SUMMARY:
==8420==     in use at exit: 3,016,236 bytes in 68,807 blocks
==8420==   total heap usage: 834,368 allocs, 765,561 frees, 58,867,251 bytes allocated
==8420== 
==8420== Searching for pointers to 68,807 not-freed blocks
--8420--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8420--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8420--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8420--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8420--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8420--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8420--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8420--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8420--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8420--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8420--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8420--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8420--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8420--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8420--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8420--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8420--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8420--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8420--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8420--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8420--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8420--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8420--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8420--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8420--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8420--   Scanning root segment: 0x701a000..0x701afff (4096)
--8420--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8420--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8420--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8420--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8420--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8420--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8420--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8420--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8420== Checked 4,722,456 bytes
==8420== 
==8420== LEAK SUMMARY:
==8420==    definitely lost: 253 bytes in 4 blocks
==8420==    indirectly lost: 6,756 bytes in 7 blocks
==8420==      possibly lost: 0 bytes in 0 blocks
==8420==    still reachable: 3,009,227 bytes in 68,796 blocks
==8420==         suppressed: 0 bytes in 0 blocks
==8420== Rerun with --leak-check=full to see details of leaked memory
==8420== 
==8420== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8420== 
==8420== 1 errors in context 1 of 1:
==8420== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8420==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8420==    by 0x488CD0: stringsubst (subst.c:301)
==8420==    by 0x48801B: prefork (subst.c:77)
==8420==    by 0x42B318: execcmd (exec.c:2619)
==8420==    by 0x428CA0: execpline2 (exec.c:1697)
==8420==    by 0x427FD2: execpline (exec.c:1484)
==8420==    by 0x427756: execlist (exec.c:1267)
==8420==    by 0x42717C: execode (exec.c:1073)
==8420==    by 0x431299: runshfunc (exec.c:5040)
==8420==    by 0x430E76: doshfunc (exec.c:4920)
==8420==    by 0x4302FB: execshfunc (exec.c:4557)
==8420==    by 0x42D8C1: execcmd (exec.c:3373)
==8420== 
==8420== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8419-- Caught __NR_exit; running __libc_freeres()
--8419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8419== 
==8419== HEAP SUMMARY:
==8419==     in use at exit: 3,014,096 bytes in 68,728 blocks
==8419==   total heap usage: 834,275 allocs, 765,547 frees, 58,701,192 bytes allocated
==8419== 
==8419== Searching for pointers to 68,728 not-freed blocks
--8419--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8419--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8419--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8419--   Scanning root segment: 0x4037000..0x403efff (32768)
--8419--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8419--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8419--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8419--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8419--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8419--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8419--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8419--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8419--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8419--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8419--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8419--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8419--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8419--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8419--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8419--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8419--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8419--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8419--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8419--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8419--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8419--   Scanning root segment: 0x701a000..0x701afff (4096)
--8419--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8419--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8419--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8419--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8419--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8419--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8419--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8419--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8419== Checked 4,702,232 bytes
==8419== 
==8419== LEAK SUMMARY:
==8419==    definitely lost: 253 bytes in 4 blocks
==8419==    indirectly lost: 6,756 bytes in 7 blocks
==8419==      possibly lost: 0 bytes in 0 blocks
==8419==    still reachable: 3,007,087 bytes in 68,717 blocks
==8419==         suppressed: 0 bytes in 0 blocks
==8419== Rerun with --leak-check=full to see details of leaked memory
==8419== 
==8419== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8419== 
==8419== 1 errors in context 1 of 1:
==8419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8419==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8419==    by 0x488CD0: stringsubst (subst.c:301)
==8419==    by 0x48801B: prefork (subst.c:77)
==8419==    by 0x42B318: execcmd (exec.c:2619)
==8419==    by 0x428CA0: execpline2 (exec.c:1697)
==8419==    by 0x427FD2: execpline (exec.c:1484)
==8419==    by 0x427756: execlist (exec.c:1267)
==8419==    by 0x42717C: execode (exec.c:1073)
==8419==    by 0x431299: runshfunc (exec.c:5040)
==8419==    by 0x430E76: doshfunc (exec.c:4920)
==8419==    by 0x4302FB: execshfunc (exec.c:4557)
==8419==    by 0x42D8C1: execcmd (exec.c:3373)
==8419== 
==8419== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8421== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8421-by-pythonnut-on-???
==8421== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8421-by-pythonnut-on-???
==8421== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8421-by-pythonnut-on-???
==8421== 
==8421== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8421== don't want to do, unless you know exactly what you're doing,
==8421== or are doing some strange experiment):
==8421==   /usr/lib/valgrind/../../bin/vgdb --pid=8421 ...command...
==8421== 
==8421== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8421==   /path/to/gdb ./zsh
==8421== and then give GDB the following command
==8421==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8421
==8421== --pid is optional if only one valgrind process is running
==8421== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==8422== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8422-by-pythonnut-on-???
==8422== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8422-by-pythonnut-on-???
==8422== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8422-by-pythonnut-on-???
==8422== 
==8422== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8422== don't want to do, unless you know exactly what you're doing,
==8422== or are doing some strange experiment):
==8422==   /usr/lib/valgrind/../../bin/vgdb --pid=8422 ...command...
==8422== 
==8422== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8422==   /path/to/gdb ./zsh
==8422== and then give GDB the following command
==8422==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8422
==8422== --pid is optional if only one valgrind process is running
==8422== 
--8422-- Caught __NR_exit; running __libc_freeres()
--8422-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8422== 
==8422== HEAP SUMMARY:
==8422==     in use at exit: 3,016,221 bytes in 68,807 blocks
==8422==   total heap usage: 834,379 allocs, 765,572 frees, 58,837,208 bytes allocated
==8422== 
==8422== Searching for pointers to 68,807 not-freed blocks
--8422--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8422--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8422--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8422--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8422--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8422--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8422--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8422--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8422--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8422--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8422--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8422--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8422--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8422--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8422--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8422--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8422--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8422--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8422--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8422--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8422--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8422--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8422--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8422--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8422--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8422--   Scanning root segment: 0x701a000..0x701afff (4096)
--8422--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8422--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8422--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8422--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8422--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8422--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8422--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8422--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8422== Checked 4,722,456 bytes
==8422== 
==8422== LEAK SUMMARY:
==8422==    definitely lost: 253 bytes in 4 blocks
==8422==    indirectly lost: 6,756 bytes in 7 blocks
==8422==      possibly lost: 0 bytes in 0 blocks
==8422==    still reachable: 3,009,212 bytes in 68,796 blocks
==8422==         suppressed: 0 bytes in 0 blocks
==8422== Rerun with --leak-check=full to see details of leaked memory
==8422== 
==8422== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8422== 
==8422== 1 errors in context 1 of 1:
==8422== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8422==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8422==    by 0x488CD0: stringsubst (subst.c:301)
==8422==    by 0x48801B: prefork (subst.c:77)
==8422==    by 0x42B318: execcmd (exec.c:2619)
==8422==    by 0x428CA0: execpline2 (exec.c:1697)
==8422==    by 0x427FD2: execpline (exec.c:1484)
==8422==    by 0x427756: execlist (exec.c:1267)
==8422==    by 0x42717C: execode (exec.c:1073)
==8422==    by 0x431299: runshfunc (exec.c:5040)
==8422==    by 0x430E76: doshfunc (exec.c:4920)
==8422==    by 0x4302FB: execshfunc (exec.c:4557)
==8422==    by 0x42D8C1: execcmd (exec.c:3373)
==8422== 
==8422== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8421-- Caught __NR_exit; running __libc_freeres()
--8421-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8421== 
==8421== HEAP SUMMARY:
==8421==     in use at exit: 3,014,091 bytes in 68,728 blocks
==8421==   total heap usage: 834,286 allocs, 765,558 frees, 58,703,968 bytes allocated
==8421== 
==8421== Searching for pointers to 68,728 not-freed blocks
--8421--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8421--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8421--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8421--   Scanning root segment: 0x4037000..0x403efff (32768)
--8421--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8421--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8421--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8421--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8421--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8421--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8421--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8421--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8421--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8421--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8421--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8421--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8421--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8421--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8421--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8421--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8421--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8421--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8421--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8421--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8421--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8421--   Scanning root segment: 0x701a000..0x701afff (4096)
--8421--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8421--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8421--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8421--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8421--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8421--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8421--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8421--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8421== Checked 4,702,224 bytes
==8421== 
==8421== LEAK SUMMARY:
==8421==    definitely lost: 253 bytes in 4 blocks
==8421==    indirectly lost: 6,756 bytes in 7 blocks
==8421==      possibly lost: 0 bytes in 0 blocks
==8421==    still reachable: 3,007,082 bytes in 68,717 blocks
==8421==         suppressed: 0 bytes in 0 blocks
==8421== Rerun with --leak-check=full to see details of leaked memory
==8421== 
==8421== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8421== 
==8421== 1 errors in context 1 of 1:
==8421== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8421==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8421==    by 0x488CD0: stringsubst (subst.c:301)
==8421==    by 0x48801B: prefork (subst.c:77)
==8421==    by 0x42B318: execcmd (exec.c:2619)
==8421==    by 0x428CA0: execpline2 (exec.c:1697)
==8421==    by 0x427FD2: execpline (exec.c:1484)
==8421==    by 0x427756: execlist (exec.c:1267)
==8421==    by 0x42717C: execode (exec.c:1073)
==8421==    by 0x431299: runshfunc (exec.c:5040)
==8421==    by 0x430E76: doshfunc (exec.c:4920)
==8421==    by 0x4302FB: execshfunc (exec.c:4557)
==8421==    by 0x42D8C1: execcmd (exec.c:3373)
==8421== 
==8421== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8423== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8423-by-pythonnut-on-???
==8423== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8423-by-pythonnut-on-???
==8423== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8423-by-pythonnut-on-???
==8423== 
==8423== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8423== don't want to do, unless you know exactly what you're doing,
==8423== or are doing some strange experiment):
==8423==   /usr/lib/valgrind/../../bin/vgdb --pid=8423 ...command...
==8423== 
==8423== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8423==   /path/to/gdb ./zsh
==8423== and then give GDB the following command
==8423==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8423
==8423== --pid is optional if only one valgrind process is running
==8423== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==8424== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8424-by-pythonnut-on-???
==8424== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8424-by-pythonnut-on-???
==8424== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8424-by-pythonnut-on-???
==8424== 
==8424== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8424== don't want to do, unless you know exactly what you're doing,
==8424== or are doing some strange experiment):
==8424==   /usr/lib/valgrind/../../bin/vgdb --pid=8424 ...command...
==8424== 
==8424== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8424==   /path/to/gdb ./zsh
==8424== and then give GDB the following command
==8424==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8424
==8424== --pid is optional if only one valgrind process is running
==8424== 
--8424-- Caught __NR_exit; running __libc_freeres()
--8424-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8424== 
==8424== HEAP SUMMARY:
==8424==     in use at exit: 3,016,186 bytes in 68,807 blocks
==8424==   total heap usage: 834,390 allocs, 765,583 frees, 58,807,135 bytes allocated
==8424== 
==8424== Searching for pointers to 68,807 not-freed blocks
--8424--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8424--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8424--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8424--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8424--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8424--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8424--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8424--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8424--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8424--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8424--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8424--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8424--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8424--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8424--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8424--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8424--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8424--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8424--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8424--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8424--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8424--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8424--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8424--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8424--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8424--   Scanning root segment: 0x701a000..0x701afff (4096)
--8424--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8424--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8424--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8424--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8424--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8424--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8424--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8424--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8424== Checked 4,722,424 bytes
==8424== 
==8424== LEAK SUMMARY:
==8424==    definitely lost: 253 bytes in 4 blocks
==8424==    indirectly lost: 6,756 bytes in 7 blocks
==8424==      possibly lost: 0 bytes in 0 blocks
==8424==    still reachable: 3,009,177 bytes in 68,796 blocks
==8424==         suppressed: 0 bytes in 0 blocks
==8424== Rerun with --leak-check=full to see details of leaked memory
==8424== 
==8424== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8424== 
==8424== 1 errors in context 1 of 1:
==8424== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8424==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8424==    by 0x488CD0: stringsubst (subst.c:301)
==8424==    by 0x48801B: prefork (subst.c:77)
==8424==    by 0x42B318: execcmd (exec.c:2619)
==8424==    by 0x428CA0: execpline2 (exec.c:1697)
==8424==    by 0x427FD2: execpline (exec.c:1484)
==8424==    by 0x427756: execlist (exec.c:1267)
==8424==    by 0x42717C: execode (exec.c:1073)
==8424==    by 0x431299: runshfunc (exec.c:5040)
==8424==    by 0x430E76: doshfunc (exec.c:4920)
==8424==    by 0x4302FB: execshfunc (exec.c:4557)
==8424==    by 0x42D8C1: execcmd (exec.c:3373)
==8424== 
==8424== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8423-- Caught __NR_exit; running __libc_freeres()
--8423-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8423== 
==8423== HEAP SUMMARY:
==8423==     in use at exit: 3,014,086 bytes in 68,728 blocks
==8423==   total heap usage: 834,297 allocs, 765,569 frees, 58,706,739 bytes allocated
==8423== 
==8423== Searching for pointers to 68,728 not-freed blocks
--8423--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8423--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8423--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8423--   Scanning root segment: 0x4037000..0x403efff (32768)
--8423--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8423--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8423--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8423--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8423--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8423--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8423--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8423--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8423--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8423--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8423--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8423--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8423--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8423--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8423--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8423--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8423--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8423--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8423--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8423--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8423--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8423--   Scanning root segment: 0x701a000..0x701afff (4096)
--8423--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8423--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8423--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8423--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8423--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8423--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8423--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8423--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8423== Checked 4,702,224 bytes
==8423== 
==8423== LEAK SUMMARY:
==8423==    definitely lost: 253 bytes in 4 blocks
==8423==    indirectly lost: 6,756 bytes in 7 blocks
==8423==      possibly lost: 0 bytes in 0 blocks
==8423==    still reachable: 3,007,077 bytes in 68,717 blocks
==8423==         suppressed: 0 bytes in 0 blocks
==8423== Rerun with --leak-check=full to see details of leaked memory
==8423== 
==8423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8423== 
==8423== 1 errors in context 1 of 1:
==8423== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8423==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8423==    by 0x488CD0: stringsubst (subst.c:301)
==8423==    by 0x48801B: prefork (subst.c:77)
==8423==    by 0x42B318: execcmd (exec.c:2619)
==8423==    by 0x428CA0: execpline2 (exec.c:1697)
==8423==    by 0x427FD2: execpline (exec.c:1484)
==8423==    by 0x427756: execlist (exec.c:1267)
==8423==    by 0x42717C: execode (exec.c:1073)
==8423==    by 0x431299: runshfunc (exec.c:5040)
==8423==    by 0x430E76: doshfunc (exec.c:4920)
==8423==    by 0x4302FB: execshfunc (exec.c:4557)
==8423==    by 0x42D8C1: execcmd (exec.c:3373)
==8423== 
==8423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8425== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8425-by-pythonnut-on-???
==8425== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8425-by-pythonnut-on-???
==8425== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8425-by-pythonnut-on-???
==8425== 
==8425== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8425== don't want to do, unless you know exactly what you're doing,
==8425== or are doing some strange experiment):
==8425==   /usr/lib/valgrind/../../bin/vgdb --pid=8425 ...command...
==8425== 
==8425== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8425==   /path/to/gdb ./zsh
==8425== and then give GDB the following command
==8425==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8425
==8425== --pid is optional if only one valgrind process is running
==8425== 
==8426== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8426-by-pythonnut-on-???
==8426== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8426-by-pythonnut-on-???
==8426== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8426-by-pythonnut-on-???
==8426== 
==8426== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8426== don't want to do, unless you know exactly what you're doing,
==8426== or are doing some strange experiment):
==8426==   /usr/lib/valgrind/../../bin/vgdb --pid=8426 ...command...
==8426== 
==8426== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8426==   /path/to/gdb ./zsh
==8426== and then give GDB the following command
==8426==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8426
==8426== --pid is optional if only one valgrind process is running
==8426== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--8426-- Caught __NR_exit; running __libc_freeres()
--8426-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8426== 
==8426== HEAP SUMMARY:
==8426==     in use at exit: 3,016,137 bytes in 68,807 blocks
==8426==   total heap usage: 834,401 allocs, 765,594 frees, 58,777,042 bytes allocated
==8426== 
==8426== Searching for pointers to 68,807 not-freed blocks
--8426--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8426--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8426--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8426--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8426--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8426--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8426--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8426--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8426--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8426--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8426--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8426--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8426--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8426--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8426--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8426--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8426--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8426--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8426--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8426--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8426--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8426--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8426--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8426--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8426--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8426--   Scanning root segment: 0x701a000..0x701afff (4096)
--8426--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8426--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8426--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8426--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8426--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8426--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8426--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8426--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8426== Checked 4,722,376 bytes
==8426== 
==8426== LEAK SUMMARY:
==8426==    definitely lost: 253 bytes in 4 blocks
==8426==    indirectly lost: 6,756 bytes in 7 blocks
==8426==      possibly lost: 0 bytes in 0 blocks
==8426==    still reachable: 3,009,128 bytes in 68,796 blocks
==8426==         suppressed: 0 bytes in 0 blocks
==8426== Rerun with --leak-check=full to see details of leaked memory
==8426== 
==8426== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8426== 
==8426== 1 errors in context 1 of 1:
==8426== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8426==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8426==    by 0x488CD0: stringsubst (subst.c:301)
==8426==    by 0x48801B: prefork (subst.c:77)
==8426==    by 0x42B318: execcmd (exec.c:2619)
==8426==    by 0x428CA0: execpline2 (exec.c:1697)
==8426==    by 0x427FD2: execpline (exec.c:1484)
==8426==    by 0x427756: execlist (exec.c:1267)
==8426==    by 0x42717C: execode (exec.c:1073)
==8426==    by 0x431299: runshfunc (exec.c:5040)
==8426==    by 0x430E76: doshfunc (exec.c:4920)
==8426==    by 0x4302FB: execshfunc (exec.c:4557)
==8426==    by 0x42D8C1: execcmd (exec.c:3373)
==8426== 
==8426== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8425-- Caught __NR_exit; running __libc_freeres()
--8425-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8425== 
==8425== HEAP SUMMARY:
==8425==     in use at exit: 3,014,071 bytes in 68,728 blocks
==8425==   total heap usage: 834,308 allocs, 765,580 frees, 58,709,495 bytes allocated
==8425== 
==8425== Searching for pointers to 68,728 not-freed blocks
--8425--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8425--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8425--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8425--   Scanning root segment: 0x4037000..0x403efff (32768)
--8425--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8425--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8425--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8425--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8425--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8425--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8425--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8425--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8425--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8425--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8425--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8425--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8425--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8425--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8425--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8425--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8425--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8425--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8425--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8425--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8425--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8425--   Scanning root segment: 0x701a000..0x701afff (4096)
--8425--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8425--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8425--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8425--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8425--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8425--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8425--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8425--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8425== Checked 4,702,208 bytes
==8425== 
==8425== LEAK SUMMARY:
==8425==    definitely lost: 253 bytes in 4 blocks
==8425==    indirectly lost: 6,756 bytes in 7 blocks
==8425==      possibly lost: 0 bytes in 0 blocks
==8425==    still reachable: 3,007,062 bytes in 68,717 blocks
==8425==         suppressed: 0 bytes in 0 blocks
==8425== Rerun with --leak-check=full to see details of leaked memory
==8425== 
==8425== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8425== 
==8425== 1 errors in context 1 of 1:
==8425== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8425==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8425==    by 0x488CD0: stringsubst (subst.c:301)
==8425==    by 0x48801B: prefork (subst.c:77)
==8425==    by 0x42B318: execcmd (exec.c:2619)
==8425==    by 0x428CA0: execpline2 (exec.c:1697)
==8425==    by 0x427FD2: execpline (exec.c:1484)
==8425==    by 0x427756: execlist (exec.c:1267)
==8425==    by 0x42717C: execode (exec.c:1073)
==8425==    by 0x431299: runshfunc (exec.c:5040)
==8425==    by 0x430E76: doshfunc (exec.c:4920)
==8425==    by 0x4302FB: execshfunc (exec.c:4557)
==8425==    by 0x42D8C1: execcmd (exec.c:3373)
==8425== 
==8425== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8427== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8427-by-pythonnut-on-???
==8427== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8427-by-pythonnut-on-???
==8427== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8427-by-pythonnut-on-???
==8427== 
==8427== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8427== don't want to do, unless you know exactly what you're doing,
==8427== or are doing some strange experiment):
==8427==   /usr/lib/valgrind/../../bin/vgdb --pid=8427 ...command...
==8427== 
==8427== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8427==   /path/to/gdb ./zsh
==8427== and then give GDB the following command
==8427==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8427
==8427== --pid is optional if only one valgrind process is running
==8427== 
==8428== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8428-by-pythonnut-on-???
==8428== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8428-by-pythonnut-on-???
==8428== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8428-by-pythonnut-on-???
==8428== 
==8428== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8428== don't want to do, unless you know exactly what you're doing,
==8428== or are doing some strange experiment):
==8428==   /usr/lib/valgrind/../../bin/vgdb --pid=8428 ...command...
==8428== 
==8428== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8428==   /path/to/gdb ./zsh
==8428== and then give GDB the following command
==8428==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8428
==8428== --pid is optional if only one valgrind process is running
==8428== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--8428-- Caught __NR_exit; running __libc_freeres()
--8428-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8428== 
==8428== HEAP SUMMARY:
==8428==     in use at exit: 3,016,086 bytes in 68,807 blocks
==8428==   total heap usage: 834,412 allocs, 765,605 frees, 58,746,932 bytes allocated
==8428== 
==8428== Searching for pointers to 68,807 not-freed blocks
--8428--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8428--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8428--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8428--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8428--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8428--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8428--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8428--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8428--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8428--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8428--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8428--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8428--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8428--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8428--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8428--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8428--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8428--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8428--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8428--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8428--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8428--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8428--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8428--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8428--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8428--   Scanning root segment: 0x701a000..0x701afff (4096)
--8428--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8428--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8428--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8428--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8428--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8428--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8428--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8428--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8429== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8429-by-pythonnut-on-???
==8429== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8429-by-pythonnut-on-???
==8429== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8429-by-pythonnut-on-???
==8429== 
==8429== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8429== don't want to do, unless you know exactly what you're doing,
==8429== or are doing some strange experiment):
==8429==   /usr/lib/valgrind/../../bin/vgdb --pid=8429 ...command...
==8429== 
==8429== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8429==   /path/to/gdb ./zsh
==8429== and then give GDB the following command
==8429==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8429
==8429== --pid is optional if only one valgrind process is running
==8429== 
==8428== Checked 4,722,328 bytes
==8428== 
--8429-- Caught __NR_exit; running __libc_freeres()
==8428== LEAK SUMMARY:
==8428==    definitely lost: 253 bytes in 4 blocks
==8428==    indirectly lost: 6,756 bytes in 7 blocks
==8428==      possibly lost: 0 bytes in 0 blocks
==8428==    still reachable: 3,009,077 bytes in 68,796 blocks
==8428==         suppressed: 0 bytes in 0 blocks
==8428== Rerun with --leak-check=full to see details of leaked memory
==8428== 
==8428== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8428== 
==8428== 1 errors in context 1 of 1:
==8428== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8428==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8428==    by 0x488CD0: stringsubst (subst.c:301)
==8428==    by 0x48801B: prefork (subst.c:77)
==8428==    by 0x42B318: execcmd (exec.c:2619)
==8428==    by 0x428CA0: execpline2 (exec.c:1697)
==8428==    by 0x427FD2: execpline (exec.c:1484)
==8428==    by 0x427756: execlist (exec.c:1267)
==8428==    by 0x42717C: execode (exec.c:1073)
==8428==    by 0x431299: runshfunc (exec.c:5040)
==8428==    by 0x430E76: doshfunc (exec.c:4920)
==8428==    by 0x4302FB: execshfunc (exec.c:4557)
==8428==    by 0x42D8C1: execcmd (exec.c:3373)
==8428== 
==8428== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8427-- Caught __NR_exit; running __libc_freeres()
--8429-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8429== 
==8429== HEAP SUMMARY:
==8429==     in use at exit: 1,405,227 bytes in 28,934 blocks
==8429==   total heap usage: 787,615 allocs, 758,681 frees, 54,681,487 bytes allocated
==8429== 
--8427-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8429== Searching for pointers to 28,934 not-freed blocks
--8429--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8429--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8429--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8429--   Scanning root segment: 0x4036000..0x4047fff (73728)
--8429--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8429--   Scanning root segment: 0x41d6000..0x421dfff (294912)
==8427== 
--8429--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8429--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8429--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8429--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8429--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8429--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8429--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8429--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8429--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8429--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8429--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8429--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8429--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8429--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8429--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8429--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8429--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8429--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8429--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8429--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8429--   Scanning root segment: 0x701a000..0x701afff (4096)
--8429--   Scanning root segment: 0x881b000..0x8838fff (122880)
--8429--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==8427== HEAP SUMMARY:
==8427==     in use at exit: 3,014,054 bytes in 68,728 blocks
==8427==   total heap usage: 834,319 allocs, 765,591 frees, 58,712,234 bytes allocated
==8427== 
--8429--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8429--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8429--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8429--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8429--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8429--   Scanning root segment: 0xb86b000..0xb874fff (40960)
--8429--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8429== Checked 2,194,920 bytes
==8429== 
==8427== Searching for pointers to 68,728 not-freed blocks
--8427--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8427--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8427--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8427--   Scanning root segment: 0x4037000..0x403efff (32768)
--8427--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8427--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8427--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8427--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8427--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8427--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==8429== LEAK SUMMARY:
==8429==    definitely lost: 253 bytes in 4 blocks
--8427--   Scanning root segment: 0x5041000..0x5041fff (4096)
==8429==    indirectly lost: 6,756 bytes in 7 blocks
==8429==      possibly lost: 0 bytes in 0 blocks
==8429==    still reachable: 1,398,218 bytes in 28,923 blocks
==8429==         suppressed: 0 bytes in 0 blocks
==8429== Rerun with --leak-check=full to see details of leaked memory
==8429== 
--8427--   Scanning root segment: 0x5245000..0x5245fff (4096)
==8429== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8429== 
--8427--   Scanning root segment: 0x54ac000..0x54acfff (4096)
==8429== 1 errors in context 1 of 1:
==8429== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8429==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
--8427--   Scanning root segment: 0x54ad000..0x54adfff (4096)
==8429==    by 0x488CD0: stringsubst (subst.c:301)
==8429==    by 0x48801B: prefork (subst.c:77)
--8427--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
==8429==    by 0x42B318: execcmd (exec.c:2619)
==8429==    by 0x428CA0: execpline2 (exec.c:1697)
==8429==    by 0x427FD2: execpline (exec.c:1484)
--8427--   Scanning root segment: 0x59ba000..0x59bafff (4096)
==8429==    by 0x427756: execlist (exec.c:1267)
==8429==    by 0x42717C: execode (exec.c:1073)
==8429==    by 0x431299: runshfunc (exec.c:5040)
==8429==    by 0x430E76: doshfunc (exec.c:4920)
--8427--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
==8429==    by 0x4302FB: execshfunc (exec.c:4557)
==8429==    by 0x42D8C1: execcmd (exec.c:3373)
==8429== 
==8429== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8427--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8427--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8427--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8427--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8427--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8427--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8427--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8427--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8427--   Scanning root segment: 0x701a000..0x701afff (4096)
--8427--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8427--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8427--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8427--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8427--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8427--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8427--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8427--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8427== Checked 4,702,200 bytes
==8427== 
--8368-- Caught __NR_exit; running __libc_freeres()
==8427== LEAK SUMMARY:
==8427==    definitely lost: 253 bytes in 4 blocks
==8427==    indirectly lost: 6,756 bytes in 7 blocks
==8427==      possibly lost: 0 bytes in 0 blocks
==8427==    still reachable: 3,007,045 bytes in 68,717 blocks
==8427==         suppressed: 0 bytes in 0 blocks
==8427== Rerun with --leak-check=full to see details of leaked memory
==8427== 
==8427== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8427== 
==8427== 1 errors in context 1 of 1:
==8427== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8427==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8427==    by 0x488CD0: stringsubst (subst.c:301)
==8427==    by 0x48801B: prefork (subst.c:77)
==8427==    by 0x42B318: execcmd (exec.c:2619)
==8427==    by 0x428CA0: execpline2 (exec.c:1697)
==8427==    by 0x427FD2: execpline (exec.c:1484)
==8427==    by 0x427756: execlist (exec.c:1267)
==8427==    by 0x42717C: execode (exec.c:1073)
==8427==    by 0x431299: runshfunc (exec.c:5040)
==8427==    by 0x430E76: doshfunc (exec.c:4920)
==8427==    by 0x4302FB: execshfunc (exec.c:4557)
==8427==    by 0x42D8C1: execcmd (exec.c:3373)
==8427== 
==8427== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8368-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8430== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8430-by-pythonnut-on-???
==8430== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8430-by-pythonnut-on-???
==8430== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8430-by-pythonnut-on-???
==8430== 
==8430== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8430== don't want to do, unless you know exactly what you're doing,
==8430== or are doing some strange experiment):
==8430==   /usr/lib/valgrind/../../bin/vgdb --pid=8430 ...command...
==8430== 
==8430== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8430==   /path/to/gdb ./zsh
==8430== and then give GDB the following command
==8430==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8430
==8430== --pid is optional if only one valgrind process is running
==8430== 
==8368== 
==8368== HEAP SUMMARY:
==8368==     in use at exit: 1,367,183 bytes in 28,848 blocks
==8368==   total heap usage: 788,634 allocs, 759,786 frees, 54,712,350 bytes allocated
==8368== 
==8368== Searching for pointers to 28,848 not-freed blocks
--8368--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8368--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8368--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8368--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8368--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8368--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8368--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8368--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8368--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8368--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8368--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8368--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8368--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8368--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8368--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8368--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8368--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8368--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8368--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8368--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8368--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8368--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8368--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8368--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8368--   Scanning root segment: 0x701a000..0x701afff (4096)
--8368--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8368--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8368--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8368--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8368--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8368--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8368--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8431== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8431-by-pythonnut-on-???
==8431== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8431-by-pythonnut-on-???
==8431== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8431-by-pythonnut-on-???
==8431== 
==8431== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8431== don't want to do, unless you know exactly what you're doing,
==8431== or are doing some strange experiment):
==8431==   /usr/lib/valgrind/../../bin/vgdb --pid=8431 ...command...
==8431== 
==8431== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8431==   /path/to/gdb ./zsh
==8431== and then give GDB the following command
==8431==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8431
==8431== --pid is optional if only one valgrind process is running
==8431== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--8431-- Caught __NR_exit; running __libc_freeres()
==8368== Checked 1,622,040 bytes
==8368== 
==8368== LEAK SUMMARY:
==8368==    definitely lost: 253 bytes in 4 blocks
==8368==    indirectly lost: 6,756 bytes in 7 blocks
==8368==      possibly lost: 0 bytes in 0 blocks
==8368==    still reachable: 1,360,174 bytes in 28,837 blocks
==8368==         suppressed: 0 bytes in 0 blocks
==8368== Rerun with --leak-check=full to see details of leaked memory
==8368== 
==8368== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8368== 
==8368== 1 errors in context 1 of 1:
==8368== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8368==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8368==    by 0x488CD0: stringsubst (subst.c:301)
==8368==    by 0x48801B: prefork (subst.c:77)
==8368==    by 0x42B318: execcmd (exec.c:2619)
==8368==    by 0x428CA0: execpline2 (exec.c:1697)
==8368==    by 0x427FD2: execpline (exec.c:1484)
==8368==    by 0x427756: execlist (exec.c:1267)
==8368==    by 0x42717C: execode (exec.c:1073)
==8368==    by 0x431299: runshfunc (exec.c:5040)
==8368==    by 0x430E76: doshfunc (exec.c:4920)
==8368==    by 0x4302FB: execshfunc (exec.c:4557)
==8368==    by 0x42D8C1: execcmd (exec.c:3373)
==8368== 
==8368== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8431-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--8348-- Caught __NR_exit; running __libc_freeres()
==8431== 
==8431== HEAP SUMMARY:
==8431==     in use at exit: 3,016,059 bytes in 68,807 blocks
==8431==   total heap usage: 834,423 allocs, 765,616 frees, 58,716,835 bytes allocated
==8431== 
--8348-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8348== 
==8348== HEAP SUMMARY:
==8348==     in use at exit: 1,365,289 bytes in 28,781 blocks
==8348==   total heap usage: 787,456 allocs, 758,675 frees, 54,434,629 bytes allocated
==8348== 
==8431== Searching for pointers to 68,807 not-freed blocks
client request: code 4d430005,  addr 0xFFEFEBCCC,  len 4
--8431--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8431--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8431--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8431--   Scanning root segment: 0x4037000..0x4042fff (49152)
--8431--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8431--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8431--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8431--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8431--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8431--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8431--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8431--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8431--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8431--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8431--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8431--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8431--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8431--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8431--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8431--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8431--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8431--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8431--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8431--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8431--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8431--   Scanning root segment: 0x701a000..0x701afff (4096)
--8431--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8431--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8431--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8431--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8431--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8431--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8431--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8431--   Scanning root segment: 0xffefef000..0xfff000fff (73728)
==8348== Searching for pointers to 28,781 not-freed blocks
--8348--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8348--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8348--   Scanning root segment: 0x4022000..0x4027fff (24576)
--8348--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8348--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8348--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8348--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8348--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8348--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8348--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8348--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8348--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8348--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8348--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8348--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8348--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8348--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8348--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8348--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8348--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8348--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8348--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8348--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8348--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8348--   Scanning root segment: 0x701a000..0x701afff (4096)
--8348--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8348--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8348--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8348--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8348--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8348--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8348--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8433== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8433-by-pythonnut-on-???
==8433== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8433-by-pythonnut-on-???
==8433== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8433-by-pythonnut-on-???
==8433== 
==8433== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8433== don't want to do, unless you know exactly what you're doing,
==8433== or are doing some strange experiment):
==8433==   /usr/lib/valgrind/../../bin/vgdb --pid=8433 ...command...
==8433== 
==8433== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8433==   /path/to/gdb ./zsh
==8433== and then give GDB the following command
==8433==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8433
==8433== --pid is optional if only one valgrind process is running
==8433== 
==8348== Checked 1,619,736 bytes
==8348== 
==8348== LEAK SUMMARY:
==8348==    definitely lost: 253 bytes in 4 blocks
==8348==    indirectly lost: 6,756 bytes in 7 blocks
==8348==      possibly lost: 0 bytes in 0 blocks
==8348==    still reachable: 1,358,280 bytes in 28,770 blocks
==8348==         suppressed: 0 bytes in 0 blocks
==8348== Rerun with --leak-check=full to see details of leaked memory
==8348== 
==8348== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8348== 
==8348== 1 errors in context 1 of 1:
==8348== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8348==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8348==    by 0x488CD0: stringsubst (subst.c:301)
==8348==    by 0x48801B: prefork (subst.c:77)
==8348==    by 0x42B318: execcmd (exec.c:2619)
==8348==    by 0x428CA0: execpline2 (exec.c:1697)
==8348==    by 0x427FD2: execpline (exec.c:1484)
==8348==    by 0x427756: execlist (exec.c:1267)
==8348==    by 0x42717C: execode (exec.c:1073)
==8348==    by 0x431299: runshfunc (exec.c:5040)
==8348==    by 0x430E76: doshfunc (exec.c:4920)
==8348==    by 0x4302FB: execshfunc (exec.c:4557)
==8348==    by 0x42D8C1: execcmd (exec.c:3373)
==8348== 
==8348== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8434-- Caught __NR_exit; running __libc_freeres()
==8434== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8434-by-pythonnut-on-???
==8434== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8434-by-pythonnut-on-???
==8434== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8434-by-pythonnut-on-???
==8434== 
==8434== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8434== don't want to do, unless you know exactly what you're doing,
==8434== or are doing some strange experiment):
==8434==   /usr/lib/valgrind/../../bin/vgdb --pid=8434 ...command...
==8434== 
==8434== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8434==   /path/to/gdb ./zsh
==8434== and then give GDB the following command
==8434==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8434
==8434== --pid is optional if only one valgrind process is running
==8434== 
client request: code 4d430005,  addr 0xFFEFEC63C,  len 4
--8434-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8434== 
==8434== HEAP SUMMARY:
==8434==     in use at exit: 3,014,251 bytes in 68,610 blocks
==8434==   total heap usage: 831,563 allocs, 762,953 frees, 57,083,130 bytes allocated
==8434== 
==8431== Checked 4,722,288 bytes
==8431== 
==8434== Searching for pointers to 68,610 not-freed blocks
--8434--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8434--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8434--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8434--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8434--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8434--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8434--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8434--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8434--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8434--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8434--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8434--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8434--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8434--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8434--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8434--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8434--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8434--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8434--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8434--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8434--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8434--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8434--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8434--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8434--   Scanning root segment: 0x701a000..0x701afff (4096)
--8434--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8434--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8434--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8434--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8434--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8434--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8434--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8434--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8431== LEAK SUMMARY:
==8431==    definitely lost: 253 bytes in 4 blocks
==8431==    indirectly lost: 6,756 bytes in 7 blocks
==8431==      possibly lost: 0 bytes in 0 blocks
==8431==    still reachable: 3,009,050 bytes in 68,796 blocks
==8431==         suppressed: 0 bytes in 0 blocks
==8431== Rerun with --leak-check=full to see details of leaked memory
==8431== 
==8431== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8431== 
==8431== 1 errors in context 1 of 1:
==8431== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8431==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8431==    by 0x488CD0: stringsubst (subst.c:301)
==8431==    by 0x48801B: prefork (subst.c:77)
==8431==    by 0x42B318: execcmd (exec.c:2619)
==8431==    by 0x428CA0: execpline2 (exec.c:1697)
==8431==    by 0x427FD2: execpline (exec.c:1484)
==8431==    by 0x427756: execlist (exec.c:1267)
==8431==    by 0x42717C: execode (exec.c:1073)
==8431==    by 0x431299: runshfunc (exec.c:5040)
==8431==    by 0x430E76: doshfunc (exec.c:4920)
==8431==    by 0x4302FB: execshfunc (exec.c:4557)
==8431==    by 0x42D8C1: execcmd (exec.c:3373)
==8431== 
==8431== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8430-- Caught __NR_exit; running __libc_freeres()
--8430-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8430== 
==8430== HEAP SUMMARY:
==8430==     in use at exit: 3,014,037 bytes in 68,728 blocks
==8430==   total heap usage: 834,330 allocs, 765,602 frees, 58,714,956 bytes allocated
==8430== 
==8430== Searching for pointers to 68,728 not-freed blocks
--8430--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8430--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8430--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8430--   Scanning root segment: 0x4037000..0x403efff (32768)
--8430--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8430--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8430--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8430--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8430--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8430--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8430--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8430--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8430--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8430--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8430--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8430--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8430--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8430--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8430--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8430--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8430--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8430--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8430--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8430--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8430--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8430--   Scanning root segment: 0x701a000..0x701afff (4096)
--8430--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8430--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8430--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8430--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8430--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8430--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8430--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8430--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8434== Checked 4,660,416 bytes
==8434== 
==8434== LEAK SUMMARY:
==8434==    definitely lost: 253 bytes in 4 blocks
==8434==    indirectly lost: 6,756 bytes in 7 blocks
==8434==      possibly lost: 0 bytes in 0 blocks
==8434==    still reachable: 3,007,242 bytes in 68,599 blocks
==8434==         suppressed: 0 bytes in 0 blocks
==8434== Rerun with --leak-check=full to see details of leaked memory
==8434== 
==8434== Use --track-origins=yes to see where uninitialised values come from
==8434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8434== 
==8434== 1 errors in context 1 of 2:
==8434== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8434==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8434==    by 0x488CD0: stringsubst (subst.c:301)
==8434==    by 0x48801B: prefork (subst.c:77)
==8434==    by 0x42B318: execcmd (exec.c:2619)
==8434==    by 0x428CA0: execpline2 (exec.c:1697)
==8434==    by 0x427FD2: execpline (exec.c:1484)
==8434==    by 0x427756: execlist (exec.c:1267)
==8434==    by 0x42717C: execode (exec.c:1073)
==8434==    by 0x431299: runshfunc (exec.c:5040)
==8434==    by 0x430E76: doshfunc (exec.c:4920)
==8434==    by 0x4302FB: execshfunc (exec.c:4557)
==8434==    by 0x42D8C1: execcmd (exec.c:3373)
==8434== 
==8434== 
==8434== 2 errors in context 2 of 2:
==8434== Conditional jump or move depends on uninitialised value(s)
==8434==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8434==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8434==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8434==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8434==    by 0x42D8E9: execcmd (exec.c:3378)
==8434==    by 0x428CA0: execpline2 (exec.c:1697)
==8434==    by 0x427FD2: execpline (exec.c:1484)
==8434==    by 0x42779A: execlist (exec.c:1275)
==8434==    by 0x42717C: execode (exec.c:1073)
==8434==    by 0x431299: runshfunc (exec.c:5040)
==8434==    by 0x430E76: doshfunc (exec.c:4920)
==8434==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8434== 
==8434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8433-- Caught __NR_exit; running __libc_freeres()
--8433-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8433== 
==8433== HEAP SUMMARY:
==8433==     in use at exit: 3,014,187 bytes in 68,607 blocks
==8433==   total heap usage: 831,561 allocs, 762,954 frees, 57,082,889 bytes allocated
==8433== 
==8430== Checked 4,702,168 bytes
==8430== 
==8433== Searching for pointers to 68,607 not-freed blocks
--8433--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8433--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8433--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8433--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8433--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8433--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8433--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8433--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8433--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8433--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8433--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8433--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8433--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8433--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8433--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8433--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8433--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8433--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8433--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8433--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8433--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8433--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8433--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8433--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8433--   Scanning root segment: 0x701a000..0x701afff (4096)
--8433--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8433--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8433--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8433--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8433--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8433--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8433--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8433--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8430== LEAK SUMMARY:
==8430==    definitely lost: 253 bytes in 4 blocks
==8430==    indirectly lost: 6,756 bytes in 7 blocks
==8430==      possibly lost: 0 bytes in 0 blocks
==8430==    still reachable: 3,007,028 bytes in 68,717 blocks
==8430==         suppressed: 0 bytes in 0 blocks
==8430== Rerun with --leak-check=full to see details of leaked memory
==8430== 
==8430== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8430== 
==8430== 1 errors in context 1 of 1:
==8430== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8430==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8430==    by 0x488CD0: stringsubst (subst.c:301)
==8430==    by 0x48801B: prefork (subst.c:77)
==8430==    by 0x42B318: execcmd (exec.c:2619)
==8430==    by 0x428CA0: execpline2 (exec.c:1697)
==8430==    by 0x427FD2: execpline (exec.c:1484)
==8430==    by 0x427756: execlist (exec.c:1267)
==8430==    by 0x42717C: execode (exec.c:1073)
==8430==    by 0x431299: runshfunc (exec.c:5040)
==8430==    by 0x430E76: doshfunc (exec.c:4920)
==8430==    by 0x4302FB: execshfunc (exec.c:4557)
==8430==    by 0x42D8C1: execcmd (exec.c:3373)
==8430== 
==8430== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF99DC,  len 4
client request: code 4d430005,  addr 0xFFEFF99DC,  len 4
client request: code 4d430005,  addr 0xFFEFF811C,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF7AEC,  len 4
client request: code 4d430005,  addr 0xFFEFF817C,  len 4
client request: code 4d430005,  addr 0xFFEFF817C,  len 4
client request: code 4d430005,  addr 0xFFEFF817C,  len 4
client request: code 4d430005,  addr 0xFFEFFB6EC,  len 4
--8415-- Caught __NR_exit; running __libc_freeres()
--8415-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8415== 
==8415== HEAP SUMMARY:
==8415==     in use at exit: 3,010,574 bytes in 68,542 blocks
==8415==   total heap usage: 834,637 allocs, 766,095 frees, 58,767,060 bytes allocated
==8415== 
==8433== Checked 4,659,728 bytes
==8433== 
==8415== Searching for pointers to 68,542 not-freed blocks
--8415--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8415--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8415--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8415--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8415--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8415--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8415--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8415--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8415--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8415--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8415--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8415--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8415--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8415--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8415--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8415--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8415--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
==8433== LEAK SUMMARY:
==8433==    definitely lost: 253 bytes in 4 blocks
==8433==    indirectly lost: 6,756 bytes in 7 blocks
==8433==      possibly lost: 0 bytes in 0 blocks
==8433==    still reachable: 3,007,178 bytes in 68,596 blocks
==8433==         suppressed: 0 bytes in 0 blocks
==8433== Rerun with --leak-check=full to see details of leaked memory
==8433== 
==8433== Use --track-origins=yes to see where uninitialised values come from
==8433== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8433== 
==8433== 1 errors in context 1 of 2:
==8433== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--8415--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
==8433==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8433==    by 0x488CD0: stringsubst (subst.c:301)
==8433==    by 0x48801B: prefork (subst.c:77)
==8433==    by 0x42B318: execcmd (exec.c:2619)
--8415--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
==8433==    by 0x428CA0: execpline2 (exec.c:1697)
==8433==    by 0x427FD2: execpline (exec.c:1484)
==8433==    by 0x427756: execlist (exec.c:1267)
==8433==    by 0x42717C: execode (exec.c:1073)
==8433==    by 0x431299: runshfunc (exec.c:5040)
==8433==    by 0x430E76: doshfunc (exec.c:4920)
==8433==    by 0x4302FB: execshfunc (exec.c:4557)
==8433==    by 0x42D8C1: execcmd (exec.c:3373)
==8433== 
==8433== 
==8433== 2 errors in context 2 of 2:
==8433== Conditional jump or move depends on uninitialised value(s)
==8433==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8433==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8433==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8433==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8433==    by 0x42D8E9: execcmd (exec.c:3378)
--8415--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==8433==    by 0x428CA0: execpline2 (exec.c:1697)
==8433==    by 0x427FD2: execpline (exec.c:1484)
==8433==    by 0x42779A: execlist (exec.c:1275)
==8433==    by 0x42717C: execode (exec.c:1073)
==8433==    by 0x431299: runshfunc (exec.c:5040)
==8433==    by 0x430E76: doshfunc (exec.c:4920)
==8433==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8433== 
==8433== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8415--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8415--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8415--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8415--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8415--   Scanning root segment: 0x701a000..0x701afff (4096)
--8415--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8415--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8415--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8415--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8415--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8415--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8415--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8415--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
--8438-- Caught __NR_exit; running __libc_freeres()
==8438== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8438-by-pythonnut-on-???
==8438== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8438-by-pythonnut-on-???
==8438== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8438-by-pythonnut-on-???
==8438== 
==8438== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8438== don't want to do, unless you know exactly what you're doing,
==8438== or are doing some strange experiment):
==8438==   /usr/lib/valgrind/../../bin/vgdb --pid=8438 ...command...
==8438== 
==8438== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8438==   /path/to/gdb ./zsh
==8438== and then give GDB the following command
==8438==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8438
==8438== --pid is optional if only one valgrind process is running
==8438== 
--8438-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8438== 
==8438== HEAP SUMMARY:
==8438==     in use at exit: 3,014,194 bytes in 68,607 blocks
==8438==   total heap usage: 831,576 allocs, 762,969 frees, 57,087,887 bytes allocated
==8438== 
==8438== Searching for pointers to 68,607 not-freed blocks
--8438--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8438--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8438--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8438--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8438--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8438--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8438--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8438--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8438--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8438--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8438--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8438--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8438--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8438--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8438--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8438--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8438--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8438--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8438--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8438--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8438--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8438--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8438--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8438--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8438--   Scanning root segment: 0x701a000..0x701afff (4096)
--8438--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8438--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8438--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8438--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8438--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8438--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8438--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8438--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
==8415== Checked 4,659,160 bytes
==8415== 
==8415== LEAK SUMMARY:
==8415==    definitely lost: 253 bytes in 4 blocks
==8415==    indirectly lost: 6,756 bytes in 7 blocks
==8415==      possibly lost: 0 bytes in 0 blocks
==8415==    still reachable: 3,003,565 bytes in 68,531 blocks
==8415==         suppressed: 0 bytes in 0 blocks
==8415== Rerun with --leak-check=full to see details of leaked memory
==8415== 
==8415== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8415== 
==8415== 1 errors in context 1 of 1:
==8415== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8415==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8415==    by 0x488CD0: stringsubst (subst.c:301)
==8415==    by 0x48801B: prefork (subst.c:77)
==8415==    by 0x42B318: execcmd (exec.c:2619)
==8415==    by 0x428CA0: execpline2 (exec.c:1697)
==8415==    by 0x427FD2: execpline (exec.c:1484)
==8415==    by 0x427756: execlist (exec.c:1267)
==8415==    by 0x42717C: execode (exec.c:1073)
==8415==    by 0x431299: runshfunc (exec.c:5040)
==8415==    by 0x430E76: doshfunc (exec.c:4920)
==8415==    by 0x4302FB: execshfunc (exec.c:4557)
==8415==    by 0x42D8C1: execcmd (exec.c:3373)
==8415== 
==8415== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8412-- Caught __NR_exit; running __libc_freeres()
--8412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8412== 
==8412== HEAP SUMMARY:
==8412==     in use at exit: 2,983,799 bytes in 68,292 blocks
==8412==   total heap usage: 830,622 allocs, 762,330 frees, 57,169,523 bytes allocated
==8412== 
==8412== Searching for pointers to 68,292 not-freed blocks
--8412--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8412--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8412--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8412--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8412--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8412--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8412--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8412--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8412--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8412--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8412--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8412--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8412--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8412--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8412--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8412--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8412--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8412--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8412--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8412--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8412--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8412--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8412--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8412--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8412--   Scanning root segment: 0x701a000..0x701afff (4096)
--8412--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8412--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8412--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8412--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8412--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8412--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8412--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8412--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8438== Checked 4,659,864 bytes
==8438== 
==8438== LEAK SUMMARY:
==8438==    definitely lost: 253 bytes in 4 blocks
==8438==    indirectly lost: 6,756 bytes in 7 blocks
==8438==      possibly lost: 0 bytes in 0 blocks
==8438==    still reachable: 3,007,185 bytes in 68,596 blocks
==8438==         suppressed: 0 bytes in 0 blocks
==8438== Rerun with --leak-check=full to see details of leaked memory
==8438== 
==8438== Use --track-origins=yes to see where uninitialised values come from
==8438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8438== 
==8438== 1 errors in context 1 of 2:
==8438== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8438==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8438==    by 0x488CD0: stringsubst (subst.c:301)
==8438==    by 0x48801B: prefork (subst.c:77)
==8438==    by 0x42B318: execcmd (exec.c:2619)
==8438==    by 0x428CA0: execpline2 (exec.c:1697)
==8438==    by 0x427FD2: execpline (exec.c:1484)
==8438==    by 0x427756: execlist (exec.c:1267)
==8438==    by 0x42717C: execode (exec.c:1073)
==8438==    by 0x431299: runshfunc (exec.c:5040)
==8438==    by 0x430E76: doshfunc (exec.c:4920)
==8438==    by 0x4302FB: execshfunc (exec.c:4557)
==8438==    by 0x42D8C1: execcmd (exec.c:3373)
==8438== 
==8438== 
==8438== 2 errors in context 2 of 2:
==8438== Conditional jump or move depends on uninitialised value(s)
==8438==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8438==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8438==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8438==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8438==    by 0x42D8E9: execcmd (exec.c:3378)
==8438==    by 0x428CA0: execpline2 (exec.c:1697)
==8438==    by 0x427FD2: execpline (exec.c:1484)
==8438==    by 0x42779A: execlist (exec.c:1275)
==8438==    by 0x42717C: execode (exec.c:1073)
==8438==    by 0x431299: runshfunc (exec.c:5040)
==8438==    by 0x430E76: doshfunc (exec.c:4920)
==8438==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8438== 
==8438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8458-- Caught __NR_exit; running __libc_freeres()
==8458== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8458-by-pythonnut-on-???
==8458== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8458-by-pythonnut-on-???
==8458== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8458-by-pythonnut-on-???
==8458== 
==8458== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8458== don't want to do, unless you know exactly what you're doing,
==8458== or are doing some strange experiment):
==8458==   /usr/lib/valgrind/../../bin/vgdb --pid=8458 ...command...
==8458== 
==8458== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8458==   /path/to/gdb ./zsh
==8458== and then give GDB the following command
==8458==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8458
==8458== --pid is optional if only one valgrind process is running
==8458== 
--8458-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8458== 
==8458== HEAP SUMMARY:
==8458==     in use at exit: 3,014,290 bytes in 68,607 blocks
==8458==   total heap usage: 831,592 allocs, 762,985 frees, 57,092,674 bytes allocated
==8458== 
==8412== Checked 4,631,152 bytes
==8412== 
==8412== LEAK SUMMARY:
==8412==    definitely lost: 253 bytes in 4 blocks
==8412==    indirectly lost: 6,756 bytes in 7 blocks
==8412==      possibly lost: 0 bytes in 0 blocks
==8412==    still reachable: 2,976,790 bytes in 68,281 blocks
==8412==         suppressed: 0 bytes in 0 blocks
==8412== Rerun with --leak-check=full to see details of leaked memory
==8412== 
==8412== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8412== 
==8412== 1 errors in context 1 of 1:
==8412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8412==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8412==    by 0x488CD0: stringsubst (subst.c:301)
==8412==    by 0x48801B: prefork (subst.c:77)
==8412==    by 0x42B318: execcmd (exec.c:2619)
==8412==    by 0x428CA0: execpline2 (exec.c:1697)
==8412==    by 0x427FD2: execpline (exec.c:1484)
==8412==    by 0x427756: execlist (exec.c:1267)
==8412==    by 0x42717C: execode (exec.c:1073)
==8412==    by 0x431299: runshfunc (exec.c:5040)
==8412==    by 0x430E76: doshfunc (exec.c:4920)
==8412==    by 0x4302FB: execshfunc (exec.c:4557)
==8458== Searching for pointers to 68,607 not-freed blocks
==8412==    by 0x42D8C1: execcmd (exec.c:3373)
==8412== 
--8458--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==8412== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
--8458--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8458--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8458--   Scanning root segment: 0x4037000..0x403afff (16384)
--8458--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8458--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8458--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8458--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8458--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8458--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8458--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8458--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8458--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8458--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8458--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8458--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8458--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8458--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8458--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8458--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8458--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8458--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8458--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8458--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8458--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8458--   Scanning root segment: 0x701a000..0x701afff (4096)
--8458--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8458--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8458--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8458--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8458--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8458--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8458--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8458--   Scanning root segment: 0xffeff3000..0xfff000fff (57344)
--8358-- Caught __NR_exit; running __libc_freeres()
--8358-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8358== 
==8358== HEAP SUMMARY:
==8358==     in use at exit: 2,983,200 bytes in 68,279 blocks
==8358==   total heap usage: 830,662 allocs, 762,383 frees, 57,164,906 bytes allocated
==8358== 
==8358== Searching for pointers to 68,279 not-freed blocks
--8358--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8358--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8358--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8358--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8358--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8358--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8358--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8358--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8358--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8358--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8358--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8358--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8358--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8358--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8358--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8358--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8358--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8358--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8358--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8358--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8358--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8358--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8358--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8358--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8358--   Scanning root segment: 0x701a000..0x701afff (4096)
--8358--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8358--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8358--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8358--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8358--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8358--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8358--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8358--   Scanning root segment: 0xffeff5000..0xfff000fff (49152)
==8458== Checked 4,675,528 bytes
==8458== 
==8458== LEAK SUMMARY:
==8458==    definitely lost: 253 bytes in 4 blocks
==8458==    indirectly lost: 6,756 bytes in 7 blocks
==8458==      possibly lost: 0 bytes in 0 blocks
==8458==    still reachable: 3,007,281 bytes in 68,596 blocks
==8458==         suppressed: 0 bytes in 0 blocks
==8458== Rerun with --leak-check=full to see details of leaked memory
==8458== 
==8458== Use --track-origins=yes to see where uninitialised values come from
==8458== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8458== 
==8458== 1 errors in context 1 of 2:
==8458== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8458==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8458==    by 0x488CD0: stringsubst (subst.c:301)
==8458==    by 0x48801B: prefork (subst.c:77)
==8458==    by 0x42B318: execcmd (exec.c:2619)
==8458==    by 0x428CA0: execpline2 (exec.c:1697)
==8458==    by 0x427FD2: execpline (exec.c:1484)
==8458==    by 0x427756: execlist (exec.c:1267)
==8458==    by 0x42717C: execode (exec.c:1073)
==8458==    by 0x431299: runshfunc (exec.c:5040)
==8458==    by 0x430E76: doshfunc (exec.c:4920)
==8458==    by 0x4302FB: execshfunc (exec.c:4557)
==8458==    by 0x42D8C1: execcmd (exec.c:3373)
==8458== 
==8458== 
==8458== 2 errors in context 2 of 2:
==8458== Conditional jump or move depends on uninitialised value(s)
==8458==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8458==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8458==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8458==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8458==    by 0x42D8E9: execcmd (exec.c:3378)
==8458==    by 0x428CA0: execpline2 (exec.c:1697)
==8458==    by 0x427FD2: execpline (exec.c:1484)
==8458==    by 0x42779A: execlist (exec.c:1275)
==8458==    by 0x42717C: execode (exec.c:1073)
==8458==    by 0x431299: runshfunc (exec.c:5040)
==8458==    by 0x430E76: doshfunc (exec.c:4920)
==8458==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8458== 
==8458== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEA45C,  len 4
==8358== Checked 4,629,880 bytes
==8358== 
==8563== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8563-by-pythonnut-on-???
==8563== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8563-by-pythonnut-on-???
==8563== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8563-by-pythonnut-on-???
==8563== 
==8563== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8563== don't want to do, unless you know exactly what you're doing,
==8563== or are doing some strange experiment):
==8563==   /usr/lib/valgrind/../../bin/vgdb --pid=8563 ...command...
==8563== 
==8563== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8563==   /path/to/gdb ./zsh
==8563== and then give GDB the following command
==8563==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8563
==8563== --pid is optional if only one valgrind process is running
==8563== 
--8563-- Caught __NR_exit; running __libc_freeres()
==8358== LEAK SUMMARY:
==8358==    definitely lost: 253 bytes in 4 blocks
==8358==    indirectly lost: 6,756 bytes in 7 blocks
==8358==      possibly lost: 0 bytes in 0 blocks
==8358==    still reachable: 2,976,191 bytes in 68,268 blocks
==8358==         suppressed: 0 bytes in 0 blocks
==8358== Rerun with --leak-check=full to see details of leaked memory
==8358== 
==8358== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8358== 
==8358== 1 errors in context 1 of 1:
==8358== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8358==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8358==    by 0x488CD0: stringsubst (subst.c:301)
==8358==    by 0x48801B: prefork (subst.c:77)
==8358==    by 0x42B318: execcmd (exec.c:2619)
==8358==    by 0x428CA0: execpline2 (exec.c:1697)
==8358==    by 0x427FD2: execpline (exec.c:1484)
==8358==    by 0x427756: execlist (exec.c:1267)
==8358==    by 0x42717C: execode (exec.c:1073)
==8358==    by 0x431299: runshfunc (exec.c:5040)
==8358==    by 0x430E76: doshfunc (exec.c:4920)
==8358==    by 0x4302FB: execshfunc (exec.c:4557)
==8358==    by 0x42D8C1: execcmd (exec.c:3373)
==8358== 
==8358== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
==8564== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8564-by-pythonnut-on-???
==8564== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8564-by-pythonnut-on-???
==8564== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8564-by-pythonnut-on-???
==8564== 
==8564== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8564== don't want to do, unless you know exactly what you're doing,
==8564== or are doing some strange experiment):
==8564==   /usr/lib/valgrind/../../bin/vgdb --pid=8564 ...command...
==8564== 
==8564== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8564==   /path/to/gdb ./zsh
==8564== and then give GDB the following command
==8564==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8564
==8564== --pid is optional if only one valgrind process is running
==8564== 
--8563-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8563== 
==8563== HEAP SUMMARY:
==8563==     in use at exit: 3,018,391 bytes in 68,693 blocks
==8563==   total heap usage: 832,015 allocs, 763,322 frees, 57,327,847 bytes allocated
==8563== 
--8564-- Caught __NR_exit; running __libc_freeres()
==8563== Searching for pointers to 68,693 not-freed blocks
--8563--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8563--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8563--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8563--   Scanning root segment: 0x4037000..0x403afff (16384)
--8563--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8563--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8563--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8563--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8563--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8563--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8563--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8563--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8563--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8563--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8563--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8563--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8563--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8563--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8563--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8563--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8563--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8563--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8563--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8563--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8563--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8563--   Scanning root segment: 0x701a000..0x701afff (4096)
--8563--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8563--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8563--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8563--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8563--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8563--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8563--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8563--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
--8564-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8564== 
==8564== HEAP SUMMARY:
==8564==     in use at exit: 3,015,182 bytes in 68,630 blocks
==8564==   total heap usage: 832,162 allocs, 763,532 frees, 57,344,270 bytes allocated
==8564== 
==8564== Searching for pointers to 68,630 not-freed blocks
--8564--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8564--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8564--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8564--   Scanning root segment: 0x4037000..0x403afff (16384)
--8564--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8564--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8564--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8564--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8564--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8564--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8564--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8564--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8564--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8564--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8564--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8564--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8564--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8564--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8564--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8564--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8564--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8564--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8564--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8564--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8564--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8564--   Scanning root segment: 0x701a000..0x701afff (4096)
--8564--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8564--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8564--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8564--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8564--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8564--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8564--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8564--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8563== Checked 4,680,888 bytes
==8563== 
==8563== LEAK SUMMARY:
==8563==    definitely lost: 253 bytes in 4 blocks
==8563==    indirectly lost: 6,756 bytes in 7 blocks
==8563==      possibly lost: 0 bytes in 0 blocks
==8563==    still reachable: 3,011,382 bytes in 68,682 blocks
==8563==         suppressed: 0 bytes in 0 blocks
==8563== Rerun with --leak-check=full to see details of leaked memory
==8563== 
==8563== Use --track-origins=yes to see where uninitialised values come from
==8563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8563== 
==8563== 1 errors in context 1 of 2:
==8563== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8563==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8563==    by 0x488CD0: stringsubst (subst.c:301)
==8563==    by 0x48801B: prefork (subst.c:77)
==8563==    by 0x42B318: execcmd (exec.c:2619)
==8563==    by 0x428CA0: execpline2 (exec.c:1697)
==8563==    by 0x427FD2: execpline (exec.c:1484)
==8563==    by 0x427756: execlist (exec.c:1267)
==8563==    by 0x42717C: execode (exec.c:1073)
==8563==    by 0x431299: runshfunc (exec.c:5040)
==8563==    by 0x430E76: doshfunc (exec.c:4920)
==8563==    by 0x4302FB: execshfunc (exec.c:4557)
==8563==    by 0x42D8C1: execcmd (exec.c:3373)
==8563== 
==8563== 
==8563== 2 errors in context 2 of 2:
==8563== Conditional jump or move depends on uninitialised value(s)
==8563==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8563==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8563==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8563==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8563==    by 0x42D8E9: execcmd (exec.c:3378)
==8563==    by 0x428CA0: execpline2 (exec.c:1697)
==8563==    by 0x427FD2: execpline (exec.c:1484)
==8563==    by 0x42779A: execlist (exec.c:1275)
==8563==    by 0x42717C: execode (exec.c:1073)
==8563==    by 0x431299: runshfunc (exec.c:5040)
==8563==    by 0x430E76: doshfunc (exec.c:4920)
==8563==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8563== 
==8563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8564== Checked 4,676,336 bytes
==8564== 
==8564== LEAK SUMMARY:
==8564==    definitely lost: 253 bytes in 4 blocks
==8564==    indirectly lost: 6,756 bytes in 7 blocks
==8564==      possibly lost: 0 bytes in 0 blocks
==8564==    still reachable: 3,008,173 bytes in 68,619 blocks
==8564==         suppressed: 0 bytes in 0 blocks
==8564== Rerun with --leak-check=full to see details of leaked memory
==8564== 
==8564== Use --track-origins=yes to see where uninitialised values come from
==8564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8564== 
==8564== 1 errors in context 1 of 2:
==8564== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8564==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8564==    by 0x488CD0: stringsubst (subst.c:301)
==8564==    by 0x48801B: prefork (subst.c:77)
==8564==    by 0x42B318: execcmd (exec.c:2619)
==8564==    by 0x428CA0: execpline2 (exec.c:1697)
==8564==    by 0x427FD2: execpline (exec.c:1484)
==8564==    by 0x427756: execlist (exec.c:1267)
==8564==    by 0x42717C: execode (exec.c:1073)
==8564==    by 0x431299: runshfunc (exec.c:5040)
==8564==    by 0x430E76: doshfunc (exec.c:4920)
==8564==    by 0x4302FB: execshfunc (exec.c:4557)
==8564==    by 0x42D8C1: execcmd (exec.c:3373)
==8564== 
==8564== 
==8564== 2 errors in context 2 of 2:
==8564== Conditional jump or move depends on uninitialised value(s)
==8564==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8564==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8564==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8564==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8564==    by 0x42D8E9: execcmd (exec.c:3378)
==8564==    by 0x428CA0: execpline2 (exec.c:1697)
==8564==    by 0x427FD2: execpline (exec.c:1484)
==8564==    by 0x42779A: execlist (exec.c:1275)
==8564==    by 0x42717C: execode (exec.c:1073)
==8564==    by 0x431299: runshfunc (exec.c:5040)
==8564==    by 0x430E76: doshfunc (exec.c:4920)
==8564==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8564== 
==8564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8638-- Caught __NR_exit; running __libc_freeres()
==8638== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8638-by-pythonnut-on-???
==8638== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8638-by-pythonnut-on-???
==8638== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8638-by-pythonnut-on-???
==8638== 
==8638== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8638== don't want to do, unless you know exactly what you're doing,
==8638== or are doing some strange experiment):
==8638==   /usr/lib/valgrind/../../bin/vgdb --pid=8638 ...command...
==8638== 
==8638== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8638==   /path/to/gdb ./zsh
==8638== and then give GDB the following command
==8638==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8638
==8638== --pid is optional if only one valgrind process is running
==8638== 
--8638-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8638== 
==8638== HEAP SUMMARY:
==8638==     in use at exit: 3,015,118 bytes in 68,630 blocks
==8638==   total heap usage: 832,142 allocs, 763,512 frees, 57,342,040 bytes allocated
==8638== 
==8638== Searching for pointers to 68,630 not-freed blocks
--8638--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8638--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8638--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8638--   Scanning root segment: 0x4037000..0x403afff (16384)
--8638--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8638--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8638--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8638--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8638--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8638--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8638--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8638--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8638--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8638--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8638--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8638--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8638--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8638--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8638--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8638--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8638--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8638--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8638--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8638--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8638--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8638--   Scanning root segment: 0x701a000..0x701afff (4096)
--8638--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8638--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8638--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8638--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8638--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8638--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8638--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8638--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8638== Checked 4,676,256 bytes
==8638== 
==8638== LEAK SUMMARY:
==8638==    definitely lost: 253 bytes in 4 blocks
==8638==    indirectly lost: 6,756 bytes in 7 blocks
==8638==      possibly lost: 0 bytes in 0 blocks
==8638==    still reachable: 3,008,109 bytes in 68,619 blocks
==8638==         suppressed: 0 bytes in 0 blocks
==8638== Rerun with --leak-check=full to see details of leaked memory
==8638== 
==8638== Use --track-origins=yes to see where uninitialised values come from
==8638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8638== 
==8638== 1 errors in context 1 of 2:
==8638== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8638==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8638==    by 0x488CD0: stringsubst (subst.c:301)
==8638==    by 0x48801B: prefork (subst.c:77)
==8638==    by 0x42B318: execcmd (exec.c:2619)
==8638==    by 0x428CA0: execpline2 (exec.c:1697)
==8638==    by 0x427FD2: execpline (exec.c:1484)
==8638==    by 0x427756: execlist (exec.c:1267)
==8638==    by 0x42717C: execode (exec.c:1073)
==8638==    by 0x431299: runshfunc (exec.c:5040)
==8638==    by 0x430E76: doshfunc (exec.c:4920)
==8638==    by 0x4302FB: execshfunc (exec.c:4557)
==8638==    by 0x42D8C1: execcmd (exec.c:3373)
==8638== 
==8638== 
==8638== 2 errors in context 2 of 2:
==8638== Conditional jump or move depends on uninitialised value(s)
==8638==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8638==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8638==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8638==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8638==    by 0x42D8E9: execcmd (exec.c:3378)
==8638==    by 0x428CA0: execpline2 (exec.c:1697)
==8638==    by 0x427FD2: execpline (exec.c:1484)
==8638==    by 0x42779A: execlist (exec.c:1275)
==8638==    by 0x42717C: execode (exec.c:1073)
==8638==    by 0x431299: runshfunc (exec.c:5040)
==8638==    by 0x430E76: doshfunc (exec.c:4920)
==8638==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8638== 
==8638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8697== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8697-by-pythonnut-on-???
==8697== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8697-by-pythonnut-on-???
==8697== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8697-by-pythonnut-on-???
==8697== 
==8697== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8697== don't want to do, unless you know exactly what you're doing,
==8697== or are doing some strange experiment):
==8697==   /usr/lib/valgrind/../../bin/vgdb --pid=8697 ...command...
==8697== 
==8697== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8697==   /path/to/gdb ./zsh
==8697== and then give GDB the following command
==8697==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8697
==8697== --pid is optional if only one valgrind process is running
==8697== 
--8697-- Caught __NR_exit; running __libc_freeres()
--8697-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8697== 
==8697== HEAP SUMMARY:
==8697==     in use at exit: 3,015,148 bytes in 68,631 blocks
==8697==   total heap usage: 832,155 allocs, 763,524 frees, 57,344,729 bytes allocated
==8697== 
==8697== Searching for pointers to 68,631 not-freed blocks
--8697--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8697--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8697--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8697--   Scanning root segment: 0x4037000..0x403afff (16384)
--8697--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8697--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8697--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8697--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8697--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8697--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8697--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8697--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8697--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8697--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8697--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8697--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8697--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8697--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8697--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8697--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8697--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8697--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8697--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8697--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8697--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8697--   Scanning root segment: 0x701a000..0x701afff (4096)
--8697--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8697--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8697--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8697--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8697--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8697--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8697--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8697--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8697== Checked 4,675,768 bytes
==8697== 
==8697== LEAK SUMMARY:
==8697==    definitely lost: 253 bytes in 4 blocks
==8697==    indirectly lost: 6,756 bytes in 7 blocks
==8697==      possibly lost: 0 bytes in 0 blocks
==8697==    still reachable: 3,008,139 bytes in 68,620 blocks
==8697==         suppressed: 0 bytes in 0 blocks
==8697== Rerun with --leak-check=full to see details of leaked memory
==8697== 
==8697== Use --track-origins=yes to see where uninitialised values come from
==8697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8697== 
==8697== 1 errors in context 1 of 2:
==8697== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8697==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8697==    by 0x488CD0: stringsubst (subst.c:301)
==8697==    by 0x48801B: prefork (subst.c:77)
==8697==    by 0x42B318: execcmd (exec.c:2619)
==8697==    by 0x428CA0: execpline2 (exec.c:1697)
==8697==    by 0x427FD2: execpline (exec.c:1484)
==8697==    by 0x427756: execlist (exec.c:1267)
==8697==    by 0x42717C: execode (exec.c:1073)
==8697==    by 0x431299: runshfunc (exec.c:5040)
==8697==    by 0x430E76: doshfunc (exec.c:4920)
==8697==    by 0x4302FB: execshfunc (exec.c:4557)
==8697==    by 0x42D8C1: execcmd (exec.c:3373)
==8697== 
==8697== 
==8697== 2 errors in context 2 of 2:
==8697== Conditional jump or move depends on uninitialised value(s)
==8697==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8697==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8697==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8697==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8697==    by 0x42D8E9: execcmd (exec.c:3378)
==8697==    by 0x428CA0: execpline2 (exec.c:1697)
==8697==    by 0x427FD2: execpline (exec.c:1484)
==8697==    by 0x42779A: execlist (exec.c:1275)
==8697==    by 0x42717C: execode (exec.c:1073)
==8697==    by 0x431299: runshfunc (exec.c:5040)
==8697==    by 0x430E76: doshfunc (exec.c:4920)
==8697==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8697== 
==8697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--8698-- Caught __NR_exit; running __libc_freeres()
==8698== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-8698-by-pythonnut-on-???
==8698== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-8698-by-pythonnut-on-???
==8698== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-8698-by-pythonnut-on-???
==8698== 
==8698== TO CONTROL THIS PROCESS USING vgdb (which you probably
==8698== don't want to do, unless you know exactly what you're doing,
==8698== or are doing some strange experiment):
==8698==   /usr/lib/valgrind/../../bin/vgdb --pid=8698 ...command...
==8698== 
==8698== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==8698==   /path/to/gdb ./zsh
==8698== and then give GDB the following command
==8698==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=8698
==8698== --pid is optional if only one valgrind process is running
==8698== 
--8698-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==8698== 
==8698== HEAP SUMMARY:
==8698==     in use at exit: 3,014,858 bytes in 68,622 blocks
==8698==   total heap usage: 832,337 allocs, 763,715 frees, 57,364,228 bytes allocated
==8698== 
==8698== Searching for pointers to 68,622 not-freed blocks
--8698--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--8698--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--8698--   Scanning root segment: 0x4022000..0x4026fff (20480)
--8698--   Scanning root segment: 0x4049000..0x404cfff (16384)
--8698--   Scanning root segment: 0x4222000..0x4222fff (4096)
--8698--   Scanning root segment: 0x4223000..0x4223fff (4096)
--8698--   Scanning root segment: 0x4224000..0x4224fff (4096)
--8698--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--8698--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--8698--   Scanning root segment: 0x5041000..0x5041fff (4096)
--8698--   Scanning root segment: 0x5245000..0x5245fff (4096)
--8698--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--8698--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--8698--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--8698--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--8698--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--8698--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--8698--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--8698--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--8698--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--8698--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--8698--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--8698--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--8698--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--8698--   Scanning root segment: 0x701a000..0x701afff (4096)
--8698--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--8698--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--8698--   Scanning root segment: 0xae51000..0xae52fff (8192)
--8698--   Scanning root segment: 0xb054000..0xb054fff (4096)
--8698--   Scanning root segment: 0xb268000..0xb268fff (4096)
--8698--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--8698--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--8698--   Scanning root segment: 0xffeff1000..0xfff000fff (65536)
==8698== Checked 4,659,864 bytes
==8698== 
==8698== LEAK SUMMARY:
==8698==    definitely lost: 253 bytes in 4 blocks
==8698==    indirectly lost: 6,756 bytes in 7 blocks
==8698==      possibly lost: 0 bytes in 0 blocks
==8698==    still reachable: 3,007,849 bytes in 68,611 blocks
==8698==         suppressed: 0 bytes in 0 blocks
==8698== Rerun with --leak-check=full to see details of leaked memory
==8698== 
==8698== Use --track-origins=yes to see where uninitialised values come from
==8698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==8698== 
==8698== 1 errors in context 1 of 2:
==8698== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==8698==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==8698==    by 0x488CD0: stringsubst (subst.c:301)
==8698==    by 0x48801B: prefork (subst.c:77)
==8698==    by 0x42B318: execcmd (exec.c:2619)
==8698==    by 0x428CA0: execpline2 (exec.c:1697)
==8698==    by 0x427FD2: execpline (exec.c:1484)
==8698==    by 0x427756: execlist (exec.c:1267)
==8698==    by 0x42717C: execode (exec.c:1073)
==8698==    by 0x431299: runshfunc (exec.c:5040)
==8698==    by 0x430E76: doshfunc (exec.c:4920)
==8698==    by 0x4302FB: execshfunc (exec.c:4557)
==8698==    by 0x42D8C1: execcmd (exec.c:3373)
==8698== 
==8698== 
==8698== 2 errors in context 2 of 2:
==8698== Conditional jump or move depends on uninitialised value(s)
==8698==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==8698==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==8698==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==8698==    by 0x40EFC2: execbuiltin (builtin.c:450)
==8698==    by 0x42D8E9: execcmd (exec.c:3378)
==8698==    by 0x428CA0: execpline2 (exec.c:1697)
==8698==    by 0x427FD2: execpline (exec.c:1484)
==8698==    by 0x42779A: execlist (exec.c:1275)
==8698==    by 0x42717C: execode (exec.c:1073)
==8698==    by 0x431299: runshfunc (exec.c:5040)
==8698==    by 0x430E76: doshfunc (exec.c:4920)
==8698==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==8698== 
==8698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/computil.so
--7806--    svma 0x00000026c0, avma 0x000ba726c0
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dcc0 __GI_strncmp
--7806--     new: 0x05a3d2e0 (__GI_strncmp        ) R-> (2011.0) 0x04c2dc50 strncmp
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2cfc0 __GI_strchr
--7806--     new: 0x05a3b1f0 (__GI_strchr         ) R-> (2002.0) 0x04c2d080 index
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d8c0 __GI_strncpy
--7806--     new: 0x05a4b610 (__GI_strncpy        ) R-> (2009.0) 0x04c2d790 strncpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
==9244== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9244-by-pythonnut-on-???
==9244== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9244-by-pythonnut-on-???
==9244== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9244-by-pythonnut-on-???
==9244== 
==9244== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9244== don't want to do, unless you know exactly what you're doing,
==9244== or are doing some strange experiment):
==9244==   /usr/lib/valgrind/../../bin/vgdb --pid=9244 ...command...
==9244== 
==9244== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9244==   /path/to/gdb ./zsh
==9244== and then give GDB the following command
==9244==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9244
==9244== --pid is optional if only one valgrind process is running
==9244== 
--9244-- Caught __NR_exit; running __libc_freeres()
--9244-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9244== 
==9244== HEAP SUMMARY:
==9244==     in use at exit: 3,144,593 bytes in 69,587 blocks
==9244==   total heap usage: 924,938 allocs, 855,351 frees, 65,162,922 bytes allocated
==9244== 
==9244== Searching for pointers to 69,587 not-freed blocks
--9244--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9244--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9244--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9244--   Scanning root segment: 0x4037000..0x403afff (16384)
--9244--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9244--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9244--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9244--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9244--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9244--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9244--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9244--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9244--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9244--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9244--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9244--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9244--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9244--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9244--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9244--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9244--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9244--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9244--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9244--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9244--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9244--   Scanning root segment: 0x701a000..0x701afff (4096)
--9244--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9244--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9244--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9244--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9244--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9244--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9244--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9244--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9244--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9244== Checked 4,820,928 bytes
==9244== 
==9244== LEAK SUMMARY:
==9244==    definitely lost: 1,533 bytes in 8 blocks
==9244==    indirectly lost: 6,756 bytes in 7 blocks
==9244==      possibly lost: 0 bytes in 0 blocks
==9244==    still reachable: 3,136,304 bytes in 69,572 blocks
==9244==         suppressed: 0 bytes in 0 blocks
==9244== Rerun with --leak-check=full to see details of leaked memory
==9244== 
==9244== Use --track-origins=yes to see where uninitialised values come from
==9244== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9244== 
==9244== 1 errors in context 1 of 2:
==9244== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9244==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9244==    by 0x488CD0: stringsubst (subst.c:301)
==9244==    by 0x48801B: prefork (subst.c:77)
==9244==    by 0x42B318: execcmd (exec.c:2619)
==9244==    by 0x428CA0: execpline2 (exec.c:1697)
==9244==    by 0x427FD2: execpline (exec.c:1484)
==9244==    by 0x427756: execlist (exec.c:1267)
==9244==    by 0x42717C: execode (exec.c:1073)
==9244==    by 0x431299: runshfunc (exec.c:5040)
==9244==    by 0x430E76: doshfunc (exec.c:4920)
==9244==    by 0x4302FB: execshfunc (exec.c:4557)
==9244==    by 0x42D8C1: execcmd (exec.c:3373)
==9244== 
==9244== 
==9244== 2 errors in context 2 of 2:
==9244== Conditional jump or move depends on uninitialised value(s)
==9244==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9244==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9244==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9244==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9244==    by 0x42D8E9: execcmd (exec.c:3378)
==9244==    by 0x428CA0: execpline2 (exec.c:1697)
==9244==    by 0x427FD2: execpline (exec.c:1484)
==9244==    by 0x42779A: execlist (exec.c:1275)
==9244==    by 0x42717C: execode (exec.c:1073)
==9244==    by 0x431299: runshfunc (exec.c:5040)
==9244==    by 0x430E76: doshfunc (exec.c:4920)
==9244==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9244== 
==9244== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9250== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9250-by-pythonnut-on-???
==9250== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9250-by-pythonnut-on-???
==9250== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9250-by-pythonnut-on-???
==9250== 
==9250== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9250== don't want to do, unless you know exactly what you're doing,
==9250== or are doing some strange experiment):
==9250==   /usr/lib/valgrind/../../bin/vgdb --pid=9250 ...command...
==9250== 
==9250== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9250==   /path/to/gdb ./zsh
==9250== and then give GDB the following command
==9250==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9250
==9250== --pid is optional if only one valgrind process is running
==9250== 
==9249== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9249-by-pythonnut-on-???
==9249== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9249-by-pythonnut-on-???
==9249== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9249-by-pythonnut-on-???
==9249== 
==9249== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9249== don't want to do, unless you know exactly what you're doing,
==9249== or are doing some strange experiment):
==9249==   /usr/lib/valgrind/../../bin/vgdb --pid=9249 ...command...
==9249== 
==9249== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9249==   /path/to/gdb ./zsh
==9249== and then give GDB the following command
==9249==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9249
==9249== --pid is optional if only one valgrind process is running
==9249== 
--9250-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--9250-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9250== 
==9250== HEAP SUMMARY:
==9250==     in use at exit: 3,118,133 bytes in 69,054 blocks
==9250==   total heap usage: 925,536 allocs, 856,482 frees, 65,307,509 bytes allocated
==9250== 
==9250== Searching for pointers to 69,054 not-freed blocks
--9250--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9250--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9250--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9250--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9250--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9250--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9250--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9250--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9250--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9250--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9250--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9250--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9250--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9250--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9250--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9250--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9250--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9250--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9250--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9250--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9250--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9250--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9250--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9250--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9250--   Scanning root segment: 0x701a000..0x701afff (4096)
--9250--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9250--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9250--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9250--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9250--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9250--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9250--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9250--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9250--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9250== Checked 4,767,176 bytes
==9250== 
==9250== LEAK SUMMARY:
==9250==    definitely lost: 1,533 bytes in 8 blocks
==9250==    indirectly lost: 6,756 bytes in 7 blocks
==9250==      possibly lost: 0 bytes in 0 blocks
==9250==    still reachable: 3,109,844 bytes in 69,039 blocks
==9250==         suppressed: 0 bytes in 0 blocks
==9250== Rerun with --leak-check=full to see details of leaked memory
==9250== 
==9250== Use --track-origins=yes to see where uninitialised values come from
==9250== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9250== 
==9250== 1 errors in context 1 of 2:
==9250== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9250==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9250==    by 0x488CD0: stringsubst (subst.c:301)
==9250==    by 0x48801B: prefork (subst.c:77)
==9250==    by 0x42B318: execcmd (exec.c:2619)
==9250==    by 0x428CA0: execpline2 (exec.c:1697)
==9250==    by 0x427FD2: execpline (exec.c:1484)
==9250==    by 0x427756: execlist (exec.c:1267)
==9250==    by 0x42717C: execode (exec.c:1073)
==9250==    by 0x431299: runshfunc (exec.c:5040)
==9250==    by 0x430E76: doshfunc (exec.c:4920)
==9250==    by 0x4302FB: execshfunc (exec.c:4557)
==9250==    by 0x42D8C1: execcmd (exec.c:3373)
==9250== 
==9250== 
==9250== 2 errors in context 2 of 2:
==9250== Conditional jump or move depends on uninitialised value(s)
==9250==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9250==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9250==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9250==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9250==    by 0x42D8E9: execcmd (exec.c:3378)
==9250==    by 0x428CA0: execpline2 (exec.c:1697)
==9250==    by 0x427FD2: execpline (exec.c:1484)
==9250==    by 0x42779A: execlist (exec.c:1275)
==9250==    by 0x42717C: execode (exec.c:1073)
==9250==    by 0x431299: runshfunc (exec.c:5040)
==9250==    by 0x430E76: doshfunc (exec.c:4920)
==9250==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9250== 
==9250== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9249-- Caught __NR_exit; running __libc_freeres()
--9249-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9249== 
==9249== HEAP SUMMARY:
==9249==     in use at exit: 3,118,069 bytes in 69,051 blocks
==9249==   total heap usage: 925,534 allocs, 856,483 frees, 65,307,268 bytes allocated
==9249== 
==9249== Searching for pointers to 69,051 not-freed blocks
--9249--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9249--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9249--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9249--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9249--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9249--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9249--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9249--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9249--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9249--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9249--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9249--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9249--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9249--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9249--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9249--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9249--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9249--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9249--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9249--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9249--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9249--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9249--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9249--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9249--   Scanning root segment: 0x701a000..0x701afff (4096)
--9249--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9249--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9249--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9249--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9249--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9249--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9249--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9249--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9249--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9249== Checked 4,766,488 bytes
==9249== 
==9249== LEAK SUMMARY:
==9249==    definitely lost: 1,533 bytes in 8 blocks
==9249==    indirectly lost: 6,756 bytes in 7 blocks
==9249==      possibly lost: 0 bytes in 0 blocks
==9249==    still reachable: 3,109,780 bytes in 69,036 blocks
==9249==         suppressed: 0 bytes in 0 blocks
==9249== Rerun with --leak-check=full to see details of leaked memory
==9249== 
==9249== Use --track-origins=yes to see where uninitialised values come from
==9249== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9249== 
==9249== 1 errors in context 1 of 2:
==9249== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9249==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9249==    by 0x488CD0: stringsubst (subst.c:301)
==9249==    by 0x48801B: prefork (subst.c:77)
==9249==    by 0x42B318: execcmd (exec.c:2619)
==9249==    by 0x428CA0: execpline2 (exec.c:1697)
==9249==    by 0x427FD2: execpline (exec.c:1484)
==9249==    by 0x427756: execlist (exec.c:1267)
==9249==    by 0x42717C: execode (exec.c:1073)
==9249==    by 0x431299: runshfunc (exec.c:5040)
==9249==    by 0x430E76: doshfunc (exec.c:4920)
==9249==    by 0x4302FB: execshfunc (exec.c:4557)
==9249==    by 0x42D8C1: execcmd (exec.c:3373)
==9249== 
==9249== 
==9249== 2 errors in context 2 of 2:
==9249== Conditional jump or move depends on uninitialised value(s)
==9249==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9249==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9249==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9249==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9249==    by 0x42D8E9: execcmd (exec.c:3378)
==9249==    by 0x428CA0: execpline2 (exec.c:1697)
==9249==    by 0x427FD2: execpline (exec.c:1484)
==9249==    by 0x42779A: execlist (exec.c:1275)
==9249==    by 0x42717C: execode (exec.c:1073)
==9249==    by 0x431299: runshfunc (exec.c:5040)
==9249==    by 0x430E76: doshfunc (exec.c:4920)
==9249==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9249== 
==9249== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9252-- Caught __NR_exit; running __libc_freeres()
==9252== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9252-by-pythonnut-on-???
==9252== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9252-by-pythonnut-on-???
==9252== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9252-by-pythonnut-on-???
==9252== 
==9252== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9252== don't want to do, unless you know exactly what you're doing,
==9252== or are doing some strange experiment):
==9252==   /usr/lib/valgrind/../../bin/vgdb --pid=9252 ...command...
==9252== 
==9252== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9252==   /path/to/gdb ./zsh
==9252== and then give GDB the following command
==9252==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9252
==9252== --pid is optional if only one valgrind process is running
==9252== 
--9252-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9252== 
==9252== HEAP SUMMARY:
==9252==     in use at exit: 3,118,076 bytes in 69,051 blocks
==9252==   total heap usage: 925,549 allocs, 856,498 frees, 65,312,266 bytes allocated
==9252== 
==9252== Searching for pointers to 69,051 not-freed blocks
--9252--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9252--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9252--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9252--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9252--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9252--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9252--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9252--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9252--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9252--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9252--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9252--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9252--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9252--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9252--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9252--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9252--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9252--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9252--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9252--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9252--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9252--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9252--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9252--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9252--   Scanning root segment: 0x701a000..0x701afff (4096)
--9252--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9252--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9252--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9252--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9252--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9252--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9252--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9252--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9252--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9252== Checked 4,766,640 bytes
==9252== 
==9252== LEAK SUMMARY:
==9252==    definitely lost: 1,533 bytes in 8 blocks
==9252==    indirectly lost: 6,756 bytes in 7 blocks
==9252==      possibly lost: 0 bytes in 0 blocks
==9252==    still reachable: 3,109,787 bytes in 69,036 blocks
==9252==         suppressed: 0 bytes in 0 blocks
==9252== Rerun with --leak-check=full to see details of leaked memory
==9252== 
==9252== Use --track-origins=yes to see where uninitialised values come from
==9252== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9252== 
==9252== 1 errors in context 1 of 2:
==9252== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9252==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9252==    by 0x488CD0: stringsubst (subst.c:301)
==9252==    by 0x48801B: prefork (subst.c:77)
==9252==    by 0x42B318: execcmd (exec.c:2619)
==9252==    by 0x428CA0: execpline2 (exec.c:1697)
==9252==    by 0x427FD2: execpline (exec.c:1484)
==9252==    by 0x427756: execlist (exec.c:1267)
==9252==    by 0x42717C: execode (exec.c:1073)
==9252==    by 0x431299: runshfunc (exec.c:5040)
==9252==    by 0x430E76: doshfunc (exec.c:4920)
==9252==    by 0x4302FB: execshfunc (exec.c:4557)
==9252==    by 0x42D8C1: execcmd (exec.c:3373)
==9252== 
==9252== 
==9252== 2 errors in context 2 of 2:
==9252== Conditional jump or move depends on uninitialised value(s)
==9252==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9252==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9252==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9252==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9252==    by 0x42D8E9: execcmd (exec.c:3378)
==9252==    by 0x428CA0: execpline2 (exec.c:1697)
==9252==    by 0x427FD2: execpline (exec.c:1484)
==9252==    by 0x42779A: execlist (exec.c:1275)
==9252==    by 0x42717C: execode (exec.c:1073)
==9252==    by 0x431299: runshfunc (exec.c:5040)
==9252==    by 0x430E76: doshfunc (exec.c:4920)
==9252==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9252== 
==9252== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9253-- Caught __NR_exit; running __libc_freeres()
==9253== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9253-by-pythonnut-on-???
==9253== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9253-by-pythonnut-on-???
==9253== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9253-by-pythonnut-on-???
==9253== 
==9253== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9253== don't want to do, unless you know exactly what you're doing,
==9253== or are doing some strange experiment):
==9253==   /usr/lib/valgrind/../../bin/vgdb --pid=9253 ...command...
==9253== 
==9253== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9253==   /path/to/gdb ./zsh
==9253== and then give GDB the following command
==9253==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9253
==9253== --pid is optional if only one valgrind process is running
==9253== 
--9253-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9253== 
==9253== HEAP SUMMARY:
==9253==     in use at exit: 3,118,172 bytes in 69,051 blocks
==9253==   total heap usage: 925,565 allocs, 856,514 frees, 65,317,053 bytes allocated
==9253== 
==9253== Searching for pointers to 69,051 not-freed blocks
--9253--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9253--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9253--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9253--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9253--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9253--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9253--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9253--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9253--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9253--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9253--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9253--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9253--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9253--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9253--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9253--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9253--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9253--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9253--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9253--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9253--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9253--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9253--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9253--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9253--   Scanning root segment: 0x701a000..0x701afff (4096)
--9253--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9253--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9253--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9253--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9253--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9253--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9253--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9253--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9253--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9253== Checked 4,765,952 bytes
==9253== 
==9253== LEAK SUMMARY:
==9253==    definitely lost: 1,533 bytes in 8 blocks
==9253==    indirectly lost: 6,756 bytes in 7 blocks
==9253==      possibly lost: 0 bytes in 0 blocks
==9253==    still reachable: 3,109,883 bytes in 69,036 blocks
==9253==         suppressed: 0 bytes in 0 blocks
==9253== Rerun with --leak-check=full to see details of leaked memory
==9253== 
==9253== Use --track-origins=yes to see where uninitialised values come from
==9253== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9253== 
==9253== 1 errors in context 1 of 2:
==9253== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9253==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9253==    by 0x488CD0: stringsubst (subst.c:301)
==9253==    by 0x48801B: prefork (subst.c:77)
==9253==    by 0x42B318: execcmd (exec.c:2619)
==9253==    by 0x428CA0: execpline2 (exec.c:1697)
==9253==    by 0x427FD2: execpline (exec.c:1484)
==9253==    by 0x427756: execlist (exec.c:1267)
==9253==    by 0x42717C: execode (exec.c:1073)
==9253==    by 0x431299: runshfunc (exec.c:5040)
==9253==    by 0x430E76: doshfunc (exec.c:4920)
==9253==    by 0x4302FB: execshfunc (exec.c:4557)
==9253==    by 0x42D8C1: execcmd (exec.c:3373)
==9253== 
==9253== 
==9253== 2 errors in context 2 of 2:
==9253== Conditional jump or move depends on uninitialised value(s)
==9253==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9253==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9253==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9253==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9253==    by 0x42D8E9: execcmd (exec.c:3378)
==9253==    by 0x428CA0: execpline2 (exec.c:1697)
==9253==    by 0x427FD2: execpline (exec.c:1484)
==9253==    by 0x42779A: execlist (exec.c:1275)
==9253==    by 0x42717C: execode (exec.c:1073)
==9253==    by 0x431299: runshfunc (exec.c:5040)
==9253==    by 0x430E76: doshfunc (exec.c:4920)
==9253==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9253== 
==9253== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9254== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9254-by-pythonnut-on-???
==9254== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9254-by-pythonnut-on-???
==9254== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9254-by-pythonnut-on-???
==9254== 
==9254== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9254== don't want to do, unless you know exactly what you're doing,
==9254== or are doing some strange experiment):
==9254==   /usr/lib/valgrind/../../bin/vgdb --pid=9254 ...command...
==9254== 
==9254== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9254==   /path/to/gdb ./zsh
==9254== and then give GDB the following command
==9254==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9254
==9254== --pid is optional if only one valgrind process is running
==9254== 
--9254-- Caught __NR_exit; running __libc_freeres()
--9254-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9254== 
==9254== HEAP SUMMARY:
==9254==     in use at exit: 3,118,418 bytes in 69,057 blocks
==9254==   total heap usage: 925,613 allocs, 856,556 frees, 65,326,077 bytes allocated
==9254== 
==9254== Searching for pointers to 69,057 not-freed blocks
--9254--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9254--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9254--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9254--   Scanning root segment: 0x4037000..0x403afff (16384)
--9254--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9254--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9254--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9254--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9254--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9254--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9254--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9254--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9254--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9254--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9254--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9254--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9254--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9254--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9254--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9254--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9254--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9254--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9254--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9254--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9254--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9254--   Scanning root segment: 0x701a000..0x701afff (4096)
--9254--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9254--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9254--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9254--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9254--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9254--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9254--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9254--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9254--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9254== Checked 4,782,512 bytes
==9254== 
==9254== LEAK SUMMARY:
==9254==    definitely lost: 1,533 bytes in 8 blocks
==9254==    indirectly lost: 6,756 bytes in 7 blocks
==9254==      possibly lost: 0 bytes in 0 blocks
==9254==    still reachable: 3,110,129 bytes in 69,042 blocks
==9254==         suppressed: 0 bytes in 0 blocks
==9254== Rerun with --leak-check=full to see details of leaked memory
==9254== 
==9254== Use --track-origins=yes to see where uninitialised values come from
==9254== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9254== 
==9254== 1 errors in context 1 of 2:
==9254== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9254==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9254==    by 0x488CD0: stringsubst (subst.c:301)
==9254==    by 0x48801B: prefork (subst.c:77)
==9254==    by 0x42B318: execcmd (exec.c:2619)
==9254==    by 0x428CA0: execpline2 (exec.c:1697)
==9254==    by 0x427FD2: execpline (exec.c:1484)
==9254==    by 0x427756: execlist (exec.c:1267)
==9254==    by 0x42717C: execode (exec.c:1073)
==9254==    by 0x431299: runshfunc (exec.c:5040)
==9254==    by 0x430E76: doshfunc (exec.c:4920)
==9254==    by 0x4302FB: execshfunc (exec.c:4557)
==9254==    by 0x42D8C1: execcmd (exec.c:3373)
==9254== 
==9254== 
==9254== 2 errors in context 2 of 2:
==9254== Conditional jump or move depends on uninitialised value(s)
==9254==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9254==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9254==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9254==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9254==    by 0x42D8E9: execcmd (exec.c:3378)
==9254==    by 0x428CA0: execpline2 (exec.c:1697)
==9254==    by 0x427FD2: execpline (exec.c:1484)
==9254==    by 0x42779A: execlist (exec.c:1275)
==9254==    by 0x42717C: execode (exec.c:1073)
==9254==    by 0x431299: runshfunc (exec.c:5040)
==9254==    by 0x430E76: doshfunc (exec.c:4920)
==9254==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9254== 
==9254== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9255-- Caught __NR_exit; running __libc_freeres()
==9255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9255-by-pythonnut-on-???
==9255== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9255-by-pythonnut-on-???
==9255== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9255-by-pythonnut-on-???
==9255== 
==9255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9255== don't want to do, unless you know exactly what you're doing,
==9255== or are doing some strange experiment):
==9255==   /usr/lib/valgrind/../../bin/vgdb --pid=9255 ...command...
==9255== 
==9255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9255==   /path/to/gdb ./zsh
==9255== and then give GDB the following command
==9255==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9255
==9255== --pid is optional if only one valgrind process is running
==9255== 
--9255-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9255== 
==9255== HEAP SUMMARY:
==9255==     in use at exit: 3,118,354 bytes in 69,057 blocks
==9255==   total heap usage: 925,593 allocs, 856,536 frees, 65,323,847 bytes allocated
==9255== 
==9255== Searching for pointers to 69,057 not-freed blocks
--9255--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9255--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9255--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9255--   Scanning root segment: 0x4037000..0x403afff (16384)
--9255--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9255--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9255--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9255--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9255--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9255--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9255--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9255--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9255--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9255--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9255--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9255--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9255--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9255--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9255--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9255--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9255--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9255--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9255--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9255--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9255--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9255--   Scanning root segment: 0x701a000..0x701afff (4096)
--9255--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9255--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9255--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9255--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9255--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9255--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9255--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9255--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9255--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9255== Checked 4,782,432 bytes
==9255== 
==9255== LEAK SUMMARY:
==9255==    definitely lost: 1,533 bytes in 8 blocks
==9255==    indirectly lost: 6,756 bytes in 7 blocks
==9255==      possibly lost: 0 bytes in 0 blocks
==9255==    still reachable: 3,110,065 bytes in 69,042 blocks
==9255==         suppressed: 0 bytes in 0 blocks
==9255== Rerun with --leak-check=full to see details of leaked memory
==9255== 
==9255== Use --track-origins=yes to see where uninitialised values come from
==9255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9255== 
==9255== 1 errors in context 1 of 2:
==9255== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9255==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9255==    by 0x488CD0: stringsubst (subst.c:301)
==9255==    by 0x48801B: prefork (subst.c:77)
==9255==    by 0x42B318: execcmd (exec.c:2619)
==9255==    by 0x428CA0: execpline2 (exec.c:1697)
==9255==    by 0x427FD2: execpline (exec.c:1484)
==9255==    by 0x427756: execlist (exec.c:1267)
==9255==    by 0x42717C: execode (exec.c:1073)
==9255==    by 0x431299: runshfunc (exec.c:5040)
==9255==    by 0x430E76: doshfunc (exec.c:4920)
==9255==    by 0x4302FB: execshfunc (exec.c:4557)
==9255==    by 0x42D8C1: execcmd (exec.c:3373)
==9255== 
==9255== 
==9255== 2 errors in context 2 of 2:
==9255== Conditional jump or move depends on uninitialised value(s)
==9255==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9255==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9255==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9255==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9255==    by 0x42D8E9: execcmd (exec.c:3378)
==9255==    by 0x428CA0: execpline2 (exec.c:1697)
==9255==    by 0x427FD2: execpline (exec.c:1484)
==9255==    by 0x42779A: execlist (exec.c:1275)
==9255==    by 0x42717C: execode (exec.c:1073)
==9255==    by 0x431299: runshfunc (exec.c:5040)
==9255==    by 0x430E76: doshfunc (exec.c:4920)
==9255==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9255== 
==9255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9258-by-pythonnut-on-???
==9258== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9258-by-pythonnut-on-???
==9258== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9258-by-pythonnut-on-???
==9258== 
==9258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9258== don't want to do, unless you know exactly what you're doing,
==9258== or are doing some strange experiment):
==9258==   /usr/lib/valgrind/../../bin/vgdb --pid=9258 ...command...
==9258== 
==9258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9258==   /path/to/gdb ./zsh
==9258== and then give GDB the following command
==9258==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9258
==9258== --pid is optional if only one valgrind process is running
==9258== 
--9258-- Caught __NR_exit; running __libc_freeres()
--9258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9258== 
==9258== HEAP SUMMARY:
==9258==     in use at exit: 3,118,384 bytes in 69,058 blocks
==9258==   total heap usage: 925,606 allocs, 856,548 frees, 65,326,536 bytes allocated
==9258== 
==9258== Searching for pointers to 69,058 not-freed blocks
--9258--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9258--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9258--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9258--   Scanning root segment: 0x4037000..0x403afff (16384)
--9258--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9258--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9258--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9258--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9258--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9258--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9258--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9258--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9258--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9258--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9258--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9258--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9258--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9258--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9258--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9258--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9258--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9258--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9258--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9258--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9258--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9258--   Scanning root segment: 0x701a000..0x701afff (4096)
--9258--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9258--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9258--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9258--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9258--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9258--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9258--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9258--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9258--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9258== Checked 4,781,944 bytes
==9258== 
==9258== LEAK SUMMARY:
==9258==    definitely lost: 1,533 bytes in 8 blocks
==9258==    indirectly lost: 6,756 bytes in 7 blocks
==9258==      possibly lost: 0 bytes in 0 blocks
==9258==    still reachable: 3,110,095 bytes in 69,043 blocks
==9258==         suppressed: 0 bytes in 0 blocks
==9258== Rerun with --leak-check=full to see details of leaked memory
==9258== 
==9258== Use --track-origins=yes to see where uninitialised values come from
==9258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9258== 
==9258== 1 errors in context 1 of 2:
==9258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9258==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9258==    by 0x488CD0: stringsubst (subst.c:301)
==9258==    by 0x48801B: prefork (subst.c:77)
==9258==    by 0x42B318: execcmd (exec.c:2619)
==9258==    by 0x428CA0: execpline2 (exec.c:1697)
==9258==    by 0x427FD2: execpline (exec.c:1484)
==9258==    by 0x427756: execlist (exec.c:1267)
==9258==    by 0x42717C: execode (exec.c:1073)
==9258==    by 0x431299: runshfunc (exec.c:5040)
==9258==    by 0x430E76: doshfunc (exec.c:4920)
==9258==    by 0x4302FB: execshfunc (exec.c:4557)
==9258==    by 0x42D8C1: execcmd (exec.c:3373)
==9258== 
==9258== 
==9258== 2 errors in context 2 of 2:
==9258== Conditional jump or move depends on uninitialised value(s)
==9258==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9258==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9258==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9258==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9258==    by 0x42D8E9: execcmd (exec.c:3378)
==9258==    by 0x428CA0: execpline2 (exec.c:1697)
==9258==    by 0x427FD2: execpline (exec.c:1484)
==9258==    by 0x42779A: execlist (exec.c:1275)
==9258==    by 0x42717C: execode (exec.c:1073)
==9258==    by 0x431299: runshfunc (exec.c:5040)
==9258==    by 0x430E76: doshfunc (exec.c:4920)
==9258==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9258== 
==9258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9259-- Caught __NR_exit; running __libc_freeres()
==9259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9259-by-pythonnut-on-???
==9259== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9259-by-pythonnut-on-???
==9259== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9259-by-pythonnut-on-???
==9259== 
==9259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9259== don't want to do, unless you know exactly what you're doing,
==9259== or are doing some strange experiment):
==9259==   /usr/lib/valgrind/../../bin/vgdb --pid=9259 ...command...
==9259== 
==9259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9259==   /path/to/gdb ./zsh
==9259== and then give GDB the following command
==9259==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9259
==9259== --pid is optional if only one valgrind process is running
==9259== 
--9259-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9259== 
==9259== HEAP SUMMARY:
==9259==     in use at exit: 3,122,304 bytes in 69,069 blocks
==9259==   total heap usage: 927,059 allocs, 857,990 frees, 65,417,903 bytes allocated
==9259== 
==9259== Searching for pointers to 69,069 not-freed blocks
--9259--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9259--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9259--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9259--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9259--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9259--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9259--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9259--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9259--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9259--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9259--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9259--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9259--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9259--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9259--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9259--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9259--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9259--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9259--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9259--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9259--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9259--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9259--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9259--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9259--   Scanning root segment: 0x701a000..0x701afff (4096)
--9259--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9259--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9259--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9259--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9259--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9259--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9259--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9259--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9259--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9259== Checked 4,771,064 bytes
==9259== 
==9259== LEAK SUMMARY:
==9259==    definitely lost: 1,533 bytes in 8 blocks
==9259==    indirectly lost: 6,756 bytes in 7 blocks
==9259==      possibly lost: 0 bytes in 0 blocks
==9259==    still reachable: 3,114,015 bytes in 69,054 blocks
==9259==         suppressed: 0 bytes in 0 blocks
==9259== Rerun with --leak-check=full to see details of leaked memory
==9259== 
==9259== Use --track-origins=yes to see where uninitialised values come from
==9259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9259== 
==9259== 1 errors in context 1 of 2:
==9259== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9259==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9259==    by 0x488CD0: stringsubst (subst.c:301)
==9259==    by 0x48801B: prefork (subst.c:77)
==9259==    by 0x42B318: execcmd (exec.c:2619)
==9259==    by 0x428CA0: execpline2 (exec.c:1697)
==9259==    by 0x427FD2: execpline (exec.c:1484)
==9259==    by 0x427756: execlist (exec.c:1267)
==9259==    by 0x42717C: execode (exec.c:1073)
==9259==    by 0x431299: runshfunc (exec.c:5040)
==9259==    by 0x430E76: doshfunc (exec.c:4920)
==9259==    by 0x4302FB: execshfunc (exec.c:4557)
==9259==    by 0x42D8C1: execcmd (exec.c:3373)
==9259== 
==9259== 
==9259== 2 errors in context 2 of 2:
==9259== Conditional jump or move depends on uninitialised value(s)
==9259==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9259==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9259==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9259==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9259==    by 0x42D8E9: execcmd (exec.c:3378)
==9259==    by 0x428CA0: execpline2 (exec.c:1697)
==9259==    by 0x427FD2: execpline (exec.c:1484)
==9259==    by 0x42779A: execlist (exec.c:1275)
==9259==    by 0x42717C: execode (exec.c:1073)
==9259==    by 0x431299: runshfunc (exec.c:5040)
==9259==    by 0x430E76: doshfunc (exec.c:4920)
==9259==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9259== 
==9259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9260-by-pythonnut-on-???
==9260== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9260-by-pythonnut-on-???
==9260== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9260-by-pythonnut-on-???
==9260== 
==9260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9260== don't want to do, unless you know exactly what you're doing,
==9260== or are doing some strange experiment):
==9260==   /usr/lib/valgrind/../../bin/vgdb --pid=9260 ...command...
==9260== 
==9260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9260==   /path/to/gdb ./zsh
==9260== and then give GDB the following command
==9260==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9260
==9260== --pid is optional if only one valgrind process is running
==9260== 
--9260-- Caught __NR_exit; running __libc_freeres()
--9260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9260== 
==9260== HEAP SUMMARY:
==9260==     in use at exit: 3,122,672 bytes in 69,071 blocks
==9260==   total heap usage: 927,067 allocs, 857,996 frees, 65,426,783 bytes allocated
==9260== 
==9260== Searching for pointers to 69,071 not-freed blocks
--9260--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9260--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9260--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9260--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9260--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9260--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9260--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9260--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9260--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9260--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9260--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9260--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9260--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9260--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9260--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9260--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9260--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9260--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9260--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9260--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9260--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9260--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9260--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9260--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9260--   Scanning root segment: 0x701a000..0x701afff (4096)
--9260--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9260--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9260--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9260--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9260--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9260--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9260--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9260--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9260--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9260== Checked 4,773,440 bytes
==9260== 
==9260== LEAK SUMMARY:
==9260==    definitely lost: 1,533 bytes in 8 blocks
==9260==    indirectly lost: 6,756 bytes in 7 blocks
==9260==      possibly lost: 0 bytes in 0 blocks
==9260==    still reachable: 3,114,383 bytes in 69,056 blocks
==9260==         suppressed: 0 bytes in 0 blocks
==9260== Rerun with --leak-check=full to see details of leaked memory
==9260== 
==9260== Use --track-origins=yes to see where uninitialised values come from
==9260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9260== 
==9260== 1 errors in context 1 of 2:
==9260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9260==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9260==    by 0x488CD0: stringsubst (subst.c:301)
==9260==    by 0x48801B: prefork (subst.c:77)
==9260==    by 0x42B318: execcmd (exec.c:2619)
==9260==    by 0x428CA0: execpline2 (exec.c:1697)
==9260==    by 0x427FD2: execpline (exec.c:1484)
==9260==    by 0x427756: execlist (exec.c:1267)
==9260==    by 0x42717C: execode (exec.c:1073)
==9260==    by 0x431299: runshfunc (exec.c:5040)
==9260==    by 0x430E76: doshfunc (exec.c:4920)
==9260==    by 0x4302FB: execshfunc (exec.c:4557)
==9260==    by 0x42D8C1: execcmd (exec.c:3373)
==9260== 
==9260== 
==9260== 2 errors in context 2 of 2:
==9260== Conditional jump or move depends on uninitialised value(s)
==9260==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9260==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9260==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9260==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9260==    by 0x42D8E9: execcmd (exec.c:3378)
==9260==    by 0x428CA0: execpline2 (exec.c:1697)
==9260==    by 0x427FD2: execpline (exec.c:1484)
==9260==    by 0x42779A: execlist (exec.c:1275)
==9260==    by 0x42717C: execode (exec.c:1073)
==9260==    by 0x431299: runshfunc (exec.c:5040)
==9260==    by 0x430E76: doshfunc (exec.c:4920)
==9260==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9260== 
==9260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c31450 __strstr_sse2
--7806--     new: 0x05a3f790 (__GI_strstr         ) R-> (2031.0) 0x04c313c0 strstr
==9261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9261-by-pythonnut-on-???
==9261== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9261-by-pythonnut-on-???
==9261== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9261-by-pythonnut-on-???
==9261== 
==9261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9261== don't want to do, unless you know exactly what you're doing,
==9261== or are doing some strange experiment):
==9261==   /usr/lib/valgrind/../../bin/vgdb --pid=9261 ...command...
==9261== 
==9261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9261==   /path/to/gdb ./zsh
==9261== and then give GDB the following command
==9261==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9261
==9261== --pid is optional if only one valgrind process is running
==9261== 
==9262== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9262-by-pythonnut-on-???
==9262== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9262-by-pythonnut-on-???
==9262== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9262-by-pythonnut-on-???
==9262== 
==9262== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9262== don't want to do, unless you know exactly what you're doing,
==9262== or are doing some strange experiment):
==9262==   /usr/lib/valgrind/../../bin/vgdb --pid=9262 ...command...
==9262== 
==9262== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9262==   /path/to/gdb ./zsh
==9262== and then give GDB the following command
==9262==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9262
==9262== --pid is optional if only one valgrind process is running
==9262== 
==9263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9263-by-pythonnut-on-???
==9263== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9263-by-pythonnut-on-???
==9263== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9263-by-pythonnut-on-???
==9263== 
==9263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9263== don't want to do, unless you know exactly what you're doing,
==9263== or are doing some strange experiment):
==9263==   /usr/lib/valgrind/../../bin/vgdb --pid=9263 ...command...
==9263== 
==9263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9263==   /path/to/gdb ./zsh
==9263== and then give GDB the following command
==9263==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9263
==9263== --pid is optional if only one valgrind process is running
==9263== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--9263-- Caught __NR_exit; running __libc_freeres()
--9263-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9263== 
==9263== HEAP SUMMARY:
==9263==     in use at exit: 3,126,864 bytes in 69,144 blocks
==9263==   total heap usage: 927,236 allocs, 858,092 frees, 65,456,527 bytes allocated
==9263== 
==9263== Searching for pointers to 69,144 not-freed blocks
--9263--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9263--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9263--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9263--   Scanning root segment: 0x4037000..0x403afff (16384)
--9263--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9263--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9263--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9263--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9263--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9263--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9263--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9263--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9263--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9263--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9263--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9263--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9263--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9263--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9263--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9263--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9263--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9263--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9263--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9263--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9263--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9263--   Scanning root segment: 0x701a000..0x701afff (4096)
--9263--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9263--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9263--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9263--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9263--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9263--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9263--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9263--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9263--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9263== Checked 4,796,112 bytes
==9263== 
==9263== LEAK SUMMARY:
==9263==    definitely lost: 1,533 bytes in 8 blocks
==9263==    indirectly lost: 6,756 bytes in 7 blocks
==9263==      possibly lost: 0 bytes in 0 blocks
==9263==    still reachable: 3,118,575 bytes in 69,129 blocks
==9263==         suppressed: 0 bytes in 0 blocks
==9263== Rerun with --leak-check=full to see details of leaked memory
==9263== 
==9263== Use --track-origins=yes to see where uninitialised values come from
==9263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9263== 
==9263== 1 errors in context 1 of 2:
==9263== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9263==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9263==    by 0x488CD0: stringsubst (subst.c:301)
==9263==    by 0x48801B: prefork (subst.c:77)
==9263==    by 0x42B318: execcmd (exec.c:2619)
==9263==    by 0x428CA0: execpline2 (exec.c:1697)
==9263==    by 0x427FD2: execpline (exec.c:1484)
==9263==    by 0x427756: execlist (exec.c:1267)
==9263==    by 0x42717C: execode (exec.c:1073)
==9263==    by 0x431299: runshfunc (exec.c:5040)
==9263==    by 0x430E76: doshfunc (exec.c:4920)
==9263==    by 0x4302FB: execshfunc (exec.c:4557)
==9263==    by 0x42D8C1: execcmd (exec.c:3373)
==9263== 
==9263== 
==9263== 2 errors in context 2 of 2:
==9263== Conditional jump or move depends on uninitialised value(s)
==9263==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9263==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9263==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9263==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9263==    by 0x42D8E9: execcmd (exec.c:3378)
==9263==    by 0x428CA0: execpline2 (exec.c:1697)
==9263==    by 0x427FD2: execpline (exec.c:1484)
==9263==    by 0x42779A: execlist (exec.c:1275)
==9263==    by 0x42717C: execode (exec.c:1073)
==9263==    by 0x431299: runshfunc (exec.c:5040)
==9263==    by 0x430E76: doshfunc (exec.c:4920)
==9263==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9263== 
==9263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9266-- Caught __NR_exit; running __libc_freeres()
==9266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9266-by-pythonnut-on-???
==9266== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9266-by-pythonnut-on-???
==9266== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9266-by-pythonnut-on-???
==9266== 
==9266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9266== don't want to do, unless you know exactly what you're doing,
==9266== or are doing some strange experiment):
==9266==   /usr/lib/valgrind/../../bin/vgdb --pid=9266 ...command...
==9266== 
==9266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9266==   /path/to/gdb ./zsh
==9266== and then give GDB the following command
==9266==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9266
==9266== --pid is optional if only one valgrind process is running
==9266== 
==9267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9267-by-pythonnut-on-???
==9267== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9267-by-pythonnut-on-???
==9267== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9267-by-pythonnut-on-???
==9267== 
==9267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9267== don't want to do, unless you know exactly what you're doing,
==9267== or are doing some strange experiment):
==9267==   /usr/lib/valgrind/../../bin/vgdb --pid=9267 ...command...
==9267== 
==9267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9267==   /path/to/gdb ./zsh
==9267== and then give GDB the following command
==9267==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9267
==9267== --pid is optional if only one valgrind process is running
==9267== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9266== 
==9266== HEAP SUMMARY:
==9266==     in use at exit: 3,163,731 bytes in 69,151 blocks
==9266==   total heap usage: 927,243 allocs, 858,092 frees, 65,496,450 bytes allocated
==9266== 
==9266== Searching for pointers to 69,151 not-freed blocks
--9266--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9266--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9266--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9266--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9266--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9266--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9266--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9266--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9266--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9266--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9266--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9266--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9266--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9266--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9266--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9266--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9266--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9266--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9266--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9266--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9266--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9266--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9266--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9266--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9266--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9266--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9266--   Scanning root segment: 0x701a000..0x701afff (4096)
--9266--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9266--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9266--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9266--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9266--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9266--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9266--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9266--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9266--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9266== Checked 4,907,912 bytes
==9266== 
==9266== LEAK SUMMARY:
==9266==    definitely lost: 1,533 bytes in 8 blocks
==9266==    indirectly lost: 6,756 bytes in 7 blocks
==9266==      possibly lost: 0 bytes in 0 blocks
==9266==    still reachable: 3,155,442 bytes in 69,136 blocks
==9266==         suppressed: 0 bytes in 0 blocks
==9266== Rerun with --leak-check=full to see details of leaked memory
==9266== 
==9266== Use --track-origins=yes to see where uninitialised values come from
==9266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9266== 
==9266== 1 errors in context 1 of 2:
==9266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9266==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9266==    by 0x488CD0: stringsubst (subst.c:301)
==9266==    by 0x48801B: prefork (subst.c:77)
==9266==    by 0x42B318: execcmd (exec.c:2619)
==9266==    by 0x428CA0: execpline2 (exec.c:1697)
==9266==    by 0x427FD2: execpline (exec.c:1484)
==9266==    by 0x427756: execlist (exec.c:1267)
==9266==    by 0x42717C: execode (exec.c:1073)
==9266==    by 0x431299: runshfunc (exec.c:5040)
==9266==    by 0x430E76: doshfunc (exec.c:4920)
==9266==    by 0x4302FB: execshfunc (exec.c:4557)
==9266==    by 0x42D8C1: execcmd (exec.c:3373)
==9266== 
==9266== 
==9266== 2 errors in context 2 of 2:
==9266== Conditional jump or move depends on uninitialised value(s)
==9266==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9266==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9266==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9266==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9266==    by 0x42D8E9: execcmd (exec.c:3378)
==9266==    by 0x428CA0: execpline2 (exec.c:1697)
==9266==    by 0x427FD2: execpline (exec.c:1484)
==9266==    by 0x42779A: execlist (exec.c:1275)
==9266==    by 0x42717C: execode (exec.c:1073)
==9266==    by 0x431299: runshfunc (exec.c:5040)
==9266==    by 0x430E76: doshfunc (exec.c:4920)
==9266==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9266== 
==9266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9265== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9265-by-pythonnut-on-???
==9265== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9265-by-pythonnut-on-???
==9265== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9265-by-pythonnut-on-???
==9265== 
==9265== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9265== don't want to do, unless you know exactly what you're doing,
==9265== or are doing some strange experiment):
==9265==   /usr/lib/valgrind/../../bin/vgdb --pid=9265 ...command...
==9265== 
==9265== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9265==   /path/to/gdb ./zsh
==9265== and then give GDB the following command
==9265==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9265
==9265== --pid is optional if only one valgrind process is running
==9265== 
--9265-- Caught __NR_exit; running __libc_freeres()
--9265-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9265== 
==9265== HEAP SUMMARY:
==9265==     in use at exit: 3,163,667 bytes in 69,148 blocks
==9265==   total heap usage: 927,245 allocs, 858,097 frees, 65,496,994 bytes allocated
==9265== 
==9265== Searching for pointers to 69,148 not-freed blocks
--9265--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9265--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9265--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9265--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9265--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9265--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9265--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9265--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9265--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9265--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9265--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9265--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9265--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9265--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9265--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9265--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9265--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9265--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9265--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9265--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9265--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9265--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9265--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9265--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9265--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9265--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9265--   Scanning root segment: 0x701a000..0x701afff (4096)
--9265--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9265--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9265--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9265--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9265--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9265--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9265--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9265--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9265--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9265== Checked 4,907,224 bytes
==9265== 
==9265== LEAK SUMMARY:
==9265==    definitely lost: 1,533 bytes in 8 blocks
==9265==    indirectly lost: 6,756 bytes in 7 blocks
==9265==      possibly lost: 0 bytes in 0 blocks
==9265==    still reachable: 3,155,378 bytes in 69,133 blocks
==9265==         suppressed: 0 bytes in 0 blocks
==9265== Rerun with --leak-check=full to see details of leaked memory
==9265== 
==9265== Use --track-origins=yes to see where uninitialised values come from
==9265== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9265== 
==9265== 1 errors in context 1 of 2:
==9265== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9265==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9265==    by 0x488CD0: stringsubst (subst.c:301)
==9265==    by 0x48801B: prefork (subst.c:77)
==9265==    by 0x42B318: execcmd (exec.c:2619)
==9265==    by 0x428CA0: execpline2 (exec.c:1697)
==9265==    by 0x427FD2: execpline (exec.c:1484)
==9265==    by 0x427756: execlist (exec.c:1267)
==9265==    by 0x42717C: execode (exec.c:1073)
==9265==    by 0x431299: runshfunc (exec.c:5040)
==9265==    by 0x430E76: doshfunc (exec.c:4920)
==9265==    by 0x4302FB: execshfunc (exec.c:4557)
==9265==    by 0x42D8C1: execcmd (exec.c:3373)
==9265== 
==9265== 
==9265== 2 errors in context 2 of 2:
==9265== Conditional jump or move depends on uninitialised value(s)
==9265==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9265==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9265==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9265==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9265==    by 0x42D8E9: execcmd (exec.c:3378)
==9265==    by 0x428CA0: execpline2 (exec.c:1697)
==9265==    by 0x427FD2: execpline (exec.c:1484)
==9265==    by 0x42779A: execlist (exec.c:1275)
==9265==    by 0x42717C: execode (exec.c:1073)
==9265==    by 0x431299: runshfunc (exec.c:5040)
==9265==    by 0x430E76: doshfunc (exec.c:4920)
==9265==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9265== 
==9265== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9270-by-pythonnut-on-???
==9270== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9270-by-pythonnut-on-???
==9270== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9270-by-pythonnut-on-???
==9270== 
==9270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9270== don't want to do, unless you know exactly what you're doing,
==9270== or are doing some strange experiment):
==9270==   /usr/lib/valgrind/../../bin/vgdb --pid=9270 ...command...
==9270== 
==9270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9270==   /path/to/gdb ./zsh
==9270== and then give GDB the following command
==9270==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9270
==9270== --pid is optional if only one valgrind process is running
==9270== 
==9271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9271-by-pythonnut-on-???
==9271== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9271-by-pythonnut-on-???
==9271== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9271-by-pythonnut-on-???
==9271== 
==9271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9271== don't want to do, unless you know exactly what you're doing,
==9271== or are doing some strange experiment):
==9271==   /usr/lib/valgrind/../../bin/vgdb --pid=9271 ...command...
==9271== 
==9271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9271==   /path/to/gdb ./zsh
==9271== and then give GDB the following command
==9271==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9271
==9271== --pid is optional if only one valgrind process is running
==9271== 
--9271-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9271-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9271== 
==9271== HEAP SUMMARY:
==9271==     in use at exit: 3,200,345 bytes in 69,154 blocks
==9271==   total heap usage: 927,252 allocs, 858,098 frees, 65,535,277 bytes allocated
==9271== 
==9271== Searching for pointers to 69,154 not-freed blocks
--9271--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9271--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9271--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9271--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9271--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9271--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9271--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9271--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9271--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9271--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9271--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9271--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9271--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9271--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9271--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9271--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9271--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9271--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9271--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9271--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9271--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9271--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9271--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9271--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9271--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9271--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9271--   Scanning root segment: 0x701a000..0x701afff (4096)
--9271--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9271--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9271--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9271--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9271--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9271--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9271--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9271--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9271--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9271== Checked 4,981,400 bytes
==9271== 
==9271== LEAK SUMMARY:
==9271==    definitely lost: 1,533 bytes in 8 blocks
==9271==    indirectly lost: 6,756 bytes in 7 blocks
==9271==      possibly lost: 0 bytes in 0 blocks
==9271==    still reachable: 3,192,056 bytes in 69,139 blocks
==9271==         suppressed: 0 bytes in 0 blocks
==9271== Rerun with --leak-check=full to see details of leaked memory
==9271== 
==9271== Use --track-origins=yes to see where uninitialised values come from
==9271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9271== 
==9271== 1 errors in context 1 of 2:
==9271== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9271==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9271==    by 0x488CD0: stringsubst (subst.c:301)
==9271==    by 0x48801B: prefork (subst.c:77)
==9271==    by 0x42B318: execcmd (exec.c:2619)
==9271==    by 0x428CA0: execpline2 (exec.c:1697)
==9271==    by 0x427FD2: execpline (exec.c:1484)
==9271==    by 0x427756: execlist (exec.c:1267)
==9271==    by 0x42717C: execode (exec.c:1073)
==9271==    by 0x431299: runshfunc (exec.c:5040)
==9271==    by 0x430E76: doshfunc (exec.c:4920)
==9271==    by 0x4302FB: execshfunc (exec.c:4557)
==9271==    by 0x42D8C1: execcmd (exec.c:3373)
==9271== 
==9271== 
==9271== 2 errors in context 2 of 2:
==9271== Conditional jump or move depends on uninitialised value(s)
==9271==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9271==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9271==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9271==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9271==    by 0x42D8E9: execcmd (exec.c:3378)
==9271==    by 0x428CA0: execpline2 (exec.c:1697)
==9271==    by 0x427FD2: execpline (exec.c:1484)
==9271==    by 0x42779A: execlist (exec.c:1275)
==9271==    by 0x42717C: execode (exec.c:1073)
==9271==    by 0x431299: runshfunc (exec.c:5040)
==9271==    by 0x430E76: doshfunc (exec.c:4920)
==9271==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9271== 
==9271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9270-- Caught __NR_exit; running __libc_freeres()
--9270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9270== 
==9270== HEAP SUMMARY:
==9270==     in use at exit: 3,163,705 bytes in 69,151 blocks
==9270==   total heap usage: 927,255 allocs, 858,104 frees, 65,535,853 bytes allocated
==9270== 
==9270== Searching for pointers to 69,151 not-freed blocks
--9270--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9270--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9270--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9270--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9270--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9270--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9270--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9270--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9270--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9270--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9270--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9270--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9270--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9270--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9270--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9270--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9270--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9270--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9270--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9270--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9270--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9270--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9270--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9270--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9270--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9270--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9270--   Scanning root segment: 0x701a000..0x701afff (4096)
--9270--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9270--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9270--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9270--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9270--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9270--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9270--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9270--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9270--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9270== Checked 4,944,136 bytes
==9270== 
==9270== LEAK SUMMARY:
==9270==    definitely lost: 1,533 bytes in 8 blocks
==9270==    indirectly lost: 6,756 bytes in 7 blocks
==9270==      possibly lost: 0 bytes in 0 blocks
==9270==    still reachable: 3,155,416 bytes in 69,136 blocks
==9270==         suppressed: 0 bytes in 0 blocks
==9270== Rerun with --leak-check=full to see details of leaked memory
==9270== 
==9270== Use --track-origins=yes to see where uninitialised values come from
==9270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9270== 
==9270== 1 errors in context 1 of 2:
==9270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9270==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9270==    by 0x488CD0: stringsubst (subst.c:301)
==9270==    by 0x48801B: prefork (subst.c:77)
==9270==    by 0x42B318: execcmd (exec.c:2619)
==9270==    by 0x428CA0: execpline2 (exec.c:1697)
==9270==    by 0x427FD2: execpline (exec.c:1484)
==9270==    by 0x427756: execlist (exec.c:1267)
==9270==    by 0x42717C: execode (exec.c:1073)
==9270==    by 0x431299: runshfunc (exec.c:5040)
==9270==    by 0x430E76: doshfunc (exec.c:4920)
==9270==    by 0x4302FB: execshfunc (exec.c:4557)
==9270==    by 0x42D8C1: execcmd (exec.c:3373)
==9270== 
==9270== 
==9270== 2 errors in context 2 of 2:
==9270== Conditional jump or move depends on uninitialised value(s)
==9270==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9270==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9270==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9270==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9270==    by 0x42D8E9: execcmd (exec.c:3378)
==9270==    by 0x428CA0: execpline2 (exec.c:1697)
==9270==    by 0x427FD2: execpline (exec.c:1484)
==9270==    by 0x42779A: execlist (exec.c:1275)
==9270==    by 0x42717C: execode (exec.c:1073)
==9270==    by 0x431299: runshfunc (exec.c:5040)
==9270==    by 0x430E76: doshfunc (exec.c:4920)
==9270==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9270== 
==9270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9274-by-pythonnut-on-???
==9274== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9274-by-pythonnut-on-???
==9274== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9274-by-pythonnut-on-???
==9274== 
==9274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9274== don't want to do, unless you know exactly what you're doing,
==9274== or are doing some strange experiment):
==9274==   /usr/lib/valgrind/../../bin/vgdb --pid=9274 ...command...
==9274== 
==9274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9274==   /path/to/gdb ./zsh
==9274== and then give GDB the following command
==9274==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9274
==9274== --pid is optional if only one valgrind process is running
==9274== 
--9274-- Caught __NR_exit; running __libc_freeres()
==9273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9273-by-pythonnut-on-???
==9273== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9273-by-pythonnut-on-???
==9273== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9273-by-pythonnut-on-???
==9273== 
==9273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9273== don't want to do, unless you know exactly what you're doing,
==9273== or are doing some strange experiment):
==9273==   /usr/lib/valgrind/../../bin/vgdb --pid=9273 ...command...
==9273== 
==9273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9273==   /path/to/gdb ./zsh
==9273== and then give GDB the following command
==9273==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9273
==9273== --pid is optional if only one valgrind process is running
==9273== 
--9274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9274== 
==9274== HEAP SUMMARY:
==9274==     in use at exit: 3,164,390 bytes in 69,157 blocks
==9274==   total heap usage: 927,264 allocs, 858,107 frees, 65,503,298 bytes allocated
==9274== 
==9274== Searching for pointers to 69,157 not-freed blocks
--9274--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9274--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9274--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9274--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9274--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9274--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9274--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9274--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9274--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9274--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9274--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9274--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9274--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9274--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9274--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9274--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9274--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9274--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9274--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9274--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9274--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9274--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9274--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9274--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9274--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9274--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9274--   Scanning root segment: 0x701a000..0x701afff (4096)
--9274--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9274--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9274--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9274--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9274--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9274--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9274--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9274--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9274--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9274== Checked 4,908,312 bytes
==9274== 
==9274== LEAK SUMMARY:
==9274==    definitely lost: 1,533 bytes in 8 blocks
==9274==    indirectly lost: 6,756 bytes in 7 blocks
==9274==      possibly lost: 0 bytes in 0 blocks
==9274==    still reachable: 3,156,101 bytes in 69,142 blocks
==9274==         suppressed: 0 bytes in 0 blocks
==9274== Rerun with --leak-check=full to see details of leaked memory
==9274== 
==9274== Use --track-origins=yes to see where uninitialised values come from
==9274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9274== 
==9274== 1 errors in context 1 of 2:
==9274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9274==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9274==    by 0x488CD0: stringsubst (subst.c:301)
==9274==    by 0x48801B: prefork (subst.c:77)
==9274==    by 0x42B318: execcmd (exec.c:2619)
==9274==    by 0x428CA0: execpline2 (exec.c:1697)
==9274==    by 0x427FD2: execpline (exec.c:1484)
==9274==    by 0x427756: execlist (exec.c:1267)
==9274==    by 0x42717C: execode (exec.c:1073)
==9274==    by 0x431299: runshfunc (exec.c:5040)
==9274==    by 0x430E76: doshfunc (exec.c:4920)
==9274==    by 0x4302FB: execshfunc (exec.c:4557)
==9274==    by 0x42D8C1: execcmd (exec.c:3373)
==9274== 
==9274== 
==9274== 2 errors in context 2 of 2:
==9274== Conditional jump or move depends on uninitialised value(s)
==9274==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9274==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9274==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9274==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9274==    by 0x42D8E9: execcmd (exec.c:3378)
==9274==    by 0x428CA0: execpline2 (exec.c:1697)
==9274==    by 0x427FD2: execpline (exec.c:1484)
==9274==    by 0x42779A: execlist (exec.c:1275)
==9274==    by 0x42717C: execode (exec.c:1073)
==9274==    by 0x431299: runshfunc (exec.c:5040)
==9274==    by 0x430E76: doshfunc (exec.c:4920)
==9274==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9274== 
==9274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9273-- Caught __NR_exit; running __libc_freeres()
--9273-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9273== 
==9273== HEAP SUMMARY:
==9273==     in use at exit: 3,164,283 bytes in 69,157 blocks
==9273==   total heap usage: 927,301 allocs, 858,144 frees, 65,512,839 bytes allocated
==9273== 
==9273== Searching for pointers to 69,157 not-freed blocks
--9273--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9273--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9273--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9273--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9273--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9273--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9273--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9273--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9273--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9273--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9273--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9273--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9273--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9273--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9273--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9273--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9273--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9273--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9273--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9273--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9273--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9273--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9273--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9273--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9273--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9273--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9273--   Scanning root segment: 0x701a000..0x701afff (4096)
--9273--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9273--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9273--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9273--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9273--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9273--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9273--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9273--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9273--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9273== Checked 4,907,616 bytes
==9273== 
==9273== LEAK SUMMARY:
==9273==    definitely lost: 1,533 bytes in 8 blocks
==9273==    indirectly lost: 6,756 bytes in 7 blocks
==9273==      possibly lost: 0 bytes in 0 blocks
==9273==    still reachable: 3,155,994 bytes in 69,142 blocks
==9273==         suppressed: 0 bytes in 0 blocks
==9273== Rerun with --leak-check=full to see details of leaked memory
==9273== 
==9273== Use --track-origins=yes to see where uninitialised values come from
==9273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9273== 
==9273== 1 errors in context 1 of 2:
==9273== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9273==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9273==    by 0x488CD0: stringsubst (subst.c:301)
==9273==    by 0x48801B: prefork (subst.c:77)
==9273==    by 0x42B318: execcmd (exec.c:2619)
==9273==    by 0x428CA0: execpline2 (exec.c:1697)
==9273==    by 0x427FD2: execpline (exec.c:1484)
==9273==    by 0x427756: execlist (exec.c:1267)
==9273==    by 0x42717C: execode (exec.c:1073)
==9273==    by 0x431299: runshfunc (exec.c:5040)
==9273==    by 0x430E76: doshfunc (exec.c:4920)
==9273==    by 0x4302FB: execshfunc (exec.c:4557)
==9273==    by 0x42D8C1: execcmd (exec.c:3373)
==9273== 
==9273== 
==9273== 2 errors in context 2 of 2:
==9273== Conditional jump or move depends on uninitialised value(s)
==9273==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9273==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9273==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9273==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9273==    by 0x42D8E9: execcmd (exec.c:3378)
==9273==    by 0x428CA0: execpline2 (exec.c:1697)
==9273==    by 0x427FD2: execpline (exec.c:1484)
==9273==    by 0x42779A: execlist (exec.c:1275)
==9273==    by 0x42717C: execode (exec.c:1073)
==9273==    by 0x431299: runshfunc (exec.c:5040)
==9273==    by 0x430E76: doshfunc (exec.c:4920)
==9273==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9273== 
==9273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9275-by-pythonnut-on-???
==9275== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9275-by-pythonnut-on-???
==9275== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9275-by-pythonnut-on-???
==9275== 
==9275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9275== don't want to do, unless you know exactly what you're doing,
==9275== or are doing some strange experiment):
==9275==   /usr/lib/valgrind/../../bin/vgdb --pid=9275 ...command...
==9275== 
==9275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9275==   /path/to/gdb ./zsh
==9275== and then give GDB the following command
==9275==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9275
==9275== --pid is optional if only one valgrind process is running
==9275== 
--9275-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEAE9C,  len 4
--9275-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9276-- Caught __NR_exit; running __libc_freeres()
==9275== 
==9275== HEAP SUMMARY:
==9275==     in use at exit: 3,128,075 bytes in 69,157 blocks
==9275==   total heap usage: 927,273 allocs, 858,116 frees, 65,507,514 bytes allocated
==9275== 
==9276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9276-by-pythonnut-on-???
==9276== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9276-by-pythonnut-on-???
==9276== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9276-by-pythonnut-on-???
==9276== 
==9276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9276== don't want to do, unless you know exactly what you're doing,
==9276== or are doing some strange experiment):
==9276==   /usr/lib/valgrind/../../bin/vgdb --pid=9276 ...command...
==9276== 
==9276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9276==   /path/to/gdb ./zsh
==9276== and then give GDB the following command
==9276==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9276
==9276== --pid is optional if only one valgrind process is running
==9276== 
--9276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9275== Searching for pointers to 69,157 not-freed blocks
--9275--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9275--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9275--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9275--   Scanning root segment: 0x4037000..0x4043fff (53248)
==9276== 
--9275--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9275--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9275--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9275--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9275--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9275--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9275--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9275--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9275--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9275--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9275--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9275--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9275--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9275--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9275--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9275--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9275--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9275--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9275--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9275--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9275--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9275--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9275--   Scanning root segment: 0x701a000..0x701afff (4096)
--9275--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9275--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9275--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9275--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9275--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9275--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9275--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9275--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9275--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9276== HEAP SUMMARY:
==9276==     in use at exit: 3,127,819 bytes in 69,157 blocks
==9276==   total heap usage: 927,279 allocs, 858,122 frees, 65,509,634 bytes allocated
==9276== 
==9276== Searching for pointers to 69,157 not-freed blocks
--9276--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9276--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9276--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9276--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9276--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9276--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9276--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9276--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9276--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9276--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9276--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9276--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9276--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9276--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9276--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9276--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9276--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9276--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9276--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9276--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9276--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9276--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9276--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9276--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9276--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9276--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9276--   Scanning root segment: 0x701a000..0x701afff (4096)
--9276--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9276--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9276--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9276--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9276--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9276--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9276--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9276--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9276--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9275== Checked 4,870,984 bytes
==9275== 
==9275== LEAK SUMMARY:
==9275==    definitely lost: 1,533 bytes in 8 blocks
==9275==    indirectly lost: 6,756 bytes in 7 blocks
==9275==      possibly lost: 0 bytes in 0 blocks
==9275==    still reachable: 3,119,786 bytes in 69,142 blocks
==9275==         suppressed: 0 bytes in 0 blocks
==9275== Rerun with --leak-check=full to see details of leaked memory
==9275== 
==9275== Use --track-origins=yes to see where uninitialised values come from
==9275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9275== 
==9275== 1 errors in context 1 of 2:
==9275== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9275==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9275==    by 0x488CD0: stringsubst (subst.c:301)
==9275==    by 0x48801B: prefork (subst.c:77)
==9275==    by 0x42B318: execcmd (exec.c:2619)
==9275==    by 0x428CA0: execpline2 (exec.c:1697)
==9275==    by 0x427FD2: execpline (exec.c:1484)
==9275==    by 0x427756: execlist (exec.c:1267)
==9275==    by 0x42717C: execode (exec.c:1073)
==9275==    by 0x431299: runshfunc (exec.c:5040)
==9275==    by 0x430E76: doshfunc (exec.c:4920)
==9275==    by 0x4302FB: execshfunc (exec.c:4557)
==9275==    by 0x42D8C1: execcmd (exec.c:3373)
==9275== 
==9275== 
==9275== 2 errors in context 2 of 2:
==9275== Conditional jump or move depends on uninitialised value(s)
==9275==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9275==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9275==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9275==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9275==    by 0x42D8E9: execcmd (exec.c:3378)
==9275==    by 0x428CA0: execpline2 (exec.c:1697)
==9275==    by 0x427FD2: execpline (exec.c:1484)
==9275==    by 0x42779A: execlist (exec.c:1275)
==9275==    by 0x42717C: execode (exec.c:1073)
==9275==    by 0x431299: runshfunc (exec.c:5040)
==9275==    by 0x430E76: doshfunc (exec.c:4920)
==9275==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9275== 
==9275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9276== Checked 4,870,824 bytes
==9276== 
==9276== LEAK SUMMARY:
==9276==    definitely lost: 1,557 bytes in 9 blocks
==9276==    indirectly lost: 6,796 bytes in 9 blocks
==9276==      possibly lost: 0 bytes in 0 blocks
==9276==    still reachable: 3,119,466 bytes in 69,139 blocks
==9276==         suppressed: 0 bytes in 0 blocks
==9276== Rerun with --leak-check=full to see details of leaked memory
==9276== 
==9276== Use --track-origins=yes to see where uninitialised values come from
==9276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9276== 
==9276== 1 errors in context 1 of 2:
==9276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9276==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9276==    by 0x488CD0: stringsubst (subst.c:301)
==9276==    by 0x48801B: prefork (subst.c:77)
==9276==    by 0x42B318: execcmd (exec.c:2619)
==9276==    by 0x428CA0: execpline2 (exec.c:1697)
==9276==    by 0x427FD2: execpline (exec.c:1484)
==9276==    by 0x427756: execlist (exec.c:1267)
==9276==    by 0x42717C: execode (exec.c:1073)
==9276==    by 0x431299: runshfunc (exec.c:5040)
==9276==    by 0x430E76: doshfunc (exec.c:4920)
==9276==    by 0x4302FB: execshfunc (exec.c:4557)
==9276==    by 0x42D8C1: execcmd (exec.c:3373)
==9276== 
==9276== 
==9276== 2 errors in context 2 of 2:
==9276== Conditional jump or move depends on uninitialised value(s)
==9276==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9276==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9276==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9276==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9276==    by 0x42D8E9: execcmd (exec.c:3378)
==9276==    by 0x428CA0: execpline2 (exec.c:1697)
==9276==    by 0x427FD2: execpline (exec.c:1484)
==9276==    by 0x42779A: execlist (exec.c:1275)
==9276==    by 0x42717C: execode (exec.c:1073)
==9276==    by 0x431299: runshfunc (exec.c:5040)
==9276==    by 0x430E76: doshfunc (exec.c:4920)
==9276==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9276== 
==9276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9280== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9280-by-pythonnut-on-???
==9280== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9280-by-pythonnut-on-???
==9280== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9280-by-pythonnut-on-???
==9280== 
==9280== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9280== don't want to do, unless you know exactly what you're doing,
==9280== or are doing some strange experiment):
==9280==   /usr/lib/valgrind/../../bin/vgdb --pid=9280 ...command...
==9280== 
==9280== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9280==   /path/to/gdb ./zsh
==9280== and then give GDB the following command
==9280==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9280
==9280== --pid is optional if only one valgrind process is running
==9280== 
client request: code 4d430005,  addr 0xFFEFEB81C,  len 4
--9262-- Caught __NR_exit; running __libc_freeres()
--9262-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9262== 
==9262== HEAP SUMMARY:
==9262==     in use at exit: 3,126,377 bytes in 69,133 blocks
==9262==   total heap usage: 927,280 allocs, 858,147 frees, 65,510,202 bytes allocated
==9262== 
==9262== Searching for pointers to 69,133 not-freed blocks
--9262--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9262--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9262--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9262--   Scanning root segment: 0x4037000..0x403afff (16384)
--9262--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9262--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9262--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9262--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9262--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9262--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9262--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9262--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9262--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9262--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9262--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9262--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9262--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9262--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9262--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9262--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9262--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9262--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9262--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9262--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9262--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9262--   Scanning root segment: 0x701a000..0x701afff (4096)
--9262--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9262--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9262--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9262--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9262--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9262--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9262--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9262--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9262--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9262== Checked 4,793,592 bytes
==9262== 
==9262== LEAK SUMMARY:
==9262==    definitely lost: 1,533 bytes in 8 blocks
==9262==    indirectly lost: 6,756 bytes in 7 blocks
==9262==      possibly lost: 0 bytes in 0 blocks
==9262==    still reachable: 3,118,088 bytes in 69,118 blocks
==9262==         suppressed: 0 bytes in 0 blocks
==9262== Rerun with --leak-check=full to see details of leaked memory
==9262== 
==9262== Use --track-origins=yes to see where uninitialised values come from
==9262== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9262== 
==9262== 1 errors in context 1 of 2:
==9262== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9262==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9262==    by 0x488CD0: stringsubst (subst.c:301)
==9262==    by 0x48801B: prefork (subst.c:77)
==9262==    by 0x42B318: execcmd (exec.c:2619)
==9262==    by 0x428CA0: execpline2 (exec.c:1697)
==9262==    by 0x427FD2: execpline (exec.c:1484)
==9262==    by 0x427756: execlist (exec.c:1267)
==9262==    by 0x42717C: execode (exec.c:1073)
==9262==    by 0x431299: runshfunc (exec.c:5040)
==9262==    by 0x430E76: doshfunc (exec.c:4920)
==9262==    by 0x4302FB: execshfunc (exec.c:4557)
==9262==    by 0x42D8C1: execcmd (exec.c:3373)
==9262== 
==9262== 
==9262== 2 errors in context 2 of 2:
==9262== Conditional jump or move depends on uninitialised value(s)
==9262==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9262==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9262==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9262==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9262==    by 0x42D8E9: execcmd (exec.c:3378)
==9262==    by 0x428CA0: execpline2 (exec.c:1697)
==9262==    by 0x427FD2: execpline (exec.c:1484)
==9262==    by 0x42779A: execlist (exec.c:1275)
==9262==    by 0x42717C: execode (exec.c:1073)
==9262==    by 0x431299: runshfunc (exec.c:5040)
==9262==    by 0x430E76: doshfunc (exec.c:4920)
==9262==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9262== 
==9262== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9281-by-pythonnut-on-???
==9281== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9281-by-pythonnut-on-???
==9281== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9281-by-pythonnut-on-???
==9281== 
==9281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9281== don't want to do, unless you know exactly what you're doing,
==9281== or are doing some strange experiment):
==9281==   /usr/lib/valgrind/../../bin/vgdb --pid=9281 ...command...
==9281== 
==9281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9281==   /path/to/gdb ./zsh
==9281== and then give GDB the following command
==9281==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9281
==9281== --pid is optional if only one valgrind process is running
==9281== 
--9282-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEC14C,  len 4
==9282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9282-by-pythonnut-on-???
==9282== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9282-by-pythonnut-on-???
==9282== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9282-by-pythonnut-on-???
==9282== 
==9282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9282== don't want to do, unless you know exactly what you're doing,
==9282== or are doing some strange experiment):
==9282==   /usr/lib/valgrind/../../bin/vgdb --pid=9282 ...command...
==9282== 
==9282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9282==   /path/to/gdb ./zsh
==9282== and then give GDB the following command
==9282==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9282
==9282== --pid is optional if only one valgrind process is running
==9282== 
client request: code 4d430005,  addr 0xFFEFEC0AC,  len 4
--9282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9282== 
==9282== HEAP SUMMARY:
==9282==     in use at exit: 3,126,705 bytes in 69,134 blocks
==9282==   total heap usage: 927,223 allocs, 858,089 frees, 65,459,440 bytes allocated
==9282== 
==9282== Searching for pointers to 69,134 not-freed blocks
--9282--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9282--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9282--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9282--   Scanning root segment: 0x4037000..0x403afff (16384)
--9282--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9282--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9282--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9282--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9282--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9282--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9282--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9282--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9282--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9282--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9282--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9282--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9282--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9282--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9282--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9282--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9282--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9282--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9282--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9282--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9282--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9282--   Scanning root segment: 0x701a000..0x701afff (4096)
--9282--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9282--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9282--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9282--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9282--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9282--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9282--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9282--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9282--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9282== Checked 4,795,128 bytes
==9282== 
==9282== LEAK SUMMARY:
==9282==    definitely lost: 1,533 bytes in 8 blocks
==9282==    indirectly lost: 6,756 bytes in 7 blocks
==9282==      possibly lost: 0 bytes in 0 blocks
==9282==    still reachable: 3,118,416 bytes in 69,119 blocks
==9282==         suppressed: 0 bytes in 0 blocks
==9282== Rerun with --leak-check=full to see details of leaked memory
==9282== 
==9282== Use --track-origins=yes to see where uninitialised values come from
==9282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9282== 
==9282== 1 errors in context 1 of 2:
==9282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9282==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9282==    by 0x488CD0: stringsubst (subst.c:301)
==9282==    by 0x48801B: prefork (subst.c:77)
==9282==    by 0x42B318: execcmd (exec.c:2619)
==9282==    by 0x428CA0: execpline2 (exec.c:1697)
==9282==    by 0x427FD2: execpline (exec.c:1484)
==9282==    by 0x427756: execlist (exec.c:1267)
==9282==    by 0x42717C: execode (exec.c:1073)
==9282==    by 0x431299: runshfunc (exec.c:5040)
==9282==    by 0x430E76: doshfunc (exec.c:4920)
==9282==    by 0x4302FB: execshfunc (exec.c:4557)
==9282==    by 0x42D8C1: execcmd (exec.c:3373)
==9282== 
==9282== 
==9282== 2 errors in context 2 of 2:
==9282== Conditional jump or move depends on uninitialised value(s)
==9282==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9282==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9282==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9282==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9282==    by 0x42D8E9: execcmd (exec.c:3378)
==9282==    by 0x428CA0: execpline2 (exec.c:1697)
==9282==    by 0x427FD2: execpline (exec.c:1484)
==9282==    by 0x42779A: execlist (exec.c:1275)
==9282==    by 0x42717C: execode (exec.c:1073)
==9282==    by 0x431299: runshfunc (exec.c:5040)
==9282==    by 0x430E76: doshfunc (exec.c:4920)
==9282==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9282== 
==9282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9281-- Caught __NR_exit; running __libc_freeres()
--9281-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9281== 
==9281== HEAP SUMMARY:
==9281==     in use at exit: 3,126,417 bytes in 69,131 blocks
==9281==   total heap usage: 927,229 allocs, 858,098 frees, 65,460,328 bytes allocated
==9281== 
==9281== Searching for pointers to 69,131 not-freed blocks
--9281--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9281--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9281--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9281--   Scanning root segment: 0x4037000..0x403afff (16384)
--9281--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9281--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9281--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9281--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9281--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9281--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9281--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9281--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9281--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9281--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9281--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9281--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9281--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9281--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9281--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9281--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9281--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9281--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9281--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9281--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9281--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9281--   Scanning root segment: 0x701a000..0x701afff (4096)
--9281--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9281--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9281--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9281--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9281--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9281--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9281--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9281--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9281--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9281== Checked 4,794,208 bytes
==9281== 
==9281== LEAK SUMMARY:
==9281==    definitely lost: 1,533 bytes in 8 blocks
==9281==    indirectly lost: 6,756 bytes in 7 blocks
==9281==      possibly lost: 0 bytes in 0 blocks
==9281==    still reachable: 3,118,128 bytes in 69,116 blocks
==9281==         suppressed: 0 bytes in 0 blocks
==9281== Rerun with --leak-check=full to see details of leaked memory
==9281== 
==9281== Use --track-origins=yes to see where uninitialised values come from
==9281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9281== 
==9281== 1 errors in context 1 of 2:
==9281== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9281==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9281==    by 0x488CD0: stringsubst (subst.c:301)
==9281==    by 0x48801B: prefork (subst.c:77)
==9281==    by 0x42B318: execcmd (exec.c:2619)
==9281==    by 0x428CA0: execpline2 (exec.c:1697)
==9281==    by 0x427FD2: execpline (exec.c:1484)
==9281==    by 0x427756: execlist (exec.c:1267)
==9281==    by 0x42717C: execode (exec.c:1073)
==9281==    by 0x431299: runshfunc (exec.c:5040)
==9281==    by 0x430E76: doshfunc (exec.c:4920)
==9281==    by 0x4302FB: execshfunc (exec.c:4557)
==9281==    by 0x42D8C1: execcmd (exec.c:3373)
==9281== 
==9281== 
==9281== 2 errors in context 2 of 2:
==9281== Conditional jump or move depends on uninitialised value(s)
==9281==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9281==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9281==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9281==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9281==    by 0x42D8E9: execcmd (exec.c:3378)
==9281==    by 0x428CA0: execpline2 (exec.c:1697)
==9281==    by 0x427FD2: execpline (exec.c:1484)
==9281==    by 0x42779A: execlist (exec.c:1275)
==9281==    by 0x42717C: execode (exec.c:1073)
==9281==    by 0x431299: runshfunc (exec.c:5040)
==9281==    by 0x430E76: doshfunc (exec.c:4920)
==9281==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9281== 
==9281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9285== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9285-by-pythonnut-on-???
==9285== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9285-by-pythonnut-on-???
==9285== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9285-by-pythonnut-on-???
==9285== 
==9285== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9285== don't want to do, unless you know exactly what you're doing,
==9285== or are doing some strange experiment):
==9285==   /usr/lib/valgrind/../../bin/vgdb --pid=9285 ...command...
==9285== 
==9285== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9285==   /path/to/gdb ./zsh
==9285== and then give GDB the following command
==9285==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9285
==9285== --pid is optional if only one valgrind process is running
==9285== 
==9286== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9286-by-pythonnut-on-???
==9286== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9286-by-pythonnut-on-???
==9286== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9286-by-pythonnut-on-???
==9286== 
==9286== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9286== don't want to do, unless you know exactly what you're doing,
==9286== or are doing some strange experiment):
==9286==   /usr/lib/valgrind/../../bin/vgdb --pid=9286 ...command...
==9286== 
==9286== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9286==   /path/to/gdb ./zsh
==9286== and then give GDB the following command
==9286==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9286
==9286== --pid is optional if only one valgrind process is running
==9286== 
--9286-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEACEC,  len 4
client request: code 4d430005,  addr 0xFFEFEAC4C,  len 4
--9286-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9286== 
==9286== HEAP SUMMARY:
==9286==     in use at exit: 3,126,683 bytes in 69,137 blocks
==9286==   total heap usage: 927,257 allocs, 858,120 frees, 65,472,653 bytes allocated
==9286== 
==9286== Searching for pointers to 69,137 not-freed blocks
--9286--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9286--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9286--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9286--   Scanning root segment: 0x4037000..0x403afff (16384)
--9286--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9286--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9286--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9286--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9286--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9286--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9286--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9286--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9286--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9286--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9286--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9286--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9286--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9286--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9286--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9286--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9286--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9286--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9286--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9286--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9286--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9286--   Scanning root segment: 0x701a000..0x701afff (4096)
--9286--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9286--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9286--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9286--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9286--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9286--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9286--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9286--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9286--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9286== Checked 4,796,376 bytes
==9286== 
==9286== LEAK SUMMARY:
==9286==    definitely lost: 1,533 bytes in 8 blocks
==9286==    indirectly lost: 6,756 bytes in 7 blocks
==9286==      possibly lost: 0 bytes in 0 blocks
==9286==    still reachable: 3,118,394 bytes in 69,122 blocks
==9286==         suppressed: 0 bytes in 0 blocks
==9286== Rerun with --leak-check=full to see details of leaked memory
==9286== 
==9286== Use --track-origins=yes to see where uninitialised values come from
==9286== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9286== 
==9286== 1 errors in context 1 of 2:
==9286== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9286==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9286==    by 0x488CD0: stringsubst (subst.c:301)
==9286==    by 0x48801B: prefork (subst.c:77)
==9286==    by 0x42B318: execcmd (exec.c:2619)
==9286==    by 0x428CA0: execpline2 (exec.c:1697)
==9286==    by 0x427FD2: execpline (exec.c:1484)
==9286==    by 0x427756: execlist (exec.c:1267)
==9286==    by 0x42717C: execode (exec.c:1073)
==9286==    by 0x431299: runshfunc (exec.c:5040)
==9286==    by 0x430E76: doshfunc (exec.c:4920)
==9286==    by 0x4302FB: execshfunc (exec.c:4557)
==9286==    by 0x42D8C1: execcmd (exec.c:3373)
==9286== 
==9286== 
==9286== 2 errors in context 2 of 2:
==9286== Conditional jump or move depends on uninitialised value(s)
==9286==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9286==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9286==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9286==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9286==    by 0x42D8E9: execcmd (exec.c:3378)
==9286==    by 0x428CA0: execpline2 (exec.c:1697)
==9286==    by 0x427FD2: execpline (exec.c:1484)
==9286==    by 0x42779A: execlist (exec.c:1275)
==9286==    by 0x42717C: execode (exec.c:1073)
==9286==    by 0x431299: runshfunc (exec.c:5040)
==9286==    by 0x430E76: doshfunc (exec.c:4920)
==9286==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9286== 
==9286== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9285-- Caught __NR_exit; running __libc_freeres()
--9285-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9285== 
==9285== HEAP SUMMARY:
==9285==     in use at exit: 3,126,688 bytes in 69,138 blocks
==9285==   total heap usage: 927,253 allocs, 858,115 frees, 65,469,069 bytes allocated
==9285== 
==9285== Searching for pointers to 69,138 not-freed blocks
--9285--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9285--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9285--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9285--   Scanning root segment: 0x4037000..0x403afff (16384)
--9285--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9285--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9285--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9285--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9285--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9285--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9285--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9285--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9285--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9285--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9285--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9285--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9285--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9285--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9285--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9285--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9285--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9285--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9285--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9285--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9285--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9285--   Scanning root segment: 0x701a000..0x701afff (4096)
--9285--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9285--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9285--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9285--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9285--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9285--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9285--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9285--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9285--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9285== Checked 4,796,072 bytes
==9285== 
==9285== LEAK SUMMARY:
==9285==    definitely lost: 1,533 bytes in 8 blocks
==9285==    indirectly lost: 6,756 bytes in 7 blocks
==9285==      possibly lost: 0 bytes in 0 blocks
==9285==    still reachable: 3,118,399 bytes in 69,123 blocks
==9285==         suppressed: 0 bytes in 0 blocks
==9285== Rerun with --leak-check=full to see details of leaked memory
==9285== 
==9285== Use --track-origins=yes to see where uninitialised values come from
==9285== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9285== 
==9285== 1 errors in context 1 of 2:
==9285== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9285==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9285==    by 0x488CD0: stringsubst (subst.c:301)
==9285==    by 0x48801B: prefork (subst.c:77)
==9285==    by 0x42B318: execcmd (exec.c:2619)
==9285==    by 0x428CA0: execpline2 (exec.c:1697)
==9285==    by 0x427FD2: execpline (exec.c:1484)
==9285==    by 0x427756: execlist (exec.c:1267)
==9285==    by 0x42717C: execode (exec.c:1073)
==9285==    by 0x431299: runshfunc (exec.c:5040)
==9285==    by 0x430E76: doshfunc (exec.c:4920)
==9285==    by 0x4302FB: execshfunc (exec.c:4557)
==9285==    by 0x42D8C1: execcmd (exec.c:3373)
==9285== 
==9285== 
==9285== 2 errors in context 2 of 2:
==9285== Conditional jump or move depends on uninitialised value(s)
==9285==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9285==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9285==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9285==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9285==    by 0x42D8E9: execcmd (exec.c:3378)
==9285==    by 0x428CA0: execpline2 (exec.c:1697)
==9285==    by 0x427FD2: execpline (exec.c:1484)
==9285==    by 0x42779A: execlist (exec.c:1275)
==9285==    by 0x42717C: execode (exec.c:1073)
==9285==    by 0x431299: runshfunc (exec.c:5040)
==9285==    by 0x430E76: doshfunc (exec.c:4920)
==9285==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9285== 
==9285== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEB23C,  len 4
--9289-- Caught __NR_exit; running __libc_freeres()
==9289== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9289-by-pythonnut-on-???
==9289== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9289-by-pythonnut-on-???
==9289== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9289-by-pythonnut-on-???
==9289== 
==9289== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9289== don't want to do, unless you know exactly what you're doing,
==9289== or are doing some strange experiment):
==9289==   /usr/lib/valgrind/../../bin/vgdb --pid=9289 ...command...
==9289== 
==9289== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9289==   /path/to/gdb ./zsh
==9289== and then give GDB the following command
==9289==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9289
==9289== --pid is optional if only one valgrind process is running
==9289== 
--9289-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9289== 
==9289== HEAP SUMMARY:
==9289==     in use at exit: 3,127,032 bytes in 69,143 blocks
==9289==   total heap usage: 927,264 allocs, 858,121 frees, 65,474,299 bytes allocated
==9289== 
==9289== Searching for pointers to 69,143 not-freed blocks
--9289--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9289--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9289--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9289--   Scanning root segment: 0x4037000..0x403afff (16384)
--9289--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9289--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9289--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9289--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9289--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9289--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9289--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9289--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9289--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9289--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9289--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9289--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9289--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9289--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9289--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9289--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9289--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9289--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9289--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9289--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9289--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9289--   Scanning root segment: 0x701a000..0x701afff (4096)
--9289--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9289--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9289--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9289--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9289--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9289--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9289--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9289--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9289--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9289== Checked 4,796,136 bytes
==9289== 
==9289== LEAK SUMMARY:
==9289==    definitely lost: 1,533 bytes in 8 blocks
==9289==    indirectly lost: 6,756 bytes in 7 blocks
==9289==      possibly lost: 0 bytes in 0 blocks
==9289==    still reachable: 3,118,743 bytes in 69,128 blocks
==9289==         suppressed: 0 bytes in 0 blocks
==9289== Rerun with --leak-check=full to see details of leaked memory
==9289== 
==9289== Use --track-origins=yes to see where uninitialised values come from
==9289== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9289== 
==9289== 1 errors in context 1 of 2:
==9289== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9289==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9289==    by 0x488CD0: stringsubst (subst.c:301)
==9289==    by 0x48801B: prefork (subst.c:77)
==9289==    by 0x42B318: execcmd (exec.c:2619)
==9289==    by 0x428CA0: execpline2 (exec.c:1697)
==9289==    by 0x427FD2: execpline (exec.c:1484)
==9289==    by 0x427756: execlist (exec.c:1267)
==9289==    by 0x42717C: execode (exec.c:1073)
==9289==    by 0x431299: runshfunc (exec.c:5040)
==9289==    by 0x430E76: doshfunc (exec.c:4920)
==9289==    by 0x4302FB: execshfunc (exec.c:4557)
==9289==    by 0x42D8C1: execcmd (exec.c:3373)
==9289== 
==9289== 
==9289== 2 errors in context 2 of 2:
==9289== Conditional jump or move depends on uninitialised value(s)
==9289==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9289==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9289==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9289==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9289==    by 0x42D8E9: execcmd (exec.c:3378)
==9289==    by 0x428CA0: execpline2 (exec.c:1697)
==9289==    by 0x427FD2: execpline (exec.c:1484)
==9289==    by 0x42779A: execlist (exec.c:1275)
==9289==    by 0x42717C: execode (exec.c:1073)
==9289==    by 0x431299: runshfunc (exec.c:5040)
==9289==    by 0x430E76: doshfunc (exec.c:4920)
==9289==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9289== 
==9289== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEAD8C,  len 4
--9293-- Caught __NR_exit; running __libc_freeres()
==9293== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9293-by-pythonnut-on-???
==9293== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9293-by-pythonnut-on-???
==9293== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9293-by-pythonnut-on-???
==9293== 
==9293== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9293== don't want to do, unless you know exactly what you're doing,
==9293== or are doing some strange experiment):
==9293==   /usr/lib/valgrind/../../bin/vgdb --pid=9293 ...command...
==9293== 
==9293== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9293==   /path/to/gdb ./zsh
==9293== and then give GDB the following command
==9293==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9293
==9293== --pid is optional if only one valgrind process is running
==9293== 
--9293-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9293== 
==9293== HEAP SUMMARY:
==9293==     in use at exit: 3,127,061 bytes in 69,144 blocks
==9293==   total heap usage: 927,269 allocs, 858,125 frees, 65,476,440 bytes allocated
==9293== 
==9293== Searching for pointers to 69,144 not-freed blocks
--9293--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9293--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9293--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9293--   Scanning root segment: 0x4037000..0x403afff (16384)
--9293--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9293--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9293--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9293--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9293--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9293--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9293--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9293--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9293--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9293--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9293--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9293--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9293--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9293--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9293--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9293--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9293--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9293--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9293--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9293--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9293--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9293--   Scanning root segment: 0x701a000..0x701afff (4096)
--9293--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9293--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9293--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9293--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9293--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9293--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9293--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9293--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9293--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9293== Checked 4,796,432 bytes
==9293== 
==9293== LEAK SUMMARY:
==9293==    definitely lost: 1,533 bytes in 8 blocks
==9293==    indirectly lost: 6,756 bytes in 7 blocks
==9293==      possibly lost: 0 bytes in 0 blocks
==9293==    still reachable: 3,118,772 bytes in 69,129 blocks
==9293==         suppressed: 0 bytes in 0 blocks
==9293== Rerun with --leak-check=full to see details of leaked memory
==9293== 
==9293== Use --track-origins=yes to see where uninitialised values come from
==9293== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9293== 
==9293== 1 errors in context 1 of 2:
==9293== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9293==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9293==    by 0x488CD0: stringsubst (subst.c:301)
==9293==    by 0x48801B: prefork (subst.c:77)
==9293==    by 0x42B318: execcmd (exec.c:2619)
==9293==    by 0x428CA0: execpline2 (exec.c:1697)
==9293==    by 0x427FD2: execpline (exec.c:1484)
==9293==    by 0x427756: execlist (exec.c:1267)
==9293==    by 0x42717C: execode (exec.c:1073)
==9293==    by 0x431299: runshfunc (exec.c:5040)
==9293==    by 0x430E76: doshfunc (exec.c:4920)
==9293==    by 0x4302FB: execshfunc (exec.c:4557)
==9293==    by 0x42D8C1: execcmd (exec.c:3373)
==9293== 
==9293== 
==9293== 2 errors in context 2 of 2:
==9293== Conditional jump or move depends on uninitialised value(s)
==9293==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9293==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9293==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9293==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9293==    by 0x42D8E9: execcmd (exec.c:3378)
==9293==    by 0x428CA0: execpline2 (exec.c:1697)
==9293==    by 0x427FD2: execpline (exec.c:1484)
==9293==    by 0x42779A: execlist (exec.c:1275)
==9293==    by 0x42717C: execode (exec.c:1073)
==9293==    by 0x431299: runshfunc (exec.c:5040)
==9293==    by 0x430E76: doshfunc (exec.c:4920)
==9293==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9293== 
==9293== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEB70C,  len 4
client request: code 4d430005,  addr 0xFFEFEB08C,  len 4
--9261-- Caught __NR_exit; running __libc_freeres()
--9261-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9261== 
==9261== HEAP SUMMARY:
==9261==     in use at exit: 3,125,013 bytes in 69,094 blocks
==9261==   total heap usage: 927,278 allocs, 858,184 frees, 65,480,380 bytes allocated
==9261== 
==9261== Searching for pointers to 69,094 not-freed blocks
--9261--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9261--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9261--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9261--   Scanning root segment: 0x4037000..0x403afff (16384)
--9261--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9261--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9261--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9261--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9261--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9261--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9261--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9261--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9261--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9261--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9261--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9261--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9261--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9261--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9261--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9261--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9261--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9261--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9261--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9261--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9261--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9261--   Scanning root segment: 0x701a000..0x701afff (4096)
--9261--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9261--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9261--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9261--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9261--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9261--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9261--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9261--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9261--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9261== Checked 4,790,488 bytes
==9261== 
==9261== LEAK SUMMARY:
==9261==    definitely lost: 1,533 bytes in 8 blocks
==9261==    indirectly lost: 6,756 bytes in 7 blocks
==9261==      possibly lost: 0 bytes in 0 blocks
==9261==    still reachable: 3,116,724 bytes in 69,079 blocks
==9261==         suppressed: 0 bytes in 0 blocks
==9261== Rerun with --leak-check=full to see details of leaked memory
==9261== 
==9261== Use --track-origins=yes to see where uninitialised values come from
==9261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9261== 
==9261== 1 errors in context 1 of 2:
==9261== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9261==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9261==    by 0x488CD0: stringsubst (subst.c:301)
==9261==    by 0x48801B: prefork (subst.c:77)
==9261==    by 0x42B318: execcmd (exec.c:2619)
==9261==    by 0x428CA0: execpline2 (exec.c:1697)
==9261==    by 0x427FD2: execpline (exec.c:1484)
==9261==    by 0x427756: execlist (exec.c:1267)
==9261==    by 0x42717C: execode (exec.c:1073)
==9261==    by 0x431299: runshfunc (exec.c:5040)
==9261==    by 0x430E76: doshfunc (exec.c:4920)
==9261==    by 0x4302FB: execshfunc (exec.c:4557)
==9261==    by 0x42D8C1: execcmd (exec.c:3373)
==9261== 
==9261== 
==9261== 2 errors in context 2 of 2:
==9261== Conditional jump or move depends on uninitialised value(s)
==9261==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9261==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9261==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9261==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9261==    by 0x42D8E9: execcmd (exec.c:3378)
==9261==    by 0x428CA0: execpline2 (exec.c:1697)
==9261==    by 0x427FD2: execpline (exec.c:1484)
==9261==    by 0x42779A: execlist (exec.c:1275)
==9261==    by 0x42717C: execode (exec.c:1073)
==9261==    by 0x431299: runshfunc (exec.c:5040)
==9261==    by 0x430E76: doshfunc (exec.c:4920)
==9261==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9261== 
==9261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9297== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9297-by-pythonnut-on-???
==9297== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9297-by-pythonnut-on-???
==9297== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9297-by-pythonnut-on-???
==9297== 
==9297== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9297== don't want to do, unless you know exactly what you're doing,
==9297== or are doing some strange experiment):
==9297==   /usr/lib/valgrind/../../bin/vgdb --pid=9297 ...command...
==9297== 
==9297== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9297==   /path/to/gdb ./zsh
==9297== and then give GDB the following command
==9297==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9297
==9297== --pid is optional if only one valgrind process is running
==9297== 
--9297-- Caught __NR_exit; running __libc_freeres()
--9297-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9297== 
==9297== HEAP SUMMARY:
==9297==     in use at exit: 3,130,729 bytes in 69,276 blocks
==9297==   total heap usage: 927,394 allocs, 858,118 frees, 65,446,267 bytes allocated
==9297== 
==9297== Searching for pointers to 69,276 not-freed blocks
--9297--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9297--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9297--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9297--   Scanning root segment: 0x4037000..0x403afff (16384)
--9297--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9297--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9297--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9297--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9297--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9297--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9297--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9297--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9297--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9297--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9297--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9297--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9297--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9297--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9297--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9297--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9297--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9297--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9297--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9297--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9297--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9297--   Scanning root segment: 0x701a000..0x701afff (4096)
--9297--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9297--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9297--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9297--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9297--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9297--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9297--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9297--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9297--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9297== Checked 4,802,320 bytes
==9297== 
==9297== LEAK SUMMARY:
==9297==    definitely lost: 1,533 bytes in 8 blocks
==9297==    indirectly lost: 6,756 bytes in 7 blocks
==9297==      possibly lost: 0 bytes in 0 blocks
==9297==    still reachable: 3,122,440 bytes in 69,261 blocks
==9297==         suppressed: 0 bytes in 0 blocks
==9297== Rerun with --leak-check=full to see details of leaked memory
==9297== 
==9297== Use --track-origins=yes to see where uninitialised values come from
==9297== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9297== 
==9297== 1 errors in context 1 of 2:
==9297== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9297==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9297==    by 0x488CD0: stringsubst (subst.c:301)
==9297==    by 0x48801B: prefork (subst.c:77)
==9297==    by 0x42B318: execcmd (exec.c:2619)
==9297==    by 0x428CA0: execpline2 (exec.c:1697)
==9297==    by 0x427FD2: execpline (exec.c:1484)
==9297==    by 0x427756: execlist (exec.c:1267)
==9297==    by 0x42717C: execode (exec.c:1073)
==9297==    by 0x431299: runshfunc (exec.c:5040)
==9297==    by 0x430E76: doshfunc (exec.c:4920)
==9297==    by 0x4302FB: execshfunc (exec.c:4557)
==9297==    by 0x42D8C1: execcmd (exec.c:3373)
==9297== 
==9297== 
==9297== 2 errors in context 2 of 2:
==9297== Conditional jump or move depends on uninitialised value(s)
==9297==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9297==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9297==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9297==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9297==    by 0x42D8E9: execcmd (exec.c:3378)
==9297==    by 0x428CA0: execpline2 (exec.c:1697)
==9297==    by 0x427FD2: execpline (exec.c:1484)
==9297==    by 0x42779A: execlist (exec.c:1275)
==9297==    by 0x42717C: execode (exec.c:1073)
==9297==    by 0x431299: runshfunc (exec.c:5040)
==9297==    by 0x430E76: doshfunc (exec.c:4920)
==9297==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9297== 
==9297== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9298== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9298-by-pythonnut-on-???
==9298== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9298-by-pythonnut-on-???
==9298== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9298-by-pythonnut-on-???
==9298== 
==9298== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9298== don't want to do, unless you know exactly what you're doing,
==9298== or are doing some strange experiment):
==9298==   /usr/lib/valgrind/../../bin/vgdb --pid=9298 ...command...
==9298== 
==9298== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9298==   /path/to/gdb ./zsh
==9298== and then give GDB the following command
==9298==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9298
==9298== --pid is optional if only one valgrind process is running
==9298== 
--9298-- Caught __NR_exit; running __libc_freeres()
--9298-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9298== 
==9298== HEAP SUMMARY:
==9298==     in use at exit: 3,130,873 bytes in 69,276 blocks
==9298==   total heap usage: 927,402 allocs, 858,126 frees, 65,449,323 bytes allocated
==9298== 
==9298== Searching for pointers to 69,276 not-freed blocks
--9298--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9298--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9298--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9298--   Scanning root segment: 0x4037000..0x403afff (16384)
--9298--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9298--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9298--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9298--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9298--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9298--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9298--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9298--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9298--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9298--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9298--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9298--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9298--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9298--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9298--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9298--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9298--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9298--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9298--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9298--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9298--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9298--   Scanning root segment: 0x701a000..0x701afff (4096)
--9298--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9298--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9298--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9298--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9298--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9298--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9298--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9298--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9298--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9298== Checked 4,803,816 bytes
==9298== 
==9298== LEAK SUMMARY:
==9298==    definitely lost: 1,533 bytes in 8 blocks
==9298==    indirectly lost: 6,756 bytes in 7 blocks
==9298==      possibly lost: 0 bytes in 0 blocks
==9298==    still reachable: 3,122,584 bytes in 69,261 blocks
==9298==         suppressed: 0 bytes in 0 blocks
==9298== Rerun with --leak-check=full to see details of leaked memory
==9298== 
==9298== Use --track-origins=yes to see where uninitialised values come from
==9298== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9298== 
==9298== 1 errors in context 1 of 2:
==9298== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9298==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9298==    by 0x488CD0: stringsubst (subst.c:301)
==9298==    by 0x48801B: prefork (subst.c:77)
==9298==    by 0x42B318: execcmd (exec.c:2619)
==9298==    by 0x428CA0: execpline2 (exec.c:1697)
==9298==    by 0x427FD2: execpline (exec.c:1484)
==9298==    by 0x427756: execlist (exec.c:1267)
==9298==    by 0x42717C: execode (exec.c:1073)
==9298==    by 0x431299: runshfunc (exec.c:5040)
==9298==    by 0x430E76: doshfunc (exec.c:4920)
==9298==    by 0x4302FB: execshfunc (exec.c:4557)
==9298==    by 0x42D8C1: execcmd (exec.c:3373)
==9298== 
==9298== 
==9298== 2 errors in context 2 of 2:
==9298== Conditional jump or move depends on uninitialised value(s)
==9298==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9298==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9298==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9298==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9298==    by 0x42D8E9: execcmd (exec.c:3378)
==9298==    by 0x428CA0: execpline2 (exec.c:1697)
==9298==    by 0x427FD2: execpline (exec.c:1484)
==9298==    by 0x42779A: execlist (exec.c:1275)
==9298==    by 0x42717C: execode (exec.c:1073)
==9298==    by 0x431299: runshfunc (exec.c:5040)
==9298==    by 0x430E76: doshfunc (exec.c:4920)
==9298==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9298== 
==9298== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9299== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9299-by-pythonnut-on-???
==9299== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9299-by-pythonnut-on-???
==9299== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9299-by-pythonnut-on-???
==9299== 
==9299== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9299== don't want to do, unless you know exactly what you're doing,
==9299== or are doing some strange experiment):
==9299==   /usr/lib/valgrind/../../bin/vgdb --pid=9299 ...command...
==9299== 
==9299== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9299==   /path/to/gdb ./zsh
==9299== and then give GDB the following command
==9299==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9299
==9299== --pid is optional if only one valgrind process is running
==9299== 
--9299-- Caught __NR_exit; running __libc_freeres()
--9299-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9299== 
==9299== HEAP SUMMARY:
==9299==     in use at exit: 3,130,749 bytes in 69,276 blocks
==9299==   total heap usage: 927,898 allocs, 858,622 frees, 65,491,670 bytes allocated
==9299== 
==9299== Searching for pointers to 69,276 not-freed blocks
--9299--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9299--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9299--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9299--   Scanning root segment: 0x4037000..0x403afff (16384)
--9299--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9299--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9299--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9299--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9299--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9299--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9299--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9299--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9299--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9299--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9299--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9299--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9299--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9299--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9299--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9299--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9299--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9299--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9299--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9299--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9299--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9299--   Scanning root segment: 0x701a000..0x701afff (4096)
--9299--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9299--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9299--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9299--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9299--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9299--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9299--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9299--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9299--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9299== Checked 4,802,336 bytes
==9299== 
==9299== LEAK SUMMARY:
==9299==    definitely lost: 1,533 bytes in 8 blocks
==9299==    indirectly lost: 6,756 bytes in 7 blocks
==9299==      possibly lost: 0 bytes in 0 blocks
==9299==    still reachable: 3,122,460 bytes in 69,261 blocks
==9299==         suppressed: 0 bytes in 0 blocks
==9299== Rerun with --leak-check=full to see details of leaked memory
==9299== 
==9299== Use --track-origins=yes to see where uninitialised values come from
==9299== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9299== 
==9299== 1 errors in context 1 of 2:
==9299== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9299==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9299==    by 0x488CD0: stringsubst (subst.c:301)
==9299==    by 0x48801B: prefork (subst.c:77)
==9299==    by 0x42B318: execcmd (exec.c:2619)
==9299==    by 0x428CA0: execpline2 (exec.c:1697)
==9299==    by 0x427FD2: execpline (exec.c:1484)
==9299==    by 0x427756: execlist (exec.c:1267)
==9299==    by 0x42717C: execode (exec.c:1073)
==9299==    by 0x431299: runshfunc (exec.c:5040)
==9299==    by 0x430E76: doshfunc (exec.c:4920)
==9299==    by 0x4302FB: execshfunc (exec.c:4557)
==9299==    by 0x42D8C1: execcmd (exec.c:3373)
==9299== 
==9299== 
==9299== 2 errors in context 2 of 2:
==9299== Conditional jump or move depends on uninitialised value(s)
==9299==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9299==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9299==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9299==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9299==    by 0x42D8E9: execcmd (exec.c:3378)
==9299==    by 0x428CA0: execpline2 (exec.c:1697)
==9299==    by 0x427FD2: execpline (exec.c:1484)
==9299==    by 0x42779A: execlist (exec.c:1275)
==9299==    by 0x42717C: execode (exec.c:1073)
==9299==    by 0x431299: runshfunc (exec.c:5040)
==9299==    by 0x430E76: doshfunc (exec.c:4920)
==9299==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9299== 
==9299== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9300== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9300-by-pythonnut-on-???
==9300== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9300-by-pythonnut-on-???
==9300== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9300-by-pythonnut-on-???
==9300== 
==9300== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9300== don't want to do, unless you know exactly what you're doing,
==9300== or are doing some strange experiment):
==9300==   /usr/lib/valgrind/../../bin/vgdb --pid=9300 ...command...
==9300== 
==9300== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9300==   /path/to/gdb ./zsh
==9300== and then give GDB the following command
==9300==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9300
==9300== --pid is optional if only one valgrind process is running
==9300== 
--9300-- Caught __NR_exit; running __libc_freeres()
--9300-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9300== 
==9300== HEAP SUMMARY:
==9300==     in use at exit: 3,130,892 bytes in 69,276 blocks
==9300==   total heap usage: 927,906 allocs, 858,630 frees, 65,494,726 bytes allocated
==9300== 
==9300== Searching for pointers to 69,276 not-freed blocks
--9300--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9300--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9300--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9300--   Scanning root segment: 0x4037000..0x403afff (16384)
--9300--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9300--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9300--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9300--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9300--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9300--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9300--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9300--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9300--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9300--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9300--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9300--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9300--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9300--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9300--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9300--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9300--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9300--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9300--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9300--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9300--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9300--   Scanning root segment: 0x701a000..0x701afff (4096)
--9300--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9300--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9300--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9300--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9300--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9300--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9300--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9300--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9300--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9300== Checked 4,803,832 bytes
==9300== 
==9300== LEAK SUMMARY:
==9300==    definitely lost: 1,533 bytes in 8 blocks
==9300==    indirectly lost: 6,756 bytes in 7 blocks
==9300==      possibly lost: 0 bytes in 0 blocks
==9300==    still reachable: 3,122,603 bytes in 69,261 blocks
==9300==         suppressed: 0 bytes in 0 blocks
==9300== Rerun with --leak-check=full to see details of leaked memory
==9300== 
==9300== Use --track-origins=yes to see where uninitialised values come from
==9300== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9300== 
==9300== 1 errors in context 1 of 2:
==9300== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9300==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9300==    by 0x488CD0: stringsubst (subst.c:301)
==9300==    by 0x48801B: prefork (subst.c:77)
==9300==    by 0x42B318: execcmd (exec.c:2619)
==9300==    by 0x428CA0: execpline2 (exec.c:1697)
==9300==    by 0x427FD2: execpline (exec.c:1484)
==9300==    by 0x427756: execlist (exec.c:1267)
==9300==    by 0x42717C: execode (exec.c:1073)
==9300==    by 0x431299: runshfunc (exec.c:5040)
==9300==    by 0x430E76: doshfunc (exec.c:4920)
==9300==    by 0x4302FB: execshfunc (exec.c:4557)
==9300==    by 0x42D8C1: execcmd (exec.c:3373)
==9300== 
==9300== 
==9300== 2 errors in context 2 of 2:
==9300== Conditional jump or move depends on uninitialised value(s)
==9300==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9300==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9300==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9300==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9300==    by 0x42D8E9: execcmd (exec.c:3378)
==9300==    by 0x428CA0: execpline2 (exec.c:1697)
==9300==    by 0x427FD2: execpline (exec.c:1484)
==9300==    by 0x42779A: execlist (exec.c:1275)
==9300==    by 0x42717C: execode (exec.c:1073)
==9300==    by 0x431299: runshfunc (exec.c:5040)
==9300==    by 0x430E76: doshfunc (exec.c:4920)
==9300==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9300== 
==9300== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9303== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9303-by-pythonnut-on-???
==9303== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9303-by-pythonnut-on-???
==9303== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9303-by-pythonnut-on-???
==9303== 
==9303== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9303== don't want to do, unless you know exactly what you're doing,
==9303== or are doing some strange experiment):
==9303==   /usr/lib/valgrind/../../bin/vgdb --pid=9303 ...command...
==9303== 
==9303== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9303==   /path/to/gdb ./zsh
==9303== and then give GDB the following command
==9303==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9303
==9303== --pid is optional if only one valgrind process is running
==9303== 
--9304-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==9304== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9304-by-pythonnut-on-???
==9304== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9304-by-pythonnut-on-???
==9304== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9304-by-pythonnut-on-???
==9304== 
==9304== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9304== don't want to do, unless you know exactly what you're doing,
==9304== or are doing some strange experiment):
==9304==   /usr/lib/valgrind/../../bin/vgdb --pid=9304 ...command...
==9304== 
==9304== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9304==   /path/to/gdb ./zsh
==9304== and then give GDB the following command
==9304==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9304
==9304== --pid is optional if only one valgrind process is running
==9304== 
--9304-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9304== 
==9304== HEAP SUMMARY:
==9304==     in use at exit: 3,111,044 bytes in 68,842 blocks
==9304==   total heap usage: 928,186 allocs, 859,344 frees, 65,531,250 bytes allocated
==9304== 
==9304== Searching for pointers to 68,842 not-freed blocks
--9304--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9304--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9304--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9304--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9304--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9304--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9304--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9304--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9304--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9304--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9304--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9304--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9304--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9304--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9304--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9304--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9304--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9304--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9304--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9304--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9304--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9304--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9304--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9304--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9304--   Scanning root segment: 0x701a000..0x701afff (4096)
--9304--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9304--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9304--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9304--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9304--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9304--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9304--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9304--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9304--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9304== Checked 4,754,112 bytes
==9304== 
==9304== LEAK SUMMARY:
==9304==    definitely lost: 1,533 bytes in 8 blocks
==9304==    indirectly lost: 6,756 bytes in 7 blocks
==9304==      possibly lost: 0 bytes in 0 blocks
==9304==    still reachable: 3,102,755 bytes in 68,827 blocks
==9304==         suppressed: 0 bytes in 0 blocks
==9304== Rerun with --leak-check=full to see details of leaked memory
==9304== 
==9304== Use --track-origins=yes to see where uninitialised values come from
==9304== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9304== 
==9304== 1 errors in context 1 of 2:
==9304== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9304==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9304==    by 0x488CD0: stringsubst (subst.c:301)
==9304==    by 0x48801B: prefork (subst.c:77)
==9304==    by 0x42B318: execcmd (exec.c:2619)
==9304==    by 0x428CA0: execpline2 (exec.c:1697)
==9304==    by 0x427FD2: execpline (exec.c:1484)
==9304==    by 0x427756: execlist (exec.c:1267)
==9304==    by 0x42717C: execode (exec.c:1073)
==9304==    by 0x431299: runshfunc (exec.c:5040)
==9304==    by 0x430E76: doshfunc (exec.c:4920)
==9304==    by 0x4302FB: execshfunc (exec.c:4557)
==9304==    by 0x42D8C1: execcmd (exec.c:3373)
==9304== 
==9304== 
==9304== 2 errors in context 2 of 2:
==9304== Conditional jump or move depends on uninitialised value(s)
==9304==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9304==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9304==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9304==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9304==    by 0x42D8E9: execcmd (exec.c:3378)
==9304==    by 0x428CA0: execpline2 (exec.c:1697)
==9304==    by 0x427FD2: execpline (exec.c:1484)
==9304==    by 0x42779A: execlist (exec.c:1275)
==9304==    by 0x42717C: execode (exec.c:1073)
==9304==    by 0x431299: runshfunc (exec.c:5040)
==9304==    by 0x430E76: doshfunc (exec.c:4920)
==9304==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9304== 
==9304== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9303-- Caught __NR_exit; running __libc_freeres()
--9303-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9303== 
==9303== HEAP SUMMARY:
==9303==     in use at exit: 3,110,685 bytes in 68,832 blocks
==9303==   total heap usage: 928,189 allocs, 859,357 frees, 65,531,890 bytes allocated
==9303== 
==9303== Searching for pointers to 68,832 not-freed blocks
--9303--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9303--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9303--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9303--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9303--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9303--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9303--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9303--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9303--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9303--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9303--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9303--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9303--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9303--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9303--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9303--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9303--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9303--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9303--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9303--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9303--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9303--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9303--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9303--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9303--   Scanning root segment: 0x701a000..0x701afff (4096)
--9303--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9303--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9303--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9303--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9303--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9303--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9303--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9303--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9303--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9303== Checked 4,751,792 bytes
==9303== 
==9303== LEAK SUMMARY:
==9303==    definitely lost: 1,533 bytes in 8 blocks
==9303==    indirectly lost: 6,756 bytes in 7 blocks
==9303==      possibly lost: 0 bytes in 0 blocks
==9303==    still reachable: 3,102,396 bytes in 68,817 blocks
==9303==         suppressed: 0 bytes in 0 blocks
==9303== Rerun with --leak-check=full to see details of leaked memory
==9303== 
==9303== Use --track-origins=yes to see where uninitialised values come from
==9303== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9303== 
==9303== 1 errors in context 1 of 2:
==9303== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9303==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9303==    by 0x488CD0: stringsubst (subst.c:301)
==9303==    by 0x48801B: prefork (subst.c:77)
==9303==    by 0x42B318: execcmd (exec.c:2619)
==9303==    by 0x428CA0: execpline2 (exec.c:1697)
==9303==    by 0x427FD2: execpline (exec.c:1484)
==9303==    by 0x427756: execlist (exec.c:1267)
==9303==    by 0x42717C: execode (exec.c:1073)
==9303==    by 0x431299: runshfunc (exec.c:5040)
==9303==    by 0x430E76: doshfunc (exec.c:4920)
==9303==    by 0x4302FB: execshfunc (exec.c:4557)
==9303==    by 0x42D8C1: execcmd (exec.c:3373)
==9303== 
==9303== 
==9303== 2 errors in context 2 of 2:
==9303== Conditional jump or move depends on uninitialised value(s)
==9303==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9303==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9303==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9303==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9303==    by 0x42D8E9: execcmd (exec.c:3378)
==9303==    by 0x428CA0: execpline2 (exec.c:1697)
==9303==    by 0x427FD2: execpline (exec.c:1484)
==9303==    by 0x42779A: execlist (exec.c:1275)
==9303==    by 0x42717C: execode (exec.c:1073)
==9303==    by 0x431299: runshfunc (exec.c:5040)
==9303==    by 0x430E76: doshfunc (exec.c:4920)
==9303==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9303== 
==9303== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9307-- Caught __NR_exit; running __libc_freeres()
==9307== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9307-by-pythonnut-on-???
==9307== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9307-by-pythonnut-on-???
==9307== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9307-by-pythonnut-on-???
==9307== 
==9307== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9307== don't want to do, unless you know exactly what you're doing,
==9307== or are doing some strange experiment):
==9307==   /usr/lib/valgrind/../../bin/vgdb --pid=9307 ...command...
==9307== 
==9307== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9307==   /path/to/gdb ./zsh
==9307== and then give GDB the following command
==9307==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9307
==9307== --pid is optional if only one valgrind process is running
==9307== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
--9307-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9307== 
==9307== HEAP SUMMARY:
==9307==     in use at exit: 3,111,401 bytes in 68,846 blocks
==9307==   total heap usage: 928,222 allocs, 859,376 frees, 65,544,646 bytes allocated
==9307== 
==9307== Searching for pointers to 68,846 not-freed blocks
--9307--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9307--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9307--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9307--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9307--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9307--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9307--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9307--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9307--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9307--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9307--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9307--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9307--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9307--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9307--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9307--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9307--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9307--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9307--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9307--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9307--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9307--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9307--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9307--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9307--   Scanning root segment: 0x701a000..0x701afff (4096)
--9307--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9307--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9307--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9307--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9307--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9307--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9307--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9307--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9307--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9307== Checked 4,756,424 bytes
==9307== 
==9307== LEAK SUMMARY:
==9307==    definitely lost: 1,533 bytes in 8 blocks
==9307==    indirectly lost: 6,756 bytes in 7 blocks
==9307==      possibly lost: 0 bytes in 0 blocks
==9307==    still reachable: 3,103,112 bytes in 68,831 blocks
==9307==         suppressed: 0 bytes in 0 blocks
==9307== Rerun with --leak-check=full to see details of leaked memory
==9307== 
==9307== Use --track-origins=yes to see where uninitialised values come from
==9307== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9307== 
==9307== 1 errors in context 1 of 2:
==9307== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9307==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9307==    by 0x488CD0: stringsubst (subst.c:301)
==9307==    by 0x48801B: prefork (subst.c:77)
==9307==    by 0x42B318: execcmd (exec.c:2619)
==9307==    by 0x428CA0: execpline2 (exec.c:1697)
==9307==    by 0x427FD2: execpline (exec.c:1484)
==9307==    by 0x427756: execlist (exec.c:1267)
==9307==    by 0x42717C: execode (exec.c:1073)
==9307==    by 0x431299: runshfunc (exec.c:5040)
==9307==    by 0x430E76: doshfunc (exec.c:4920)
==9307==    by 0x4302FB: execshfunc (exec.c:4557)
==9307==    by 0x42D8C1: execcmd (exec.c:3373)
==9307== 
==9307== 
==9307== 2 errors in context 2 of 2:
==9307== Conditional jump or move depends on uninitialised value(s)
==9307==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9307==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9307==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9307==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9307==    by 0x42D8E9: execcmd (exec.c:3378)
==9307==    by 0x428CA0: execpline2 (exec.c:1697)
==9307==    by 0x427FD2: execpline (exec.c:1484)
==9307==    by 0x42779A: execlist (exec.c:1275)
==9307==    by 0x42717C: execode (exec.c:1073)
==9307==    by 0x431299: runshfunc (exec.c:5040)
==9307==    by 0x430E76: doshfunc (exec.c:4920)
==9307==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9307== 
==9307== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9306-- Caught __NR_exit; running __libc_freeres()
==9306== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9306-by-pythonnut-on-???
==9306== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9306-by-pythonnut-on-???
==9306== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9306-by-pythonnut-on-???
==9306== 
==9306== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9306== don't want to do, unless you know exactly what you're doing,
==9306== or are doing some strange experiment):
==9306==   /usr/lib/valgrind/../../bin/vgdb --pid=9306 ...command...
==9306== 
==9306== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9306==   /path/to/gdb ./zsh
==9306== and then give GDB the following command
==9306==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9306
==9306== --pid is optional if only one valgrind process is running
==9306== 
--9306-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9306== 
==9306== HEAP SUMMARY:
==9306==     in use at exit: 3,111,369 bytes in 68,846 blocks
==9306==   total heap usage: 928,226 allocs, 859,380 frees, 65,544,182 bytes allocated
==9306== 
==9306== Searching for pointers to 68,846 not-freed blocks
--9306--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9306--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9306--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9306--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9306--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9306--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9306--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9306--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9306--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9306--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9306--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9306--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9306--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9306--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9306--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9306--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9306--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9306--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9306--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9306--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9306--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9306--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9306--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9306--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9306--   Scanning root segment: 0x701a000..0x701afff (4096)
--9306--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9306--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9306--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9306--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9306--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9306--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9306--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9306--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9306--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9306== Checked 4,756,088 bytes
==9306== 
==9306== LEAK SUMMARY:
==9306==    definitely lost: 1,533 bytes in 8 blocks
==9306==    indirectly lost: 6,756 bytes in 7 blocks
==9306==      possibly lost: 0 bytes in 0 blocks
==9306==    still reachable: 3,103,080 bytes in 68,831 blocks
==9306==         suppressed: 0 bytes in 0 blocks
==9306== Rerun with --leak-check=full to see details of leaked memory
==9306== 
==9306== Use --track-origins=yes to see where uninitialised values come from
==9306== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9306== 
==9306== 1 errors in context 1 of 2:
==9306== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9306==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9306==    by 0x488CD0: stringsubst (subst.c:301)
==9306==    by 0x48801B: prefork (subst.c:77)
==9306==    by 0x42B318: execcmd (exec.c:2619)
==9306==    by 0x428CA0: execpline2 (exec.c:1697)
==9306==    by 0x427FD2: execpline (exec.c:1484)
==9306==    by 0x427756: execlist (exec.c:1267)
==9306==    by 0x42717C: execode (exec.c:1073)
==9306==    by 0x431299: runshfunc (exec.c:5040)
==9306==    by 0x430E76: doshfunc (exec.c:4920)
==9306==    by 0x4302FB: execshfunc (exec.c:4557)
==9306==    by 0x42D8C1: execcmd (exec.c:3373)
==9306== 
==9306== 
==9306== 2 errors in context 2 of 2:
==9306== Conditional jump or move depends on uninitialised value(s)
==9306==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9306==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9306==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9306==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9306==    by 0x42D8E9: execcmd (exec.c:3378)
==9306==    by 0x428CA0: execpline2 (exec.c:1697)
==9306==    by 0x427FD2: execpline (exec.c:1484)
==9306==    by 0x42779A: execlist (exec.c:1275)
==9306==    by 0x42717C: execode (exec.c:1073)
==9306==    by 0x431299: runshfunc (exec.c:5040)
==9306==    by 0x430E76: doshfunc (exec.c:4920)
==9306==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9306== 
==9306== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--9310-- Caught __NR_exit; running __libc_freeres()
==9310== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9310-by-pythonnut-on-???
==9310== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9310-by-pythonnut-on-???
==9310== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9310-by-pythonnut-on-???
==9310== 
==9310== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9310== don't want to do, unless you know exactly what you're doing,
==9310== or are doing some strange experiment):
==9310==   /usr/lib/valgrind/../../bin/vgdb --pid=9310 ...command...
==9310== 
==9310== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9310==   /path/to/gdb ./zsh
==9310== and then give GDB the following command
==9310==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9310
==9310== --pid is optional if only one valgrind process is running
==9310== 
--9310-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9310== 
==9310== HEAP SUMMARY:
==9310==     in use at exit: 3,111,620 bytes in 68,851 blocks
==9310==   total heap usage: 928,237 allocs, 859,386 frees, 65,549,290 bytes allocated
==9310== 
==9310== Searching for pointers to 68,851 not-freed blocks
--9310--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9310--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9310--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9310--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9310--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9310--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9310--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9310--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9310--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9310--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9310--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9310--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9310--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9310--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9310--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9310--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9310--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9310--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9310--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9310--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9310--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9310--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9310--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9310--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9310--   Scanning root segment: 0x701a000..0x701afff (4096)
--9310--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9310--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9310--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9310--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9310--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9310--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9310--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9310--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9310--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9310== Checked 4,754,784 bytes
==9310== 
==9310== LEAK SUMMARY:
==9310==    definitely lost: 1,533 bytes in 8 blocks
==9310==    indirectly lost: 6,756 bytes in 7 blocks
==9310==      possibly lost: 0 bytes in 0 blocks
==9310==    still reachable: 3,103,331 bytes in 68,836 blocks
==9310==         suppressed: 0 bytes in 0 blocks
==9310== Rerun with --leak-check=full to see details of leaked memory
==9310== 
==9310== Use --track-origins=yes to see where uninitialised values come from
==9310== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9310== 
==9310== 1 errors in context 1 of 2:
==9310== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9310==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9310==    by 0x488CD0: stringsubst (subst.c:301)
==9310==    by 0x48801B: prefork (subst.c:77)
==9310==    by 0x42B318: execcmd (exec.c:2619)
==9310==    by 0x428CA0: execpline2 (exec.c:1697)
==9310==    by 0x427FD2: execpline (exec.c:1484)
==9310==    by 0x427756: execlist (exec.c:1267)
==9310==    by 0x42717C: execode (exec.c:1073)
==9310==    by 0x431299: runshfunc (exec.c:5040)
==9310==    by 0x430E76: doshfunc (exec.c:4920)
==9310==    by 0x4302FB: execshfunc (exec.c:4557)
==9310==    by 0x42D8C1: execcmd (exec.c:3373)
==9310== 
==9310== 
==9310== 2 errors in context 2 of 2:
==9310== Conditional jump or move depends on uninitialised value(s)
==9310==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9310==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9310==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9310==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9310==    by 0x42D8E9: execcmd (exec.c:3378)
==9310==    by 0x428CA0: execpline2 (exec.c:1697)
==9310==    by 0x427FD2: execpline (exec.c:1484)
==9310==    by 0x42779A: execlist (exec.c:1275)
==9310==    by 0x42717C: execode (exec.c:1073)
==9310==    by 0x431299: runshfunc (exec.c:5040)
==9310==    by 0x430E76: doshfunc (exec.c:4920)
==9310==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9310== 
==9310== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9314-- Caught __NR_exit; running __libc_freeres()
==9314== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9314-by-pythonnut-on-???
==9314== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9314-by-pythonnut-on-???
==9314== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9314-by-pythonnut-on-???
==9314== 
==9314== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9314== don't want to do, unless you know exactly what you're doing,
==9314== or are doing some strange experiment):
==9314==   /usr/lib/valgrind/../../bin/vgdb --pid=9314 ...command...
==9314== 
==9314== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9314==   /path/to/gdb ./zsh
==9314== and then give GDB the following command
==9314==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9314
==9314== --pid is optional if only one valgrind process is running
==9314== 
--9314-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9314== 
==9314== HEAP SUMMARY:
==9314==     in use at exit: 3,111,727 bytes in 68,855 blocks
==9314==   total heap usage: 928,245 allocs, 859,390 frees, 65,551,509 bytes allocated
==9314== 
==9314== Searching for pointers to 68,855 not-freed blocks
--9314--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9314--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9314--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9314--   Scanning root segment: 0x4037000..0x403afff (16384)
--9314--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9314--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9314--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9314--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9314--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9314--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9314--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9314--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9314--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9314--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9314--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9314--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9314--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9314--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9314--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9314--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9314--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9314--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9314--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9314--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9314--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9314--   Scanning root segment: 0x701a000..0x701afff (4096)
--9314--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9314--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9314--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9314--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9314--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9314--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9314--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9314--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9314--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9314== Checked 4,771,536 bytes
==9314== 
==9314== LEAK SUMMARY:
==9314==    definitely lost: 1,533 bytes in 8 blocks
==9314==    indirectly lost: 6,756 bytes in 7 blocks
==9314==      possibly lost: 0 bytes in 0 blocks
==9314==    still reachable: 3,103,438 bytes in 68,840 blocks
==9314==         suppressed: 0 bytes in 0 blocks
==9314== Rerun with --leak-check=full to see details of leaked memory
==9314== 
==9314== Use --track-origins=yes to see where uninitialised values come from
==9314== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9314== 
==9314== 1 errors in context 1 of 2:
==9314== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9314==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9314==    by 0x488CD0: stringsubst (subst.c:301)
==9314==    by 0x48801B: prefork (subst.c:77)
==9314==    by 0x42B318: execcmd (exec.c:2619)
==9314==    by 0x428CA0: execpline2 (exec.c:1697)
==9314==    by 0x427FD2: execpline (exec.c:1484)
==9314==    by 0x427756: execlist (exec.c:1267)
==9314==    by 0x42717C: execode (exec.c:1073)
==9314==    by 0x431299: runshfunc (exec.c:5040)
==9314==    by 0x430E76: doshfunc (exec.c:4920)
==9314==    by 0x4302FB: execshfunc (exec.c:4557)
==9314==    by 0x42D8C1: execcmd (exec.c:3373)
==9314== 
==9314== 
==9314== 2 errors in context 2 of 2:
==9314== Conditional jump or move depends on uninitialised value(s)
==9314==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9314==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9314==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9314==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9314==    by 0x42D8E9: execcmd (exec.c:3378)
==9314==    by 0x428CA0: execpline2 (exec.c:1697)
==9314==    by 0x427FD2: execpline (exec.c:1484)
==9314==    by 0x42779A: execlist (exec.c:1275)
==9314==    by 0x42717C: execode (exec.c:1073)
==9314==    by 0x431299: runshfunc (exec.c:5040)
==9314==    by 0x430E76: doshfunc (exec.c:4920)
==9314==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9314== 
==9314== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--9318-- Caught __NR_exit; running __libc_freeres()
==9318== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9318-by-pythonnut-on-???
==9318== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9318-by-pythonnut-on-???
==9318== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9318-by-pythonnut-on-???
==9318== 
==9318== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9318== don't want to do, unless you know exactly what you're doing,
==9318== or are doing some strange experiment):
==9318==   /usr/lib/valgrind/../../bin/vgdb --pid=9318 ...command...
==9318== 
==9318== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9318==   /path/to/gdb ./zsh
==9318== and then give GDB the following command
==9318==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9318
==9318== --pid is optional if only one valgrind process is running
==9318== 
--9318-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9318== 
==9318== HEAP SUMMARY:
==9318==     in use at exit: 3,111,034 bytes in 68,840 blocks
==9318==   total heap usage: 928,295 allocs, 859,455 frees, 65,558,062 bytes allocated
==9318== 
==9318== Searching for pointers to 68,840 not-freed blocks
--9318--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9318--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9318--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9318--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9318--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9318--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9318--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9318--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9318--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9318--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9318--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9318--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9318--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9318--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9318--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9318--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9318--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9318--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9318--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9318--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9318--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9318--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9318--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9318--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9318--   Scanning root segment: 0x701a000..0x701afff (4096)
--9318--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9318--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9318--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9318--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9318--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9318--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9318--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9318--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9318--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9318== Checked 4,771,696 bytes
==9318== 
==9318== LEAK SUMMARY:
==9318==    definitely lost: 1,533 bytes in 8 blocks
==9318==    indirectly lost: 6,756 bytes in 7 blocks
==9318==      possibly lost: 0 bytes in 0 blocks
==9318==    still reachable: 3,102,745 bytes in 68,825 blocks
==9318==         suppressed: 0 bytes in 0 blocks
==9318== Rerun with --leak-check=full to see details of leaked memory
==9318== 
==9318== Use --track-origins=yes to see where uninitialised values come from
==9318== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9318== 
==9318== 1 errors in context 1 of 2:
==9318== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9318==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9318==    by 0x488CD0: stringsubst (subst.c:301)
==9318==    by 0x48801B: prefork (subst.c:77)
==9318==    by 0x42B318: execcmd (exec.c:2619)
==9318==    by 0x428CA0: execpline2 (exec.c:1697)
==9318==    by 0x427FD2: execpline (exec.c:1484)
==9318==    by 0x427756: execlist (exec.c:1267)
==9318==    by 0x42717C: execode (exec.c:1073)
==9318==    by 0x431299: runshfunc (exec.c:5040)
==9318==    by 0x430E76: doshfunc (exec.c:4920)
==9318==    by 0x4302FB: execshfunc (exec.c:4557)
==9318==    by 0x42D8C1: execcmd (exec.c:3373)
==9318== 
==9318== 
==9318== 2 errors in context 2 of 2:
==9318== Conditional jump or move depends on uninitialised value(s)
==9318==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9318==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9318==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9318==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9318==    by 0x42D8E9: execcmd (exec.c:3378)
==9318==    by 0x428CA0: execpline2 (exec.c:1697)
==9318==    by 0x427FD2: execpline (exec.c:1484)
==9318==    by 0x42779A: execlist (exec.c:1275)
==9318==    by 0x42717C: execode (exec.c:1073)
==9318==    by 0x431299: runshfunc (exec.c:5040)
==9318==    by 0x430E76: doshfunc (exec.c:4920)
==9318==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9318== 
==9318== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9319== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9319-by-pythonnut-on-???
==9319== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9319-by-pythonnut-on-???
==9319== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9319-by-pythonnut-on-???
==9319== 
==9319== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9319== don't want to do, unless you know exactly what you're doing,
==9319== or are doing some strange experiment):
==9319==   /usr/lib/valgrind/../../bin/vgdb --pid=9319 ...command...
==9319== 
==9319== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9319==   /path/to/gdb ./zsh
==9319== and then give GDB the following command
==9319==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9319
==9319== --pid is optional if only one valgrind process is running
==9319== 
--9319-- Caught __NR_exit; running __libc_freeres()
--9319-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9319== 
==9319== HEAP SUMMARY:
==9319==     in use at exit: 3,112,534 bytes in 68,891 blocks
==9319==   total heap usage: 928,389 allocs, 859,498 frees, 65,566,232 bytes allocated
==9319== 
==9319== Searching for pointers to 68,891 not-freed blocks
--9319--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9319--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9319--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9319--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9319--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9319--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9319--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9319--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9319--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9319--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9319--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9319--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9319--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9319--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9319--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9319--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9319--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9319--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9319--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9319--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9319--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9319--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9319--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9319--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9319--   Scanning root segment: 0x701a000..0x701afff (4096)
--9319--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9319--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9319--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9319--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9319--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9319--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9319--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9319--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9319--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9319== Checked 4,773,224 bytes
==9319== 
==9319== LEAK SUMMARY:
==9319==    definitely lost: 1,533 bytes in 8 blocks
==9319==    indirectly lost: 6,756 bytes in 7 blocks
==9319==      possibly lost: 0 bytes in 0 blocks
==9319==    still reachable: 3,104,245 bytes in 68,876 blocks
==9319==         suppressed: 0 bytes in 0 blocks
==9319== Rerun with --leak-check=full to see details of leaked memory
==9319== 
==9319== Use --track-origins=yes to see where uninitialised values come from
==9319== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9319== 
==9319== 1 errors in context 1 of 2:
==9319== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9319==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9319==    by 0x488CD0: stringsubst (subst.c:301)
==9319==    by 0x48801B: prefork (subst.c:77)
==9319==    by 0x42B318: execcmd (exec.c:2619)
==9319==    by 0x428CA0: execpline2 (exec.c:1697)
==9319==    by 0x427FD2: execpline (exec.c:1484)
==9319==    by 0x427756: execlist (exec.c:1267)
==9319==    by 0x42717C: execode (exec.c:1073)
==9319==    by 0x431299: runshfunc (exec.c:5040)
==9319==    by 0x430E76: doshfunc (exec.c:4920)
==9319==    by 0x4302FB: execshfunc (exec.c:4557)
==9319==    by 0x42D8C1: execcmd (exec.c:3373)
==9319== 
==9319== 
==9319== 2 errors in context 2 of 2:
==9319== Conditional jump or move depends on uninitialised value(s)
==9319==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9319==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9319==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9319==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9319==    by 0x42D8E9: execcmd (exec.c:3378)
==9319==    by 0x428CA0: execpline2 (exec.c:1697)
==9319==    by 0x427FD2: execpline (exec.c:1484)
==9319==    by 0x42779A: execlist (exec.c:1275)
==9319==    by 0x42717C: execode (exec.c:1073)
==9319==    by 0x431299: runshfunc (exec.c:5040)
==9319==    by 0x430E76: doshfunc (exec.c:4920)
==9319==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9319== 
==9319== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9320== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9320-by-pythonnut-on-???
==9320== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9320-by-pythonnut-on-???
==9320== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9320-by-pythonnut-on-???
==9320== 
==9320== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9320== don't want to do, unless you know exactly what you're doing,
==9320== or are doing some strange experiment):
==9320==   /usr/lib/valgrind/../../bin/vgdb --pid=9320 ...command...
==9320== 
==9320== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9320==   /path/to/gdb ./zsh
==9320== and then give GDB the following command
==9320==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9320
==9320== --pid is optional if only one valgrind process is running
==9320== 
==9321== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9321-by-pythonnut-on-???
==9321== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9321-by-pythonnut-on-???
==9321== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9321-by-pythonnut-on-???
==9321== 
==9321== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9321== don't want to do, unless you know exactly what you're doing,
==9321== or are doing some strange experiment):
==9321==   /usr/lib/valgrind/../../bin/vgdb --pid=9321 ...command...
==9321== 
==9321== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9321==   /path/to/gdb ./zsh
==9321== and then give GDB the following command
==9321==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9321
==9321== --pid is optional if only one valgrind process is running
==9321== 
==9322== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9322-by-pythonnut-on-???
==9322== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9322-by-pythonnut-on-???
==9322== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9322-by-pythonnut-on-???
==9322== 
==9322== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9322== don't want to do, unless you know exactly what you're doing,
==9322== or are doing some strange experiment):
==9322==   /usr/lib/valgrind/../../bin/vgdb --pid=9322 ...command...
==9322== 
==9322== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9322==   /path/to/gdb ./zsh
==9322== and then give GDB the following command
==9322==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9322
==9322== --pid is optional if only one valgrind process is running
==9322== 
client request: code 4d430005,  addr 0xFFEFF0B2C,  len 4
--9322-- Caught __NR_exit; running __libc_freeres()
--9322-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9322== 
==9322== HEAP SUMMARY:
==9322==     in use at exit: 3,116,429 bytes in 68,958 blocks
==9322==   total heap usage: 928,531 allocs, 859,573 frees, 65,597,317 bytes allocated
==9322== 
==9322== Searching for pointers to 68,958 not-freed blocks
--9322--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9322--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9322--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9322--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9322--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9322--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9322--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9322--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9322--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9322--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9322--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9322--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9322--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9322--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9322--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9322--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9322--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9322--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9322--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9322--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9322--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9322--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9322--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9322--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9322--   Scanning root segment: 0x701a000..0x701afff (4096)
--9322--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9322--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9322--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9322--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9322--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9322--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9322--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9322--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9322--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9322== Checked 4,759,760 bytes
==9322== 
==9322== LEAK SUMMARY:
==9322==    definitely lost: 1,533 bytes in 8 blocks
==9322==    indirectly lost: 6,756 bytes in 7 blocks
==9322==      possibly lost: 0 bytes in 0 blocks
==9322==    still reachable: 3,108,140 bytes in 68,943 blocks
==9322==         suppressed: 0 bytes in 0 blocks
==9322== Rerun with --leak-check=full to see details of leaked memory
==9322== 
==9322== Use --track-origins=yes to see where uninitialised values come from
==9322== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9322== 
==9322== 1 errors in context 1 of 2:
==9322== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9322==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9322==    by 0x488CD0: stringsubst (subst.c:301)
==9322==    by 0x48801B: prefork (subst.c:77)
==9322==    by 0x42B318: execcmd (exec.c:2619)
==9322==    by 0x428CA0: execpline2 (exec.c:1697)
==9322==    by 0x427FD2: execpline (exec.c:1484)
==9322==    by 0x427756: execlist (exec.c:1267)
==9322==    by 0x42717C: execode (exec.c:1073)
==9322==    by 0x431299: runshfunc (exec.c:5040)
==9322==    by 0x430E76: doshfunc (exec.c:4920)
==9322==    by 0x4302FB: execshfunc (exec.c:4557)
==9322==    by 0x42D8C1: execcmd (exec.c:3373)
==9322== 
==9322== 
==9322== 2 errors in context 2 of 2:
==9322== Conditional jump or move depends on uninitialised value(s)
==9322==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9322==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9322==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9322==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9322==    by 0x42D8E9: execcmd (exec.c:3378)
==9322==    by 0x428CA0: execpline2 (exec.c:1697)
==9322==    by 0x427FD2: execpline (exec.c:1484)
==9322==    by 0x42779A: execlist (exec.c:1275)
==9322==    by 0x42717C: execode (exec.c:1073)
==9322==    by 0x431299: runshfunc (exec.c:5040)
==9322==    by 0x430E76: doshfunc (exec.c:4920)
==9322==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9322== 
==9322== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9325-- Caught __NR_exit; running __libc_freeres()
==9326== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9326-by-pythonnut-on-???
==9326== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9326-by-pythonnut-on-???
==9326== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9326-by-pythonnut-on-???
==9326== 
==9326== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9326== don't want to do, unless you know exactly what you're doing,
==9326== or are doing some strange experiment):
==9326==   /usr/lib/valgrind/../../bin/vgdb --pid=9326 ...command...
==9326== 
==9326== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9326==   /path/to/gdb ./zsh
==9326== and then give GDB the following command
==9326==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9326
==9326== --pid is optional if only one valgrind process is running
==9326== 
==9325== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9325-by-pythonnut-on-???
==9325== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9325-by-pythonnut-on-???
==9325== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9325-by-pythonnut-on-???
==9325== 
==9325== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9325== don't want to do, unless you know exactly what you're doing,
==9325== or are doing some strange experiment):
==9325==   /usr/lib/valgrind/../../bin/vgdb --pid=9325 ...command...
==9325== 
==9325== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9325==   /path/to/gdb ./zsh
==9325== and then give GDB the following command
==9325==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9325
==9325== --pid is optional if only one valgrind process is running
==9325== 
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9325-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9325== 
==9325== HEAP SUMMARY:
==9325==     in use at exit: 3,153,320 bytes in 68,966 blocks
==9325==   total heap usage: 928,539 allocs, 859,573 frees, 65,637,264 bytes allocated
==9325== 
==9325== Searching for pointers to 68,966 not-freed blocks
--9325--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9325--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9325--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9325--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9325--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9325--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9325--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9325--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9325--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9325--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9325--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9325--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9325--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9325--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9325--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9325--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9325--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9325--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9325--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9325--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9325--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9325--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9325--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9325--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9325--   Scanning root segment: 0x701a000..0x701afff (4096)
--9325--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9325--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9325--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9325--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9325--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9325--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9325--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9325--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9325--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9325== Checked 4,871,568 bytes
==9325== 
==9325== LEAK SUMMARY:
==9325==    definitely lost: 1,533 bytes in 8 blocks
==9325==    indirectly lost: 6,756 bytes in 7 blocks
==9325==      possibly lost: 0 bytes in 0 blocks
==9325==    still reachable: 3,145,031 bytes in 68,951 blocks
==9325==         suppressed: 0 bytes in 0 blocks
==9325== Rerun with --leak-check=full to see details of leaked memory
==9325== 
==9325== Use --track-origins=yes to see where uninitialised values come from
==9325== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9325== 
==9325== 1 errors in context 1 of 2:
==9325== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9325==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9325==    by 0x488CD0: stringsubst (subst.c:301)
==9325==    by 0x48801B: prefork (subst.c:77)
==9325==    by 0x42B318: execcmd (exec.c:2619)
==9325==    by 0x428CA0: execpline2 (exec.c:1697)
==9325==    by 0x427FD2: execpline (exec.c:1484)
==9325==    by 0x427756: execlist (exec.c:1267)
==9325==    by 0x42717C: execode (exec.c:1073)
==9325==    by 0x431299: runshfunc (exec.c:5040)
==9325==    by 0x430E76: doshfunc (exec.c:4920)
==9325==    by 0x4302FB: execshfunc (exec.c:4557)
==9325==    by 0x42D8C1: execcmd (exec.c:3373)
==9325== 
==9325== 
==9325== 2 errors in context 2 of 2:
==9325== Conditional jump or move depends on uninitialised value(s)
==9325==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9325==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9325==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9325==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9325==    by 0x42D8E9: execcmd (exec.c:3378)
==9325==    by 0x428CA0: execpline2 (exec.c:1697)
==9325==    by 0x427FD2: execpline (exec.c:1484)
==9325==    by 0x42779A: execlist (exec.c:1275)
==9325==    by 0x42717C: execode (exec.c:1073)
==9325==    by 0x431299: runshfunc (exec.c:5040)
==9325==    by 0x430E76: doshfunc (exec.c:4920)
==9325==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9325== 
==9325== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9324== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9324-by-pythonnut-on-???
==9324== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9324-by-pythonnut-on-???
==9324== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9324-by-pythonnut-on-???
==9324== 
==9324== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9324== don't want to do, unless you know exactly what you're doing,
==9324== or are doing some strange experiment):
==9324==   /usr/lib/valgrind/../../bin/vgdb --pid=9324 ...command...
==9324== 
==9324== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9324==   /path/to/gdb ./zsh
==9324== and then give GDB the following command
==9324==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9324
==9324== --pid is optional if only one valgrind process is running
==9324== 
--9324-- Caught __NR_exit; running __libc_freeres()
--9324-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9324== 
==9324== HEAP SUMMARY:
==9324==     in use at exit: 3,153,256 bytes in 68,963 blocks
==9324==   total heap usage: 928,541 allocs, 859,578 frees, 65,637,808 bytes allocated
==9324== 
==9324== Searching for pointers to 68,963 not-freed blocks
--9324--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9324--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9324--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9324--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9324--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9324--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9324--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9324--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9324--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9324--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9324--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9324--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9324--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9324--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9324--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9324--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9324--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9324--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9324--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9324--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9324--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9324--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9324--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9324--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9324--   Scanning root segment: 0x701a000..0x701afff (4096)
--9324--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9324--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9324--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9324--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9324--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9324--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9324--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9324--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9324--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9324== Checked 4,870,904 bytes
==9324== 
==9324== LEAK SUMMARY:
==9324==    definitely lost: 1,533 bytes in 8 blocks
==9324==    indirectly lost: 6,756 bytes in 7 blocks
==9324==      possibly lost: 0 bytes in 0 blocks
==9324==    still reachable: 3,144,967 bytes in 68,948 blocks
==9324==         suppressed: 0 bytes in 0 blocks
==9324== Rerun with --leak-check=full to see details of leaked memory
==9324== 
==9324== Use --track-origins=yes to see where uninitialised values come from
==9324== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9324== 
==9324== 1 errors in context 1 of 2:
==9324== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9324==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9324==    by 0x488CD0: stringsubst (subst.c:301)
==9324==    by 0x48801B: prefork (subst.c:77)
==9324==    by 0x42B318: execcmd (exec.c:2619)
==9324==    by 0x428CA0: execpline2 (exec.c:1697)
==9324==    by 0x427FD2: execpline (exec.c:1484)
==9324==    by 0x427756: execlist (exec.c:1267)
==9324==    by 0x42717C: execode (exec.c:1073)
==9324==    by 0x431299: runshfunc (exec.c:5040)
==9324==    by 0x430E76: doshfunc (exec.c:4920)
==9324==    by 0x4302FB: execshfunc (exec.c:4557)
==9324==    by 0x42D8C1: execcmd (exec.c:3373)
==9324== 
==9324== 
==9324== 2 errors in context 2 of 2:
==9324== Conditional jump or move depends on uninitialised value(s)
==9324==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9324==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9324==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9324==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9324==    by 0x42D8E9: execcmd (exec.c:3378)
==9324==    by 0x428CA0: execpline2 (exec.c:1697)
==9324==    by 0x427FD2: execpline (exec.c:1484)
==9324==    by 0x42779A: execlist (exec.c:1275)
==9324==    by 0x42717C: execode (exec.c:1073)
==9324==    by 0x431299: runshfunc (exec.c:5040)
==9324==    by 0x430E76: doshfunc (exec.c:4920)
==9324==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9324== 
==9324== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9329== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9329-by-pythonnut-on-???
==9329== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9329-by-pythonnut-on-???
==9329== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9329-by-pythonnut-on-???
==9329== 
==9329== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9329== don't want to do, unless you know exactly what you're doing,
==9329== or are doing some strange experiment):
==9329==   /usr/lib/valgrind/../../bin/vgdb --pid=9329 ...command...
==9329== 
==9329== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9329==   /path/to/gdb ./zsh
==9329== and then give GDB the following command
==9329==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9329
==9329== --pid is optional if only one valgrind process is running
==9329== 
==9330== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9330-by-pythonnut-on-???
==9330== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9330-by-pythonnut-on-???
==9330== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9330-by-pythonnut-on-???
==9330== 
==9330== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9330== don't want to do, unless you know exactly what you're doing,
==9330== or are doing some strange experiment):
==9330==   /usr/lib/valgrind/../../bin/vgdb --pid=9330 ...command...
==9330== 
==9330== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9330==   /path/to/gdb ./zsh
==9330== and then give GDB the following command
==9330==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9330
==9330== --pid is optional if only one valgrind process is running
==9330== 
--9330-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9330-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9330== 
==9330== HEAP SUMMARY:
==9330==     in use at exit: 3,189,966 bytes in 68,969 blocks
==9330==   total heap usage: 928,548 allocs, 859,579 frees, 65,676,091 bytes allocated
==9330== 
==9330== Searching for pointers to 68,969 not-freed blocks
--9330--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9330--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9330--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9330--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9330--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9330--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9330--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9330--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9330--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9330--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9330--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9330--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9330--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9330--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9330--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9330--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9330--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9330--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9330--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9330--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9330--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9330--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9330--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9330--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9330--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9330--   Scanning root segment: 0x701a000..0x701afff (4096)
--9330--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9330--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9330--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9330--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9330--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9330--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9330--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9330--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9330--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9330== Checked 4,945,088 bytes
==9330== 
==9330== LEAK SUMMARY:
==9330==    definitely lost: 1,533 bytes in 8 blocks
==9330==    indirectly lost: 6,756 bytes in 7 blocks
==9330==      possibly lost: 0 bytes in 0 blocks
==9330==    still reachable: 3,181,677 bytes in 68,954 blocks
==9330==         suppressed: 0 bytes in 0 blocks
==9330== Rerun with --leak-check=full to see details of leaked memory
==9330== 
==9330== Use --track-origins=yes to see where uninitialised values come from
==9330== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9330== 
==9330== 1 errors in context 1 of 2:
==9330== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9330==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9330==    by 0x488CD0: stringsubst (subst.c:301)
==9330==    by 0x48801B: prefork (subst.c:77)
==9330==    by 0x42B318: execcmd (exec.c:2619)
==9330==    by 0x428CA0: execpline2 (exec.c:1697)
==9330==    by 0x427FD2: execpline (exec.c:1484)
==9330==    by 0x427756: execlist (exec.c:1267)
==9330==    by 0x42717C: execode (exec.c:1073)
==9330==    by 0x431299: runshfunc (exec.c:5040)
==9330==    by 0x430E76: doshfunc (exec.c:4920)
==9330==    by 0x4302FB: execshfunc (exec.c:4557)
==9330==    by 0x42D8C1: execcmd (exec.c:3373)
==9330== 
==9330== 
==9330== 2 errors in context 2 of 2:
==9330== Conditional jump or move depends on uninitialised value(s)
==9330==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9330==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9330==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9330==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9330==    by 0x42D8E9: execcmd (exec.c:3378)
==9330==    by 0x428CA0: execpline2 (exec.c:1697)
==9330==    by 0x427FD2: execpline (exec.c:1484)
==9330==    by 0x42779A: execlist (exec.c:1275)
==9330==    by 0x42717C: execode (exec.c:1073)
==9330==    by 0x431299: runshfunc (exec.c:5040)
==9330==    by 0x430E76: doshfunc (exec.c:4920)
==9330==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9330== 
==9330== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9329-- Caught __NR_exit; running __libc_freeres()
--9329-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9329== 
==9329== HEAP SUMMARY:
==9329==     in use at exit: 3,153,326 bytes in 68,966 blocks
==9329==   total heap usage: 928,551 allocs, 859,585 frees, 65,676,667 bytes allocated
==9329== 
==9329== Searching for pointers to 68,966 not-freed blocks
--9329--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9329--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9329--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9329--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9329--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9329--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9329--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9329--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9329--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9329--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9329--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9329--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9329--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9329--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9329--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9329--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9329--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9329--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9329--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9329--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9329--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9329--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9329--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9329--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9329--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9329--   Scanning root segment: 0x701a000..0x701afff (4096)
--9329--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9329--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9329--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9329--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9329--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9329--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9329--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9329--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9329--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9329== Checked 4,907,832 bytes
==9329== 
==9329== LEAK SUMMARY:
==9329==    definitely lost: 1,533 bytes in 8 blocks
==9329==    indirectly lost: 6,756 bytes in 7 blocks
==9329==      possibly lost: 0 bytes in 0 blocks
==9329==    still reachable: 3,145,037 bytes in 68,951 blocks
==9329==         suppressed: 0 bytes in 0 blocks
==9329== Rerun with --leak-check=full to see details of leaked memory
==9329== 
==9329== Use --track-origins=yes to see where uninitialised values come from
==9329== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9329== 
==9329== 1 errors in context 1 of 2:
==9329== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9329==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9329==    by 0x488CD0: stringsubst (subst.c:301)
==9329==    by 0x48801B: prefork (subst.c:77)
==9329==    by 0x42B318: execcmd (exec.c:2619)
==9329==    by 0x428CA0: execpline2 (exec.c:1697)
==9329==    by 0x427FD2: execpline (exec.c:1484)
==9329==    by 0x427756: execlist (exec.c:1267)
==9329==    by 0x42717C: execode (exec.c:1073)
==9329==    by 0x431299: runshfunc (exec.c:5040)
==9329==    by 0x430E76: doshfunc (exec.c:4920)
==9329==    by 0x4302FB: execshfunc (exec.c:4557)
==9329==    by 0x42D8C1: execcmd (exec.c:3373)
==9329== 
==9329== 
==9329== 2 errors in context 2 of 2:
==9329== Conditional jump or move depends on uninitialised value(s)
==9329==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9329==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9329==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9329==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9329==    by 0x42D8E9: execcmd (exec.c:3378)
==9329==    by 0x428CA0: execpline2 (exec.c:1697)
==9329==    by 0x427FD2: execpline (exec.c:1484)
==9329==    by 0x42779A: execlist (exec.c:1275)
==9329==    by 0x42717C: execode (exec.c:1073)
==9329==    by 0x431299: runshfunc (exec.c:5040)
==9329==    by 0x430E76: doshfunc (exec.c:4920)
==9329==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9329== 
==9329== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9333-by-pythonnut-on-???
==9333== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9333-by-pythonnut-on-???
==9333== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9333-by-pythonnut-on-???
==9333== 
==9333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9333== don't want to do, unless you know exactly what you're doing,
==9333== or are doing some strange experiment):
==9333==   /usr/lib/valgrind/../../bin/vgdb --pid=9333 ...command...
==9333== 
==9333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9333==   /path/to/gdb ./zsh
==9333== and then give GDB the following command
==9333==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9333
==9333== --pid is optional if only one valgrind process is running
==9333== 
--9333-- Caught __NR_exit; running __libc_freeres()
==9332== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9332-by-pythonnut-on-???
==9332== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9332-by-pythonnut-on-???
==9332== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9332-by-pythonnut-on-???
==9332== 
==9332== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9332== don't want to do, unless you know exactly what you're doing,
==9332== or are doing some strange experiment):
==9332==   /usr/lib/valgrind/../../bin/vgdb --pid=9332 ...command...
==9332== 
==9332== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9332==   /path/to/gdb ./zsh
==9332== and then give GDB the following command
==9332==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9332
==9332== --pid is optional if only one valgrind process is running
==9332== 
--9333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9333== 
==9333== HEAP SUMMARY:
==9333==     in use at exit: 3,154,011 bytes in 68,972 blocks
==9333==   total heap usage: 928,560 allocs, 859,588 frees, 65,644,112 bytes allocated
==9333== 
==9333== Searching for pointers to 68,972 not-freed blocks
--9333--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9333--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9333--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9333--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9333--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9333--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9333--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9333--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9333--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9333--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9333--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9333--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9333--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9333--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9333--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9333--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9333--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9333--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9333--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9333--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9333--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9333--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9333--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9333--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9333--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9333--   Scanning root segment: 0x701a000..0x701afff (4096)
--9333--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9333--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9333--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9333--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9333--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9333--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9333--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9333--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9333--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9333== Checked 4,888,384 bytes
==9333== 
==9333== LEAK SUMMARY:
==9333==    definitely lost: 1,533 bytes in 8 blocks
==9333==    indirectly lost: 6,756 bytes in 7 blocks
==9333==      possibly lost: 0 bytes in 0 blocks
==9333==    still reachable: 3,145,722 bytes in 68,957 blocks
==9333==         suppressed: 0 bytes in 0 blocks
==9333== Rerun with --leak-check=full to see details of leaked memory
==9333== 
==9333== Use --track-origins=yes to see where uninitialised values come from
==9333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9333== 
==9333== 1 errors in context 1 of 2:
==9333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9333==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9333==    by 0x488CD0: stringsubst (subst.c:301)
==9333==    by 0x48801B: prefork (subst.c:77)
==9333==    by 0x42B318: execcmd (exec.c:2619)
==9333==    by 0x428CA0: execpline2 (exec.c:1697)
==9333==    by 0x427FD2: execpline (exec.c:1484)
==9333==    by 0x427756: execlist (exec.c:1267)
==9333==    by 0x42717C: execode (exec.c:1073)
==9333==    by 0x431299: runshfunc (exec.c:5040)
==9333==    by 0x430E76: doshfunc (exec.c:4920)
==9333==    by 0x4302FB: execshfunc (exec.c:4557)
==9333==    by 0x42D8C1: execcmd (exec.c:3373)
==9333== 
==9333== 
==9333== 2 errors in context 2 of 2:
==9333== Conditional jump or move depends on uninitialised value(s)
==9333==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9333==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9333==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9333==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9333==    by 0x42D8E9: execcmd (exec.c:3378)
==9333==    by 0x428CA0: execpline2 (exec.c:1697)
==9333==    by 0x427FD2: execpline (exec.c:1484)
==9333==    by 0x42779A: execlist (exec.c:1275)
==9333==    by 0x42717C: execode (exec.c:1073)
==9333==    by 0x431299: runshfunc (exec.c:5040)
==9333==    by 0x430E76: doshfunc (exec.c:4920)
==9333==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9333== 
==9333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9332-- Caught __NR_exit; running __libc_freeres()
--9332-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9332== 
==9332== HEAP SUMMARY:
==9332==     in use at exit: 3,153,904 bytes in 68,972 blocks
==9332==   total heap usage: 928,597 allocs, 859,625 frees, 65,653,653 bytes allocated
==9332== 
==9332== Searching for pointers to 68,972 not-freed blocks
--9332--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9332--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9332--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9332--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9332--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9332--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9332--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9332--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9332--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9332--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9332--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9332--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9332--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9332--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9332--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9332--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9332--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9332--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9332--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9332--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9332--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9332--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9332--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9332--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9332--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9332--   Scanning root segment: 0x701a000..0x701afff (4096)
--9332--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9332--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9332--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9332--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9332--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9332--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9332--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9332--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9332--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9332== Checked 4,887,696 bytes
==9332== 
==9332== LEAK SUMMARY:
==9332==    definitely lost: 1,533 bytes in 8 blocks
==9332==    indirectly lost: 6,756 bytes in 7 blocks
==9332==      possibly lost: 0 bytes in 0 blocks
==9332==    still reachable: 3,145,615 bytes in 68,957 blocks
==9332==         suppressed: 0 bytes in 0 blocks
==9332== Rerun with --leak-check=full to see details of leaked memory
==9332== 
==9332== Use --track-origins=yes to see where uninitialised values come from
==9332== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9332== 
==9332== 1 errors in context 1 of 2:
==9332== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9332==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9332==    by 0x488CD0: stringsubst (subst.c:301)
==9332==    by 0x48801B: prefork (subst.c:77)
==9332==    by 0x42B318: execcmd (exec.c:2619)
==9332==    by 0x428CA0: execpline2 (exec.c:1697)
==9332==    by 0x427FD2: execpline (exec.c:1484)
==9332==    by 0x427756: execlist (exec.c:1267)
==9332==    by 0x42717C: execode (exec.c:1073)
==9332==    by 0x431299: runshfunc (exec.c:5040)
==9332==    by 0x430E76: doshfunc (exec.c:4920)
==9332==    by 0x4302FB: execshfunc (exec.c:4557)
==9332==    by 0x42D8C1: execcmd (exec.c:3373)
==9332== 
==9332== 
==9332== 2 errors in context 2 of 2:
==9332== Conditional jump or move depends on uninitialised value(s)
==9332==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9332==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9332==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9332==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9332==    by 0x42D8E9: execcmd (exec.c:3378)
==9332==    by 0x428CA0: execpline2 (exec.c:1697)
==9332==    by 0x427FD2: execpline (exec.c:1484)
==9332==    by 0x42779A: execlist (exec.c:1275)
==9332==    by 0x42717C: execode (exec.c:1073)
==9332==    by 0x431299: runshfunc (exec.c:5040)
==9332==    by 0x430E76: doshfunc (exec.c:4920)
==9332==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9332== 
==9332== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9334-by-pythonnut-on-???
==9334== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9334-by-pythonnut-on-???
==9334== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9334-by-pythonnut-on-???
==9334== 
==9334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9334== don't want to do, unless you know exactly what you're doing,
==9334== or are doing some strange experiment):
==9334==   /usr/lib/valgrind/../../bin/vgdb --pid=9334 ...command...
==9334== 
==9334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9334==   /path/to/gdb ./zsh
==9334== and then give GDB the following command
==9334==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9334
==9334== --pid is optional if only one valgrind process is running
==9334== 
--9334-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1DAC,  len 4
--9334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9335-- Caught __NR_exit; running __libc_freeres()
==9334== 
==9334== HEAP SUMMARY:
==9334==     in use at exit: 3,117,696 bytes in 68,972 blocks
==9334==   total heap usage: 928,569 allocs, 859,597 frees, 65,648,328 bytes allocated
==9334== 
==9335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9335-by-pythonnut-on-???
==9335== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9335-by-pythonnut-on-???
==9335== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9335-by-pythonnut-on-???
==9335== 
==9335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9335== don't want to do, unless you know exactly what you're doing,
==9335== or are doing some strange experiment):
==9335==   /usr/lib/valgrind/../../bin/vgdb --pid=9335 ...command...
==9335== 
==9335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9335==   /path/to/gdb ./zsh
==9335== and then give GDB the following command
==9335==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9335
==9335== --pid is optional if only one valgrind process is running
==9335== 
--9335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9335== 
==9334== Searching for pointers to 68,972 not-freed blocks
--9334--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9334--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9334--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9334--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9334--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9334--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9334--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9334--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9334--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9334--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9334--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9334--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9334--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9334--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9334--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9334--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9334--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9334--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9334--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9334--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9334--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9334--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9334--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9335== HEAP SUMMARY:
==9335==     in use at exit: 3,117,440 bytes in 68,972 blocks
==9335==   total heap usage: 928,575 allocs, 859,603 frees, 65,650,448 bytes allocated
==9335== 
--9334--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9334--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9334--   Scanning root segment: 0x701a000..0x701afff (4096)
--9334--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9334--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9334--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9334--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9334--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9334--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9334--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9334--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9334--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9335== Searching for pointers to 68,972 not-freed blocks
--9335--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9335--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9335--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9335--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9335--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9335--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9335--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9335--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9335--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9335--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9335--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9335--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9335--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9335--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9335--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9335--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9335--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9335--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9335--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9335--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9335--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9335--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9335--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9335--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9335--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9335--   Scanning root segment: 0x701a000..0x701afff (4096)
--9335--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9335--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9335--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9335--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9335--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9335--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9335--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9335--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9335--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9334== Checked 4,851,056 bytes
==9334== 
==9334== LEAK SUMMARY:
==9334==    definitely lost: 1,533 bytes in 8 blocks
==9334==    indirectly lost: 6,756 bytes in 7 blocks
==9334==      possibly lost: 0 bytes in 0 blocks
==9334==    still reachable: 3,109,407 bytes in 68,957 blocks
==9334==         suppressed: 0 bytes in 0 blocks
==9334== Rerun with --leak-check=full to see details of leaked memory
==9334== 
==9334== Use --track-origins=yes to see where uninitialised values come from
==9334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9334== 
==9334== 1 errors in context 1 of 2:
==9334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9334==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9334==    by 0x488CD0: stringsubst (subst.c:301)
==9334==    by 0x48801B: prefork (subst.c:77)
==9334==    by 0x42B318: execcmd (exec.c:2619)
==9334==    by 0x428CA0: execpline2 (exec.c:1697)
==9334==    by 0x427FD2: execpline (exec.c:1484)
==9334==    by 0x427756: execlist (exec.c:1267)
==9334==    by 0x42717C: execode (exec.c:1073)
==9334==    by 0x431299: runshfunc (exec.c:5040)
==9334==    by 0x430E76: doshfunc (exec.c:4920)
==9334==    by 0x4302FB: execshfunc (exec.c:4557)
==9334==    by 0x42D8C1: execcmd (exec.c:3373)
==9334== 
==9334== 
==9334== 2 errors in context 2 of 2:
==9334== Conditional jump or move depends on uninitialised value(s)
==9334==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9334==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9334==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9334==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9334==    by 0x42D8E9: execcmd (exec.c:3378)
==9334==    by 0x428CA0: execpline2 (exec.c:1697)
==9334==    by 0x427FD2: execpline (exec.c:1484)
==9334==    by 0x42779A: execlist (exec.c:1275)
==9334==    by 0x42717C: execode (exec.c:1073)
==9334==    by 0x431299: runshfunc (exec.c:5040)
==9334==    by 0x430E76: doshfunc (exec.c:4920)
==9334==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9334== 
==9334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9335== Checked 4,850,904 bytes
==9335== 
==9335== LEAK SUMMARY:
==9335==    definitely lost: 1,557 bytes in 9 blocks
==9335==    indirectly lost: 6,796 bytes in 9 blocks
==9335==      possibly lost: 0 bytes in 0 blocks
==9335==    still reachable: 3,109,087 bytes in 68,954 blocks
==9335==         suppressed: 0 bytes in 0 blocks
==9335== Rerun with --leak-check=full to see details of leaked memory
==9335== 
==9335== Use --track-origins=yes to see where uninitialised values come from
==9335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9335== 
==9335== 1 errors in context 1 of 2:
==9335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9335==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9335==    by 0x488CD0: stringsubst (subst.c:301)
==9335==    by 0x48801B: prefork (subst.c:77)
==9335==    by 0x42B318: execcmd (exec.c:2619)
==9335==    by 0x428CA0: execpline2 (exec.c:1697)
==9335==    by 0x427FD2: execpline (exec.c:1484)
==9335==    by 0x427756: execlist (exec.c:1267)
==9335==    by 0x42717C: execode (exec.c:1073)
==9335==    by 0x431299: runshfunc (exec.c:5040)
==9335==    by 0x430E76: doshfunc (exec.c:4920)
==9335==    by 0x4302FB: execshfunc (exec.c:4557)
==9335==    by 0x42D8C1: execcmd (exec.c:3373)
==9335== 
==9335== 
==9335== 2 errors in context 2 of 2:
==9335== Conditional jump or move depends on uninitialised value(s)
==9335==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9335==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9335==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9335==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9335==    by 0x42D8E9: execcmd (exec.c:3378)
==9335==    by 0x428CA0: execpline2 (exec.c:1697)
==9335==    by 0x427FD2: execpline (exec.c:1484)
==9335==    by 0x42779A: execlist (exec.c:1275)
==9335==    by 0x42717C: execode (exec.c:1073)
==9335==    by 0x431299: runshfunc (exec.c:5040)
==9335==    by 0x430E76: doshfunc (exec.c:4920)
==9335==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9335== 
==9335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9339-by-pythonnut-on-???
==9339== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9339-by-pythonnut-on-???
==9339== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9339-by-pythonnut-on-???
==9339== 
==9339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9339== don't want to do, unless you know exactly what you're doing,
==9339== or are doing some strange experiment):
==9339==   /usr/lib/valgrind/../../bin/vgdb --pid=9339 ...command...
==9339== 
==9339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9339==   /path/to/gdb ./zsh
==9339== and then give GDB the following command
==9339==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9339
==9339== --pid is optional if only one valgrind process is running
==9339== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9321-- Caught __NR_exit; running __libc_freeres()
--9321-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9321== 
==9321== HEAP SUMMARY:
==9321==     in use at exit: 3,116,022 bytes in 68,949 blocks
==9321==   total heap usage: 928,576 allocs, 859,627 frees, 65,651,016 bytes allocated
==9321== 
==9321== Searching for pointers to 68,949 not-freed blocks
--9321--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9321--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9321--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9321--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9321--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9321--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9321--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9321--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9321--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9321--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9321--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9321--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9321--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9321--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9321--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9321--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9321--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9321--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9321--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9321--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9321--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9321--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9321--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9321--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9321--   Scanning root segment: 0x701a000..0x701afff (4096)
--9321--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9321--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9321--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9321--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9321--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9321--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9321--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9321--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9321--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9321== Checked 4,757,304 bytes
==9321== 
==9321== LEAK SUMMARY:
==9321==    definitely lost: 1,533 bytes in 8 blocks
==9321==    indirectly lost: 6,756 bytes in 7 blocks
==9321==      possibly lost: 0 bytes in 0 blocks
==9321==    still reachable: 3,107,733 bytes in 68,934 blocks
==9321==         suppressed: 0 bytes in 0 blocks
==9321== Rerun with --leak-check=full to see details of leaked memory
==9321== 
==9321== Use --track-origins=yes to see where uninitialised values come from
==9321== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9321== 
==9321== 1 errors in context 1 of 2:
==9321== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9321==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9321==    by 0x488CD0: stringsubst (subst.c:301)
==9321==    by 0x48801B: prefork (subst.c:77)
==9321==    by 0x42B318: execcmd (exec.c:2619)
==9321==    by 0x428CA0: execpline2 (exec.c:1697)
==9321==    by 0x427FD2: execpline (exec.c:1484)
==9321==    by 0x427756: execlist (exec.c:1267)
==9321==    by 0x42717C: execode (exec.c:1073)
==9321==    by 0x431299: runshfunc (exec.c:5040)
==9321==    by 0x430E76: doshfunc (exec.c:4920)
==9321==    by 0x4302FB: execshfunc (exec.c:4557)
==9321==    by 0x42D8C1: execcmd (exec.c:3373)
==9321== 
==9321== 
==9321== 2 errors in context 2 of 2:
==9321== Conditional jump or move depends on uninitialised value(s)
==9321==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9321==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9321==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9321==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9321==    by 0x42D8E9: execcmd (exec.c:3378)
==9321==    by 0x428CA0: execpline2 (exec.c:1697)
==9321==    by 0x427FD2: execpline (exec.c:1484)
==9321==    by 0x42779A: execlist (exec.c:1275)
==9321==    by 0x42717C: execode (exec.c:1073)
==9321==    by 0x431299: runshfunc (exec.c:5040)
==9321==    by 0x430E76: doshfunc (exec.c:4920)
==9321==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9321== 
==9321== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9341-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF305C,  len 4
==9341== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9341-by-pythonnut-on-???
==9341== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9341-by-pythonnut-on-???
==9341== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9341-by-pythonnut-on-???
==9341== 
==9341== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9341== don't want to do, unless you know exactly what you're doing,
==9341== or are doing some strange experiment):
==9341==   /usr/lib/valgrind/../../bin/vgdb --pid=9341 ...command...
==9341== 
==9341== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9341==   /path/to/gdb ./zsh
==9341== and then give GDB the following command
==9341==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9341
==9341== --pid is optional if only one valgrind process is running
==9341== 
client request: code 4d430005,  addr 0xFFEFF2FBC,  len 4
--9341-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9341== 
==9341== HEAP SUMMARY:
==9341==     in use at exit: 3,116,350 bytes in 68,950 blocks
==9341==   total heap usage: 928,521 allocs, 859,571 frees, 65,600,302 bytes allocated
==9341== 
==9341== Searching for pointers to 68,950 not-freed blocks
--9341--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9341--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9341--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9341--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9341--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9341--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9341--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9341--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9341--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9341--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9341--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9341--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9341--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9341--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9341--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9341--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9341--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9341--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9341--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9341--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9341--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9341--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9341--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9341--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9341--   Scanning root segment: 0x701a000..0x701afff (4096)
--9341--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9341--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9341--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9341--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9341--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9341--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9341--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9341--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9341--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9341== Checked 4,758,840 bytes
==9341== 
==9341== LEAK SUMMARY:
==9341==    definitely lost: 1,533 bytes in 8 blocks
==9341==    indirectly lost: 6,756 bytes in 7 blocks
==9341==      possibly lost: 0 bytes in 0 blocks
==9341==    still reachable: 3,108,061 bytes in 68,935 blocks
==9341==         suppressed: 0 bytes in 0 blocks
==9341== Rerun with --leak-check=full to see details of leaked memory
==9341== 
==9341== Use --track-origins=yes to see where uninitialised values come from
==9341== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9341== 
==9341== 1 errors in context 1 of 2:
==9341== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9341==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9341==    by 0x488CD0: stringsubst (subst.c:301)
==9341==    by 0x48801B: prefork (subst.c:77)
==9341==    by 0x42B318: execcmd (exec.c:2619)
==9341==    by 0x428CA0: execpline2 (exec.c:1697)
==9341==    by 0x427FD2: execpline (exec.c:1484)
==9341==    by 0x427756: execlist (exec.c:1267)
==9341==    by 0x42717C: execode (exec.c:1073)
==9341==    by 0x431299: runshfunc (exec.c:5040)
==9341==    by 0x430E76: doshfunc (exec.c:4920)
==9341==    by 0x4302FB: execshfunc (exec.c:4557)
==9341==    by 0x42D8C1: execcmd (exec.c:3373)
==9341== 
==9341== 
==9341== 2 errors in context 2 of 2:
==9341== Conditional jump or move depends on uninitialised value(s)
==9341==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9341==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9341==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9341==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9341==    by 0x42D8E9: execcmd (exec.c:3378)
==9341==    by 0x428CA0: execpline2 (exec.c:1697)
==9341==    by 0x427FD2: execpline (exec.c:1484)
==9341==    by 0x42779A: execlist (exec.c:1275)
==9341==    by 0x42717C: execode (exec.c:1073)
==9341==    by 0x431299: runshfunc (exec.c:5040)
==9341==    by 0x430E76: doshfunc (exec.c:4920)
==9341==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9341== 
==9341== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9340-- Caught __NR_exit; running __libc_freeres()
==9340== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9340-by-pythonnut-on-???
==9340== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9340-by-pythonnut-on-???
==9340== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9340-by-pythonnut-on-???
==9340== 
==9340== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9340== don't want to do, unless you know exactly what you're doing,
==9340== or are doing some strange experiment):
==9340==   /usr/lib/valgrind/../../bin/vgdb --pid=9340 ...command...
==9340== 
==9340== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9340==   /path/to/gdb ./zsh
==9340== and then give GDB the following command
==9340==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9340
==9340== --pid is optional if only one valgrind process is running
==9340== 
--9340-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9340== 
==9340== HEAP SUMMARY:
==9340==     in use at exit: 3,116,062 bytes in 68,947 blocks
==9340==   total heap usage: 928,527 allocs, 859,580 frees, 65,601,190 bytes allocated
==9340== 
==9340== Searching for pointers to 68,947 not-freed blocks
--9340--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9340--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9340--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9340--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9340--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9340--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9340--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9340--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9340--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9340--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9340--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9340--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9340--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9340--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9340--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9340--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9340--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9340--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9340--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9340--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9340--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9340--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9340--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9340--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9340--   Scanning root segment: 0x701a000..0x701afff (4096)
--9340--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9340--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9340--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9340--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9340--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9340--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9340--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9340--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9340--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9340== Checked 4,757,920 bytes
==9340== 
==9340== LEAK SUMMARY:
==9340==    definitely lost: 1,533 bytes in 8 blocks
==9340==    indirectly lost: 6,756 bytes in 7 blocks
==9340==      possibly lost: 0 bytes in 0 blocks
==9340==    still reachable: 3,107,773 bytes in 68,932 blocks
==9340==         suppressed: 0 bytes in 0 blocks
==9340== Rerun with --leak-check=full to see details of leaked memory
==9340== 
==9340== Use --track-origins=yes to see where uninitialised values come from
==9340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9340== 
==9340== 1 errors in context 1 of 2:
==9340== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9340==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9340==    by 0x488CD0: stringsubst (subst.c:301)
==9340==    by 0x48801B: prefork (subst.c:77)
==9340==    by 0x42B318: execcmd (exec.c:2619)
==9340==    by 0x428CA0: execpline2 (exec.c:1697)
==9340==    by 0x427FD2: execpline (exec.c:1484)
==9340==    by 0x427756: execlist (exec.c:1267)
==9340==    by 0x42717C: execode (exec.c:1073)
==9340==    by 0x431299: runshfunc (exec.c:5040)
==9340==    by 0x430E76: doshfunc (exec.c:4920)
==9340==    by 0x4302FB: execshfunc (exec.c:4557)
==9340==    by 0x42D8C1: execcmd (exec.c:3373)
==9340== 
==9340== 
==9340== 2 errors in context 2 of 2:
==9340== Conditional jump or move depends on uninitialised value(s)
==9340==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9340==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9340==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9340==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9340==    by 0x42D8E9: execcmd (exec.c:3378)
==9340==    by 0x428CA0: execpline2 (exec.c:1697)
==9340==    by 0x427FD2: execpline (exec.c:1484)
==9340==    by 0x42779A: execlist (exec.c:1275)
==9340==    by 0x42717C: execode (exec.c:1073)
==9340==    by 0x431299: runshfunc (exec.c:5040)
==9340==    by 0x430E76: doshfunc (exec.c:4920)
==9340==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9340== 
==9340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9345-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1BFC,  len 4
==9345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9345-by-pythonnut-on-???
==9345== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9345-by-pythonnut-on-???
==9345== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9345-by-pythonnut-on-???
==9345== 
==9345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9345== don't want to do, unless you know exactly what you're doing,
==9345== or are doing some strange experiment):
==9345==   /usr/lib/valgrind/../../bin/vgdb --pid=9345 ...command...
==9345== 
==9345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9345==   /path/to/gdb ./zsh
==9345== and then give GDB the following command
==9345==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9345
==9345== --pid is optional if only one valgrind process is running
==9345== 
client request: code 4d430005,  addr 0xFFEFF1B5C,  len 4
--9345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9345== 
==9345== HEAP SUMMARY:
==9345==     in use at exit: 3,116,272 bytes in 68,952 blocks
==9345==   total heap usage: 928,554 allocs, 859,602 frees, 65,613,491 bytes allocated
==9345== 
==9345== Searching for pointers to 68,952 not-freed blocks
--9345--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9345--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9345--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9345--   Scanning root segment: 0x4037000..0x403afff (16384)
--9345--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9345--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9345--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9345--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9345--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9345--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9345--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9345--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9345--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9345--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9345--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9345--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9345--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9345--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9345--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9345--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9345--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9345--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9345--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9345--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9345--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9345--   Scanning root segment: 0x701a000..0x701afff (4096)
--9345--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9345--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9345--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9345--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9345--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9345--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9345--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9345--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9345--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9345== Checked 4,776,448 bytes
==9345== 
==9345== LEAK SUMMARY:
==9345==    definitely lost: 1,533 bytes in 8 blocks
==9345==    indirectly lost: 6,756 bytes in 7 blocks
==9345==      possibly lost: 0 bytes in 0 blocks
==9345==    still reachable: 3,107,983 bytes in 68,937 blocks
==9345==         suppressed: 0 bytes in 0 blocks
==9345== Rerun with --leak-check=full to see details of leaked memory
==9345== 
==9345== Use --track-origins=yes to see where uninitialised values come from
==9345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9345== 
==9345== 1 errors in context 1 of 2:
==9345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9345==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9345==    by 0x488CD0: stringsubst (subst.c:301)
==9345==    by 0x48801B: prefork (subst.c:77)
==9345==    by 0x42B318: execcmd (exec.c:2619)
==9345==    by 0x428CA0: execpline2 (exec.c:1697)
==9345==    by 0x427FD2: execpline (exec.c:1484)
==9345==    by 0x427756: execlist (exec.c:1267)
==9345==    by 0x42717C: execode (exec.c:1073)
==9345==    by 0x431299: runshfunc (exec.c:5040)
==9345==    by 0x430E76: doshfunc (exec.c:4920)
==9345==    by 0x4302FB: execshfunc (exec.c:4557)
==9345==    by 0x42D8C1: execcmd (exec.c:3373)
==9345== 
==9345== 
==9345== 2 errors in context 2 of 2:
==9345== Conditional jump or move depends on uninitialised value(s)
==9345==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9345==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9345==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9345==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9345==    by 0x42D8E9: execcmd (exec.c:3378)
==9345==    by 0x428CA0: execpline2 (exec.c:1697)
==9345==    by 0x427FD2: execpline (exec.c:1484)
==9345==    by 0x42779A: execlist (exec.c:1275)
==9345==    by 0x42717C: execode (exec.c:1073)
==9345==    by 0x431299: runshfunc (exec.c:5040)
==9345==    by 0x430E76: doshfunc (exec.c:4920)
==9345==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9345== 
==9345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9344-- Caught __NR_exit; running __libc_freeres()
==9344== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9344-by-pythonnut-on-???
==9344== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9344-by-pythonnut-on-???
==9344== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9344-by-pythonnut-on-???
==9344== 
==9344== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9344== don't want to do, unless you know exactly what you're doing,
==9344== or are doing some strange experiment):
==9344==   /usr/lib/valgrind/../../bin/vgdb --pid=9344 ...command...
==9344== 
==9344== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9344==   /path/to/gdb ./zsh
==9344== and then give GDB the following command
==9344==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9344
==9344== --pid is optional if only one valgrind process is running
==9344== 
--9344-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9344== 
==9344== HEAP SUMMARY:
==9344==     in use at exit: 3,116,309 bytes in 68,953 blocks
==9344==   total heap usage: 928,550 allocs, 859,597 frees, 65,609,907 bytes allocated
==9344== 
==9344== Searching for pointers to 68,953 not-freed blocks
--9344--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9344--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9344--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9344--   Scanning root segment: 0x4037000..0x403afff (16384)
--9344--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9344--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9344--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9344--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9344--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9344--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9344--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9344--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9344--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9344--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9344--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9344--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9344--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9344--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9344--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9344--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9344--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9344--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9344--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9344--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9344--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9344--   Scanning root segment: 0x701a000..0x701afff (4096)
--9344--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9344--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9344--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9344--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9344--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9344--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9344--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9344--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9344--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9344== Checked 4,776,152 bytes
==9344== 
==9344== LEAK SUMMARY:
==9344==    definitely lost: 1,533 bytes in 8 blocks
==9344==    indirectly lost: 6,756 bytes in 7 blocks
==9344==      possibly lost: 0 bytes in 0 blocks
==9344==    still reachable: 3,108,020 bytes in 68,938 blocks
==9344==         suppressed: 0 bytes in 0 blocks
==9344== Rerun with --leak-check=full to see details of leaked memory
==9344== 
==9344== Use --track-origins=yes to see where uninitialised values come from
==9344== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9344== 
==9344== 1 errors in context 1 of 2:
==9344== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9344==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9344==    by 0x488CD0: stringsubst (subst.c:301)
==9344==    by 0x48801B: prefork (subst.c:77)
==9344==    by 0x42B318: execcmd (exec.c:2619)
==9344==    by 0x428CA0: execpline2 (exec.c:1697)
==9344==    by 0x427FD2: execpline (exec.c:1484)
==9344==    by 0x427756: execlist (exec.c:1267)
==9344==    by 0x42717C: execode (exec.c:1073)
==9344==    by 0x431299: runshfunc (exec.c:5040)
==9344==    by 0x430E76: doshfunc (exec.c:4920)
==9344==    by 0x4302FB: execshfunc (exec.c:4557)
==9344==    by 0x42D8C1: execcmd (exec.c:3373)
==9344== 
==9344== 
==9344== 2 errors in context 2 of 2:
==9344== Conditional jump or move depends on uninitialised value(s)
==9344==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9344==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9344==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9344==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9344==    by 0x42D8E9: execcmd (exec.c:3378)
==9344==    by 0x428CA0: execpline2 (exec.c:1697)
==9344==    by 0x427FD2: execpline (exec.c:1484)
==9344==    by 0x42779A: execlist (exec.c:1275)
==9344==    by 0x42717C: execode (exec.c:1073)
==9344==    by 0x431299: runshfunc (exec.c:5040)
==9344==    by 0x430E76: doshfunc (exec.c:4920)
==9344==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9344== 
==9344== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF214C,  len 4
--9348-- Caught __NR_exit; running __libc_freeres()
==9348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9348-by-pythonnut-on-???
==9348== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9348-by-pythonnut-on-???
==9348== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9348-by-pythonnut-on-???
==9348== 
==9348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9348== don't want to do, unless you know exactly what you're doing,
==9348== or are doing some strange experiment):
==9348==   /usr/lib/valgrind/../../bin/vgdb --pid=9348 ...command...
==9348== 
==9348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9348==   /path/to/gdb ./zsh
==9348== and then give GDB the following command
==9348==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9348
==9348== --pid is optional if only one valgrind process is running
==9348== 
--9348-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9348== 
==9348== HEAP SUMMARY:
==9348==     in use at exit: 3,116,653 bytes in 68,958 blocks
==9348==   total heap usage: 928,562 allocs, 859,604 frees, 65,615,233 bytes allocated
==9348== 
==9348== Searching for pointers to 68,958 not-freed blocks
--9348--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9348--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9348--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9348--   Scanning root segment: 0x4037000..0x403afff (16384)
--9348--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9348--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9348--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9348--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9348--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9348--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9348--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9348--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9348--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9348--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9348--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9348--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9348--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9348--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9348--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9348--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9348--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9348--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9348--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9348--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9348--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9348--   Scanning root segment: 0x701a000..0x701afff (4096)
--9348--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9348--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9348--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9348--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9348--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9348--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9348--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9348--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9348--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9348== Checked 4,776,216 bytes
==9348== 
==9348== LEAK SUMMARY:
==9348==    definitely lost: 1,533 bytes in 8 blocks
==9348==    indirectly lost: 6,756 bytes in 7 blocks
==9348==      possibly lost: 0 bytes in 0 blocks
==9348==    still reachable: 3,108,364 bytes in 68,943 blocks
==9348==         suppressed: 0 bytes in 0 blocks
==9348== Rerun with --leak-check=full to see details of leaked memory
==9348== 
==9348== Use --track-origins=yes to see where uninitialised values come from
==9348== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9348== 
==9348== 1 errors in context 1 of 2:
==9348== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9348==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9348==    by 0x488CD0: stringsubst (subst.c:301)
==9348==    by 0x48801B: prefork (subst.c:77)
==9348==    by 0x42B318: execcmd (exec.c:2619)
==9348==    by 0x428CA0: execpline2 (exec.c:1697)
==9348==    by 0x427FD2: execpline (exec.c:1484)
==9348==    by 0x427756: execlist (exec.c:1267)
==9348==    by 0x42717C: execode (exec.c:1073)
==9348==    by 0x431299: runshfunc (exec.c:5040)
==9348==    by 0x430E76: doshfunc (exec.c:4920)
==9348==    by 0x4302FB: execshfunc (exec.c:4557)
==9348==    by 0x42D8C1: execcmd (exec.c:3373)
==9348== 
==9348== 
==9348== 2 errors in context 2 of 2:
==9348== Conditional jump or move depends on uninitialised value(s)
==9348==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9348==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9348==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9348==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9348==    by 0x42D8E9: execcmd (exec.c:3378)
==9348==    by 0x428CA0: execpline2 (exec.c:1697)
==9348==    by 0x427FD2: execpline (exec.c:1484)
==9348==    by 0x42779A: execlist (exec.c:1275)
==9348==    by 0x42717C: execode (exec.c:1073)
==9348==    by 0x431299: runshfunc (exec.c:5040)
==9348==    by 0x430E76: doshfunc (exec.c:4920)
==9348==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9348== 
==9348== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1C9C,  len 4
--9352-- Caught __NR_exit; running __libc_freeres()
==9352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9352-by-pythonnut-on-???
==9352== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9352-by-pythonnut-on-???
==9352== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9352-by-pythonnut-on-???
==9352== 
==9352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9352== don't want to do, unless you know exactly what you're doing,
==9352== or are doing some strange experiment):
==9352==   /usr/lib/valgrind/../../bin/vgdb --pid=9352 ...command...
==9352== 
==9352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9352==   /path/to/gdb ./zsh
==9352== and then give GDB the following command
==9352==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9352
==9352== --pid is optional if only one valgrind process is running
==9352== 
--9352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9352== 
==9352== HEAP SUMMARY:
==9352==     in use at exit: 3,116,682 bytes in 68,959 blocks
==9352==   total heap usage: 928,567 allocs, 859,608 frees, 65,617,374 bytes allocated
==9352== 
==9352== Searching for pointers to 68,959 not-freed blocks
--9352--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9352--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9352--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9352--   Scanning root segment: 0x4037000..0x403afff (16384)
--9352--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9352--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9352--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9352--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9352--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9352--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9352--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9352--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9352--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9352--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9352--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9352--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9352--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9352--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9352--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9352--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9352--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9352--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9352--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9352--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9352--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9352--   Scanning root segment: 0x701a000..0x701afff (4096)
--9352--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9352--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9352--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9352--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9352--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9352--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9352--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9352--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9352--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9352== Checked 4,776,512 bytes
==9352== 
==9352== LEAK SUMMARY:
==9352==    definitely lost: 1,533 bytes in 8 blocks
==9352==    indirectly lost: 6,756 bytes in 7 blocks
==9352==      possibly lost: 0 bytes in 0 blocks
==9352==    still reachable: 3,108,393 bytes in 68,944 blocks
==9352==         suppressed: 0 bytes in 0 blocks
==9352== Rerun with --leak-check=full to see details of leaked memory
==9352== 
==9352== Use --track-origins=yes to see where uninitialised values come from
==9352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9352== 
==9352== 1 errors in context 1 of 2:
==9352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9352==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9352==    by 0x488CD0: stringsubst (subst.c:301)
==9352==    by 0x48801B: prefork (subst.c:77)
==9352==    by 0x42B318: execcmd (exec.c:2619)
==9352==    by 0x428CA0: execpline2 (exec.c:1697)
==9352==    by 0x427FD2: execpline (exec.c:1484)
==9352==    by 0x427756: execlist (exec.c:1267)
==9352==    by 0x42717C: execode (exec.c:1073)
==9352==    by 0x431299: runshfunc (exec.c:5040)
==9352==    by 0x430E76: doshfunc (exec.c:4920)
==9352==    by 0x4302FB: execshfunc (exec.c:4557)
==9352==    by 0x42D8C1: execcmd (exec.c:3373)
==9352== 
==9352== 
==9352== 2 errors in context 2 of 2:
==9352== Conditional jump or move depends on uninitialised value(s)
==9352==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9352==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9352==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9352==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9352==    by 0x42D8E9: execcmd (exec.c:3378)
==9352==    by 0x428CA0: execpline2 (exec.c:1697)
==9352==    by 0x427FD2: execpline (exec.c:1484)
==9352==    by 0x42779A: execlist (exec.c:1275)
==9352==    by 0x42717C: execode (exec.c:1073)
==9352==    by 0x431299: runshfunc (exec.c:5040)
==9352==    by 0x430E76: doshfunc (exec.c:4920)
==9352==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9352== 
==9352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF261C,  len 4
client request: code 4d430005,  addr 0xFFEFF1F9C,  len 4
--9320-- Caught __NR_exit; running __libc_freeres()
--9320-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9320== 
==9320== HEAP SUMMARY:
==9320==     in use at exit: 3,114,682 bytes in 68,911 blocks
==9320==   total heap usage: 928,576 allocs, 859,665 frees, 65,621,314 bytes allocated
==9320== 
==9320== Searching for pointers to 68,911 not-freed blocks
--9320--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9320--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9320--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9320--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9320--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9320--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9320--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9320--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9320--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9320--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9320--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9320--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9320--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9320--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9320--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9320--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9320--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9320--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9320--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9320--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9320--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9320--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9320--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9320--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9320--   Scanning root segment: 0x701a000..0x701afff (4096)
--9320--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9320--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9320--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9320--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9320--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9320--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9320--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9320--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9320--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9320== Checked 4,754,216 bytes
==9320== 
==9320== LEAK SUMMARY:
==9320==    definitely lost: 1,533 bytes in 8 blocks
==9320==    indirectly lost: 6,756 bytes in 7 blocks
==9320==      possibly lost: 0 bytes in 0 blocks
==9320==    still reachable: 3,106,393 bytes in 68,896 blocks
==9320==         suppressed: 0 bytes in 0 blocks
==9320== Rerun with --leak-check=full to see details of leaked memory
==9320== 
==9320== Use --track-origins=yes to see where uninitialised values come from
==9320== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9320== 
==9320== 1 errors in context 1 of 2:
==9320== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9320==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9320==    by 0x488CD0: stringsubst (subst.c:301)
==9320==    by 0x48801B: prefork (subst.c:77)
==9320==    by 0x42B318: execcmd (exec.c:2619)
==9320==    by 0x428CA0: execpline2 (exec.c:1697)
==9320==    by 0x427FD2: execpline (exec.c:1484)
==9320==    by 0x427756: execlist (exec.c:1267)
==9320==    by 0x42717C: execode (exec.c:1073)
==9320==    by 0x431299: runshfunc (exec.c:5040)
==9320==    by 0x430E76: doshfunc (exec.c:4920)
==9320==    by 0x4302FB: execshfunc (exec.c:4557)
==9320==    by 0x42D8C1: execcmd (exec.c:3373)
==9320== 
==9320== 
==9320== 2 errors in context 2 of 2:
==9320== Conditional jump or move depends on uninitialised value(s)
==9320==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9320==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9320==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9320==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9320==    by 0x42D8E9: execcmd (exec.c:3378)
==9320==    by 0x428CA0: execpline2 (exec.c:1697)
==9320==    by 0x427FD2: execpline (exec.c:1484)
==9320==    by 0x42779A: execlist (exec.c:1275)
==9320==    by 0x42717C: execode (exec.c:1073)
==9320==    by 0x431299: runshfunc (exec.c:5040)
==9320==    by 0x430E76: doshfunc (exec.c:4920)
==9320==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9320== 
==9320== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9356== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9356-by-pythonnut-on-???
==9356== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9356-by-pythonnut-on-???
==9356== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9356-by-pythonnut-on-???
==9356== 
==9356== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9356== don't want to do, unless you know exactly what you're doing,
==9356== or are doing some strange experiment):
==9356==   /usr/lib/valgrind/../../bin/vgdb --pid=9356 ...command...
==9356== 
==9356== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9356==   /path/to/gdb ./zsh
==9356== and then give GDB the following command
==9356==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9356
==9356== --pid is optional if only one valgrind process is running
==9356== 
==9357== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9357-by-pythonnut-on-???
==9357== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9357-by-pythonnut-on-???
==9357== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9357-by-pythonnut-on-???
==9357== 
==9357== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9357== don't want to do, unless you know exactly what you're doing,
==9357== or are doing some strange experiment):
==9357==   /usr/lib/valgrind/../../bin/vgdb --pid=9357 ...command...
==9357== 
==9357== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9357==   /path/to/gdb ./zsh
==9357== and then give GDB the following command
==9357==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9357
==9357== --pid is optional if only one valgrind process is running
==9357== 
client request: code 4d430005,  addr 0xFFEFF07BC,  len 4
==9358== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9358-by-pythonnut-on-???
==9358== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9358-by-pythonnut-on-???
==9358== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9358-by-pythonnut-on-???
==9358== 
==9358== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9358== don't want to do, unless you know exactly what you're doing,
==9358== or are doing some strange experiment):
==9358==   /usr/lib/valgrind/../../bin/vgdb --pid=9358 ...command...
==9358== 
==9358== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9358==   /path/to/gdb ./zsh
==9358== and then give GDB the following command
==9358==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9358
==9358== --pid is optional if only one valgrind process is running
==9358== 
--9358-- Caught __NR_exit; running __libc_freeres()
--9358-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9358== 
==9358== HEAP SUMMARY:
==9358==     in use at exit: 3,116,493 bytes in 68,958 blocks
==9358==   total heap usage: 928,535 allocs, 859,577 frees, 65,599,493 bytes allocated
==9358== 
==9358== Searching for pointers to 68,958 not-freed blocks
--9358--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9358--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9358--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9358--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9358--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9358--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9358--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9358--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9358--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9358--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9358--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9358--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9358--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9358--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9358--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9358--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9358--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9358--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9358--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9358--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9358--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9358--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9358--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9358--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9358--   Scanning root segment: 0x701a000..0x701afff (4096)
--9358--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9358--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9358--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9358--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9358--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9358--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9358--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9358--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9358--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9358== Checked 4,760,024 bytes
==9358== 
==9358== LEAK SUMMARY:
==9358==    definitely lost: 1,533 bytes in 8 blocks
==9358==    indirectly lost: 6,756 bytes in 7 blocks
==9358==      possibly lost: 0 bytes in 0 blocks
==9358==    still reachable: 3,108,204 bytes in 68,943 blocks
==9358==         suppressed: 0 bytes in 0 blocks
==9358== Rerun with --leak-check=full to see details of leaked memory
==9358== 
==9358== Use --track-origins=yes to see where uninitialised values come from
==9358== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9358== 
==9358== 1 errors in context 1 of 2:
==9358== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9358==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9358==    by 0x488CD0: stringsubst (subst.c:301)
==9358==    by 0x48801B: prefork (subst.c:77)
==9358==    by 0x42B318: execcmd (exec.c:2619)
==9358==    by 0x428CA0: execpline2 (exec.c:1697)
==9358==    by 0x427FD2: execpline (exec.c:1484)
==9358==    by 0x427756: execlist (exec.c:1267)
==9358==    by 0x42717C: execode (exec.c:1073)
==9358==    by 0x431299: runshfunc (exec.c:5040)
==9358==    by 0x430E76: doshfunc (exec.c:4920)
==9358==    by 0x4302FB: execshfunc (exec.c:4557)
==9358==    by 0x42D8C1: execcmd (exec.c:3373)
==9358== 
==9358== 
==9358== 2 errors in context 2 of 2:
==9358== Conditional jump or move depends on uninitialised value(s)
==9358==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9358==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9358==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9358==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9358==    by 0x42D8E9: execcmd (exec.c:3378)
==9358==    by 0x428CA0: execpline2 (exec.c:1697)
==9358==    by 0x427FD2: execpline (exec.c:1484)
==9358==    by 0x42779A: execlist (exec.c:1275)
==9358==    by 0x42717C: execode (exec.c:1073)
==9358==    by 0x431299: runshfunc (exec.c:5040)
==9358==    by 0x430E76: doshfunc (exec.c:4920)
==9358==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9358== 
==9358== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9361-- Caught __NR_exit; running __libc_freeres()
==9361== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9361-by-pythonnut-on-???
==9361== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9361-by-pythonnut-on-???
==9361== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9361-by-pythonnut-on-???
==9361== 
==9361== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9361== don't want to do, unless you know exactly what you're doing,
==9361== or are doing some strange experiment):
==9361==   /usr/lib/valgrind/../../bin/vgdb --pid=9361 ...command...
==9361== 
==9361== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9361==   /path/to/gdb ./zsh
==9361== and then give GDB the following command
==9361==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9361
==9361== --pid is optional if only one valgrind process is running
==9361== 
==9362== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9362-by-pythonnut-on-???
==9362== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9362-by-pythonnut-on-???
==9362== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9362-by-pythonnut-on-???
==9362== 
==9362== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9362== don't want to do, unless you know exactly what you're doing,
==9362== or are doing some strange experiment):
==9362==   /usr/lib/valgrind/../../bin/vgdb --pid=9362 ...command...
==9362== 
==9362== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9362==   /path/to/gdb ./zsh
==9362== and then give GDB the following command
==9362==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9362
==9362== --pid is optional if only one valgrind process is running
==9362== 
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9361-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9361== 
==9361== HEAP SUMMARY:
==9361==     in use at exit: 3,153,384 bytes in 68,966 blocks
==9361==   total heap usage: 928,543 allocs, 859,577 frees, 65,639,440 bytes allocated
==9361== 
==9361== Searching for pointers to 68,966 not-freed blocks
--9361--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9361--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9361--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9361--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9361--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9361--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9361--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9361--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9361--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9361--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9361--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9361--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9361--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9361--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9361--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9361--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9361--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9361--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9361--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9361--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9361--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9361--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9361--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9361--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9361--   Scanning root segment: 0x701a000..0x701afff (4096)
--9361--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9361--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9361--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9361--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9361--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9361--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9361--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9361--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9361--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9361== Checked 4,871,832 bytes
==9361== 
==9361== LEAK SUMMARY:
==9361==    definitely lost: 1,533 bytes in 8 blocks
==9361==    indirectly lost: 6,756 bytes in 7 blocks
==9361==      possibly lost: 0 bytes in 0 blocks
==9361==    still reachable: 3,145,095 bytes in 68,951 blocks
==9361==         suppressed: 0 bytes in 0 blocks
==9361== Rerun with --leak-check=full to see details of leaked memory
==9361== 
==9361== Use --track-origins=yes to see where uninitialised values come from
==9361== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9361== 
==9361== 1 errors in context 1 of 2:
==9361== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9361==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9361==    by 0x488CD0: stringsubst (subst.c:301)
==9361==    by 0x48801B: prefork (subst.c:77)
==9361==    by 0x42B318: execcmd (exec.c:2619)
==9361==    by 0x428CA0: execpline2 (exec.c:1697)
==9361==    by 0x427FD2: execpline (exec.c:1484)
==9361==    by 0x427756: execlist (exec.c:1267)
==9361==    by 0x42717C: execode (exec.c:1073)
==9361==    by 0x431299: runshfunc (exec.c:5040)
==9361==    by 0x430E76: doshfunc (exec.c:4920)
==9361==    by 0x4302FB: execshfunc (exec.c:4557)
==9361==    by 0x42D8C1: execcmd (exec.c:3373)
==9361== 
==9361== 
==9361== 2 errors in context 2 of 2:
==9361== Conditional jump or move depends on uninitialised value(s)
==9361==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9361==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9361==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9361==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9361==    by 0x42D8E9: execcmd (exec.c:3378)
==9361==    by 0x428CA0: execpline2 (exec.c:1697)
==9361==    by 0x427FD2: execpline (exec.c:1484)
==9361==    by 0x42779A: execlist (exec.c:1275)
==9361==    by 0x42717C: execode (exec.c:1073)
==9361==    by 0x431299: runshfunc (exec.c:5040)
==9361==    by 0x430E76: doshfunc (exec.c:4920)
==9361==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9361== 
==9361== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9360== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9360-by-pythonnut-on-???
==9360== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9360-by-pythonnut-on-???
==9360== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9360-by-pythonnut-on-???
==9360== 
==9360== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9360== don't want to do, unless you know exactly what you're doing,
==9360== or are doing some strange experiment):
==9360==   /usr/lib/valgrind/../../bin/vgdb --pid=9360 ...command...
==9360== 
==9360== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9360==   /path/to/gdb ./zsh
==9360== and then give GDB the following command
==9360==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9360
==9360== --pid is optional if only one valgrind process is running
==9360== 
--9360-- Caught __NR_exit; running __libc_freeres()
--9360-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9360== 
==9360== HEAP SUMMARY:
==9360==     in use at exit: 3,153,320 bytes in 68,963 blocks
==9360==   total heap usage: 928,545 allocs, 859,582 frees, 65,639,984 bytes allocated
==9360== 
==9360== Searching for pointers to 68,963 not-freed blocks
--9360--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9360--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9360--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9360--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9360--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9360--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9360--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9360--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9360--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9360--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9360--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9360--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9360--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9360--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9360--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9360--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9360--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9360--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9360--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9360--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9360--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9360--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9360--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9360--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9360--   Scanning root segment: 0x701a000..0x701afff (4096)
--9360--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9360--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9360--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9360--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9360--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9360--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9360--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9360--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9360--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9360== Checked 4,871,168 bytes
==9360== 
==9360== LEAK SUMMARY:
==9360==    definitely lost: 1,533 bytes in 8 blocks
==9360==    indirectly lost: 6,756 bytes in 7 blocks
==9360==      possibly lost: 0 bytes in 0 blocks
==9360==    still reachable: 3,145,031 bytes in 68,948 blocks
==9360==         suppressed: 0 bytes in 0 blocks
==9360== Rerun with --leak-check=full to see details of leaked memory
==9360== 
==9360== Use --track-origins=yes to see where uninitialised values come from
==9360== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9360== 
==9360== 1 errors in context 1 of 2:
==9360== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9360==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9360==    by 0x488CD0: stringsubst (subst.c:301)
==9360==    by 0x48801B: prefork (subst.c:77)
==9360==    by 0x42B318: execcmd (exec.c:2619)
==9360==    by 0x428CA0: execpline2 (exec.c:1697)
==9360==    by 0x427FD2: execpline (exec.c:1484)
==9360==    by 0x427756: execlist (exec.c:1267)
==9360==    by 0x42717C: execode (exec.c:1073)
==9360==    by 0x431299: runshfunc (exec.c:5040)
==9360==    by 0x430E76: doshfunc (exec.c:4920)
==9360==    by 0x4302FB: execshfunc (exec.c:4557)
==9360==    by 0x42D8C1: execcmd (exec.c:3373)
==9360== 
==9360== 
==9360== 2 errors in context 2 of 2:
==9360== Conditional jump or move depends on uninitialised value(s)
==9360==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9360==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9360==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9360==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9360==    by 0x42D8E9: execcmd (exec.c:3378)
==9360==    by 0x428CA0: execpline2 (exec.c:1697)
==9360==    by 0x427FD2: execpline (exec.c:1484)
==9360==    by 0x42779A: execlist (exec.c:1275)
==9360==    by 0x42717C: execode (exec.c:1073)
==9360==    by 0x431299: runshfunc (exec.c:5040)
==9360==    by 0x430E76: doshfunc (exec.c:4920)
==9360==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9360== 
==9360== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9365== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9365-by-pythonnut-on-???
==9365== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9365-by-pythonnut-on-???
==9365== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9365-by-pythonnut-on-???
==9365== 
==9365== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9365== don't want to do, unless you know exactly what you're doing,
==9365== or are doing some strange experiment):
==9365==   /usr/lib/valgrind/../../bin/vgdb --pid=9365 ...command...
==9365== 
==9365== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9365==   /path/to/gdb ./zsh
==9365== and then give GDB the following command
==9365==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9365
==9365== --pid is optional if only one valgrind process is running
==9365== 
==9366== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9366-by-pythonnut-on-???
==9366== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9366-by-pythonnut-on-???
==9366== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9366-by-pythonnut-on-???
==9366== 
==9366== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9366== don't want to do, unless you know exactly what you're doing,
==9366== or are doing some strange experiment):
==9366==   /usr/lib/valgrind/../../bin/vgdb --pid=9366 ...command...
==9366== 
==9366== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9366==   /path/to/gdb ./zsh
==9366== and then give GDB the following command
==9366==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9366
==9366== --pid is optional if only one valgrind process is running
==9366== 
--9366-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9366-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9366== 
==9366== HEAP SUMMARY:
==9366==     in use at exit: 3,190,030 bytes in 68,969 blocks
==9366==   total heap usage: 928,552 allocs, 859,583 frees, 65,678,267 bytes allocated
==9366== 
==9366== Searching for pointers to 68,969 not-freed blocks
--9366--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9366--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9366--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9366--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9366--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9366--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9366--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9366--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9366--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9366--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9366--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9366--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9366--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9366--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9366--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9366--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9366--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9366--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9366--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9366--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9366--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9366--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9366--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9366--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9366--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9366--   Scanning root segment: 0x701a000..0x701afff (4096)
--9366--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9366--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9366--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9366--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9366--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9366--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9366--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9366--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9366--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9366== Checked 4,945,352 bytes
==9366== 
==9366== LEAK SUMMARY:
==9366==    definitely lost: 1,533 bytes in 8 blocks
==9366==    indirectly lost: 6,756 bytes in 7 blocks
==9366==      possibly lost: 0 bytes in 0 blocks
==9366==    still reachable: 3,181,741 bytes in 68,954 blocks
==9366==         suppressed: 0 bytes in 0 blocks
==9366== Rerun with --leak-check=full to see details of leaked memory
==9366== 
==9366== Use --track-origins=yes to see where uninitialised values come from
==9366== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9366== 
==9366== 1 errors in context 1 of 2:
==9366== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9366==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9366==    by 0x488CD0: stringsubst (subst.c:301)
==9366==    by 0x48801B: prefork (subst.c:77)
==9366==    by 0x42B318: execcmd (exec.c:2619)
==9366==    by 0x428CA0: execpline2 (exec.c:1697)
==9366==    by 0x427FD2: execpline (exec.c:1484)
==9366==    by 0x427756: execlist (exec.c:1267)
==9366==    by 0x42717C: execode (exec.c:1073)
==9366==    by 0x431299: runshfunc (exec.c:5040)
==9366==    by 0x430E76: doshfunc (exec.c:4920)
==9366==    by 0x4302FB: execshfunc (exec.c:4557)
==9366==    by 0x42D8C1: execcmd (exec.c:3373)
==9366== 
==9366== 
==9366== 2 errors in context 2 of 2:
==9366== Conditional jump or move depends on uninitialised value(s)
==9366==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9366==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9366==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9366==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9366==    by 0x42D8E9: execcmd (exec.c:3378)
==9366==    by 0x428CA0: execpline2 (exec.c:1697)
==9366==    by 0x427FD2: execpline (exec.c:1484)
==9366==    by 0x42779A: execlist (exec.c:1275)
==9366==    by 0x42717C: execode (exec.c:1073)
==9366==    by 0x431299: runshfunc (exec.c:5040)
==9366==    by 0x430E76: doshfunc (exec.c:4920)
==9366==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9366== 
==9366== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9365-- Caught __NR_exit; running __libc_freeres()
--9365-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9365== 
==9365== HEAP SUMMARY:
==9365==     in use at exit: 3,153,390 bytes in 68,966 blocks
==9365==   total heap usage: 928,555 allocs, 859,589 frees, 65,678,843 bytes allocated
==9365== 
==9365== Searching for pointers to 68,966 not-freed blocks
--9365--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9365--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9365--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9365--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9365--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9365--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9365--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9365--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9365--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9365--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9365--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9365--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9365--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9365--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9365--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9365--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9365--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9365--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9365--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9365--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9365--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9365--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9365--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9365--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9365--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9365--   Scanning root segment: 0x701a000..0x701afff (4096)
--9365--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9365--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9365--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9365--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9365--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9365--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9365--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9365--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9365--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9365== Checked 4,908,096 bytes
==9365== 
==9365== LEAK SUMMARY:
==9365==    definitely lost: 1,533 bytes in 8 blocks
==9365==    indirectly lost: 6,756 bytes in 7 blocks
==9365==      possibly lost: 0 bytes in 0 blocks
==9365==    still reachable: 3,145,101 bytes in 68,951 blocks
==9365==         suppressed: 0 bytes in 0 blocks
==9365== Rerun with --leak-check=full to see details of leaked memory
==9365== 
==9365== Use --track-origins=yes to see where uninitialised values come from
==9365== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9365== 
==9365== 1 errors in context 1 of 2:
==9365== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9365==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9365==    by 0x488CD0: stringsubst (subst.c:301)
==9365==    by 0x48801B: prefork (subst.c:77)
==9365==    by 0x42B318: execcmd (exec.c:2619)
==9365==    by 0x428CA0: execpline2 (exec.c:1697)
==9365==    by 0x427FD2: execpline (exec.c:1484)
==9365==    by 0x427756: execlist (exec.c:1267)
==9365==    by 0x42717C: execode (exec.c:1073)
==9365==    by 0x431299: runshfunc (exec.c:5040)
==9365==    by 0x430E76: doshfunc (exec.c:4920)
==9365==    by 0x4302FB: execshfunc (exec.c:4557)
==9365==    by 0x42D8C1: execcmd (exec.c:3373)
==9365== 
==9365== 
==9365== 2 errors in context 2 of 2:
==9365== Conditional jump or move depends on uninitialised value(s)
==9365==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9365==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9365==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9365==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9365==    by 0x42D8E9: execcmd (exec.c:3378)
==9365==    by 0x428CA0: execpline2 (exec.c:1697)
==9365==    by 0x427FD2: execpline (exec.c:1484)
==9365==    by 0x42779A: execlist (exec.c:1275)
==9365==    by 0x42717C: execode (exec.c:1073)
==9365==    by 0x431299: runshfunc (exec.c:5040)
==9365==    by 0x430E76: doshfunc (exec.c:4920)
==9365==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9365== 
==9365== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9369== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9369-by-pythonnut-on-???
==9369== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9369-by-pythonnut-on-???
==9369== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9369-by-pythonnut-on-???
==9369== 
==9369== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9369== don't want to do, unless you know exactly what you're doing,
==9369== or are doing some strange experiment):
==9369==   /usr/lib/valgrind/../../bin/vgdb --pid=9369 ...command...
==9369== 
==9369== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9369==   /path/to/gdb ./zsh
==9369== and then give GDB the following command
==9369==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9369
==9369== --pid is optional if only one valgrind process is running
==9369== 
--9369-- Caught __NR_exit; running __libc_freeres()
==9368== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9368-by-pythonnut-on-???
==9368== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9368-by-pythonnut-on-???
==9368== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9368-by-pythonnut-on-???
==9368== 
==9368== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9368== don't want to do, unless you know exactly what you're doing,
==9368== or are doing some strange experiment):
==9368==   /usr/lib/valgrind/../../bin/vgdb --pid=9368 ...command...
==9368== 
==9368== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9368==   /path/to/gdb ./zsh
==9368== and then give GDB the following command
==9368==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9368
==9368== --pid is optional if only one valgrind process is running
==9368== 
--9369-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9369== 
==9369== HEAP SUMMARY:
==9369==     in use at exit: 3,154,075 bytes in 68,972 blocks
==9369==   total heap usage: 928,564 allocs, 859,592 frees, 65,646,288 bytes allocated
==9369== 
==9369== Searching for pointers to 68,972 not-freed blocks
--9369--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9369--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9369--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9369--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9369--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9369--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9369--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9369--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9369--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9369--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9369--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9369--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9369--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9369--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9369--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9369--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9369--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9369--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9369--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9369--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9369--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9369--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9369--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9369--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9369--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9369--   Scanning root segment: 0x701a000..0x701afff (4096)
--9369--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9369--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9369--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9369--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9369--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9369--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9369--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9369--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9369--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9369== Checked 4,888,648 bytes
==9369== 
==9369== LEAK SUMMARY:
==9369==    definitely lost: 1,533 bytes in 8 blocks
==9369==    indirectly lost: 6,756 bytes in 7 blocks
==9369==      possibly lost: 0 bytes in 0 blocks
==9369==    still reachable: 3,145,786 bytes in 68,957 blocks
==9369==         suppressed: 0 bytes in 0 blocks
==9369== Rerun with --leak-check=full to see details of leaked memory
==9369== 
==9369== Use --track-origins=yes to see where uninitialised values come from
==9369== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9369== 
==9369== 1 errors in context 1 of 2:
==9369== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9369==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9369==    by 0x488CD0: stringsubst (subst.c:301)
==9369==    by 0x48801B: prefork (subst.c:77)
==9369==    by 0x42B318: execcmd (exec.c:2619)
==9369==    by 0x428CA0: execpline2 (exec.c:1697)
==9369==    by 0x427FD2: execpline (exec.c:1484)
==9369==    by 0x427756: execlist (exec.c:1267)
==9369==    by 0x42717C: execode (exec.c:1073)
==9369==    by 0x431299: runshfunc (exec.c:5040)
==9369==    by 0x430E76: doshfunc (exec.c:4920)
==9369==    by 0x4302FB: execshfunc (exec.c:4557)
==9369==    by 0x42D8C1: execcmd (exec.c:3373)
==9369== 
==9369== 
==9369== 2 errors in context 2 of 2:
==9369== Conditional jump or move depends on uninitialised value(s)
==9369==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9369==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9369==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9369==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9369==    by 0x42D8E9: execcmd (exec.c:3378)
==9369==    by 0x428CA0: execpline2 (exec.c:1697)
==9369==    by 0x427FD2: execpline (exec.c:1484)
==9369==    by 0x42779A: execlist (exec.c:1275)
==9369==    by 0x42717C: execode (exec.c:1073)
==9369==    by 0x431299: runshfunc (exec.c:5040)
==9369==    by 0x430E76: doshfunc (exec.c:4920)
==9369==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9369== 
==9369== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9368-- Caught __NR_exit; running __libc_freeres()
--9368-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9368== 
==9368== HEAP SUMMARY:
==9368==     in use at exit: 3,153,968 bytes in 68,972 blocks
==9368==   total heap usage: 928,601 allocs, 859,629 frees, 65,655,829 bytes allocated
==9368== 
==9368== Searching for pointers to 68,972 not-freed blocks
--9368--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9368--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9368--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9368--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9368--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9368--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9368--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9368--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9368--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9368--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9368--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9368--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9368--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9368--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9368--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9368--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9368--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9368--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9368--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9368--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9368--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9368--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9368--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9368--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9368--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9368--   Scanning root segment: 0x701a000..0x701afff (4096)
--9368--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9368--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9368--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9368--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9368--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9368--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9368--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9368--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9368--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9368== Checked 4,887,960 bytes
==9368== 
==9368== LEAK SUMMARY:
==9368==    definitely lost: 1,533 bytes in 8 blocks
==9368==    indirectly lost: 6,756 bytes in 7 blocks
==9368==      possibly lost: 0 bytes in 0 blocks
==9368==    still reachable: 3,145,679 bytes in 68,957 blocks
==9368==         suppressed: 0 bytes in 0 blocks
==9368== Rerun with --leak-check=full to see details of leaked memory
==9368== 
==9368== Use --track-origins=yes to see where uninitialised values come from
==9368== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9368== 
==9368== 1 errors in context 1 of 2:
==9368== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9368==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9368==    by 0x488CD0: stringsubst (subst.c:301)
==9368==    by 0x48801B: prefork (subst.c:77)
==9368==    by 0x42B318: execcmd (exec.c:2619)
==9368==    by 0x428CA0: execpline2 (exec.c:1697)
==9368==    by 0x427FD2: execpline (exec.c:1484)
==9368==    by 0x427756: execlist (exec.c:1267)
==9368==    by 0x42717C: execode (exec.c:1073)
==9368==    by 0x431299: runshfunc (exec.c:5040)
==9368==    by 0x430E76: doshfunc (exec.c:4920)
==9368==    by 0x4302FB: execshfunc (exec.c:4557)
==9368==    by 0x42D8C1: execcmd (exec.c:3373)
==9368== 
==9368== 
==9368== 2 errors in context 2 of 2:
==9368== Conditional jump or move depends on uninitialised value(s)
==9368==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9368==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9368==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9368==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9368==    by 0x42D8E9: execcmd (exec.c:3378)
==9368==    by 0x428CA0: execpline2 (exec.c:1697)
==9368==    by 0x427FD2: execpline (exec.c:1484)
==9368==    by 0x42779A: execlist (exec.c:1275)
==9368==    by 0x42717C: execode (exec.c:1073)
==9368==    by 0x431299: runshfunc (exec.c:5040)
==9368==    by 0x430E76: doshfunc (exec.c:4920)
==9368==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9368== 
==9368== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9370== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9370-by-pythonnut-on-???
==9370== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9370-by-pythonnut-on-???
==9370== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9370-by-pythonnut-on-???
==9370== 
==9370== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9370== don't want to do, unless you know exactly what you're doing,
==9370== or are doing some strange experiment):
==9370==   /usr/lib/valgrind/../../bin/vgdb --pid=9370 ...command...
==9370== 
==9370== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9370==   /path/to/gdb ./zsh
==9370== and then give GDB the following command
==9370==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9370
==9370== --pid is optional if only one valgrind process is running
==9370== 
--9370-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1A3C,  len 4
--9370-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9371-- Caught __NR_exit; running __libc_freeres()
==9370== 
==9370== HEAP SUMMARY:
==9370==     in use at exit: 3,117,760 bytes in 68,972 blocks
==9370==   total heap usage: 928,573 allocs, 859,601 frees, 65,650,504 bytes allocated
==9370== 
==9371== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9371-by-pythonnut-on-???
==9371== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9371-by-pythonnut-on-???
==9371== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9371-by-pythonnut-on-???
==9371== 
==9371== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9371== don't want to do, unless you know exactly what you're doing,
==9371== or are doing some strange experiment):
==9371==   /usr/lib/valgrind/../../bin/vgdb --pid=9371 ...command...
==9371== 
==9371== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9371==   /path/to/gdb ./zsh
==9371== and then give GDB the following command
==9371==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9371
==9371== --pid is optional if only one valgrind process is running
==9371== 
--9371-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9370== Searching for pointers to 68,972 not-freed blocks
--9370--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9370--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9370--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9370--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9370--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9370--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9370--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9370--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9370--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9370--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9370--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9370--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9370--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9370--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9370--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9370--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9370--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9370--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9370--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9370--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9370--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9370--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9370--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9370--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9370--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9370--   Scanning root segment: 0x701a000..0x701afff (4096)
--9370--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9370--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9370--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9370--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9370--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9370--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9370--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9370--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9370--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9371== 
==9371== HEAP SUMMARY:
==9371==     in use at exit: 3,117,504 bytes in 68,972 blocks
==9371==   total heap usage: 928,579 allocs, 859,607 frees, 65,652,624 bytes allocated
==9371== 
==9371== Searching for pointers to 68,972 not-freed blocks
--9371--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9371--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9371--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9371--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9371--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9371--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9371--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9371--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9371--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9371--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9371--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9371--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9371--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9371--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9371--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9371--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9371--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9371--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9371--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9371--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9371--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9371--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9371--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9371--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9371--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9371--   Scanning root segment: 0x701a000..0x701afff (4096)
--9371--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9371--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9371--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9371--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9371--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9371--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9371--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9371--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9371--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9370== Checked 4,851,320 bytes
==9370== 
==9370== LEAK SUMMARY:
==9370==    definitely lost: 1,533 bytes in 8 blocks
==9370==    indirectly lost: 6,756 bytes in 7 blocks
==9370==      possibly lost: 0 bytes in 0 blocks
==9370==    still reachable: 3,109,471 bytes in 68,957 blocks
==9370==         suppressed: 0 bytes in 0 blocks
==9370== Rerun with --leak-check=full to see details of leaked memory
==9370== 
==9370== Use --track-origins=yes to see where uninitialised values come from
==9370== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9370== 
==9370== 1 errors in context 1 of 2:
==9370== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9370==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9370==    by 0x488CD0: stringsubst (subst.c:301)
==9370==    by 0x48801B: prefork (subst.c:77)
==9370==    by 0x42B318: execcmd (exec.c:2619)
==9370==    by 0x428CA0: execpline2 (exec.c:1697)
==9370==    by 0x427FD2: execpline (exec.c:1484)
==9370==    by 0x427756: execlist (exec.c:1267)
==9370==    by 0x42717C: execode (exec.c:1073)
==9370==    by 0x431299: runshfunc (exec.c:5040)
==9370==    by 0x430E76: doshfunc (exec.c:4920)
==9370==    by 0x4302FB: execshfunc (exec.c:4557)
==9370==    by 0x42D8C1: execcmd (exec.c:3373)
==9370== 
==9370== 
==9370== 2 errors in context 2 of 2:
==9370== Conditional jump or move depends on uninitialised value(s)
==9370==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9370==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9370==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9370==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9370==    by 0x42D8E9: execcmd (exec.c:3378)
==9370==    by 0x428CA0: execpline2 (exec.c:1697)
==9370==    by 0x427FD2: execpline (exec.c:1484)
==9370==    by 0x42779A: execlist (exec.c:1275)
==9370==    by 0x42717C: execode (exec.c:1073)
==9370==    by 0x431299: runshfunc (exec.c:5040)
==9370==    by 0x430E76: doshfunc (exec.c:4920)
==9370==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9370== 
==9370== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9371== Checked 4,851,168 bytes
==9371== 
==9371== LEAK SUMMARY:
==9371==    definitely lost: 1,557 bytes in 9 blocks
==9371==    indirectly lost: 6,796 bytes in 9 blocks
==9371==      possibly lost: 0 bytes in 0 blocks
==9371==    still reachable: 3,109,151 bytes in 68,954 blocks
==9371==         suppressed: 0 bytes in 0 blocks
==9371== Rerun with --leak-check=full to see details of leaked memory
==9371== 
==9371== Use --track-origins=yes to see where uninitialised values come from
==9371== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9371== 
==9371== 1 errors in context 1 of 2:
==9371== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9371==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9371==    by 0x488CD0: stringsubst (subst.c:301)
==9371==    by 0x48801B: prefork (subst.c:77)
==9371==    by 0x42B318: execcmd (exec.c:2619)
==9371==    by 0x428CA0: execpline2 (exec.c:1697)
==9371==    by 0x427FD2: execpline (exec.c:1484)
==9371==    by 0x427756: execlist (exec.c:1267)
==9371==    by 0x42717C: execode (exec.c:1073)
==9371==    by 0x431299: runshfunc (exec.c:5040)
==9371==    by 0x430E76: doshfunc (exec.c:4920)
==9371==    by 0x4302FB: execshfunc (exec.c:4557)
==9371==    by 0x42D8C1: execcmd (exec.c:3373)
==9371== 
==9371== 
==9371== 2 errors in context 2 of 2:
==9371== Conditional jump or move depends on uninitialised value(s)
==9371==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9371==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9371==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9371==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9371==    by 0x42D8E9: execcmd (exec.c:3378)
==9371==    by 0x428CA0: execpline2 (exec.c:1697)
==9371==    by 0x427FD2: execpline (exec.c:1484)
==9371==    by 0x42779A: execlist (exec.c:1275)
==9371==    by 0x42717C: execode (exec.c:1073)
==9371==    by 0x431299: runshfunc (exec.c:5040)
==9371==    by 0x430E76: doshfunc (exec.c:4920)
==9371==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9371== 
==9371== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9373== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9373-by-pythonnut-on-???
==9373== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9373-by-pythonnut-on-???
==9373== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9373-by-pythonnut-on-???
==9373== 
==9373== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9373== don't want to do, unless you know exactly what you're doing,
==9373== or are doing some strange experiment):
==9373==   /usr/lib/valgrind/../../bin/vgdb --pid=9373 ...command...
==9373== 
==9373== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9373==   /path/to/gdb ./zsh
==9373== and then give GDB the following command
==9373==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9373
==9373== --pid is optional if only one valgrind process is running
==9373== 
client request: code 4d430005,  addr 0xFFEFF23BC,  len 4
--9357-- Caught __NR_exit; running __libc_freeres()
--9357-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9357== 
==9357== HEAP SUMMARY:
==9357==     in use at exit: 3,116,086 bytes in 68,949 blocks
==9357==   total heap usage: 928,580 allocs, 859,631 frees, 65,653,192 bytes allocated
==9357== 
==9357== Searching for pointers to 68,949 not-freed blocks
--9357--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9357--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9357--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9357--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9357--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9357--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9357--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9357--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9357--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9357--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9357--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9357--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9357--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9357--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9357--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9357--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9357--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9357--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9357--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9357--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9357--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9357--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9357--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9357--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9357--   Scanning root segment: 0x701a000..0x701afff (4096)
--9357--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9357--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9357--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9357--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9357--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9357--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9357--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9357--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9357--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9357== Checked 4,757,568 bytes
==9357== 
==9357== LEAK SUMMARY:
==9357==    definitely lost: 1,533 bytes in 8 blocks
==9357==    indirectly lost: 6,756 bytes in 7 blocks
==9357==      possibly lost: 0 bytes in 0 blocks
==9357==    still reachable: 3,107,797 bytes in 68,934 blocks
==9357==         suppressed: 0 bytes in 0 blocks
==9357== Rerun with --leak-check=full to see details of leaked memory
==9357== 
==9357== Use --track-origins=yes to see where uninitialised values come from
==9357== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9357== 
==9357== 1 errors in context 1 of 2:
==9357== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9357==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9357==    by 0x488CD0: stringsubst (subst.c:301)
==9357==    by 0x48801B: prefork (subst.c:77)
==9357==    by 0x42B318: execcmd (exec.c:2619)
==9357==    by 0x428CA0: execpline2 (exec.c:1697)
==9357==    by 0x427FD2: execpline (exec.c:1484)
==9357==    by 0x427756: execlist (exec.c:1267)
==9357==    by 0x42717C: execode (exec.c:1073)
==9357==    by 0x431299: runshfunc (exec.c:5040)
==9357==    by 0x430E76: doshfunc (exec.c:4920)
==9357==    by 0x4302FB: execshfunc (exec.c:4557)
==9357==    by 0x42D8C1: execcmd (exec.c:3373)
==9357== 
==9357== 
==9357== 2 errors in context 2 of 2:
==9357== Conditional jump or move depends on uninitialised value(s)
==9357==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9357==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9357==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9357==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9357==    by 0x42D8E9: execcmd (exec.c:3378)
==9357==    by 0x428CA0: execpline2 (exec.c:1697)
==9357==    by 0x427FD2: execpline (exec.c:1484)
==9357==    by 0x42779A: execlist (exec.c:1275)
==9357==    by 0x42717C: execode (exec.c:1073)
==9357==    by 0x431299: runshfunc (exec.c:5040)
==9357==    by 0x430E76: doshfunc (exec.c:4920)
==9357==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9357== 
==9357== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9377== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9377-by-pythonnut-on-???
==9377== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9377-by-pythonnut-on-???
==9377== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9377-by-pythonnut-on-???
==9377== 
==9377== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9377== don't want to do, unless you know exactly what you're doing,
==9377== or are doing some strange experiment):
==9377==   /usr/lib/valgrind/../../bin/vgdb --pid=9377 ...command...
==9377== 
==9377== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9377==   /path/to/gdb ./zsh
==9377== and then give GDB the following command
==9377==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9377
==9377== --pid is optional if only one valgrind process is running
==9377== 
--9377-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF2CEC,  len 4
==9379== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9379-by-pythonnut-on-???
==9379== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9379-by-pythonnut-on-???
==9379== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9379-by-pythonnut-on-???
==9379== 
==9379== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9379== don't want to do, unless you know exactly what you're doing,
==9379== or are doing some strange experiment):
==9379==   /usr/lib/valgrind/../../bin/vgdb --pid=9379 ...command...
==9379== 
==9379== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9379==   /path/to/gdb ./zsh
==9379== and then give GDB the following command
==9379==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9379
==9379== --pid is optional if only one valgrind process is running
==9379== 
client request: code 4d430005,  addr 0xFFEFF2C4C,  len 4
--9377-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9377== 
==9377== HEAP SUMMARY:
==9377==     in use at exit: 3,116,414 bytes in 68,950 blocks
==9377==   total heap usage: 928,525 allocs, 859,575 frees, 65,602,478 bytes allocated
==9377== 
==9377== Searching for pointers to 68,950 not-freed blocks
--9377--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9377--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9377--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9377--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9377--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9377--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9377--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9377--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9377--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9377--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9377--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9377--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9377--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9377--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9377--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9377--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9377--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9377--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9377--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9377--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9377--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9377--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9377--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9377--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9377--   Scanning root segment: 0x701a000..0x701afff (4096)
--9377--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9377--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9377--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9377--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9377--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9377--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9377--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9377--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9377--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9377== Checked 4,759,104 bytes
==9377== 
==9377== LEAK SUMMARY:
==9377==    definitely lost: 1,533 bytes in 8 blocks
==9377==    indirectly lost: 6,756 bytes in 7 blocks
==9377==      possibly lost: 0 bytes in 0 blocks
==9377==    still reachable: 3,108,125 bytes in 68,935 blocks
==9377==         suppressed: 0 bytes in 0 blocks
==9377== Rerun with --leak-check=full to see details of leaked memory
==9377== 
==9377== Use --track-origins=yes to see where uninitialised values come from
==9377== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9377== 
==9377== 1 errors in context 1 of 2:
==9377== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9377==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9377==    by 0x488CD0: stringsubst (subst.c:301)
==9377==    by 0x48801B: prefork (subst.c:77)
==9377==    by 0x42B318: execcmd (exec.c:2619)
==9377==    by 0x428CA0: execpline2 (exec.c:1697)
==9377==    by 0x427FD2: execpline (exec.c:1484)
==9377==    by 0x427756: execlist (exec.c:1267)
==9377==    by 0x42717C: execode (exec.c:1073)
==9377==    by 0x431299: runshfunc (exec.c:5040)
==9377==    by 0x430E76: doshfunc (exec.c:4920)
==9377==    by 0x4302FB: execshfunc (exec.c:4557)
==9377==    by 0x42D8C1: execcmd (exec.c:3373)
==9377== 
==9377== 
==9377== 2 errors in context 2 of 2:
==9377== Conditional jump or move depends on uninitialised value(s)
==9377==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9377==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9377==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9377==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9377==    by 0x42D8E9: execcmd (exec.c:3378)
==9377==    by 0x428CA0: execpline2 (exec.c:1697)
==9377==    by 0x427FD2: execpline (exec.c:1484)
==9377==    by 0x42779A: execlist (exec.c:1275)
==9377==    by 0x42717C: execode (exec.c:1073)
==9377==    by 0x431299: runshfunc (exec.c:5040)
==9377==    by 0x430E76: doshfunc (exec.c:4920)
==9377==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9377== 
==9377== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9376-- Caught __NR_exit; running __libc_freeres()
==9376== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9376-by-pythonnut-on-???
==9376== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9376-by-pythonnut-on-???
==9376== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9376-by-pythonnut-on-???
==9376== 
==9376== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9376== don't want to do, unless you know exactly what you're doing,
==9376== or are doing some strange experiment):
==9376==   /usr/lib/valgrind/../../bin/vgdb --pid=9376 ...command...
==9376== 
==9376== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9376==   /path/to/gdb ./zsh
==9376== and then give GDB the following command
==9376==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9376
==9376== --pid is optional if only one valgrind process is running
==9376== 
--9376-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9376== 
==9376== HEAP SUMMARY:
==9376==     in use at exit: 3,116,126 bytes in 68,947 blocks
==9376==   total heap usage: 928,531 allocs, 859,584 frees, 65,603,366 bytes allocated
==9376== 
==9376== Searching for pointers to 68,947 not-freed blocks
--9376--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9376--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9376--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9376--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9376--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9376--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9376--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9376--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9376--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9376--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9376--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9376--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9376--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9376--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9376--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9376--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9376--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9376--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9376--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9376--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9376--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9376--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9376--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9376--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9376--   Scanning root segment: 0x701a000..0x701afff (4096)
--9376--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9376--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9376--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9376--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9376--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9376--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9376--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9376--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9376--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9376== Checked 4,758,184 bytes
==9376== 
==9376== LEAK SUMMARY:
==9376==    definitely lost: 1,533 bytes in 8 blocks
==9376==    indirectly lost: 6,756 bytes in 7 blocks
==9376==      possibly lost: 0 bytes in 0 blocks
==9376==    still reachable: 3,107,837 bytes in 68,932 blocks
==9376==         suppressed: 0 bytes in 0 blocks
==9376== Rerun with --leak-check=full to see details of leaked memory
==9376== 
==9376== Use --track-origins=yes to see where uninitialised values come from
==9376== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9376== 
==9376== 1 errors in context 1 of 2:
==9376== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9376==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9376==    by 0x488CD0: stringsubst (subst.c:301)
==9376==    by 0x48801B: prefork (subst.c:77)
==9376==    by 0x42B318: execcmd (exec.c:2619)
==9376==    by 0x428CA0: execpline2 (exec.c:1697)
==9376==    by 0x427FD2: execpline (exec.c:1484)
==9376==    by 0x427756: execlist (exec.c:1267)
==9376==    by 0x42717C: execode (exec.c:1073)
==9376==    by 0x431299: runshfunc (exec.c:5040)
==9376==    by 0x430E76: doshfunc (exec.c:4920)
==9376==    by 0x4302FB: execshfunc (exec.c:4557)
==9376==    by 0x42D8C1: execcmd (exec.c:3373)
==9376== 
==9376== 
==9376== 2 errors in context 2 of 2:
==9376== Conditional jump or move depends on uninitialised value(s)
==9376==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9376==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9376==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9376==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9376==    by 0x42D8E9: execcmd (exec.c:3378)
==9376==    by 0x428CA0: execpline2 (exec.c:1697)
==9376==    by 0x427FD2: execpline (exec.c:1484)
==9376==    by 0x42779A: execlist (exec.c:1275)
==9376==    by 0x42717C: execode (exec.c:1073)
==9376==    by 0x431299: runshfunc (exec.c:5040)
==9376==    by 0x430E76: doshfunc (exec.c:4920)
==9376==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9376== 
==9376== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9380== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9380-by-pythonnut-on-???
==9380== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9380-by-pythonnut-on-???
==9380== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9380-by-pythonnut-on-???
==9380== 
==9380== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9380== don't want to do, unless you know exactly what you're doing,
==9380== or are doing some strange experiment):
==9380==   /usr/lib/valgrind/../../bin/vgdb --pid=9380 ...command...
==9380== 
==9380== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9380==   /path/to/gdb ./zsh
==9380== and then give GDB the following command
==9380==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9380
==9380== --pid is optional if only one valgrind process is running
==9380== 
==9381== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9381-by-pythonnut-on-???
==9381== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9381-by-pythonnut-on-???
==9381== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9381-by-pythonnut-on-???
==9381== 
==9381== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9381== don't want to do, unless you know exactly what you're doing,
==9381== or are doing some strange experiment):
==9381==   /usr/lib/valgrind/../../bin/vgdb --pid=9381 ...command...
==9381== 
==9381== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9381==   /path/to/gdb ./zsh
==9381== and then give GDB the following command
==9381==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9381
==9381== --pid is optional if only one valgrind process is running
==9381== 
--9381-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF188C,  len 4
client request: code 4d430005,  addr 0xFFEFF17EC,  len 4
--9381-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9381== 
==9381== HEAP SUMMARY:
==9381==     in use at exit: 3,116,336 bytes in 68,952 blocks
==9381==   total heap usage: 928,558 allocs, 859,606 frees, 65,615,667 bytes allocated
==9381== 
==9381== Searching for pointers to 68,952 not-freed blocks
--9381--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9381--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9381--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9381--   Scanning root segment: 0x4037000..0x403afff (16384)
--9381--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9381--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9381--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9381--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9381--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9381--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9381--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9381--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9381--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9381--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9381--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9381--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9381--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9381--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9381--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9381--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9381--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9381--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9381--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9381--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9381--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9381--   Scanning root segment: 0x701a000..0x701afff (4096)
--9381--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9381--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9381--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9381--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9381--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9381--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9381--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9381--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9381--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9381== Checked 4,776,712 bytes
==9381== 
==9381== LEAK SUMMARY:
==9381==    definitely lost: 1,533 bytes in 8 blocks
==9381==    indirectly lost: 6,756 bytes in 7 blocks
==9381==      possibly lost: 0 bytes in 0 blocks
==9381==    still reachable: 3,108,047 bytes in 68,937 blocks
==9381==         suppressed: 0 bytes in 0 blocks
==9381== Rerun with --leak-check=full to see details of leaked memory
==9381== 
==9381== Use --track-origins=yes to see where uninitialised values come from
==9381== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9381== 
==9381== 1 errors in context 1 of 2:
==9381== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9381==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9381==    by 0x488CD0: stringsubst (subst.c:301)
==9381==    by 0x48801B: prefork (subst.c:77)
==9381==    by 0x42B318: execcmd (exec.c:2619)
==9381==    by 0x428CA0: execpline2 (exec.c:1697)
==9381==    by 0x427FD2: execpline (exec.c:1484)
==9381==    by 0x427756: execlist (exec.c:1267)
==9381==    by 0x42717C: execode (exec.c:1073)
==9381==    by 0x431299: runshfunc (exec.c:5040)
==9381==    by 0x430E76: doshfunc (exec.c:4920)
==9381==    by 0x4302FB: execshfunc (exec.c:4557)
==9381==    by 0x42D8C1: execcmd (exec.c:3373)
==9381== 
==9381== 
==9381== 2 errors in context 2 of 2:
==9381== Conditional jump or move depends on uninitialised value(s)
==9381==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9381==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9381==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9381==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9381==    by 0x42D8E9: execcmd (exec.c:3378)
==9381==    by 0x428CA0: execpline2 (exec.c:1697)
==9381==    by 0x427FD2: execpline (exec.c:1484)
==9381==    by 0x42779A: execlist (exec.c:1275)
==9381==    by 0x42717C: execode (exec.c:1073)
==9381==    by 0x431299: runshfunc (exec.c:5040)
==9381==    by 0x430E76: doshfunc (exec.c:4920)
==9381==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9381== 
==9381== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9380-- Caught __NR_exit; running __libc_freeres()
--9380-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9380== 
==9380== HEAP SUMMARY:
==9380==     in use at exit: 3,116,373 bytes in 68,953 blocks
==9380==   total heap usage: 928,554 allocs, 859,601 frees, 65,612,083 bytes allocated
==9380== 
==9380== Searching for pointers to 68,953 not-freed blocks
--9380--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9380--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9380--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9380--   Scanning root segment: 0x4037000..0x403afff (16384)
--9380--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9380--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9380--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9380--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9380--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9380--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9380--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9380--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9380--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9380--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9380--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9380--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9380--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9380--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9380--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9380--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9380--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9380--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9380--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9380--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9380--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9380--   Scanning root segment: 0x701a000..0x701afff (4096)
--9380--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9380--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9380--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9380--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9380--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9380--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9380--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9380--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9380--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9380== Checked 4,776,416 bytes
==9380== 
==9380== LEAK SUMMARY:
==9380==    definitely lost: 1,533 bytes in 8 blocks
==9380==    indirectly lost: 6,756 bytes in 7 blocks
==9380==      possibly lost: 0 bytes in 0 blocks
==9380==    still reachable: 3,108,084 bytes in 68,938 blocks
==9380==         suppressed: 0 bytes in 0 blocks
==9380== Rerun with --leak-check=full to see details of leaked memory
==9380== 
==9380== Use --track-origins=yes to see where uninitialised values come from
==9380== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9380== 
==9380== 1 errors in context 1 of 2:
==9380== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9380==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9380==    by 0x488CD0: stringsubst (subst.c:301)
==9380==    by 0x48801B: prefork (subst.c:77)
==9380==    by 0x42B318: execcmd (exec.c:2619)
==9380==    by 0x428CA0: execpline2 (exec.c:1697)
==9380==    by 0x427FD2: execpline (exec.c:1484)
==9380==    by 0x427756: execlist (exec.c:1267)
==9380==    by 0x42717C: execode (exec.c:1073)
==9380==    by 0x431299: runshfunc (exec.c:5040)
==9380==    by 0x430E76: doshfunc (exec.c:4920)
==9380==    by 0x4302FB: execshfunc (exec.c:4557)
==9380==    by 0x42D8C1: execcmd (exec.c:3373)
==9380== 
==9380== 
==9380== 2 errors in context 2 of 2:
==9380== Conditional jump or move depends on uninitialised value(s)
==9380==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9380==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9380==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9380==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9380==    by 0x42D8E9: execcmd (exec.c:3378)
==9380==    by 0x428CA0: execpline2 (exec.c:1697)
==9380==    by 0x427FD2: execpline (exec.c:1484)
==9380==    by 0x42779A: execlist (exec.c:1275)
==9380==    by 0x42717C: execode (exec.c:1073)
==9380==    by 0x431299: runshfunc (exec.c:5040)
==9380==    by 0x430E76: doshfunc (exec.c:4920)
==9380==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9380== 
==9380== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1DDC,  len 4
--9384-- Caught __NR_exit; running __libc_freeres()
==9384== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9384-by-pythonnut-on-???
==9384== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9384-by-pythonnut-on-???
==9384== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9384-by-pythonnut-on-???
==9384== 
==9384== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9384== don't want to do, unless you know exactly what you're doing,
==9384== or are doing some strange experiment):
==9384==   /usr/lib/valgrind/../../bin/vgdb --pid=9384 ...command...
==9384== 
==9384== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9384==   /path/to/gdb ./zsh
==9384== and then give GDB the following command
==9384==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9384
==9384== --pid is optional if only one valgrind process is running
==9384== 
--9384-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9384== 
==9384== HEAP SUMMARY:
==9384==     in use at exit: 3,116,717 bytes in 68,958 blocks
==9384==   total heap usage: 928,566 allocs, 859,608 frees, 65,617,409 bytes allocated
==9384== 
==9384== Searching for pointers to 68,958 not-freed blocks
--9384--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9384--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9384--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9384--   Scanning root segment: 0x4037000..0x403afff (16384)
--9384--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9384--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9384--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9384--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9384--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9384--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9384--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9384--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9384--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9384--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9384--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9384--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9384--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9384--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9384--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9384--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9384--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9384--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9384--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9384--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9384--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9384--   Scanning root segment: 0x701a000..0x701afff (4096)
--9384--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9384--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9384--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9384--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9384--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9384--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9384--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9384--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9384--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9384== Checked 4,776,480 bytes
==9384== 
==9384== LEAK SUMMARY:
==9384==    definitely lost: 1,533 bytes in 8 blocks
==9384==    indirectly lost: 6,756 bytes in 7 blocks
==9384==      possibly lost: 0 bytes in 0 blocks
==9384==    still reachable: 3,108,428 bytes in 68,943 blocks
==9384==         suppressed: 0 bytes in 0 blocks
==9384== Rerun with --leak-check=full to see details of leaked memory
==9384== 
==9384== Use --track-origins=yes to see where uninitialised values come from
==9384== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9384== 
==9384== 1 errors in context 1 of 2:
==9384== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9384==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9384==    by 0x488CD0: stringsubst (subst.c:301)
==9384==    by 0x48801B: prefork (subst.c:77)
==9384==    by 0x42B318: execcmd (exec.c:2619)
==9384==    by 0x428CA0: execpline2 (exec.c:1697)
==9384==    by 0x427FD2: execpline (exec.c:1484)
==9384==    by 0x427756: execlist (exec.c:1267)
==9384==    by 0x42717C: execode (exec.c:1073)
==9384==    by 0x431299: runshfunc (exec.c:5040)
==9384==    by 0x430E76: doshfunc (exec.c:4920)
==9384==    by 0x4302FB: execshfunc (exec.c:4557)
==9384==    by 0x42D8C1: execcmd (exec.c:3373)
==9384== 
==9384== 
==9384== 2 errors in context 2 of 2:
==9384== Conditional jump or move depends on uninitialised value(s)
==9384==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9384==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9384==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9384==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9384==    by 0x42D8E9: execcmd (exec.c:3378)
==9384==    by 0x428CA0: execpline2 (exec.c:1697)
==9384==    by 0x427FD2: execpline (exec.c:1484)
==9384==    by 0x42779A: execlist (exec.c:1275)
==9384==    by 0x42717C: execode (exec.c:1073)
==9384==    by 0x431299: runshfunc (exec.c:5040)
==9384==    by 0x430E76: doshfunc (exec.c:4920)
==9384==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9384== 
==9384== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF192C,  len 4
--9388-- Caught __NR_exit; running __libc_freeres()
==9388== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9388-by-pythonnut-on-???
==9388== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9388-by-pythonnut-on-???
==9388== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9388-by-pythonnut-on-???
==9388== 
==9388== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9388== don't want to do, unless you know exactly what you're doing,
==9388== or are doing some strange experiment):
==9388==   /usr/lib/valgrind/../../bin/vgdb --pid=9388 ...command...
==9388== 
==9388== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9388==   /path/to/gdb ./zsh
==9388== and then give GDB the following command
==9388==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9388
==9388== --pid is optional if only one valgrind process is running
==9388== 
--9388-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9388== 
==9388== HEAP SUMMARY:
==9388==     in use at exit: 3,116,746 bytes in 68,959 blocks
==9388==   total heap usage: 928,571 allocs, 859,612 frees, 65,619,550 bytes allocated
==9388== 
==9388== Searching for pointers to 68,959 not-freed blocks
--9388--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9388--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9388--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9388--   Scanning root segment: 0x4037000..0x403afff (16384)
--9388--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9388--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9388--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9388--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9388--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9388--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9388--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9388--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9388--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9388--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9388--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9388--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9388--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9388--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9388--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9388--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9388--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9388--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9388--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9388--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9388--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9388--   Scanning root segment: 0x701a000..0x701afff (4096)
--9388--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9388--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9388--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9388--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9388--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9388--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9388--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9388--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9388--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9388== Checked 4,776,776 bytes
==9388== 
==9388== LEAK SUMMARY:
==9388==    definitely lost: 1,533 bytes in 8 blocks
==9388==    indirectly lost: 6,756 bytes in 7 blocks
==9388==      possibly lost: 0 bytes in 0 blocks
==9388==    still reachable: 3,108,457 bytes in 68,944 blocks
==9388==         suppressed: 0 bytes in 0 blocks
==9388== Rerun with --leak-check=full to see details of leaked memory
==9388== 
==9388== Use --track-origins=yes to see where uninitialised values come from
==9388== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9388== 
==9388== 1 errors in context 1 of 2:
==9388== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9388==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9388==    by 0x488CD0: stringsubst (subst.c:301)
==9388==    by 0x48801B: prefork (subst.c:77)
==9388==    by 0x42B318: execcmd (exec.c:2619)
==9388==    by 0x428CA0: execpline2 (exec.c:1697)
==9388==    by 0x427FD2: execpline (exec.c:1484)
==9388==    by 0x427756: execlist (exec.c:1267)
==9388==    by 0x42717C: execode (exec.c:1073)
==9388==    by 0x431299: runshfunc (exec.c:5040)
==9388==    by 0x430E76: doshfunc (exec.c:4920)
==9388==    by 0x4302FB: execshfunc (exec.c:4557)
==9388==    by 0x42D8C1: execcmd (exec.c:3373)
==9388== 
==9388== 
==9388== 2 errors in context 2 of 2:
==9388== Conditional jump or move depends on uninitialised value(s)
==9388==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9388==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9388==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9388==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9388==    by 0x42D8E9: execcmd (exec.c:3378)
==9388==    by 0x428CA0: execpline2 (exec.c:1697)
==9388==    by 0x427FD2: execpline (exec.c:1484)
==9388==    by 0x42779A: execlist (exec.c:1275)
==9388==    by 0x42717C: execode (exec.c:1073)
==9388==    by 0x431299: runshfunc (exec.c:5040)
==9388==    by 0x430E76: doshfunc (exec.c:4920)
==9388==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9388== 
==9388== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9390== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9390-by-pythonnut-on-???
==9390== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9390-by-pythonnut-on-???
==9390== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9390-by-pythonnut-on-???
==9390== 
==9390== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9390== don't want to do, unless you know exactly what you're doing,
==9390== or are doing some strange experiment):
==9390==   /usr/lib/valgrind/../../bin/vgdb --pid=9390 ...command...
==9390== 
==9390== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9390==   /path/to/gdb ./zsh
==9390== and then give GDB the following command
==9390==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9390
==9390== --pid is optional if only one valgrind process is running
==9390== 
client request: code 4d430005,  addr 0xFFEFF22AC,  len 4
client request: code 4d430005,  addr 0xFFEFF1C2C,  len 4
--9356-- Caught __NR_exit; running __libc_freeres()
--9356-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9356== 
==9356== HEAP SUMMARY:
==9356==     in use at exit: 3,114,746 bytes in 68,911 blocks
==9356==   total heap usage: 928,580 allocs, 859,669 frees, 65,623,490 bytes allocated
==9356== 
==9356== Searching for pointers to 68,911 not-freed blocks
--9356--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9356--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9356--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9356--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9356--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9356--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9356--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9356--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9356--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9356--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9356--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9356--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9356--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9356--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9356--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9356--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9356--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9356--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9356--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9356--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9356--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9356--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9356--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9356--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9356--   Scanning root segment: 0x701a000..0x701afff (4096)
--9356--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9356--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9356--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9356--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9356--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9356--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9356--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9356--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9356--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9356== Checked 4,754,480 bytes
==9356== 
==9356== LEAK SUMMARY:
==9356==    definitely lost: 1,533 bytes in 8 blocks
==9356==    indirectly lost: 6,756 bytes in 7 blocks
==9356==      possibly lost: 0 bytes in 0 blocks
==9356==    still reachable: 3,106,457 bytes in 68,896 blocks
==9356==         suppressed: 0 bytes in 0 blocks
==9356== Rerun with --leak-check=full to see details of leaked memory
==9356== 
==9356== Use --track-origins=yes to see where uninitialised values come from
==9356== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9356== 
==9356== 1 errors in context 1 of 2:
==9356== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9356==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9356==    by 0x488CD0: stringsubst (subst.c:301)
==9356==    by 0x48801B: prefork (subst.c:77)
==9356==    by 0x42B318: execcmd (exec.c:2619)
==9356==    by 0x428CA0: execpline2 (exec.c:1697)
==9356==    by 0x427FD2: execpline (exec.c:1484)
==9356==    by 0x427756: execlist (exec.c:1267)
==9356==    by 0x42717C: execode (exec.c:1073)
==9356==    by 0x431299: runshfunc (exec.c:5040)
==9356==    by 0x430E76: doshfunc (exec.c:4920)
==9356==    by 0x4302FB: execshfunc (exec.c:4557)
==9356==    by 0x42D8C1: execcmd (exec.c:3373)
==9356== 
==9356== 
==9356== 2 errors in context 2 of 2:
==9356== Conditional jump or move depends on uninitialised value(s)
==9356==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9356==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9356==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9356==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9356==    by 0x42D8E9: execcmd (exec.c:3378)
==9356==    by 0x428CA0: execpline2 (exec.c:1697)
==9356==    by 0x427FD2: execpline (exec.c:1484)
==9356==    by 0x42779A: execlist (exec.c:1275)
==9356==    by 0x42717C: execode (exec.c:1073)
==9356==    by 0x431299: runshfunc (exec.c:5040)
==9356==    by 0x430E76: doshfunc (exec.c:4920)
==9356==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9356== 
==9356== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
==9392== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9392-by-pythonnut-on-???
==9392== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9392-by-pythonnut-on-???
==9392== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9392-by-pythonnut-on-???
==9392== 
==9392== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9392== don't want to do, unless you know exactly what you're doing,
==9392== or are doing some strange experiment):
==9392==   /usr/lib/valgrind/../../bin/vgdb --pid=9392 ...command...
==9392== 
==9392== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9392==   /path/to/gdb ./zsh
==9392== and then give GDB the following command
==9392==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9392
==9392== --pid is optional if only one valgrind process is running
==9392== 
--9392-- Caught __NR_exit; running __libc_freeres()
--9392-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9392== 
==9392== HEAP SUMMARY:
==9392==     in use at exit: 3,116,928 bytes in 68,923 blocks
==9392==   total heap usage: 936,381 allocs, 867,458 frees, 66,946,264 bytes allocated
==9392== 
==9392== Searching for pointers to 68,923 not-freed blocks
--9392--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9392--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9392--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9392--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9392--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9392--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9392--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9392--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9392--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9392--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9392--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9392--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9392--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9392--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9392--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9392--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9392--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9392--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9392--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9392--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9392--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9392--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9392--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9392--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9392--   Scanning root segment: 0x701a000..0x701afff (4096)
--9392--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9392--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9392--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9392--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9392--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9392--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9392--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9392--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9392--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9392== Checked 4,779,960 bytes
==9392== 
==9392== LEAK SUMMARY:
==9392==    definitely lost: 1,533 bytes in 8 blocks
==9392==    indirectly lost: 6,756 bytes in 7 blocks
==9392==      possibly lost: 0 bytes in 0 blocks
==9392==    still reachable: 3,108,639 bytes in 68,908 blocks
==9392==         suppressed: 0 bytes in 0 blocks
==9392== Rerun with --leak-check=full to see details of leaked memory
==9392== 
==9392== Use --track-origins=yes to see where uninitialised values come from
==9392== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9392== 
==9392== 1 errors in context 1 of 2:
==9392== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9392==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9392==    by 0x488CD0: stringsubst (subst.c:301)
==9392==    by 0x48801B: prefork (subst.c:77)
==9392==    by 0x42B318: execcmd (exec.c:2619)
==9392==    by 0x428CA0: execpline2 (exec.c:1697)
==9392==    by 0x427FD2: execpline (exec.c:1484)
==9392==    by 0x427756: execlist (exec.c:1267)
==9392==    by 0x42717C: execode (exec.c:1073)
==9392==    by 0x431299: runshfunc (exec.c:5040)
==9392==    by 0x430E76: doshfunc (exec.c:4920)
==9392==    by 0x4302FB: execshfunc (exec.c:4557)
==9392==    by 0x42D8C1: execcmd (exec.c:3373)
==9392== 
==9392== 
==9392== 2 errors in context 2 of 2:
==9392== Conditional jump or move depends on uninitialised value(s)
==9392==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9392==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9392==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9392==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9392==    by 0x42D8E9: execcmd (exec.c:3378)
==9392==    by 0x428CA0: execpline2 (exec.c:1697)
==9392==    by 0x427FD2: execpline (exec.c:1484)
==9392==    by 0x42779A: execlist (exec.c:1275)
==9392==    by 0x42717C: execode (exec.c:1073)
==9392==    by 0x431299: runshfunc (exec.c:5040)
==9392==    by 0x430E76: doshfunc (exec.c:4920)
==9392==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9392== 
==9392== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9393== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9393-by-pythonnut-on-???
==9393== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9393-by-pythonnut-on-???
==9393== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9393-by-pythonnut-on-???
==9393== 
==9393== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9393== don't want to do, unless you know exactly what you're doing,
==9393== or are doing some strange experiment):
==9393==   /usr/lib/valgrind/../../bin/vgdb --pid=9393 ...command...
==9393== 
==9393== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9393==   /path/to/gdb ./zsh
==9393== and then give GDB the following command
==9393==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9393
==9393== --pid is optional if only one valgrind process is running
==9393== 
==9396== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9396-by-pythonnut-on-???
==9396== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9396-by-pythonnut-on-???
==9396== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9396-by-pythonnut-on-???
==9396== 
==9396== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9396== don't want to do, unless you know exactly what you're doing,
==9396== or are doing some strange experiment):
==9396==   /usr/lib/valgrind/../../bin/vgdb --pid=9396 ...command...
==9396== 
==9396== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9396==   /path/to/gdb ./zsh
==9396== and then give GDB the following command
==9396==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9396
==9396== --pid is optional if only one valgrind process is running
==9396== 
==9397== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9397-by-pythonnut-on-???
==9397== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9397-by-pythonnut-on-???
==9397== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9397-by-pythonnut-on-???
==9397== 
==9397== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9397== don't want to do, unless you know exactly what you're doing,
==9397== or are doing some strange experiment):
==9397==   /usr/lib/valgrind/../../bin/vgdb --pid=9397 ...command...
==9397== 
==9397== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9397==   /path/to/gdb ./zsh
==9397== and then give GDB the following command
==9397==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9397
==9397== --pid is optional if only one valgrind process is running
==9397== 
==9395== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9395-by-pythonnut-on-???
==9395== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9395-by-pythonnut-on-???
==9395== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9395-by-pythonnut-on-???
==9395== 
==9395== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9395== don't want to do, unless you know exactly what you're doing,
==9395== or are doing some strange experiment):
==9395==   /usr/lib/valgrind/../../bin/vgdb --pid=9395 ...command...
==9395== 
==9395== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9395==   /path/to/gdb ./zsh
==9395== and then give GDB the following command
==9395==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9395
==9395== --pid is optional if only one valgrind process is running
==9395== 
==9399== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9399-by-pythonnut-on-???
==9399== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9399-by-pythonnut-on-???
==9399== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9399-by-pythonnut-on-???
==9399== 
==9399== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9399== don't want to do, unless you know exactly what you're doing,
==9399== or are doing some strange experiment):
==9399==   /usr/lib/valgrind/../../bin/vgdb --pid=9399 ...command...
==9399== 
==9399== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9399==   /path/to/gdb ./zsh
==9399== and then give GDB the following command
==9399==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9399
==9399== --pid is optional if only one valgrind process is running
==9399== 
==9400== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9400-by-pythonnut-on-???
==9400== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9400-by-pythonnut-on-???
==9400== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9400-by-pythonnut-on-???
==9400== 
==9400== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9400== don't want to do, unless you know exactly what you're doing,
==9400== or are doing some strange experiment):
==9400==   /usr/lib/valgrind/../../bin/vgdb --pid=9400 ...command...
==9400== 
==9400== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9400==   /path/to/gdb ./zsh
==9400== and then give GDB the following command
==9400==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9400
==9400== --pid is optional if only one valgrind process is running
==9400== 
==9401== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9401-by-pythonnut-on-???
==9401== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9401-by-pythonnut-on-???
==9401== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9401-by-pythonnut-on-???
==9401== 
==9401== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9401== don't want to do, unless you know exactly what you're doing,
==9401== or are doing some strange experiment):
==9401==   /usr/lib/valgrind/../../bin/vgdb --pid=9401 ...command...
==9401== 
==9401== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9401==   /path/to/gdb ./zsh
==9401== and then give GDB the following command
==9401==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9401
==9401== --pid is optional if only one valgrind process is running
==9401== 
--9401-- Caught __NR_exit; running __libc_freeres()
==9404== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9404-by-pythonnut-on-???
==9404== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9404-by-pythonnut-on-???
==9404== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9404-by-pythonnut-on-???
==9404== 
==9404== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9404== don't want to do, unless you know exactly what you're doing,
==9404== or are doing some strange experiment):
==9404==   /usr/lib/valgrind/../../bin/vgdb --pid=9404 ...command...
==9404== 
==9404== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9404==   /path/to/gdb ./zsh
==9404== and then give GDB the following command
==9404==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9404
==9404== --pid is optional if only one valgrind process is running
==9404== 
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9402== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9402-by-pythonnut-on-???
==9402== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9402-by-pythonnut-on-???
==9402== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9402-by-pythonnut-on-???
==9402== 
==9402== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9402== don't want to do, unless you know exactly what you're doing,
==9402== or are doing some strange experiment):
==9402==   /usr/lib/valgrind/../../bin/vgdb --pid=9402 ...command...
==9402== 
==9402== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9402==   /path/to/gdb ./zsh
==9402== and then give GDB the following command
==9402==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9402
==9402== --pid is optional if only one valgrind process is running
==9402== 
--9402-- Caught __NR_exit; running __libc_freeres()
--9401-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9401== 
==9401== HEAP SUMMARY:
==9401==     in use at exit: 3,115,859 bytes in 68,911 blocks
==9401==   total heap usage: 935,498 allocs, 866,587 frees, 66,334,915 bytes allocated
==9401== 
--9402-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9402== 
==9402== HEAP SUMMARY:
==9402==     in use at exit: 3,117,104 bytes in 68,900 blocks
==9402==   total heap usage: 935,488 allocs, 866,588 frees, 66,577,191 bytes allocated
==9402== 
==9401== Searching for pointers to 68,911 not-freed blocks
--9401--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9401--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9401--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9401--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9401--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9401--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9401--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9401--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9401--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9401--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9401--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9401--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9401--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9401--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9401--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9401--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9401--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9401--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9401--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9401--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9401--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9401--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9401--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9401--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9401--   Scanning root segment: 0x701a000..0x701afff (4096)
--9401--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9401--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9401--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9401--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9401--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9401--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9401--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9401--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9401--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9397-- Caught __NR_exit; running __libc_freeres()
==9402== Searching for pointers to 68,900 not-freed blocks
--9402--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9402--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9402--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9402--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9402--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9402--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9402--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9402--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9402--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9402--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9402--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9402--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9402--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9402--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9402--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9402--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9402--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9402--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9402--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9402--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9402--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9402--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9402--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9402--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9402--   Scanning root segment: 0x701a000..0x701afff (4096)
--9402--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9402--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9402--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9402--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9402--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9402--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9402--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9402--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9402--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9397-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9397== 
==9397== HEAP SUMMARY:
==9397==     in use at exit: 3,122,699 bytes in 69,131 blocks
==9397==   total heap usage: 936,603 allocs, 867,472 frees, 66,957,364 bytes allocated
==9397== 
==9397== Searching for pointers to 69,131 not-freed blocks
--9397--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9397--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9397--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9397--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9397--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9397--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9397--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9397--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9397--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9397--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9397--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9397--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9397--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9397--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9397--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9397--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9397--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9397--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9397--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9397--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9397--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9397--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9397--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9397--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9397--   Scanning root segment: 0x701a000..0x701afff (4096)
--9397--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9397--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9397--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9397--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9397--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9397--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9397--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9397--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9397--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9401== Checked 4,778,472 bytes
==9401== 
==9401== LEAK SUMMARY:
==9401==    definitely lost: 1,533 bytes in 8 blocks
==9401==    indirectly lost: 6,756 bytes in 7 blocks
==9401==      possibly lost: 0 bytes in 0 blocks
==9401==    still reachable: 3,107,570 bytes in 68,896 blocks
==9401==         suppressed: 0 bytes in 0 blocks
==9401== Rerun with --leak-check=full to see details of leaked memory
==9401== 
==9401== Use --track-origins=yes to see where uninitialised values come from
==9401== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9401== 
==9401== 1 errors in context 1 of 2:
==9401== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9401==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9401==    by 0x488CD0: stringsubst (subst.c:301)
==9401==    by 0x48801B: prefork (subst.c:77)
==9401==    by 0x42B318: execcmd (exec.c:2619)
==9401==    by 0x428CA0: execpline2 (exec.c:1697)
==9401==    by 0x427FD2: execpline (exec.c:1484)
==9401==    by 0x427756: execlist (exec.c:1267)
==9401==    by 0x42717C: execode (exec.c:1073)
==9401==    by 0x431299: runshfunc (exec.c:5040)
==9401==    by 0x430E76: doshfunc (exec.c:4920)
==9401==    by 0x4302FB: execshfunc (exec.c:4557)
==9401==    by 0x42D8C1: execcmd (exec.c:3373)
==9401== 
==9401== 
==9401== 2 errors in context 2 of 2:
==9401== Conditional jump or move depends on uninitialised value(s)
==9401==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9401==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9401==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9401==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9401==    by 0x42D8E9: execcmd (exec.c:3378)
==9401==    by 0x428CA0: execpline2 (exec.c:1697)
==9401==    by 0x427FD2: execpline (exec.c:1484)
==9401==    by 0x42779A: execlist (exec.c:1275)
==9401==    by 0x42717C: execode (exec.c:1073)
==9401==    by 0x431299: runshfunc (exec.c:5040)
==9401==    by 0x430E76: doshfunc (exec.c:4920)
==9401==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9401== 
==9401== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9398-- Caught __NR_exit; running __libc_freeres()
==9402== Checked 4,764,384 bytes
==9402== 
==9398== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9398-by-pythonnut-on-???
==9398== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9398-by-pythonnut-on-???
==9398== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9398-by-pythonnut-on-???
==9398== 
==9398== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9398== don't want to do, unless you know exactly what you're doing,
==9398== or are doing some strange experiment):
==9398==   /usr/lib/valgrind/../../bin/vgdb --pid=9398 ...command...
==9398== 
==9398== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9398==   /path/to/gdb ./zsh
==9398== and then give GDB the following command
==9398==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9398
==9398== --pid is optional if only one valgrind process is running
==9398== 
==9402== LEAK SUMMARY:
==9402==    definitely lost: 1,533 bytes in 8 blocks
==9402==    indirectly lost: 6,756 bytes in 7 blocks
==9402==      possibly lost: 0 bytes in 0 blocks
==9402==    still reachable: 3,108,815 bytes in 68,885 blocks
==9402==         suppressed: 0 bytes in 0 blocks
==9402== Rerun with --leak-check=full to see details of leaked memory
==9402== 
==9402== Use --track-origins=yes to see where uninitialised values come from
==9402== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9402== 
==9402== 1 errors in context 1 of 2:
==9402== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9402==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9402==    by 0x488CD0: stringsubst (subst.c:301)
==9402==    by 0x48801B: prefork (subst.c:77)
==9402==    by 0x42B318: execcmd (exec.c:2619)
==9402==    by 0x428CA0: execpline2 (exec.c:1697)
==9402==    by 0x427FD2: execpline (exec.c:1484)
==9402==    by 0x427756: execlist (exec.c:1267)
==9402==    by 0x42717C: execode (exec.c:1073)
==9402==    by 0x431299: runshfunc (exec.c:5040)
==9402==    by 0x430E76: doshfunc (exec.c:4920)
==9402==    by 0x4302FB: execshfunc (exec.c:4557)
==9402==    by 0x42D8C1: execcmd (exec.c:3373)
==9402== 
==9402== 
==9402== 2 errors in context 2 of 2:
==9402== Conditional jump or move depends on uninitialised value(s)
==9402==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9402==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9402==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9402==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9402==    by 0x42D8E9: execcmd (exec.c:3378)
==9402==    by 0x428CA0: execpline2 (exec.c:1697)
==9402==    by 0x427FD2: execpline (exec.c:1484)
==9402==    by 0x42779A: execlist (exec.c:1275)
==9402==    by 0x42717C: execode (exec.c:1073)
==9402==    by 0x431299: runshfunc (exec.c:5040)
==9402==    by 0x430E76: doshfunc (exec.c:4920)
==9402==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9402== 
==9402== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9398-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9398== 
--9407-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9398== HEAP SUMMARY:
==9398==     in use at exit: 3,115,795 bytes in 68,908 blocks
==9398==   total heap usage: 935,496 allocs, 866,588 frees, 66,334,674 bytes allocated
==9398== 
==9407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9407-by-pythonnut-on-???
==9407== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9407-by-pythonnut-on-???
==9407== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9407-by-pythonnut-on-???
==9407== 
==9407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9407== don't want to do, unless you know exactly what you're doing,
==9407== or are doing some strange experiment):
==9407==   /usr/lib/valgrind/../../bin/vgdb --pid=9407 ...command...
==9407== 
==9407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9407==   /path/to/gdb ./zsh
==9407== and then give GDB the following command
==9407==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9407
==9407== --pid is optional if only one valgrind process is running
==9407== 
client request: code 4d430005,  addr 0xFFEFF8FCC,  len 4
==9397== Checked 4,789,208 bytes
==9397== 
==9398== Searching for pointers to 68,908 not-freed blocks
--9398--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9398--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9398--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9398--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9398--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9398--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9398--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9398--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9398--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9398--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9398--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9398--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9398--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9398--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9398--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9398--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9398--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9398--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9398--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9398--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9398--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9398--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9398--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9398--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9398--   Scanning root segment: 0x701a000..0x701afff (4096)
--9398--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9398--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9398--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9398--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9398--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9398--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9398--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9398--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9398--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9397== LEAK SUMMARY:
==9397==    definitely lost: 1,533 bytes in 8 blocks
==9397==    indirectly lost: 6,756 bytes in 7 blocks
==9397==      possibly lost: 0 bytes in 0 blocks
==9397==    still reachable: 3,114,410 bytes in 69,116 blocks
==9397==         suppressed: 0 bytes in 0 blocks
==9397== Rerun with --leak-check=full to see details of leaked memory
==9397== 
==9397== Use --track-origins=yes to see where uninitialised values come from
==9397== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9397== 
==9397== 1 errors in context 1 of 2:
==9397== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9397==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9397==    by 0x488CD0: stringsubst (subst.c:301)
==9397==    by 0x48801B: prefork (subst.c:77)
==9397==    by 0x42B318: execcmd (exec.c:2619)
==9397==    by 0x428CA0: execpline2 (exec.c:1697)
==9397==    by 0x427FD2: execpline (exec.c:1484)
==9397==    by 0x427756: execlist (exec.c:1267)
==9397==    by 0x42717C: execode (exec.c:1073)
==9397==    by 0x431299: runshfunc (exec.c:5040)
==9397==    by 0x430E76: doshfunc (exec.c:4920)
==9397==    by 0x4302FB: execshfunc (exec.c:4557)
==9397==    by 0x42D8C1: execcmd (exec.c:3373)
==9397== 
==9397== 
==9397== 2 errors in context 2 of 2:
==9397== Conditional jump or move depends on uninitialised value(s)
==9397==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9397==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9397==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9397==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9397==    by 0x42D8E9: execcmd (exec.c:3378)
==9397==    by 0x428CA0: execpline2 (exec.c:1697)
==9397==    by 0x427FD2: execpline (exec.c:1484)
==9397==    by 0x42779A: execlist (exec.c:1275)
==9397==    by 0x42717C: execode (exec.c:1073)
==9397==    by 0x431299: runshfunc (exec.c:5040)
==9397==    by 0x430E76: doshfunc (exec.c:4920)
==9397==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9397== 
==9397== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF5FBC,  len 4
==9408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9408-by-pythonnut-on-???
==9408== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9408-by-pythonnut-on-???
==9408== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9408-by-pythonnut-on-???
==9408== 
==9408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9408== don't want to do, unless you know exactly what you're doing,
==9408== or are doing some strange experiment):
==9408==   /usr/lib/valgrind/../../bin/vgdb --pid=9408 ...command...
==9408== 
==9408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9408==   /path/to/gdb ./zsh
==9408== and then give GDB the following command
==9408==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9408
==9408== --pid is optional if only one valgrind process is running
==9408== 
--9408-- Caught __NR_exit; running __libc_freeres()
--9408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9408== 
==9408== HEAP SUMMARY:
==9408==     in use at exit: 3,122,769 bytes in 69,141 blocks
==9408==   total heap usage: 935,602 allocs, 866,461 frees, 66,702,156 bytes allocated
==9408== 
==9408== Searching for pointers to 69,141 not-freed blocks
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
--9408--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9408--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9408--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9408--   Scanning root segment: 0x4037000..0x403afff (16384)
--9408--   Scanning root segment: 0x4049000..0x404cfff (16384)
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
--9408--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9408--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9408--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9408--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9408--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9408--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9408--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9408--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9408--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9408--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9408--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9408--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9408--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9408--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9408--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9408--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9408--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9408--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9408--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9408--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9408--   Scanning root segment: 0x701a000..0x701afff (4096)
--9408--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9408--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9408--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9408--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9408--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9408--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9408--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9408--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9408--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9398== Checked 4,777,784 bytes
==9398== 
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF65AC,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==9398== LEAK SUMMARY:
==9398==    definitely lost: 1,533 bytes in 8 blocks
==9398==    indirectly lost: 6,756 bytes in 7 blocks
==9398==      possibly lost: 0 bytes in 0 blocks
==9398==    still reachable: 3,107,506 bytes in 68,893 blocks
==9398==         suppressed: 0 bytes in 0 blocks
==9398== Rerun with --leak-check=full to see details of leaked memory
==9398== 
==9398== Use --track-origins=yes to see where uninitialised values come from
==9398== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9398== 
==9398== 1 errors in context 1 of 2:
==9398== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9398==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9398==    by 0x488CD0: stringsubst (subst.c:301)
==9398==    by 0x48801B: prefork (subst.c:77)
==9398==    by 0x42B318: execcmd (exec.c:2619)
==9398==    by 0x428CA0: execpline2 (exec.c:1697)
==9398==    by 0x427FD2: execpline (exec.c:1484)
==9398==    by 0x427756: execlist (exec.c:1267)
==9398==    by 0x42717C: execode (exec.c:1073)
==9398==    by 0x431299: runshfunc (exec.c:5040)
==9398==    by 0x430E76: doshfunc (exec.c:4920)
==9398==    by 0x4302FB: execshfunc (exec.c:4557)
==9398==    by 0x42D8C1: execcmd (exec.c:3373)
==9398== 
==9398== 
==9398== 2 errors in context 2 of 2:
==9398== Conditional jump or move depends on uninitialised value(s)
==9398==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9398==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9398==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9398==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9398==    by 0x42D8E9: execcmd (exec.c:3378)
==9398==    by 0x428CA0: execpline2 (exec.c:1697)
==9398==    by 0x427FD2: execpline (exec.c:1484)
==9398==    by 0x42779A: execlist (exec.c:1275)
==9398==    by 0x42717C: execode (exec.c:1073)
==9398==    by 0x431299: runshfunc (exec.c:5040)
==9398==    by 0x430E76: doshfunc (exec.c:4920)
==9398==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9398== 
==9398== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEC84C,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
==9411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9411-by-pythonnut-on-???
==9411== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9411-by-pythonnut-on-???
==9411== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9411-by-pythonnut-on-???
==9411== 
==9411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9411== don't want to do, unless you know exactly what you're doing,
==9411== or are doing some strange experiment):
==9411==   /usr/lib/valgrind/../../bin/vgdb --pid=9411 ...command...
==9411== 
==9411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9411==   /path/to/gdb ./zsh
==9411== and then give GDB the following command
==9411==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9411
==9411== --pid is optional if only one valgrind process is running
==9411== 
--9410-- Caught __NR_exit; running __libc_freeres()
==9410== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9410-by-pythonnut-on-???
==9410== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9410-by-pythonnut-on-???
==9410== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9410-by-pythonnut-on-???
==9410== 
==9410== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9410== don't want to do, unless you know exactly what you're doing,
==9410== or are doing some strange experiment):
==9410==   /usr/lib/valgrind/../../bin/vgdb --pid=9410 ...command...
==9410== 
==9410== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9410==   /path/to/gdb ./zsh
==9410== and then give GDB the following command
==9410==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9410
==9410== --pid is optional if only one valgrind process is running
==9410== 
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
==9412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9412-by-pythonnut-on-???
==9412== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9412-by-pythonnut-on-???
==9412== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9412-by-pythonnut-on-???
==9412== 
==9412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9412== don't want to do, unless you know exactly what you're doing,
==9412== or are doing some strange experiment):
==9412==   /usr/lib/valgrind/../../bin/vgdb --pid=9412 ...command...
==9412== 
==9412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9412==   /path/to/gdb ./zsh
==9412== and then give GDB the following command
==9412==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9412
==9412== --pid is optional if only one valgrind process is running
==9412== 
==9408== Checked 4,806,376 bytes
==9408== 
--9410-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9412-- Caught __NR_exit; running __libc_freeres()
==9410== 
==9410== HEAP SUMMARY:
==9410==     in use at exit: 3,115,802 bytes in 68,908 blocks
==9410==   total heap usage: 935,511 allocs, 866,603 frees, 66,339,672 bytes allocated
==9410== 
==9408== LEAK SUMMARY:
==9408==    definitely lost: 1,533 bytes in 8 blocks
==9408==    indirectly lost: 6,756 bytes in 7 blocks
==9408==      possibly lost: 0 bytes in 0 blocks
==9408==    still reachable: 3,114,480 bytes in 69,126 blocks
==9408==         suppressed: 0 bytes in 0 blocks
==9408== Rerun with --leak-check=full to see details of leaked memory
==9408== 
==9408== Use --track-origins=yes to see where uninitialised values come from
==9408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9408== 
==9408== 1 errors in context 1 of 2:
==9408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9408==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9408==    by 0x488CD0: stringsubst (subst.c:301)
==9408==    by 0x48801B: prefork (subst.c:77)
==9408==    by 0x42B318: execcmd (exec.c:2619)
==9408==    by 0x428CA0: execpline2 (exec.c:1697)
==9408==    by 0x427FD2: execpline (exec.c:1484)
==9408==    by 0x427756: execlist (exec.c:1267)
==9408==    by 0x42717C: execode (exec.c:1073)
==9408==    by 0x431299: runshfunc (exec.c:5040)
==9408==    by 0x430E76: doshfunc (exec.c:4920)
==9408==    by 0x4302FB: execshfunc (exec.c:4557)
==9408==    by 0x42D8C1: execcmd (exec.c:3373)
==9408== 
==9408== 
==9408== 2 errors in context 2 of 2:
==9408== Conditional jump or move depends on uninitialised value(s)
==9408==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9408==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9408==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9408==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9408==    by 0x42D8E9: execcmd (exec.c:3378)
==9408==    by 0x428CA0: execpline2 (exec.c:1697)
==9408==    by 0x427FD2: execpline (exec.c:1484)
==9408==    by 0x42779A: execlist (exec.c:1275)
==9408==    by 0x42717C: execode (exec.c:1073)
==9408==    by 0x431299: runshfunc (exec.c:5040)
==9408==    by 0x430E76: doshfunc (exec.c:4920)
==9408==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9408== 
==9408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9413-by-pythonnut-on-???
==9413== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9413-by-pythonnut-on-???
==9413== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9413-by-pythonnut-on-???
==9413== 
==9413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9413== don't want to do, unless you know exactly what you're doing,
==9413== or are doing some strange experiment):
==9413==   /usr/lib/valgrind/../../bin/vgdb --pid=9413 ...command...
==9413== 
==9413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9413==   /path/to/gdb ./zsh
==9413== and then give GDB the following command
==9413==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9413
==9413== --pid is optional if only one valgrind process is running
==9413== 
==9412== 
==9410== Searching for pointers to 68,908 not-freed blocks
==9412== HEAP SUMMARY:
==9412==     in use at exit: 3,148,814 bytes in 69,398 blocks
==9412==   total heap usage: 939,263 allocs, 869,865 frees, 68,347,262 bytes allocated
==9412== 
--9410--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9410--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9410--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9410--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9410--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9410--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9410--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9410--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9410--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9410--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9410--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9410--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9410--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9410--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9410--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9410--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9410--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9410--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9410--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9410--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9410--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9410--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9410--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9410--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9410--   Scanning root segment: 0x701a000..0x701afff (4096)
--9410--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9410--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9410--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9410--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9410--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9410--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9410--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9410--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9410--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9413-- Caught __NR_exit; running __libc_freeres()
==9412== Searching for pointers to 69,398 not-freed blocks
--9412--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9412--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9412--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9412--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9412--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9412--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9412--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9412--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9412--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9412--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9412--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9412--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9412--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9412--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9412--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9412--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9412--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9412--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9412--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9412--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9412--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9412--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9412--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9412--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9412--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9412--   Scanning root segment: 0x701a000..0x701afff (4096)
--9412--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9412--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9412--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9412--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9412--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9412--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9412--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9412--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9412--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9413== 
==9413== HEAP SUMMARY:
==9413==     in use at exit: 3,122,842 bytes in 69,142 blocks
==9413==   total heap usage: 935,632 allocs, 866,490 frees, 66,708,096 bytes allocated
==9413== 
==9413== Searching for pointers to 69,142 not-freed blocks
--9413--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9413--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9413--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9413--   Scanning root segment: 0x4037000..0x403afff (16384)
--9413--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9413--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9413--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9413--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9413--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9413--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9413--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9413--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9413--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9413--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9413--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9413--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9413--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9413--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9413--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9413--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9413--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9413--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9413--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9413--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9413--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9413--   Scanning root segment: 0x701a000..0x701afff (4096)
--9413--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9413--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9413--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9413--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9413--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9413--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9413--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9413--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9413--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9410== Checked 4,777,920 bytes
==9410== 
==9410== LEAK SUMMARY:
==9410==    definitely lost: 1,533 bytes in 8 blocks
==9410==    indirectly lost: 6,756 bytes in 7 blocks
==9410==      possibly lost: 0 bytes in 0 blocks
==9410==    still reachable: 3,107,513 bytes in 68,893 blocks
==9410==         suppressed: 0 bytes in 0 blocks
==9410== Rerun with --leak-check=full to see details of leaked memory
==9410== 
==9410== Use --track-origins=yes to see where uninitialised values come from
==9410== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9410== 
==9410== 1 errors in context 1 of 2:
==9410== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9410==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9410==    by 0x488CD0: stringsubst (subst.c:301)
==9410==    by 0x48801B: prefork (subst.c:77)
==9410==    by 0x42B318: execcmd (exec.c:2619)
==9410==    by 0x428CA0: execpline2 (exec.c:1697)
==9410==    by 0x427FD2: execpline (exec.c:1484)
==9410==    by 0x427756: execlist (exec.c:1267)
==9410==    by 0x42717C: execode (exec.c:1073)
==9410==    by 0x431299: runshfunc (exec.c:5040)
==9410==    by 0x430E76: doshfunc (exec.c:4920)
==9410==    by 0x4302FB: execshfunc (exec.c:4557)
==9410==    by 0x42D8C1: execcmd (exec.c:3373)
==9410== 
==9410== 
==9410== 2 errors in context 2 of 2:
==9410== Conditional jump or move depends on uninitialised value(s)
==9410==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9410==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9410==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9410==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9410==    by 0x42D8E9: execcmd (exec.c:3378)
==9410==    by 0x428CA0: execpline2 (exec.c:1697)
==9410==    by 0x427FD2: execpline (exec.c:1484)
==9410==    by 0x42779A: execlist (exec.c:1275)
==9410==    by 0x42717C: execode (exec.c:1073)
==9410==    by 0x431299: runshfunc (exec.c:5040)
==9410==    by 0x430E76: doshfunc (exec.c:4920)
==9410==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9410== 
==9410== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9412== Checked 4,852,480 bytes
==9412== 
--9414-- Caught __NR_exit; running __libc_freeres()
==9412== LEAK SUMMARY:
==9412==    definitely lost: 1,533 bytes in 8 blocks
==9412==    indirectly lost: 6,756 bytes in 7 blocks
==9412==      possibly lost: 0 bytes in 0 blocks
==9412==    still reachable: 3,140,525 bytes in 69,383 blocks
==9412==         suppressed: 0 bytes in 0 blocks
==9412== Rerun with --leak-check=full to see details of leaked memory
==9412== 
==9412== Use --track-origins=yes to see where uninitialised values come from
==9412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9412== 
==9412== 1 errors in context 1 of 2:
==9412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9412==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9412==    by 0x488CD0: stringsubst (subst.c:301)
==9412==    by 0x48801B: prefork (subst.c:77)
==9412==    by 0x42B318: execcmd (exec.c:2619)
==9412==    by 0x428CA0: execpline2 (exec.c:1697)
==9412==    by 0x427FD2: execpline (exec.c:1484)
==9412==    by 0x427756: execlist (exec.c:1267)
==9412==    by 0x42717C: execode (exec.c:1073)
==9412==    by 0x431299: runshfunc (exec.c:5040)
==9412==    by 0x430E76: doshfunc (exec.c:4920)
==9412==    by 0x4302FB: execshfunc (exec.c:4557)
==9412==    by 0x42D8C1: execcmd (exec.c:3373)
==9412== 
==9412== 
==9412== 2 errors in context 2 of 2:
==9412== Conditional jump or move depends on uninitialised value(s)
==9412==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9412==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9412==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9412==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9412==    by 0x42D8E9: execcmd (exec.c:3378)
==9412==    by 0x428CA0: execpline2 (exec.c:1697)
==9412==    by 0x427FD2: execpline (exec.c:1484)
==9412==    by 0x42779A: execlist (exec.c:1275)
==9412==    by 0x42717C: execode (exec.c:1073)
==9412==    by 0x431299: runshfunc (exec.c:5040)
==9412==    by 0x430E76: doshfunc (exec.c:4920)
==9412==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9412== 
==9412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9414== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9414-by-pythonnut-on-???
==9414== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9414-by-pythonnut-on-???
==9414== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9414-by-pythonnut-on-???
==9414== 
==9414== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9414== don't want to do, unless you know exactly what you're doing,
==9414== or are doing some strange experiment):
==9414==   /usr/lib/valgrind/../../bin/vgdb --pid=9414 ...command...
==9414== 
==9414== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9414==   /path/to/gdb ./zsh
==9414== and then give GDB the following command
==9414==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9414
==9414== --pid is optional if only one valgrind process is running
==9414== 
--9411-- Caught __NR_exit; running __libc_freeres()
==9413== Checked 4,806,440 bytes
==9413== 
--9414-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9414== 
==9414== HEAP SUMMARY:
==9414==     in use at exit: 3,115,962 bytes in 68,909 blocks
==9414==   total heap usage: 935,528 allocs, 866,619 frees, 66,344,523 bytes allocated
==9414== 
--9411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9413== LEAK SUMMARY:
==9413==    definitely lost: 1,533 bytes in 8 blocks
==9413==    indirectly lost: 6,756 bytes in 7 blocks
==9413==      possibly lost: 0 bytes in 0 blocks
==9413==    still reachable: 3,114,553 bytes in 69,127 blocks
==9413==         suppressed: 0 bytes in 0 blocks
==9413== Rerun with --leak-check=full to see details of leaked memory
==9413== 
==9413== Use --track-origins=yes to see where uninitialised values come from
==9413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9413== 
==9413== 1 errors in context 1 of 2:
==9413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9413==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9413==    by 0x488CD0: stringsubst (subst.c:301)
==9413==    by 0x48801B: prefork (subst.c:77)
==9413==    by 0x42B318: execcmd (exec.c:2619)
==9413==    by 0x428CA0: execpline2 (exec.c:1697)
==9413==    by 0x427FD2: execpline (exec.c:1484)
==9413==    by 0x427756: execlist (exec.c:1267)
==9413==    by 0x42717C: execode (exec.c:1073)
==9413==    by 0x431299: runshfunc (exec.c:5040)
==9413==    by 0x430E76: doshfunc (exec.c:4920)
==9413==    by 0x4302FB: execshfunc (exec.c:4557)
==9413==    by 0x42D8C1: execcmd (exec.c:3373)
==9413== 
==9413== 
==9413== 2 errors in context 2 of 2:
==9413== Conditional jump or move depends on uninitialised value(s)
==9413==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9413==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9413==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9413==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9413==    by 0x42D8E9: execcmd (exec.c:3378)
==9413==    by 0x428CA0: execpline2 (exec.c:1697)
==9413==    by 0x427FD2: execpline (exec.c:1484)
==9413==    by 0x42779A: execlist (exec.c:1275)
==9413==    by 0x42717C: execode (exec.c:1073)
==9413==    by 0x431299: runshfunc (exec.c:5040)
==9413==    by 0x430E76: doshfunc (exec.c:4920)
==9413==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9413== 
==9413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== 
==9411== HEAP SUMMARY:
==9411==     in use at exit: 3,146,532 bytes in 69,318 blocks
==9411==   total heap usage: 939,168 allocs, 869,850 frees, 68,115,323 bytes allocated
==9411== 
==9415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9415-by-pythonnut-on-???
==9415== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9415-by-pythonnut-on-???
==9415== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9415-by-pythonnut-on-???
==9415== 
==9415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9415== don't want to do, unless you know exactly what you're doing,
==9415== or are doing some strange experiment):
==9415==   /usr/lib/valgrind/../../bin/vgdb --pid=9415 ...command...
==9415== 
==9415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9415==   /path/to/gdb ./zsh
==9415== and then give GDB the following command
==9415==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9415
==9415== --pid is optional if only one valgrind process is running
==9415== 
==9414== Searching for pointers to 68,909 not-freed blocks
--9414--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9414--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9414--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9414--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9414--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9414--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9414--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9414--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9414--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9414--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9414--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9414--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9414--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9414--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9414--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9414--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9414--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9414--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9414--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9414--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9414--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9414--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9414--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9414--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9414--   Scanning root segment: 0x701a000..0x701afff (4096)
--9414--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9414--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9414--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9414--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9414--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9414--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9414--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9414--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9414--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9415-- Caught __NR_exit; running __libc_freeres()
==9411== Searching for pointers to 69,318 not-freed blocks
--9411--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9411--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9411--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9411--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9411--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9411--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9411--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9411--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9411--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9411--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9411--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9411--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9411--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9411--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9411--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9411--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9411--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9411--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9411--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9411--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9411--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9411--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9411--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9411--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9411--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9411--   Scanning root segment: 0x701a000..0x701afff (4096)
--9411--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9411--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9411--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9411--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9411--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9411--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9411--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9411--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9411--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9415-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9415== 
==9415== HEAP SUMMARY:
==9415==     in use at exit: 3,122,841 bytes in 69,142 blocks
==9415==   total heap usage: 935,661 allocs, 866,519 frees, 66,713,972 bytes allocated
==9415== 
==9415== Searching for pointers to 69,142 not-freed blocks
--9415--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9415--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9415--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9415--   Scanning root segment: 0x4037000..0x403afff (16384)
--9415--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9415--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9415--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9415--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9415--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9415--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9415--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9415--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9415--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9415--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9415--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9415--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9415--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9415--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9415--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9415--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9415--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9415--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9415--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9415--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9415--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9415--   Scanning root segment: 0x701a000..0x701afff (4096)
--9415--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9415--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9415--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9415--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9415--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9415--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9415--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9415--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9415--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9414== Checked 4,777,264 bytes
==9414== 
==9411== Checked 4,848,504 bytes
==9411== 
==9414== LEAK SUMMARY:
==9414==    definitely lost: 1,533 bytes in 8 blocks
==9414==    indirectly lost: 6,756 bytes in 7 blocks
==9414==      possibly lost: 0 bytes in 0 blocks
==9414==    still reachable: 3,107,673 bytes in 68,894 blocks
==9414==         suppressed: 0 bytes in 0 blocks
==9414== Rerun with --leak-check=full to see details of leaked memory
==9414== 
==9414== Use --track-origins=yes to see where uninitialised values come from
==9414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9414== 
==9414== 1 errors in context 1 of 2:
==9414== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9414==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9414==    by 0x488CD0: stringsubst (subst.c:301)
==9414==    by 0x48801B: prefork (subst.c:77)
==9414==    by 0x42B318: execcmd (exec.c:2619)
==9414==    by 0x428CA0: execpline2 (exec.c:1697)
==9414==    by 0x427FD2: execpline (exec.c:1484)
==9414==    by 0x427756: execlist (exec.c:1267)
==9414==    by 0x42717C: execode (exec.c:1073)
==9414==    by 0x431299: runshfunc (exec.c:5040)
==9414==    by 0x430E76: doshfunc (exec.c:4920)
==9414==    by 0x4302FB: execshfunc (exec.c:4557)
==9414==    by 0x42D8C1: execcmd (exec.c:3373)
==9414== 
==9414== 
==9414== 2 errors in context 2 of 2:
==9414== Conditional jump or move depends on uninitialised value(s)
==9414==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9414==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9414==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9414==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9414==    by 0x42D8E9: execcmd (exec.c:3378)
==9414==    by 0x428CA0: execpline2 (exec.c:1697)
==9414==    by 0x427FD2: execpline (exec.c:1484)
==9414==    by 0x42779A: execlist (exec.c:1275)
==9414==    by 0x42717C: execode (exec.c:1073)
==9414==    by 0x431299: runshfunc (exec.c:5040)
==9414==    by 0x430E76: doshfunc (exec.c:4920)
==9414==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9414== 
==9414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== LEAK SUMMARY:
==9411==    definitely lost: 1,533 bytes in 8 blocks
==9411==    indirectly lost: 6,756 bytes in 7 blocks
==9411==      possibly lost: 0 bytes in 0 blocks
==9411==    still reachable: 3,138,243 bytes in 69,303 blocks
==9411==         suppressed: 0 bytes in 0 blocks
==9411== Rerun with --leak-check=full to see details of leaked memory
==9411== 
==9411== Use --track-origins=yes to see where uninitialised values come from
==9411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9411== 
==9411== 1 errors in context 1 of 2:
==9411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9411==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9411==    by 0x488CD0: stringsubst (subst.c:301)
==9411==    by 0x48801B: prefork (subst.c:77)
==9411==    by 0x42B318: execcmd (exec.c:2619)
==9411==    by 0x428CA0: execpline2 (exec.c:1697)
==9411==    by 0x427FD2: execpline (exec.c:1484)
==9411==    by 0x427756: execlist (exec.c:1267)
==9411==    by 0x42717C: execode (exec.c:1073)
==9411==    by 0x431299: runshfunc (exec.c:5040)
==9411==    by 0x430E76: doshfunc (exec.c:4920)
==9411==    by 0x4302FB: execshfunc (exec.c:4557)
==9411==    by 0x42D8C1: execcmd (exec.c:3373)
==9411== 
==9411== 
==9411== 2 errors in context 2 of 2:
==9411== Conditional jump or move depends on uninitialised value(s)
==9411==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9411==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9411==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9411==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9411==    by 0x42D8E9: execcmd (exec.c:3378)
==9411==    by 0x428CA0: execpline2 (exec.c:1697)
==9411==    by 0x427FD2: execpline (exec.c:1484)
==9411==    by 0x42779A: execlist (exec.c:1275)
==9411==    by 0x42717C: execode (exec.c:1073)
==9411==    by 0x431299: runshfunc (exec.c:5040)
==9411==    by 0x430E76: doshfunc (exec.c:4920)
==9411==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9411== 
==9411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9417-by-pythonnut-on-???
==9417== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9417-by-pythonnut-on-???
==9417== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9417-by-pythonnut-on-???
==9417== 
==9417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9417== don't want to do, unless you know exactly what you're doing,
==9417== or are doing some strange experiment):
==9417==   /usr/lib/valgrind/../../bin/vgdb --pid=9417 ...command...
==9417== 
==9417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9417==   /path/to/gdb ./zsh
==9417== and then give GDB the following command
==9417==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9417
==9417== --pid is optional if only one valgrind process is running
==9417== 
==9416== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9416-by-pythonnut-on-???
==9416== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9416-by-pythonnut-on-???
==9416== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9416-by-pythonnut-on-???
==9416== 
==9416== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9416== don't want to do, unless you know exactly what you're doing,
==9416== or are doing some strange experiment):
==9416==   /usr/lib/valgrind/../../bin/vgdb --pid=9416 ...command...
==9416== 
==9416== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9416==   /path/to/gdb ./zsh
==9416== and then give GDB the following command
==9416==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9416
==9416== --pid is optional if only one valgrind process is running
==9416== 
--9416-- Caught __NR_exit; running __libc_freeres()
==9415== Checked 4,806,440 bytes
==9415== 
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==9418== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9418-by-pythonnut-on-???
==9418== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9418-by-pythonnut-on-???
==9418== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9418-by-pythonnut-on-???
==9418== 
==9418== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9418== don't want to do, unless you know exactly what you're doing,
==9418== or are doing some strange experiment):
==9418==   /usr/lib/valgrind/../../bin/vgdb --pid=9418 ...command...
==9418== 
==9418== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9418==   /path/to/gdb ./zsh
==9418== and then give GDB the following command
==9418==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9418
==9418== --pid is optional if only one valgrind process is running
==9418== 
--9418-- Caught __NR_exit; running __libc_freeres()
--9416-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9416== 
==9415== LEAK SUMMARY:
==9415==    definitely lost: 1,533 bytes in 8 blocks
==9415==    indirectly lost: 6,756 bytes in 7 blocks
==9415==      possibly lost: 0 bytes in 0 blocks
==9415==    still reachable: 3,114,552 bytes in 69,127 blocks
==9415==         suppressed: 0 bytes in 0 blocks
==9415== Rerun with --leak-check=full to see details of leaked memory
==9415== 
==9415== Use --track-origins=yes to see where uninitialised values come from
==9415== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9415== 
==9415== 1 errors in context 1 of 2:
==9415== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9415==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9415==    by 0x488CD0: stringsubst (subst.c:301)
==9415==    by 0x48801B: prefork (subst.c:77)
==9415==    by 0x42B318: execcmd (exec.c:2619)
==9415==    by 0x428CA0: execpline2 (exec.c:1697)
==9415==    by 0x427FD2: execpline (exec.c:1484)
==9415==    by 0x427756: execlist (exec.c:1267)
==9415==    by 0x42717C: execode (exec.c:1073)
==9415==    by 0x431299: runshfunc (exec.c:5040)
==9415==    by 0x430E76: doshfunc (exec.c:4920)
==9415==    by 0x4302FB: execshfunc (exec.c:4557)
==9415==    by 0x42D8C1: execcmd (exec.c:3373)
==9415== 
==9415== 
==9415== 2 errors in context 2 of 2:
==9415== Conditional jump or move depends on uninitialised value(s)
==9415==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9415==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9415==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9415==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9415==    by 0x42D8E9: execcmd (exec.c:3378)
==9415==    by 0x428CA0: execpline2 (exec.c:1697)
==9415==    by 0x427FD2: execpline (exec.c:1484)
==9415==    by 0x42779A: execlist (exec.c:1275)
==9415==    by 0x42717C: execode (exec.c:1073)
==9415==    by 0x431299: runshfunc (exec.c:5040)
==9415==    by 0x430E76: doshfunc (exec.c:4920)
==9415==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9415== 
==9415== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9416== HEAP SUMMARY:
==9416==     in use at exit: 3,116,136 bytes in 68,914 blocks
==9416==   total heap usage: 935,575 allocs, 866,661 frees, 66,353,475 bytes allocated
==9416== 
==9419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9419-by-pythonnut-on-???
==9419== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9419-by-pythonnut-on-???
==9419== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9419-by-pythonnut-on-???
==9419== 
==9419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9419== don't want to do, unless you know exactly what you're doing,
==9419== or are doing some strange experiment):
==9419==   /usr/lib/valgrind/../../bin/vgdb --pid=9419 ...command...
==9419== 
==9419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9419==   /path/to/gdb ./zsh
==9419== and then give GDB the following command
==9419==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9419
==9419== --pid is optional if only one valgrind process is running
==9419== 
--9418-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9419-- Caught __NR_exit; running __libc_freeres()
==9418== 
==9416== Searching for pointers to 68,914 not-freed blocks
--9416--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9416--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9416--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9416--   Scanning root segment: 0x4049000..0x404cfff (16384)
==9418== HEAP SUMMARY:
==9418==     in use at exit: 3,149,061 bytes in 69,406 blocks
==9418==   total heap usage: 939,280 allocs, 869,874 frees, 68,317,433 bytes allocated
==9418== 
--9416--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9416--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9416--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9416--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9416--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9416--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9416--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9416--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9416--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9416--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9416--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9416--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9416--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9416--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9416--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9416--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9416--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9416--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9416--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9416--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9416--   Scanning root segment: 0x701a000..0x701afff (4096)
--9416--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9416--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9416--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9416--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9416--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9416--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9416--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9416--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9416--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9418== Searching for pointers to 69,406 not-freed blocks
--9418--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9418--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9419== 
--9418--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9418--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9418--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9418--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9418--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9418--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9418--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9418--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9418--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9418--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9418--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9418--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9418--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9418--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9418--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9418--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9418--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9418--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9418--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9418--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==9419== HEAP SUMMARY:
==9419==     in use at exit: 3,122,843 bytes in 69,142 blocks
==9419==   total heap usage: 935,690 allocs, 866,548 frees, 66,719,849 bytes allocated
==9419== 
--9418--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9418--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9418--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9418--   Scanning root segment: 0x701a000..0x701afff (4096)
--9418--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9418--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9418--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9418--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9418--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9418--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9418--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9418--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9418--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9419== Searching for pointers to 69,142 not-freed blocks
--9419--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9419--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9419--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9419--   Scanning root segment: 0x4037000..0x403afff (16384)
--9419--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9419--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9419--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9419--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9419--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9419--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9419--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9419--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9419--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9419--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9419--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9419--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9419--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9419--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9419--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9419--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9419--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9419--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9419--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9419--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9419--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9419--   Scanning root segment: 0x701a000..0x701afff (4096)
--9419--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9419--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9419--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9419--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9419--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9419--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9419--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9419--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9419--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9416== Checked 4,756,384 bytes
==9416== 
==9416== LEAK SUMMARY:
==9416==    definitely lost: 1,533 bytes in 8 blocks
==9416==    indirectly lost: 6,756 bytes in 7 blocks
==9416==      possibly lost: 0 bytes in 0 blocks
==9416==    still reachable: 3,107,847 bytes in 68,899 blocks
==9416==         suppressed: 0 bytes in 0 blocks
==9416== Rerun with --leak-check=full to see details of leaked memory
==9416== 
==9416== Use --track-origins=yes to see where uninitialised values come from
==9416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9416== 
==9416== 1 errors in context 1 of 2:
==9416== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9416==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9416==    by 0x488CD0: stringsubst (subst.c:301)
==9416==    by 0x48801B: prefork (subst.c:77)
==9416==    by 0x42B318: execcmd (exec.c:2619)
==9416==    by 0x428CA0: execpline2 (exec.c:1697)
==9416==    by 0x427FD2: execpline (exec.c:1484)
==9416==    by 0x427756: execlist (exec.c:1267)
==9416==    by 0x42717C: execode (exec.c:1073)
==9416==    by 0x431299: runshfunc (exec.c:5040)
==9416==    by 0x430E76: doshfunc (exec.c:4920)
==9416==    by 0x4302FB: execshfunc (exec.c:4557)
==9416==    by 0x42D8C1: execcmd (exec.c:3373)
==9416== 
==9416== 
==9416== 2 errors in context 2 of 2:
==9416== Conditional jump or move depends on uninitialised value(s)
==9416==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9416==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9416==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9416==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9416==    by 0x42D8E9: execcmd (exec.c:3378)
==9416==    by 0x428CA0: execpline2 (exec.c:1697)
==9416==    by 0x427FD2: execpline (exec.c:1484)
==9416==    by 0x42779A: execlist (exec.c:1275)
==9416==    by 0x42717C: execode (exec.c:1073)
==9416==    by 0x431299: runshfunc (exec.c:5040)
==9416==    by 0x430E76: doshfunc (exec.c:4920)
==9416==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9416== 
==9416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9418== Checked 4,853,208 bytes
==9418== 
--9420-- Caught __NR_exit; running __libc_freeres()
==9420== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9420-by-pythonnut-on-???
==9420== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9420-by-pythonnut-on-???
==9420== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9420-by-pythonnut-on-???
==9420== 
==9420== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9420== don't want to do, unless you know exactly what you're doing,
==9420== or are doing some strange experiment):
==9420==   /usr/lib/valgrind/../../bin/vgdb --pid=9420 ...command...
==9420== 
==9420== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9420==   /path/to/gdb ./zsh
==9420== and then give GDB the following command
==9420==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9420
==9420== --pid is optional if only one valgrind process is running
==9420== 
==9418== LEAK SUMMARY:
==9418==    definitely lost: 1,533 bytes in 8 blocks
==9418==    indirectly lost: 6,756 bytes in 7 blocks
==9418==      possibly lost: 0 bytes in 0 blocks
==9418==    still reachable: 3,140,772 bytes in 69,391 blocks
==9418==         suppressed: 0 bytes in 0 blocks
==9418== Rerun with --leak-check=full to see details of leaked memory
==9418== 
==9418== Use --track-origins=yes to see where uninitialised values come from
==9418== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9418== 
==9418== 1 errors in context 1 of 2:
==9418== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9418==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9418==    by 0x488CD0: stringsubst (subst.c:301)
==9418==    by 0x48801B: prefork (subst.c:77)
==9418==    by 0x42B318: execcmd (exec.c:2619)
==9418==    by 0x428CA0: execpline2 (exec.c:1697)
==9418==    by 0x427FD2: execpline (exec.c:1484)
==9418==    by 0x427756: execlist (exec.c:1267)
==9418==    by 0x42717C: execode (exec.c:1073)
==9418==    by 0x431299: runshfunc (exec.c:5040)
==9418==    by 0x430E76: doshfunc (exec.c:4920)
==9418==    by 0x4302FB: execshfunc (exec.c:4557)
==9418==    by 0x42D8C1: execcmd (exec.c:3373)
==9418== 
==9418== 
==9418== 2 errors in context 2 of 2:
==9418== Conditional jump or move depends on uninitialised value(s)
==9418==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9418==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9418==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9418==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9418==    by 0x42D8E9: execcmd (exec.c:3378)
==9418==    by 0x428CA0: execpline2 (exec.c:1697)
==9418==    by 0x427FD2: execpline (exec.c:1484)
==9418==    by 0x42779A: execlist (exec.c:1275)
==9418==    by 0x42717C: execode (exec.c:1073)
==9418==    by 0x431299: runshfunc (exec.c:5040)
==9418==    by 0x430E76: doshfunc (exec.c:4920)
==9418==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9418== 
==9418== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9419== Checked 4,806,440 bytes
==9419== 
--9420-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9417-- Caught __NR_exit; running __libc_freeres()
==9420== 
==9420== HEAP SUMMARY:
==9420==     in use at exit: 3,116,072 bytes in 68,914 blocks
==9420==   total heap usage: 935,555 allocs, 866,641 frees, 66,351,245 bytes allocated
==9420== 
==9419== LEAK SUMMARY:
==9419==    definitely lost: 1,533 bytes in 8 blocks
==9419==    indirectly lost: 6,756 bytes in 7 blocks
==9419==      possibly lost: 0 bytes in 0 blocks
==9419==    still reachable: 3,114,554 bytes in 69,127 blocks
==9419==         suppressed: 0 bytes in 0 blocks
==9419== Rerun with --leak-check=full to see details of leaked memory
==9419== 
==9419== Use --track-origins=yes to see where uninitialised values come from
==9419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9419== 
==9419== 1 errors in context 1 of 2:
==9419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9419==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9419==    by 0x488CD0: stringsubst (subst.c:301)
==9419==    by 0x48801B: prefork (subst.c:77)
==9419==    by 0x42B318: execcmd (exec.c:2619)
==9419==    by 0x428CA0: execpline2 (exec.c:1697)
==9419==    by 0x427FD2: execpline (exec.c:1484)
==9419==    by 0x427756: execlist (exec.c:1267)
==9419==    by 0x42717C: execode (exec.c:1073)
==9419==    by 0x431299: runshfunc (exec.c:5040)
==9419==    by 0x430E76: doshfunc (exec.c:4920)
==9419==    by 0x4302FB: execshfunc (exec.c:4557)
==9419==    by 0x42D8C1: execcmd (exec.c:3373)
==9419== 
==9419== 
==9419== 2 errors in context 2 of 2:
==9419== Conditional jump or move depends on uninitialised value(s)
==9419==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9419==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9419==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9419==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9419==    by 0x42D8E9: execcmd (exec.c:3378)
==9419==    by 0x428CA0: execpline2 (exec.c:1697)
==9419==    by 0x427FD2: execpline (exec.c:1484)
==9419==    by 0x42779A: execlist (exec.c:1275)
==9419==    by 0x42717C: execode (exec.c:1073)
==9419==    by 0x431299: runshfunc (exec.c:5040)
==9419==    by 0x430E76: doshfunc (exec.c:4920)
==9419==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9419== 
==9419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9396-- Caught __NR_exit; running __libc_freeres()
--9417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9417== 
==9417== HEAP SUMMARY:
==9417==     in use at exit: 3,146,805 bytes in 69,326 blocks
==9417==   total heap usage: 939,183 allocs, 869,857 frees, 68,118,236 bytes allocated
==9417== 
==9420== Searching for pointers to 68,914 not-freed blocks
--9420--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9420--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9420--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9420--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9420--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9420--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9420--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9420--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9420--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9420--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9420--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9420--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9420--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9420--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9420--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9420--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9420--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9420--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9420--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9420--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9420--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9420--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9420--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9420--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9420--   Scanning root segment: 0x701a000..0x701afff (4096)
--9420--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9420--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9420--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9420--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9420--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9420--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9420--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9420--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9420--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9396-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9396== 
==9396== HEAP SUMMARY:
==9396==     in use at exit: 3,120,733 bytes in 69,060 blocks
==9396==   total heap usage: 935,633 allocs, 866,573 frees, 66,352,818 bytes allocated
==9396== 
==9417== Searching for pointers to 69,326 not-freed blocks
--9417--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9417--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9417--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9417--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9417--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9417--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9417--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9417--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9417--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9417--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9417--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9417--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9417--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9417--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9417--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9417--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9417--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9417--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9417--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9417--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9417--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9417--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9417--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9417--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9417--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9417--   Scanning root segment: 0x701a000..0x701afff (4096)
--9417--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9417--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9417--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9417--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9417--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9417--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9417--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9417--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9417--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9396== Searching for pointers to 69,060 not-freed blocks
--9396--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9396--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9396--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9396--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9396--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9396--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9396--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9396--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9396--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9396--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9396--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9396--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9396--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9396--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9396--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9396--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9396--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9396--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9396--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9396--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9396--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9396--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9396--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9396--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9396--   Scanning root segment: 0x701a000..0x701afff (4096)
--9396--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9396--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9396--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9396--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9396--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9396--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9396--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9396--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9396--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9420== Checked 4,777,296 bytes
==9420== 
==9420== LEAK SUMMARY:
==9420==    definitely lost: 1,533 bytes in 8 blocks
==9420==    indirectly lost: 6,756 bytes in 7 blocks
==9420==      possibly lost: 0 bytes in 0 blocks
==9420==    still reachable: 3,107,783 bytes in 68,899 blocks
==9420==         suppressed: 0 bytes in 0 blocks
==9420== Rerun with --leak-check=full to see details of leaked memory
==9420== 
==9420== Use --track-origins=yes to see where uninitialised values come from
==9420== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9420== 
==9420== 1 errors in context 1 of 2:
==9420== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9420==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9420==    by 0x488CD0: stringsubst (subst.c:301)
==9420==    by 0x48801B: prefork (subst.c:77)
==9420==    by 0x42B318: execcmd (exec.c:2619)
==9420==    by 0x428CA0: execpline2 (exec.c:1697)
==9420==    by 0x427FD2: execpline (exec.c:1484)
==9420==    by 0x427756: execlist (exec.c:1267)
==9420==    by 0x42717C: execode (exec.c:1073)
==9420==    by 0x431299: runshfunc (exec.c:5040)
==9420==    by 0x430E76: doshfunc (exec.c:4920)
==9420==    by 0x4302FB: execshfunc (exec.c:4557)
==9420==    by 0x42D8C1: execcmd (exec.c:3373)
==9420== 
==9420== 
==9420== 2 errors in context 2 of 2:
==9420== Conditional jump or move depends on uninitialised value(s)
==9420==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9420==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9420==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9420==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9420==    by 0x42D8E9: execcmd (exec.c:3378)
==9420==    by 0x428CA0: execpline2 (exec.c:1697)
==9420==    by 0x427FD2: execpline (exec.c:1484)
==9420==    by 0x42779A: execlist (exec.c:1275)
==9420==    by 0x42717C: execode (exec.c:1073)
==9420==    by 0x431299: runshfunc (exec.c:5040)
==9420==    by 0x430E76: doshfunc (exec.c:4920)
==9420==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9420== 
==9420== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== Checked 4,849,264 bytes
==9417== 
==9396== Checked 4,785,376 bytes
==9396== 
==9423== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9423-by-pythonnut-on-???
==9423== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9423-by-pythonnut-on-???
==9423== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9423-by-pythonnut-on-???
==9423== 
==9423== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9423== don't want to do, unless you know exactly what you're doing,
==9423== or are doing some strange experiment):
==9423==   /usr/lib/valgrind/../../bin/vgdb --pid=9423 ...command...
==9423== 
==9423== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9423==   /path/to/gdb ./zsh
==9423== and then give GDB the following command
==9423==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9423
==9423== --pid is optional if only one valgrind process is running
==9423== 
==9417== LEAK SUMMARY:
==9417==    definitely lost: 1,533 bytes in 8 blocks
==9417==    indirectly lost: 6,756 bytes in 7 blocks
==9417==      possibly lost: 0 bytes in 0 blocks
==9417==    still reachable: 3,138,516 bytes in 69,311 blocks
==9417==         suppressed: 0 bytes in 0 blocks
==9417== Rerun with --leak-check=full to see details of leaked memory
==9417== 
==9417== Use --track-origins=yes to see where uninitialised values come from
==9417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9417== 
==9417== 1 errors in context 1 of 2:
==9417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9417==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9417==    by 0x488CD0: stringsubst (subst.c:301)
==9417==    by 0x48801B: prefork (subst.c:77)
==9417==    by 0x42B318: execcmd (exec.c:2619)
==9417==    by 0x428CA0: execpline2 (exec.c:1697)
==9417==    by 0x427FD2: execpline (exec.c:1484)
==9417==    by 0x427756: execlist (exec.c:1267)
==9417==    by 0x42717C: execode (exec.c:1073)
==9417==    by 0x431299: runshfunc (exec.c:5040)
==9417==    by 0x430E76: doshfunc (exec.c:4920)
==9417==    by 0x4302FB: execshfunc (exec.c:4557)
==9417==    by 0x42D8C1: execcmd (exec.c:3373)
==9417== 
==9417== 
==9417== 2 errors in context 2 of 2:
==9417== Conditional jump or move depends on uninitialised value(s)
==9417==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9417==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9417==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9417==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9417==    by 0x42D8E9: execcmd (exec.c:3378)
==9417==    by 0x428CA0: execpline2 (exec.c:1697)
==9417==    by 0x427FD2: execpline (exec.c:1484)
==9417==    by 0x42779A: execlist (exec.c:1275)
==9417==    by 0x42717C: execode (exec.c:1073)
==9417==    by 0x431299: runshfunc (exec.c:5040)
==9417==    by 0x430E76: doshfunc (exec.c:4920)
==9417==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9417== 
==9417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9396== LEAK SUMMARY:
==9396==    definitely lost: 1,533 bytes in 8 blocks
==9396==    indirectly lost: 6,756 bytes in 7 blocks
==9396==      possibly lost: 0 bytes in 0 blocks
==9396==    still reachable: 3,112,444 bytes in 69,045 blocks
==9396==         suppressed: 0 bytes in 0 blocks
==9396== Rerun with --leak-check=full to see details of leaked memory
==9396== 
==9396== Use --track-origins=yes to see where uninitialised values come from
==9396== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
==9396== 
==9396== 1 errors in context 1 of 2:
==9396== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9396==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9396==    by 0x488CD0: stringsubst (subst.c:301)
==9396==    by 0x48801B: prefork (subst.c:77)
==9396==    by 0x42B318: execcmd (exec.c:2619)
==9396==    by 0x428CA0: execpline2 (exec.c:1697)
==9396==    by 0x427FD2: execpline (exec.c:1484)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
==9396==    by 0x427756: execlist (exec.c:1267)
==9396==    by 0x42717C: execode (exec.c:1073)
==9396==    by 0x431299: runshfunc (exec.c:5040)
==9396==    by 0x430E76: doshfunc (exec.c:4920)
==9396==    by 0x4302FB: execshfunc (exec.c:4557)
==9396==    by 0x42D8C1: execcmd (exec.c:3373)
==9396== 
==9396== 
==9396== 2 errors in context 2 of 2:
==9396== Conditional jump or move depends on uninitialised value(s)
==9396==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9396==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9396==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9396==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9396==    by 0x42D8E9: execcmd (exec.c:3378)
==9396==    by 0x428CA0: execpline2 (exec.c:1697)
==9396==    by 0x427FD2: execpline (exec.c:1484)
==9396==    by 0x42779A: execlist (exec.c:1275)
==9396==    by 0x42717C: execode (exec.c:1073)
==9396==    by 0x431299: runshfunc (exec.c:5040)
==9396==    by 0x430E76: doshfunc (exec.c:4920)
==9396==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9396== 
==9396== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
--9423-- Caught __NR_exit; running __libc_freeres()
==9394== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9394-by-pythonnut-on-???
==9394== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9394-by-pythonnut-on-???
==9394== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9394-by-pythonnut-on-???
==9394== 
==9394== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9394== don't want to do, unless you know exactly what you're doing,
==9394== or are doing some strange experiment):
==9394==   /usr/lib/valgrind/../../bin/vgdb --pid=9394 ...command...
==9394== 
==9394== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9394==   /path/to/gdb ./zsh
==9394== and then give GDB the following command
==9394==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9394
==9394== --pid is optional if only one valgrind process is running
==9394== 
--9423-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFEC39C,  len 4
--9394-- Caught __NR_exit; running __libc_freeres()
==9423== 
==9423== HEAP SUMMARY:
==9423==     in use at exit: 3,116,113 bytes in 68,915 blocks
==9423==   total heap usage: 935,568 allocs, 866,653 frees, 66,353,945 bytes allocated
==9423== 
--9424-- Caught __NR_exit; running __libc_freeres()
==9424== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9424-by-pythonnut-on-???
==9424== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9424-by-pythonnut-on-???
==9424== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9424-by-pythonnut-on-???
==9424== 
==9424== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9424== don't want to do, unless you know exactly what you're doing,
==9424== or are doing some strange experiment):
==9424==   /usr/lib/valgrind/../../bin/vgdb --pid=9424 ...command...
==9424== 
==9424== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9424==   /path/to/gdb ./zsh
==9424== and then give GDB the following command
==9424==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9424
==9424== --pid is optional if only one valgrind process is running
==9424== 
--9394-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9394== 
==9423== Searching for pointers to 68,915 not-freed blocks
--9423--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9423--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9423--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9423--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9423--   Scanning root segment: 0x4222000..0x4222fff (4096)
==9394== HEAP SUMMARY:
==9394==     in use at exit: 3,118,684 bytes in 68,988 blocks
==9394==   total heap usage: 935,576 allocs, 866,588 frees, 66,358,057 bytes allocated
==9394== 
--9423--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9423--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9423--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9423--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9423--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9423--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9423--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9423--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9423--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9423--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9423--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9423--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9423--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9423--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9423--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9424-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9423--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9423--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9423--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9423--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9423--   Scanning root segment: 0x701a000..0x701afff (4096)
--9423--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9423--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9423--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9423--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9423--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9423--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9423--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9423--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9423--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9424== 
==9424== HEAP SUMMARY:
==9424==     in use at exit: 3,148,632 bytes in 69,317 blocks
==9424==   total heap usage: 939,296 allocs, 869,979 frees, 68,133,699 bytes allocated
==9424== 
==9394== Searching for pointers to 68,988 not-freed blocks
--9394--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9394--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9394--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9394--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9394--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9394--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9394--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9394--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9394--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9394--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9394--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9394--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9394--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9394--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9394--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9394--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9394--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9394--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9394--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9394--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9394--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9394--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9394--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9394--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9394--   Scanning root segment: 0x701a000..0x701afff (4096)
--9394--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9394--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9394--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9394--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9394--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9394--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9394--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9394--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9394--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9424== Searching for pointers to 69,317 not-freed blocks
--9424--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9424--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9424--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9424--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9424--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9424--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9424--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9424--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9424--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9424--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9424--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9424--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9424--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9424--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9424--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9424--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9424--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9424--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9424--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9424--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9424--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9424--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9424--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9424--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9424--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9424--   Scanning root segment: 0x701a000..0x701afff (4096)
--9424--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9424--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9424--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9424--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9424--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9424--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9424--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9424--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9424--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9423== Checked 4,776,824 bytes
==9423== 
==9423== LEAK SUMMARY:
==9423==    definitely lost: 1,533 bytes in 8 blocks
==9423==    indirectly lost: 6,756 bytes in 7 blocks
==9423==      possibly lost: 0 bytes in 0 blocks
==9423==    still reachable: 3,107,824 bytes in 68,900 blocks
==9423==         suppressed: 0 bytes in 0 blocks
==9423== Rerun with --leak-check=full to see details of leaked memory
==9423== 
==9423== Use --track-origins=yes to see where uninitialised values come from
==9423== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9423== 
==9423== 1 errors in context 1 of 2:
==9423== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9423==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9423==    by 0x488CD0: stringsubst (subst.c:301)
==9423==    by 0x48801B: prefork (subst.c:77)
==9423==    by 0x42B318: execcmd (exec.c:2619)
==9423==    by 0x428CA0: execpline2 (exec.c:1697)
==9423==    by 0x427FD2: execpline (exec.c:1484)
==9423==    by 0x427756: execlist (exec.c:1267)
==9423==    by 0x42717C: execode (exec.c:1073)
==9423==    by 0x431299: runshfunc (exec.c:5040)
==9423==    by 0x430E76: doshfunc (exec.c:4920)
==9423==    by 0x4302FB: execshfunc (exec.c:4557)
==9423==    by 0x42D8C1: execcmd (exec.c:3373)
==9423== 
==9423== 
==9423== 2 errors in context 2 of 2:
==9423== Conditional jump or move depends on uninitialised value(s)
==9423==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9423==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9423==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9423==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9423==    by 0x42D8E9: execcmd (exec.c:3378)
==9423==    by 0x428CA0: execpline2 (exec.c:1697)
==9423==    by 0x427FD2: execpline (exec.c:1484)
==9423==    by 0x42779A: execlist (exec.c:1275)
==9423==    by 0x42717C: execode (exec.c:1073)
==9423==    by 0x431299: runshfunc (exec.c:5040)
==9423==    by 0x430E76: doshfunc (exec.c:4920)
==9423==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9423== 
==9423== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9394== Checked 4,782,328 bytes
==9394== 
==9424== Checked 4,849,496 bytes
==9424== 
==9426== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9426-by-pythonnut-on-???
==9426== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9426-by-pythonnut-on-???
==9426== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9426-by-pythonnut-on-???
==9426== 
==9426== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9426== don't want to do, unless you know exactly what you're doing,
==9426== or are doing some strange experiment):
==9426==   /usr/lib/valgrind/../../bin/vgdb --pid=9426 ...command...
==9426== 
==9426== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9426==   /path/to/gdb ./zsh
==9426== and then give GDB the following command
==9426==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9426
==9426== --pid is optional if only one valgrind process is running
==9426== 
--9426-- Caught __NR_exit; running __libc_freeres()
==9394== LEAK SUMMARY:
==9394==    definitely lost: 1,533 bytes in 8 blocks
==9394==    indirectly lost: 6,756 bytes in 7 blocks
==9394==      possibly lost: 0 bytes in 0 blocks
==9394==    still reachable: 3,110,395 bytes in 68,973 blocks
==9394==         suppressed: 0 bytes in 0 blocks
==9394== Rerun with --leak-check=full to see details of leaked memory
==9394== 
==9394== Use --track-origins=yes to see where uninitialised values come from
==9394== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9394== 
==9394== 1 errors in context 1 of 2:
==9394== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9394==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9394==    by 0x488CD0: stringsubst (subst.c:301)
==9394==    by 0x48801B: prefork (subst.c:77)
==9394==    by 0x42B318: execcmd (exec.c:2619)
==9394==    by 0x428CA0: execpline2 (exec.c:1697)
==9394==    by 0x427FD2: execpline (exec.c:1484)
==9394==    by 0x427756: execlist (exec.c:1267)
==9394==    by 0x42717C: execode (exec.c:1073)
==9394==    by 0x431299: runshfunc (exec.c:5040)
==9394==    by 0x430E76: doshfunc (exec.c:4920)
==9394==    by 0x4302FB: execshfunc (exec.c:4557)
==9394==    by 0x42D8C1: execcmd (exec.c:3373)
==9394== 
==9394== 
==9394== 2 errors in context 2 of 2:
==9394== Conditional jump or move depends on uninitialised value(s)
==9394==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9394==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9394==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9394==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9394==    by 0x42D8E9: execcmd (exec.c:3378)
==9394==    by 0x428CA0: execpline2 (exec.c:1697)
==9394==    by 0x427FD2: execpline (exec.c:1484)
==9394==    by 0x42779A: execlist (exec.c:1275)
==9394==    by 0x42717C: execode (exec.c:1073)
==9394==    by 0x431299: runshfunc (exec.c:5040)
==9394==    by 0x430E76: doshfunc (exec.c:4920)
==9394==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9394== 
==9394== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9424== LEAK SUMMARY:
==9424==    definitely lost: 1,533 bytes in 8 blocks
==9424==    indirectly lost: 6,756 bytes in 7 blocks
==9424==      possibly lost: 0 bytes in 0 blocks
==9424==    still reachable: 3,140,343 bytes in 69,302 blocks
==9424==         suppressed: 0 bytes in 0 blocks
==9424== Rerun with --leak-check=full to see details of leaked memory
==9424== 
==9424== Use --track-origins=yes to see where uninitialised values come from
==9424== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9424== 
==9424== 1 errors in context 1 of 2:
==9424== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9424==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9424==    by 0x488CD0: stringsubst (subst.c:301)
==9424==    by 0x48801B: prefork (subst.c:77)
==9424==    by 0x42B318: execcmd (exec.c:2619)
==9424==    by 0x428CA0: execpline2 (exec.c:1697)
==9424==    by 0x427FD2: execpline (exec.c:1484)
==9424==    by 0x427756: execlist (exec.c:1267)
==9424==    by 0x42717C: execode (exec.c:1073)
==9424==    by 0x431299: runshfunc (exec.c:5040)
==9424==    by 0x430E76: doshfunc (exec.c:4920)
==9424==    by 0x4302FB: execshfunc (exec.c:4557)
==9424==    by 0x42D8C1: execcmd (exec.c:3373)
==9424== 
==9424== 
==9424== 2 errors in context 2 of 2:
==9424== Conditional jump or move depends on uninitialised value(s)
==9424==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9424==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9424==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9424==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9424==    by 0x42D8E9: execcmd (exec.c:3378)
==9424==    by 0x428CA0: execpline2 (exec.c:1697)
==9424==    by 0x427FD2: execpline (exec.c:1484)
==9424==    by 0x42779A: execlist (exec.c:1275)
==9424==    by 0x42717C: execode (exec.c:1073)
==9424==    by 0x431299: runshfunc (exec.c:5040)
==9424==    by 0x430E76: doshfunc (exec.c:4920)
==9424==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9424== 
==9424== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9427== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9427-by-pythonnut-on-???
==9427== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9427-by-pythonnut-on-???
==9427== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9427-by-pythonnut-on-???
==9427== 
==9427== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9427== don't want to do, unless you know exactly what you're doing,
==9427== or are doing some strange experiment):
==9427==   /usr/lib/valgrind/../../bin/vgdb --pid=9427 ...command...
==9427== 
==9427== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9427==   /path/to/gdb ./zsh
==9427== and then give GDB the following command
==9427==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9427
==9427== --pid is optional if only one valgrind process is running
==9427== 
--9426-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9426== 
==9428== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9428-by-pythonnut-on-???
==9428== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9428-by-pythonnut-on-???
==9428== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9428-by-pythonnut-on-???
==9428== 
==9428== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9428== don't want to do, unless you know exactly what you're doing,
==9428== or are doing some strange experiment):
==9428==   /usr/lib/valgrind/../../bin/vgdb --pid=9428 ...command...
==9428== 
==9428== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9428==   /path/to/gdb ./zsh
==9428== and then give GDB the following command
==9428==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9428
==9428== --pid is optional if only one valgrind process is running
==9428== 
--9429-- Caught __NR_exit; running __libc_freeres()
--9428-- Caught __NR_exit; running __libc_freeres()
==9426== HEAP SUMMARY:
==9426==     in use at exit: 3,114,632 bytes in 68,855 blocks
==9426==   total heap usage: 935,538 allocs, 866,683 frees, 66,356,946 bytes allocated
==9426== 
==9429== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9429-by-pythonnut-on-???
==9429== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9429-by-pythonnut-on-???
==9429== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9429-by-pythonnut-on-???
==9429== 
==9429== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9429== don't want to do, unless you know exactly what you're doing,
==9429== or are doing some strange experiment):
==9429==   /usr/lib/valgrind/../../bin/vgdb --pid=9429 ...command...
==9429== 
==9429== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9429==   /path/to/gdb ./zsh
==9429== and then give GDB the following command
==9429==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9429
==9429== --pid is optional if only one valgrind process is running
==9429== 
--9428-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9426== Searching for pointers to 68,855 not-freed blocks
--9426--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9426--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9426--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9426--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9426--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9426--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9426--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9426--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9426--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9426--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9426--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9426--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9426--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9426--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9426--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9426--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9426--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9426--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9426--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9426--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9426--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9426--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9426--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9426--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9426--   Scanning root segment: 0x701a000..0x701afff (4096)
--9426--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9426--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9426--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9426--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9426--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9426--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9426--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9426--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9429-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9426--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9428== 
==9428== HEAP SUMMARY:
==9428==     in use at exit: 3,147,816 bytes in 69,273 blocks
==9428==   total heap usage: 939,253 allocs, 869,980 frees, 68,133,181 bytes allocated
==9428== 
==9429== 
==9429== HEAP SUMMARY:
==9429==     in use at exit: 3,120,437 bytes in 69,055 blocks
==9429==   total heap usage: 935,488 allocs, 866,433 frees, 66,327,215 bytes allocated
==9429== 
==9428== Searching for pointers to 69,273 not-freed blocks
--9428--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9428--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9428--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9428--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9428--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9428--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9428--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9428--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9428--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9428--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9428--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9428--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9428--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9428--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9428--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9428--   Scanning root segment: 0x59ba000..0x59bafff (4096)
==9429== Searching for pointers to 69,055 not-freed blocks
--9428--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9429--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9428--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9428--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9429--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9428--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9428--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9429--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9429--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9429--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9428--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9429--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9429--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9428--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9429--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9429--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9428--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9429--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9429--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9429--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9428--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9429--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9429--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9428--   Scanning root segment: 0x701a000..0x701afff (4096)
--9429--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9429--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9428--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9429--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9428--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9428--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9429--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9429--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9428--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9429--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9428--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9428--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9428--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9428--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9428--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9429--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9429--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9429--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9429--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9429--   Scanning root segment: 0x701a000..0x701afff (4096)
--9429--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9429--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9429--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9429--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9429--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9429--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9429--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9429--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9429--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9426== Checked 4,776,280 bytes
==9426== 
==9426== LEAK SUMMARY:
==9426==    definitely lost: 1,533 bytes in 8 blocks
==9426==    indirectly lost: 6,756 bytes in 7 blocks
==9426==      possibly lost: 0 bytes in 0 blocks
==9426==    still reachable: 3,106,343 bytes in 68,840 blocks
==9426==         suppressed: 0 bytes in 0 blocks
==9426== Rerun with --leak-check=full to see details of leaked memory
==9426== 
==9426== Use --track-origins=yes to see where uninitialised values come from
==9426== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9426== 
==9426== 1 errors in context 1 of 2:
==9426== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9426==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9426==    by 0x488CD0: stringsubst (subst.c:301)
==9426==    by 0x48801B: prefork (subst.c:77)
==9426==    by 0x42B318: execcmd (exec.c:2619)
==9426==    by 0x428CA0: execpline2 (exec.c:1697)
==9426==    by 0x427FD2: execpline (exec.c:1484)
==9426==    by 0x427756: execlist (exec.c:1267)
==9426==    by 0x42717C: execode (exec.c:1073)
==9426==    by 0x431299: runshfunc (exec.c:5040)
==9426==    by 0x430E76: doshfunc (exec.c:4920)
==9426==    by 0x4302FB: execshfunc (exec.c:4557)
==9426==    by 0x42D8C1: execcmd (exec.c:3373)
==9426== 
==9426== 
==9426== 2 errors in context 2 of 2:
==9426== Conditional jump or move depends on uninitialised value(s)
==9426==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9426==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9426==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9426==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9426==    by 0x42D8E9: execcmd (exec.c:3378)
==9426==    by 0x428CA0: execpline2 (exec.c:1697)
==9426==    by 0x427FD2: execpline (exec.c:1484)
==9426==    by 0x42779A: execlist (exec.c:1275)
==9426==    by 0x42717C: execode (exec.c:1073)
==9426==    by 0x431299: runshfunc (exec.c:5040)
==9426==    by 0x430E76: doshfunc (exec.c:4920)
==9426==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9426== 
==9426== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429== Checked 4,785,704 bytes
==9429== 
==9428== Checked 4,848,176 bytes
==9428== 
==9428== LEAK SUMMARY:
==9429== LEAK SUMMARY:
==9428==    definitely lost: 1,533 bytes in 8 blocks
==9429==    definitely lost: 1,533 bytes in 8 blocks
==9428==    indirectly lost: 6,756 bytes in 7 blocks
==9429==    indirectly lost: 6,756 bytes in 7 blocks
==9428==      possibly lost: 0 bytes in 0 blocks
==9429==      possibly lost: 0 bytes in 0 blocks
==9428==    still reachable: 3,139,527 bytes in 69,258 blocks
==9429==    still reachable: 3,112,148 bytes in 69,040 blocks
==9428==         suppressed: 0 bytes in 0 blocks
==9429==         suppressed: 0 bytes in 0 blocks
==9428== Rerun with --leak-check=full to see details of leaked memory
==9429== Rerun with --leak-check=full to see details of leaked memory
==9428== 
==9429== 
==9428== Use --track-origins=yes to see where uninitialised values come from
==9428== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9428== 
==9428== 1 errors in context 1 of 2:
==9428== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9429== Use --track-origins=yes to see where uninitialised values come from
==9428==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9429== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429== 
==9429== 1 errors in context 1 of 2:
==9428==    by 0x488CD0: stringsubst (subst.c:301)
==9429== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9428==    by 0x48801B: prefork (subst.c:77)
==9428==    by 0x42B318: execcmd (exec.c:2619)
==9429==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9428==    by 0x428CA0: execpline2 (exec.c:1697)
==9428==    by 0x427FD2: execpline (exec.c:1484)
==9428==    by 0x427756: execlist (exec.c:1267)
==9429==    by 0x488CD0: stringsubst (subst.c:301)
==9428==    by 0x42717C: execode (exec.c:1073)
==9429==    by 0x48801B: prefork (subst.c:77)
==9428==    by 0x431299: runshfunc (exec.c:5040)
==9428==    by 0x430E76: doshfunc (exec.c:4920)
==9429==    by 0x42B318: execcmd (exec.c:2619)
==9428==    by 0x4302FB: execshfunc (exec.c:4557)
==9429==    by 0x428CA0: execpline2 (exec.c:1697)
==9428==    by 0x42D8C1: execcmd (exec.c:3373)
==9428== 
==9429==    by 0x427FD2: execpline (exec.c:1484)
==9429==    by 0x427756: execlist (exec.c:1267)
==9428== 
==9429==    by 0x42717C: execode (exec.c:1073)
==9428== 2 errors in context 2 of 2:
==9429==    by 0x431299: runshfunc (exec.c:5040)
==9428== Conditional jump or move depends on uninitialised value(s)
==9429==    by 0x430E76: doshfunc (exec.c:4920)
==9428==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9429==    by 0x4302FB: execshfunc (exec.c:4557)
==9428==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9429==    by 0x42D8C1: execcmd (exec.c:3373)
==9428==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9429== 
==9428==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9429== 
==9428==    by 0x42D8E9: execcmd (exec.c:3378)
==9429== 2 errors in context 2 of 2:
==9428==    by 0x428CA0: execpline2 (exec.c:1697)
==9429== Conditional jump or move depends on uninitialised value(s)
==9428==    by 0x427FD2: execpline (exec.c:1484)
==9428==    by 0x42779A: execlist (exec.c:1275)
==9428==    by 0x42717C: execode (exec.c:1073)
==9429==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9428==    by 0x431299: runshfunc (exec.c:5040)
==9428==    by 0x430E76: doshfunc (exec.c:4920)
==9429==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9428==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9429==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9428== 
==9429==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9428== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9429==    by 0x42D8E9: execcmd (exec.c:3378)
==9429==    by 0x428CA0: execpline2 (exec.c:1697)
==9429==    by 0x427FD2: execpline (exec.c:1484)
==9429==    by 0x42779A: execlist (exec.c:1275)
==9429==    by 0x42717C: execode (exec.c:1073)
==9429==    by 0x431299: runshfunc (exec.c:5040)
==9429==    by 0x430E76: doshfunc (exec.c:4920)
==9429==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9429== 
==9429== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9431-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9431== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9431-by-pythonnut-on-???
==9431== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9431-by-pythonnut-on-???
==9431== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9431-by-pythonnut-on-???
==9431== 
==9431== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9431== don't want to do, unless you know exactly what you're doing,
==9431== or are doing some strange experiment):
==9431==   /usr/lib/valgrind/../../bin/vgdb --pid=9431 ...command...
==9431== 
==9431== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9431==   /path/to/gdb ./zsh
==9431== and then give GDB the following command
==9431==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9431
==9431== --pid is optional if only one valgrind process is running
==9431== 
==9434== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9434-by-pythonnut-on-???
==9434== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9434-by-pythonnut-on-???
==9434== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9434-by-pythonnut-on-???
==9434== 
==9434== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9434== don't want to do, unless you know exactly what you're doing,
==9434== or are doing some strange experiment):
==9434==   /usr/lib/valgrind/../../bin/vgdb --pid=9434 ...command...
==9434== 
==9434== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9434==   /path/to/gdb ./zsh
==9434== and then give GDB the following command
==9434==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9434
==9434== --pid is optional if only one valgrind process is running
==9434== 
client request: code 4d430005,  addr 0xFFEFECF3C,  len 4
--9431-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9435== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9435-by-pythonnut-on-???
==9435== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9435-by-pythonnut-on-???
==9435== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9435-by-pythonnut-on-???
==9435== 
==9435== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9435== don't want to do, unless you know exactly what you're doing,
==9435== or are doing some strange experiment):
==9435==   /usr/lib/valgrind/../../bin/vgdb --pid=9435 ...command...
==9435== 
==9435== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9435==   /path/to/gdb ./zsh
==9435== and then give GDB the following command
==9435==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9435
==9435== --pid is optional if only one valgrind process is running
==9435== 
==9431== 
==9436== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9436-by-pythonnut-on-???
==9436== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9436-by-pythonnut-on-???
==9436== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9436-by-pythonnut-on-???
==9436== 
==9436== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9436== don't want to do, unless you know exactly what you're doing,
==9436== or are doing some strange experiment):
==9436==   /usr/lib/valgrind/../../bin/vgdb --pid=9436 ...command...
==9436== 
==9436== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9436==   /path/to/gdb ./zsh
==9436== and then give GDB the following command
==9436==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9436
==9436== --pid is optional if only one valgrind process is running
==9436== 
==9431== HEAP SUMMARY:
==9431==     in use at exit: 3,126,864 bytes in 69,095 blocks
==9431==   total heap usage: 935,895 allocs, 866,800 frees, 66,383,889 bytes allocated
==9431== 
==9438== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9438-by-pythonnut-on-???
==9438== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9438-by-pythonnut-on-???
==9438== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9438-by-pythonnut-on-???
==9438== 
==9438== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9438== don't want to do, unless you know exactly what you're doing,
==9438== or are doing some strange experiment):
==9438==   /usr/lib/valgrind/../../bin/vgdb --pid=9438 ...command...
==9438== 
==9438== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9438==   /path/to/gdb ./zsh
==9438== and then give GDB the following command
==9438==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9438
==9438== --pid is optional if only one valgrind process is running
==9438== 
client request: code 4d430005,  addr 0xFFEFECD7C,  len 4
--9436-- Caught __NR_exit; running __libc_freeres()
==9431== Searching for pointers to 69,095 not-freed blocks
--9431--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9431--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9431--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9431--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9431--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9431--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9431--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9431--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9431--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9431--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9431--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9431--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9431--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9431--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9431--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9431--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9431--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9431--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9431--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9431--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9439== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9439-by-pythonnut-on-???
==9439== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9439-by-pythonnut-on-???
==9439== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9439-by-pythonnut-on-???
==9439== 
==9439== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9439== don't want to do, unless you know exactly what you're doing,
==9439== or are doing some strange experiment):
==9439==   /usr/lib/valgrind/../../bin/vgdb --pid=9439 ...command...
==9439== 
==9439== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9439==   /path/to/gdb ./zsh
==9439== and then give GDB the following command
==9439==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9439
==9439== --pid is optional if only one valgrind process is running
==9439== 
--9431--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9431--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9431--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9431--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9431--   Scanning root segment: 0x701a000..0x701afff (4096)
--9431--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9431--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9431--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9431--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9431--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9431--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9431--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9431--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9431--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
--9439-- Caught __NR_exit; running __libc_freeres()
--9436-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9436== 
==9436== HEAP SUMMARY:
==9436==     in use at exit: 3,123,411 bytes in 69,121 blocks
==9436==   total heap usage: 935,623 allocs, 866,502 frees, 66,585,121 bytes allocated
==9436== 
--9439-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9439== 
==9439== HEAP SUMMARY:
==9439==     in use at exit: 3,155,620 bytes in 69,497 blocks
==9439==   total heap usage: 940,029 allocs, 870,532 frees, 68,419,357 bytes allocated
==9439== 
==9436== Searching for pointers to 69,121 not-freed blocks
--9436--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9436--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9436--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9436--   Scanning root segment: 0x4037000..0x403afff (16384)
--9436--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9436--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9436--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9436--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9436--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9436--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9436--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9436--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9436--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9436--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9436--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9436--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9436--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9436--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9436--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9436--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9436--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9436--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9436--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9436--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9436--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9436--   Scanning root segment: 0x701a000..0x701afff (4096)
--9436--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9436--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9436--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9436--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9436--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9436--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9436--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9436--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9436--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9439== Searching for pointers to 69,497 not-freed blocks
--9439--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9439--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9439--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9439--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9439--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9439--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9439--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9439--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9439--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9439--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9439--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9439--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9439--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9439--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9439--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9439--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9439--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9439--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9439--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9439--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9439--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9439--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9439--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9439--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9439--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9439--   Scanning root segment: 0x701a000..0x701afff (4096)
--9439--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9439--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9439--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9439--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9439--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9439--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9439--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9439--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9439--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9431== Checked 4,795,624 bytes
==9431== 
==9431== LEAK SUMMARY:
==9431==    definitely lost: 1,533 bytes in 8 blocks
==9431==    indirectly lost: 6,756 bytes in 7 blocks
==9431==      possibly lost: 0 bytes in 0 blocks
==9431==    still reachable: 3,118,575 bytes in 69,080 blocks
==9431==         suppressed: 0 bytes in 0 blocks
==9431== Rerun with --leak-check=full to see details of leaked memory
==9431== 
==9431== Use --track-origins=yes to see where uninitialised values come from
==9431== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9431== 
==9431== 1 errors in context 1 of 2:
==9431== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9431==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9431==    by 0x488CD0: stringsubst (subst.c:301)
==9431==    by 0x48801B: prefork (subst.c:77)
==9431==    by 0x42B318: execcmd (exec.c:2619)
==9431==    by 0x428CA0: execpline2 (exec.c:1697)
==9431==    by 0x427FD2: execpline (exec.c:1484)
==9431==    by 0x427756: execlist (exec.c:1267)
==9431==    by 0x42717C: execode (exec.c:1073)
==9431==    by 0x431299: runshfunc (exec.c:5040)
==9431==    by 0x430E76: doshfunc (exec.c:4920)
==9431==    by 0x4302FB: execshfunc (exec.c:4557)
==9431==    by 0x42D8C1: execcmd (exec.c:3373)
==9431== 
==9431== 
==9431== 2 errors in context 2 of 2:
==9431== Conditional jump or move depends on uninitialised value(s)
==9431==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9431==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9431==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9431==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9431==    by 0x42D8E9: execcmd (exec.c:3378)
==9431==    by 0x428CA0: execpline2 (exec.c:1697)
==9431==    by 0x427FD2: execpline (exec.c:1484)
==9431==    by 0x42779A: execlist (exec.c:1275)
==9431==    by 0x42717C: execode (exec.c:1073)
==9431==    by 0x431299: runshfunc (exec.c:5040)
==9431==    by 0x430E76: doshfunc (exec.c:4920)
==9431==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9431== 
==9431== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9430-- Caught __NR_exit; running __libc_freeres()
==9430== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9430-by-pythonnut-on-???
==9430== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9430-by-pythonnut-on-???
==9430== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9430-by-pythonnut-on-???
==9430== 
==9430== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9430== don't want to do, unless you know exactly what you're doing,
==9430== or are doing some strange experiment):
==9430==   /usr/lib/valgrind/../../bin/vgdb --pid=9430 ...command...
==9430== 
==9430== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9430==   /path/to/gdb ./zsh
==9430== and then give GDB the following command
==9430==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9430
==9430== --pid is optional if only one valgrind process is running
==9430== 
--9430-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9430== 
==9430== HEAP SUMMARY:
==9430==     in use at exit: 3,126,800 bytes in 69,092 blocks
==9430==   total heap usage: 935,893 allocs, 866,801 frees, 66,383,648 bytes allocated
==9430== 
==9436== Checked 4,788,224 bytes
==9436== 
==9439== Checked 4,873,248 bytes
==9439== 
==9436== LEAK SUMMARY:
==9436==    definitely lost: 1,533 bytes in 8 blocks
==9436==    indirectly lost: 6,756 bytes in 7 blocks
==9436==      possibly lost: 0 bytes in 0 blocks
==9436==    still reachable: 3,115,122 bytes in 69,106 blocks
==9436==         suppressed: 0 bytes in 0 blocks
==9436== Rerun with --leak-check=full to see details of leaked memory
==9436== 
==9436== Use --track-origins=yes to see where uninitialised values come from
==9436== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9436== 
==9436== 1 errors in context 1 of 2:
==9436== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9436==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9436==    by 0x488CD0: stringsubst (subst.c:301)
==9436==    by 0x48801B: prefork (subst.c:77)
==9436==    by 0x42B318: execcmd (exec.c:2619)
==9436==    by 0x428CA0: execpline2 (exec.c:1697)
==9436==    by 0x427FD2: execpline (exec.c:1484)
==9436==    by 0x427756: execlist (exec.c:1267)
==9436==    by 0x42717C: execode (exec.c:1073)
==9436==    by 0x431299: runshfunc (exec.c:5040)
==9436==    by 0x430E76: doshfunc (exec.c:4920)
==9436==    by 0x4302FB: execshfunc (exec.c:4557)
==9436==    by 0x42D8C1: execcmd (exec.c:3373)
==9436== 
==9436== 
==9436== 2 errors in context 2 of 2:
==9436== Conditional jump or move depends on uninitialised value(s)
==9436==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9436==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9436==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9436==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9436==    by 0x42D8E9: execcmd (exec.c:3378)
==9436==    by 0x428CA0: execpline2 (exec.c:1697)
==9436==    by 0x427FD2: execpline (exec.c:1484)
==9436==    by 0x42779A: execlist (exec.c:1275)
==9436==    by 0x42717C: execode (exec.c:1073)
==9436==    by 0x431299: runshfunc (exec.c:5040)
==9436==    by 0x430E76: doshfunc (exec.c:4920)
==9436==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9436== 
==9436== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9430== Searching for pointers to 69,092 not-freed blocks
--9430--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9430--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9430--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9430--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9430--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9430--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9430--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9430--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9430--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9430--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9430--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9430--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9430--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9430--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9430--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9430--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9430--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9430--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9430--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9430--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9430--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9430--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9430--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9430--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9430--   Scanning root segment: 0x701a000..0x701afff (4096)
--9430--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9430--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9430--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9430--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9430--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9430--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9430--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9430--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9430--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9439== LEAK SUMMARY:
==9439==    definitely lost: 1,533 bytes in 8 blocks
==9439==    indirectly lost: 6,756 bytes in 7 blocks
==9439==      possibly lost: 0 bytes in 0 blocks
==9439==    still reachable: 3,147,331 bytes in 69,482 blocks
==9439==         suppressed: 0 bytes in 0 blocks
==9439== Rerun with --leak-check=full to see details of leaked memory
==9439== 
==9439== Use --track-origins=yes to see where uninitialised values come from
==9439== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9439== 
==9439== 1 errors in context 1 of 2:
==9439== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9439==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9439==    by 0x488CD0: stringsubst (subst.c:301)
==9439==    by 0x48801B: prefork (subst.c:77)
==9439==    by 0x42B318: execcmd (exec.c:2619)
==9439==    by 0x428CA0: execpline2 (exec.c:1697)
==9439==    by 0x427FD2: execpline (exec.c:1484)
==9439==    by 0x427756: execlist (exec.c:1267)
==9439==    by 0x42717C: execode (exec.c:1073)
==9439==    by 0x431299: runshfunc (exec.c:5040)
==9439==    by 0x430E76: doshfunc (exec.c:4920)
==9439==    by 0x4302FB: execshfunc (exec.c:4557)
==9439==    by 0x42D8C1: execcmd (exec.c:3373)
==9439== 
==9439== 
==9439== 2 errors in context 2 of 2:
==9439== Conditional jump or move depends on uninitialised value(s)
==9439==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9439==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9439==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9439==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9439==    by 0x42D8E9: execcmd (exec.c:3378)
==9439==    by 0x428CA0: execpline2 (exec.c:1697)
==9439==    by 0x427FD2: execpline (exec.c:1484)
==9439==    by 0x42779A: execlist (exec.c:1275)
==9439==    by 0x42717C: execode (exec.c:1073)
==9439==    by 0x431299: runshfunc (exec.c:5040)
==9439==    by 0x430E76: doshfunc (exec.c:4920)
==9439==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9439== 
==9439== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9438-- Caught __NR_exit; running __libc_freeres()
==9440== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9440-by-pythonnut-on-???
==9440== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9440-by-pythonnut-on-???
==9440== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9440-by-pythonnut-on-???
==9440== 
==9440== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9440== don't want to do, unless you know exactly what you're doing,
==9440== or are doing some strange experiment):
==9440==   /usr/lib/valgrind/../../bin/vgdb --pid=9440 ...command...
==9440== 
==9440== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9440==   /path/to/gdb ./zsh
==9440== and then give GDB the following command
==9440==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9440
==9440== --pid is optional if only one valgrind process is running
==9440== 
==9441== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9441-by-pythonnut-on-???
==9441== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9441-by-pythonnut-on-???
==9441== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9441-by-pythonnut-on-???
==9441== 
==9441== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9441== don't want to do, unless you know exactly what you're doing,
==9441== or are doing some strange experiment):
==9441==   /usr/lib/valgrind/../../bin/vgdb --pid=9441 ...command...
==9441== 
==9441== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9441==   /path/to/gdb ./zsh
==9441== and then give GDB the following command
==9441==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9441
==9441== --pid is optional if only one valgrind process is running
==9441== 
--9441-- Caught __NR_exit; running __libc_freeres()
--9438-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9438== 
==9438== HEAP SUMMARY:
==9438==     in use at exit: 3,153,268 bytes in 69,417 blocks
==9438==   total heap usage: 939,935 allocs, 870,518 frees, 68,220,162 bytes allocated
==9438== 
--9441-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9441== 
==9441== HEAP SUMMARY:
==9441==     in use at exit: 3,196,790 bytes in 69,128 blocks
==9441==   total heap usage: 935,631 allocs, 866,503 frees, 66,661,652 bytes allocated
==9441== 
==9438== Searching for pointers to 69,417 not-freed blocks
--9438--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9438--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9438--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9438--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9438--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9438--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9438--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9438--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9438--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9438--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9438--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9438--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9438--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9438--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9438--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9438--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9438--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9438--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9438--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9438--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9438--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9438--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9438--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9438--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9438--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9438--   Scanning root segment: 0x701a000..0x701afff (4096)
--9438--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9438--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9438--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9438--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9438--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9438--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9438--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9438--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9438--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9430== Checked 4,794,936 bytes
==9430== 
==9441== Searching for pointers to 69,128 not-freed blocks
--9441--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9441--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9441--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9441--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9441--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9441--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9441--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9441--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9441--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9441--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9441--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9441--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9441--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9441--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9441--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9441--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9441--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9441--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9441--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9441--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9441--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9441--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9441--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9441--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9441--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9441--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9441--   Scanning root segment: 0x701a000..0x701afff (4096)
--9441--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9441--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9441--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9441--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9441--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9441--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9441--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9441--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9441--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9430== LEAK SUMMARY:
==9430==    definitely lost: 1,533 bytes in 8 blocks
==9430==    indirectly lost: 6,756 bytes in 7 blocks
==9430==      possibly lost: 0 bytes in 0 blocks
==9430==    still reachable: 3,118,511 bytes in 69,077 blocks
==9430==         suppressed: 0 bytes in 0 blocks
==9430== Rerun with --leak-check=full to see details of leaked memory
==9430== 
==9430== Use --track-origins=yes to see where uninitialised values come from
==9430== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9430== 
==9430== 1 errors in context 1 of 2:
==9430== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9430==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9430==    by 0x488CD0: stringsubst (subst.c:301)
==9430==    by 0x48801B: prefork (subst.c:77)
==9430==    by 0x42B318: execcmd (exec.c:2619)
==9430==    by 0x428CA0: execpline2 (exec.c:1697)
==9430==    by 0x427FD2: execpline (exec.c:1484)
==9430==    by 0x427756: execlist (exec.c:1267)
==9430==    by 0x42717C: execode (exec.c:1073)
==9430==    by 0x431299: runshfunc (exec.c:5040)
==9430==    by 0x430E76: doshfunc (exec.c:4920)
==9430==    by 0x4302FB: execshfunc (exec.c:4557)
==9430==    by 0x42D8C1: execcmd (exec.c:3373)
==9430== 
==9430== 
==9430== 2 errors in context 2 of 2:
==9430== Conditional jump or move depends on uninitialised value(s)
==9430==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9430==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9430==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9430==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9430==    by 0x42D8E9: execcmd (exec.c:3378)
==9430==    by 0x428CA0: execpline2 (exec.c:1697)
==9430==    by 0x427FD2: execpline (exec.c:1484)
==9430==    by 0x42779A: execlist (exec.c:1275)
==9430==    by 0x42717C: execode (exec.c:1073)
==9430==    by 0x431299: runshfunc (exec.c:5040)
==9430==    by 0x430E76: doshfunc (exec.c:4920)
==9430==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9430== 
==9430== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9442== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9442-by-pythonnut-on-???
==9442== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9442-by-pythonnut-on-???
==9442== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9442-by-pythonnut-on-???
==9442== 
==9442== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9442== don't want to do, unless you know exactly what you're doing,
==9442== or are doing some strange experiment):
==9442==   /usr/lib/valgrind/../../bin/vgdb --pid=9442 ...command...
==9442== 
==9442== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9442==   /path/to/gdb ./zsh
==9442== and then give GDB the following command
==9442==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9442
==9442== --pid is optional if only one valgrind process is running
==9442== 
--9442-- Caught __NR_exit; running __libc_freeres()
--9442-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9442== 
==9442== HEAP SUMMARY:
==9442==     in use at exit: 3,126,807 bytes in 69,092 blocks
==9442==   total heap usage: 935,908 allocs, 866,816 frees, 66,388,646 bytes allocated
==9442== 
==9438== Checked 4,852,816 bytes
==9438== 
==9442== Searching for pointers to 69,092 not-freed blocks
--9442--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9442--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9442--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9442--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9442--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9442--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9442--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9442--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9442--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9442--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9442--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9442--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9442--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9442--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9442--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9442--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9442--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9442--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9442--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9442--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9442--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9442--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9442--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9442--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9442--   Scanning root segment: 0x701a000..0x701afff (4096)
--9442--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9442--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9442--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9442--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9442--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9442--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9442--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9442--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9442--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9438== LEAK SUMMARY:
==9438==    definitely lost: 1,533 bytes in 8 blocks
==9438==    indirectly lost: 6,756 bytes in 7 blocks
==9438==      possibly lost: 0 bytes in 0 blocks
==9438==    still reachable: 3,144,979 bytes in 69,402 blocks
==9438==         suppressed: 0 bytes in 0 blocks
==9438== Rerun with --leak-check=full to see details of leaked memory
==9438== 
==9438== Use --track-origins=yes to see where uninitialised values come from
==9438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9438== 
==9438== 1 errors in context 1 of 2:
==9438== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9438==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9438==    by 0x488CD0: stringsubst (subst.c:301)
==9438==    by 0x48801B: prefork (subst.c:77)
==9438==    by 0x42B318: execcmd (exec.c:2619)
==9438==    by 0x428CA0: execpline2 (exec.c:1697)
==9438==    by 0x427FD2: execpline (exec.c:1484)
==9438==    by 0x427756: execlist (exec.c:1267)
==9438==    by 0x42717C: execode (exec.c:1073)
==9438==    by 0x431299: runshfunc (exec.c:5040)
==9438==    by 0x430E76: doshfunc (exec.c:4920)
==9438==    by 0x4302FB: execshfunc (exec.c:4557)
==9438==    by 0x42D8C1: execcmd (exec.c:3373)
==9438== 
==9438== 
==9438== 2 errors in context 2 of 2:
==9438== Conditional jump or move depends on uninitialised value(s)
==9438==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9438==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9438==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9438==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9438==    by 0x42D8E9: execcmd (exec.c:3378)
==9438==    by 0x428CA0: execpline2 (exec.c:1697)
==9438==    by 0x427FD2: execpline (exec.c:1484)
==9438==    by 0x42779A: execlist (exec.c:1275)
==9438==    by 0x42717C: execode (exec.c:1073)
==9438==    by 0x431299: runshfunc (exec.c:5040)
==9438==    by 0x430E76: doshfunc (exec.c:4920)
==9438==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9438== 
==9438== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9441== Checked 4,973,128 bytes
==9441== 
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
==9441== LEAK SUMMARY:
==9441==    definitely lost: 1,533 bytes in 8 blocks
==9441==    indirectly lost: 6,756 bytes in 7 blocks
==9441==      possibly lost: 0 bytes in 0 blocks
==9441==    still reachable: 3,188,501 bytes in 69,113 blocks
==9441==         suppressed: 0 bytes in 0 blocks
==9441== Rerun with --leak-check=full to see details of leaked memory
==9441== 
==9441== Use --track-origins=yes to see where uninitialised values come from
==9441== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9441== 
==9441== 1 errors in context 1 of 2:
==9441== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9441==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9441==    by 0x488CD0: stringsubst (subst.c:301)
==9441==    by 0x48801B: prefork (subst.c:77)
==9441==    by 0x42B318: execcmd (exec.c:2619)
==9441==    by 0x428CA0: execpline2 (exec.c:1697)
==9441==    by 0x427FD2: execpline (exec.c:1484)
==9441==    by 0x427756: execlist (exec.c:1267)
==9441==    by 0x42717C: execode (exec.c:1073)
==9441==    by 0x431299: runshfunc (exec.c:5040)
==9441==    by 0x430E76: doshfunc (exec.c:4920)
==9441==    by 0x4302FB: execshfunc (exec.c:4557)
==9441==    by 0x42D8C1: execcmd (exec.c:3373)
==9441== 
==9441== 
==9441== 2 errors in context 2 of 2:
==9441== Conditional jump or move depends on uninitialised value(s)
==9441==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9441==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9441==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9441==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9441==    by 0x42D8E9: execcmd (exec.c:3378)
==9441==    by 0x428CA0: execpline2 (exec.c:1697)
==9441==    by 0x427FD2: execpline (exec.c:1484)
==9441==    by 0x42779A: execlist (exec.c:1275)
==9441==    by 0x42717C: execode (exec.c:1073)
==9441==    by 0x431299: runshfunc (exec.c:5040)
==9441==    by 0x430E76: doshfunc (exec.c:4920)
==9441==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9441== 
==9441== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9445== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9445-by-pythonnut-on-???
==9445== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9445-by-pythonnut-on-???
==9445== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9445-by-pythonnut-on-???
==9445== 
==9445== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9445== don't want to do, unless you know exactly what you're doing,
==9445== or are doing some strange experiment):
==9445==   /usr/lib/valgrind/../../bin/vgdb --pid=9445 ...command...
==9445== 
==9445== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9445==   /path/to/gdb ./zsh
==9445== and then give GDB the following command
==9445==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9445
==9445== --pid is optional if only one valgrind process is running
==9445== 
==9446== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9446-by-pythonnut-on-???
==9446== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9446-by-pythonnut-on-???
==9446== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9446-by-pythonnut-on-???
==9446== 
==9446== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9446== don't want to do, unless you know exactly what you're doing,
==9446== or are doing some strange experiment):
==9446==   /usr/lib/valgrind/../../bin/vgdb --pid=9446 ...command...
==9446== 
==9446== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9446==   /path/to/gdb ./zsh
==9446== and then give GDB the following command
==9446==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9446
==9446== --pid is optional if only one valgrind process is running
==9446== 
--9446-- Caught __NR_exit; running __libc_freeres()
--9446-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9446== 
==9442== Checked 4,795,080 bytes
==9442== 
==9446== HEAP SUMMARY:
==9446==     in use at exit: 3,161,803 bytes in 69,586 blocks
==9446==   total heap usage: 940,249 allocs, 870,663 frees, 68,480,976 bytes allocated
==9446== 
==9442== LEAK SUMMARY:
==9442==    definitely lost: 1,533 bytes in 8 blocks
==9442==    indirectly lost: 6,756 bytes in 7 blocks
==9442==      possibly lost: 0 bytes in 0 blocks
==9442==    still reachable: 3,118,518 bytes in 69,077 blocks
==9442==         suppressed: 0 bytes in 0 blocks
==9442== Rerun with --leak-check=full to see details of leaked memory
==9442== 
==9442== Use --track-origins=yes to see where uninitialised values come from
==9442== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9442== 
==9442== 1 errors in context 1 of 2:
==9442== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9442==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9442==    by 0x488CD0: stringsubst (subst.c:301)
==9442==    by 0x48801B: prefork (subst.c:77)
==9442==    by 0x42B318: execcmd (exec.c:2619)
==9442==    by 0x428CA0: execpline2 (exec.c:1697)
==9442==    by 0x427FD2: execpline (exec.c:1484)
==9442==    by 0x427756: execlist (exec.c:1267)
==9442==    by 0x42717C: execode (exec.c:1073)
==9442==    by 0x431299: runshfunc (exec.c:5040)
==9442==    by 0x430E76: doshfunc (exec.c:4920)
==9442==    by 0x4302FB: execshfunc (exec.c:4557)
==9442==    by 0x42D8C1: execcmd (exec.c:3373)
==9442== 
==9442== 
==9442== 2 errors in context 2 of 2:
==9442== Conditional jump or move depends on uninitialised value(s)
==9442==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9442==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9442==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9442==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9442==    by 0x42D8E9: execcmd (exec.c:3378)
==9442==    by 0x428CA0: execpline2 (exec.c:1697)
==9442==    by 0x427FD2: execpline (exec.c:1484)
==9442==    by 0x42779A: execlist (exec.c:1275)
==9442==    by 0x42717C: execode (exec.c:1073)
==9442==    by 0x431299: runshfunc (exec.c:5040)
==9442==    by 0x430E76: doshfunc (exec.c:4920)
==9442==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9442== 
==9442== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9446== Searching for pointers to 69,586 not-freed blocks
--9446--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9446--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9446--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9446--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9446--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9446--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9446--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9446--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9446--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9446--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9446--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9446--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9446--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9446--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9446--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9446--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9446--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9446--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9446--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9446--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9446--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9446--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9446--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9446--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9446--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9446--   Scanning root segment: 0x701a000..0x701afff (4096)
--9446--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9446--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9446--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9446--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9446--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9446--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9446--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9446--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9446--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9447-- Caught __NR_exit; running __libc_freeres()
==9447== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9447-by-pythonnut-on-???
==9447== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9447-by-pythonnut-on-???
==9447== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9447-by-pythonnut-on-???
==9447== 
==9447== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9447== don't want to do, unless you know exactly what you're doing,
==9447== or are doing some strange experiment):
==9447==   /usr/lib/valgrind/../../bin/vgdb --pid=9447 ...command...
==9447== 
==9447== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9447==   /path/to/gdb ./zsh
==9447== and then give GDB the following command
==9447==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9447
==9447== --pid is optional if only one valgrind process is running
==9447== 
--9447-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9447== 
==9447== HEAP SUMMARY:
==9447==     in use at exit: 3,126,903 bytes in 69,092 blocks
==9447==   total heap usage: 935,924 allocs, 866,832 frees, 66,393,433 bytes allocated
==9447== 
==9447== Searching for pointers to 69,092 not-freed blocks
--9447--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9447--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9447--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9447--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9447--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9447--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9447--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9447--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9447--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9447--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9447--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9447--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9447--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9447--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9447--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9447--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9447--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9447--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9447--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9447--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9447--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9447--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9447--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9447--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9447--   Scanning root segment: 0x701a000..0x701afff (4096)
--9447--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9447--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9447--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9447--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9447--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9447--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9447--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9447--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9447--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9446== Checked 4,880,528 bytes
==9446== 
==9446== LEAK SUMMARY:
==9446==    definitely lost: 1,533 bytes in 8 blocks
==9446==    indirectly lost: 6,756 bytes in 7 blocks
==9446==      possibly lost: 0 bytes in 0 blocks
==9446==    still reachable: 3,153,514 bytes in 69,571 blocks
==9446==         suppressed: 0 bytes in 0 blocks
==9446== Rerun with --leak-check=full to see details of leaked memory
==9446== 
==9446== Use --track-origins=yes to see where uninitialised values come from
==9446== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9446== 
==9446== 1 errors in context 1 of 2:
==9446== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9446==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9446==    by 0x488CD0: stringsubst (subst.c:301)
==9446==    by 0x48801B: prefork (subst.c:77)
==9446==    by 0x42B318: execcmd (exec.c:2619)
==9446==    by 0x428CA0: execpline2 (exec.c:1697)
==9446==    by 0x427FD2: execpline (exec.c:1484)
==9446==    by 0x427756: execlist (exec.c:1267)
==9446==    by 0x42717C: execode (exec.c:1073)
==9446==    by 0x431299: runshfunc (exec.c:5040)
==9446==    by 0x430E76: doshfunc (exec.c:4920)
==9446==    by 0x4302FB: execshfunc (exec.c:4557)
==9446==    by 0x42D8C1: execcmd (exec.c:3373)
==9446== 
==9446== 
==9446== 2 errors in context 2 of 2:
==9446== Conditional jump or move depends on uninitialised value(s)
==9446==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9446==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9446==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9446==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9446==    by 0x42D8E9: execcmd (exec.c:3378)
==9446==    by 0x428CA0: execpline2 (exec.c:1697)
==9446==    by 0x427FD2: execpline (exec.c:1484)
==9446==    by 0x42779A: execlist (exec.c:1275)
==9446==    by 0x42717C: execode (exec.c:1073)
==9446==    by 0x431299: runshfunc (exec.c:5040)
==9446==    by 0x430E76: doshfunc (exec.c:4920)
==9446==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9446== 
==9446== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9445-- Caught __NR_exit; running __libc_freeres()
--9445-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9445== 
==9445== HEAP SUMMARY:
==9445==     in use at exit: 3,159,428 bytes in 69,505 blocks
==9445==   total heap usage: 940,189 allocs, 870,684 frees, 68,251,078 bytes allocated
==9445== 
==9447== Checked 4,794,360 bytes
==9447== 
==9445== Searching for pointers to 69,505 not-freed blocks
--9445--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9445--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9445--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9445--   Scanning root segment: 0x4037000..0x4046fff (65536)
==9447== LEAK SUMMARY:
==9447==    definitely lost: 1,533 bytes in 8 blocks
==9447==    indirectly lost: 6,756 bytes in 7 blocks
==9447==      possibly lost: 0 bytes in 0 blocks
==9447==    still reachable: 3,118,614 bytes in 69,077 blocks
==9447==         suppressed: 0 bytes in 0 blocks
==9447== Rerun with --leak-check=full to see details of leaked memory
==9447== 
==9447== Use --track-origins=yes to see where uninitialised values come from
--9445--   Scanning root segment: 0x4049000..0x404cfff (16384)
==9447== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9447== 
==9447== 1 errors in context 1 of 2:
==9447== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9447==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9447==    by 0x488CD0: stringsubst (subst.c:301)
==9447==    by 0x48801B: prefork (subst.c:77)
==9447==    by 0x42B318: execcmd (exec.c:2619)
==9447==    by 0x428CA0: execpline2 (exec.c:1697)
==9447==    by 0x427FD2: execpline (exec.c:1484)
==9447==    by 0x427756: execlist (exec.c:1267)
==9447==    by 0x42717C: execode (exec.c:1073)
==9447==    by 0x431299: runshfunc (exec.c:5040)
==9447==    by 0x430E76: doshfunc (exec.c:4920)
==9447==    by 0x4302FB: execshfunc (exec.c:4557)
--9445--   Scanning root segment: 0x4222000..0x4222fff (4096)
==9447==    by 0x42D8C1: execcmd (exec.c:3373)
==9447== 
==9447== 
==9447== 2 errors in context 2 of 2:
--9445--   Scanning root segment: 0x4223000..0x4223fff (4096)
==9447== Conditional jump or move depends on uninitialised value(s)
==9447==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
--9445--   Scanning root segment: 0x4224000..0x4224fff (4096)
==9447==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9447==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
--9445--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
==9447==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9447==    by 0x42D8E9: execcmd (exec.c:3378)
--9445--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==9447==    by 0x428CA0: execpline2 (exec.c:1697)
==9447==    by 0x427FD2: execpline (exec.c:1484)
==9447==    by 0x42779A: execlist (exec.c:1275)
==9447==    by 0x42717C: execode (exec.c:1073)
==9447==    by 0x431299: runshfunc (exec.c:5040)
--9445--   Scanning root segment: 0x5041000..0x5041fff (4096)
==9447==    by 0x430E76: doshfunc (exec.c:4920)
==9447==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9447== 
==9447== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9445--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9445--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9445--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9445--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9445--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9445--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9445--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9445--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9445--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9445--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9445--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9445--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9445--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9445--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9445--   Scanning root segment: 0x701a000..0x701afff (4096)
--9445--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9445--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9445--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9445--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9445--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9445--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9445--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9445--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9445--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9448== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9448-by-pythonnut-on-???
==9448== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9448-by-pythonnut-on-???
==9448== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9448-by-pythonnut-on-???
==9448== 
==9448== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9448== don't want to do, unless you know exactly what you're doing,
==9448== or are doing some strange experiment):
==9448==   /usr/lib/valgrind/../../bin/vgdb --pid=9448 ...command...
==9448== 
==9448== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9448==   /path/to/gdb ./zsh
==9448== and then give GDB the following command
==9448==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9448
==9448== --pid is optional if only one valgrind process is running
==9448== 
--9448-- Caught __NR_exit; running __libc_freeres()
--9440-- Caught __NR_exit; running __libc_freeres()
--9448-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9448== 
==9448== HEAP SUMMARY:
==9448==     in use at exit: 3,127,145 bytes in 69,098 blocks
==9448==   total heap usage: 935,972 allocs, 866,874 frees, 66,402,449 bytes allocated
==9448== 
--9440-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9440== 
==9440== HEAP SUMMARY:
==9440==     in use at exit: 3,160,363 bytes in 69,128 blocks
==9440==   total heap usage: 939,349 allocs, 870,221 frees, 67,889,809 bytes allocated
==9440== 
==9445== Checked 4,876,592 bytes
==9445== 
==9448== Searching for pointers to 69,098 not-freed blocks
--9448--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9448--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9448--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9448--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9448--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9448--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9448--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9448--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9448--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9448--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9448--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9448--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9448--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9448--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9448--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9448--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9448--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9448--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9448--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9448--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9448--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9448--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9448--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9448--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9448--   Scanning root segment: 0x701a000..0x701afff (4096)
--9448--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9448--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9448--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9448--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9448--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9448--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9448--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9448--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9448--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9445== LEAK SUMMARY:
==9445==    definitely lost: 1,533 bytes in 8 blocks
==9445==    indirectly lost: 6,756 bytes in 7 blocks
==9445==      possibly lost: 0 bytes in 0 blocks
==9445==    still reachable: 3,151,139 bytes in 69,490 blocks
==9445==         suppressed: 0 bytes in 0 blocks
==9445== Rerun with --leak-check=full to see details of leaked memory
==9445== 
==9445== Use --track-origins=yes to see where uninitialised values come from
==9445== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9445== 
==9445== 1 errors in context 1 of 2:
==9445== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9445==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9445==    by 0x488CD0: stringsubst (subst.c:301)
==9445==    by 0x48801B: prefork (subst.c:77)
==9445==    by 0x42B318: execcmd (exec.c:2619)
==9445==    by 0x428CA0: execpline2 (exec.c:1697)
==9445==    by 0x427FD2: execpline (exec.c:1484)
==9445==    by 0x427756: execlist (exec.c:1267)
==9445==    by 0x42717C: execode (exec.c:1073)
==9445==    by 0x431299: runshfunc (exec.c:5040)
==9445==    by 0x430E76: doshfunc (exec.c:4920)
==9445==    by 0x4302FB: execshfunc (exec.c:4557)
==9445==    by 0x42D8C1: execcmd (exec.c:3373)
==9445== 
==9445== 
==9445== 2 errors in context 2 of 2:
==9445== Conditional jump or move depends on uninitialised value(s)
==9445==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9445==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9445==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9445==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9445==    by 0x42D8E9: execcmd (exec.c:3378)
==9445==    by 0x428CA0: execpline2 (exec.c:1697)
==9445==    by 0x427FD2: execpline (exec.c:1484)
==9445==    by 0x42779A: execlist (exec.c:1275)
==9445==    by 0x42717C: execode (exec.c:1073)
==9445==    by 0x431299: runshfunc (exec.c:5040)
==9445==    by 0x430E76: doshfunc (exec.c:4920)
==9445==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9445== 
==9445== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9440== Searching for pointers to 69,128 not-freed blocks
--9440--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9440--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
--9440--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9440--   Scanning root segment: 0x4037000..0x4043fff (53248)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
--9440--   Scanning root segment: 0x4049000..0x404cfff (16384)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
--9440--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9440--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9440--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9440--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9440--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9440--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9440--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9440--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9440--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9440--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9440--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9440--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9440--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9440--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9440--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9440--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9440--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9440--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9440--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
--9440--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9440--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9440--   Scanning root segment: 0x701a000..0x701afff (4096)
--9440--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9440--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9440--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9440--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9440--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9440--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9440--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9440--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
--9440--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF3DBC,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFE992C,  len 4
==9448== Checked 4,794,528 bytes
==9448== 
==9451== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9451-by-pythonnut-on-???
==9451== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9451-by-pythonnut-on-???
==9451== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9451-by-pythonnut-on-???
==9451== 
==9451== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9451== don't want to do, unless you know exactly what you're doing,
==9451== or are doing some strange experiment):
==9451==   /usr/lib/valgrind/../../bin/vgdb --pid=9451 ...command...
==9451== 
==9451== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9451==   /path/to/gdb ./zsh
==9451== and then give GDB the following command
==9451==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9451
==9451== --pid is optional if only one valgrind process is running
==9451== 
client request: code 4d430005,  addr 0xFFEFE87EC,  len 4
==9448== LEAK SUMMARY:
==9448==    definitely lost: 1,533 bytes in 8 blocks
==9448==    indirectly lost: 6,756 bytes in 7 blocks
==9448==      possibly lost: 0 bytes in 0 blocks
==9448==    still reachable: 3,118,856 bytes in 69,083 blocks
==9448==         suppressed: 0 bytes in 0 blocks
==9448== Rerun with --leak-check=full to see details of leaked memory
==9448== 
==9448== Use --track-origins=yes to see where uninitialised values come from
==9448== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9448== 
==9448== 1 errors in context 1 of 2:
==9448== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9448==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9448==    by 0x488CD0: stringsubst (subst.c:301)
==9448==    by 0x48801B: prefork (subst.c:77)
==9448==    by 0x42B318: execcmd (exec.c:2619)
==9448==    by 0x428CA0: execpline2 (exec.c:1697)
==9448==    by 0x427FD2: execpline (exec.c:1484)
==9448==    by 0x427756: execlist (exec.c:1267)
==9448==    by 0x42717C: execode (exec.c:1073)
==9448==    by 0x431299: runshfunc (exec.c:5040)
==9448==    by 0x430E76: doshfunc (exec.c:4920)
==9448==    by 0x4302FB: execshfunc (exec.c:4557)
==9448==    by 0x42D8C1: execcmd (exec.c:3373)
==9448== 
==9448== 
==9448== 2 errors in context 2 of 2:
==9448== Conditional jump or move depends on uninitialised value(s)
==9448==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9448==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9448==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9448==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9448==    by 0x42D8E9: execcmd (exec.c:3378)
==9448==    by 0x428CA0: execpline2 (exec.c:1697)
==9448==    by 0x427FD2: execpline (exec.c:1484)
==9448==    by 0x42779A: execlist (exec.c:1275)
==9448==    by 0x42717C: execode (exec.c:1073)
==9448==    by 0x431299: runshfunc (exec.c:5040)
==9448==    by 0x430E76: doshfunc (exec.c:4920)
==9448==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9448== 
==9448== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9450== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9450-by-pythonnut-on-???
==9450== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9450-by-pythonnut-on-???
==9450== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9450-by-pythonnut-on-???
==9450== 
==9450== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9450== don't want to do, unless you know exactly what you're doing,
==9450== or are doing some strange experiment):
==9450==   /usr/lib/valgrind/../../bin/vgdb --pid=9450 ...command...
==9450== 
==9450== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9450==   /path/to/gdb ./zsh
==9450== and then give GDB the following command
==9450==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9450
==9450== --pid is optional if only one valgrind process is running
==9450== 
==9440== Checked 4,936,016 bytes
==9440== 
--9450-- Caught __NR_exit; running __libc_freeres()
--9452-- Caught __NR_exit; running __libc_freeres()
==9452== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9452-by-pythonnut-on-???
==9452== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9452-by-pythonnut-on-???
==9452== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9452-by-pythonnut-on-???
==9452== 
==9452== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9452== don't want to do, unless you know exactly what you're doing,
==9452== or are doing some strange experiment):
==9452==   /usr/lib/valgrind/../../bin/vgdb --pid=9452 ...command...
==9452== 
==9452== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9452==   /path/to/gdb ./zsh
==9452== and then give GDB the following command
==9452==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9452
==9452== --pid is optional if only one valgrind process is running
==9452== 
==9440== LEAK SUMMARY:
==9440==    definitely lost: 1,533 bytes in 8 blocks
==9440==    indirectly lost: 6,756 bytes in 7 blocks
==9440==      possibly lost: 0 bytes in 0 blocks
==9440==    still reachable: 3,152,074 bytes in 69,113 blocks
==9440==         suppressed: 0 bytes in 0 blocks
==9440== Rerun with --leak-check=full to see details of leaked memory
==9440== 
==9440== Use --track-origins=yes to see where uninitialised values come from
==9440== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9440== 
==9440== 1 errors in context 1 of 2:
==9440== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9440==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9440==    by 0x488CD0: stringsubst (subst.c:301)
==9440==    by 0x48801B: prefork (subst.c:77)
==9440==    by 0x42B318: execcmd (exec.c:2619)
==9440==    by 0x428CA0: execpline2 (exec.c:1697)
==9440==    by 0x427FD2: execpline (exec.c:1484)
==9440==    by 0x427756: execlist (exec.c:1267)
==9440==    by 0x42717C: execode (exec.c:1073)
==9440==    by 0x431299: runshfunc (exec.c:5040)
==9440==    by 0x430E76: doshfunc (exec.c:4920)
==9440==    by 0x4302FB: execshfunc (exec.c:4557)
==9440==    by 0x42D8C1: execcmd (exec.c:3373)
==9440== 
==9440== 
==9440== 2 errors in context 2 of 2:
==9440== Conditional jump or move depends on uninitialised value(s)
==9440==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9440==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9440==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9440==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9440==    by 0x42D8E9: execcmd (exec.c:3378)
==9440==    by 0x428CA0: execpline2 (exec.c:1697)
==9440==    by 0x427FD2: execpline (exec.c:1484)
==9440==    by 0x42779A: execlist (exec.c:1275)
==9440==    by 0x42717C: execode (exec.c:1073)
==9440==    by 0x431299: runshfunc (exec.c:5040)
==9440==    by 0x430E76: doshfunc (exec.c:4920)
==9440==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9440== 
==9440== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9450-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9450== 
--9452-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9450== HEAP SUMMARY:
==9450==     in use at exit: 3,168,179 bytes in 69,594 blocks
==9450==   total heap usage: 940,514 allocs, 870,920 frees, 68,297,051 bytes allocated
==9450== 
==9452== 
==9452== HEAP SUMMARY:
==9452==     in use at exit: 3,127,081 bytes in 69,098 blocks
==9452==   total heap usage: 935,952 allocs, 866,854 frees, 66,400,219 bytes allocated
==9452== 
==9453== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9453-by-pythonnut-on-???
==9453== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9453-by-pythonnut-on-???
==9453== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9453-by-pythonnut-on-???
==9453== 
==9453== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9453== don't want to do, unless you know exactly what you're doing,
==9453== or are doing some strange experiment):
==9453==   /usr/lib/valgrind/../../bin/vgdb --pid=9453 ...command...
==9453== 
==9453== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9453==   /path/to/gdb ./zsh
==9453== and then give GDB the following command
==9453==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9453
==9453== --pid is optional if only one valgrind process is running
==9453== 
--9453-- Caught __NR_exit; running __libc_freeres()
==9450== Searching for pointers to 69,594 not-freed blocks
--9450--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9450--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9450--   Scanning root segment: 0x4022000..0x4026fff (20480)
client request: code 4d430005,  addr 0xFFEFEDFFC,  len 4
--9450--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9450--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9450--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9450--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9450--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9450--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9450--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9450--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9450--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9450--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9450--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9450--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9450--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9450--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9450--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9450--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9450--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9450--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9450--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9450--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9450--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9450--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9450--   Scanning root segment: 0x701a000..0x701afff (4096)
--9450--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9450--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9450--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9450--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9450--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9450--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9450--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9450--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9450--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9452== Searching for pointers to 69,098 not-freed blocks
--9452--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9452--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9452--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9452--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9452--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9452--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9452--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9452--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9452--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9452--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9452--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9452--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9452--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9452--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9452--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9452--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9452--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9452--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9452--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9452--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9452--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9452--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9452--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9452--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9452--   Scanning root segment: 0x701a000..0x701afff (4096)
--9452--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9452--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9452--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9452--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9452--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9452--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9452--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9452--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9452--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9454-- Caught __NR_exit; running __libc_freeres()
--9453-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9453== 
==9454== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9454-by-pythonnut-on-???
==9454== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9454-by-pythonnut-on-???
==9454== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9454-by-pythonnut-on-???
==9454== 
==9454== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9454== don't want to do, unless you know exactly what you're doing,
==9454== or are doing some strange experiment):
==9454==   /usr/lib/valgrind/../../bin/vgdb --pid=9454 ...command...
==9454== 
==9454== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9454==   /path/to/gdb ./zsh
==9454== and then give GDB the following command
==9454==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9454
==9454== --pid is optional if only one valgrind process is running
==9454== 
==9453== HEAP SUMMARY:
==9453==     in use at exit: 3,166,577 bytes in 69,128 blocks
==9453==   total heap usage: 935,636 allocs, 866,508 frees, 66,670,146 bytes allocated
==9453== 
--9454-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9454== 
==9454== HEAP SUMMARY:
==9454==     in use at exit: 3,145,105 bytes in 69,128 blocks
==9454==   total heap usage: 935,642 allocs, 866,514 frees, 66,672,266 bytes allocated
==9454== 
==9453== Searching for pointers to 69,128 not-freed blocks
--9453--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9453--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9453--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9453--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9453--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9453--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--9453--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9453--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9453--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9453--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9453--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9453--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9453--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9453--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9453--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9453--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9453--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9453--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9453--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9453--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9453--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9453--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9453--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9453--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9453--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9453--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9453--   Scanning root segment: 0x701a000..0x701afff (4096)
--9453--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9453--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9453--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9453--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9453--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9453--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9453--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9453--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9453--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9454== Searching for pointers to 69,128 not-freed blocks
--9454--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9454--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9454--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9454--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9454--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9454--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--9454--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9454--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9454--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9454--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9454--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9454--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9454--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9454--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9454--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9454--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9454--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9454--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9454--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9454--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9454--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9454--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9454--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9454--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9454--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9454--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9454--   Scanning root segment: 0x701a000..0x701afff (4096)
--9454--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==9450== Checked 4,889,672 bytes
==9450== 
--9454--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9454--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9454--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9454--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9454--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9454--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9454--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9454--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9450== LEAK SUMMARY:
==9450==    definitely lost: 1,533 bytes in 8 blocks
==9450==    indirectly lost: 6,756 bytes in 7 blocks
==9450==      possibly lost: 0 bytes in 0 blocks
==9450==    still reachable: 3,159,890 bytes in 69,579 blocks
==9450==         suppressed: 0 bytes in 0 blocks
==9450== Rerun with --leak-check=full to see details of leaked memory
==9450== 
==9450== Use --track-origins=yes to see where uninitialised values come from
==9450== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9450== 
==9450== 1 errors in context 1 of 2:
==9450== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9450==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9450==    by 0x488CD0: stringsubst (subst.c:301)
==9450==    by 0x48801B: prefork (subst.c:77)
==9450==    by 0x42B318: execcmd (exec.c:2619)
==9450==    by 0x428CA0: execpline2 (exec.c:1697)
==9450==    by 0x427FD2: execpline (exec.c:1484)
==9450==    by 0x427756: execlist (exec.c:1267)
==9450==    by 0x42717C: execode (exec.c:1073)
==9450==    by 0x431299: runshfunc (exec.c:5040)
==9450==    by 0x430E76: doshfunc (exec.c:4920)
==9450==    by 0x4302FB: execshfunc (exec.c:4557)
==9450==    by 0x42D8C1: execcmd (exec.c:3373)
==9450== 
==9450== 
==9450== 2 errors in context 2 of 2:
==9450== Conditional jump or move depends on uninitialised value(s)
==9450==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9450==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9450==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9450==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9450==    by 0x42D8E9: execcmd (exec.c:3378)
==9450==    by 0x428CA0: execpline2 (exec.c:1697)
==9450==    by 0x427FD2: execpline (exec.c:1484)
==9450==    by 0x42779A: execlist (exec.c:1275)
==9450==    by 0x42717C: execode (exec.c:1073)
==9450==    by 0x431299: runshfunc (exec.c:5040)
==9450==    by 0x430E76: doshfunc (exec.c:4920)
==9450==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9450== 
==9450== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9452== Checked 4,794,456 bytes
==9452== 
--9457-- Caught __NR_exit; running __libc_freeres()
==9452== LEAK SUMMARY:
==9452==    definitely lost: 1,533 bytes in 8 blocks
==9452==    indirectly lost: 6,756 bytes in 7 blocks
==9452==      possibly lost: 0 bytes in 0 blocks
==9452==    still reachable: 3,118,792 bytes in 69,083 blocks
==9452==         suppressed: 0 bytes in 0 blocks
==9452== Rerun with --leak-check=full to see details of leaked memory
==9452== 
==9452== Use --track-origins=yes to see where uninitialised values come from
==9452== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9452== 
==9452== 1 errors in context 1 of 2:
==9452== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9452==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9452==    by 0x488CD0: stringsubst (subst.c:301)
==9452==    by 0x48801B: prefork (subst.c:77)
==9452==    by 0x42B318: execcmd (exec.c:2619)
==9452==    by 0x428CA0: execpline2 (exec.c:1697)
==9452==    by 0x427FD2: execpline (exec.c:1484)
==9452==    by 0x427756: execlist (exec.c:1267)
==9452==    by 0x42717C: execode (exec.c:1073)
==9452==    by 0x431299: runshfunc (exec.c:5040)
==9452==    by 0x430E76: doshfunc (exec.c:4920)
==9452==    by 0x4302FB: execshfunc (exec.c:4557)
==9452==    by 0x42D8C1: execcmd (exec.c:3373)
==9452== 
==9452== 
==9452== 2 errors in context 2 of 2:
==9452== Conditional jump or move depends on uninitialised value(s)
==9452==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9452==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9452==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9452==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9452==    by 0x42D8E9: execcmd (exec.c:3378)
==9452==    by 0x428CA0: execpline2 (exec.c:1697)
==9452==    by 0x427FD2: execpline (exec.c:1484)
==9452==    by 0x42779A: execlist (exec.c:1275)
==9452==    by 0x42717C: execode (exec.c:1073)
==9452==    by 0x431299: runshfunc (exec.c:5040)
==9452==    by 0x430E76: doshfunc (exec.c:4920)
==9452==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9452== 
==9452== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE7F8C,  len 4
==9457== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9457-by-pythonnut-on-???
==9457== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9457-by-pythonnut-on-???
==9457== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9457-by-pythonnut-on-???
==9457== 
==9457== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9457== don't want to do, unless you know exactly what you're doing,
==9457== or are doing some strange experiment):
==9457==   /usr/lib/valgrind/../../bin/vgdb --pid=9457 ...command...
==9457== 
==9457== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9457==   /path/to/gdb ./zsh
==9457== and then give GDB the following command
==9457==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9457
==9457== --pid is optional if only one valgrind process is running
==9457== 
--9457-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9459-by-pythonnut-on-???
==9459== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9459-by-pythonnut-on-???
==9459== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9459-by-pythonnut-on-???
==9459== 
==9459== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9459== don't want to do, unless you know exactly what you're doing,
==9459== or are doing some strange experiment):
==9459==   /usr/lib/valgrind/../../bin/vgdb --pid=9459 ...command...
==9459== 
==9459== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9459==   /path/to/gdb ./zsh
==9459== and then give GDB the following command
==9459==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9459
==9459== --pid is optional if only one valgrind process is running
==9459== 
==9457== 
==9453== Checked 5,077,056 bytes
==9453== 
==9457== HEAP SUMMARY:
==9457==     in use at exit: 3,168,335 bytes in 69,600 blocks
==9457==   total heap usage: 940,523 allocs, 870,923 frees, 68,299,047 bytes allocated
==9457== 
--9459-- Caught __NR_exit; running __libc_freeres()
==9453== LEAK SUMMARY:
==9453==    definitely lost: 1,533 bytes in 8 blocks
==9453==    indirectly lost: 6,756 bytes in 7 blocks
==9453==      possibly lost: 0 bytes in 0 blocks
==9453==    still reachable: 3,158,288 bytes in 69,113 blocks
==9453==         suppressed: 0 bytes in 0 blocks
==9453== Rerun with --leak-check=full to see details of leaked memory
==9453== 
==9453== Use --track-origins=yes to see where uninitialised values come from
==9453== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9453== 
==9453== 1 errors in context 1 of 2:
==9453== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9453==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9453==    by 0x488CD0: stringsubst (subst.c:301)
==9453==    by 0x48801B: prefork (subst.c:77)
==9453==    by 0x42B318: execcmd (exec.c:2619)
==9453==    by 0x428CA0: execpline2 (exec.c:1697)
==9453==    by 0x427FD2: execpline (exec.c:1484)
==9453==    by 0x427756: execlist (exec.c:1267)
==9453==    by 0x42717C: execode (exec.c:1073)
==9453==    by 0x431299: runshfunc (exec.c:5040)
==9453==    by 0x430E76: doshfunc (exec.c:4920)
==9453==    by 0x4302FB: execshfunc (exec.c:4557)
==9453==    by 0x42D8C1: execcmd (exec.c:3373)
==9453== 
==9453== 
==9453== 2 errors in context 2 of 2:
==9453== Conditional jump or move depends on uninitialised value(s)
==9453==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9453==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9453==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9453==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9453==    by 0x42D8E9: execcmd (exec.c:3378)
==9453==    by 0x428CA0: execpline2 (exec.c:1697)
==9453==    by 0x427FD2: execpline (exec.c:1484)
==9453==    by 0x42779A: execlist (exec.c:1275)
==9453==    by 0x42717C: execode (exec.c:1073)
==9453==    by 0x431299: runshfunc (exec.c:5040)
==9453==    by 0x430E76: doshfunc (exec.c:4920)
==9453==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9453== 
==9453== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9457== Searching for pointers to 69,600 not-freed blocks
--9457--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9457--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9457--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9457--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9457--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9457--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9457--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9457--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9457--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9457--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9457--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9457--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9457--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9457--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9457--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9457--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9457--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9457--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9457--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9457--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9457--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9457--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9457--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9457--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9457--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9457--   Scanning root segment: 0x701a000..0x701afff (4096)
--9457--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9457--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9457--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9457--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9457--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9457--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9457--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9457--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9457--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9454== Checked 5,055,704 bytes
==9454== 
--9459-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== 
==9459== HEAP SUMMARY:
==9459==     in use at exit: 3,127,122 bytes in 69,099 blocks
==9459==   total heap usage: 935,965 allocs, 866,866 frees, 66,402,919 bytes allocated
==9459== 
==9454== LEAK SUMMARY:
==9454==    definitely lost: 1,557 bytes in 9 blocks
==9454==    indirectly lost: 6,796 bytes in 9 blocks
==9454==      possibly lost: 0 bytes in 0 blocks
==9454==    still reachable: 3,136,752 bytes in 69,110 blocks
==9454==         suppressed: 0 bytes in 0 blocks
==9454== Rerun with --leak-check=full to see details of leaked memory
==9454== 
==9454== Use --track-origins=yes to see where uninitialised values come from
==9454== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9454== 
==9454== 1 errors in context 1 of 2:
==9454== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9454==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9454==    by 0x488CD0: stringsubst (subst.c:301)
==9454==    by 0x48801B: prefork (subst.c:77)
==9454==    by 0x42B318: execcmd (exec.c:2619)
==9454==    by 0x428CA0: execpline2 (exec.c:1697)
==9454==    by 0x427FD2: execpline (exec.c:1484)
==9454==    by 0x427756: execlist (exec.c:1267)
==9454==    by 0x42717C: execode (exec.c:1073)
==9454==    by 0x431299: runshfunc (exec.c:5040)
==9454==    by 0x430E76: doshfunc (exec.c:4920)
==9454==    by 0x4302FB: execshfunc (exec.c:4557)
==9454==    by 0x42D8C1: execcmd (exec.c:3373)
==9454== 
==9454== 
==9454== 2 errors in context 2 of 2:
==9454== Conditional jump or move depends on uninitialised value(s)
==9454==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9454==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9454==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9454==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9454==    by 0x42D8E9: execcmd (exec.c:3378)
==9454==    by 0x428CA0: execpline2 (exec.c:1697)
==9454==    by 0x427FD2: execpline (exec.c:1484)
==9454==    by 0x42779A: execlist (exec.c:1275)
==9454==    by 0x42717C: execode (exec.c:1073)
==9454==    by 0x431299: runshfunc (exec.c:5040)
==9454==    by 0x430E76: doshfunc (exec.c:4920)
==9454==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9454== 
==9454== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9460== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9460-by-pythonnut-on-???
==9460== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9460-by-pythonnut-on-???
==9460== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9460-by-pythonnut-on-???
==9460== 
==9460== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9460== don't want to do, unless you know exactly what you're doing,
==9460== or are doing some strange experiment):
==9460==   /usr/lib/valgrind/../../bin/vgdb --pid=9460 ...command...
==9460== 
==9460== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9460==   /path/to/gdb ./zsh
==9460== and then give GDB the following command
==9460==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9460
==9460== --pid is optional if only one valgrind process is running
==9460== 
==9459== Searching for pointers to 69,099 not-freed blocks
--9459--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9459--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9459--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9459--   Scanning root segment: 0x4037000..0x403afff (16384)
--9459--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9459--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9459--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9459--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9459--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9459--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9459--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9459--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9459--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9459--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9459--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9459--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9459--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9459--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9459--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9459--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9459--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9459--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9459--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9459--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9459--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9459--   Scanning root segment: 0x701a000..0x701afff (4096)
--9459--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9459--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9459--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9459--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9459--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9459--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9459--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9459--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9459--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEE97C,  len 4
--9435-- Caught __NR_exit; running __libc_freeres()
--9435-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9435== 
==9435== HEAP SUMMARY:
==9435==     in use at exit: 3,122,924 bytes in 69,110 blocks
==9435==   total heap usage: 935,643 allocs, 866,533 frees, 66,672,834 bytes allocated
==9435== 
==9457== Checked 4,890,952 bytes
==9457== 
==9457== LEAK SUMMARY:
==9457==    definitely lost: 1,533 bytes in 8 blocks
==9457==    indirectly lost: 6,756 bytes in 7 blocks
==9457==      possibly lost: 0 bytes in 0 blocks
==9457==    still reachable: 3,160,046 bytes in 69,585 blocks
==9457==         suppressed: 0 bytes in 0 blocks
==9457== Rerun with --leak-check=full to see details of leaked memory
==9457== 
==9457== Use --track-origins=yes to see where uninitialised values come from
==9457== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9457== 
==9457== 1 errors in context 1 of 2:
==9457== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9457==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9435== Searching for pointers to 69,110 not-freed blocks
==9457==    by 0x488CD0: stringsubst (subst.c:301)
--9435--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==9457==    by 0x48801B: prefork (subst.c:77)
==9457==    by 0x42B318: execcmd (exec.c:2619)
==9457==    by 0x428CA0: execpline2 (exec.c:1697)
==9457==    by 0x427FD2: execpline (exec.c:1484)
==9457==    by 0x427756: execlist (exec.c:1267)
==9457==    by 0x42717C: execode (exec.c:1073)
==9457==    by 0x431299: runshfunc (exec.c:5040)
==9457==    by 0x430E76: doshfunc (exec.c:4920)
==9457==    by 0x4302FB: execshfunc (exec.c:4557)
==9457==    by 0x42D8C1: execcmd (exec.c:3373)
==9457== 
==9457== 
==9457== 2 errors in context 2 of 2:
==9457== Conditional jump or move depends on uninitialised value(s)
==9457==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9457==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9457==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9457==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9457==    by 0x42D8E9: execcmd (exec.c:3378)
==9457==    by 0x428CA0: execpline2 (exec.c:1697)
==9457==    by 0x427FD2: execpline (exec.c:1484)
==9457==    by 0x42779A: execlist (exec.c:1275)
==9457==    by 0x42717C: execode (exec.c:1073)
--9435--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9457==    by 0x431299: runshfunc (exec.c:5040)
==9457==    by 0x430E76: doshfunc (exec.c:4920)
==9457==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9457== 
==9457== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9435--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9435--   Scanning root segment: 0x4037000..0x403afff (16384)
--9435--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9435--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9435--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9435--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9435--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9435--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9435--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9435--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9435--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9435--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9435--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9435--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9435--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9435--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9435--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9435--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9435--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9435--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9435--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9435--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9435--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9435--   Scanning root segment: 0x701a000..0x701afff (4096)
--9435--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9435--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9435--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9435--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9435--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9435--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9435--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9435--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9435--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9456-- Caught __NR_exit; running __libc_freeres()
==9456== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9456-by-pythonnut-on-???
==9456== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9456-by-pythonnut-on-???
==9456== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9456-by-pythonnut-on-???
==9456== 
==9456== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9456== don't want to do, unless you know exactly what you're doing,
==9456== or are doing some strange experiment):
==9456==   /usr/lib/valgrind/../../bin/vgdb --pid=9456 ...command...
==9456== 
==9456== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9456==   /path/to/gdb ./zsh
==9456== and then give GDB the following command
==9456==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9456
==9456== --pid is optional if only one valgrind process is running
==9456== 
==9459== Checked 4,810,368 bytes
==9459== 
--9456-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9459== LEAK SUMMARY:
==9459==    definitely lost: 1,533 bytes in 8 blocks
==9459==    indirectly lost: 6,756 bytes in 7 blocks
==9459==      possibly lost: 0 bytes in 0 blocks
==9459==    still reachable: 3,118,833 bytes in 69,084 blocks
==9459==         suppressed: 0 bytes in 0 blocks
==9459== Rerun with --leak-check=full to see details of leaked memory
==9459== 
==9459== Use --track-origins=yes to see where uninitialised values come from
==9459== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9459== 
==9459== 1 errors in context 1 of 2:
==9459== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9459==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9459==    by 0x488CD0: stringsubst (subst.c:301)
==9459==    by 0x48801B: prefork (subst.c:77)
==9459==    by 0x42B318: execcmd (exec.c:2619)
==9459==    by 0x428CA0: execpline2 (exec.c:1697)
==9459==    by 0x427FD2: execpline (exec.c:1484)
==9459==    by 0x427756: execlist (exec.c:1267)
==9459==    by 0x42717C: execode (exec.c:1073)
==9459==    by 0x431299: runshfunc (exec.c:5040)
==9459==    by 0x430E76: doshfunc (exec.c:4920)
==9459==    by 0x4302FB: execshfunc (exec.c:4557)
==9459==    by 0x42D8C1: execcmd (exec.c:3373)
==9459== 
==9459== 
==9459== 2 errors in context 2 of 2:
==9459== Conditional jump or move depends on uninitialised value(s)
==9459==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9459==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9459==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9459==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9459==    by 0x42D8E9: execcmd (exec.c:3378)
==9459==    by 0x428CA0: execpline2 (exec.c:1697)
==9459==    by 0x427FD2: execpline (exec.c:1484)
==9459==    by 0x42779A: execlist (exec.c:1275)
==9459==    by 0x42717C: execode (exec.c:1073)
==9459==    by 0x431299: runshfunc (exec.c:5040)
==9459==    by 0x430E76: doshfunc (exec.c:4920)
==9459==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9459== 
==9459== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9456== 
==9456== HEAP SUMMARY:
==9456==     in use at exit: 3,168,271 bytes in 69,597 blocks
==9456==   total heap usage: 940,525 allocs, 870,928 frees, 68,299,591 bytes allocated
==9456== 
==9456== Searching for pointers to 69,597 not-freed blocks
--9456--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9456--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9456--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9456--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9456--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9456--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9456--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9456--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9456--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9456--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9456--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9456--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9456--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9456--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9456--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9456--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9456--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9456--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9456--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9456--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9456--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9456--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9456--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9456--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9456--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9456--   Scanning root segment: 0x701a000..0x701afff (4096)
--9456--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9456--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9456--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9456--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9456--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9456--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9456--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9456--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9456--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9435== Checked 4,785,696 bytes
==9435== 
==9435== LEAK SUMMARY:
==9435==    definitely lost: 1,533 bytes in 8 blocks
==9435==    indirectly lost: 6,756 bytes in 7 blocks
==9435==      possibly lost: 0 bytes in 0 blocks
==9435==    still reachable: 3,114,635 bytes in 69,095 blocks
==9435==         suppressed: 0 bytes in 0 blocks
==9435== Rerun with --leak-check=full to see details of leaked memory
==9435== 
==9435== Use --track-origins=yes to see where uninitialised values come from
==9435== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9435== 
==9435== 1 errors in context 1 of 2:
==9435== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9435==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9435==    by 0x488CD0: stringsubst (subst.c:301)
==9435==    by 0x48801B: prefork (subst.c:77)
==9435==    by 0x42B318: execcmd (exec.c:2619)
==9435==    by 0x428CA0: execpline2 (exec.c:1697)
==9435==    by 0x427FD2: execpline (exec.c:1484)
==9435==    by 0x427756: execlist (exec.c:1267)
==9435==    by 0x42717C: execode (exec.c:1073)
==9435==    by 0x431299: runshfunc (exec.c:5040)
==9435==    by 0x430E76: doshfunc (exec.c:4920)
==9435==    by 0x4302FB: execshfunc (exec.c:4557)
==9435==    by 0x42D8C1: execcmd (exec.c:3373)
==9435== 
==9435== 
==9435== 2 errors in context 2 of 2:
==9435== Conditional jump or move depends on uninitialised value(s)
==9435==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9435==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9435==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9435==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9435==    by 0x42D8E9: execcmd (exec.c:3378)
==9435==    by 0x428CA0: execpline2 (exec.c:1697)
==9435==    by 0x427FD2: execpline (exec.c:1484)
==9435==    by 0x42779A: execlist (exec.c:1275)
==9435==    by 0x42717C: execode (exec.c:1073)
==9435==    by 0x431299: runshfunc (exec.c:5040)
==9435==    by 0x430E76: doshfunc (exec.c:4920)
==9435==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9435== 
==9435== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9463-by-pythonnut-on-???
==9463== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9463-by-pythonnut-on-???
==9463== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9463-by-pythonnut-on-???
==9463== 
==9463== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9463== don't want to do, unless you know exactly what you're doing,
==9463== or are doing some strange experiment):
==9463==   /usr/lib/valgrind/../../bin/vgdb --pid=9463 ...command...
==9463== 
==9463== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9463==   /path/to/gdb ./zsh
==9463== and then give GDB the following command
==9463==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9463
==9463== --pid is optional if only one valgrind process is running
==9463== 
--9463-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEF77C,  len 4
==9456== Checked 4,890,264 bytes
==9456== 
--9463-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9456== LEAK SUMMARY:
==9456==    definitely lost: 1,533 bytes in 8 blocks
==9456==    indirectly lost: 6,756 bytes in 7 blocks
==9456==      possibly lost: 0 bytes in 0 blocks
==9456==    still reachable: 3,159,982 bytes in 69,582 blocks
==9456==         suppressed: 0 bytes in 0 blocks
==9456== Rerun with --leak-check=full to see details of leaked memory
==9456== 
==9456== Use --track-origins=yes to see where uninitialised values come from
==9456== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9456== 
==9456== 1 errors in context 1 of 2:
==9456== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9456==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9456==    by 0x488CD0: stringsubst (subst.c:301)
==9456==    by 0x48801B: prefork (subst.c:77)
==9456==    by 0x42B318: execcmd (exec.c:2619)
==9456==    by 0x428CA0: execpline2 (exec.c:1697)
==9456==    by 0x427FD2: execpline (exec.c:1484)
==9456==    by 0x427756: execlist (exec.c:1267)
==9456==    by 0x42717C: execode (exec.c:1073)
==9456==    by 0x431299: runshfunc (exec.c:5040)
==9456==    by 0x430E76: doshfunc (exec.c:4920)
==9456==    by 0x4302FB: execshfunc (exec.c:4557)
==9456==    by 0x42D8C1: execcmd (exec.c:3373)
==9456== 
==9456== 
==9456== 2 errors in context 2 of 2:
==9456== Conditional jump or move depends on uninitialised value(s)
==9456==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9456==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9456==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9456==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9456==    by 0x42D8E9: execcmd (exec.c:3378)
==9456==    by 0x428CA0: execpline2 (exec.c:1697)
==9456==    by 0x427FD2: execpline (exec.c:1484)
==9456==    by 0x42779A: execlist (exec.c:1275)
==9456==    by 0x42717C: execode (exec.c:1073)
==9456==    by 0x431299: runshfunc (exec.c:5040)
==9456==    by 0x430E76: doshfunc (exec.c:4920)
==9456==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9456== 
==9456== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== 
==9463== HEAP SUMMARY:
==9463==     in use at exit: 3,160,434 bytes in 69,111 blocks
==9463==   total heap usage: 935,607 allocs, 866,496 frees, 66,623,672 bytes allocated
==9463== 
==9465== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9465-by-pythonnut-on-???
==9465== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9465-by-pythonnut-on-???
==9465== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9465-by-pythonnut-on-???
==9465== 
==9465== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9465== don't want to do, unless you know exactly what you're doing,
==9465== or are doing some strange experiment):
==9465==   /usr/lib/valgrind/../../bin/vgdb --pid=9465 ...command...
==9465== 
==9465== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9465==   /path/to/gdb ./zsh
==9465== and then give GDB the following command
==9465==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9465
==9465== --pid is optional if only one valgrind process is running
==9465== 
--9466-- Caught __NR_exit; running __libc_freeres()
==9463== Searching for pointers to 69,111 not-freed blocks
--9463--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9463--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9463--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9463--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9463--   Scanning root segment: 0x41d6000..0x41edfff (98304)
--9463--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9463--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9463--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9463--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9463--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9463--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9463--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9463--   Scanning root segment: 0x54ac000..0x54acfff (4096)
client request: code 4d430005,  addr 0xFFEFE77CC,  len 4
--9463--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9463--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9463--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9463--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9463--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9463--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9463--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9463--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9463--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9463--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9463--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9463--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9463--   Scanning root segment: 0x701a000..0x701afff (4096)
--9463--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9463--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9463--   Scanning root segment: 0xae51000..0xae52fff (8192)
==9466== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9466-by-pythonnut-on-???
==9466== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9466-by-pythonnut-on-???
==9466== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9466-by-pythonnut-on-???
==9466== 
==9466== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9466== don't want to do, unless you know exactly what you're doing,
==9466== or are doing some strange experiment):
==9466==   /usr/lib/valgrind/../../bin/vgdb --pid=9466 ...command...
==9466== 
==9466== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9466==   /path/to/gdb ./zsh
==9466== and then give GDB the following command
==9466==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9466
==9466== --pid is optional if only one valgrind process is running
==9466== 
--9463--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9463--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9463--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9463--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9463--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9463--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9466-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9466== 
==9466== HEAP SUMMARY:
==9466==     in use at exit: 3,168,432 bytes in 69,603 blocks
==9466==   total heap usage: 940,530 allocs, 870,927 frees, 68,301,256 bytes allocated
==9466== 
==9466== Searching for pointers to 69,603 not-freed blocks
--9466--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9466--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9466--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9466--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9466--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9466--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9466--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9466--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9466--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9466--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9466--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9466--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9466--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9466--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9466--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9466--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9466--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9466--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9466--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9466--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9466--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9466--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9466--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9466--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9466--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9466--   Scanning root segment: 0x701a000..0x701afff (4096)
--9466--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9466--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9466--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9466--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9466--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9466--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9466--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9466--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9466--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9463== Checked 4,979,568 bytes
==9463== 
==9463== LEAK SUMMARY:
==9463==    definitely lost: 1,533 bytes in 8 blocks
==9463==    indirectly lost: 6,756 bytes in 7 blocks
==9463==      possibly lost: 0 bytes in 0 blocks
==9463==    still reachable: 3,152,145 bytes in 69,096 blocks
==9463==         suppressed: 0 bytes in 0 blocks
==9463== Rerun with --leak-check=full to see details of leaked memory
==9463== 
==9463== Use --track-origins=yes to see where uninitialised values come from
==9463== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9463== 
==9463== 1 errors in context 1 of 2:
==9463== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9463==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9463==    by 0x488CD0: stringsubst (subst.c:301)
==9463==    by 0x48801B: prefork (subst.c:77)
==9463==    by 0x42B318: execcmd (exec.c:2619)
==9463==    by 0x428CA0: execpline2 (exec.c:1697)
==9463==    by 0x427FD2: execpline (exec.c:1484)
==9463==    by 0x427756: execlist (exec.c:1267)
==9463==    by 0x42717C: execode (exec.c:1073)
==9463==    by 0x431299: runshfunc (exec.c:5040)
==9463==    by 0x430E76: doshfunc (exec.c:4920)
==9463==    by 0x4302FB: execshfunc (exec.c:4557)
==9463==    by 0x42D8C1: execcmd (exec.c:3373)
==9463== 
==9463== 
==9463== 2 errors in context 2 of 2:
==9463== Conditional jump or move depends on uninitialised value(s)
==9463==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9463==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9463==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9463==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9463==    by 0x42D8E9: execcmd (exec.c:3378)
==9463==    by 0x428CA0: execpline2 (exec.c:1697)
==9463==    by 0x427FD2: execpline (exec.c:1484)
==9463==    by 0x42779A: execlist (exec.c:1275)
==9463==    by 0x42717C: execode (exec.c:1073)
==9463==    by 0x431299: runshfunc (exec.c:5040)
==9463==    by 0x430E76: doshfunc (exec.c:4920)
==9463==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9463== 
==9463== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9434-- Caught __NR_exit; running __libc_freeres()
--9434-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9466== Checked 4,891,552 bytes
==9466== 
==9434== 
==9434== HEAP SUMMARY:
==9434==     in use at exit: 3,121,665 bytes in 69,077 blocks
==9434==   total heap usage: 935,610 allocs, 866,533 frees, 66,624,248 bytes allocated
==9434== 
==9466== LEAK SUMMARY:
==9466==    definitely lost: 1,533 bytes in 8 blocks
==9466==    indirectly lost: 6,756 bytes in 7 blocks
==9466==      possibly lost: 0 bytes in 0 blocks
==9466==    still reachable: 3,160,143 bytes in 69,588 blocks
==9466==         suppressed: 0 bytes in 0 blocks
==9466== Rerun with --leak-check=full to see details of leaked memory
==9466== 
==9466== Use --track-origins=yes to see where uninitialised values come from
==9466== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9466== 
==9466== 1 errors in context 1 of 2:
==9466== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9466==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9466==    by 0x488CD0: stringsubst (subst.c:301)
==9466==    by 0x48801B: prefork (subst.c:77)
==9466==    by 0x42B318: execcmd (exec.c:2619)
==9466==    by 0x428CA0: execpline2 (exec.c:1697)
==9466==    by 0x427FD2: execpline (exec.c:1484)
==9466==    by 0x427756: execlist (exec.c:1267)
==9466==    by 0x42717C: execode (exec.c:1073)
==9466==    by 0x431299: runshfunc (exec.c:5040)
==9466==    by 0x430E76: doshfunc (exec.c:4920)
==9466==    by 0x4302FB: execshfunc (exec.c:4557)
==9466==    by 0x42D8C1: execcmd (exec.c:3373)
==9466== 
==9466== 
==9466== 2 errors in context 2 of 2:
==9466== Conditional jump or move depends on uninitialised value(s)
==9466==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9466==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9466==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9466==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9466==    by 0x42D8E9: execcmd (exec.c:3378)
==9466==    by 0x428CA0: execpline2 (exec.c:1697)
==9466==    by 0x427FD2: execpline (exec.c:1484)
==9466==    by 0x42779A: execlist (exec.c:1275)
==9466==    by 0x42717C: execode (exec.c:1073)
==9466==    by 0x431299: runshfunc (exec.c:5040)
==9466==    by 0x430E76: doshfunc (exec.c:4920)
==9466==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9466== 
==9466== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9465-- Caught __NR_exit; running __libc_freeres()
==9434== Searching for pointers to 69,077 not-freed blocks
--9434--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9434--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9434--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9434--   Scanning root segment: 0x4037000..0x403afff (16384)
--9434--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9434--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9434--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9434--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9434--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9434--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9434--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9434--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9434--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9434--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9434--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9434--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9434--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9434--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9434--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9434--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9434--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9434--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9434--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9434--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9434--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9434--   Scanning root segment: 0x701a000..0x701afff (4096)
--9434--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9434--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9434--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9434--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9434--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9434--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9434--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9434--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9434--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9465-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9465== 
==9465== HEAP SUMMARY:
==9465==     in use at exit: 3,168,368 bytes in 69,600 blocks
==9465==   total heap usage: 940,532 allocs, 870,932 frees, 68,301,800 bytes allocated
==9465== 
==9465== Searching for pointers to 69,600 not-freed blocks
--9465--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9465--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9465--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9465--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9465--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9465--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9465--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9465--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9465--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9465--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9465--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9465--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9465--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9465--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9465--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9465--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9465--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9465--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9465--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9465--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9465--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9465--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9465--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9465--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9465--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9465--   Scanning root segment: 0x701a000..0x701afff (4096)
--9465--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9465--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9465--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9465--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9465--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9465--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9465--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9465--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9465--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9434== Checked 4,803,984 bytes
==9434== 
==9434== LEAK SUMMARY:
==9434==    definitely lost: 1,533 bytes in 8 blocks
==9434==    indirectly lost: 6,756 bytes in 7 blocks
==9434==      possibly lost: 0 bytes in 0 blocks
==9434==    still reachable: 3,113,376 bytes in 69,062 blocks
==9434==         suppressed: 0 bytes in 0 blocks
==9434== Rerun with --leak-check=full to see details of leaked memory
==9434== 
==9434== Use --track-origins=yes to see where uninitialised values come from
==9434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9434== 
==9434== 1 errors in context 1 of 2:
==9434== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9434==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9434==    by 0x488CD0: stringsubst (subst.c:301)
==9434==    by 0x48801B: prefork (subst.c:77)
==9434==    by 0x42B318: execcmd (exec.c:2619)
==9434==    by 0x428CA0: execpline2 (exec.c:1697)
==9434==    by 0x427FD2: execpline (exec.c:1484)
==9434==    by 0x427756: execlist (exec.c:1267)
==9434==    by 0x42717C: execode (exec.c:1073)
==9434==    by 0x431299: runshfunc (exec.c:5040)
==9434==    by 0x430E76: doshfunc (exec.c:4920)
==9434==    by 0x4302FB: execshfunc (exec.c:4557)
==9434==    by 0x42D8C1: execcmd (exec.c:3373)
==9434== 
==9434== 
==9434== 2 errors in context 2 of 2:
==9434== Conditional jump or move depends on uninitialised value(s)
==9434==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9434==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9434==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9434==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9434==    by 0x42D8E9: execcmd (exec.c:3378)
==9434==    by 0x428CA0: execpline2 (exec.c:1697)
==9434==    by 0x427FD2: execpline (exec.c:1484)
==9434==    by 0x42779A: execlist (exec.c:1275)
==9434==    by 0x42717C: execode (exec.c:1073)
==9434==    by 0x431299: runshfunc (exec.c:5040)
==9434==    by 0x430E76: doshfunc (exec.c:4920)
==9434==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9434== 
==9434== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9465== Checked 4,890,872 bytes
==9465== 
==9465== LEAK SUMMARY:
==9465==    definitely lost: 1,533 bytes in 8 blocks
==9465==    indirectly lost: 6,756 bytes in 7 blocks
==9465==      possibly lost: 0 bytes in 0 blocks
==9465==    still reachable: 3,160,079 bytes in 69,585 blocks
==9465==         suppressed: 0 bytes in 0 blocks
==9465== Rerun with --leak-check=full to see details of leaked memory
==9465== 
==9465== Use --track-origins=yes to see where uninitialised values come from
==9465== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9465== 
==9465== 1 errors in context 1 of 2:
==9465== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9465==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9465==    by 0x488CD0: stringsubst (subst.c:301)
==9465==    by 0x48801B: prefork (subst.c:77)
==9465==    by 0x42B318: execcmd (exec.c:2619)
==9465==    by 0x428CA0: execpline2 (exec.c:1697)
==9465==    by 0x427FD2: execpline (exec.c:1484)
==9465==    by 0x427756: execlist (exec.c:1267)
==9465==    by 0x42717C: execode (exec.c:1073)
==9465==    by 0x431299: runshfunc (exec.c:5040)
==9465==    by 0x430E76: doshfunc (exec.c:4920)
==9465==    by 0x4302FB: execshfunc (exec.c:4557)
==9465==    by 0x42D8C1: execcmd (exec.c:3373)
==9465== 
==9465== 
==9465== 2 errors in context 2 of 2:
==9465== Conditional jump or move depends on uninitialised value(s)
==9465==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9465==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9465==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9465==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9465==    by 0x42D8E9: execcmd (exec.c:3378)
==9465==    by 0x428CA0: execpline2 (exec.c:1697)
==9465==    by 0x427FD2: execpline (exec.c:1484)
==9465==    by 0x42779A: execlist (exec.c:1275)
==9465==    by 0x42717C: execode (exec.c:1073)
==9465==    by 0x431299: runshfunc (exec.c:5040)
==9465==    by 0x430E76: doshfunc (exec.c:4920)
==9465==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9465== 
==9465== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF757C,  len 4
client request: code 4d430005,  addr 0xFFEFF642C,  len 4
client request: code 4d430005,  addr 0xFFEFF933C,  len 4
--9407-- Caught __NR_exit; running __libc_freeres()
--9407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9407== 
==9407== HEAP SUMMARY:
==9407==     in use at exit: 3,146,689 bytes in 69,118 blocks
==9407==   total heap usage: 940,623 allocs, 871,505 frees, 68,318,571 bytes allocated
==9407== 
==9407== Searching for pointers to 69,118 not-freed blocks
--9407--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9407--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9407--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9407--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9407--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9407--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9407--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9407--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9407--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9407--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9407--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9407--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9407--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9407--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9407--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9407--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9407--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9407--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9407--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9407--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9407--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9407--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9407--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9407--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9407--   Scanning root segment: 0x701a000..0x701afff (4096)
--9407--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9407--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9407--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9407--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9407--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9407--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9407--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9407--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9407--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9407== Checked 4,793,040 bytes
==9407== 
==9407== LEAK SUMMARY:
==9407==    definitely lost: 1,533 bytes in 8 blocks
==9407==    indirectly lost: 6,756 bytes in 7 blocks
==9407==      possibly lost: 0 bytes in 0 blocks
==9407==    still reachable: 3,138,400 bytes in 69,103 blocks
==9407==         suppressed: 0 bytes in 0 blocks
==9407== Rerun with --leak-check=full to see details of leaked memory
==9407== 
==9407== Use --track-origins=yes to see where uninitialised values come from
==9407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9407== 
==9407== 1 errors in context 1 of 2:
==9407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9407==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9407==    by 0x488CD0: stringsubst (subst.c:301)
==9407==    by 0x48801B: prefork (subst.c:77)
==9407==    by 0x42B318: execcmd (exec.c:2619)
==9407==    by 0x428CA0: execpline2 (exec.c:1697)
==9407==    by 0x427FD2: execpline (exec.c:1484)
==9407==    by 0x427756: execlist (exec.c:1267)
==9407==    by 0x42717C: execode (exec.c:1073)
==9407==    by 0x431299: runshfunc (exec.c:5040)
==9407==    by 0x430E76: doshfunc (exec.c:4920)
==9407==    by 0x4302FB: execshfunc (exec.c:4557)
==9407==    by 0x42D8C1: execcmd (exec.c:3373)
==9407== 
==9407== 
==9407== 2 errors in context 2 of 2:
==9407== Conditional jump or move depends on uninitialised value(s)
==9407==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9407==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9407==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9407==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9407==    by 0x42D8E9: execcmd (exec.c:3378)
==9407==    by 0x428CA0: execpline2 (exec.c:1697)
==9407==    by 0x427FD2: execpline (exec.c:1484)
==9407==    by 0x42779A: execlist (exec.c:1275)
==9407==    by 0x42717C: execode (exec.c:1073)
==9407==    by 0x431299: runshfunc (exec.c:5040)
==9407==    by 0x430E76: doshfunc (exec.c:4920)
==9407==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9407== 
==9407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9400-- Caught __NR_exit; running __libc_freeres()
--9400-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9400== 
==9400== HEAP SUMMARY:
==9400==     in use at exit: 3,116,601 bytes in 68,889 blocks
==9400==   total heap usage: 935,507 allocs, 866,618 frees, 66,585,332 bytes allocated
==9400== 
==9400== Searching for pointers to 68,889 not-freed blocks
--9400--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9400--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9400--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9400--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9400--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9400--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9400--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9400--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9400--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9400--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9400--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9400--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9400--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9400--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9400--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9400--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9400--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9400--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9400--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9400--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9400--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9400--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9400--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9400--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9400--   Scanning root segment: 0x701a000..0x701afff (4096)
--9400--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9400--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9400--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9400--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9400--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9400--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9400--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9400--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9400--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9400== Checked 4,761,832 bytes
==9400== 
==9400== LEAK SUMMARY:
==9400==    definitely lost: 1,533 bytes in 8 blocks
==9400==    indirectly lost: 6,756 bytes in 7 blocks
==9400==      possibly lost: 0 bytes in 0 blocks
==9400==    still reachable: 3,108,312 bytes in 68,874 blocks
==9400==         suppressed: 0 bytes in 0 blocks
==9400== Rerun with --leak-check=full to see details of leaked memory
==9400== 
==9400== Use --track-origins=yes to see where uninitialised values come from
==9400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9400== 
==9400== 1 errors in context 1 of 2:
==9400== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9400==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9400==    by 0x488CD0: stringsubst (subst.c:301)
==9400==    by 0x48801B: prefork (subst.c:77)
==9400==    by 0x42B318: execcmd (exec.c:2619)
==9400==    by 0x428CA0: execpline2 (exec.c:1697)
==9400==    by 0x427FD2: execpline (exec.c:1484)
==9400==    by 0x427756: execlist (exec.c:1267)
==9400==    by 0x42717C: execode (exec.c:1073)
==9400==    by 0x431299: runshfunc (exec.c:5040)
==9400==    by 0x430E76: doshfunc (exec.c:4920)
==9400==    by 0x4302FB: execshfunc (exec.c:4557)
==9400==    by 0x42D8C1: execcmd (exec.c:3373)
==9400== 
==9400== 
==9400== 2 errors in context 2 of 2:
==9400== Conditional jump or move depends on uninitialised value(s)
==9400==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9400==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9400==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9400==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9400==    by 0x42D8E9: execcmd (exec.c:3378)
==9400==    by 0x428CA0: execpline2 (exec.c:1697)
==9400==    by 0x427FD2: execpline (exec.c:1484)
==9400==    by 0x42779A: execlist (exec.c:1275)
==9400==    by 0x42717C: execode (exec.c:1073)
==9400==    by 0x431299: runshfunc (exec.c:5040)
==9400==    by 0x430E76: doshfunc (exec.c:4920)
==9400==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9400== 
==9400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9469-- Caught __NR_exit; running __libc_freeres()
==9469== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9469-by-pythonnut-on-???
==9469== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9469-by-pythonnut-on-???
==9469== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9469-by-pythonnut-on-???
==9469== 
==9469== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9469== don't want to do, unless you know exactly what you're doing,
==9469== or are doing some strange experiment):
==9469==   /usr/lib/valgrind/../../bin/vgdb --pid=9469 ...command...
==9469== 
==9469== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9469==   /path/to/gdb ./zsh
==9469== and then give GDB the following command
==9469==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9469
==9469== --pid is optional if only one valgrind process is running
==9469== 
==9470== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9470-by-pythonnut-on-???
==9470== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9470-by-pythonnut-on-???
==9470== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9470-by-pythonnut-on-???
==9470== 
==9470== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9470== don't want to do, unless you know exactly what you're doing,
==9470== or are doing some strange experiment):
==9470==   /usr/lib/valgrind/../../bin/vgdb --pid=9470 ...command...
==9470== 
==9470== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9470==   /path/to/gdb ./zsh
==9470== and then give GDB the following command
==9470==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9470
==9470== --pid is optional if only one valgrind process is running
==9470== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9469-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9469== 
==9469== HEAP SUMMARY:
==9469==     in use at exit: 3,118,245 bytes in 68,941 blocks
==9469==   total heap usage: 935,566 allocs, 866,625 frees, 66,590,100 bytes allocated
==9469== 
==9469== Searching for pointers to 68,941 not-freed blocks
--9469--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9469--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9469--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9469--   Scanning root segment: 0x4037000..0x403afff (16384)
--9469--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9469--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9469--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9469--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9469--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9469--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9469--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9469--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9469--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9469--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9469--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9469--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9469--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9469--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9469--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9469--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9469--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9469--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9469--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9469--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9469--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9469--   Scanning root segment: 0x701a000..0x701afff (4096)
--9469--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9469--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9469--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9469--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9469--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9469--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9469--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9469--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9469--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9469== Checked 4,780,400 bytes
==9469== 
==9469== LEAK SUMMARY:
==9469==    definitely lost: 1,533 bytes in 8 blocks
==9469==    indirectly lost: 6,756 bytes in 7 blocks
==9469==      possibly lost: 0 bytes in 0 blocks
==9469==    still reachable: 3,109,956 bytes in 68,926 blocks
==9469==         suppressed: 0 bytes in 0 blocks
==9469== Rerun with --leak-check=full to see details of leaked memory
==9469== 
==9469== Use --track-origins=yes to see where uninitialised values come from
==9469== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9469== 
==9469== 1 errors in context 1 of 2:
==9469== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9469==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9469==    by 0x488CD0: stringsubst (subst.c:301)
==9469==    by 0x48801B: prefork (subst.c:77)
==9469==    by 0x42B318: execcmd (exec.c:2619)
==9469==    by 0x428CA0: execpline2 (exec.c:1697)
==9469==    by 0x427FD2: execpline (exec.c:1484)
==9469==    by 0x427756: execlist (exec.c:1267)
==9469==    by 0x42717C: execode (exec.c:1073)
==9469==    by 0x431299: runshfunc (exec.c:5040)
==9469==    by 0x430E76: doshfunc (exec.c:4920)
==9469==    by 0x4302FB: execshfunc (exec.c:4557)
==9469==    by 0x42D8C1: execcmd (exec.c:3373)
==9469== 
==9469== 
==9469== 2 errors in context 2 of 2:
==9469== Conditional jump or move depends on uninitialised value(s)
==9469==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9469==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9469==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9469==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9469==    by 0x42D8E9: execcmd (exec.c:3378)
==9469==    by 0x428CA0: execpline2 (exec.c:1697)
==9469==    by 0x427FD2: execpline (exec.c:1484)
==9469==    by 0x42779A: execlist (exec.c:1275)
==9469==    by 0x42717C: execode (exec.c:1073)
==9469==    by 0x431299: runshfunc (exec.c:5040)
==9469==    by 0x430E76: doshfunc (exec.c:4920)
==9469==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9469== 
==9469== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9468== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9468-by-pythonnut-on-???
==9468== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9468-by-pythonnut-on-???
==9468== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9468-by-pythonnut-on-???
==9468== 
==9468== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9468== don't want to do, unless you know exactly what you're doing,
==9468== or are doing some strange experiment):
==9468==   /usr/lib/valgrind/../../bin/vgdb --pid=9468 ...command...
==9468== 
==9468== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9468==   /path/to/gdb ./zsh
==9468== and then give GDB the following command
==9468==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9468
==9468== --pid is optional if only one valgrind process is running
==9468== 
--9468-- Caught __NR_exit; running __libc_freeres()
--9468-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9468== 
==9468== HEAP SUMMARY:
==9468==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9468==   total heap usage: 935,568 allocs, 866,630 frees, 66,590,644 bytes allocated
==9468== 
==9468== Searching for pointers to 68,938 not-freed blocks
--9468--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9468--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9468--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9468--   Scanning root segment: 0x4037000..0x403afff (16384)
--9468--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9468--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9468--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9468--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9468--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9468--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9468--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9468--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9468--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9468--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9468--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9468--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9468--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9468--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9468--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9468--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9468--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9468--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9468--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9468--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9468--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9468--   Scanning root segment: 0x701a000..0x701afff (4096)
--9468--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9468--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9468--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9468--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9468--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9468--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9468--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9468--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9468--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9468== Checked 4,779,712 bytes
==9468== 
==9468== LEAK SUMMARY:
==9468==    definitely lost: 1,533 bytes in 8 blocks
==9468==    indirectly lost: 6,756 bytes in 7 blocks
==9468==      possibly lost: 0 bytes in 0 blocks
==9468==    still reachable: 3,109,892 bytes in 68,923 blocks
==9468==         suppressed: 0 bytes in 0 blocks
==9468== Rerun with --leak-check=full to see details of leaked memory
==9468== 
==9468== Use --track-origins=yes to see where uninitialised values come from
==9468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9468== 
==9468== 1 errors in context 1 of 2:
==9468== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9468==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9468==    by 0x488CD0: stringsubst (subst.c:301)
==9468==    by 0x48801B: prefork (subst.c:77)
==9468==    by 0x42B318: execcmd (exec.c:2619)
==9468==    by 0x428CA0: execpline2 (exec.c:1697)
==9468==    by 0x427FD2: execpline (exec.c:1484)
==9468==    by 0x427756: execlist (exec.c:1267)
==9468==    by 0x42717C: execode (exec.c:1073)
==9468==    by 0x431299: runshfunc (exec.c:5040)
==9468==    by 0x430E76: doshfunc (exec.c:4920)
==9468==    by 0x4302FB: execshfunc (exec.c:4557)
==9468==    by 0x42D8C1: execcmd (exec.c:3373)
==9468== 
==9468== 
==9468== 2 errors in context 2 of 2:
==9468== Conditional jump or move depends on uninitialised value(s)
==9468==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9468==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9468==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9468==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9468==    by 0x42D8E9: execcmd (exec.c:3378)
==9468==    by 0x428CA0: execpline2 (exec.c:1697)
==9468==    by 0x427FD2: execpline (exec.c:1484)
==9468==    by 0x42779A: execlist (exec.c:1275)
==9468==    by 0x42717C: execode (exec.c:1073)
==9468==    by 0x431299: runshfunc (exec.c:5040)
==9468==    by 0x430E76: doshfunc (exec.c:4920)
==9468==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9468== 
==9468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9473== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9473-by-pythonnut-on-???
==9473== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9473-by-pythonnut-on-???
==9473== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9473-by-pythonnut-on-???
==9473== 
==9473== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9473== don't want to do, unless you know exactly what you're doing,
==9473== or are doing some strange experiment):
==9473==   /usr/lib/valgrind/../../bin/vgdb --pid=9473 ...command...
==9473== 
==9473== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9473==   /path/to/gdb ./zsh
==9473== and then give GDB the following command
==9473==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9473
==9473== --pid is optional if only one valgrind process is running
==9473== 
--9473-- Caught __NR_exit; running __libc_freeres()
--9473-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9473== 
==9473== HEAP SUMMARY:
==9473==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9473==   total heap usage: 935,583 allocs, 866,645 frees, 66,595,628 bytes allocated
==9473== 
==9473== Searching for pointers to 68,938 not-freed blocks
--9473--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9473--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9473--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9473--   Scanning root segment: 0x4037000..0x403afff (16384)
--9473--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9473--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9473--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9473--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9473--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9473--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9473--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9473--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9473--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9473--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9473--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9473--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9473--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9473--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9473--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9473--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9473--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9473--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9473--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9473--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9473--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9473--   Scanning root segment: 0x701a000..0x701afff (4096)
--9473--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9473--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9473--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9473--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9473--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9473--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9473--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9473--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9473--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9473== Checked 4,779,712 bytes
==9473== 
==9473== LEAK SUMMARY:
==9473==    definitely lost: 1,533 bytes in 8 blocks
==9473==    indirectly lost: 6,756 bytes in 7 blocks
==9473==      possibly lost: 0 bytes in 0 blocks
==9473==    still reachable: 3,109,892 bytes in 68,923 blocks
==9473==         suppressed: 0 bytes in 0 blocks
==9473== Rerun with --leak-check=full to see details of leaked memory
==9473== 
==9473== Use --track-origins=yes to see where uninitialised values come from
==9473== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9473== 
==9473== 1 errors in context 1 of 2:
==9473== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9473==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9473==    by 0x488CD0: stringsubst (subst.c:301)
==9473==    by 0x48801B: prefork (subst.c:77)
==9473==    by 0x42B318: execcmd (exec.c:2619)
==9473==    by 0x428CA0: execpline2 (exec.c:1697)
==9473==    by 0x427FD2: execpline (exec.c:1484)
==9473==    by 0x427756: execlist (exec.c:1267)
==9473==    by 0x42717C: execode (exec.c:1073)
==9473==    by 0x431299: runshfunc (exec.c:5040)
==9473==    by 0x430E76: doshfunc (exec.c:4920)
==9473==    by 0x4302FB: execshfunc (exec.c:4557)
==9473==    by 0x42D8C1: execcmd (exec.c:3373)
==9473== 
==9473== 
==9473== 2 errors in context 2 of 2:
==9473== Conditional jump or move depends on uninitialised value(s)
==9473==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9473==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9473==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9473==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9473==    by 0x42D8E9: execcmd (exec.c:3378)
==9473==    by 0x428CA0: execpline2 (exec.c:1697)
==9473==    by 0x427FD2: execpline (exec.c:1484)
==9473==    by 0x42779A: execlist (exec.c:1275)
==9473==    by 0x42717C: execode (exec.c:1073)
==9473==    by 0x431299: runshfunc (exec.c:5040)
==9473==    by 0x430E76: doshfunc (exec.c:4920)
==9473==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9473== 
==9473== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9474== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9474-by-pythonnut-on-???
==9474== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9474-by-pythonnut-on-???
==9474== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9474-by-pythonnut-on-???
==9474== 
==9474== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9474== don't want to do, unless you know exactly what you're doing,
==9474== or are doing some strange experiment):
==9474==   /usr/lib/valgrind/../../bin/vgdb --pid=9474 ...command...
==9474== 
==9474== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9474==   /path/to/gdb ./zsh
==9474== and then give GDB the following command
==9474==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9474
==9474== --pid is optional if only one valgrind process is running
==9474== 
--9474-- Caught __NR_exit; running __libc_freeres()
--9474-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9474== 
==9474== HEAP SUMMARY:
==9474==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9474==   total heap usage: 935,588 allocs, 866,650 frees, 66,597,741 bytes allocated
==9474== 
==9474== Searching for pointers to 68,938 not-freed blocks
--9474--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9474--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9474--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9474--   Scanning root segment: 0x4037000..0x403afff (16384)
--9474--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9474--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9474--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9474--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9474--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9474--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9474--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9474--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9474--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9474--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9474--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9474--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9474--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9474--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9474--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9474--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9474--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9474--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9474--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9474--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9474--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9474--   Scanning root segment: 0x701a000..0x701afff (4096)
--9474--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9474--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9474--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9474--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9474--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9474--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9474--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9474--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9474--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9474== Checked 4,779,712 bytes
==9474== 
==9474== LEAK SUMMARY:
==9474==    definitely lost: 1,533 bytes in 8 blocks
==9474==    indirectly lost: 6,756 bytes in 7 blocks
==9474==      possibly lost: 0 bytes in 0 blocks
==9474==    still reachable: 3,109,892 bytes in 68,923 blocks
==9474==         suppressed: 0 bytes in 0 blocks
==9474== Rerun with --leak-check=full to see details of leaked memory
==9474== 
==9474== Use --track-origins=yes to see where uninitialised values come from
==9474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9474== 
==9474== 1 errors in context 1 of 2:
==9474== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9474==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9474==    by 0x488CD0: stringsubst (subst.c:301)
==9474==    by 0x48801B: prefork (subst.c:77)
==9474==    by 0x42B318: execcmd (exec.c:2619)
==9474==    by 0x428CA0: execpline2 (exec.c:1697)
==9474==    by 0x427FD2: execpline (exec.c:1484)
==9474==    by 0x427756: execlist (exec.c:1267)
==9474==    by 0x42717C: execode (exec.c:1073)
==9474==    by 0x431299: runshfunc (exec.c:5040)
==9474==    by 0x430E76: doshfunc (exec.c:4920)
==9474==    by 0x4302FB: execshfunc (exec.c:4557)
==9474==    by 0x42D8C1: execcmd (exec.c:3373)
==9474== 
==9474== 
==9474== 2 errors in context 2 of 2:
==9474== Conditional jump or move depends on uninitialised value(s)
==9474==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9474==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9474==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9474==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9474==    by 0x42D8E9: execcmd (exec.c:3378)
==9474==    by 0x428CA0: execpline2 (exec.c:1697)
==9474==    by 0x427FD2: execpline (exec.c:1484)
==9474==    by 0x42779A: execlist (exec.c:1275)
==9474==    by 0x42717C: execode (exec.c:1073)
==9474==    by 0x431299: runshfunc (exec.c:5040)
==9474==    by 0x430E76: doshfunc (exec.c:4920)
==9474==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9474== 
==9474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9475-- Caught __NR_exit; running __libc_freeres()
==9475== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9475-by-pythonnut-on-???
==9475== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9475-by-pythonnut-on-???
==9475== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9475-by-pythonnut-on-???
==9475== 
==9475== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9475== don't want to do, unless you know exactly what you're doing,
==9475== or are doing some strange experiment):
==9475==   /usr/lib/valgrind/../../bin/vgdb --pid=9475 ...command...
==9475== 
==9475== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9475==   /path/to/gdb ./zsh
==9475== and then give GDB the following command
==9475==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9475
==9475== --pid is optional if only one valgrind process is running
==9475== 
--9475-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9475== 
==9475== HEAP SUMMARY:
==9475==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9475==   total heap usage: 935,593 allocs, 866,655 frees, 66,599,854 bytes allocated
==9475== 
==9475== Searching for pointers to 68,938 not-freed blocks
--9475--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9475--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9475--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9475--   Scanning root segment: 0x4037000..0x403afff (16384)
--9475--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9475--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9475--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9475--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9475--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9475--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9475--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9475--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9475--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9475--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9475--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9475--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9475--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9475--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9475--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9475--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9475--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9475--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9475--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9475--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9475--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9475--   Scanning root segment: 0x701a000..0x701afff (4096)
--9475--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9475--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9475--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9475--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9475--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9475--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9475--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9475--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9475--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9475== Checked 4,779,712 bytes
==9475== 
==9475== LEAK SUMMARY:
==9475==    definitely lost: 1,533 bytes in 8 blocks
==9475==    indirectly lost: 6,756 bytes in 7 blocks
==9475==      possibly lost: 0 bytes in 0 blocks
==9475==    still reachable: 3,109,892 bytes in 68,923 blocks
==9475==         suppressed: 0 bytes in 0 blocks
==9475== Rerun with --leak-check=full to see details of leaked memory
==9475== 
==9475== Use --track-origins=yes to see where uninitialised values come from
==9475== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9475== 
==9475== 1 errors in context 1 of 2:
==9475== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9475==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9475==    by 0x488CD0: stringsubst (subst.c:301)
==9475==    by 0x48801B: prefork (subst.c:77)
==9475==    by 0x42B318: execcmd (exec.c:2619)
==9475==    by 0x428CA0: execpline2 (exec.c:1697)
==9475==    by 0x427FD2: execpline (exec.c:1484)
==9475==    by 0x427756: execlist (exec.c:1267)
==9475==    by 0x42717C: execode (exec.c:1073)
==9475==    by 0x431299: runshfunc (exec.c:5040)
==9475==    by 0x430E76: doshfunc (exec.c:4920)
==9475==    by 0x4302FB: execshfunc (exec.c:4557)
==9475==    by 0x42D8C1: execcmd (exec.c:3373)
==9475== 
==9475== 
==9475== 2 errors in context 2 of 2:
==9475== Conditional jump or move depends on uninitialised value(s)
==9475==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9475==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9475==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9475==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9475==    by 0x42D8E9: execcmd (exec.c:3378)
==9475==    by 0x428CA0: execpline2 (exec.c:1697)
==9475==    by 0x427FD2: execpline (exec.c:1484)
==9475==    by 0x42779A: execlist (exec.c:1275)
==9475==    by 0x42717C: execode (exec.c:1073)
==9475==    by 0x431299: runshfunc (exec.c:5040)
==9475==    by 0x430E76: doshfunc (exec.c:4920)
==9475==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9475== 
==9475== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9476== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9476-by-pythonnut-on-???
==9476== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9476-by-pythonnut-on-???
==9476== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9476-by-pythonnut-on-???
==9476== 
==9476== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9476== don't want to do, unless you know exactly what you're doing,
==9476== or are doing some strange experiment):
==9476==   /usr/lib/valgrind/../../bin/vgdb --pid=9476 ...command...
==9476== 
==9476== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9476==   /path/to/gdb ./zsh
==9476== and then give GDB the following command
==9476==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9476
==9476== --pid is optional if only one valgrind process is running
==9476== 
--9476-- Caught __NR_exit; running __libc_freeres()
--9476-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9476== 
==9476== HEAP SUMMARY:
==9476==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9476==   total heap usage: 935,598 allocs, 866,660 frees, 66,601,967 bytes allocated
==9476== 
==9476== Searching for pointers to 68,938 not-freed blocks
--9476--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9476--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9476--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9476--   Scanning root segment: 0x4037000..0x403afff (16384)
--9476--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9476--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9476--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9476--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9476--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9476--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9476--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9476--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9476--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9476--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9476--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9476--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9476--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9476--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9476--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9476--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9476--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9476--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9476--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9476--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9476--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9476--   Scanning root segment: 0x701a000..0x701afff (4096)
--9476--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9476--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9476--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9476--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9476--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9476--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9476--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9476--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9476--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9476== Checked 4,779,712 bytes
==9476== 
==9476== LEAK SUMMARY:
==9476==    definitely lost: 1,533 bytes in 8 blocks
==9476==    indirectly lost: 6,756 bytes in 7 blocks
==9476==      possibly lost: 0 bytes in 0 blocks
==9476==    still reachable: 3,109,892 bytes in 68,923 blocks
==9476==         suppressed: 0 bytes in 0 blocks
==9476== Rerun with --leak-check=full to see details of leaked memory
==9476== 
==9476== Use --track-origins=yes to see where uninitialised values come from
==9476== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9476== 
==9476== 1 errors in context 1 of 2:
==9476== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9476==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9476==    by 0x488CD0: stringsubst (subst.c:301)
==9476==    by 0x48801B: prefork (subst.c:77)
==9476==    by 0x42B318: execcmd (exec.c:2619)
==9476==    by 0x428CA0: execpline2 (exec.c:1697)
==9476==    by 0x427FD2: execpline (exec.c:1484)
==9476==    by 0x427756: execlist (exec.c:1267)
==9476==    by 0x42717C: execode (exec.c:1073)
==9476==    by 0x431299: runshfunc (exec.c:5040)
==9476==    by 0x430E76: doshfunc (exec.c:4920)
==9476==    by 0x4302FB: execshfunc (exec.c:4557)
==9476==    by 0x42D8C1: execcmd (exec.c:3373)
==9476== 
==9476== 
==9476== 2 errors in context 2 of 2:
==9476== Conditional jump or move depends on uninitialised value(s)
==9476==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9476==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9476==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9476==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9476==    by 0x42D8E9: execcmd (exec.c:3378)
==9476==    by 0x428CA0: execpline2 (exec.c:1697)
==9476==    by 0x427FD2: execpline (exec.c:1484)
==9476==    by 0x42779A: execlist (exec.c:1275)
==9476==    by 0x42717C: execode (exec.c:1073)
==9476==    by 0x431299: runshfunc (exec.c:5040)
==9476==    by 0x430E76: doshfunc (exec.c:4920)
==9476==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9476== 
==9476== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9477== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9477-by-pythonnut-on-???
==9477== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9477-by-pythonnut-on-???
==9477== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9477-by-pythonnut-on-???
==9477== 
==9477== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9477== don't want to do, unless you know exactly what you're doing,
==9477== or are doing some strange experiment):
==9477==   /usr/lib/valgrind/../../bin/vgdb --pid=9477 ...command...
==9477== 
==9477== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9477==   /path/to/gdb ./zsh
==9477== and then give GDB the following command
==9477==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9477
==9477== --pid is optional if only one valgrind process is running
==9477== 
--9477-- Caught __NR_exit; running __libc_freeres()
--9477-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9477== 
==9477== HEAP SUMMARY:
==9477==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9477==   total heap usage: 935,603 allocs, 866,665 frees, 66,604,080 bytes allocated
==9477== 
==9477== Searching for pointers to 68,938 not-freed blocks
--9477--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9477--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9477--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9477--   Scanning root segment: 0x4037000..0x403afff (16384)
--9477--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9477--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9477--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9477--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9477--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9477--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9477--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9477--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9477--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9477--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9477--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9477--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9477--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9477--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9477--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9477--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9477--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9477--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9477--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9477--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9477--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9477--   Scanning root segment: 0x701a000..0x701afff (4096)
--9477--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9477--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9477--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9477--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9477--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9477--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9477--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9477--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9477--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9477== Checked 4,779,712 bytes
==9477== 
==9477== LEAK SUMMARY:
==9477==    definitely lost: 1,533 bytes in 8 blocks
==9477==    indirectly lost: 6,756 bytes in 7 blocks
==9477==      possibly lost: 0 bytes in 0 blocks
==9477==    still reachable: 3,109,892 bytes in 68,923 blocks
==9477==         suppressed: 0 bytes in 0 blocks
==9477== Rerun with --leak-check=full to see details of leaked memory
==9477== 
==9477== Use --track-origins=yes to see where uninitialised values come from
==9477== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9477== 
==9477== 1 errors in context 1 of 2:
==9477== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9477==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9477==    by 0x488CD0: stringsubst (subst.c:301)
==9477==    by 0x48801B: prefork (subst.c:77)
==9477==    by 0x42B318: execcmd (exec.c:2619)
==9477==    by 0x428CA0: execpline2 (exec.c:1697)
==9477==    by 0x427FD2: execpline (exec.c:1484)
==9477==    by 0x427756: execlist (exec.c:1267)
==9477==    by 0x42717C: execode (exec.c:1073)
==9477==    by 0x431299: runshfunc (exec.c:5040)
==9477==    by 0x430E76: doshfunc (exec.c:4920)
==9477==    by 0x4302FB: execshfunc (exec.c:4557)
==9477==    by 0x42D8C1: execcmd (exec.c:3373)
==9477== 
==9477== 
==9477== 2 errors in context 2 of 2:
==9477== Conditional jump or move depends on uninitialised value(s)
==9477==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9477==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9477==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9477==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9477==    by 0x42D8E9: execcmd (exec.c:3378)
==9477==    by 0x428CA0: execpline2 (exec.c:1697)
==9477==    by 0x427FD2: execpline (exec.c:1484)
==9477==    by 0x42779A: execlist (exec.c:1275)
==9477==    by 0x42717C: execode (exec.c:1073)
==9477==    by 0x431299: runshfunc (exec.c:5040)
==9477==    by 0x430E76: doshfunc (exec.c:4920)
==9477==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9477== 
==9477== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9480== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9480-by-pythonnut-on-???
==9480== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9480-by-pythonnut-on-???
==9480== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9480-by-pythonnut-on-???
==9480== 
==9480== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9480== don't want to do, unless you know exactly what you're doing,
==9480== or are doing some strange experiment):
==9480==   /usr/lib/valgrind/../../bin/vgdb --pid=9480 ...command...
==9480== 
==9480== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9480==   /path/to/gdb ./zsh
==9480== and then give GDB the following command
==9480==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9480
==9480== --pid is optional if only one valgrind process is running
==9480== 
--9480-- Caught __NR_exit; running __libc_freeres()
--9480-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9480== 
==9480== HEAP SUMMARY:
==9480==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9480==   total heap usage: 935,608 allocs, 866,670 frees, 66,606,189 bytes allocated
==9480== 
==9480== Searching for pointers to 68,938 not-freed blocks
--9480--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9480--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9480--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9480--   Scanning root segment: 0x4037000..0x403afff (16384)
--9480--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9480--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9480--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9480--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9480--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9480--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9480--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9480--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9480--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9480--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9480--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9480--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9480--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9480--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9480--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9480--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9480--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9480--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9480--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9480--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9480--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9480--   Scanning root segment: 0x701a000..0x701afff (4096)
--9480--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9480--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9480--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9480--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9480--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9480--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9480--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9480--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9480--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9480== Checked 4,779,712 bytes
==9480== 
==9480== LEAK SUMMARY:
==9480==    definitely lost: 1,533 bytes in 8 blocks
==9480==    indirectly lost: 6,756 bytes in 7 blocks
==9480==      possibly lost: 0 bytes in 0 blocks
==9480==    still reachable: 3,109,892 bytes in 68,923 blocks
==9480==         suppressed: 0 bytes in 0 blocks
==9480== Rerun with --leak-check=full to see details of leaked memory
==9480== 
==9480== Use --track-origins=yes to see where uninitialised values come from
==9480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9480== 
==9480== 1 errors in context 1 of 2:
==9480== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9480==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9480==    by 0x488CD0: stringsubst (subst.c:301)
==9480==    by 0x48801B: prefork (subst.c:77)
==9480==    by 0x42B318: execcmd (exec.c:2619)
==9480==    by 0x428CA0: execpline2 (exec.c:1697)
==9480==    by 0x427FD2: execpline (exec.c:1484)
==9480==    by 0x427756: execlist (exec.c:1267)
==9480==    by 0x42717C: execode (exec.c:1073)
==9480==    by 0x431299: runshfunc (exec.c:5040)
==9480==    by 0x430E76: doshfunc (exec.c:4920)
==9480==    by 0x4302FB: execshfunc (exec.c:4557)
==9480==    by 0x42D8C1: execcmd (exec.c:3373)
==9480== 
==9480== 
==9480== 2 errors in context 2 of 2:
==9480== Conditional jump or move depends on uninitialised value(s)
==9480==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9480==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9480==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9480==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9480==    by 0x42D8E9: execcmd (exec.c:3378)
==9480==    by 0x428CA0: execpline2 (exec.c:1697)
==9480==    by 0x427FD2: execpline (exec.c:1484)
==9480==    by 0x42779A: execlist (exec.c:1275)
==9480==    by 0x42717C: execode (exec.c:1073)
==9480==    by 0x431299: runshfunc (exec.c:5040)
==9480==    by 0x430E76: doshfunc (exec.c:4920)
==9480==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9480== 
==9480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9481== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9481-by-pythonnut-on-???
==9481== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9481-by-pythonnut-on-???
==9481== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9481-by-pythonnut-on-???
==9481== 
==9481== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9481== don't want to do, unless you know exactly what you're doing,
==9481== or are doing some strange experiment):
==9481==   /usr/lib/valgrind/../../bin/vgdb --pid=9481 ...command...
==9481== 
==9481== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9481==   /path/to/gdb ./zsh
==9481== and then give GDB the following command
==9481==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9481
==9481== --pid is optional if only one valgrind process is running
==9481== 
--9481-- Caught __NR_exit; running __libc_freeres()
--9481-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9481== 
==9481== HEAP SUMMARY:
==9481==     in use at exit: 3,118,181 bytes in 68,938 blocks
==9481==   total heap usage: 935,613 allocs, 866,675 frees, 66,608,306 bytes allocated
==9481== 
==9481== Searching for pointers to 68,938 not-freed blocks
--9481--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9481--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9481--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9481--   Scanning root segment: 0x4037000..0x403afff (16384)
--9481--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9481--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9481--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9481--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9481--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9481--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9481--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9481--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9481--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9481--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9481--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9481--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9481--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9481--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9481--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9481--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9481--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9481--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9481--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9481--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9481--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9481--   Scanning root segment: 0x701a000..0x701afff (4096)
--9481--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9481--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9481--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9481--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9481--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9481--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9481--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9481--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9481--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9481== Checked 4,779,712 bytes
==9481== 
==9481== LEAK SUMMARY:
==9481==    definitely lost: 1,533 bytes in 8 blocks
==9481==    indirectly lost: 6,756 bytes in 7 blocks
==9481==      possibly lost: 0 bytes in 0 blocks
==9481==    still reachable: 3,109,892 bytes in 68,923 blocks
==9481==         suppressed: 0 bytes in 0 blocks
==9481== Rerun with --leak-check=full to see details of leaked memory
==9481== 
==9481== Use --track-origins=yes to see where uninitialised values come from
==9481== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9481== 
==9481== 1 errors in context 1 of 2:
==9481== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9481==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9481==    by 0x488CD0: stringsubst (subst.c:301)
==9481==    by 0x48801B: prefork (subst.c:77)
==9481==    by 0x42B318: execcmd (exec.c:2619)
==9481==    by 0x428CA0: execpline2 (exec.c:1697)
==9481==    by 0x427FD2: execpline (exec.c:1484)
==9481==    by 0x427756: execlist (exec.c:1267)
==9481==    by 0x42717C: execode (exec.c:1073)
==9481==    by 0x431299: runshfunc (exec.c:5040)
==9481==    by 0x430E76: doshfunc (exec.c:4920)
==9481==    by 0x4302FB: execshfunc (exec.c:4557)
==9481==    by 0x42D8C1: execcmd (exec.c:3373)
==9481== 
==9481== 
==9481== 2 errors in context 2 of 2:
==9481== Conditional jump or move depends on uninitialised value(s)
==9481==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9481==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9481==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9481==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9481==    by 0x42D8E9: execcmd (exec.c:3378)
==9481==    by 0x428CA0: execpline2 (exec.c:1697)
==9481==    by 0x427FD2: execpline (exec.c:1484)
==9481==    by 0x42779A: execlist (exec.c:1275)
==9481==    by 0x42717C: execode (exec.c:1073)
==9481==    by 0x431299: runshfunc (exec.c:5040)
==9481==    by 0x430E76: doshfunc (exec.c:4920)
==9481==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9481== 
==9481== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9483-- Caught __NR_exit; running __libc_freeres()
==9484== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9484-by-pythonnut-on-???
==9484== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9484-by-pythonnut-on-???
==9484== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9484-by-pythonnut-on-???
==9484== 
==9484== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9484== don't want to do, unless you know exactly what you're doing,
==9484== or are doing some strange experiment):
==9484==   /usr/lib/valgrind/../../bin/vgdb --pid=9484 ...command...
==9484== 
==9484== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9484==   /path/to/gdb ./zsh
==9484== and then give GDB the following command
==9484==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9484
==9484== --pid is optional if only one valgrind process is running
==9484== 
==9483== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9483-by-pythonnut-on-???
==9483== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9483-by-pythonnut-on-???
==9483== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9483-by-pythonnut-on-???
==9483== 
==9483== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9483== don't want to do, unless you know exactly what you're doing,
==9483== or are doing some strange experiment):
==9483==   /usr/lib/valgrind/../../bin/vgdb --pid=9483 ...command...
==9483== 
==9483== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9483==   /path/to/gdb ./zsh
==9483== and then give GDB the following command
==9483==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9483
==9483== --pid is optional if only one valgrind process is running
==9483== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9483-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9483== 
==9483== HEAP SUMMARY:
==9483==     in use at exit: 3,118,337 bytes in 68,943 blocks
==9483==   total heap usage: 935,617 allocs, 866,674 frees, 66,611,728 bytes allocated
==9483== 
==9483== Searching for pointers to 68,943 not-freed blocks
--9483--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9483--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9483--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9483--   Scanning root segment: 0x4037000..0x403afff (16384)
--9483--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9483--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9483--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9483--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9483--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9483--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9483--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9483--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9483--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9483--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9483--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9483--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9483--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9483--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9483--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9483--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9483--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9483--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9483--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9483--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9483--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9483--   Scanning root segment: 0x701a000..0x701afff (4096)
--9483--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9483--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9483--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9483--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9483--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9483--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9483--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9483--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9483--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9483== Checked 4,780,488 bytes
==9483== 
==9483== LEAK SUMMARY:
==9483==    definitely lost: 1,533 bytes in 8 blocks
==9483==    indirectly lost: 6,756 bytes in 7 blocks
==9483==      possibly lost: 0 bytes in 0 blocks
==9483==    still reachable: 3,110,048 bytes in 68,928 blocks
==9483==         suppressed: 0 bytes in 0 blocks
==9483== Rerun with --leak-check=full to see details of leaked memory
==9483== 
==9483== Use --track-origins=yes to see where uninitialised values come from
==9483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9483== 
==9483== 1 errors in context 1 of 2:
==9483== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9483==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9483==    by 0x488CD0: stringsubst (subst.c:301)
==9483==    by 0x48801B: prefork (subst.c:77)
==9483==    by 0x42B318: execcmd (exec.c:2619)
==9483==    by 0x428CA0: execpline2 (exec.c:1697)
==9483==    by 0x427FD2: execpline (exec.c:1484)
==9483==    by 0x427756: execlist (exec.c:1267)
==9483==    by 0x42717C: execode (exec.c:1073)
==9483==    by 0x431299: runshfunc (exec.c:5040)
==9483==    by 0x430E76: doshfunc (exec.c:4920)
==9483==    by 0x4302FB: execshfunc (exec.c:4557)
==9483==    by 0x42D8C1: execcmd (exec.c:3373)
==9483== 
==9483== 
==9483== 2 errors in context 2 of 2:
==9483== Conditional jump or move depends on uninitialised value(s)
==9483==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9483==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9483==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9483==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9483==    by 0x42D8E9: execcmd (exec.c:3378)
==9483==    by 0x428CA0: execpline2 (exec.c:1697)
==9483==    by 0x427FD2: execpline (exec.c:1484)
==9483==    by 0x42779A: execlist (exec.c:1275)
==9483==    by 0x42717C: execode (exec.c:1073)
==9483==    by 0x431299: runshfunc (exec.c:5040)
==9483==    by 0x430E76: doshfunc (exec.c:4920)
==9483==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9483== 
==9483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9482== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9482-by-pythonnut-on-???
==9482== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9482-by-pythonnut-on-???
==9482== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9482-by-pythonnut-on-???
==9482== 
==9482== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9482== don't want to do, unless you know exactly what you're doing,
==9482== or are doing some strange experiment):
==9482==   /usr/lib/valgrind/../../bin/vgdb --pid=9482 ...command...
==9482== 
==9482== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9482==   /path/to/gdb ./zsh
==9482== and then give GDB the following command
==9482==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9482
==9482== --pid is optional if only one valgrind process is running
==9482== 
--9482-- Caught __NR_exit; running __libc_freeres()
--9482-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9482== 
==9482== HEAP SUMMARY:
==9482==     in use at exit: 3,118,273 bytes in 68,940 blocks
==9482==   total heap usage: 935,619 allocs, 866,679 frees, 66,612,272 bytes allocated
==9482== 
==9482== Searching for pointers to 68,940 not-freed blocks
--9482--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9482--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9482--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9482--   Scanning root segment: 0x4037000..0x403afff (16384)
--9482--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9482--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9482--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9482--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9482--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9482--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9482--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9482--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9482--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9482--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9482--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9482--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9482--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9482--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9482--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9482--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9482--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9482--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9482--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9482--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9482--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9482--   Scanning root segment: 0x701a000..0x701afff (4096)
--9482--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9482--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9482--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9482--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9482--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9482--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9482--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9482--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9482--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9482== Checked 4,779,800 bytes
==9482== 
==9482== LEAK SUMMARY:
==9482==    definitely lost: 1,533 bytes in 8 blocks
==9482==    indirectly lost: 6,756 bytes in 7 blocks
==9482==      possibly lost: 0 bytes in 0 blocks
==9482==    still reachable: 3,109,984 bytes in 68,925 blocks
==9482==         suppressed: 0 bytes in 0 blocks
==9482== Rerun with --leak-check=full to see details of leaked memory
==9482== 
==9482== Use --track-origins=yes to see where uninitialised values come from
==9482== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9482== 
==9482== 1 errors in context 1 of 2:
==9482== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9482==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9482==    by 0x488CD0: stringsubst (subst.c:301)
==9482==    by 0x48801B: prefork (subst.c:77)
==9482==    by 0x42B318: execcmd (exec.c:2619)
==9482==    by 0x428CA0: execpline2 (exec.c:1697)
==9482==    by 0x427FD2: execpline (exec.c:1484)
==9482==    by 0x427756: execlist (exec.c:1267)
==9482==    by 0x42717C: execode (exec.c:1073)
==9482==    by 0x431299: runshfunc (exec.c:5040)
==9482==    by 0x430E76: doshfunc (exec.c:4920)
==9482==    by 0x4302FB: execshfunc (exec.c:4557)
==9482==    by 0x42D8C1: execcmd (exec.c:3373)
==9482== 
==9482== 
==9482== 2 errors in context 2 of 2:
==9482== Conditional jump or move depends on uninitialised value(s)
==9482==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9482==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9482==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9482==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9482==    by 0x42D8E9: execcmd (exec.c:3378)
==9482==    by 0x428CA0: execpline2 (exec.c:1697)
==9482==    by 0x427FD2: execpline (exec.c:1484)
==9482==    by 0x42779A: execlist (exec.c:1275)
==9482==    by 0x42717C: execode (exec.c:1073)
==9482==    by 0x431299: runshfunc (exec.c:5040)
==9482==    by 0x430E76: doshfunc (exec.c:4920)
==9482==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9482== 
==9482== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9399-- Caught __NR_exit; running __libc_freeres()
--9399-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9399== 
==9399== HEAP SUMMARY:
==9399==     in use at exit: 3,115,805 bytes in 68,873 blocks
==9399==   total heap usage: 935,618 allocs, 866,745 frees, 66,613,856 bytes allocated
==9399== 
==9399== Searching for pointers to 68,873 not-freed blocks
--9399--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9399--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9399--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9399--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9399--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9399--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9399--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9399--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9399--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9399--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9399--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9399--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9399--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9399--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9399--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9399--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9399--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9399--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9399--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9399--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9399--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9399--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9399--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9399--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9399--   Scanning root segment: 0x701a000..0x701afff (4096)
--9399--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9399--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9399--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9399--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9399--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9399--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9399--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9399--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9399--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9399== Checked 4,757,928 bytes
==9399== 
==9399== LEAK SUMMARY:
==9399==    definitely lost: 1,533 bytes in 8 blocks
==9399==    indirectly lost: 6,756 bytes in 7 blocks
==9399==      possibly lost: 0 bytes in 0 blocks
==9399==    still reachable: 3,107,516 bytes in 68,858 blocks
==9399==         suppressed: 0 bytes in 0 blocks
==9399== Rerun with --leak-check=full to see details of leaked memory
==9399== 
==9399== Use --track-origins=yes to see where uninitialised values come from
==9399== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9399== 
==9399== 1 errors in context 1 of 2:
==9399== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9399==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9399==    by 0x488CD0: stringsubst (subst.c:301)
==9399==    by 0x48801B: prefork (subst.c:77)
==9399==    by 0x42B318: execcmd (exec.c:2619)
==9399==    by 0x428CA0: execpline2 (exec.c:1697)
==9399==    by 0x427FD2: execpline (exec.c:1484)
==9399==    by 0x427756: execlist (exec.c:1267)
==9399==    by 0x42717C: execode (exec.c:1073)
==9399==    by 0x431299: runshfunc (exec.c:5040)
==9399==    by 0x430E76: doshfunc (exec.c:4920)
==9399==    by 0x4302FB: execshfunc (exec.c:4557)
==9399==    by 0x42D8C1: execcmd (exec.c:3373)
==9399== 
==9399== 
==9399== 2 errors in context 2 of 2:
==9399== Conditional jump or move depends on uninitialised value(s)
==9399==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9399==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9399==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9399==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9399==    by 0x42D8E9: execcmd (exec.c:3378)
==9399==    by 0x428CA0: execpline2 (exec.c:1697)
==9399==    by 0x427FD2: execpline (exec.c:1484)
==9399==    by 0x42779A: execlist (exec.c:1275)
==9399==    by 0x42717C: execode (exec.c:1073)
==9399==    by 0x431299: runshfunc (exec.c:5040)
==9399==    by 0x430E76: doshfunc (exec.c:4920)
==9399==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9399== 
==9399== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9485== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9485-by-pythonnut-on-???
==9485== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9485-by-pythonnut-on-???
==9485== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9485-by-pythonnut-on-???
==9485== 
==9485== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9485== don't want to do, unless you know exactly what you're doing,
==9485== or are doing some strange experiment):
==9485==   /usr/lib/valgrind/../../bin/vgdb --pid=9485 ...command...
==9485== 
==9485== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9485==   /path/to/gdb ./zsh
==9485== and then give GDB the following command
==9485==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9485
==9485== --pid is optional if only one valgrind process is running
==9485== 
==9487== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9487-by-pythonnut-on-???
==9487== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9487-by-pythonnut-on-???
==9487== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9487-by-pythonnut-on-???
==9487== 
==9487== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9487== don't want to do, unless you know exactly what you're doing,
==9487== or are doing some strange experiment):
==9487==   /usr/lib/valgrind/../../bin/vgdb --pid=9487 ...command...
==9487== 
==9487== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9487==   /path/to/gdb ./zsh
==9487== and then give GDB the following command
==9487==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9487
==9487== --pid is optional if only one valgrind process is running
==9487== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==9486== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9486-by-pythonnut-on-???
==9486== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9486-by-pythonnut-on-???
==9486== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9486-by-pythonnut-on-???
==9486== 
==9486== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9486== don't want to do, unless you know exactly what you're doing,
==9486== or are doing some strange experiment):
==9486==   /usr/lib/valgrind/../../bin/vgdb --pid=9486 ...command...
==9486== 
==9486== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9486==   /path/to/gdb ./zsh
==9486== and then give GDB the following command
==9486==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9486
==9486== --pid is optional if only one valgrind process is running
==9486== 
--9486-- Caught __NR_exit; running __libc_freeres()
--9486-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9486== 
==9486== HEAP SUMMARY:
==9486==     in use at exit: 3,116,309 bytes in 68,885 blocks
==9486==   total heap usage: 935,462 allocs, 866,577 frees, 66,570,788 bytes allocated
==9486== 
==9486== Searching for pointers to 68,885 not-freed blocks
--9486--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9486--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9486--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9486--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9486--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9486--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9486--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9486--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9486--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9486--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9486--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9486--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9486--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9486--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9486--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9486--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9486--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9486--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9486--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9486--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9486--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9486--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9486--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9486--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9486--   Scanning root segment: 0x701a000..0x701afff (4096)
--9486--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9486--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9486--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9486--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9486--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9486--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9486--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9486--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9486--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9486== Checked 4,760,480 bytes
==9486== 
==9486== LEAK SUMMARY:
==9486==    definitely lost: 1,533 bytes in 8 blocks
==9486==    indirectly lost: 6,756 bytes in 7 blocks
==9486==      possibly lost: 0 bytes in 0 blocks
==9486==    still reachable: 3,108,020 bytes in 68,870 blocks
==9486==         suppressed: 0 bytes in 0 blocks
==9486== Rerun with --leak-check=full to see details of leaked memory
==9486== 
==9486== Use --track-origins=yes to see where uninitialised values come from
==9486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9486== 
==9486== 1 errors in context 1 of 2:
==9486== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9486==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9486==    by 0x488CD0: stringsubst (subst.c:301)
==9486==    by 0x48801B: prefork (subst.c:77)
==9486==    by 0x42B318: execcmd (exec.c:2619)
==9486==    by 0x428CA0: execpline2 (exec.c:1697)
==9486==    by 0x427FD2: execpline (exec.c:1484)
==9486==    by 0x427756: execlist (exec.c:1267)
==9486==    by 0x42717C: execode (exec.c:1073)
==9486==    by 0x431299: runshfunc (exec.c:5040)
==9486==    by 0x430E76: doshfunc (exec.c:4920)
==9486==    by 0x4302FB: execshfunc (exec.c:4557)
==9486==    by 0x42D8C1: execcmd (exec.c:3373)
==9486== 
==9486== 
==9486== 2 errors in context 2 of 2:
==9486== Conditional jump or move depends on uninitialised value(s)
==9486==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9486==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9486==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9486==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9486==    by 0x42D8E9: execcmd (exec.c:3378)
==9486==    by 0x428CA0: execpline2 (exec.c:1697)
==9486==    by 0x427FD2: execpline (exec.c:1484)
==9486==    by 0x42779A: execlist (exec.c:1275)
==9486==    by 0x42717C: execode (exec.c:1073)
==9486==    by 0x431299: runshfunc (exec.c:5040)
==9486==    by 0x430E76: doshfunc (exec.c:4920)
==9486==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9486== 
==9486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9490-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9490== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9490-by-pythonnut-on-???
==9490== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9490-by-pythonnut-on-???
==9490== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9490-by-pythonnut-on-???
==9490== 
==9490== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9490== don't want to do, unless you know exactly what you're doing,
==9490== or are doing some strange experiment):
==9490==   /usr/lib/valgrind/../../bin/vgdb --pid=9490 ...command...
==9490== 
==9490== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9490==   /path/to/gdb ./zsh
==9490== and then give GDB the following command
==9490==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9490
==9490== --pid is optional if only one valgrind process is running
==9490== 
client request: code 4d430005,  addr 0xFFEFFB37C,  len 4
client request: code 4d430005,  addr 0xFFEFF836C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF895C,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFEEBFC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
==9492== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9492-by-pythonnut-on-???
==9492== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9492-by-pythonnut-on-???
==9492== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9492-by-pythonnut-on-???
==9492== 
==9492== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9492== don't want to do, unless you know exactly what you're doing,
==9492== or are doing some strange experiment):
==9492==   /usr/lib/valgrind/../../bin/vgdb --pid=9492 ...command...
==9492== 
==9492== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9492==   /path/to/gdb ./zsh
==9492== and then give GDB the following command
==9492==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9492
==9492== --pid is optional if only one valgrind process is running
==9492== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
==9493== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9493-by-pythonnut-on-???
==9493== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9493-by-pythonnut-on-???
==9493== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9493-by-pythonnut-on-???
==9493== 
==9493== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9493== don't want to do, unless you know exactly what you're doing,
==9493== or are doing some strange experiment):
==9493==   /usr/lib/valgrind/../../bin/vgdb --pid=9493 ...command...
==9493== 
==9493== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9493==   /path/to/gdb ./zsh
==9493== and then give GDB the following command
==9493==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9493
==9493== --pid is optional if only one valgrind process is running
==9493== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
--9493-- Caught __NR_exit; running __libc_freeres()
--9493-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9493== 
==9493== HEAP SUMMARY:
==9493==     in use at exit: 3,147,995 bytes in 69,382 blocks
==9493==   total heap usage: 939,232 allocs, 869,850 frees, 68,340,739 bytes allocated
==9493== 
==9493== Searching for pointers to 69,382 not-freed blocks
--9493--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9493--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9493--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9493--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9493--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9493--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9493--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9493--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9493--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9493--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9493--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9493--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9493--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9493--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9493--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9493--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9493--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9493--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9493--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9493--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9493--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9493--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9493--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9493--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9493--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9493--   Scanning root segment: 0x701a000..0x701afff (4096)
--9493--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9493--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9493--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9493--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9493--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9493--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9493--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9493--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9493--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9493== Checked 4,848,552 bytes
==9493== 
==9493== LEAK SUMMARY:
==9493==    definitely lost: 1,533 bytes in 8 blocks
==9493==    indirectly lost: 6,756 bytes in 7 blocks
==9493==      possibly lost: 0 bytes in 0 blocks
==9493==    still reachable: 3,139,706 bytes in 69,367 blocks
==9493==         suppressed: 0 bytes in 0 blocks
==9493== Rerun with --leak-check=full to see details of leaked memory
==9493== 
==9493== Use --track-origins=yes to see where uninitialised values come from
==9493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9493== 
==9493== 1 errors in context 1 of 2:
==9493== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9493==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9493==    by 0x488CD0: stringsubst (subst.c:301)
==9493==    by 0x48801B: prefork (subst.c:77)
==9493==    by 0x42B318: execcmd (exec.c:2619)
==9493==    by 0x428CA0: execpline2 (exec.c:1697)
==9493==    by 0x427FD2: execpline (exec.c:1484)
==9493==    by 0x427756: execlist (exec.c:1267)
==9493==    by 0x42717C: execode (exec.c:1073)
==9493==    by 0x431299: runshfunc (exec.c:5040)
==9493==    by 0x430E76: doshfunc (exec.c:4920)
==9493==    by 0x4302FB: execshfunc (exec.c:4557)
==9493==    by 0x42D8C1: execcmd (exec.c:3373)
==9493== 
==9493== 
==9493== 2 errors in context 2 of 2:
==9493== Conditional jump or move depends on uninitialised value(s)
==9493==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9493==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9493==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9493==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9493==    by 0x42D8E9: execcmd (exec.c:3378)
==9493==    by 0x428CA0: execpline2 (exec.c:1697)
==9493==    by 0x427FD2: execpline (exec.c:1484)
==9493==    by 0x42779A: execlist (exec.c:1275)
==9493==    by 0x42717C: execode (exec.c:1073)
==9493==    by 0x431299: runshfunc (exec.c:5040)
==9493==    by 0x430E76: doshfunc (exec.c:4920)
==9493==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9493== 
==9493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9492-- Caught __NR_exit; running __libc_freeres()
--9492-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9492== 
==9492== HEAP SUMMARY:
==9492==     in use at exit: 3,145,713 bytes in 69,302 blocks
==9492==   total heap usage: 939,137 allocs, 869,835 frees, 68,108,800 bytes allocated
==9492== 
==9494== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9494-by-pythonnut-on-???
==9494== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9494-by-pythonnut-on-???
==9494== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9494-by-pythonnut-on-???
==9494== 
==9494== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9494== don't want to do, unless you know exactly what you're doing,
==9494== or are doing some strange experiment):
==9494==   /usr/lib/valgrind/../../bin/vgdb --pid=9494 ...command...
==9494== 
==9494== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9494==   /path/to/gdb ./zsh
==9494== and then give GDB the following command
==9494==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9494
==9494== --pid is optional if only one valgrind process is running
==9494== 
==9492== Searching for pointers to 69,302 not-freed blocks
--9492--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9492--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9492--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9492--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9492--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9492--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9492--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9492--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9492--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9492--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9492--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9492--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9492--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9492--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9492--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9492--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9492--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9492--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9492--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9492--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9492--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9492--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9492--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9492--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9492--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9492--   Scanning root segment: 0x701a000..0x701afff (4096)
--9492--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9492--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9492--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9492--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9492--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9492--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9492--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9492--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9492--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9494-- Caught __NR_exit; running __libc_freeres()
--9494-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9494== 
==9494== HEAP SUMMARY:
==9494==     in use at exit: 3,156,775 bytes in 69,075 blocks
==9494==   total heap usage: 935,537 allocs, 866,462 frees, 66,603,912 bytes allocated
==9494== 
==9492== Checked 4,844,576 bytes
==9492== 
==9494== Searching for pointers to 69,075 not-freed blocks
--9494--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9494--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9494--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9494--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9494--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9494--   Scanning root segment: 0x41d6000..0x421efff (299008)
--9494--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9494--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9494--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9494--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9494--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9494--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9494--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9494--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9494--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9494--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9494--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9494--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9494--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9494--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9494--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9494--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9494--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9494--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9494--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9494--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9494--   Scanning root segment: 0x701a000..0x701afff (4096)
--9494--   Scanning root segment: 0x881b000..0x8837fff (118784)
--9494--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9494--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9494--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9494--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9494--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9494--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9494--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9494--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9494--   Scanning root segment: 0xbc84000..0xbc96fff (77824)
--9494--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9492== LEAK SUMMARY:
==9492==    definitely lost: 1,533 bytes in 8 blocks
==9492==    indirectly lost: 6,756 bytes in 7 blocks
==9492==      possibly lost: 0 bytes in 0 blocks
==9492==    still reachable: 3,137,424 bytes in 69,287 blocks
==9492==         suppressed: 0 bytes in 0 blocks
==9492== Rerun with --leak-check=full to see details of leaked memory
==9492== 
==9492== Use --track-origins=yes to see where uninitialised values come from
==9492== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9492== 
==9492== 1 errors in context 1 of 2:
==9492== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9492==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9492==    by 0x488CD0: stringsubst (subst.c:301)
==9492==    by 0x48801B: prefork (subst.c:77)
==9492==    by 0x42B318: execcmd (exec.c:2619)
==9492==    by 0x428CA0: execpline2 (exec.c:1697)
==9492==    by 0x427FD2: execpline (exec.c:1484)
==9492==    by 0x427756: execlist (exec.c:1267)
==9492==    by 0x42717C: execode (exec.c:1073)
==9492==    by 0x431299: runshfunc (exec.c:5040)
==9492==    by 0x430E76: doshfunc (exec.c:4920)
==9492==    by 0x4302FB: execshfunc (exec.c:4557)
==9492==    by 0x42D8C1: execcmd (exec.c:3373)
==9492== 
==9492== 
==9492== 2 errors in context 2 of 2:
==9492== Conditional jump or move depends on uninitialised value(s)
==9492==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9492==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9492==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9492==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9492==    by 0x42D8E9: execcmd (exec.c:3378)
==9492==    by 0x428CA0: execpline2 (exec.c:1697)
==9492==    by 0x427FD2: execpline (exec.c:1484)
==9492==    by 0x42779A: execlist (exec.c:1275)
==9492==    by 0x42717C: execode (exec.c:1073)
==9492==    by 0x431299: runshfunc (exec.c:5040)
==9492==    by 0x430E76: doshfunc (exec.c:4920)
==9492==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9492== 
==9492== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9495== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9495-by-pythonnut-on-???
==9495== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9495-by-pythonnut-on-???
==9495== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9495-by-pythonnut-on-???
==9495== 
==9495== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9495== don't want to do, unless you know exactly what you're doing,
==9495== or are doing some strange experiment):
==9495==   /usr/lib/valgrind/../../bin/vgdb --pid=9495 ...command...
==9495== 
==9495== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9495==   /path/to/gdb ./zsh
==9495== and then give GDB the following command
==9495==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9495
==9495== --pid is optional if only one valgrind process is running
==9495== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==9496== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9496-by-pythonnut-on-???
==9496== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9496-by-pythonnut-on-???
==9496== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9496-by-pythonnut-on-???
==9496== 
==9496== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9496== don't want to do, unless you know exactly what you're doing,
==9496== or are doing some strange experiment):
==9496==   /usr/lib/valgrind/../../bin/vgdb --pid=9496 ...command...
==9496== 
==9496== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9496==   /path/to/gdb ./zsh
==9496== and then give GDB the following command
==9496==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9496
==9496== --pid is optional if only one valgrind process is running
==9496== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--9496-- Caught __NR_exit; running __libc_freeres()
--9496-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9496== 
==9494== Checked 5,388,032 bytes
==9494== 
==9496== HEAP SUMMARY:
==9496==     in use at exit: 3,148,242 bytes in 69,390 blocks
==9496==   total heap usage: 939,249 allocs, 869,859 frees, 68,310,910 bytes allocated
==9496== 
==9494== LEAK SUMMARY:
==9494==    definitely lost: 1,533 bytes in 8 blocks
==9494==    indirectly lost: 6,756 bytes in 7 blocks
==9494==      possibly lost: 0 bytes in 0 blocks
==9494==    still reachable: 3,148,486 bytes in 69,060 blocks
==9494==         suppressed: 0 bytes in 0 blocks
==9494== Rerun with --leak-check=full to see details of leaked memory
==9494== 
==9494== Use --track-origins=yes to see where uninitialised values come from
==9494== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9494== 
==9494== 1 errors in context 1 of 2:
==9494== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9494==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9494==    by 0x488CD0: stringsubst (subst.c:301)
==9494==    by 0x48801B: prefork (subst.c:77)
==9494==    by 0x42B318: execcmd (exec.c:2619)
==9494==    by 0x428CA0: execpline2 (exec.c:1697)
==9494==    by 0x427FD2: execpline (exec.c:1484)
==9494==    by 0x427756: execlist (exec.c:1267)
==9494==    by 0x42717C: execode (exec.c:1073)
==9494==    by 0x431299: runshfunc (exec.c:5040)
==9494==    by 0x430E76: doshfunc (exec.c:4920)
==9494==    by 0x4302FB: execshfunc (exec.c:4557)
==9494==    by 0x42D8C1: execcmd (exec.c:3373)
==9494== 
==9494== 
==9494== 2 errors in context 2 of 2:
==9494== Conditional jump or move depends on uninitialised value(s)
==9494==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9494==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9494==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9494==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9494==    by 0x42D8E9: execcmd (exec.c:3378)
==9494==    by 0x428CA0: execpline2 (exec.c:1697)
==9494==    by 0x427FD2: execpline (exec.c:1484)
==9494==    by 0x42779A: execlist (exec.c:1275)
==9494==    by 0x42717C: execode (exec.c:1073)
==9494==    by 0x431299: runshfunc (exec.c:5040)
==9494==    by 0x430E76: doshfunc (exec.c:4920)
==9494==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9494== 
==9494== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9496== Searching for pointers to 69,390 not-freed blocks
--9496--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9496--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9496--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9496--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9496--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9496--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9496--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9496--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9496--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9496--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9496--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9496--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9496--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9496--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9496--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9496--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9496--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9496--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9496--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9496--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9496--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9496--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9496--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9496--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9496--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9496--   Scanning root segment: 0x701a000..0x701afff (4096)
--9496--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9496--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9496--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9496--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9496--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9496--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9496--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9496--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9496--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9427-- Caught __NR_exit; running __libc_freeres()
--9427-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9427== 
==9427== HEAP SUMMARY:
==9427==     in use at exit: 3,118,776 bytes in 68,989 blocks
==9427==   total heap usage: 937,012 allocs, 868,023 frees, 66,697,131 bytes allocated
==9427== 
==9496== Checked 4,849,280 bytes
==9496== 
==9427== Searching for pointers to 68,989 not-freed blocks
--9427--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9427--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9427--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9427--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9427--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9427--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9427--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9427--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9427--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9427--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9427--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9427--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9427--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9427--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9427--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9427--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9427--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9427--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9427--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9427--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9427--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9427--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9427--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9427--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9427--   Scanning root segment: 0x701a000..0x701afff (4096)
--9427--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9427--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9427--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9427--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9427--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9427--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9427--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9427--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9427--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9496== LEAK SUMMARY:
==9496==    definitely lost: 1,533 bytes in 8 blocks
==9496==    indirectly lost: 6,756 bytes in 7 blocks
==9496==      possibly lost: 0 bytes in 0 blocks
==9496==    still reachable: 3,139,953 bytes in 69,375 blocks
==9496==         suppressed: 0 bytes in 0 blocks
==9496== Rerun with --leak-check=full to see details of leaked memory
==9496== 
==9496== Use --track-origins=yes to see where uninitialised values come from
==9496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9496== 
==9496== 1 errors in context 1 of 2:
==9496== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9496==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9496==    by 0x488CD0: stringsubst (subst.c:301)
==9496==    by 0x48801B: prefork (subst.c:77)
==9496==    by 0x42B318: execcmd (exec.c:2619)
==9496==    by 0x428CA0: execpline2 (exec.c:1697)
==9496==    by 0x427FD2: execpline (exec.c:1484)
==9496==    by 0x427756: execlist (exec.c:1267)
==9496==    by 0x42717C: execode (exec.c:1073)
==9496==    by 0x431299: runshfunc (exec.c:5040)
==9496==    by 0x430E76: doshfunc (exec.c:4920)
==9496==    by 0x4302FB: execshfunc (exec.c:4557)
==9496==    by 0x42D8C1: execcmd (exec.c:3373)
==9496== 
==9496== 
==9496== 2 errors in context 2 of 2:
==9496== Conditional jump or move depends on uninitialised value(s)
==9496==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9496==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9496==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9496==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9496==    by 0x42D8E9: execcmd (exec.c:3378)
==9496==    by 0x428CA0: execpline2 (exec.c:1697)
==9496==    by 0x427FD2: execpline (exec.c:1484)
==9496==    by 0x42779A: execlist (exec.c:1275)
==9496==    by 0x42717C: execode (exec.c:1073)
==9496==    by 0x431299: runshfunc (exec.c:5040)
==9496==    by 0x430E76: doshfunc (exec.c:4920)
==9496==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9496== 
==9496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9495-- Caught __NR_exit; running __libc_freeres()
--9495-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9495== 
==9495== HEAP SUMMARY:
==9495==     in use at exit: 3,145,986 bytes in 69,310 blocks
==9495==   total heap usage: 939,152 allocs, 869,842 frees, 68,111,713 bytes allocated
==9495== 
==9495== Searching for pointers to 69,310 not-freed blocks
--9495--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9495--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9495--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9495--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9495--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9495--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9495--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9495--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9495--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9495--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9495--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9495--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9495--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9495--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9495--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9495--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9495--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9495--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9495--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9495--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9495--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9495--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9495--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9495--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9495--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9495--   Scanning root segment: 0x701a000..0x701afff (4096)
--9495--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9495--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9495--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9495--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9495--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9495--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9495--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9495--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9495--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9427== Checked 4,782,416 bytes
==9427== 
==9427== LEAK SUMMARY:
==9427==    definitely lost: 1,533 bytes in 8 blocks
==9427==    indirectly lost: 6,756 bytes in 7 blocks
==9427==      possibly lost: 0 bytes in 0 blocks
==9427==    still reachable: 3,110,487 bytes in 68,974 blocks
==9427==         suppressed: 0 bytes in 0 blocks
==9427== Rerun with --leak-check=full to see details of leaked memory
==9427== 
==9427== Use --track-origins=yes to see where uninitialised values come from
==9427== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9427== 
==9427== 1 errors in context 1 of 2:
==9427== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9427==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9427==    by 0x488CD0: stringsubst (subst.c:301)
==9427==    by 0x48801B: prefork (subst.c:77)
==9427==    by 0x42B318: execcmd (exec.c:2619)
==9427==    by 0x428CA0: execpline2 (exec.c:1697)
==9427==    by 0x427FD2: execpline (exec.c:1484)
==9427==    by 0x427756: execlist (exec.c:1267)
==9427==    by 0x42717C: execode (exec.c:1073)
==9427==    by 0x431299: runshfunc (exec.c:5040)
==9427==    by 0x430E76: doshfunc (exec.c:4920)
==9427==    by 0x4302FB: execshfunc (exec.c:4557)
==9427==    by 0x42D8C1: execcmd (exec.c:3373)
==9427== 
==9427== 
==9427== 2 errors in context 2 of 2:
==9427== Conditional jump or move depends on uninitialised value(s)
==9427==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9427==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9427==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9427==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9427==    by 0x42D8E9: execcmd (exec.c:3378)
==9427==    by 0x428CA0: execpline2 (exec.c:1697)
==9427==    by 0x427FD2: execpline (exec.c:1484)
==9427==    by 0x42779A: execlist (exec.c:1275)
==9427==    by 0x42717C: execode (exec.c:1073)
==9427==    by 0x431299: runshfunc (exec.c:5040)
==9427==    by 0x430E76: doshfunc (exec.c:4920)
==9427==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9427== 
==9427== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9393-- Caught __NR_exit; running __libc_freeres()
--9393-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFE62DC,  len 4
==9393== 
==9393== HEAP SUMMARY:
==9393==     in use at exit: 3,116,779 bytes in 68,919 blocks
==9393==   total heap usage: 935,375 allocs, 866,456 frees, 66,324,081 bytes allocated
==9393== 
==9500== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9500-by-pythonnut-on-???
==9500== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9500-by-pythonnut-on-???
==9500== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9500-by-pythonnut-on-???
==9500== 
==9500== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9500== don't want to do, unless you know exactly what you're doing,
==9500== or are doing some strange experiment):
==9500==   /usr/lib/valgrind/../../bin/vgdb --pid=9500 ...command...
==9500== 
==9500== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9500==   /path/to/gdb ./zsh
==9500== and then give GDB the following command
==9500==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9500
==9500== --pid is optional if only one valgrind process is running
==9500== 
==9495== Checked 4,845,336 bytes
==9495== 
==9393== Searching for pointers to 68,919 not-freed blocks
--9393--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9393--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9393--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9393--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9393--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9393--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9393--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9393--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9393--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9393--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9393--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9393--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9393--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9393--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9393--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9393--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9393--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9393--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9393--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9393--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9393--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9393--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9393--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9393--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9393--   Scanning root segment: 0x701a000..0x701afff (4096)
--9393--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9393--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9393--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9393--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9393--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9393--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9393--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9393--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9393--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9501-- Caught __NR_exit; running __libc_freeres()
==9495== LEAK SUMMARY:
==9495==    definitely lost: 1,533 bytes in 8 blocks
==9495==    indirectly lost: 6,756 bytes in 7 blocks
==9495==      possibly lost: 0 bytes in 0 blocks
==9495==    still reachable: 3,137,697 bytes in 69,295 blocks
==9495==         suppressed: 0 bytes in 0 blocks
==9495== Rerun with --leak-check=full to see details of leaked memory
==9495== 
==9495== Use --track-origins=yes to see where uninitialised values come from
==9495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9495== 
==9495== 1 errors in context 1 of 2:
==9495== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9495==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9495==    by 0x488CD0: stringsubst (subst.c:301)
==9495==    by 0x48801B: prefork (subst.c:77)
==9495==    by 0x42B318: execcmd (exec.c:2619)
==9495==    by 0x428CA0: execpline2 (exec.c:1697)
==9495==    by 0x427FD2: execpline (exec.c:1484)
==9495==    by 0x427756: execlist (exec.c:1267)
==9495==    by 0x42717C: execode (exec.c:1073)
==9495==    by 0x431299: runshfunc (exec.c:5040)
==9495==    by 0x430E76: doshfunc (exec.c:4920)
==9495==    by 0x4302FB: execshfunc (exec.c:4557)
==9495==    by 0x42D8C1: execcmd (exec.c:3373)
==9495== 
==9495== 
==9495== 2 errors in context 2 of 2:
==9495== Conditional jump or move depends on uninitialised value(s)
==9495==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9495==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9495==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9495==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9495==    by 0x42D8E9: execcmd (exec.c:3378)
==9495==    by 0x428CA0: execpline2 (exec.c:1697)
==9495==    by 0x427FD2: execpline (exec.c:1484)
==9495==    by 0x42779A: execlist (exec.c:1275)
==9495==    by 0x42717C: execode (exec.c:1073)
==9495==    by 0x431299: runshfunc (exec.c:5040)
==9495==    by 0x430E76: doshfunc (exec.c:4920)
==9495==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9495== 
==9495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE6C4C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
==9501== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9501-by-pythonnut-on-???
==9501== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9501-by-pythonnut-on-???
==9501== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9501-by-pythonnut-on-???
==9501== 
==9501== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9501== don't want to do, unless you know exactly what you're doing,
==9501== or are doing some strange experiment):
==9501==   /usr/lib/valgrind/../../bin/vgdb --pid=9501 ...command...
==9501== 
==9501== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9501==   /path/to/gdb ./zsh
==9501== and then give GDB the following command
==9501==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9501
==9501== --pid is optional if only one valgrind process is running
==9501== 
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
--9501-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9501== 
==9501== HEAP SUMMARY:
==9501==     in use at exit: 3,160,739 bytes in 69,840 blocks
==9501==   total heap usage: 1,047,357 allocs, 977,517 frees, 71,854,126 bytes allocated
==9501== 
client request: code 4d430005,  addr 0xFFEFEE74C,  len 4
--9503-- Caught __NR_exit; running __libc_freeres()
==9501== Searching for pointers to 69,840 not-freed blocks
--9501--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9501--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9501--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9501--   Scanning root segment: 0x4037000..0x403afff (16384)
--9501--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9501--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9501--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9501--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9501--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9501--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9501--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9501--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9501--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9501--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9501--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9501--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9501--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9501--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9501--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9501--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9501--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9501--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9501--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9501--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9501--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9501--   Scanning root segment: 0x701a000..0x701afff (4096)
--9501--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9501--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9501--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9501--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9501--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9501--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9501--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9501--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9501--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9503== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9503-by-pythonnut-on-???
==9503== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9503-by-pythonnut-on-???
==9503== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9503-by-pythonnut-on-???
==9503== 
==9503== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9503== don't want to do, unless you know exactly what you're doing,
==9503== or are doing some strange experiment):
==9503==   /usr/lib/valgrind/../../bin/vgdb --pid=9503 ...command...
==9503== 
==9503== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9503==   /path/to/gdb ./zsh
==9503== and then give GDB the following command
==9503==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9503
==9503== --pid is optional if only one valgrind process is running
==9503== 
==9393== Checked 4,780,024 bytes
==9393== 
--9503-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9393== LEAK SUMMARY:
==9393==    definitely lost: 1,533 bytes in 8 blocks
==9393==    indirectly lost: 6,756 bytes in 7 blocks
==9393==      possibly lost: 0 bytes in 0 blocks
==9393==    still reachable: 3,108,490 bytes in 68,904 blocks
==9393==         suppressed: 0 bytes in 0 blocks
==9393== Rerun with --leak-check=full to see details of leaked memory
==9393== 
==9393== Use --track-origins=yes to see where uninitialised values come from
==9393== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9393== 
==9393== 1 errors in context 1 of 2:
==9393== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9393==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9393==    by 0x488CD0: stringsubst (subst.c:301)
==9393==    by 0x48801B: prefork (subst.c:77)
==9393==    by 0x42B318: execcmd (exec.c:2619)
==9393==    by 0x428CA0: execpline2 (exec.c:1697)
==9393==    by 0x427FD2: execpline (exec.c:1484)
==9393==    by 0x427756: execlist (exec.c:1267)
==9393==    by 0x42717C: execode (exec.c:1073)
==9393==    by 0x431299: runshfunc (exec.c:5040)
==9393==    by 0x430E76: doshfunc (exec.c:4920)
==9393==    by 0x4302FB: execshfunc (exec.c:4557)
==9393==    by 0x42D8C1: execcmd (exec.c:3373)
==9393== 
==9393== 
==9393== 2 errors in context 2 of 2:
==9393== Conditional jump or move depends on uninitialised value(s)
==9393==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9393==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9393==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9393==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9393==    by 0x42D8E9: execcmd (exec.c:3378)
==9393==    by 0x428CA0: execpline2 (exec.c:1697)
==9393==    by 0x427FD2: execpline (exec.c:1484)
==9393==    by 0x42779A: execlist (exec.c:1275)
==9393==    by 0x42717C: execode (exec.c:1073)
==9393==    by 0x431299: runshfunc (exec.c:5040)
==9393==    by 0x430E76: doshfunc (exec.c:4920)
==9393==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9393== 
==9393== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9503== 
==9503== HEAP SUMMARY:
==9503==     in use at exit: 3,147,837 bytes in 69,302 blocks
==9503==   total heap usage: 939,264 allocs, 869,962 frees, 68,127,152 bytes allocated
==9503== 
==9503== Searching for pointers to 69,302 not-freed blocks
--9503--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9503--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9503--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9503--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9503--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9503--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9503--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9503--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9503--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9503--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9503--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9503--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9503--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9503--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9503--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9503--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9503--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9503--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9503--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9503--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9503--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9503--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9503--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9503--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9503--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9503--   Scanning root segment: 0x701a000..0x701afff (4096)
--9503--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9503--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9503--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9503--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9503--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9503--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9503--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9503--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9503--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9501== Checked 4,832,592 bytes
==9501== 
==9501== LEAK SUMMARY:
==9501==    definitely lost: 1,533 bytes in 8 blocks
==9501==    indirectly lost: 6,756 bytes in 7 blocks
==9501==      possibly lost: 0 bytes in 0 blocks
==9501==    still reachable: 3,152,450 bytes in 69,825 blocks
==9501==         suppressed: 0 bytes in 0 blocks
==9501== Rerun with --leak-check=full to see details of leaked memory
==9501== 
==9501== Use --track-origins=yes to see where uninitialised values come from
==9501== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9501== 
==9501== 1 errors in context 1 of 2:
==9501== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9501==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9501==    by 0x488CD0: stringsubst (subst.c:301)
==9501==    by 0x48801B: prefork (subst.c:77)
==9501==    by 0x42B318: execcmd (exec.c:2619)
==9501==    by 0x428CA0: execpline2 (exec.c:1697)
==9501==    by 0x427FD2: execpline (exec.c:1484)
==9501==    by 0x427756: execlist (exec.c:1267)
==9501==    by 0x42717C: execode (exec.c:1073)
==9501==    by 0x431299: runshfunc (exec.c:5040)
==9501==    by 0x430E76: doshfunc (exec.c:4920)
==9501==    by 0x4302FB: execshfunc (exec.c:4557)
==9501==    by 0x42D8C1: execcmd (exec.c:3373)
==9501== 
==9501== 
==9501== 2 errors in context 2 of 2:
==9501== Conditional jump or move depends on uninitialised value(s)
==9501==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9501==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9501==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9501==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9501==    by 0x42D8E9: execcmd (exec.c:3378)
==9501==    by 0x428CA0: execpline2 (exec.c:1697)
==9501==    by 0x427FD2: execpline (exec.c:1484)
==9501==    by 0x42779A: execlist (exec.c:1275)
==9501==    by 0x42717C: execode (exec.c:1073)
==9501==    by 0x431299: runshfunc (exec.c:5040)
==9501==    by 0x430E76: doshfunc (exec.c:4920)
==9501==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9501== 
==9501== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9500-- Caught __NR_exit; running __libc_freeres()
--9500-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9500== 
==9500== HEAP SUMMARY:
==9500==     in use at exit: 3,160,675 bytes in 69,837 blocks
==9500==   total heap usage: 1,047,355 allocs, 977,518 frees, 71,853,885 bytes allocated
==9500== 
==9503== Checked 4,845,584 bytes
==9503== 
==9500== Searching for pointers to 69,837 not-freed blocks
--9500--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9500--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9500--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9500--   Scanning root segment: 0x4037000..0x403afff (16384)
--9500--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9500--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9500--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9500--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9500--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9500--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9500--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9500--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9500--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9500--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9500--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9500--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9500--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9500--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9500--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9500--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9500--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9500--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9500--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9500--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9500--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9500--   Scanning root segment: 0x701a000..0x701afff (4096)
--9500--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9500--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9500--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9500--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9500--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9500--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9500--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9500--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9500--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9503== LEAK SUMMARY:
==9503==    definitely lost: 1,533 bytes in 8 blocks
==9503==    indirectly lost: 6,756 bytes in 7 blocks
==9503==      possibly lost: 0 bytes in 0 blocks
==9503==    still reachable: 3,139,548 bytes in 69,287 blocks
==9503==         suppressed: 0 bytes in 0 blocks
==9503== Rerun with --leak-check=full to see details of leaked memory
==9503== 
==9503== Use --track-origins=yes to see where uninitialised values come from
==9503== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9503== 
==9503== 1 errors in context 1 of 2:
==9503== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9503==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9503==    by 0x488CD0: stringsubst (subst.c:301)
==9503==    by 0x48801B: prefork (subst.c:77)
==9503==    by 0x42B318: execcmd (exec.c:2619)
==9503==    by 0x428CA0: execpline2 (exec.c:1697)
==9503==    by 0x427FD2: execpline (exec.c:1484)
==9503==    by 0x427756: execlist (exec.c:1267)
==9503==    by 0x42717C: execode (exec.c:1073)
==9503==    by 0x431299: runshfunc (exec.c:5040)
==9503==    by 0x430E76: doshfunc (exec.c:4920)
==9503==    by 0x4302FB: execshfunc (exec.c:4557)
==9503==    by 0x42D8C1: execcmd (exec.c:3373)
==9503== 
==9503== 
==9503== 2 errors in context 2 of 2:
==9503== Conditional jump or move depends on uninitialised value(s)
==9503==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9503==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9503==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9503==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9503==    by 0x42D8E9: execcmd (exec.c:3378)
==9503==    by 0x428CA0: execpline2 (exec.c:1697)
==9503==    by 0x427FD2: execpline (exec.c:1484)
==9503==    by 0x42779A: execlist (exec.c:1275)
==9503==    by 0x42717C: execode (exec.c:1073)
==9503==    by 0x431299: runshfunc (exec.c:5040)
==9503==    by 0x430E76: doshfunc (exec.c:4920)
==9503==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9503== 
==9503== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9505== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9505-by-pythonnut-on-???
==9505== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9505-by-pythonnut-on-???
==9505== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9505-by-pythonnut-on-???
==9505== 
==9505== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9505== don't want to do, unless you know exactly what you're doing,
==9505== or are doing some strange experiment):
==9505==   /usr/lib/valgrind/../../bin/vgdb --pid=9505 ...command...
==9505== 
==9505== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9505==   /path/to/gdb ./zsh
==9505== and then give GDB the following command
==9505==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9505
==9505== --pid is optional if only one valgrind process is running
==9505== 
--9505-- Caught __NR_exit; running __libc_freeres()
--9505-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9505== 
==9505== HEAP SUMMARY:
==9505==     in use at exit: 3,147,021 bytes in 69,258 blocks
==9505==   total heap usage: 939,221 allocs, 869,963 frees, 68,126,634 bytes allocated
==9505== 
==9505== Searching for pointers to 69,258 not-freed blocks
--9505--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9505--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9505--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9505--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9505--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9505--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9505--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9505--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9505--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9505--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9505--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9505--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9505--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9505--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9505--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9505--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9505--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9505--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9505--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9505--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9505--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9505--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9505--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9505--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9505--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9505--   Scanning root segment: 0x701a000..0x701afff (4096)
--9505--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9505--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9505--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9505--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9505--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9505--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9505--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9505--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9505--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9500== Checked 4,831,904 bytes
==9500== 
==9500== LEAK SUMMARY:
==9500==    definitely lost: 1,533 bytes in 8 blocks
==9500==    indirectly lost: 6,756 bytes in 7 blocks
==9500==      possibly lost: 0 bytes in 0 blocks
==9500==    still reachable: 3,152,386 bytes in 69,822 blocks
==9500==         suppressed: 0 bytes in 0 blocks
==9500== Rerun with --leak-check=full to see details of leaked memory
==9500== 
==9500== Use --track-origins=yes to see where uninitialised values come from
==9500== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9500== 
==9500== 1 errors in context 1 of 2:
==9500== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9500==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9500==    by 0x488CD0: stringsubst (subst.c:301)
==9500==    by 0x48801B: prefork (subst.c:77)
==9500==    by 0x42B318: execcmd (exec.c:2619)
==9500==    by 0x428CA0: execpline2 (exec.c:1697)
==9500==    by 0x427FD2: execpline (exec.c:1484)
==9500==    by 0x427756: execlist (exec.c:1267)
==9500==    by 0x42717C: execode (exec.c:1073)
==9500==    by 0x431299: runshfunc (exec.c:5040)
==9500==    by 0x430E76: doshfunc (exec.c:4920)
==9500==    by 0x4302FB: execshfunc (exec.c:4557)
==9500==    by 0x42D8C1: execcmd (exec.c:3373)
==9500== 
==9500== 
==9500== 2 errors in context 2 of 2:
==9500== Conditional jump or move depends on uninitialised value(s)
==9500==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9500==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9500==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9500==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9500==    by 0x42D8E9: execcmd (exec.c:3378)
==9500==    by 0x428CA0: execpline2 (exec.c:1697)
==9500==    by 0x427FD2: execpline (exec.c:1484)
==9500==    by 0x42779A: execlist (exec.c:1275)
==9500==    by 0x42717C: execode (exec.c:1073)
==9500==    by 0x431299: runshfunc (exec.c:5040)
==9500==    by 0x430E76: doshfunc (exec.c:4920)
==9500==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9500== 
==9500== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9506-- Caught __NR_exit; running __libc_freeres()
==9506== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9506-by-pythonnut-on-???
==9506== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9506-by-pythonnut-on-???
==9506== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9506-by-pythonnut-on-???
==9506== 
==9506== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9506== don't want to do, unless you know exactly what you're doing,
==9506== or are doing some strange experiment):
==9506==   /usr/lib/valgrind/../../bin/vgdb --pid=9506 ...command...
==9506== 
==9506== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9506==   /path/to/gdb ./zsh
==9506== and then give GDB the following command
==9506==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9506
==9506== --pid is optional if only one valgrind process is running
==9506== 
--9506-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9506== 
==9506== HEAP SUMMARY:
==9506==     in use at exit: 3,160,682 bytes in 69,837 blocks
==9506==   total heap usage: 1,047,370 allocs, 977,533 frees, 71,858,883 bytes allocated
==9506== 
==9505== Checked 4,844,264 bytes
==9505== 
==9506== Searching for pointers to 69,837 not-freed blocks
--9506--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9506--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9506--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9506--   Scanning root segment: 0x4037000..0x403afff (16384)
--9506--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9506--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9506--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9506--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9506--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9506--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9506--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9506--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9506--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9506--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9506--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9506--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9506--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9506--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9506--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9506--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9506--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9506--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9506--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9506--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9506--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9506--   Scanning root segment: 0x701a000..0x701afff (4096)
--9506--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9506--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9506--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9506--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9506--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9506--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9506--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9506--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9506--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9505== LEAK SUMMARY:
==9505==    definitely lost: 1,533 bytes in 8 blocks
==9505==    indirectly lost: 6,756 bytes in 7 blocks
==9505==      possibly lost: 0 bytes in 0 blocks
==9505==    still reachable: 3,138,732 bytes in 69,243 blocks
==9505==         suppressed: 0 bytes in 0 blocks
==9505== Rerun with --leak-check=full to see details of leaked memory
==9505== 
==9505== Use --track-origins=yes to see where uninitialised values come from
==9505== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9505== 
==9505== 1 errors in context 1 of 2:
==9505== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9505==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9505==    by 0x488CD0: stringsubst (subst.c:301)
==9505==    by 0x48801B: prefork (subst.c:77)
==9505==    by 0x42B318: execcmd (exec.c:2619)
==9505==    by 0x428CA0: execpline2 (exec.c:1697)
==9505==    by 0x427FD2: execpline (exec.c:1484)
==9505==    by 0x427756: execlist (exec.c:1267)
==9505==    by 0x42717C: execode (exec.c:1073)
==9505==    by 0x431299: runshfunc (exec.c:5040)
==9505==    by 0x430E76: doshfunc (exec.c:4920)
==9505==    by 0x4302FB: execshfunc (exec.c:4557)
==9505==    by 0x42D8C1: execcmd (exec.c:3373)
==9505== 
==9505== 
==9505== 2 errors in context 2 of 2:
==9505== Conditional jump or move depends on uninitialised value(s)
==9505==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9505==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9505==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9505==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9505==    by 0x42D8E9: execcmd (exec.c:3378)
==9505==    by 0x428CA0: execpline2 (exec.c:1697)
==9505==    by 0x427FD2: execpline (exec.c:1484)
==9505==    by 0x42779A: execlist (exec.c:1275)
==9505==    by 0x42717C: execode (exec.c:1073)
==9505==    by 0x431299: runshfunc (exec.c:5040)
==9505==    by 0x430E76: doshfunc (exec.c:4920)
==9505==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9505== 
==9505== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF2EC,  len 4
==9508== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9508-by-pythonnut-on-???
==9508== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9508-by-pythonnut-on-???
==9508== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9508-by-pythonnut-on-???
==9508== 
==9508== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9508== don't want to do, unless you know exactly what you're doing,
==9508== or are doing some strange experiment):
==9508==   /usr/lib/valgrind/../../bin/vgdb --pid=9508 ...command...
==9508== 
==9508== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9508==   /path/to/gdb ./zsh
==9508== and then give GDB the following command
==9508==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9508
==9508== --pid is optional if only one valgrind process is running
==9508== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
==9509== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9509-by-pythonnut-on-???
==9509== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9509-by-pythonnut-on-???
==9509== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9509-by-pythonnut-on-???
==9509== 
==9509== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9509== don't want to do, unless you know exactly what you're doing,
==9509== or are doing some strange experiment):
==9509==   /usr/lib/valgrind/../../bin/vgdb --pid=9509 ...command...
==9509== 
==9509== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9509==   /path/to/gdb ./zsh
==9509== and then give GDB the following command
==9509==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9509
==9509== --pid is optional if only one valgrind process is running
==9509== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
--9509-- Caught __NR_exit; running __libc_freeres()
==9506== Checked 4,832,040 bytes
==9506== 
--9509-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9509== 
==9506== LEAK SUMMARY:
==9506==    definitely lost: 1,533 bytes in 8 blocks
==9506==    indirectly lost: 6,756 bytes in 7 blocks
==9506==      possibly lost: 0 bytes in 0 blocks
==9506==    still reachable: 3,152,393 bytes in 69,822 blocks
==9506==         suppressed: 0 bytes in 0 blocks
==9506== Rerun with --leak-check=full to see details of leaked memory
==9506== 
==9506== Use --track-origins=yes to see where uninitialised values come from
==9506== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9506== 
==9506== 1 errors in context 1 of 2:
==9506== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9506==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9506==    by 0x488CD0: stringsubst (subst.c:301)
==9506==    by 0x48801B: prefork (subst.c:77)
==9506==    by 0x42B318: execcmd (exec.c:2619)
==9506==    by 0x428CA0: execpline2 (exec.c:1697)
==9506==    by 0x427FD2: execpline (exec.c:1484)
==9506==    by 0x427756: execlist (exec.c:1267)
==9506==    by 0x42717C: execode (exec.c:1073)
==9506==    by 0x431299: runshfunc (exec.c:5040)
==9506==    by 0x430E76: doshfunc (exec.c:4920)
==9506==    by 0x4302FB: execshfunc (exec.c:4557)
==9506==    by 0x42D8C1: execcmd (exec.c:3373)
==9506== 
==9506== 
==9506== 2 errors in context 2 of 2:
==9506== Conditional jump or move depends on uninitialised value(s)
==9506==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9506==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9506==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9506==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9506==    by 0x42D8E9: execcmd (exec.c:3378)
==9506==    by 0x428CA0: execpline2 (exec.c:1697)
==9506==    by 0x427FD2: execpline (exec.c:1484)
==9506==    by 0x42779A: execlist (exec.c:1275)
==9506==    by 0x42717C: execode (exec.c:1073)
==9506==    by 0x431299: runshfunc (exec.c:5040)
==9506==    by 0x430E76: doshfunc (exec.c:4920)
==9506==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9506== 
==9506== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9509== HEAP SUMMARY:
==9509==     in use at exit: 3,154,825 bytes in 69,482 blocks
==9509==   total heap usage: 939,997 allocs, 870,515 frees, 68,412,810 bytes allocated
==9509== 
==9509== Searching for pointers to 69,482 not-freed blocks
--9509--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9509--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9509--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9509--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9509--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9509--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9509--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9509--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9509--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9509--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9509--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9509--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9509--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9509--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9509--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9509--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9509--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9509--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9509--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9509--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9509--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9509--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9509--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9509--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9509--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9509--   Scanning root segment: 0x701a000..0x701afff (4096)
--9509--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9509--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9509--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9509--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9509--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9509--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9509--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9509--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9509--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9510-- Caught __NR_exit; running __libc_freeres()
==9510== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9510-by-pythonnut-on-???
==9510== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9510-by-pythonnut-on-???
==9510== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9510-by-pythonnut-on-???
==9510== 
==9510== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9510== don't want to do, unless you know exactly what you're doing,
==9510== or are doing some strange experiment):
==9510==   /usr/lib/valgrind/../../bin/vgdb --pid=9510 ...command...
==9510== 
==9510== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9510==   /path/to/gdb ./zsh
==9510== and then give GDB the following command
==9510==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9510
==9510== --pid is optional if only one valgrind process is running
==9510== 
--9510-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9510== 
==9510== HEAP SUMMARY:
==9510==     in use at exit: 3,160,778 bytes in 69,837 blocks
==9510==   total heap usage: 1,047,386 allocs, 977,549 frees, 71,863,670 bytes allocated
==9510== 
==9510== Searching for pointers to 69,837 not-freed blocks
--9510--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9510--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9510--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9510--   Scanning root segment: 0x4037000..0x403afff (16384)
--9510--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9510--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9510--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9510--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9510--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9510--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9510--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9510--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9510--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9510--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9510--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9510--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9510--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9510--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9510--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9510--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9510--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9510--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9510--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9510--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9510--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9510--   Scanning root segment: 0x701a000..0x701afff (4096)
--9510--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9510--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9510--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9510--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9510--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9510--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9510--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9510--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9510--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9509== Checked 4,852,952 bytes
==9509== 
==9509== LEAK SUMMARY:
==9509==    definitely lost: 1,533 bytes in 8 blocks
==9509==    indirectly lost: 6,756 bytes in 7 blocks
==9509==      possibly lost: 0 bytes in 0 blocks
==9509==    still reachable: 3,146,536 bytes in 69,467 blocks
==9509==         suppressed: 0 bytes in 0 blocks
==9509== Rerun with --leak-check=full to see details of leaked memory
==9509== 
==9509== Use --track-origins=yes to see where uninitialised values come from
==9509== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9509== 
==9509== 1 errors in context 1 of 2:
==9509== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9509==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9509==    by 0x488CD0: stringsubst (subst.c:301)
==9509==    by 0x48801B: prefork (subst.c:77)
==9509==    by 0x42B318: execcmd (exec.c:2619)
==9509==    by 0x428CA0: execpline2 (exec.c:1697)
==9509==    by 0x427FD2: execpline (exec.c:1484)
==9509==    by 0x427756: execlist (exec.c:1267)
==9509==    by 0x42717C: execode (exec.c:1073)
==9509==    by 0x431299: runshfunc (exec.c:5040)
==9509==    by 0x430E76: doshfunc (exec.c:4920)
==9509==    by 0x4302FB: execshfunc (exec.c:4557)
==9509==    by 0x42D8C1: execcmd (exec.c:3373)
==9509== 
==9509== 
==9509== 2 errors in context 2 of 2:
==9509== Conditional jump or move depends on uninitialised value(s)
==9509==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9509==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9509==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9509==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9509==    by 0x42D8E9: execcmd (exec.c:3378)
==9509==    by 0x428CA0: execpline2 (exec.c:1697)
==9509==    by 0x427FD2: execpline (exec.c:1484)
==9509==    by 0x42779A: execlist (exec.c:1275)
==9509==    by 0x42717C: execode (exec.c:1073)
==9509==    by 0x431299: runshfunc (exec.c:5040)
==9509==    by 0x430E76: doshfunc (exec.c:4920)
==9509==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9509== 
==9509== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9508-- Caught __NR_exit; running __libc_freeres()
==9510== Checked 4,831,320 bytes
==9510== 
--9508-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9508== 
==9508== HEAP SUMMARY:
==9508==     in use at exit: 3,152,473 bytes in 69,402 blocks
==9508==   total heap usage: 939,903 allocs, 870,501 frees, 68,213,615 bytes allocated
==9508== 
==9510== LEAK SUMMARY:
==9510==    definitely lost: 1,533 bytes in 8 blocks
==9510==    indirectly lost: 6,756 bytes in 7 blocks
==9510==      possibly lost: 0 bytes in 0 blocks
==9510==    still reachable: 3,152,489 bytes in 69,822 blocks
==9510==         suppressed: 0 bytes in 0 blocks
==9510== Rerun with --leak-check=full to see details of leaked memory
==9510== 
==9510== Use --track-origins=yes to see where uninitialised values come from
==9510== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9510== 
==9510== 1 errors in context 1 of 2:
==9510== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9510==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9510==    by 0x488CD0: stringsubst (subst.c:301)
==9510==    by 0x48801B: prefork (subst.c:77)
==9510==    by 0x42B318: execcmd (exec.c:2619)
==9510==    by 0x428CA0: execpline2 (exec.c:1697)
==9510==    by 0x427FD2: execpline (exec.c:1484)
==9510==    by 0x427756: execlist (exec.c:1267)
==9510==    by 0x42717C: execode (exec.c:1073)
==9510==    by 0x431299: runshfunc (exec.c:5040)
==9510==    by 0x430E76: doshfunc (exec.c:4920)
==9510==    by 0x4302FB: execshfunc (exec.c:4557)
==9510==    by 0x42D8C1: execcmd (exec.c:3373)
==9510== 
==9510== 
==9510== 2 errors in context 2 of 2:
==9510== Conditional jump or move depends on uninitialised value(s)
==9510==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9510==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9510==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9510==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9510==    by 0x42D8E9: execcmd (exec.c:3378)
==9510==    by 0x428CA0: execpline2 (exec.c:1697)
==9510==    by 0x427FD2: execpline (exec.c:1484)
==9510==    by 0x42779A: execlist (exec.c:1275)
==9510==    by 0x42717C: execode (exec.c:1073)
==9510==    by 0x431299: runshfunc (exec.c:5040)
==9510==    by 0x430E76: doshfunc (exec.c:4920)
==9510==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9510== 
==9510== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9508== Searching for pointers to 69,402 not-freed blocks
--9508--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9508--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9508--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9508--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9508--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9508--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9508--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9508--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9508--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9508--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9508--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9508--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9508--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9508--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9508--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9508--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9508--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9508--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9508--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9508--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9508--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9508--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9508--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9508--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9508--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9508--   Scanning root segment: 0x701a000..0x701afff (4096)
--9508--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9508--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9508--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9508--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9508--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9508--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9508--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9508--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9508--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9511== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9511-by-pythonnut-on-???
==9511== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9511-by-pythonnut-on-???
==9511== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9511-by-pythonnut-on-???
==9511== 
==9511== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9511== don't want to do, unless you know exactly what you're doing,
==9511== or are doing some strange experiment):
==9511==   /usr/lib/valgrind/../../bin/vgdb --pid=9511 ...command...
==9511== 
==9511== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9511==   /path/to/gdb ./zsh
==9511== and then give GDB the following command
==9511==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9511
==9511== --pid is optional if only one valgrind process is running
==9511== 
--9511-- Caught __NR_exit; running __libc_freeres()
--9511-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9511== 
==9511== HEAP SUMMARY:
==9511==     in use at exit: 3,161,020 bytes in 69,843 blocks
==9511==   total heap usage: 1,047,434 allocs, 977,591 frees, 71,872,686 bytes allocated
==9511== 
==9511== Searching for pointers to 69,843 not-freed blocks
--9511--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9511--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9511--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9511--   Scanning root segment: 0x4037000..0x403afff (16384)
--9511--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9511--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9511--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9511--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9511--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9511--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9511--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9511--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9511--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9511--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9511--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9511--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9511--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9511--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9511--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9511--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9511--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9511--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9511--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9511--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9511--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9511--   Scanning root segment: 0x701a000..0x701afff (4096)
--9511--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9511--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9511--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9511--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9511--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9511--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9511--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9511--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9511--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9508== Checked 4,848,904 bytes
==9508== 
==9508== LEAK SUMMARY:
==9508==    definitely lost: 1,533 bytes in 8 blocks
==9508==    indirectly lost: 6,756 bytes in 7 blocks
==9508==      possibly lost: 0 bytes in 0 blocks
==9508==    still reachable: 3,144,184 bytes in 69,387 blocks
==9508==         suppressed: 0 bytes in 0 blocks
==9508== Rerun with --leak-check=full to see details of leaked memory
==9508== 
==9508== Use --track-origins=yes to see where uninitialised values come from
==9508== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9508== 
==9508== 1 errors in context 1 of 2:
==9508== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9508==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9508==    by 0x488CD0: stringsubst (subst.c:301)
==9508==    by 0x48801B: prefork (subst.c:77)
==9508==    by 0x42B318: execcmd (exec.c:2619)
==9508==    by 0x428CA0: execpline2 (exec.c:1697)
==9508==    by 0x427FD2: execpline (exec.c:1484)
==9508==    by 0x427756: execlist (exec.c:1267)
==9508==    by 0x42717C: execode (exec.c:1073)
==9508==    by 0x431299: runshfunc (exec.c:5040)
==9508==    by 0x430E76: doshfunc (exec.c:4920)
==9508==    by 0x4302FB: execshfunc (exec.c:4557)
==9508==    by 0x42D8C1: execcmd (exec.c:3373)
==9508== 
==9508== 
==9508== 2 errors in context 2 of 2:
==9508== Conditional jump or move depends on uninitialised value(s)
==9508==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9508==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9508==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9508==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9508==    by 0x42D8E9: execcmd (exec.c:3378)
==9508==    by 0x428CA0: execpline2 (exec.c:1697)
==9508==    by 0x427FD2: execpline (exec.c:1484)
==9508==    by 0x42779A: execlist (exec.c:1275)
==9508==    by 0x42717C: execode (exec.c:1073)
==9508==    by 0x431299: runshfunc (exec.c:5040)
==9508==    by 0x430E76: doshfunc (exec.c:4920)
==9508==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9508== 
==9508== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
==9512== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9512-by-pythonnut-on-???
==9512== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9512-by-pythonnut-on-???
==9512== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9512-by-pythonnut-on-???
==9512== 
==9512== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9512== don't want to do, unless you know exactly what you're doing,
==9512== or are doing some strange experiment):
==9512==   /usr/lib/valgrind/../../bin/vgdb --pid=9512 ...command...
==9512== 
==9512== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9512==   /path/to/gdb ./zsh
==9512== and then give GDB the following command
==9512==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9512
==9512== --pid is optional if only one valgrind process is running
==9512== 
==9513== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9513-by-pythonnut-on-???
==9513== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9513-by-pythonnut-on-???
==9513== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9513-by-pythonnut-on-???
==9513== 
==9513== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9513== don't want to do, unless you know exactly what you're doing,
==9513== or are doing some strange experiment):
==9513==   /usr/lib/valgrind/../../bin/vgdb --pid=9513 ...command...
==9513== 
==9513== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9513==   /path/to/gdb ./zsh
==9513== and then give GDB the following command
==9513==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9513
==9513== --pid is optional if only one valgrind process is running
==9513== 
--9513-- Caught __NR_exit; running __libc_freeres()
==9511== Checked 4,831,488 bytes
==9511== 
--9513-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9511== LEAK SUMMARY:
==9511==    definitely lost: 1,533 bytes in 8 blocks
==9511==    indirectly lost: 6,756 bytes in 7 blocks
==9511==      possibly lost: 0 bytes in 0 blocks
==9511==    still reachable: 3,152,731 bytes in 69,828 blocks
==9511==         suppressed: 0 bytes in 0 blocks
==9511== Rerun with --leak-check=full to see details of leaked memory
==9511== 
==9511== Use --track-origins=yes to see where uninitialised values come from
==9511== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9511== 
==9511== 1 errors in context 1 of 2:
==9511== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9511==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9511==    by 0x488CD0: stringsubst (subst.c:301)
==9511==    by 0x48801B: prefork (subst.c:77)
==9511==    by 0x42B318: execcmd (exec.c:2619)
==9511==    by 0x428CA0: execpline2 (exec.c:1697)
==9511==    by 0x427FD2: execpline (exec.c:1484)
==9511==    by 0x427756: execlist (exec.c:1267)
==9511==    by 0x42717C: execode (exec.c:1073)
==9511==    by 0x431299: runshfunc (exec.c:5040)
==9511==    by 0x430E76: doshfunc (exec.c:4920)
==9511==    by 0x4302FB: execshfunc (exec.c:4557)
==9511==    by 0x42D8C1: execcmd (exec.c:3373)
==9511== 
==9511== 
==9511== 2 errors in context 2 of 2:
==9511== Conditional jump or move depends on uninitialised value(s)
==9511==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9511==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9511==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9511==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9511==    by 0x42D8E9: execcmd (exec.c:3378)
==9511==    by 0x428CA0: execpline2 (exec.c:1697)
==9511==    by 0x427FD2: execpline (exec.c:1484)
==9511==    by 0x42779A: execlist (exec.c:1275)
==9511==    by 0x42717C: execode (exec.c:1073)
==9511==    by 0x431299: runshfunc (exec.c:5040)
==9511==    by 0x430E76: doshfunc (exec.c:4920)
==9511==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9511== 
==9511== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9513== 
==9513== HEAP SUMMARY:
==9513==     in use at exit: 3,160,984 bytes in 69,570 blocks
==9513==   total heap usage: 940,215 allocs, 870,645 frees, 68,474,381 bytes allocated
==9513== 
--9516-- Caught __NR_exit; running __libc_freeres()
==9513== Searching for pointers to 69,570 not-freed blocks
--9513--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9513--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9513--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9513--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9513--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9513--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9513--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9513--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9513--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9513--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9513--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9513--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9513--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9513--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9513--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9513--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9513--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9513--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9513--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9513--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9513--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9513--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9513--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9513--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9513--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9513--   Scanning root segment: 0x701a000..0x701afff (4096)
--9513--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9513--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9513--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9513--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9513--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9513--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9513--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9513--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9513--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9516== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9516-by-pythonnut-on-???
==9516== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9516-by-pythonnut-on-???
==9516== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9516-by-pythonnut-on-???
==9516== 
==9516== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9516== don't want to do, unless you know exactly what you're doing,
==9516== or are doing some strange experiment):
==9516==   /usr/lib/valgrind/../../bin/vgdb --pid=9516 ...command...
==9516== 
==9516== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9516==   /path/to/gdb ./zsh
==9516== and then give GDB the following command
==9516==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9516
==9516== --pid is optional if only one valgrind process is running
==9516== 
--9516-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9516== 
==9516== HEAP SUMMARY:
==9516==     in use at exit: 3,160,956 bytes in 69,843 blocks
==9516==   total heap usage: 1,047,414 allocs, 977,571 frees, 71,870,456 bytes allocated
==9516== 
==9516== Searching for pointers to 69,843 not-freed blocks
--9516--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9516--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9516--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9516--   Scanning root segment: 0x4037000..0x403afff (16384)
--9516--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9516--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9516--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9516--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9516--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9516--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9516--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9516--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9516--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9516--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9516--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9516--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9516--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9516--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9516--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9516--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9516--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9516--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9516--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9516--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9516--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9516--   Scanning root segment: 0x701a000..0x701afff (4096)
--9516--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9516--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9516--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9516--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9516--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9516--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9516--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9516--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9516--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9513== Checked 4,876,600 bytes
==9513== 
==9513== LEAK SUMMARY:
==9513==    definitely lost: 1,533 bytes in 8 blocks
==9513==    indirectly lost: 6,756 bytes in 7 blocks
==9513==      possibly lost: 0 bytes in 0 blocks
==9513==    still reachable: 3,152,695 bytes in 69,555 blocks
==9513==         suppressed: 0 bytes in 0 blocks
==9513== Rerun with --leak-check=full to see details of leaked memory
==9513== 
==9513== Use --track-origins=yes to see where uninitialised values come from
==9513== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9513== 
==9513== 1 errors in context 1 of 2:
==9513== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9513==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9513==    by 0x488CD0: stringsubst (subst.c:301)
==9513==    by 0x48801B: prefork (subst.c:77)
==9513==    by 0x42B318: execcmd (exec.c:2619)
==9513==    by 0x428CA0: execpline2 (exec.c:1697)
==9513==    by 0x427FD2: execpline (exec.c:1484)
==9513==    by 0x427756: execlist (exec.c:1267)
==9513==    by 0x42717C: execode (exec.c:1073)
==9513==    by 0x431299: runshfunc (exec.c:5040)
==9513==    by 0x430E76: doshfunc (exec.c:4920)
==9513==    by 0x4302FB: execshfunc (exec.c:4557)
==9513==    by 0x42D8C1: execcmd (exec.c:3373)
==9513== 
==9513== 
==9513== 2 errors in context 2 of 2:
==9513== Conditional jump or move depends on uninitialised value(s)
==9513==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9513==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9513==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9513==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9513==    by 0x42D8E9: execcmd (exec.c:3378)
==9513==    by 0x428CA0: execpline2 (exec.c:1697)
==9513==    by 0x427FD2: execpline (exec.c:1484)
==9513==    by 0x42779A: execlist (exec.c:1275)
==9513==    by 0x42717C: execode (exec.c:1073)
==9513==    by 0x431299: runshfunc (exec.c:5040)
==9513==    by 0x430E76: doshfunc (exec.c:4920)
==9513==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9513== 
==9513== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9512-- Caught __NR_exit; running __libc_freeres()
--9512-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9512== 
==9516== Checked 4,831,416 bytes
==9512== HEAP SUMMARY:
==9512==     in use at exit: 3,158,633 bytes in 69,490 blocks
==9512==   total heap usage: 940,155 allocs, 870,665 frees, 68,244,483 bytes allocated
==9512== 
==9516== 
==9516== LEAK SUMMARY:
==9516==    definitely lost: 1,533 bytes in 8 blocks
==9516==    indirectly lost: 6,756 bytes in 7 blocks
==9516==      possibly lost: 0 bytes in 0 blocks
==9516==    still reachable: 3,152,667 bytes in 69,828 blocks
==9516==         suppressed: 0 bytes in 0 blocks
==9516== Rerun with --leak-check=full to see details of leaked memory
==9516== 
==9516== Use --track-origins=yes to see where uninitialised values come from
==9516== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9516== 
==9516== 1 errors in context 1 of 2:
==9516== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9516==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9516==    by 0x488CD0: stringsubst (subst.c:301)
==9516==    by 0x48801B: prefork (subst.c:77)
==9516==    by 0x42B318: execcmd (exec.c:2619)
==9516==    by 0x428CA0: execpline2 (exec.c:1697)
==9516==    by 0x427FD2: execpline (exec.c:1484)
==9516==    by 0x427756: execlist (exec.c:1267)
==9516==    by 0x42717C: execode (exec.c:1073)
==9516==    by 0x431299: runshfunc (exec.c:5040)
==9516==    by 0x430E76: doshfunc (exec.c:4920)
==9516==    by 0x4302FB: execshfunc (exec.c:4557)
==9516==    by 0x42D8C1: execcmd (exec.c:3373)
==9516== 
==9516== 
==9516== 2 errors in context 2 of 2:
==9516== Conditional jump or move depends on uninitialised value(s)
==9516==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9516==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9516==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9516==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9516==    by 0x42D8E9: execcmd (exec.c:3378)
==9516==    by 0x428CA0: execpline2 (exec.c:1697)
==9516==    by 0x427FD2: execpline (exec.c:1484)
==9516==    by 0x42779A: execlist (exec.c:1275)
==9516==    by 0x42717C: execode (exec.c:1073)
==9516==    by 0x431299: runshfunc (exec.c:5040)
==9516==    by 0x430E76: doshfunc (exec.c:4920)
==9516==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9516== 
==9516== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9512== Searching for pointers to 69,490 not-freed blocks
--9512--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9512--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9512--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9512--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9512--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9512--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9512--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9512--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9512--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9512--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9512--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9512--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9512--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9512--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9512--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9512--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9512--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9512--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9512--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9512--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9512--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9512--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9512--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9512--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9512--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9512--   Scanning root segment: 0x701a000..0x701afff (4096)
--9512--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9512--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9512--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9512--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9512--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9512--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9512--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9512--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9512--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9517== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9517-by-pythonnut-on-???
==9517== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9517-by-pythonnut-on-???
==9517== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9517-by-pythonnut-on-???
==9517== 
==9517== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9517== don't want to do, unless you know exactly what you're doing,
==9517== or are doing some strange experiment):
==9517==   /usr/lib/valgrind/../../bin/vgdb --pid=9517 ...command...
==9517== 
==9517== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9517==   /path/to/gdb ./zsh
==9517== and then give GDB the following command
==9517==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9517
==9517== --pid is optional if only one valgrind process is running
==9517== 
--9517-- Caught __NR_exit; running __libc_freeres()
--9517-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9517== 
==9517== HEAP SUMMARY:
==9517==     in use at exit: 3,160,994 bytes in 69,844 blocks
==9517==   total heap usage: 1,047,427 allocs, 977,583 frees, 71,873,153 bytes allocated
==9517== 
==9517== Searching for pointers to 69,844 not-freed blocks
--9517--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9517--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9517--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9517--   Scanning root segment: 0x4037000..0x403afff (16384)
--9517--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9517--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9517--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9517--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9517--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9517--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9517--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9517--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9517--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9517--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9517--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9517--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9517--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9517--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9517--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9517--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9517--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9517--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9517--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9512== Checked 4,856,296 bytes
==9512== 
--9517--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9517--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9517--   Scanning root segment: 0x701a000..0x701afff (4096)
--9517--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9517--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9517--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9517--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9517--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9517--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9517--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9517--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9517--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9512== LEAK SUMMARY:
==9512==    definitely lost: 1,533 bytes in 8 blocks
==9512==    indirectly lost: 6,756 bytes in 7 blocks
==9512==      possibly lost: 0 bytes in 0 blocks
==9512==    still reachable: 3,150,344 bytes in 69,475 blocks
==9512==         suppressed: 0 bytes in 0 blocks
==9512== Rerun with --leak-check=full to see details of leaked memory
==9512== 
==9512== Use --track-origins=yes to see where uninitialised values come from
==9512== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9512== 
==9512== 1 errors in context 1 of 2:
==9512== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9512==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9512==    by 0x488CD0: stringsubst (subst.c:301)
==9512==    by 0x48801B: prefork (subst.c:77)
==9512==    by 0x42B318: execcmd (exec.c:2619)
==9512==    by 0x428CA0: execpline2 (exec.c:1697)
==9512==    by 0x427FD2: execpline (exec.c:1484)
==9512==    by 0x427756: execlist (exec.c:1267)
==9512==    by 0x42717C: execode (exec.c:1073)
==9512==    by 0x431299: runshfunc (exec.c:5040)
==9512==    by 0x430E76: doshfunc (exec.c:4920)
==9512==    by 0x4302FB: execshfunc (exec.c:4557)
==9512==    by 0x42D8C1: execcmd (exec.c:3373)
==9512== 
==9512== 
==9512== 2 errors in context 2 of 2:
==9512== Conditional jump or move depends on uninitialised value(s)
==9512==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9512==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9512==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9512==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9512==    by 0x42D8E9: execcmd (exec.c:3378)
==9512==    by 0x428CA0: execpline2 (exec.c:1697)
==9512==    by 0x427FD2: execpline (exec.c:1484)
==9512==    by 0x42779A: execlist (exec.c:1275)
==9512==    by 0x42717C: execode (exec.c:1073)
==9512==    by 0x431299: runshfunc (exec.c:5040)
==9512==    by 0x430E76: doshfunc (exec.c:4920)
==9512==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9512== 
==9512== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF616C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFEBCDC,  len 4
==9517== Checked 4,830,936 bytes
==9517== 
client request: code 4d430005,  addr 0xFFEFEAB9C,  len 4
==9517== LEAK SUMMARY:
==9517==    definitely lost: 1,533 bytes in 8 blocks
==9517==    indirectly lost: 6,756 bytes in 7 blocks
==9517==      possibly lost: 0 bytes in 0 blocks
==9517==    still reachable: 3,152,705 bytes in 69,829 blocks
==9517==         suppressed: 0 bytes in 0 blocks
==9517== Rerun with --leak-check=full to see details of leaked memory
==9517== 
==9517== Use --track-origins=yes to see where uninitialised values come from
==9517== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9517== 
==9517== 1 errors in context 1 of 2:
==9517== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9517==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9517==    by 0x488CD0: stringsubst (subst.c:301)
==9517==    by 0x48801B: prefork (subst.c:77)
==9517==    by 0x42B318: execcmd (exec.c:2619)
==9517==    by 0x428CA0: execpline2 (exec.c:1697)
==9517==    by 0x427FD2: execpline (exec.c:1484)
==9517==    by 0x427756: execlist (exec.c:1267)
==9517==    by 0x42717C: execode (exec.c:1073)
==9517==    by 0x431299: runshfunc (exec.c:5040)
==9517==    by 0x430E76: doshfunc (exec.c:4920)
==9517==    by 0x4302FB: execshfunc (exec.c:4557)
==9517==    by 0x42D8C1: execcmd (exec.c:3373)
==9517== 
==9517== 
==9517== 2 errors in context 2 of 2:
==9517== Conditional jump or move depends on uninitialised value(s)
==9517==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9517==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9517==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9517==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9517==    by 0x42D8E9: execcmd (exec.c:3378)
==9517==    by 0x428CA0: execpline2 (exec.c:1697)
==9517==    by 0x427FD2: execpline (exec.c:1484)
==9517==    by 0x42779A: execlist (exec.c:1275)
==9517==    by 0x42717C: execode (exec.c:1073)
==9517==    by 0x431299: runshfunc (exec.c:5040)
==9517==    by 0x430E76: doshfunc (exec.c:4920)
==9517==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9517== 
==9517== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9519-- Caught __NR_exit; running __libc_freeres()
==9519== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9519-by-pythonnut-on-???
==9519== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9519-by-pythonnut-on-???
==9519== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9519-by-pythonnut-on-???
==9519== 
==9519== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9519== don't want to do, unless you know exactly what you're doing,
==9519== or are doing some strange experiment):
==9519==   /usr/lib/valgrind/../../bin/vgdb --pid=9519 ...command...
==9519== 
==9519== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9519==   /path/to/gdb ./zsh
==9519== and then give GDB the following command
==9519==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9519
==9519== --pid is optional if only one valgrind process is running
==9519== 
==9521== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9521-by-pythonnut-on-???
==9521== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9521-by-pythonnut-on-???
==9521== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9521-by-pythonnut-on-???
==9521== 
==9521== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9521== don't want to do, unless you know exactly what you're doing,
==9521== or are doing some strange experiment):
==9521==   /usr/lib/valgrind/../../bin/vgdb --pid=9521 ...command...
==9521== 
==9521== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9521==   /path/to/gdb ./zsh
==9521== and then give GDB the following command
==9521==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9521
==9521== --pid is optional if only one valgrind process is running
==9521== 
--9521-- Caught __NR_exit; running __libc_freeres()
--9519-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9519== 
==9519== HEAP SUMMARY:
==9519==     in use at exit: 3,167,384 bytes in 69,579 blocks
==9519==   total heap usage: 940,481 allocs, 870,902 frees, 68,290,480 bytes allocated
==9519== 
--9521-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9521== 
==9521== HEAP SUMMARY:
==9521==     in use at exit: 3,160,698 bytes in 69,835 blocks
==9521==   total heap usage: 1,047,550 allocs, 977,715 frees, 71,886,214 bytes allocated
==9521== 
==9519== Searching for pointers to 69,579 not-freed blocks
--9519--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9519--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9519--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9519--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9519--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9519--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9519--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9519--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9519--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9519--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9519--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9519--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9519--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9519--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9519--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9519--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9519--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9519--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9519--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9519--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9519--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9519--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9519--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9519--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9519--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9519--   Scanning root segment: 0x701a000..0x701afff (4096)
--9519--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9519--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9519--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9519--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9519--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9519--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9519--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9519--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9519--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9521== Searching for pointers to 69,835 not-freed blocks
--9521--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9521--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9521--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9521--   Scanning root segment: 0x4037000..0x403afff (16384)
--9521--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9521--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9521--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9521--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9521--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9521--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9521--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9521--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9521--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9521--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9521--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9521--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9521--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9521--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9521--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9521--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9521--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9521--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9521--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9521--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9521--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9521--   Scanning root segment: 0x701a000..0x701afff (4096)
--9521--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9521--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9521--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9521--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9521--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9521--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9521--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9521--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9521--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9519== Checked 4,885,760 bytes
==9519== 
==9521== Checked 4,831,384 bytes
==9521== 
==9519== LEAK SUMMARY:
==9519==    definitely lost: 1,533 bytes in 8 blocks
==9519==    indirectly lost: 6,756 bytes in 7 blocks
==9519==      possibly lost: 0 bytes in 0 blocks
==9519==    still reachable: 3,159,095 bytes in 69,564 blocks
==9519==         suppressed: 0 bytes in 0 blocks
==9519== Rerun with --leak-check=full to see details of leaked memory
==9519== 
==9519== Use --track-origins=yes to see where uninitialised values come from
==9519== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9519== 
==9519== 1 errors in context 1 of 2:
==9519== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9519==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9519==    by 0x488CD0: stringsubst (subst.c:301)
==9519==    by 0x48801B: prefork (subst.c:77)
==9519==    by 0x42B318: execcmd (exec.c:2619)
==9519==    by 0x428CA0: execpline2 (exec.c:1697)
==9519==    by 0x427FD2: execpline (exec.c:1484)
==9519==    by 0x427756: execlist (exec.c:1267)
==9519==    by 0x42717C: execode (exec.c:1073)
==9519==    by 0x431299: runshfunc (exec.c:5040)
==9519==    by 0x430E76: doshfunc (exec.c:4920)
==9519==    by 0x4302FB: execshfunc (exec.c:4557)
==9519==    by 0x42D8C1: execcmd (exec.c:3373)
==9519== 
==9519== 
==9519== 2 errors in context 2 of 2:
==9519== Conditional jump or move depends on uninitialised value(s)
==9519==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9519==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9519==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9519==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9519==    by 0x42D8E9: execcmd (exec.c:3378)
==9519==    by 0x428CA0: execpline2 (exec.c:1697)
==9519==    by 0x427FD2: execpline (exec.c:1484)
==9519==    by 0x42779A: execlist (exec.c:1275)
==9519==    by 0x42717C: execode (exec.c:1073)
==9519==    by 0x431299: runshfunc (exec.c:5040)
==9519==    by 0x430E76: doshfunc (exec.c:4920)
==9519==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9519== 
==9519== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9521== LEAK SUMMARY:
==9521==    definitely lost: 1,533 bytes in 8 blocks
==9521==    indirectly lost: 6,756 bytes in 7 blocks
==9521==      possibly lost: 0 bytes in 0 blocks
==9521==    still reachable: 3,152,409 bytes in 69,820 blocks
==9521==         suppressed: 0 bytes in 0 blocks
==9521== Rerun with --leak-check=full to see details of leaked memory
==9521== 
==9521== Use --track-origins=yes to see where uninitialised values come from
==9521== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9521== 
==9521== 1 errors in context 1 of 2:
==9521== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9521==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9521==    by 0x488CD0: stringsubst (subst.c:301)
==9521==    by 0x48801B: prefork (subst.c:77)
==9521==    by 0x42B318: execcmd (exec.c:2619)
==9521==    by 0x428CA0: execpline2 (exec.c:1697)
==9521==    by 0x427FD2: execpline (exec.c:1484)
==9521==    by 0x427756: execlist (exec.c:1267)
==9521==    by 0x42717C: execode (exec.c:1073)
==9521==    by 0x431299: runshfunc (exec.c:5040)
==9521==    by 0x430E76: doshfunc (exec.c:4920)
==9521==    by 0x4302FB: execshfunc (exec.c:4557)
==9521==    by 0x42D8C1: execcmd (exec.c:3373)
==9521== 
==9521== 
==9521== 2 errors in context 2 of 2:
==9521== Conditional jump or move depends on uninitialised value(s)
==9521==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9521==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9521==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9521==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9521==    by 0x42D8E9: execcmd (exec.c:3378)
==9521==    by 0x428CA0: execpline2 (exec.c:1697)
==9521==    by 0x427FD2: execpline (exec.c:1484)
==9521==    by 0x42779A: execlist (exec.c:1275)
==9521==    by 0x42717C: execode (exec.c:1073)
==9521==    by 0x431299: runshfunc (exec.c:5040)
==9521==    by 0x430E76: doshfunc (exec.c:4920)
==9521==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9521== 
==9521== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9523-- Caught __NR_exit; running __libc_freeres()
==9523== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9523-by-pythonnut-on-???
==9523== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9523-by-pythonnut-on-???
==9523== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9523-by-pythonnut-on-???
==9523== 
==9523== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9523== don't want to do, unless you know exactly what you're doing,
==9523== or are doing some strange experiment):
==9523==   /usr/lib/valgrind/../../bin/vgdb --pid=9523 ...command...
==9523== 
==9523== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9523==   /path/to/gdb ./zsh
==9523== and then give GDB the following command
==9523==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9523
==9523== --pid is optional if only one valgrind process is running
==9523== 
client request: code 4d430005,  addr 0xFFEFEA33C,  len 4
--9523-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9523== 
==9523== HEAP SUMMARY:
==9523==     in use at exit: 3,167,540 bytes in 69,585 blocks
==9523==   total heap usage: 940,490 allocs, 870,905 frees, 68,292,476 bytes allocated
==9523== 
==9523== Searching for pointers to 69,585 not-freed blocks
--9523--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9523--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9523--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9523--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9523--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9523--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9523--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9523--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9523--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9523--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9523--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9523--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9523--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9523--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9523--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9523--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9523--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9523--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9523--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9523--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9523--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9523--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9523--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9523--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9523--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9523--   Scanning root segment: 0x701a000..0x701afff (4096)
--9523--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9523--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9523--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9523--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9523--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9523--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9523--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9523--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9523--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9523== Checked 4,887,040 bytes
==9523== 
==9523== LEAK SUMMARY:
==9523==    definitely lost: 1,533 bytes in 8 blocks
==9523==    indirectly lost: 6,756 bytes in 7 blocks
==9523==      possibly lost: 0 bytes in 0 blocks
==9523==    still reachable: 3,159,251 bytes in 69,570 blocks
==9523==         suppressed: 0 bytes in 0 blocks
==9523== Rerun with --leak-check=full to see details of leaked memory
==9523== 
==9523== Use --track-origins=yes to see where uninitialised values come from
==9523== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9523== 
==9523== 1 errors in context 1 of 2:
==9523== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9523==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9523==    by 0x488CD0: stringsubst (subst.c:301)
==9523==    by 0x48801B: prefork (subst.c:77)
==9523==    by 0x42B318: execcmd (exec.c:2619)
==9523==    by 0x428CA0: execpline2 (exec.c:1697)
==9523==    by 0x427FD2: execpline (exec.c:1484)
==9523==    by 0x427756: execlist (exec.c:1267)
==9523==    by 0x42717C: execode (exec.c:1073)
==9523==    by 0x431299: runshfunc (exec.c:5040)
==9523==    by 0x430E76: doshfunc (exec.c:4920)
==9523==    by 0x4302FB: execshfunc (exec.c:4557)
==9523==    by 0x42D8C1: execcmd (exec.c:3373)
==9523== 
==9523== 
==9523== 2 errors in context 2 of 2:
==9523== Conditional jump or move depends on uninitialised value(s)
==9523==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9523==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9523==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9523==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9523==    by 0x42D8E9: execcmd (exec.c:3378)
==9523==    by 0x428CA0: execpline2 (exec.c:1697)
==9523==    by 0x427FD2: execpline (exec.c:1484)
==9523==    by 0x42779A: execlist (exec.c:1275)
==9523==    by 0x42717C: execode (exec.c:1073)
==9523==    by 0x431299: runshfunc (exec.c:5040)
==9523==    by 0x430E76: doshfunc (exec.c:4920)
==9523==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9523== 
==9523== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9522-- Caught __NR_exit; running __libc_freeres()
==9522== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9522-by-pythonnut-on-???
==9522== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9522-by-pythonnut-on-???
==9522== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9522-by-pythonnut-on-???
==9522== 
==9522== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9522== don't want to do, unless you know exactly what you're doing,
==9522== or are doing some strange experiment):
==9522==   /usr/lib/valgrind/../../bin/vgdb --pid=9522 ...command...
==9522== 
==9522== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9522==   /path/to/gdb ./zsh
==9522== and then give GDB the following command
==9522==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9522
==9522== --pid is optional if only one valgrind process is running
==9522== 
--9522-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9522== 
==9522== HEAP SUMMARY:
==9522==     in use at exit: 3,167,476 bytes in 69,582 blocks
==9522==   total heap usage: 940,492 allocs, 870,910 frees, 68,293,020 bytes allocated
==9522== 
==9522== Searching for pointers to 69,582 not-freed blocks
--9522--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9522--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9522--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9522--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9522--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9522--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9522--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9522--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9522--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9522--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9522--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9522--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9522--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9522--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9522--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9522--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9522--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9522--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9522--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9522--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9522--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9522--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9522--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9522--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9522--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9522--   Scanning root segment: 0x701a000..0x701afff (4096)
--9522--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9522--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9522--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9522--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9522--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9522--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9522--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9522--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9522--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9522== Checked 4,886,352 bytes
==9522== 
==9522== LEAK SUMMARY:
==9522==    definitely lost: 1,533 bytes in 8 blocks
==9522==    indirectly lost: 6,756 bytes in 7 blocks
==9522==      possibly lost: 0 bytes in 0 blocks
==9522==    still reachable: 3,159,187 bytes in 69,567 blocks
==9522==         suppressed: 0 bytes in 0 blocks
==9522== Rerun with --leak-check=full to see details of leaked memory
==9522== 
==9522== Use --track-origins=yes to see where uninitialised values come from
==9522== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9522== 
==9522== 1 errors in context 1 of 2:
==9522== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9522==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9522==    by 0x488CD0: stringsubst (subst.c:301)
==9522==    by 0x48801B: prefork (subst.c:77)
==9522==    by 0x42B318: execcmd (exec.c:2619)
==9522==    by 0x428CA0: execpline2 (exec.c:1697)
==9522==    by 0x427FD2: execpline (exec.c:1484)
==9522==    by 0x427756: execlist (exec.c:1267)
==9522==    by 0x42717C: execode (exec.c:1073)
==9522==    by 0x431299: runshfunc (exec.c:5040)
==9522==    by 0x430E76: doshfunc (exec.c:4920)
==9522==    by 0x4302FB: execshfunc (exec.c:4557)
==9522==    by 0x42D8C1: execcmd (exec.c:3373)
==9522== 
==9522== 
==9522== 2 errors in context 2 of 2:
==9522== Conditional jump or move depends on uninitialised value(s)
==9522==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9522==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9522==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9522==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9522==    by 0x42D8E9: execcmd (exec.c:3378)
==9522==    by 0x428CA0: execpline2 (exec.c:1697)
==9522==    by 0x427FD2: execpline (exec.c:1484)
==9522==    by 0x42779A: execlist (exec.c:1275)
==9522==    by 0x42717C: execode (exec.c:1073)
==9522==    by 0x431299: runshfunc (exec.c:5040)
==9522==    by 0x430E76: doshfunc (exec.c:4920)
==9522==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9522== 
==9522== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9526-- Caught __NR_exit; running __libc_freeres()
==9526== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9526-by-pythonnut-on-???
==9526== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9526-by-pythonnut-on-???
==9526== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9526-by-pythonnut-on-???
==9526== 
==9526== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9526== don't want to do, unless you know exactly what you're doing,
==9526== or are doing some strange experiment):
==9526==   /usr/lib/valgrind/../../bin/vgdb --pid=9526 ...command...
==9526== 
==9526== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9526==   /path/to/gdb ./zsh
==9526== and then give GDB the following command
==9526==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9526
==9526== --pid is optional if only one valgrind process is running
==9526== 
client request: code 4d430005,  addr 0xFFEFE9B7C,  len 4
--9526-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9526== 
==9526== HEAP SUMMARY:
==9526==     in use at exit: 3,167,637 bytes in 69,588 blocks
==9526==   total heap usage: 940,497 allocs, 870,909 frees, 68,294,685 bytes allocated
==9526== 
==9526== Searching for pointers to 69,588 not-freed blocks
--9526--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9526--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9526--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9526--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9526--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9526--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9526--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9526--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9526--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9526--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9526--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9526--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9526--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9526--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9526--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9526--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9526--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9526--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9526--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9526--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9526--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9526--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9526--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9526--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9526--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9526--   Scanning root segment: 0x701a000..0x701afff (4096)
--9526--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9526--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9526--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9526--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9526--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9526--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9526--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9526--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9526--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9526== Checked 4,887,640 bytes
==9526== 
==9526== LEAK SUMMARY:
==9526==    definitely lost: 1,533 bytes in 8 blocks
==9526==    indirectly lost: 6,756 bytes in 7 blocks
==9526==      possibly lost: 0 bytes in 0 blocks
==9526==    still reachable: 3,159,348 bytes in 69,573 blocks
==9526==         suppressed: 0 bytes in 0 blocks
==9526== Rerun with --leak-check=full to see details of leaked memory
==9526== 
==9526== Use --track-origins=yes to see where uninitialised values come from
==9526== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9526== 
==9526== 1 errors in context 1 of 2:
==9526== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9526==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9526==    by 0x488CD0: stringsubst (subst.c:301)
==9526==    by 0x48801B: prefork (subst.c:77)
==9526==    by 0x42B318: execcmd (exec.c:2619)
==9526==    by 0x428CA0: execpline2 (exec.c:1697)
==9526==    by 0x427FD2: execpline (exec.c:1484)
==9526==    by 0x427756: execlist (exec.c:1267)
==9526==    by 0x42717C: execode (exec.c:1073)
==9526==    by 0x431299: runshfunc (exec.c:5040)
==9526==    by 0x430E76: doshfunc (exec.c:4920)
==9526==    by 0x4302FB: execshfunc (exec.c:4557)
==9526==    by 0x42D8C1: execcmd (exec.c:3373)
==9526== 
==9526== 
==9526== 2 errors in context 2 of 2:
==9526== Conditional jump or move depends on uninitialised value(s)
==9526==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9526==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9526==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9526==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9526==    by 0x42D8E9: execcmd (exec.c:3378)
==9526==    by 0x428CA0: execpline2 (exec.c:1697)
==9526==    by 0x427FD2: execpline (exec.c:1484)
==9526==    by 0x42779A: execlist (exec.c:1275)
==9526==    by 0x42717C: execode (exec.c:1073)
==9526==    by 0x431299: runshfunc (exec.c:5040)
==9526==    by 0x430E76: doshfunc (exec.c:4920)
==9526==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9526== 
==9526== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9525-- Caught __NR_exit; running __libc_freeres()
==9525== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9525-by-pythonnut-on-???
==9525== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9525-by-pythonnut-on-???
==9525== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9525-by-pythonnut-on-???
==9525== 
==9525== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9525== don't want to do, unless you know exactly what you're doing,
==9525== or are doing some strange experiment):
==9525==   /usr/lib/valgrind/../../bin/vgdb --pid=9525 ...command...
==9525== 
==9525== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9525==   /path/to/gdb ./zsh
==9525== and then give GDB the following command
==9525==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9525
==9525== --pid is optional if only one valgrind process is running
==9525== 
--9525-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9525== 
==9525== HEAP SUMMARY:
==9525==     in use at exit: 3,167,573 bytes in 69,585 blocks
==9525==   total heap usage: 940,499 allocs, 870,914 frees, 68,295,229 bytes allocated
==9525== 
==9525== Searching for pointers to 69,585 not-freed blocks
--9525--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9525--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9525--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9525--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9525--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9525--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9525--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9525--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9525--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9525--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9525--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9525--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9525--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9525--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9525--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9525--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9525--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9525--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9525--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9525--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9525--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9525--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9525--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9525--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9525--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9525--   Scanning root segment: 0x701a000..0x701afff (4096)
--9525--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9525--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9525--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9525--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9525--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9525--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9525--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9525--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9525--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9525== Checked 4,886,960 bytes
==9525== 
==9525== LEAK SUMMARY:
==9525==    definitely lost: 1,533 bytes in 8 blocks
==9525==    indirectly lost: 6,756 bytes in 7 blocks
==9525==      possibly lost: 0 bytes in 0 blocks
==9525==    still reachable: 3,159,284 bytes in 69,570 blocks
==9525==         suppressed: 0 bytes in 0 blocks
==9525== Rerun with --leak-check=full to see details of leaked memory
==9525== 
==9525== Use --track-origins=yes to see where uninitialised values come from
==9525== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9525== 
==9525== 1 errors in context 1 of 2:
==9525== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9525==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9525==    by 0x488CD0: stringsubst (subst.c:301)
==9525==    by 0x48801B: prefork (subst.c:77)
==9525==    by 0x42B318: execcmd (exec.c:2619)
==9525==    by 0x428CA0: execpline2 (exec.c:1697)
==9525==    by 0x427FD2: execpline (exec.c:1484)
==9525==    by 0x427756: execlist (exec.c:1267)
==9525==    by 0x42717C: execode (exec.c:1073)
==9525==    by 0x431299: runshfunc (exec.c:5040)
==9525==    by 0x430E76: doshfunc (exec.c:4920)
==9525==    by 0x4302FB: execshfunc (exec.c:4557)
==9525==    by 0x42D8C1: execcmd (exec.c:3373)
==9525== 
==9525== 
==9525== 2 errors in context 2 of 2:
==9525== Conditional jump or move depends on uninitialised value(s)
==9525==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9525==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9525==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9525==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9525==    by 0x42D8E9: execcmd (exec.c:3378)
==9525==    by 0x428CA0: execpline2 (exec.c:1697)
==9525==    by 0x427FD2: execpline (exec.c:1484)
==9525==    by 0x42779A: execlist (exec.c:1275)
==9525==    by 0x42717C: execode (exec.c:1073)
==9525==    by 0x431299: runshfunc (exec.c:5040)
==9525==    by 0x430E76: doshfunc (exec.c:4920)
==9525==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9525== 
==9525== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF992C,  len 4
client request: code 4d430005,  addr 0xFFEFF87DC,  len 4
client request: code 4d430005,  addr 0xFFEFFB6EC,  len 4
--9490-- Caught __NR_exit; running __libc_freeres()
--9490-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9490== 
==9490== HEAP SUMMARY:
==9490==     in use at exit: 3,145,894 bytes in 69,103 blocks
==9490==   total heap usage: 940,587 allocs, 871,484 frees, 68,311,928 bytes allocated
==9490== 
==9490== Searching for pointers to 69,103 not-freed blocks
--9490--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9490--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9490--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9490--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9490--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9490--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9490--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9490--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9490--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9490--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9490--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9490--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9490--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9490--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9490--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9490--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9490--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9490--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9490--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9490--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9490--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9490--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9490--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9490--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9490--   Scanning root segment: 0x701a000..0x701afff (4096)
--9490--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9490--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9490--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9490--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9490--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9490--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9490--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9490--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9490--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9490== Checked 4,789,136 bytes
==9490== 
==9490== LEAK SUMMARY:
==9490==    definitely lost: 1,533 bytes in 8 blocks
==9490==    indirectly lost: 6,756 bytes in 7 blocks
==9490==      possibly lost: 0 bytes in 0 blocks
==9490==    still reachable: 3,137,605 bytes in 69,088 blocks
==9490==         suppressed: 0 bytes in 0 blocks
==9490== Rerun with --leak-check=full to see details of leaked memory
==9490== 
==9490== Use --track-origins=yes to see where uninitialised values come from
==9490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9490== 
==9490== 1 errors in context 1 of 2:
==9490== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9490==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9490==    by 0x488CD0: stringsubst (subst.c:301)
==9490==    by 0x48801B: prefork (subst.c:77)
==9490==    by 0x42B318: execcmd (exec.c:2619)
==9490==    by 0x428CA0: execpline2 (exec.c:1697)
==9490==    by 0x427FD2: execpline (exec.c:1484)
==9490==    by 0x427756: execlist (exec.c:1267)
==9490==    by 0x42717C: execode (exec.c:1073)
==9490==    by 0x431299: runshfunc (exec.c:5040)
==9490==    by 0x430E76: doshfunc (exec.c:4920)
==9490==    by 0x4302FB: execshfunc (exec.c:4557)
==9490==    by 0x42D8C1: execcmd (exec.c:3373)
==9490== 
==9490== 
==9490== 2 errors in context 2 of 2:
==9490== Conditional jump or move depends on uninitialised value(s)
==9490==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9490==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9490==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9490==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9490==    by 0x42D8E9: execcmd (exec.c:3378)
==9490==    by 0x428CA0: execpline2 (exec.c:1697)
==9490==    by 0x427FD2: execpline (exec.c:1484)
==9490==    by 0x42779A: execlist (exec.c:1275)
==9490==    by 0x42717C: execode (exec.c:1073)
==9490==    by 0x431299: runshfunc (exec.c:5040)
==9490==    by 0x430E76: doshfunc (exec.c:4920)
==9490==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9490== 
==9490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9485-- Caught __NR_exit; running __libc_freeres()
--9485-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9485== 
==9485== HEAP SUMMARY:
==9485==     in use at exit: 3,115,806 bytes in 68,874 blocks
==9485==   total heap usage: 935,481 allocs, 866,607 frees, 66,578,929 bytes allocated
==9485== 
==9485== Searching for pointers to 68,874 not-freed blocks
--9485--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9485--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9485--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9485--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9485--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9485--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9485--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9485--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9485--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9485--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9485--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9485--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9485--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9485--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9485--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9485--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9485--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9485--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9485--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9485--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9485--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9485--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9485--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9485--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9485--   Scanning root segment: 0x701a000..0x701afff (4096)
--9485--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9485--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9485--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9485--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9485--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9485--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9485--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9485--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9485--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9485== Checked 4,757,928 bytes
==9485== 
==9485== LEAK SUMMARY:
==9485==    definitely lost: 1,533 bytes in 8 blocks
==9485==    indirectly lost: 6,756 bytes in 7 blocks
==9485==      possibly lost: 0 bytes in 0 blocks
==9485==    still reachable: 3,107,517 bytes in 68,859 blocks
==9485==         suppressed: 0 bytes in 0 blocks
==9485== Rerun with --leak-check=full to see details of leaked memory
==9485== 
==9485== Use --track-origins=yes to see where uninitialised values come from
==9485== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9485== 
==9485== 1 errors in context 1 of 2:
==9485== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9485==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9485==    by 0x488CD0: stringsubst (subst.c:301)
==9485==    by 0x48801B: prefork (subst.c:77)
==9485==    by 0x42B318: execcmd (exec.c:2619)
==9485==    by 0x428CA0: execpline2 (exec.c:1697)
==9485==    by 0x427FD2: execpline (exec.c:1484)
==9485==    by 0x427756: execlist (exec.c:1267)
==9485==    by 0x42717C: execode (exec.c:1073)
==9485==    by 0x431299: runshfunc (exec.c:5040)
==9485==    by 0x430E76: doshfunc (exec.c:4920)
==9485==    by 0x4302FB: execshfunc (exec.c:4557)
==9485==    by 0x42D8C1: execcmd (exec.c:3373)
==9485== 
==9485== 
==9485== 2 errors in context 2 of 2:
==9485== Conditional jump or move depends on uninitialised value(s)
==9485==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9485==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9485==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9485==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9485==    by 0x42D8E9: execcmd (exec.c:3378)
==9485==    by 0x428CA0: execpline2 (exec.c:1697)
==9485==    by 0x427FD2: execpline (exec.c:1484)
==9485==    by 0x42779A: execlist (exec.c:1275)
==9485==    by 0x42717C: execode (exec.c:1073)
==9485==    by 0x431299: runshfunc (exec.c:5040)
==9485==    by 0x430E76: doshfunc (exec.c:4920)
==9485==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9485== 
==9485== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9395-- Caught __NR_exit; running __libc_freeres()
--9395-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9395== 
==9395== HEAP SUMMARY:
==9395==     in use at exit: 3,115,144 bytes in 68,861 blocks
==9395==   total heap usage: 935,521 allocs, 866,660 frees, 66,574,314 bytes allocated
==9395== 
client request: code 4d430005,  addr 0xFFEFE4DAC,  len 4
==9395== Searching for pointers to 68,861 not-freed blocks
--9395--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9395--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9395--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9395--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9395--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9395--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9395--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9395--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9395--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9395--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9395--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9395--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9395--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9395--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9395--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9395--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9395--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9395--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9395--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9395--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9395--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9395--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9395--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9395--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9395--   Scanning root segment: 0x701a000..0x701afff (4096)
--9395--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9395--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9395--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9395--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9395--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9395--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9395--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9395--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9395--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9531== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9531-by-pythonnut-on-???
==9531== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9531-by-pythonnut-on-???
==9531== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9531-by-pythonnut-on-???
==9531== 
==9531== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9531== don't want to do, unless you know exactly what you're doing,
==9531== or are doing some strange experiment):
==9531==   /usr/lib/valgrind/../../bin/vgdb --pid=9531 ...command...
==9531== 
==9531== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9531==   /path/to/gdb ./zsh
==9531== and then give GDB the following command
==9531==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9531
==9531== --pid is optional if only one valgrind process is running
==9531== 
--9531-- Caught __NR_exit; running __libc_freeres()
==9532== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9532-by-pythonnut-on-???
==9532== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9532-by-pythonnut-on-???
==9532== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9532-by-pythonnut-on-???
==9532== 
==9532== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9532== don't want to do, unless you know exactly what you're doing,
==9532== or are doing some strange experiment):
==9532==   /usr/lib/valgrind/../../bin/vgdb --pid=9532 ...command...
==9532== 
==9532== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9532==   /path/to/gdb ./zsh
==9532== and then give GDB the following command
==9532==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9532
==9532== --pid is optional if only one valgrind process is running
==9532== 
==9533== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9533-by-pythonnut-on-???
==9533== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9533-by-pythonnut-on-???
==9533== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9533-by-pythonnut-on-???
==9533== 
==9533== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9533== don't want to do, unless you know exactly what you're doing,
==9533== or are doing some strange experiment):
==9533==   /usr/lib/valgrind/../../bin/vgdb --pid=9533 ...command...
==9533== 
==9533== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9533==   /path/to/gdb ./zsh
==9533== and then give GDB the following command
==9533==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9533
==9533== --pid is optional if only one valgrind process is running
==9533== 
--9531-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9531== 
client request: code 4d430005,  addr 0xFFEFE56BC,  len 4
==9531== HEAP SUMMARY:
==9531==     in use at exit: 3,169,673 bytes in 70,004 blocks
==9531==   total heap usage: 1,078,773 allocs, 1,008,769 frees, 73,660,110 bytes allocated
==9531== 
==9531== Searching for pointers to 70,004 not-freed blocks
--9531--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9531--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9531--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9531--   Scanning root segment: 0x4037000..0x403afff (16384)
--9531--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9531--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9531--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9531--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9531--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9531--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9531--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9531--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9531--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9531--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9531--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9531--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9531--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9531--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9531--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9531--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9531--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9531--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9531--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9531--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9531--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9531--   Scanning root segment: 0x701a000..0x701afff (4096)
--9531--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9531--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9531--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9531--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9531--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9531--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9531--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9531--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9531--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9395== Checked 4,756,624 bytes
==9395== 
==9395== LEAK SUMMARY:
==9395==    definitely lost: 1,533 bytes in 8 blocks
==9395==    indirectly lost: 6,756 bytes in 7 blocks
==9395==      possibly lost: 0 bytes in 0 blocks
==9395==    still reachable: 3,106,855 bytes in 68,846 blocks
==9395==         suppressed: 0 bytes in 0 blocks
==9395== Rerun with --leak-check=full to see details of leaked memory
==9395== 
==9395== Use --track-origins=yes to see where uninitialised values come from
==9395== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9395== 
==9395== 1 errors in context 1 of 2:
==9395== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9395==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9395==    by 0x488CD0: stringsubst (subst.c:301)
==9395==    by 0x48801B: prefork (subst.c:77)
==9395==    by 0x42B318: execcmd (exec.c:2619)
==9395==    by 0x428CA0: execpline2 (exec.c:1697)
==9395==    by 0x427FD2: execpline (exec.c:1484)
==9395==    by 0x427756: execlist (exec.c:1267)
==9395==    by 0x42717C: execode (exec.c:1073)
==9395==    by 0x431299: runshfunc (exec.c:5040)
==9395==    by 0x430E76: doshfunc (exec.c:4920)
==9395==    by 0x4302FB: execshfunc (exec.c:4557)
==9395==    by 0x42D8C1: execcmd (exec.c:3373)
==9395== 
==9395== 
==9395== 2 errors in context 2 of 2:
==9395== Conditional jump or move depends on uninitialised value(s)
==9395==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9395==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9395==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9395==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9395==    by 0x42D8E9: execcmd (exec.c:3378)
==9395==    by 0x428CA0: execpline2 (exec.c:1697)
==9395==    by 0x427FD2: execpline (exec.c:1484)
==9395==    by 0x42779A: execlist (exec.c:1275)
==9395==    by 0x42717C: execode (exec.c:1073)
==9395==    by 0x431299: runshfunc (exec.c:5040)
==9395==    by 0x430E76: doshfunc (exec.c:4920)
==9395==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9395== 
==9395== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9531== Checked 4,840,544 bytes
==9531== 
==9531== LEAK SUMMARY:
==9531==    definitely lost: 1,533 bytes in 8 blocks
==9531==    indirectly lost: 6,756 bytes in 7 blocks
==9531==      possibly lost: 0 bytes in 0 blocks
==9531==    still reachable: 3,161,384 bytes in 69,989 blocks
==9531==         suppressed: 0 bytes in 0 blocks
==9531== Rerun with --leak-check=full to see details of leaked memory
==9531== 
==9531== Use --track-origins=yes to see where uninitialised values come from
==9531== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9531== 
==9531== 1 errors in context 1 of 2:
==9531== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9531==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9531==    by 0x488CD0: stringsubst (subst.c:301)
==9531==    by 0x48801B: prefork (subst.c:77)
==9531==    by 0x42B318: execcmd (exec.c:2619)
==9531==    by 0x428CA0: execpline2 (exec.c:1697)
==9531==    by 0x427FD2: execpline (exec.c:1484)
==9531==    by 0x427756: execlist (exec.c:1267)
==9531==    by 0x42717C: execode (exec.c:1073)
==9531==    by 0x431299: runshfunc (exec.c:5040)
==9531==    by 0x430E76: doshfunc (exec.c:4920)
==9531==    by 0x4302FB: execshfunc (exec.c:4557)
==9531==    by 0x42D8C1: execcmd (exec.c:3373)
==9531== 
==9531== 
==9531== 2 errors in context 2 of 2:
==9531== Conditional jump or move depends on uninitialised value(s)
==9531==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9531==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9531==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9531==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9531==    by 0x42D8E9: execcmd (exec.c:3378)
==9531==    by 0x428CA0: execpline2 (exec.c:1697)
==9531==    by 0x427FD2: execpline (exec.c:1484)
==9531==    by 0x42779A: execlist (exec.c:1275)
==9531==    by 0x42717C: execode (exec.c:1073)
==9531==    by 0x431299: runshfunc (exec.c:5040)
==9531==    by 0x430E76: doshfunc (exec.c:4920)
==9531==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9531== 
==9531== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9562== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9562-by-pythonnut-on-???
==9562== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9562-by-pythonnut-on-???
==9562== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9562-by-pythonnut-on-???
==9562== 
==9562== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9562== don't want to do, unless you know exactly what you're doing,
==9562== or are doing some strange experiment):
==9562==   /usr/lib/valgrind/../../bin/vgdb --pid=9562 ...command...
==9562== 
==9562== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9562==   /path/to/gdb ./zsh
==9562== and then give GDB the following command
==9562==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9562
==9562== --pid is optional if only one valgrind process is running
==9562== 
--9562-- Caught __NR_exit; running __libc_freeres()
--9562-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9562== 
==9562== HEAP SUMMARY:
==9562==     in use at exit: 3,265,454 bytes in 70,332 blocks
==9562==   total heap usage: 1,421,328 allocs, 1,350,996 frees, 111,871,987 bytes allocated
==9562== 
==9562== Searching for pointers to 70,332 not-freed blocks
--9562--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9562--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9562--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9562--   Scanning root segment: 0x4037000..0x403afff (16384)
--9562--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9562--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9562--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9562--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9562--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9562--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9562--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9562--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9562--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9562--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9562--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9562--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9562--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9562--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9562--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9562--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9562--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9562--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9562--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9562--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9562--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9562--   Scanning root segment: 0x701a000..0x701afff (4096)
--9562--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9562--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9562--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9562--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9562--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9562--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9562--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9562--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9562--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9562== Checked 4,929,784 bytes
==9562== 
==9562== LEAK SUMMARY:
==9562==    definitely lost: 1,533 bytes in 8 blocks
==9562==    indirectly lost: 6,756 bytes in 7 blocks
==9562==      possibly lost: 0 bytes in 0 blocks
==9562==    still reachable: 3,257,165 bytes in 70,317 blocks
==9562==         suppressed: 0 bytes in 0 blocks
==9562== Rerun with --leak-check=full to see details of leaked memory
==9562== 
==9562== Use --track-origins=yes to see where uninitialised values come from
==9562== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9562== 
==9562== 1 errors in context 1 of 2:
==9562== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9562==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9562==    by 0x488CD0: stringsubst (subst.c:301)
==9562==    by 0x48801B: prefork (subst.c:77)
==9562==    by 0x42B318: execcmd (exec.c:2619)
==9562==    by 0x428CA0: execpline2 (exec.c:1697)
==9562==    by 0x427FD2: execpline (exec.c:1484)
==9562==    by 0x427756: execlist (exec.c:1267)
==9562==    by 0x42717C: execode (exec.c:1073)
==9562==    by 0x431299: runshfunc (exec.c:5040)
==9562==    by 0x430E76: doshfunc (exec.c:4920)
==9562==    by 0x4302FB: execshfunc (exec.c:4557)
==9562==    by 0x42D8C1: execcmd (exec.c:3373)
==9562== 
==9562== 
==9562== 2 errors in context 2 of 2:
==9562== Conditional jump or move depends on uninitialised value(s)
==9562==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9562==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9562==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9562==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9562==    by 0x42D8E9: execcmd (exec.c:3378)
==9562==    by 0x428CA0: execpline2 (exec.c:1697)
==9562==    by 0x427FD2: execpline (exec.c:1484)
==9562==    by 0x42779A: execlist (exec.c:1275)
==9562==    by 0x42717C: execode (exec.c:1073)
==9562==    by 0x431299: runshfunc (exec.c:5040)
==9562==    by 0x430E76: doshfunc (exec.c:4920)
==9562==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9562== 
==9562== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9587== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9587-by-pythonnut-on-???
==9587== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9587-by-pythonnut-on-???
==9587== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9587-by-pythonnut-on-???
==9587== 
==9587== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9587== don't want to do, unless you know exactly what you're doing,
==9587== or are doing some strange experiment):
==9587==   /usr/lib/valgrind/../../bin/vgdb --pid=9587 ...command...
==9587== 
==9587== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9587==   /path/to/gdb ./zsh
==9587== and then give GDB the following command
==9587==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9587
==9587== --pid is optional if only one valgrind process is running
==9587== 
--9587-- Caught __NR_exit; running __libc_freeres()
--9587-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9587== 
==9587== HEAP SUMMARY:
==9587==     in use at exit: 3,163,879 bytes in 69,874 blocks
==9587==   total heap usage: 1,459,574 allocs, 1,389,700 frees, 117,370,069 bytes allocated
==9587== 
==9587== Searching for pointers to 69,874 not-freed blocks
--9587--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9587--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9587--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9587--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9587--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9587--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9587--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9587--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9587--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9587--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9587--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9587--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9587--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9587--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9587--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9587--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9587--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9587--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9587--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9587--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9587--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9587--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9587--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9587--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9587--   Scanning root segment: 0x701a000..0x701afff (4096)
--9587--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9587--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9587--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9587--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9587--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9587--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9587--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9587--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9587--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9587== Checked 4,804,040 bytes
==9587== 
==9587== LEAK SUMMARY:
==9587==    definitely lost: 2,181 bytes in 11 blocks
==9587==    indirectly lost: 6,756 bytes in 7 blocks
==9587==      possibly lost: 0 bytes in 0 blocks
==9587==    still reachable: 3,154,942 bytes in 69,856 blocks
==9587==         suppressed: 0 bytes in 0 blocks
==9587== Rerun with --leak-check=full to see details of leaked memory
==9587== 
==9587== Use --track-origins=yes to see where uninitialised values come from
==9587== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9587== 
==9587== 1 errors in context 1 of 2:
==9587== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9587==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9587==    by 0x488CD0: stringsubst (subst.c:301)
==9587==    by 0x48801B: prefork (subst.c:77)
==9587==    by 0x42B318: execcmd (exec.c:2619)
==9587==    by 0x428CA0: execpline2 (exec.c:1697)
==9587==    by 0x427FD2: execpline (exec.c:1484)
==9587==    by 0x427756: execlist (exec.c:1267)
==9587==    by 0x42717C: execode (exec.c:1073)
==9587==    by 0x431299: runshfunc (exec.c:5040)
==9587==    by 0x430E76: doshfunc (exec.c:4920)
==9587==    by 0x4302FB: execshfunc (exec.c:4557)
==9587==    by 0x42D8C1: execcmd (exec.c:3373)
==9587== 
==9587== 
==9587== 2 errors in context 2 of 2:
==9587== Conditional jump or move depends on uninitialised value(s)
==9587==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9587==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9587==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9587==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9587==    by 0x42D8E9: execcmd (exec.c:3378)
==9587==    by 0x428CA0: execpline2 (exec.c:1697)
==9587==    by 0x427FD2: execpline (exec.c:1484)
==9587==    by 0x42779A: execlist (exec.c:1275)
==9587==    by 0x42717C: execode (exec.c:1073)
==9587==    by 0x431299: runshfunc (exec.c:5040)
==9587==    by 0x430E76: doshfunc (exec.c:4920)
==9587==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9587== 
==9587== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9588== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9588-by-pythonnut-on-???
==9588== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9588-by-pythonnut-on-???
==9588== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9588-by-pythonnut-on-???
==9588== 
==9588== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9588== don't want to do, unless you know exactly what you're doing,
==9588== or are doing some strange experiment):
==9588==   /usr/lib/valgrind/../../bin/vgdb --pid=9588 ...command...
==9588== 
==9588== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9588==   /path/to/gdb ./zsh
==9588== and then give GDB the following command
==9588==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9588
==9588== --pid is optional if only one valgrind process is running
==9588== 
--9588-- Caught __NR_exit; running __libc_freeres()
--9588-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9588== 
==9588== HEAP SUMMARY:
==9588==     in use at exit: 3,163,686 bytes in 69,874 blocks
==9588==   total heap usage: 1,459,581 allocs, 1,389,707 frees, 117,373,093 bytes allocated
==9588== 
==9588== Searching for pointers to 69,874 not-freed blocks
--9588--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9588--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9588--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9588--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9588--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9588--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9588--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9588--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9588--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9588--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9588--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9588--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9588--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9588--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9588--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9588--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9588--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9588--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9588--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9588--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9588--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9588--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9588--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9588--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9588--   Scanning root segment: 0x701a000..0x701afff (4096)
--9588--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9588--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9588--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9588--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9588--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9588--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9588--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9588--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9588--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9588== Checked 4,805,200 bytes
==9588== 
==9588== LEAK SUMMARY:
==9588==    definitely lost: 2,181 bytes in 11 blocks
==9588==    indirectly lost: 6,756 bytes in 7 blocks
==9588==      possibly lost: 0 bytes in 0 blocks
==9588==    still reachable: 3,154,749 bytes in 69,856 blocks
==9588==         suppressed: 0 bytes in 0 blocks
==9588== Rerun with --leak-check=full to see details of leaked memory
==9588== 
==9588== Use --track-origins=yes to see where uninitialised values come from
==9588== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9588== 
==9588== 1 errors in context 1 of 2:
==9588== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9588==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9588==    by 0x488CD0: stringsubst (subst.c:301)
==9588==    by 0x48801B: prefork (subst.c:77)
==9588==    by 0x42B318: execcmd (exec.c:2619)
==9588==    by 0x428CA0: execpline2 (exec.c:1697)
==9588==    by 0x427FD2: execpline (exec.c:1484)
==9588==    by 0x427756: execlist (exec.c:1267)
==9588==    by 0x42717C: execode (exec.c:1073)
==9588==    by 0x431299: runshfunc (exec.c:5040)
==9588==    by 0x430E76: doshfunc (exec.c:4920)
==9588==    by 0x4302FB: execshfunc (exec.c:4557)
==9588==    by 0x42D8C1: execcmd (exec.c:3373)
==9588== 
==9588== 
==9588== 2 errors in context 2 of 2:
==9588== Conditional jump or move depends on uninitialised value(s)
==9588==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9588==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9588==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9588==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9588==    by 0x42D8E9: execcmd (exec.c:3378)
==9588==    by 0x428CA0: execpline2 (exec.c:1697)
==9588==    by 0x427FD2: execpline (exec.c:1484)
==9588==    by 0x42779A: execlist (exec.c:1275)
==9588==    by 0x42717C: execode (exec.c:1073)
==9588==    by 0x431299: runshfunc (exec.c:5040)
==9588==    by 0x430E76: doshfunc (exec.c:4920)
==9588==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9588== 
==9588== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9589== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9589-by-pythonnut-on-???
==9589== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9589-by-pythonnut-on-???
==9589== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9589-by-pythonnut-on-???
==9589== 
==9589== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9589== don't want to do, unless you know exactly what you're doing,
==9589== or are doing some strange experiment):
==9589==   /usr/lib/valgrind/../../bin/vgdb --pid=9589 ...command...
==9589== 
==9589== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9589==   /path/to/gdb ./zsh
==9589== and then give GDB the following command
==9589==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9589
==9589== --pid is optional if only one valgrind process is running
==9589== 
--9590-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9590== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9590-by-pythonnut-on-???
==9590== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9590-by-pythonnut-on-???
==9590== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9590-by-pythonnut-on-???
==9590== 
==9590== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9590== don't want to do, unless you know exactly what you're doing,
==9590== or are doing some strange experiment):
==9590==   /usr/lib/valgrind/../../bin/vgdb --pid=9590 ...command...
==9590== 
==9590== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9590==   /path/to/gdb ./zsh
==9590== and then give GDB the following command
==9590==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9590
==9590== --pid is optional if only one valgrind process is running
==9590== 
--9590-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9590== 
==9590== HEAP SUMMARY:
==9590==     in use at exit: 3,160,885 bytes in 69,804 blocks
==9590==   total heap usage: 1,459,798 allocs, 1,389,994 frees, 117,397,470 bytes allocated
==9590== 
==9590== Searching for pointers to 69,804 not-freed blocks
--9590--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9590--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9590--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9590--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9590--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9590--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9590--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9590--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9590--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9590--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9590--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9590--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9590--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9590--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9590--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9590--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9590--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9590--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9590--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9590--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9590--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9590--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9590--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9590--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9590--   Scanning root segment: 0x701a000..0x701afff (4096)
--9590--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9590--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9590--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9590--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9590--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9590--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9590--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9590--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9590--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9590== Checked 4,798,464 bytes
==9590== 
==9590== LEAK SUMMARY:
==9590==    definitely lost: 2,181 bytes in 11 blocks
==9590==    indirectly lost: 6,756 bytes in 7 blocks
==9590==      possibly lost: 0 bytes in 0 blocks
==9590==    still reachable: 3,151,948 bytes in 69,786 blocks
==9590==         suppressed: 0 bytes in 0 blocks
==9590== Rerun with --leak-check=full to see details of leaked memory
==9590== 
==9590== Use --track-origins=yes to see where uninitialised values come from
==9590== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9590== 
==9590== 1 errors in context 1 of 2:
==9590== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9590==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9590==    by 0x488CD0: stringsubst (subst.c:301)
==9590==    by 0x48801B: prefork (subst.c:77)
==9590==    by 0x42B318: execcmd (exec.c:2619)
==9590==    by 0x428CA0: execpline2 (exec.c:1697)
==9590==    by 0x427FD2: execpline (exec.c:1484)
==9590==    by 0x427756: execlist (exec.c:1267)
==9590==    by 0x42717C: execode (exec.c:1073)
==9590==    by 0x431299: runshfunc (exec.c:5040)
==9590==    by 0x430E76: doshfunc (exec.c:4920)
==9590==    by 0x4302FB: execshfunc (exec.c:4557)
==9590==    by 0x42D8C1: execcmd (exec.c:3373)
==9590== 
==9590== 
==9590== 2 errors in context 2 of 2:
==9590== Conditional jump or move depends on uninitialised value(s)
==9590==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9590==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9590==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9590==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9590==    by 0x42D8E9: execcmd (exec.c:3378)
==9590==    by 0x428CA0: execpline2 (exec.c:1697)
==9590==    by 0x427FD2: execpline (exec.c:1484)
==9590==    by 0x42779A: execlist (exec.c:1275)
==9590==    by 0x42717C: execode (exec.c:1073)
==9590==    by 0x431299: runshfunc (exec.c:5040)
==9590==    by 0x430E76: doshfunc (exec.c:4920)
==9590==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9590== 
==9590== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9589-- Caught __NR_exit; running __libc_freeres()
--9589-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9589== 
==9589== HEAP SUMMARY:
==9589==     in use at exit: 3,160,821 bytes in 69,801 blocks
==9589==   total heap usage: 1,459,796 allocs, 1,389,995 frees, 117,397,229 bytes allocated
==9589== 
==9589== Searching for pointers to 69,801 not-freed blocks
--9589--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9589--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9589--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9589--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9589--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9589--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9589--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9589--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9589--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9589--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9589--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9589--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9589--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9589--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9589--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9589--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9589--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9589--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9589--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9589--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9589--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9589--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9589--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9589--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9589--   Scanning root segment: 0x701a000..0x701afff (4096)
--9589--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9589--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9589--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9589--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9589--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9589--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9589--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9589--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9589--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9589== Checked 4,797,776 bytes
==9589== 
==9589== LEAK SUMMARY:
==9589==    definitely lost: 2,181 bytes in 11 blocks
==9589==    indirectly lost: 6,756 bytes in 7 blocks
==9589==      possibly lost: 0 bytes in 0 blocks
==9589==    still reachable: 3,151,884 bytes in 69,783 blocks
==9589==         suppressed: 0 bytes in 0 blocks
==9589== Rerun with --leak-check=full to see details of leaked memory
==9589== 
==9589== Use --track-origins=yes to see where uninitialised values come from
==9589== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9589== 
==9589== 1 errors in context 1 of 2:
==9589== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9589==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9589==    by 0x488CD0: stringsubst (subst.c:301)
==9589==    by 0x48801B: prefork (subst.c:77)
==9589==    by 0x42B318: execcmd (exec.c:2619)
==9589==    by 0x428CA0: execpline2 (exec.c:1697)
==9589==    by 0x427FD2: execpline (exec.c:1484)
==9589==    by 0x427756: execlist (exec.c:1267)
==9589==    by 0x42717C: execode (exec.c:1073)
==9589==    by 0x431299: runshfunc (exec.c:5040)
==9589==    by 0x430E76: doshfunc (exec.c:4920)
==9589==    by 0x4302FB: execshfunc (exec.c:4557)
==9589==    by 0x42D8C1: execcmd (exec.c:3373)
==9589== 
==9589== 
==9589== 2 errors in context 2 of 2:
==9589== Conditional jump or move depends on uninitialised value(s)
==9589==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9589==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9589==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9589==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9589==    by 0x42D8E9: execcmd (exec.c:3378)
==9589==    by 0x428CA0: execpline2 (exec.c:1697)
==9589==    by 0x427FD2: execpline (exec.c:1484)
==9589==    by 0x42779A: execlist (exec.c:1275)
==9589==    by 0x42717C: execode (exec.c:1073)
==9589==    by 0x431299: runshfunc (exec.c:5040)
==9589==    by 0x430E76: doshfunc (exec.c:4920)
==9589==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9589== 
==9589== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9594-- Caught __NR_exit; running __libc_freeres()
==9594== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9594-by-pythonnut-on-???
==9594== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9594-by-pythonnut-on-???
==9594== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9594-by-pythonnut-on-???
==9594== 
==9594== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9594== don't want to do, unless you know exactly what you're doing,
==9594== or are doing some strange experiment):
==9594==   /usr/lib/valgrind/../../bin/vgdb --pid=9594 ...command...
==9594== 
==9594== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9594==   /path/to/gdb ./zsh
==9594== and then give GDB the following command
==9594==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9594
==9594== --pid is optional if only one valgrind process is running
==9594== 
--9594-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9594== 
==9594== HEAP SUMMARY:
==9594==     in use at exit: 3,160,828 bytes in 69,801 blocks
==9594==   total heap usage: 1,459,811 allocs, 1,390,010 frees, 117,402,227 bytes allocated
==9594== 
==9594== Searching for pointers to 69,801 not-freed blocks
--9594--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9594--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9594--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9594--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9594--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9594--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9594--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9594--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9594--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9594--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9594--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9594--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9594--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9594--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9594--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9594--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9594--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9594--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9594--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9594--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9594--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9594--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9594--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9594--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9594--   Scanning root segment: 0x701a000..0x701afff (4096)
--9594--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9594--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9594--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9594--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9594--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9594--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9594--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9594--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9594--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9594== Checked 4,797,912 bytes
==9594== 
==9594== LEAK SUMMARY:
==9594==    definitely lost: 2,181 bytes in 11 blocks
==9594==    indirectly lost: 6,756 bytes in 7 blocks
==9594==      possibly lost: 0 bytes in 0 blocks
==9594==    still reachable: 3,151,891 bytes in 69,783 blocks
==9594==         suppressed: 0 bytes in 0 blocks
==9594== Rerun with --leak-check=full to see details of leaked memory
==9594== 
==9594== Use --track-origins=yes to see where uninitialised values come from
==9594== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9594== 
==9594== 1 errors in context 1 of 2:
==9594== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9594==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9594==    by 0x488CD0: stringsubst (subst.c:301)
==9594==    by 0x48801B: prefork (subst.c:77)
==9594==    by 0x42B318: execcmd (exec.c:2619)
==9594==    by 0x428CA0: execpline2 (exec.c:1697)
==9594==    by 0x427FD2: execpline (exec.c:1484)
==9594==    by 0x427756: execlist (exec.c:1267)
==9594==    by 0x42717C: execode (exec.c:1073)
==9594==    by 0x431299: runshfunc (exec.c:5040)
==9594==    by 0x430E76: doshfunc (exec.c:4920)
==9594==    by 0x4302FB: execshfunc (exec.c:4557)
==9594==    by 0x42D8C1: execcmd (exec.c:3373)
==9594== 
==9594== 
==9594== 2 errors in context 2 of 2:
==9594== Conditional jump or move depends on uninitialised value(s)
==9594==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9594==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9594==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9594==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9594==    by 0x42D8E9: execcmd (exec.c:3378)
==9594==    by 0x428CA0: execpline2 (exec.c:1697)
==9594==    by 0x427FD2: execpline (exec.c:1484)
==9594==    by 0x42779A: execlist (exec.c:1275)
==9594==    by 0x42717C: execode (exec.c:1073)
==9594==    by 0x431299: runshfunc (exec.c:5040)
==9594==    by 0x430E76: doshfunc (exec.c:4920)
==9594==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9594== 
==9594== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9595-- Caught __NR_exit; running __libc_freeres()
==9595== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9595-by-pythonnut-on-???
==9595== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9595-by-pythonnut-on-???
==9595== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9595-by-pythonnut-on-???
==9595== 
==9595== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9595== don't want to do, unless you know exactly what you're doing,
==9595== or are doing some strange experiment):
==9595==   /usr/lib/valgrind/../../bin/vgdb --pid=9595 ...command...
==9595== 
==9595== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9595==   /path/to/gdb ./zsh
==9595== and then give GDB the following command
==9595==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9595
==9595== --pid is optional if only one valgrind process is running
==9595== 
--9595-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9595== 
==9595== HEAP SUMMARY:
==9595==     in use at exit: 3,160,924 bytes in 69,801 blocks
==9595==   total heap usage: 1,459,827 allocs, 1,390,026 frees, 117,407,014 bytes allocated
==9595== 
==9595== Searching for pointers to 69,801 not-freed blocks
--9595--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9595--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9595--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9595--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9595--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9595--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9595--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9595--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9595--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9595--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9595--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9595--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9595--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9595--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9595--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9595--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9595--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9595--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9595--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9595--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9595--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9595--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9595--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9595--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9595--   Scanning root segment: 0x701a000..0x701afff (4096)
--9595--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9595--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9595--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9595--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9595--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9595--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9595--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9595--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9595--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9595== Checked 4,797,192 bytes
==9595== 
==9595== LEAK SUMMARY:
==9595==    definitely lost: 2,181 bytes in 11 blocks
==9595==    indirectly lost: 6,756 bytes in 7 blocks
==9595==      possibly lost: 0 bytes in 0 blocks
==9595==    still reachable: 3,151,987 bytes in 69,783 blocks
==9595==         suppressed: 0 bytes in 0 blocks
==9595== Rerun with --leak-check=full to see details of leaked memory
==9595== 
==9595== Use --track-origins=yes to see where uninitialised values come from
==9595== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9595== 
==9595== 1 errors in context 1 of 2:
==9595== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9595==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9595==    by 0x488CD0: stringsubst (subst.c:301)
==9595==    by 0x48801B: prefork (subst.c:77)
==9595==    by 0x42B318: execcmd (exec.c:2619)
==9595==    by 0x428CA0: execpline2 (exec.c:1697)
==9595==    by 0x427FD2: execpline (exec.c:1484)
==9595==    by 0x427756: execlist (exec.c:1267)
==9595==    by 0x42717C: execode (exec.c:1073)
==9595==    by 0x431299: runshfunc (exec.c:5040)
==9595==    by 0x430E76: doshfunc (exec.c:4920)
==9595==    by 0x4302FB: execshfunc (exec.c:4557)
==9595==    by 0x42D8C1: execcmd (exec.c:3373)
==9595== 
==9595== 
==9595== 2 errors in context 2 of 2:
==9595== Conditional jump or move depends on uninitialised value(s)
==9595==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9595==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9595==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9595==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9595==    by 0x42D8E9: execcmd (exec.c:3378)
==9595==    by 0x428CA0: execpline2 (exec.c:1697)
==9595==    by 0x427FD2: execpline (exec.c:1484)
==9595==    by 0x42779A: execlist (exec.c:1275)
==9595==    by 0x42717C: execode (exec.c:1073)
==9595==    by 0x431299: runshfunc (exec.c:5040)
==9595==    by 0x430E76: doshfunc (exec.c:4920)
==9595==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9595== 
==9595== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9596== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9596-by-pythonnut-on-???
==9596== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9596-by-pythonnut-on-???
==9596== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9596-by-pythonnut-on-???
==9596== 
==9596== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9596== don't want to do, unless you know exactly what you're doing,
==9596== or are doing some strange experiment):
==9596==   /usr/lib/valgrind/../../bin/vgdb --pid=9596 ...command...
==9596== 
==9596== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9596==   /path/to/gdb ./zsh
==9596== and then give GDB the following command
==9596==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9596
==9596== --pid is optional if only one valgrind process is running
==9596== 
--9596-- Caught __NR_exit; running __libc_freeres()
--9596-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9596== 
==9596== HEAP SUMMARY:
==9596==     in use at exit: 3,161,170 bytes in 69,807 blocks
==9596==   total heap usage: 1,459,875 allocs, 1,390,068 frees, 117,416,038 bytes allocated
==9596== 
==9596== Searching for pointers to 69,807 not-freed blocks
--9596--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9596--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9596--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9596--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9596--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9596--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9596--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9596--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9596--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9596--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9596--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9596--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9596--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9596--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9596--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9596--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9596--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9596--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9596--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9596--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9596--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9596--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9596--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9596--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9596--   Scanning root segment: 0x701a000..0x701afff (4096)
--9596--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9596--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9596--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9596--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9596--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9596--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9596--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9596--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9596--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9596== Checked 4,797,368 bytes
==9596== 
==9596== LEAK SUMMARY:
==9596==    definitely lost: 2,181 bytes in 11 blocks
==9596==    indirectly lost: 6,756 bytes in 7 blocks
==9596==      possibly lost: 0 bytes in 0 blocks
==9596==    still reachable: 3,152,233 bytes in 69,789 blocks
==9596==         suppressed: 0 bytes in 0 blocks
==9596== Rerun with --leak-check=full to see details of leaked memory
==9596== 
==9596== Use --track-origins=yes to see where uninitialised values come from
==9596== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9596== 
==9596== 1 errors in context 1 of 2:
==9596== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9596==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9596==    by 0x488CD0: stringsubst (subst.c:301)
==9596==    by 0x48801B: prefork (subst.c:77)
==9596==    by 0x42B318: execcmd (exec.c:2619)
==9596==    by 0x428CA0: execpline2 (exec.c:1697)
==9596==    by 0x427FD2: execpline (exec.c:1484)
==9596==    by 0x427756: execlist (exec.c:1267)
==9596==    by 0x42717C: execode (exec.c:1073)
==9596==    by 0x431299: runshfunc (exec.c:5040)
==9596==    by 0x430E76: doshfunc (exec.c:4920)
==9596==    by 0x4302FB: execshfunc (exec.c:4557)
==9596==    by 0x42D8C1: execcmd (exec.c:3373)
==9596== 
==9596== 
==9596== 2 errors in context 2 of 2:
==9596== Conditional jump or move depends on uninitialised value(s)
==9596==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9596==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9596==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9596==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9596==    by 0x42D8E9: execcmd (exec.c:3378)
==9596==    by 0x428CA0: execpline2 (exec.c:1697)
==9596==    by 0x427FD2: execpline (exec.c:1484)
==9596==    by 0x42779A: execlist (exec.c:1275)
==9596==    by 0x42717C: execode (exec.c:1073)
==9596==    by 0x431299: runshfunc (exec.c:5040)
==9596==    by 0x430E76: doshfunc (exec.c:4920)
==9596==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9596== 
==9596== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9597-- Caught __NR_exit; running __libc_freeres()
==9597== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9597-by-pythonnut-on-???
==9597== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9597-by-pythonnut-on-???
==9597== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9597-by-pythonnut-on-???
==9597== 
==9597== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9597== don't want to do, unless you know exactly what you're doing,
==9597== or are doing some strange experiment):
==9597==   /usr/lib/valgrind/../../bin/vgdb --pid=9597 ...command...
==9597== 
==9597== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9597==   /path/to/gdb ./zsh
==9597== and then give GDB the following command
==9597==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9597
==9597== --pid is optional if only one valgrind process is running
==9597== 
--9597-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9597== 
==9597== HEAP SUMMARY:
==9597==     in use at exit: 3,161,106 bytes in 69,807 blocks
==9597==   total heap usage: 1,459,855 allocs, 1,390,048 frees, 117,413,808 bytes allocated
==9597== 
==9597== Searching for pointers to 69,807 not-freed blocks
--9597--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9597--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9597--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9597--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9597--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9597--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9597--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9597--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9597--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9597--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9597--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9597--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9597--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9597--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9597--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9597--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9597--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9597--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9597--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9597--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9597--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9597--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9597--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9597--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9597--   Scanning root segment: 0x701a000..0x701afff (4096)
--9597--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9597--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9597--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9597--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9597--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9597--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9597--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9597--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9597--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9597== Checked 4,797,288 bytes
==9597== 
==9597== LEAK SUMMARY:
==9597==    definitely lost: 2,181 bytes in 11 blocks
==9597==    indirectly lost: 6,756 bytes in 7 blocks
==9597==      possibly lost: 0 bytes in 0 blocks
==9597==    still reachable: 3,152,169 bytes in 69,789 blocks
==9597==         suppressed: 0 bytes in 0 blocks
==9597== Rerun with --leak-check=full to see details of leaked memory
==9597== 
==9597== Use --track-origins=yes to see where uninitialised values come from
==9597== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9597== 
==9597== 1 errors in context 1 of 2:
==9597== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9597==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9597==    by 0x488CD0: stringsubst (subst.c:301)
==9597==    by 0x48801B: prefork (subst.c:77)
==9597==    by 0x42B318: execcmd (exec.c:2619)
==9597==    by 0x428CA0: execpline2 (exec.c:1697)
==9597==    by 0x427FD2: execpline (exec.c:1484)
==9597==    by 0x427756: execlist (exec.c:1267)
==9597==    by 0x42717C: execode (exec.c:1073)
==9597==    by 0x431299: runshfunc (exec.c:5040)
==9597==    by 0x430E76: doshfunc (exec.c:4920)
==9597==    by 0x4302FB: execshfunc (exec.c:4557)
==9597==    by 0x42D8C1: execcmd (exec.c:3373)
==9597== 
==9597== 
==9597== 2 errors in context 2 of 2:
==9597== Conditional jump or move depends on uninitialised value(s)
==9597==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9597==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9597==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9597==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9597==    by 0x42D8E9: execcmd (exec.c:3378)
==9597==    by 0x428CA0: execpline2 (exec.c:1697)
==9597==    by 0x427FD2: execpline (exec.c:1484)
==9597==    by 0x42779A: execlist (exec.c:1275)
==9597==    by 0x42717C: execode (exec.c:1073)
==9597==    by 0x431299: runshfunc (exec.c:5040)
==9597==    by 0x430E76: doshfunc (exec.c:4920)
==9597==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9597== 
==9597== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9598== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9598-by-pythonnut-on-???
==9598== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9598-by-pythonnut-on-???
==9598== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9598-by-pythonnut-on-???
==9598== 
==9598== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9598== don't want to do, unless you know exactly what you're doing,
==9598== or are doing some strange experiment):
==9598==   /usr/lib/valgrind/../../bin/vgdb --pid=9598 ...command...
==9598== 
==9598== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9598==   /path/to/gdb ./zsh
==9598== and then give GDB the following command
==9598==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9598
==9598== --pid is optional if only one valgrind process is running
==9598== 
--9598-- Caught __NR_exit; running __libc_freeres()
--9598-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9598== 
==9598== HEAP SUMMARY:
==9598==     in use at exit: 3,161,144 bytes in 69,808 blocks
==9598==   total heap usage: 1,459,868 allocs, 1,390,060 frees, 117,416,505 bytes allocated
==9598== 
==9598== Searching for pointers to 69,808 not-freed blocks
--9598--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9598--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9598--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9598--   Scanning root segment: 0x4037000..0x403afff (16384)
--9598--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9598--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9598--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9598--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9598--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9598--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9598--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9598--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9598--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9598--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9598--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9598--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9598--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9598--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9598--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9598--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9598--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9598--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9598--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9598--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9598--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9598--   Scanning root segment: 0x701a000..0x701afff (4096)
--9598--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9598--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9598--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9598--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9598--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9598--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9598--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9598--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9598--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9598== Checked 4,813,192 bytes
==9598== 
==9598== LEAK SUMMARY:
==9598==    definitely lost: 2,181 bytes in 11 blocks
==9598==    indirectly lost: 6,756 bytes in 7 blocks
==9598==      possibly lost: 0 bytes in 0 blocks
==9598==    still reachable: 3,152,207 bytes in 69,790 blocks
==9598==         suppressed: 0 bytes in 0 blocks
==9598== Rerun with --leak-check=full to see details of leaked memory
==9598== 
==9598== Use --track-origins=yes to see where uninitialised values come from
==9598== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9598== 
==9598== 1 errors in context 1 of 2:
==9598== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9598==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9598==    by 0x488CD0: stringsubst (subst.c:301)
==9598==    by 0x48801B: prefork (subst.c:77)
==9598==    by 0x42B318: execcmd (exec.c:2619)
==9598==    by 0x428CA0: execpline2 (exec.c:1697)
==9598==    by 0x427FD2: execpline (exec.c:1484)
==9598==    by 0x427756: execlist (exec.c:1267)
==9598==    by 0x42717C: execode (exec.c:1073)
==9598==    by 0x431299: runshfunc (exec.c:5040)
==9598==    by 0x430E76: doshfunc (exec.c:4920)
==9598==    by 0x4302FB: execshfunc (exec.c:4557)
==9598==    by 0x42D8C1: execcmd (exec.c:3373)
==9598== 
==9598== 
==9598== 2 errors in context 2 of 2:
==9598== Conditional jump or move depends on uninitialised value(s)
==9598==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9598==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9598==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9598==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9598==    by 0x42D8E9: execcmd (exec.c:3378)
==9598==    by 0x428CA0: execpline2 (exec.c:1697)
==9598==    by 0x427FD2: execpline (exec.c:1484)
==9598==    by 0x42779A: execlist (exec.c:1275)
==9598==    by 0x42717C: execode (exec.c:1073)
==9598==    by 0x431299: runshfunc (exec.c:5040)
==9598==    by 0x430E76: doshfunc (exec.c:4920)
==9598==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9598== 
==9598== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9601== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9601-by-pythonnut-on-???
==9601== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9601-by-pythonnut-on-???
==9601== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9601-by-pythonnut-on-???
==9601== 
==9601== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9601== don't want to do, unless you know exactly what you're doing,
==9601== or are doing some strange experiment):
==9601==   /usr/lib/valgrind/../../bin/vgdb --pid=9601 ...command...
==9601== 
==9601== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9601==   /path/to/gdb ./zsh
==9601== and then give GDB the following command
==9601==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9601
==9601== --pid is optional if only one valgrind process is running
==9601== 
--9601-- Caught __NR_exit; running __libc_freeres()
--9601-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9601== 
==9601== HEAP SUMMARY:
==9601==     in use at exit: 3,164,305 bytes in 69,925 blocks
==9601==   total heap usage: 1,462,141 allocs, 1,392,216 frees, 117,544,731 bytes allocated
==9601== 
==9601== Searching for pointers to 69,925 not-freed blocks
--9601--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9601--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9601--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9601--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9601--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9601--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9601--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9601--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9601--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9601--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9601--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9601--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9601--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9601--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9601--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9601--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9601--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9601--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9601--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9601--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9601--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9601--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9601--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9601--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9601--   Scanning root segment: 0x701a000..0x701afff (4096)
--9601--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9601--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9601--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9601--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9601--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9601--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9601--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9601--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9601--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9601== Checked 4,807,224 bytes
==9601== 
==9601== LEAK SUMMARY:
==9601==    definitely lost: 2,181 bytes in 11 blocks
==9601==    indirectly lost: 6,756 bytes in 7 blocks
==9601==      possibly lost: 0 bytes in 0 blocks
==9601==    still reachable: 3,155,368 bytes in 69,907 blocks
==9601==         suppressed: 0 bytes in 0 blocks
==9601== Rerun with --leak-check=full to see details of leaked memory
==9601== 
==9601== Use --track-origins=yes to see where uninitialised values come from
==9601== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9601== 
==9601== 1 errors in context 1 of 2:
==9601== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9601==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9601==    by 0x488CD0: stringsubst (subst.c:301)
==9601==    by 0x48801B: prefork (subst.c:77)
==9601==    by 0x42B318: execcmd (exec.c:2619)
==9601==    by 0x428CA0: execpline2 (exec.c:1697)
==9601==    by 0x427FD2: execpline (exec.c:1484)
==9601==    by 0x427756: execlist (exec.c:1267)
==9601==    by 0x42717C: execode (exec.c:1073)
==9601==    by 0x431299: runshfunc (exec.c:5040)
==9601==    by 0x430E76: doshfunc (exec.c:4920)
==9601==    by 0x4302FB: execshfunc (exec.c:4557)
==9601==    by 0x42D8C1: execcmd (exec.c:3373)
==9601== 
==9601== 
==9601== 2 errors in context 2 of 2:
==9601== Conditional jump or move depends on uninitialised value(s)
==9601==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9601==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9601==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9601==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9601==    by 0x42D8E9: execcmd (exec.c:3378)
==9601==    by 0x428CA0: execpline2 (exec.c:1697)
==9601==    by 0x427FD2: execpline (exec.c:1484)
==9601==    by 0x42779A: execlist (exec.c:1275)
==9601==    by 0x42717C: execode (exec.c:1073)
==9601==    by 0x431299: runshfunc (exec.c:5040)
==9601==    by 0x430E76: doshfunc (exec.c:4920)
==9601==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9601== 
==9601== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9602== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9602-by-pythonnut-on-???
==9602== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9602-by-pythonnut-on-???
==9602== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9602-by-pythonnut-on-???
==9602== 
==9602== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9602== don't want to do, unless you know exactly what you're doing,
==9602== or are doing some strange experiment):
==9602==   /usr/lib/valgrind/../../bin/vgdb --pid=9602 ...command...
==9602== 
==9602== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9602==   /path/to/gdb ./zsh
==9602== and then give GDB the following command
==9602==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9602
==9602== --pid is optional if only one valgrind process is running
==9602== 
--9602-- Caught __NR_exit; running __libc_freeres()
--9602-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9602== 
==9602== HEAP SUMMARY:
==9602==     in use at exit: 3,164,449 bytes in 69,925 blocks
==9602==   total heap usage: 1,462,148 allocs, 1,392,223 frees, 117,547,759 bytes allocated
==9602== 
==9602== Searching for pointers to 69,925 not-freed blocks
--9602--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9602--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9602--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9602--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9602--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9602--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9602--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9602--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9602--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9602--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9602--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9602--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9602--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9602--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9602--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9602--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9602--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9602--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9602--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9602--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9602--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9602--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9602--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9602--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9602--   Scanning root segment: 0x701a000..0x701afff (4096)
--9602--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9602--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9602--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9602--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9602--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9602--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9602--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9602--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9602--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9602== Checked 4,808,728 bytes
==9602== 
==9602== LEAK SUMMARY:
==9602==    definitely lost: 2,181 bytes in 11 blocks
==9602==    indirectly lost: 6,756 bytes in 7 blocks
==9602==      possibly lost: 0 bytes in 0 blocks
==9602==    still reachable: 3,155,512 bytes in 69,907 blocks
==9602==         suppressed: 0 bytes in 0 blocks
==9602== Rerun with --leak-check=full to see details of leaked memory
==9602== 
==9602== Use --track-origins=yes to see where uninitialised values come from
==9602== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9602== 
==9602== 1 errors in context 1 of 2:
==9602== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9602==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9602==    by 0x488CD0: stringsubst (subst.c:301)
==9602==    by 0x48801B: prefork (subst.c:77)
==9602==    by 0x42B318: execcmd (exec.c:2619)
==9602==    by 0x428CA0: execpline2 (exec.c:1697)
==9602==    by 0x427FD2: execpline (exec.c:1484)
==9602==    by 0x427756: execlist (exec.c:1267)
==9602==    by 0x42717C: execode (exec.c:1073)
==9602==    by 0x431299: runshfunc (exec.c:5040)
==9602==    by 0x430E76: doshfunc (exec.c:4920)
==9602==    by 0x4302FB: execshfunc (exec.c:4557)
==9602==    by 0x42D8C1: execcmd (exec.c:3373)
==9602== 
==9602== 
==9602== 2 errors in context 2 of 2:
==9602== Conditional jump or move depends on uninitialised value(s)
==9602==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9602==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9602==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9602==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9602==    by 0x42D8E9: execcmd (exec.c:3378)
==9602==    by 0x428CA0: execpline2 (exec.c:1697)
==9602==    by 0x427FD2: execpline (exec.c:1484)
==9602==    by 0x42779A: execlist (exec.c:1275)
==9602==    by 0x42717C: execode (exec.c:1073)
==9602==    by 0x431299: runshfunc (exec.c:5040)
==9602==    by 0x430E76: doshfunc (exec.c:4920)
==9602==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9602== 
==9602== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9603== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9603-by-pythonnut-on-???
==9603== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9603-by-pythonnut-on-???
==9603== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9603-by-pythonnut-on-???
==9603== 
==9603== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9603== don't want to do, unless you know exactly what you're doing,
==9603== or are doing some strange experiment):
==9603==   /usr/lib/valgrind/../../bin/vgdb --pid=9603 ...command...
==9603== 
==9603== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9603==   /path/to/gdb ./zsh
==9603== and then give GDB the following command
==9603==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9603
==9603== --pid is optional if only one valgrind process is running
==9603== 
--9603-- Caught __NR_exit; running __libc_freeres()
--9603-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9603== 
==9603== HEAP SUMMARY:
==9603==     in use at exit: 3,161,165 bytes in 69,837 blocks
==9603==   total heap usage: 1,462,376 allocs, 1,392,539 frees, 117,577,503 bytes allocated
==9603== 
==9603== Searching for pointers to 69,837 not-freed blocks
--9603--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9603--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9603--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9603--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9603--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9603--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9603--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9603--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9603--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9603--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9603--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9603--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9603--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9603--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9603--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9603--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9603--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9603--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9603--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9603--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9603--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9603--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9603--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9603--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9603--   Scanning root segment: 0x701a000..0x701afff (4096)
--9603--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9603--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9603--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9603--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9603--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9603--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9603--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9603--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9603--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9603== Checked 4,799,480 bytes
==9603== 
==9603== LEAK SUMMARY:
==9603==    definitely lost: 2,181 bytes in 11 blocks
==9603==    indirectly lost: 6,756 bytes in 7 blocks
==9603==      possibly lost: 0 bytes in 0 blocks
==9603==    still reachable: 3,152,228 bytes in 69,819 blocks
==9603==         suppressed: 0 bytes in 0 blocks
==9603== Rerun with --leak-check=full to see details of leaked memory
==9603== 
==9603== Use --track-origins=yes to see where uninitialised values come from
==9603== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9603== 
==9603== 1 errors in context 1 of 2:
==9603== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9603==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9603==    by 0x488CD0: stringsubst (subst.c:301)
==9603==    by 0x48801B: prefork (subst.c:77)
==9603==    by 0x42B318: execcmd (exec.c:2619)
==9603==    by 0x428CA0: execpline2 (exec.c:1697)
==9603==    by 0x427FD2: execpline (exec.c:1484)
==9603==    by 0x427756: execlist (exec.c:1267)
==9603==    by 0x42717C: execode (exec.c:1073)
==9603==    by 0x431299: runshfunc (exec.c:5040)
==9603==    by 0x430E76: doshfunc (exec.c:4920)
==9603==    by 0x4302FB: execshfunc (exec.c:4557)
==9603==    by 0x42D8C1: execcmd (exec.c:3373)
==9603== 
==9603== 
==9603== 2 errors in context 2 of 2:
==9603== Conditional jump or move depends on uninitialised value(s)
==9603==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9603==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9603==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9603==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9603==    by 0x42D8E9: execcmd (exec.c:3378)
==9603==    by 0x428CA0: execpline2 (exec.c:1697)
==9603==    by 0x427FD2: execpline (exec.c:1484)
==9603==    by 0x42779A: execlist (exec.c:1275)
==9603==    by 0x42717C: execode (exec.c:1073)
==9603==    by 0x431299: runshfunc (exec.c:5040)
==9603==    by 0x430E76: doshfunc (exec.c:4920)
==9603==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9603== 
==9603== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9604-- Caught __NR_exit; running __libc_freeres()
==9604== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9604-by-pythonnut-on-???
==9604== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9604-by-pythonnut-on-???
==9604== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9604-by-pythonnut-on-???
==9604== 
==9604== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9604== don't want to do, unless you know exactly what you're doing,
==9604== or are doing some strange experiment):
==9604==   /usr/lib/valgrind/../../bin/vgdb --pid=9604 ...command...
==9604== 
==9604== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9604==   /path/to/gdb ./zsh
==9604== and then give GDB the following command
==9604==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9604
==9604== --pid is optional if only one valgrind process is running
==9604== 
--9604-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9604== 
==9604== HEAP SUMMARY:
==9604==     in use at exit: 3,161,229 bytes in 69,837 blocks
==9604==   total heap usage: 1,462,382 allocs, 1,392,545 frees, 117,586,079 bytes allocated
==9604== 
==9604== Searching for pointers to 69,837 not-freed blocks
--9604--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9604--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9604--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9604--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9604--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9604--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9604--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9604--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9604--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9604--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9604--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9604--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9604--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9604--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9604--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9604--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9604--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9604--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9604--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9604--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9604--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9604--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9604--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9604--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9604--   Scanning root segment: 0x701a000..0x701afff (4096)
--9604--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9604--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9604--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9604--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9604--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9604--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9604--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9604--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9604--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9604== Checked 4,801,568 bytes
==9604== 
==9604== LEAK SUMMARY:
==9604==    definitely lost: 2,181 bytes in 11 blocks
==9604==    indirectly lost: 6,756 bytes in 7 blocks
==9604==      possibly lost: 0 bytes in 0 blocks
==9604==    still reachable: 3,152,292 bytes in 69,819 blocks
==9604==         suppressed: 0 bytes in 0 blocks
==9604== Rerun with --leak-check=full to see details of leaked memory
==9604== 
==9604== Use --track-origins=yes to see where uninitialised values come from
==9604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9604== 
==9604== 1 errors in context 1 of 2:
==9604== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9604==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9604==    by 0x488CD0: stringsubst (subst.c:301)
==9604==    by 0x48801B: prefork (subst.c:77)
==9604==    by 0x42B318: execcmd (exec.c:2619)
==9604==    by 0x428CA0: execpline2 (exec.c:1697)
==9604==    by 0x427FD2: execpline (exec.c:1484)
==9604==    by 0x427756: execlist (exec.c:1267)
==9604==    by 0x42717C: execode (exec.c:1073)
==9604==    by 0x431299: runshfunc (exec.c:5040)
==9604==    by 0x430E76: doshfunc (exec.c:4920)
==9604==    by 0x4302FB: execshfunc (exec.c:4557)
==9604==    by 0x42D8C1: execcmd (exec.c:3373)
==9604== 
==9604== 
==9604== 2 errors in context 2 of 2:
==9604== Conditional jump or move depends on uninitialised value(s)
==9604==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9604==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9604==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9604==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9604==    by 0x42D8E9: execcmd (exec.c:3378)
==9604==    by 0x428CA0: execpline2 (exec.c:1697)
==9604==    by 0x427FD2: execpline (exec.c:1484)
==9604==    by 0x42779A: execlist (exec.c:1275)
==9604==    by 0x42717C: execode (exec.c:1073)
==9604==    by 0x431299: runshfunc (exec.c:5040)
==9604==    by 0x430E76: doshfunc (exec.c:4920)
==9604==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9604== 
==9604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9605== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9605-by-pythonnut-on-???
==9605== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9605-by-pythonnut-on-???
==9605== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9605-by-pythonnut-on-???
==9605== 
==9605== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9605== don't want to do, unless you know exactly what you're doing,
==9605== or are doing some strange experiment):
==9605==   /usr/lib/valgrind/../../bin/vgdb --pid=9605 ...command...
==9605== 
==9605== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9605==   /path/to/gdb ./zsh
==9605== and then give GDB the following command
==9605==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9605
==9605== --pid is optional if only one valgrind process is running
==9605== 
==9606== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9606-by-pythonnut-on-???
==9606== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9606-by-pythonnut-on-???
==9606== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9606-by-pythonnut-on-???
==9606== 
==9606== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9606== don't want to do, unless you know exactly what you're doing,
==9606== or are doing some strange experiment):
==9606==   /usr/lib/valgrind/../../bin/vgdb --pid=9606 ...command...
==9606== 
==9606== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9606==   /path/to/gdb ./zsh
==9606== and then give GDB the following command
==9606==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9606
==9606== --pid is optional if only one valgrind process is running
==9606== 
==9607== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9607-by-pythonnut-on-???
==9607== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9607-by-pythonnut-on-???
==9607== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9607-by-pythonnut-on-???
==9607== 
==9607== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9607== don't want to do, unless you know exactly what you're doing,
==9607== or are doing some strange experiment):
==9607==   /usr/lib/valgrind/../../bin/vgdb --pid=9607 ...command...
==9607== 
==9607== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9607==   /path/to/gdb ./zsh
==9607== and then give GDB the following command
==9607==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9607
==9607== --pid is optional if only one valgrind process is running
==9607== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--9607-- Caught __NR_exit; running __libc_freeres()
--9607-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9607== 
==9607== HEAP SUMMARY:
==9607==     in use at exit: 3,165,048 bytes in 69,904 blocks
==9607==   total heap usage: 1,462,543 allocs, 1,392,639 frees, 117,615,403 bytes allocated
==9607== 
==9607== Searching for pointers to 69,904 not-freed blocks
--9607--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9607--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9607--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9607--   Scanning root segment: 0x4037000..0x403afff (16384)
--9607--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9607--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9607--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9607--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9607--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9607--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9607--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9607--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9607--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9607--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9607--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9607--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9607--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9607--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9607--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9607--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9607--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9607--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9607--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9607--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9607--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9607--   Scanning root segment: 0x701a000..0x701afff (4096)
--9607--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9607--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9607--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9607--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9607--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9607--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9607--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9607--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9607--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9607== Checked 4,823,920 bytes
==9607== 
==9607== LEAK SUMMARY:
==9607==    definitely lost: 2,181 bytes in 11 blocks
==9607==    indirectly lost: 6,756 bytes in 7 blocks
==9607==      possibly lost: 0 bytes in 0 blocks
==9607==    still reachable: 3,156,111 bytes in 69,886 blocks
==9607==         suppressed: 0 bytes in 0 blocks
==9607== Rerun with --leak-check=full to see details of leaked memory
==9607== 
==9607== Use --track-origins=yes to see where uninitialised values come from
==9607== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9607== 
==9607== 1 errors in context 1 of 2:
==9607== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9607==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9607==    by 0x488CD0: stringsubst (subst.c:301)
==9607==    by 0x48801B: prefork (subst.c:77)
==9607==    by 0x42B318: execcmd (exec.c:2619)
==9607==    by 0x428CA0: execpline2 (exec.c:1697)
==9607==    by 0x427FD2: execpline (exec.c:1484)
==9607==    by 0x427756: execlist (exec.c:1267)
==9607==    by 0x42717C: execode (exec.c:1073)
==9607==    by 0x431299: runshfunc (exec.c:5040)
==9607==    by 0x430E76: doshfunc (exec.c:4920)
==9607==    by 0x4302FB: execshfunc (exec.c:4557)
==9607==    by 0x42D8C1: execcmd (exec.c:3373)
==9607== 
==9607== 
==9607== 2 errors in context 2 of 2:
==9607== Conditional jump or move depends on uninitialised value(s)
==9607==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9607==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9607==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9607==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9607==    by 0x42D8E9: execcmd (exec.c:3378)
==9607==    by 0x428CA0: execpline2 (exec.c:1697)
==9607==    by 0x427FD2: execpline (exec.c:1484)
==9607==    by 0x42779A: execlist (exec.c:1275)
==9607==    by 0x42717C: execode (exec.c:1073)
==9607==    by 0x431299: runshfunc (exec.c:5040)
==9607==    by 0x430E76: doshfunc (exec.c:4920)
==9607==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9607== 
==9607== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9610== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9610-by-pythonnut-on-???
==9610== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9610-by-pythonnut-on-???
==9610== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9610-by-pythonnut-on-???
==9610== 
==9610== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9610== don't want to do, unless you know exactly what you're doing,
==9610== or are doing some strange experiment):
==9610==   /usr/lib/valgrind/../../bin/vgdb --pid=9610 ...command...
==9610== 
==9610== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9610==   /path/to/gdb ./zsh
==9610== and then give GDB the following command
==9610==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9610
==9610== --pid is optional if only one valgrind process is running
==9610== 
--9610-- Caught __NR_exit; running __libc_freeres()
==9611== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9611-by-pythonnut-on-???
==9611== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9611-by-pythonnut-on-???
==9611== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9611-by-pythonnut-on-???
==9611== 
==9611== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9611== don't want to do, unless you know exactly what you're doing,
==9611== or are doing some strange experiment):
==9611==   /usr/lib/valgrind/../../bin/vgdb --pid=9611 ...command...
==9611== 
==9611== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9611==   /path/to/gdb ./zsh
==9611== and then give GDB the following command
==9611==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9611
==9611== --pid is optional if only one valgrind process is running
==9611== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9610-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9610== 
==9610== HEAP SUMMARY:
==9610==     in use at exit: 3,201,915 bytes in 69,911 blocks
==9610==   total heap usage: 1,462,550 allocs, 1,392,639 frees, 117,655,326 bytes allocated
==9610== 
==9610== Searching for pointers to 69,911 not-freed blocks
--9610--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9610--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9610--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9610--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9610--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9610--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9610--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9610--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9610--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9610--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9610--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9610--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9610--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9610--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9610--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9610--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9610--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9610--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9610--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9610--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9610--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9610--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9610--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9610--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9610--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9610--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9610--   Scanning root segment: 0x701a000..0x701afff (4096)
--9610--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9610--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9610--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9610--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9610--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9610--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9610--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9610--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9610--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9610== Checked 4,935,720 bytes
==9610== 
==9610== LEAK SUMMARY:
==9610==    definitely lost: 2,181 bytes in 11 blocks
==9610==    indirectly lost: 6,756 bytes in 7 blocks
==9610==      possibly lost: 0 bytes in 0 blocks
==9610==    still reachable: 3,192,978 bytes in 69,893 blocks
==9610==         suppressed: 0 bytes in 0 blocks
==9610== Rerun with --leak-check=full to see details of leaked memory
==9610== 
==9610== Use --track-origins=yes to see where uninitialised values come from
==9610== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9610== 
==9610== 1 errors in context 1 of 2:
==9610== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9610==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9610==    by 0x488CD0: stringsubst (subst.c:301)
==9610==    by 0x48801B: prefork (subst.c:77)
==9610==    by 0x42B318: execcmd (exec.c:2619)
==9610==    by 0x428CA0: execpline2 (exec.c:1697)
==9610==    by 0x427FD2: execpline (exec.c:1484)
==9610==    by 0x427756: execlist (exec.c:1267)
==9610==    by 0x42717C: execode (exec.c:1073)
==9610==    by 0x431299: runshfunc (exec.c:5040)
==9610==    by 0x430E76: doshfunc (exec.c:4920)
==9610==    by 0x4302FB: execshfunc (exec.c:4557)
==9610==    by 0x42D8C1: execcmd (exec.c:3373)
==9610== 
==9610== 
==9610== 2 errors in context 2 of 2:
==9610== Conditional jump or move depends on uninitialised value(s)
==9610==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9610==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9610==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9610==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9610==    by 0x42D8E9: execcmd (exec.c:3378)
==9610==    by 0x428CA0: execpline2 (exec.c:1697)
==9610==    by 0x427FD2: execpline (exec.c:1484)
==9610==    by 0x42779A: execlist (exec.c:1275)
==9610==    by 0x42717C: execode (exec.c:1073)
==9610==    by 0x431299: runshfunc (exec.c:5040)
==9610==    by 0x430E76: doshfunc (exec.c:4920)
==9610==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9610== 
==9610== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9609== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9609-by-pythonnut-on-???
==9609== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9609-by-pythonnut-on-???
==9609== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9609-by-pythonnut-on-???
==9609== 
==9609== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9609== don't want to do, unless you know exactly what you're doing,
==9609== or are doing some strange experiment):
==9609==   /usr/lib/valgrind/../../bin/vgdb --pid=9609 ...command...
==9609== 
==9609== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9609==   /path/to/gdb ./zsh
==9609== and then give GDB the following command
==9609==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9609
==9609== --pid is optional if only one valgrind process is running
==9609== 
--9609-- Caught __NR_exit; running __libc_freeres()
--9609-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9609== 
==9609== HEAP SUMMARY:
==9609==     in use at exit: 3,201,851 bytes in 69,908 blocks
==9609==   total heap usage: 1,462,552 allocs, 1,392,644 frees, 117,655,870 bytes allocated
==9609== 
==9609== Searching for pointers to 69,908 not-freed blocks
--9609--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9609--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9609--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9609--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9609--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9609--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9609--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9609--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9609--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9609--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9609--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9609--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9609--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9609--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9609--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9609--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9609--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9609--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9609--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9609--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9609--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9609--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9609--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9609--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9609--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9609--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9609--   Scanning root segment: 0x701a000..0x701afff (4096)
--9609--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9609--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9609--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9609--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9609--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9609--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9609--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9609--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9609--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9609== Checked 4,935,032 bytes
==9609== 
==9609== LEAK SUMMARY:
==9609==    definitely lost: 2,181 bytes in 11 blocks
==9609==    indirectly lost: 6,756 bytes in 7 blocks
==9609==      possibly lost: 0 bytes in 0 blocks
==9609==    still reachable: 3,192,914 bytes in 69,890 blocks
==9609==         suppressed: 0 bytes in 0 blocks
==9609== Rerun with --leak-check=full to see details of leaked memory
==9609== 
==9609== Use --track-origins=yes to see where uninitialised values come from
==9609== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9609== 
==9609== 1 errors in context 1 of 2:
==9609== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9609==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9609==    by 0x488CD0: stringsubst (subst.c:301)
==9609==    by 0x48801B: prefork (subst.c:77)
==9609==    by 0x42B318: execcmd (exec.c:2619)
==9609==    by 0x428CA0: execpline2 (exec.c:1697)
==9609==    by 0x427FD2: execpline (exec.c:1484)
==9609==    by 0x427756: execlist (exec.c:1267)
==9609==    by 0x42717C: execode (exec.c:1073)
==9609==    by 0x431299: runshfunc (exec.c:5040)
==9609==    by 0x430E76: doshfunc (exec.c:4920)
==9609==    by 0x4302FB: execshfunc (exec.c:4557)
==9609==    by 0x42D8C1: execcmd (exec.c:3373)
==9609== 
==9609== 
==9609== 2 errors in context 2 of 2:
==9609== Conditional jump or move depends on uninitialised value(s)
==9609==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9609==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9609==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9609==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9609==    by 0x42D8E9: execcmd (exec.c:3378)
==9609==    by 0x428CA0: execpline2 (exec.c:1697)
==9609==    by 0x427FD2: execpline (exec.c:1484)
==9609==    by 0x42779A: execlist (exec.c:1275)
==9609==    by 0x42717C: execode (exec.c:1073)
==9609==    by 0x431299: runshfunc (exec.c:5040)
==9609==    by 0x430E76: doshfunc (exec.c:4920)
==9609==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9609== 
==9609== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9614== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9614-by-pythonnut-on-???
==9614== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9614-by-pythonnut-on-???
==9614== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9614-by-pythonnut-on-???
==9614== 
==9614== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9614== don't want to do, unless you know exactly what you're doing,
==9614== or are doing some strange experiment):
==9614==   /usr/lib/valgrind/../../bin/vgdb --pid=9614 ...command...
==9614== 
==9614== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9614==   /path/to/gdb ./zsh
==9614== and then give GDB the following command
==9614==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9614
==9614== --pid is optional if only one valgrind process is running
==9614== 
==9615== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9615-by-pythonnut-on-???
==9615== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9615-by-pythonnut-on-???
==9615== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9615-by-pythonnut-on-???
==9615== 
==9615== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9615== don't want to do, unless you know exactly what you're doing,
==9615== or are doing some strange experiment):
==9615==   /usr/lib/valgrind/../../bin/vgdb --pid=9615 ...command...
==9615== 
==9615== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9615==   /path/to/gdb ./zsh
==9615== and then give GDB the following command
==9615==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9615
==9615== --pid is optional if only one valgrind process is running
==9615== 
--9615-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9615-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9615== 
==9615== HEAP SUMMARY:
==9615==     in use at exit: 3,238,537 bytes in 69,914 blocks
==9615==   total heap usage: 1,462,559 allocs, 1,392,645 frees, 117,694,169 bytes allocated
==9615== 
==9615== Searching for pointers to 69,914 not-freed blocks
--9615--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9615--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9615--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9615--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9615--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9615--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9615--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9615--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9615--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9615--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9615--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9615--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9615--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9615--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9615--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9615--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9615--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9615--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9615--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9615--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9615--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9615--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9615--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9615--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9615--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9615--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9615--   Scanning root segment: 0x701a000..0x701afff (4096)
--9615--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9615--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9615--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9615--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9615--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9615--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9615--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9615--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9615--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9615== Checked 5,009,184 bytes
==9615== 
==9615== LEAK SUMMARY:
==9615==    definitely lost: 2,181 bytes in 11 blocks
==9615==    indirectly lost: 6,756 bytes in 7 blocks
==9615==      possibly lost: 0 bytes in 0 blocks
==9615==    still reachable: 3,229,600 bytes in 69,896 blocks
==9615==         suppressed: 0 bytes in 0 blocks
==9615== Rerun with --leak-check=full to see details of leaked memory
==9615== 
==9615== Use --track-origins=yes to see where uninitialised values come from
==9615== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9615== 
==9615== 1 errors in context 1 of 2:
==9615== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9615==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9615==    by 0x488CD0: stringsubst (subst.c:301)
==9615==    by 0x48801B: prefork (subst.c:77)
==9615==    by 0x42B318: execcmd (exec.c:2619)
==9615==    by 0x428CA0: execpline2 (exec.c:1697)
==9615==    by 0x427FD2: execpline (exec.c:1484)
==9615==    by 0x427756: execlist (exec.c:1267)
==9615==    by 0x42717C: execode (exec.c:1073)
==9615==    by 0x431299: runshfunc (exec.c:5040)
==9615==    by 0x430E76: doshfunc (exec.c:4920)
==9615==    by 0x4302FB: execshfunc (exec.c:4557)
==9615==    by 0x42D8C1: execcmd (exec.c:3373)
==9615== 
==9615== 
==9615== 2 errors in context 2 of 2:
==9615== Conditional jump or move depends on uninitialised value(s)
==9615==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9615==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9615==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9615==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9615==    by 0x42D8E9: execcmd (exec.c:3378)
==9615==    by 0x428CA0: execpline2 (exec.c:1697)
==9615==    by 0x427FD2: execpline (exec.c:1484)
==9615==    by 0x42779A: execlist (exec.c:1275)
==9615==    by 0x42717C: execode (exec.c:1073)
==9615==    by 0x431299: runshfunc (exec.c:5040)
==9615==    by 0x430E76: doshfunc (exec.c:4920)
==9615==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9615== 
==9615== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9614-- Caught __NR_exit; running __libc_freeres()
--9614-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9614== 
==9614== HEAP SUMMARY:
==9614==     in use at exit: 3,201,897 bytes in 69,911 blocks
==9614==   total heap usage: 1,462,562 allocs, 1,392,651 frees, 117,694,745 bytes allocated
==9614== 
==9614== Searching for pointers to 69,911 not-freed blocks
--9614--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9614--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9614--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9614--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9614--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9614--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9614--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9614--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9614--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9614--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9614--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9614--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9614--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9614--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9614--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9614--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9614--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9614--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9614--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9614--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9614--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9614--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9614--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9614--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9614--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9614--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9614--   Scanning root segment: 0x701a000..0x701afff (4096)
--9614--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9614--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9614--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9614--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9614--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9614--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9614--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9614--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9614--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9614== Checked 4,971,928 bytes
==9614== 
==9614== LEAK SUMMARY:
==9614==    definitely lost: 2,181 bytes in 11 blocks
==9614==    indirectly lost: 6,756 bytes in 7 blocks
==9614==      possibly lost: 0 bytes in 0 blocks
==9614==    still reachable: 3,192,960 bytes in 69,893 blocks
==9614==         suppressed: 0 bytes in 0 blocks
==9614== Rerun with --leak-check=full to see details of leaked memory
==9614== 
==9614== Use --track-origins=yes to see where uninitialised values come from
==9614== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9614== 
==9614== 1 errors in context 1 of 2:
==9614== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9614==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9614==    by 0x488CD0: stringsubst (subst.c:301)
==9614==    by 0x48801B: prefork (subst.c:77)
==9614==    by 0x42B318: execcmd (exec.c:2619)
==9614==    by 0x428CA0: execpline2 (exec.c:1697)
==9614==    by 0x427FD2: execpline (exec.c:1484)
==9614==    by 0x427756: execlist (exec.c:1267)
==9614==    by 0x42717C: execode (exec.c:1073)
==9614==    by 0x431299: runshfunc (exec.c:5040)
==9614==    by 0x430E76: doshfunc (exec.c:4920)
==9614==    by 0x4302FB: execshfunc (exec.c:4557)
==9614==    by 0x42D8C1: execcmd (exec.c:3373)
==9614== 
==9614== 
==9614== 2 errors in context 2 of 2:
==9614== Conditional jump or move depends on uninitialised value(s)
==9614==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9614==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9614==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9614==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9614==    by 0x42D8E9: execcmd (exec.c:3378)
==9614==    by 0x428CA0: execpline2 (exec.c:1697)
==9614==    by 0x427FD2: execpline (exec.c:1484)
==9614==    by 0x42779A: execlist (exec.c:1275)
==9614==    by 0x42717C: execode (exec.c:1073)
==9614==    by 0x431299: runshfunc (exec.c:5040)
==9614==    by 0x430E76: doshfunc (exec.c:4920)
==9614==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9614== 
==9614== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9617== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9617-by-pythonnut-on-???
==9617== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9617-by-pythonnut-on-???
==9617== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9617-by-pythonnut-on-???
==9617== 
==9617== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9617== don't want to do, unless you know exactly what you're doing,
==9617== or are doing some strange experiment):
==9617==   /usr/lib/valgrind/../../bin/vgdb --pid=9617 ...command...
==9617== 
==9617== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9617==   /path/to/gdb ./zsh
==9617== and then give GDB the following command
==9617==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9617
==9617== --pid is optional if only one valgrind process is running
==9617== 
==9618== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9618-by-pythonnut-on-???
==9618== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9618-by-pythonnut-on-???
==9618== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9618-by-pythonnut-on-???
==9618== 
==9618== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9618== don't want to do, unless you know exactly what you're doing,
==9618== or are doing some strange experiment):
==9618==   /usr/lib/valgrind/../../bin/vgdb --pid=9618 ...command...
==9618== 
==9618== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9618==   /path/to/gdb ./zsh
==9618== and then give GDB the following command
==9618==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9618
==9618== --pid is optional if only one valgrind process is running
==9618== 
--9618-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA64C,  len 4
--9618-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9618== 
==9618== HEAP SUMMARY:
==9618==     in use at exit: 3,238,623 bytes in 69,917 blocks
==9618==   total heap usage: 1,462,572 allocs, 1,392,655 frees, 117,699,455 bytes allocated
==9618== 
==9618== Searching for pointers to 69,917 not-freed blocks
--9618--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9618--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9618--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9618--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9618--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9618--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9618--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9618--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9618--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9618--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9618--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9618--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9618--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9618--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9618--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9618--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9618--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9618--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9618--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9618--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9618--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9618--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9618--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9618--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9618--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9618--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9618--   Scanning root segment: 0x701a000..0x701afff (4096)
--9618--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9618--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9618--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9618--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9618--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9618--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9618--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9618--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9618--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9618== Checked 5,009,536 bytes
==9618== 
==9618== LEAK SUMMARY:
==9618==    definitely lost: 2,181 bytes in 11 blocks
==9618==    indirectly lost: 6,756 bytes in 7 blocks
==9618==      possibly lost: 0 bytes in 0 blocks
==9618==    still reachable: 3,229,686 bytes in 69,899 blocks
==9618==         suppressed: 0 bytes in 0 blocks
==9618== Rerun with --leak-check=full to see details of leaked memory
==9618== 
==9618== Use --track-origins=yes to see where uninitialised values come from
==9618== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9618== 
==9618== 1 errors in context 1 of 2:
==9618== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9618==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9618==    by 0x488CD0: stringsubst (subst.c:301)
==9618==    by 0x48801B: prefork (subst.c:77)
==9618==    by 0x42B318: execcmd (exec.c:2619)
==9618==    by 0x428CA0: execpline2 (exec.c:1697)
==9618==    by 0x427FD2: execpline (exec.c:1484)
==9618==    by 0x427756: execlist (exec.c:1267)
==9618==    by 0x42717C: execode (exec.c:1073)
==9618==    by 0x431299: runshfunc (exec.c:5040)
==9618==    by 0x430E76: doshfunc (exec.c:4920)
==9618==    by 0x4302FB: execshfunc (exec.c:4557)
==9618==    by 0x42D8C1: execcmd (exec.c:3373)
==9618== 
==9618== 
==9618== 2 errors in context 2 of 2:
==9618== Conditional jump or move depends on uninitialised value(s)
==9618==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9618==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9618==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9618==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9618==    by 0x42D8E9: execcmd (exec.c:3378)
==9618==    by 0x428CA0: execpline2 (exec.c:1697)
==9618==    by 0x427FD2: execpline (exec.c:1484)
==9618==    by 0x42779A: execlist (exec.c:1275)
==9618==    by 0x42717C: execode (exec.c:1073)
==9618==    by 0x431299: runshfunc (exec.c:5040)
==9618==    by 0x430E76: doshfunc (exec.c:4920)
==9618==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9618== 
==9618== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9617-- Caught __NR_exit; running __libc_freeres()
--9617-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9617== 
==9617== HEAP SUMMARY:
==9617==     in use at exit: 3,201,983 bytes in 69,914 blocks
==9617==   total heap usage: 1,462,575 allocs, 1,392,661 frees, 117,700,031 bytes allocated
==9617== 
==9617== Searching for pointers to 69,914 not-freed blocks
--9617--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9617--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9617--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9617--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9617--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9617--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9617--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9617--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9617--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9617--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9617--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9617--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9617--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9617--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9617--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9617--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9617--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9617--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9617--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9617--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9617--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9617--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9617--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9617--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9617--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9617--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9617--   Scanning root segment: 0x701a000..0x701afff (4096)
--9617--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9617--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9617--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9617--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9617--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9617--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9617--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9617--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9617--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9617== Checked 4,972,280 bytes
==9617== 
==9617== LEAK SUMMARY:
==9617==    definitely lost: 2,181 bytes in 11 blocks
==9617==    indirectly lost: 6,756 bytes in 7 blocks
==9617==      possibly lost: 0 bytes in 0 blocks
==9617==    still reachable: 3,193,046 bytes in 69,896 blocks
==9617==         suppressed: 0 bytes in 0 blocks
==9617== Rerun with --leak-check=full to see details of leaked memory
==9617== 
==9617== Use --track-origins=yes to see where uninitialised values come from
==9617== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9617== 
==9617== 1 errors in context 1 of 2:
==9617== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9617==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9617==    by 0x488CD0: stringsubst (subst.c:301)
==9617==    by 0x48801B: prefork (subst.c:77)
==9617==    by 0x42B318: execcmd (exec.c:2619)
==9617==    by 0x428CA0: execpline2 (exec.c:1697)
==9617==    by 0x427FD2: execpline (exec.c:1484)
==9617==    by 0x427756: execlist (exec.c:1267)
==9617==    by 0x42717C: execode (exec.c:1073)
==9617==    by 0x431299: runshfunc (exec.c:5040)
==9617==    by 0x430E76: doshfunc (exec.c:4920)
==9617==    by 0x4302FB: execshfunc (exec.c:4557)
==9617==    by 0x42D8C1: execcmd (exec.c:3373)
==9617== 
==9617== 
==9617== 2 errors in context 2 of 2:
==9617== Conditional jump or move depends on uninitialised value(s)
==9617==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9617==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9617==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9617==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9617==    by 0x42D8E9: execcmd (exec.c:3378)
==9617==    by 0x428CA0: execpline2 (exec.c:1697)
==9617==    by 0x427FD2: execpline (exec.c:1484)
==9617==    by 0x42779A: execlist (exec.c:1275)
==9617==    by 0x42717C: execode (exec.c:1073)
==9617==    by 0x431299: runshfunc (exec.c:5040)
==9617==    by 0x430E76: doshfunc (exec.c:4920)
==9617==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9617== 
==9617== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9620== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9620-by-pythonnut-on-???
==9620== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9620-by-pythonnut-on-???
==9620== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9620-by-pythonnut-on-???
==9620== 
==9620== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9620== don't want to do, unless you know exactly what you're doing,
==9620== or are doing some strange experiment):
==9620==   /usr/lib/valgrind/../../bin/vgdb --pid=9620 ...command...
==9620== 
==9620== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9620==   /path/to/gdb ./zsh
==9620== and then give GDB the following command
==9620==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9620
==9620== --pid is optional if only one valgrind process is running
==9620== 
--9621-- Caught __NR_exit; running __libc_freeres()
==9621== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9621-by-pythonnut-on-???
==9621== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9621-by-pythonnut-on-???
==9621== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9621-by-pythonnut-on-???
==9621== 
==9621== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9621== don't want to do, unless you know exactly what you're doing,
==9621== or are doing some strange experiment):
==9621==   /usr/lib/valgrind/../../bin/vgdb --pid=9621 ...command...
==9621== 
==9621== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9621==   /path/to/gdb ./zsh
==9621== and then give GDB the following command
==9621==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9621
==9621== --pid is optional if only one valgrind process is running
==9621== 
client request: code 4d430005,  addr 0xFFEFE9B1C,  len 4
--9621-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9621== 
==9621== HEAP SUMMARY:
==9621==     in use at exit: 3,202,111 bytes in 69,917 blocks
==9621==   total heap usage: 1,462,585 allocs, 1,392,668 frees, 117,669,592 bytes allocated
==9621== 
==9621== Searching for pointers to 69,917 not-freed blocks
--9621--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9621--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9621--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9621--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9621--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9621--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9621--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9621--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9621--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9621--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9621--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9621--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9621--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9621--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9621--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9621--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9621--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9621--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9621--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9621--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9621--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9621--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9621--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9621--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9621--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9621--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9621--   Scanning root segment: 0x701a000..0x701afff (4096)
--9621--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9621--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9621--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9621--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9621--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9621--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9621--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9621--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9621--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9621== Checked 4,936,992 bytes
==9621== 
==9621== LEAK SUMMARY:
==9621==    definitely lost: 2,181 bytes in 11 blocks
==9621==    indirectly lost: 6,756 bytes in 7 blocks
==9621==      possibly lost: 0 bytes in 0 blocks
==9621==    still reachable: 3,193,174 bytes in 69,899 blocks
==9621==         suppressed: 0 bytes in 0 blocks
==9621== Rerun with --leak-check=full to see details of leaked memory
==9621== 
==9621== Use --track-origins=yes to see where uninitialised values come from
==9621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9621== 
==9621== 1 errors in context 1 of 2:
==9621== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9621==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9621==    by 0x488CD0: stringsubst (subst.c:301)
==9621==    by 0x48801B: prefork (subst.c:77)
==9621==    by 0x42B318: execcmd (exec.c:2619)
==9621==    by 0x428CA0: execpline2 (exec.c:1697)
==9621==    by 0x427FD2: execpline (exec.c:1484)
==9621==    by 0x427756: execlist (exec.c:1267)
==9621==    by 0x42717C: execode (exec.c:1073)
==9621==    by 0x431299: runshfunc (exec.c:5040)
==9621==    by 0x430E76: doshfunc (exec.c:4920)
==9621==    by 0x4302FB: execshfunc (exec.c:4557)
==9621==    by 0x42D8C1: execcmd (exec.c:3373)
==9621== 
==9621== 
==9621== 2 errors in context 2 of 2:
==9621== Conditional jump or move depends on uninitialised value(s)
==9621==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9621==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9621==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9621==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9621==    by 0x42D8E9: execcmd (exec.c:3378)
==9621==    by 0x428CA0: execpline2 (exec.c:1697)
==9621==    by 0x427FD2: execpline (exec.c:1484)
==9621==    by 0x42779A: execlist (exec.c:1275)
==9621==    by 0x42717C: execode (exec.c:1073)
==9621==    by 0x431299: runshfunc (exec.c:5040)
==9621==    by 0x430E76: doshfunc (exec.c:4920)
==9621==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9621== 
==9621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9620-- Caught __NR_exit; running __libc_freeres()
--9620-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9620== 
==9620== HEAP SUMMARY:
==9620==     in use at exit: 3,202,079 bytes in 69,914 blocks
==9620==   total heap usage: 1,462,588 allocs, 1,392,674 frees, 117,670,264 bytes allocated
==9620== 
==9620== Searching for pointers to 69,914 not-freed blocks
--9620--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9620--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9620--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9620--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9620--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9620--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9620--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9620--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9620--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9620--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9620--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9620--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9620--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9620--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9620--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9620--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9620--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9620--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9620--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9620--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9620--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9620--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9620--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9620--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9620--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9620--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9620--   Scanning root segment: 0x701a000..0x701afff (4096)
--9620--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9620--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9620--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9620--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9620--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9620--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9620--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9620--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9620--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9620== Checked 4,936,312 bytes
==9620== 
==9620== LEAK SUMMARY:
==9620==    definitely lost: 2,181 bytes in 11 blocks
==9620==    indirectly lost: 6,756 bytes in 7 blocks
==9620==      possibly lost: 0 bytes in 0 blocks
==9620==    still reachable: 3,193,142 bytes in 69,896 blocks
==9620==         suppressed: 0 bytes in 0 blocks
==9620== Rerun with --leak-check=full to see details of leaked memory
==9620== 
==9620== Use --track-origins=yes to see where uninitialised values come from
==9620== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9620== 
==9620== 1 errors in context 1 of 2:
==9620== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9620==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9620==    by 0x488CD0: stringsubst (subst.c:301)
==9620==    by 0x48801B: prefork (subst.c:77)
==9620==    by 0x42B318: execcmd (exec.c:2619)
==9620==    by 0x428CA0: execpline2 (exec.c:1697)
==9620==    by 0x427FD2: execpline (exec.c:1484)
==9620==    by 0x427756: execlist (exec.c:1267)
==9620==    by 0x42717C: execode (exec.c:1073)
==9620==    by 0x431299: runshfunc (exec.c:5040)
==9620==    by 0x430E76: doshfunc (exec.c:4920)
==9620==    by 0x4302FB: execshfunc (exec.c:4557)
==9620==    by 0x42D8C1: execcmd (exec.c:3373)
==9620== 
==9620== 
==9620== 2 errors in context 2 of 2:
==9620== Conditional jump or move depends on uninitialised value(s)
==9620==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9620==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9620==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9620==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9620==    by 0x42D8E9: execcmd (exec.c:3378)
==9620==    by 0x428CA0: execpline2 (exec.c:1697)
==9620==    by 0x427FD2: execpline (exec.c:1484)
==9620==    by 0x42779A: execlist (exec.c:1275)
==9620==    by 0x42717C: execode (exec.c:1073)
==9620==    by 0x431299: runshfunc (exec.c:5040)
==9620==    by 0x430E76: doshfunc (exec.c:4920)
==9620==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9620== 
==9620== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9625== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9625-by-pythonnut-on-???
==9625== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9625-by-pythonnut-on-???
==9625== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9625-by-pythonnut-on-???
==9625== 
==9625== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9625== don't want to do, unless you know exactly what you're doing,
==9625== or are doing some strange experiment):
==9625==   /usr/lib/valgrind/../../bin/vgdb --pid=9625 ...command...
==9625== 
==9625== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9625==   /path/to/gdb ./zsh
==9625== and then give GDB the following command
==9625==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9625
==9625== --pid is optional if only one valgrind process is running
==9625== 
==9626== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9626-by-pythonnut-on-???
==9626== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9626-by-pythonnut-on-???
==9626== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9626-by-pythonnut-on-???
==9626== 
==9626== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9626== don't want to do, unless you know exactly what you're doing,
==9626== or are doing some strange experiment):
==9626==   /usr/lib/valgrind/../../bin/vgdb --pid=9626 ...command...
==9626== 
==9626== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9626==   /path/to/gdb ./zsh
==9626== and then give GDB the following command
==9626==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9626
==9626== --pid is optional if only one valgrind process is running
==9626== 
--9626-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE9FCC,  len 4
--9626-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9626== 
==9626== HEAP SUMMARY:
==9626==     in use at exit: 3,238,823 bytes in 69,920 blocks
==9626==   total heap usage: 1,462,595 allocs, 1,392,675 frees, 117,708,737 bytes allocated
==9626== 
==9626== Searching for pointers to 69,920 not-freed blocks
--9626--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9626--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9626--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9626--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9626--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9626--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9626--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9626--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9626--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9626--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9626--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9626--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9626--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9626--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9626--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9626--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9626--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9626--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9626--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9626--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9626--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9626--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9626--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9626--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9626--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9626--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9626--   Scanning root segment: 0x701a000..0x701afff (4096)
--9626--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9626--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9626--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9626--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9626--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9626--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9626--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9626--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9626--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9626== Checked 5,010,272 bytes
==9626== 
==9626== LEAK SUMMARY:
==9626==    definitely lost: 2,181 bytes in 11 blocks
==9626==    indirectly lost: 6,756 bytes in 7 blocks
==9626==      possibly lost: 0 bytes in 0 blocks
==9626==    still reachable: 3,229,886 bytes in 69,902 blocks
==9626==         suppressed: 0 bytes in 0 blocks
==9626== Rerun with --leak-check=full to see details of leaked memory
==9626== 
==9626== Use --track-origins=yes to see where uninitialised values come from
==9626== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9626== 
==9626== 1 errors in context 1 of 2:
==9626== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9626==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9626==    by 0x488CD0: stringsubst (subst.c:301)
==9626==    by 0x48801B: prefork (subst.c:77)
==9626==    by 0x42B318: execcmd (exec.c:2619)
==9626==    by 0x428CA0: execpline2 (exec.c:1697)
==9626==    by 0x427FD2: execpline (exec.c:1484)
==9626==    by 0x427756: execlist (exec.c:1267)
==9626==    by 0x42717C: execode (exec.c:1073)
==9626==    by 0x431299: runshfunc (exec.c:5040)
==9626==    by 0x430E76: doshfunc (exec.c:4920)
==9626==    by 0x4302FB: execshfunc (exec.c:4557)
==9626==    by 0x42D8C1: execcmd (exec.c:3373)
==9626== 
==9626== 
==9626== 2 errors in context 2 of 2:
==9626== Conditional jump or move depends on uninitialised value(s)
==9626==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9626==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9626==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9626==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9626==    by 0x42D8E9: execcmd (exec.c:3378)
==9626==    by 0x428CA0: execpline2 (exec.c:1697)
==9626==    by 0x427FD2: execpline (exec.c:1484)
==9626==    by 0x42779A: execlist (exec.c:1275)
==9626==    by 0x42717C: execode (exec.c:1073)
==9626==    by 0x431299: runshfunc (exec.c:5040)
==9626==    by 0x430E76: doshfunc (exec.c:4920)
==9626==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9626== 
==9626== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9625-- Caught __NR_exit; running __libc_freeres()
--9625-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9625== 
==9625== HEAP SUMMARY:
==9625==     in use at exit: 3,202,279 bytes in 69,917 blocks
==9625==   total heap usage: 1,462,598 allocs, 1,392,681 frees, 117,709,409 bytes allocated
==9625== 
==9625== Searching for pointers to 69,917 not-freed blocks
--9625--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9625--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9625--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9625--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9625--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9625--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9625--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9625--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9625--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9625--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9625--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9625--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9625--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9625--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9625--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9625--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9625--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9625--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9625--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9625--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9625--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9625--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9625--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9625--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9625--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9625--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9625--   Scanning root segment: 0x701a000..0x701afff (4096)
--9625--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9625--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9625--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9625--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9625--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9625--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9625--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9625--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9625--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9625== Checked 4,973,096 bytes
==9625== 
==9625== LEAK SUMMARY:
==9625==    definitely lost: 2,181 bytes in 11 blocks
==9625==    indirectly lost: 6,756 bytes in 7 blocks
==9625==      possibly lost: 0 bytes in 0 blocks
==9625==    still reachable: 3,193,342 bytes in 69,899 blocks
==9625==         suppressed: 0 bytes in 0 blocks
==9625== Rerun with --leak-check=full to see details of leaked memory
==9625== 
==9625== Use --track-origins=yes to see where uninitialised values come from
==9625== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9625== 
==9625== 1 errors in context 1 of 2:
==9625== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9625==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9625==    by 0x488CD0: stringsubst (subst.c:301)
==9625==    by 0x48801B: prefork (subst.c:77)
==9625==    by 0x42B318: execcmd (exec.c:2619)
==9625==    by 0x428CA0: execpline2 (exec.c:1697)
==9625==    by 0x427FD2: execpline (exec.c:1484)
==9625==    by 0x427756: execlist (exec.c:1267)
==9625==    by 0x42717C: execode (exec.c:1073)
==9625==    by 0x431299: runshfunc (exec.c:5040)
==9625==    by 0x430E76: doshfunc (exec.c:4920)
==9625==    by 0x4302FB: execshfunc (exec.c:4557)
==9625==    by 0x42D8C1: execcmd (exec.c:3373)
==9625== 
==9625== 
==9625== 2 errors in context 2 of 2:
==9625== Conditional jump or move depends on uninitialised value(s)
==9625==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9625==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9625==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9625==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9625==    by 0x42D8E9: execcmd (exec.c:3378)
==9625==    by 0x428CA0: execpline2 (exec.c:1697)
==9625==    by 0x427FD2: execpline (exec.c:1484)
==9625==    by 0x42779A: execlist (exec.c:1275)
==9625==    by 0x42717C: execode (exec.c:1073)
==9625==    by 0x431299: runshfunc (exec.c:5040)
==9625==    by 0x430E76: doshfunc (exec.c:4920)
==9625==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9625== 
==9625== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9606-- Caught __NR_exit; running __libc_freeres()
--9606-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9606== 
==9606== HEAP SUMMARY:
==9606==     in use at exit: 3,164,585 bytes in 69,894 blocks
==9606==   total heap usage: 1,462,604 allocs, 1,392,710 frees, 117,677,299 bytes allocated
==9606== 
==9606== Searching for pointers to 69,894 not-freed blocks
--9606--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9606--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9606--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9606--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9606--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9606--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9606--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9606--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9606--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9606--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9606--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9606--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9606--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9606--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9606--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9606--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9606--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9606--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9606--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9606--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9606--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9606--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9606--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9606--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9606--   Scanning root segment: 0x701a000..0x701afff (4096)
--9606--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9606--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9606--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9606--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9606--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9606--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9606--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9606--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9606--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9606== Checked 4,805,000 bytes
==9606== 
==9606== LEAK SUMMARY:
==9606==    definitely lost: 2,181 bytes in 11 blocks
==9606==    indirectly lost: 6,756 bytes in 7 blocks
==9606==      possibly lost: 0 bytes in 0 blocks
==9606==    still reachable: 3,155,648 bytes in 69,876 blocks
==9606==         suppressed: 0 bytes in 0 blocks
==9606== Rerun with --leak-check=full to see details of leaked memory
==9606== 
==9606== Use --track-origins=yes to see where uninitialised values come from
==9606== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9606== 
==9606== 1 errors in context 1 of 2:
==9606== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9606==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9606==    by 0x488CD0: stringsubst (subst.c:301)
==9606==    by 0x48801B: prefork (subst.c:77)
==9606==    by 0x42B318: execcmd (exec.c:2619)
==9606==    by 0x428CA0: execpline2 (exec.c:1697)
==9606==    by 0x427FD2: execpline (exec.c:1484)
==9606==    by 0x427756: execlist (exec.c:1267)
==9606==    by 0x42717C: execode (exec.c:1073)
==9606==    by 0x431299: runshfunc (exec.c:5040)
==9606==    by 0x430E76: doshfunc (exec.c:4920)
==9606==    by 0x4302FB: execshfunc (exec.c:4557)
==9606==    by 0x42D8C1: execcmd (exec.c:3373)
==9606== 
==9606== 
==9606== 2 errors in context 2 of 2:
==9606== Conditional jump or move depends on uninitialised value(s)
==9606==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9606==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9606==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9606==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9606==    by 0x42D8E9: execcmd (exec.c:3378)
==9606==    by 0x428CA0: execpline2 (exec.c:1697)
==9606==    by 0x427FD2: execpline (exec.c:1484)
==9606==    by 0x42779A: execlist (exec.c:1275)
==9606==    by 0x42717C: execode (exec.c:1073)
==9606==    by 0x431299: runshfunc (exec.c:5040)
==9606==    by 0x430E76: doshfunc (exec.c:4920)
==9606==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9606== 
==9606== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9605-- Caught __NR_exit; running __libc_freeres()
--9605-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9605== 
==9605== HEAP SUMMARY:
==9605==     in use at exit: 3,163,233 bytes in 69,856 blocks
==9605==   total heap usage: 1,462,503 allocs, 1,392,647 frees, 117,605,421 bytes allocated
==9605== 
==9605== Searching for pointers to 69,856 not-freed blocks
--9605--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9605--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9605--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9605--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9605--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9605--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9605--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9605--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9605--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9605--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9605--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9605--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9605--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9605--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9605--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9605--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9605--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9605--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9605--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9605--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9605--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9605--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9605--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9605--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9605--   Scanning root segment: 0x701a000..0x701afff (4096)
--9605--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9605--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9605--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9605--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9605--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9605--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9605--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9605--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9605--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9605== Checked 4,801,920 bytes
==9605== 
==9605== LEAK SUMMARY:
==9605==    definitely lost: 2,181 bytes in 11 blocks
==9605==    indirectly lost: 6,756 bytes in 7 blocks
==9605==      possibly lost: 0 bytes in 0 blocks
==9605==    still reachable: 3,154,296 bytes in 69,838 blocks
==9605==         suppressed: 0 bytes in 0 blocks
==9605== Rerun with --leak-check=full to see details of leaked memory
==9605== 
==9605== Use --track-origins=yes to see where uninitialised values come from
==9605== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9605== 
==9605== 1 errors in context 1 of 2:
==9605== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9605==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9605==    by 0x488CD0: stringsubst (subst.c:301)
==9605==    by 0x48801B: prefork (subst.c:77)
==9605==    by 0x42B318: execcmd (exec.c:2619)
==9605==    by 0x428CA0: execpline2 (exec.c:1697)
==9605==    by 0x427FD2: execpline (exec.c:1484)
==9605==    by 0x427756: execlist (exec.c:1267)
==9605==    by 0x42717C: execode (exec.c:1073)
==9605==    by 0x431299: runshfunc (exec.c:5040)
==9605==    by 0x430E76: doshfunc (exec.c:4920)
==9605==    by 0x4302FB: execshfunc (exec.c:4557)
==9605==    by 0x42D8C1: execcmd (exec.c:3373)
==9605== 
==9605== 
==9605== 2 errors in context 2 of 2:
==9605== Conditional jump or move depends on uninitialised value(s)
==9605==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9605==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9605==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9605==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9605==    by 0x42D8E9: execcmd (exec.c:3378)
==9605==    by 0x428CA0: execpline2 (exec.c:1697)
==9605==    by 0x427FD2: execpline (exec.c:1484)
==9605==    by 0x42779A: execlist (exec.c:1275)
==9605==    by 0x42717C: execode (exec.c:1073)
==9605==    by 0x431299: runshfunc (exec.c:5040)
==9605==    by 0x430E76: doshfunc (exec.c:4920)
==9605==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9605== 
==9605== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9628== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9628-by-pythonnut-on-???
==9628== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9628-by-pythonnut-on-???
==9628== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9628-by-pythonnut-on-???
==9628== 
==9628== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9628== don't want to do, unless you know exactly what you're doing,
==9628== or are doing some strange experiment):
==9628==   /usr/lib/valgrind/../../bin/vgdb --pid=9628 ...command...
==9628== 
==9628== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9628==   /path/to/gdb ./zsh
==9628== and then give GDB the following command
==9628==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9628
==9628== --pid is optional if only one valgrind process is running
==9628== 
--9628-- Caught __NR_exit; running __libc_freeres()
--9628-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9628== 
==9628== HEAP SUMMARY:
==9628==     in use at exit: 3,169,072 bytes in 70,032 blocks
==9628==   total heap usage: 1,462,969 allocs, 1,392,937 frees, 117,625,315 bytes allocated
==9628== 
==9628== Searching for pointers to 70,032 not-freed blocks
--9628--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9628--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9628--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9628--   Scanning root segment: 0x4037000..0x403afff (16384)
--9628--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9628--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9628--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9628--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9628--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9628--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9628--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9628--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9628--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9628--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9628--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9628--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9628--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9628--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9628--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9628--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9628--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9628--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9628--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9628--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9628--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9628--   Scanning root segment: 0x701a000..0x701afff (4096)
--9628--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9628--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9628--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9628--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9628--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9628--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9628--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9628--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9628--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9628== Checked 4,830,272 bytes
==9628== 
==9628== LEAK SUMMARY:
==9628==    definitely lost: 2,181 bytes in 11 blocks
==9628==    indirectly lost: 6,756 bytes in 7 blocks
==9628==      possibly lost: 0 bytes in 0 blocks
==9628==    still reachable: 3,160,135 bytes in 70,014 blocks
==9628==         suppressed: 0 bytes in 0 blocks
==9628== Rerun with --leak-check=full to see details of leaked memory
==9628== 
==9628== Use --track-origins=yes to see where uninitialised values come from
==9628== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9628== 
==9628== 1 errors in context 1 of 2:
==9628== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9628==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9628==    by 0x488CD0: stringsubst (subst.c:301)
==9628==    by 0x48801B: prefork (subst.c:77)
==9628==    by 0x42B318: execcmd (exec.c:2619)
==9628==    by 0x428CA0: execpline2 (exec.c:1697)
==9628==    by 0x427FD2: execpline (exec.c:1484)
==9628==    by 0x427756: execlist (exec.c:1267)
==9628==    by 0x42717C: execode (exec.c:1073)
==9628==    by 0x431299: runshfunc (exec.c:5040)
==9628==    by 0x430E76: doshfunc (exec.c:4920)
==9628==    by 0x4302FB: execshfunc (exec.c:4557)
==9628==    by 0x42D8C1: execcmd (exec.c:3373)
==9628== 
==9628== 
==9628== 2 errors in context 2 of 2:
==9628== Conditional jump or move depends on uninitialised value(s)
==9628==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9628==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9628==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9628==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9628==    by 0x42D8E9: execcmd (exec.c:3378)
==9628==    by 0x428CA0: execpline2 (exec.c:1697)
==9628==    by 0x427FD2: execpline (exec.c:1484)
==9628==    by 0x42779A: execlist (exec.c:1275)
==9628==    by 0x42717C: execode (exec.c:1073)
==9628==    by 0x431299: runshfunc (exec.c:5040)
==9628==    by 0x430E76: doshfunc (exec.c:4920)
==9628==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9628== 
==9628== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9631== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9631-by-pythonnut-on-???
==9631== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9631-by-pythonnut-on-???
==9631== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9631-by-pythonnut-on-???
==9631== 
==9631== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9631== don't want to do, unless you know exactly what you're doing,
==9631== or are doing some strange experiment):
==9631==   /usr/lib/valgrind/../../bin/vgdb --pid=9631 ...command...
==9631== 
==9631== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9631==   /path/to/gdb ./zsh
==9631== and then give GDB the following command
==9631==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9631
==9631== --pid is optional if only one valgrind process is running
==9631== 
--9631-- Caught __NR_exit; running __libc_freeres()
--9631-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9631== 
==9631== HEAP SUMMARY:
==9631==     in use at exit: 3,169,215 bytes in 70,032 blocks
==9631==   total heap usage: 1,462,977 allocs, 1,392,945 frees, 117,628,367 bytes allocated
==9631== 
==9631== Searching for pointers to 70,032 not-freed blocks
--9631--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9631--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9631--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9631--   Scanning root segment: 0x4037000..0x403afff (16384)
--9631--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9631--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9631--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9631--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9631--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9631--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9631--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9631--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9631--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9631--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9631--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9631--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9631--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9631--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9631--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9631--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9631--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9631--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9631--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9631--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9631--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9631--   Scanning root segment: 0x701a000..0x701afff (4096)
--9631--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9631--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9631--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9631--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9631--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9631--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9631--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9631--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9631--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9631== Checked 4,831,768 bytes
==9631== 
==9631== LEAK SUMMARY:
==9631==    definitely lost: 2,181 bytes in 11 blocks
==9631==    indirectly lost: 6,756 bytes in 7 blocks
==9631==      possibly lost: 0 bytes in 0 blocks
==9631==    still reachable: 3,160,278 bytes in 70,014 blocks
==9631==         suppressed: 0 bytes in 0 blocks
==9631== Rerun with --leak-check=full to see details of leaked memory
==9631== 
==9631== Use --track-origins=yes to see where uninitialised values come from
==9631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9631== 
==9631== 1 errors in context 1 of 2:
==9631== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9631==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9631==    by 0x488CD0: stringsubst (subst.c:301)
==9631==    by 0x48801B: prefork (subst.c:77)
==9631==    by 0x42B318: execcmd (exec.c:2619)
==9631==    by 0x428CA0: execpline2 (exec.c:1697)
==9631==    by 0x427FD2: execpline (exec.c:1484)
==9631==    by 0x427756: execlist (exec.c:1267)
==9631==    by 0x42717C: execode (exec.c:1073)
==9631==    by 0x431299: runshfunc (exec.c:5040)
==9631==    by 0x430E76: doshfunc (exec.c:4920)
==9631==    by 0x4302FB: execshfunc (exec.c:4557)
==9631==    by 0x42D8C1: execcmd (exec.c:3373)
==9631== 
==9631== 
==9631== 2 errors in context 2 of 2:
==9631== Conditional jump or move depends on uninitialised value(s)
==9631==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9631==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9631==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9631==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9631==    by 0x42D8E9: execcmd (exec.c:3378)
==9631==    by 0x428CA0: execpline2 (exec.c:1697)
==9631==    by 0x427FD2: execpline (exec.c:1484)
==9631==    by 0x42779A: execlist (exec.c:1275)
==9631==    by 0x42717C: execode (exec.c:1073)
==9631==    by 0x431299: runshfunc (exec.c:5040)
==9631==    by 0x430E76: doshfunc (exec.c:4920)
==9631==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9631== 
==9631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9632== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9632-by-pythonnut-on-???
==9632== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9632-by-pythonnut-on-???
==9632== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9632-by-pythonnut-on-???
==9632== 
==9632== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9632== don't want to do, unless you know exactly what you're doing,
==9632== or are doing some strange experiment):
==9632==   /usr/lib/valgrind/../../bin/vgdb --pid=9632 ...command...
==9632== 
==9632== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9632==   /path/to/gdb ./zsh
==9632== and then give GDB the following command
==9632==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9632
==9632== --pid is optional if only one valgrind process is running
==9632== 
--9633-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==9633== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9633-by-pythonnut-on-???
==9633== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9633-by-pythonnut-on-???
==9633== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9633-by-pythonnut-on-???
==9633== 
==9633== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9633== don't want to do, unless you know exactly what you're doing,
==9633== or are doing some strange experiment):
==9633==   /usr/lib/valgrind/../../bin/vgdb --pid=9633 ...command...
==9633== 
==9633== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9633==   /path/to/gdb ./zsh
==9633== and then give GDB the following command
==9633==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9633
==9633== --pid is optional if only one valgrind process is running
==9633== 
--9633-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9633== 
==9633== HEAP SUMMARY:
==9633==     in use at exit: 3,119,586 bytes in 68,912 blocks
==9633==   total heap usage: 1,463,288 allocs, 1,394,376 frees, 117,667,848 bytes allocated
==9633== 
==9633== Searching for pointers to 68,912 not-freed blocks
--9633--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9633--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9633--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9633--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9633--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9633--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9633--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9633--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9633--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9633--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9633--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9633--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9633--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9633--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9633--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9633--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9633--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9633--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9633--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9633--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9633--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9633--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9633--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9633--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9633--   Scanning root segment: 0x701a000..0x701afff (4096)
--9633--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9633--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9633--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9633--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9633--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9633--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9633--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9633--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9633--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9633== Checked 4,762,840 bytes
==9633== 
==9633== LEAK SUMMARY:
==9633==    definitely lost: 2,181 bytes in 11 blocks
==9633==    indirectly lost: 6,756 bytes in 7 blocks
==9633==      possibly lost: 0 bytes in 0 blocks
==9633==    still reachable: 3,110,649 bytes in 68,894 blocks
==9633==         suppressed: 0 bytes in 0 blocks
==9633== Rerun with --leak-check=full to see details of leaked memory
==9633== 
==9633== Use --track-origins=yes to see where uninitialised values come from
==9633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9633== 
==9633== 1 errors in context 1 of 2:
==9633== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9633==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9633==    by 0x488CD0: stringsubst (subst.c:301)
==9633==    by 0x48801B: prefork (subst.c:77)
==9633==    by 0x42B318: execcmd (exec.c:2619)
==9633==    by 0x428CA0: execpline2 (exec.c:1697)
==9633==    by 0x427FD2: execpline (exec.c:1484)
==9633==    by 0x427756: execlist (exec.c:1267)
==9633==    by 0x42717C: execode (exec.c:1073)
==9633==    by 0x431299: runshfunc (exec.c:5040)
==9633==    by 0x430E76: doshfunc (exec.c:4920)
==9633==    by 0x4302FB: execshfunc (exec.c:4557)
==9633==    by 0x42D8C1: execcmd (exec.c:3373)
==9633== 
==9633== 
==9633== 2 errors in context 2 of 2:
==9633== Conditional jump or move depends on uninitialised value(s)
==9633==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9633==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9633==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9633==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9633==    by 0x42D8E9: execcmd (exec.c:3378)
==9633==    by 0x428CA0: execpline2 (exec.c:1697)
==9633==    by 0x427FD2: execpline (exec.c:1484)
==9633==    by 0x42779A: execlist (exec.c:1275)
==9633==    by 0x42717C: execode (exec.c:1073)
==9633==    by 0x431299: runshfunc (exec.c:5040)
==9633==    by 0x430E76: doshfunc (exec.c:4920)
==9633==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9633== 
==9633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9632-- Caught __NR_exit; running __libc_freeres()
--9632-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9632== 
==9632== HEAP SUMMARY:
==9632==     in use at exit: 3,119,187 bytes in 68,902 blocks
==9632==   total heap usage: 1,463,290 allocs, 1,394,388 frees, 117,668,392 bytes allocated
==9632== 
==9632== Searching for pointers to 68,902 not-freed blocks
--9632--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9632--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9632--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9632--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9632--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9632--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9632--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9632--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9632--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9632--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9632--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9632--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9632--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9632--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9632--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9632--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9632--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9632--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9632--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9632--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9632--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9632--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9632--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9632--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9632--   Scanning root segment: 0x701a000..0x701afff (4096)
--9632--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9632--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9632--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9632--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9632--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9632--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9632--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9632--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9632--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9632== Checked 4,760,464 bytes
==9632== 
==9632== LEAK SUMMARY:
==9632==    definitely lost: 2,181 bytes in 11 blocks
==9632==    indirectly lost: 6,756 bytes in 7 blocks
==9632==      possibly lost: 0 bytes in 0 blocks
==9632==    still reachable: 3,110,250 bytes in 68,884 blocks
==9632==         suppressed: 0 bytes in 0 blocks
==9632== Rerun with --leak-check=full to see details of leaked memory
==9632== 
==9632== Use --track-origins=yes to see where uninitialised values come from
==9632== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9632== 
==9632== 1 errors in context 1 of 2:
==9632== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9632==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9632==    by 0x488CD0: stringsubst (subst.c:301)
==9632==    by 0x48801B: prefork (subst.c:77)
==9632==    by 0x42B318: execcmd (exec.c:2619)
==9632==    by 0x428CA0: execpline2 (exec.c:1697)
==9632==    by 0x427FD2: execpline (exec.c:1484)
==9632==    by 0x427756: execlist (exec.c:1267)
==9632==    by 0x42717C: execode (exec.c:1073)
==9632==    by 0x431299: runshfunc (exec.c:5040)
==9632==    by 0x430E76: doshfunc (exec.c:4920)
==9632==    by 0x4302FB: execshfunc (exec.c:4557)
==9632==    by 0x42D8C1: execcmd (exec.c:3373)
==9632== 
==9632== 
==9632== 2 errors in context 2 of 2:
==9632== Conditional jump or move depends on uninitialised value(s)
==9632==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9632==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9632==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9632==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9632==    by 0x42D8E9: execcmd (exec.c:3378)
==9632==    by 0x428CA0: execpline2 (exec.c:1697)
==9632==    by 0x427FD2: execpline (exec.c:1484)
==9632==    by 0x42779A: execlist (exec.c:1275)
==9632==    by 0x42717C: execode (exec.c:1073)
==9632==    by 0x431299: runshfunc (exec.c:5040)
==9632==    by 0x430E76: doshfunc (exec.c:4920)
==9632==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9632== 
==9632== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9636-- Caught __NR_exit; running __libc_freeres()
==9636== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9636-by-pythonnut-on-???
==9636== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9636-by-pythonnut-on-???
==9636== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9636-by-pythonnut-on-???
==9636== 
==9636== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9636== don't want to do, unless you know exactly what you're doing,
==9636== or are doing some strange experiment):
==9636==   /usr/lib/valgrind/../../bin/vgdb --pid=9636 ...command...
==9636== 
==9636== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9636==   /path/to/gdb ./zsh
==9636== and then give GDB the following command
==9636==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9636
==9636== --pid is optional if only one valgrind process is running
==9636== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
--9636-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9636== 
==9636== HEAP SUMMARY:
==9636==     in use at exit: 3,119,675 bytes in 68,914 blocks
==9636==   total heap usage: 1,463,330 allocs, 1,394,416 frees, 117,684,108 bytes allocated
==9636== 
==9636== Searching for pointers to 68,914 not-freed blocks
--9636--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9636--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9636--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9636--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9636--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9636--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9636--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9636--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9636--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9636--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9636--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9636--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9636--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9636--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9636--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9636--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9636--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9636--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9636--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9636--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9636--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9636--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9636--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9636--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9636--   Scanning root segment: 0x701a000..0x701afff (4096)
--9636--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9636--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9636--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9636--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9636--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9636--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9636--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9636--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9636--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9636== Checked 4,763,616 bytes
==9636== 
==9636== LEAK SUMMARY:
==9636==    definitely lost: 2,181 bytes in 11 blocks
==9636==    indirectly lost: 6,756 bytes in 7 blocks
==9636==      possibly lost: 0 bytes in 0 blocks
==9636==    still reachable: 3,110,738 bytes in 68,896 blocks
==9636==         suppressed: 0 bytes in 0 blocks
==9636== Rerun with --leak-check=full to see details of leaked memory
==9636== 
==9636== Use --track-origins=yes to see where uninitialised values come from
==9636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9636== 
==9636== 1 errors in context 1 of 2:
==9636== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9636==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9636==    by 0x488CD0: stringsubst (subst.c:301)
==9636==    by 0x48801B: prefork (subst.c:77)
==9636==    by 0x42B318: execcmd (exec.c:2619)
==9636==    by 0x428CA0: execpline2 (exec.c:1697)
==9636==    by 0x427FD2: execpline (exec.c:1484)
==9636==    by 0x427756: execlist (exec.c:1267)
==9636==    by 0x42717C: execode (exec.c:1073)
==9636==    by 0x431299: runshfunc (exec.c:5040)
==9636==    by 0x430E76: doshfunc (exec.c:4920)
==9636==    by 0x4302FB: execshfunc (exec.c:4557)
==9636==    by 0x42D8C1: execcmd (exec.c:3373)
==9636== 
==9636== 
==9636== 2 errors in context 2 of 2:
==9636== Conditional jump or move depends on uninitialised value(s)
==9636==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9636==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9636==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9636==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9636==    by 0x42D8E9: execcmd (exec.c:3378)
==9636==    by 0x428CA0: execpline2 (exec.c:1697)
==9636==    by 0x427FD2: execpline (exec.c:1484)
==9636==    by 0x42779A: execlist (exec.c:1275)
==9636==    by 0x42717C: execode (exec.c:1073)
==9636==    by 0x431299: runshfunc (exec.c:5040)
==9636==    by 0x430E76: doshfunc (exec.c:4920)
==9636==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9636== 
==9636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9635-- Caught __NR_exit; running __libc_freeres()
==9635== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9635-by-pythonnut-on-???
==9635== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9635-by-pythonnut-on-???
==9635== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9635-by-pythonnut-on-???
==9635== 
==9635== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9635== don't want to do, unless you know exactly what you're doing,
==9635== or are doing some strange experiment):
==9635==   /usr/lib/valgrind/../../bin/vgdb --pid=9635 ...command...
==9635== 
==9635== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9635==   /path/to/gdb ./zsh
==9635== and then give GDB the following command
==9635==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9635
==9635== --pid is optional if only one valgrind process is running
==9635== 
--9635-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9635== 
==9635== HEAP SUMMARY:
==9635==     in use at exit: 3,119,624 bytes in 68,915 blocks
==9635==   total heap usage: 1,463,327 allocs, 1,394,412 frees, 117,680,580 bytes allocated
==9635== 
==9635== Searching for pointers to 68,915 not-freed blocks
--9635--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9635--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9635--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9635--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9635--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9635--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9635--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9635--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9635--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9635--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9635--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9635--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9635--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9635--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9635--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9635--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9635--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9635--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9635--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9635--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9635--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9635--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9635--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9635--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9635--   Scanning root segment: 0x701a000..0x701afff (4096)
--9635--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9635--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9635--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9635--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9635--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9635--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9635--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9635--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9635--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9635== Checked 4,763,224 bytes
==9635== 
==9635== LEAK SUMMARY:
==9635==    definitely lost: 2,181 bytes in 11 blocks
==9635==    indirectly lost: 6,756 bytes in 7 blocks
==9635==      possibly lost: 0 bytes in 0 blocks
==9635==    still reachable: 3,110,687 bytes in 68,897 blocks
==9635==         suppressed: 0 bytes in 0 blocks
==9635== Rerun with --leak-check=full to see details of leaked memory
==9635== 
==9635== Use --track-origins=yes to see where uninitialised values come from
==9635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9635== 
==9635== 1 errors in context 1 of 2:
==9635== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9635==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9635==    by 0x488CD0: stringsubst (subst.c:301)
==9635==    by 0x48801B: prefork (subst.c:77)
==9635==    by 0x42B318: execcmd (exec.c:2619)
==9635==    by 0x428CA0: execpline2 (exec.c:1697)
==9635==    by 0x427FD2: execpline (exec.c:1484)
==9635==    by 0x427756: execlist (exec.c:1267)
==9635==    by 0x42717C: execode (exec.c:1073)
==9635==    by 0x431299: runshfunc (exec.c:5040)
==9635==    by 0x430E76: doshfunc (exec.c:4920)
==9635==    by 0x4302FB: execshfunc (exec.c:4557)
==9635==    by 0x42D8C1: execcmd (exec.c:3373)
==9635== 
==9635== 
==9635== 2 errors in context 2 of 2:
==9635== Conditional jump or move depends on uninitialised value(s)
==9635==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9635==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9635==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9635==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9635==    by 0x42D8E9: execcmd (exec.c:3378)
==9635==    by 0x428CA0: execpline2 (exec.c:1697)
==9635==    by 0x427FD2: execpline (exec.c:1484)
==9635==    by 0x42779A: execlist (exec.c:1275)
==9635==    by 0x42717C: execode (exec.c:1073)
==9635==    by 0x431299: runshfunc (exec.c:5040)
==9635==    by 0x430E76: doshfunc (exec.c:4920)
==9635==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9635== 
==9635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--9639-- Caught __NR_exit; running __libc_freeres()
==9639== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9639-by-pythonnut-on-???
==9639== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9639-by-pythonnut-on-???
==9639== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9639-by-pythonnut-on-???
==9639== 
==9639== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9639== don't want to do, unless you know exactly what you're doing,
==9639== or are doing some strange experiment):
==9639==   /usr/lib/valgrind/../../bin/vgdb --pid=9639 ...command...
==9639== 
==9639== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9639==   /path/to/gdb ./zsh
==9639== and then give GDB the following command
==9639==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9639
==9639== --pid is optional if only one valgrind process is running
==9639== 
--9639-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9639== 
==9639== HEAP SUMMARY:
==9639==     in use at exit: 3,119,925 bytes in 68,920 blocks
==9639==   total heap usage: 1,463,338 allocs, 1,394,418 frees, 117,685,674 bytes allocated
==9639== 
==9639== Searching for pointers to 68,920 not-freed blocks
--9639--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9639--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9639--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9639--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9639--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9639--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9639--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9639--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9639--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9639--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9639--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9639--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9639--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9639--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9639--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9639--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9639--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9639--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9639--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9639--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9639--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9639--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9639--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9639--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9639--   Scanning root segment: 0x701a000..0x701afff (4096)
--9639--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9639--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9639--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9639--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9639--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9639--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9639--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9639--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9639--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9639== Checked 4,763,272 bytes
==9639== 
==9639== LEAK SUMMARY:
==9639==    definitely lost: 2,181 bytes in 11 blocks
==9639==    indirectly lost: 6,756 bytes in 7 blocks
==9639==      possibly lost: 0 bytes in 0 blocks
==9639==    still reachable: 3,110,988 bytes in 68,902 blocks
==9639==         suppressed: 0 bytes in 0 blocks
==9639== Rerun with --leak-check=full to see details of leaked memory
==9639== 
==9639== Use --track-origins=yes to see where uninitialised values come from
==9639== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9639== 
==9639== 1 errors in context 1 of 2:
==9639== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9639==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9639==    by 0x488CD0: stringsubst (subst.c:301)
==9639==    by 0x48801B: prefork (subst.c:77)
==9639==    by 0x42B318: execcmd (exec.c:2619)
==9639==    by 0x428CA0: execpline2 (exec.c:1697)
==9639==    by 0x427FD2: execpline (exec.c:1484)
==9639==    by 0x427756: execlist (exec.c:1267)
==9639==    by 0x42717C: execode (exec.c:1073)
==9639==    by 0x431299: runshfunc (exec.c:5040)
==9639==    by 0x430E76: doshfunc (exec.c:4920)
==9639==    by 0x4302FB: execshfunc (exec.c:4557)
==9639==    by 0x42D8C1: execcmd (exec.c:3373)
==9639== 
==9639== 
==9639== 2 errors in context 2 of 2:
==9639== Conditional jump or move depends on uninitialised value(s)
==9639==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9639==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9639==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9639==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9639==    by 0x42D8E9: execcmd (exec.c:3378)
==9639==    by 0x428CA0: execpline2 (exec.c:1697)
==9639==    by 0x427FD2: execpline (exec.c:1484)
==9639==    by 0x42779A: execlist (exec.c:1275)
==9639==    by 0x42717C: execode (exec.c:1073)
==9639==    by 0x431299: runshfunc (exec.c:5040)
==9639==    by 0x430E76: doshfunc (exec.c:4920)
==9639==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9639== 
==9639== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9643-- Caught __NR_exit; running __libc_freeres()
==9643== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9643-by-pythonnut-on-???
==9643== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9643-by-pythonnut-on-???
==9643== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9643-by-pythonnut-on-???
==9643== 
==9643== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9643== don't want to do, unless you know exactly what you're doing,
==9643== or are doing some strange experiment):
==9643==   /usr/lib/valgrind/../../bin/vgdb --pid=9643 ...command...
==9643== 
==9643== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9643==   /path/to/gdb ./zsh
==9643== and then give GDB the following command
==9643==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9643
==9643== --pid is optional if only one valgrind process is running
==9643== 
--9643-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9643== 
==9643== HEAP SUMMARY:
==9643==     in use at exit: 3,120,032 bytes in 68,924 blocks
==9643==   total heap usage: 1,463,346 allocs, 1,394,422 frees, 117,687,893 bytes allocated
==9643== 
==9643== Searching for pointers to 68,924 not-freed blocks
--9643--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9643--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9643--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9643--   Scanning root segment: 0x4037000..0x403afff (16384)
--9643--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9643--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9643--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9643--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9643--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9643--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9643--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9643--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9643--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9643--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9643--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9643--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9643--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9643--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9643--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9643--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9643--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9643--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9643--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9643--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9643--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9643--   Scanning root segment: 0x701a000..0x701afff (4096)
--9643--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9643--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9643--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9643--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9643--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9643--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9643--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9643--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9643--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9643== Checked 4,780,024 bytes
==9643== 
==9643== LEAK SUMMARY:
==9643==    definitely lost: 2,181 bytes in 11 blocks
==9643==    indirectly lost: 6,756 bytes in 7 blocks
==9643==      possibly lost: 0 bytes in 0 blocks
==9643==    still reachable: 3,111,095 bytes in 68,906 blocks
==9643==         suppressed: 0 bytes in 0 blocks
==9643== Rerun with --leak-check=full to see details of leaked memory
==9643== 
==9643== Use --track-origins=yes to see where uninitialised values come from
==9643== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9643== 
==9643== 1 errors in context 1 of 2:
==9643== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9643==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9643==    by 0x488CD0: stringsubst (subst.c:301)
==9643==    by 0x48801B: prefork (subst.c:77)
==9643==    by 0x42B318: execcmd (exec.c:2619)
==9643==    by 0x428CA0: execpline2 (exec.c:1697)
==9643==    by 0x427FD2: execpline (exec.c:1484)
==9643==    by 0x427756: execlist (exec.c:1267)
==9643==    by 0x42717C: execode (exec.c:1073)
==9643==    by 0x431299: runshfunc (exec.c:5040)
==9643==    by 0x430E76: doshfunc (exec.c:4920)
==9643==    by 0x4302FB: execshfunc (exec.c:4557)
==9643==    by 0x42D8C1: execcmd (exec.c:3373)
==9643== 
==9643== 
==9643== 2 errors in context 2 of 2:
==9643== Conditional jump or move depends on uninitialised value(s)
==9643==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9643==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9643==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9643==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9643==    by 0x42D8E9: execcmd (exec.c:3378)
==9643==    by 0x428CA0: execpline2 (exec.c:1697)
==9643==    by 0x427FD2: execpline (exec.c:1484)
==9643==    by 0x42779A: execlist (exec.c:1275)
==9643==    by 0x42717C: execode (exec.c:1073)
==9643==    by 0x431299: runshfunc (exec.c:5040)
==9643==    by 0x430E76: doshfunc (exec.c:4920)
==9643==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9643== 
==9643== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--9647-- Caught __NR_exit; running __libc_freeres()
==9647== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9647-by-pythonnut-on-???
==9647== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9647-by-pythonnut-on-???
==9647== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9647-by-pythonnut-on-???
==9647== 
==9647== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9647== don't want to do, unless you know exactly what you're doing,
==9647== or are doing some strange experiment):
==9647==   /usr/lib/valgrind/../../bin/vgdb --pid=9647 ...command...
==9647== 
==9647== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9647==   /path/to/gdb ./zsh
==9647== and then give GDB the following command
==9647==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9647
==9647== --pid is optional if only one valgrind process is running
==9647== 
--9647-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9647== 
==9647== HEAP SUMMARY:
==9647==     in use at exit: 3,119,292 bytes in 68,907 blocks
==9647==   total heap usage: 1,463,396 allocs, 1,394,489 frees, 117,694,788 bytes allocated
==9647== 
==9647== Searching for pointers to 68,907 not-freed blocks
--9647--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9647--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9647--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9647--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9647--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9647--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9647--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9647--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9647--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9647--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9647--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9647--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9647--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9647--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9647--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9647--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9647--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9647--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9647--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9647--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9647--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9647--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9647--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9647--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9647--   Scanning root segment: 0x701a000..0x701afff (4096)
--9647--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9647--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9647--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9647--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9647--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9647--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9647--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9647--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9647--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9647== Checked 4,780,160 bytes
==9647== 
==9647== LEAK SUMMARY:
==9647==    definitely lost: 2,181 bytes in 11 blocks
==9647==    indirectly lost: 6,756 bytes in 7 blocks
==9647==      possibly lost: 0 bytes in 0 blocks
==9647==    still reachable: 3,110,355 bytes in 68,889 blocks
==9647==         suppressed: 0 bytes in 0 blocks
==9647== Rerun with --leak-check=full to see details of leaked memory
==9647== 
==9647== Use --track-origins=yes to see where uninitialised values come from
==9647== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9647== 
==9647== 1 errors in context 1 of 2:
==9647== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9647==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9647==    by 0x488CD0: stringsubst (subst.c:301)
==9647==    by 0x48801B: prefork (subst.c:77)
==9647==    by 0x42B318: execcmd (exec.c:2619)
==9647==    by 0x428CA0: execpline2 (exec.c:1697)
==9647==    by 0x427FD2: execpline (exec.c:1484)
==9647==    by 0x427756: execlist (exec.c:1267)
==9647==    by 0x42717C: execode (exec.c:1073)
==9647==    by 0x431299: runshfunc (exec.c:5040)
==9647==    by 0x430E76: doshfunc (exec.c:4920)
==9647==    by 0x4302FB: execshfunc (exec.c:4557)
==9647==    by 0x42D8C1: execcmd (exec.c:3373)
==9647== 
==9647== 
==9647== 2 errors in context 2 of 2:
==9647== Conditional jump or move depends on uninitialised value(s)
==9647==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9647==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9647==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9647==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9647==    by 0x42D8E9: execcmd (exec.c:3378)
==9647==    by 0x428CA0: execpline2 (exec.c:1697)
==9647==    by 0x427FD2: execpline (exec.c:1484)
==9647==    by 0x42779A: execlist (exec.c:1275)
==9647==    by 0x42717C: execode (exec.c:1073)
==9647==    by 0x431299: runshfunc (exec.c:5040)
==9647==    by 0x430E76: doshfunc (exec.c:4920)
==9647==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9647== 
==9647== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF617C,  len 4
==9649== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9649-by-pythonnut-on-???
==9649== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9649-by-pythonnut-on-???
==9649== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9649-by-pythonnut-on-???
==9649== 
==9649== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9649== don't want to do, unless you know exactly what you're doing,
==9649== or are doing some strange experiment):
==9649==   /usr/lib/valgrind/../../bin/vgdb --pid=9649 ...command...
==9649== 
==9649== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9649==   /path/to/gdb ./zsh
==9649== and then give GDB the following command
==9649==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9649
==9649== --pid is optional if only one valgrind process is running
==9649== 
==9651== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9651-by-pythonnut-on-???
==9651== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9651-by-pythonnut-on-???
==9651== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9651-by-pythonnut-on-???
==9651== 
==9651== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9651== don't want to do, unless you know exactly what you're doing,
==9651== or are doing some strange experiment):
==9651==   /usr/lib/valgrind/../../bin/vgdb --pid=9651 ...command...
==9651== 
==9651== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9651==   /path/to/gdb ./zsh
==9651== and then give GDB the following command
==9651==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9651
==9651== --pid is optional if only one valgrind process is running
==9651== 
==9652== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9652-by-pythonnut-on-???
==9652== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9652-by-pythonnut-on-???
==9652== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9652-by-pythonnut-on-???
==9652== 
==9652== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9652== don't want to do, unless you know exactly what you're doing,
==9652== or are doing some strange experiment):
==9652==   /usr/lib/valgrind/../../bin/vgdb --pid=9652 ...command...
==9652== 
==9652== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9652==   /path/to/gdb ./zsh
==9652== and then give GDB the following command
==9652==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9652
==9652== --pid is optional if only one valgrind process is running
==9652== 
==9653== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9653-by-pythonnut-on-???
==9653== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9653-by-pythonnut-on-???
==9653== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9653-by-pythonnut-on-???
==9653== 
==9653== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9653== don't want to do, unless you know exactly what you're doing,
==9653== or are doing some strange experiment):
==9653==   /usr/lib/valgrind/../../bin/vgdb --pid=9653 ...command...
==9653== 
--9652-- Caught __NR_exit; running __libc_freeres()
==9653== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9653==   /path/to/gdb ./zsh
==9653== and then give GDB the following command
==9653==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9653
==9653== --pid is optional if only one valgrind process is running
==9653== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9656== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9656-by-pythonnut-on-???
==9656== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9656-by-pythonnut-on-???
==9656== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9656-by-pythonnut-on-???
==9656== 
==9656== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9656== don't want to do, unless you know exactly what you're doing,
==9656== or are doing some strange experiment):
==9656==   /usr/lib/valgrind/../../bin/vgdb --pid=9656 ...command...
==9656== 
==9656== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9656==   /path/to/gdb ./zsh
==9656== and then give GDB the following command
==9656==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9656
==9656== --pid is optional if only one valgrind process is running
==9656== 
--9652-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9652== 
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
==9652== HEAP SUMMARY:
==9652==     in use at exit: 3,120,381 bytes in 68,961 blocks
==9652==   total heap usage: 1,463,632 allocs, 1,394,671 frees, 117,717,222 bytes allocated
==9652== 
==9655== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9655-by-pythonnut-on-???
==9655== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9655-by-pythonnut-on-???
==9655== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9655-by-pythonnut-on-???
==9655== 
==9655== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9655== don't want to do, unless you know exactly what you're doing,
==9655== or are doing some strange experiment):
==9655==   /usr/lib/valgrind/../../bin/vgdb --pid=9655 ...command...
==9655== 
==9655== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9655==   /path/to/gdb ./zsh
==9655== and then give GDB the following command
==9655==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9655
==9655== --pid is optional if only one valgrind process is running
==9655== 
--9655-- Caught __NR_exit; running __libc_freeres()
==9652== Searching for pointers to 68,961 not-freed blocks
--9652--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9652--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9652--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9652--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9652--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9652--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9652--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9652--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9652--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9652--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9652--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9652--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9652--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9652--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9652--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9652--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9652--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9652--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9652--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9652--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9652--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9652--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9652--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9652--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9652--   Scanning root segment: 0x701a000..0x701afff (4096)
--9652--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9652--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9652--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9652--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9652--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9652--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9652--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9652--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9652--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9655-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9655== 
==9655== HEAP SUMMARY:
==9655==     in use at exit: 3,121,608 bytes in 68,950 blocks
==9655==   total heap usage: 1,463,622 allocs, 1,394,672 frees, 117,959,498 bytes allocated
==9655== 
==9655== Searching for pointers to 68,950 not-freed blocks
--9655--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9655--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9655--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9655--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9655--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9655--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9655--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9655--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9655--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9655--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9655--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9655--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9655--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9655--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9655--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9655--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9655--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9655--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9655--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9655--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9655--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9655--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9655--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9655--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9655--   Scanning root segment: 0x701a000..0x701afff (4096)
--9655--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9655--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9655--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9655--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9655--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9655--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9655--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9655--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9655--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9652== Checked 4,782,512 bytes
==9652== 
==9652== LEAK SUMMARY:
==9652==    definitely lost: 2,181 bytes in 11 blocks
==9652==    indirectly lost: 6,756 bytes in 7 blocks
==9652==      possibly lost: 0 bytes in 0 blocks
==9652==    still reachable: 3,111,444 bytes in 68,943 blocks
==9652==         suppressed: 0 bytes in 0 blocks
==9652== Rerun with --leak-check=full to see details of leaked memory
==9652== 
==9652== Use --track-origins=yes to see where uninitialised values come from
==9652== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9652== 
==9652== 1 errors in context 1 of 2:
==9652== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9652==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9652==    by 0x488CD0: stringsubst (subst.c:301)
==9652==    by 0x48801B: prefork (subst.c:77)
==9652==    by 0x42B318: execcmd (exec.c:2619)
==9652==    by 0x428CA0: execpline2 (exec.c:1697)
==9652==    by 0x427FD2: execpline (exec.c:1484)
==9652==    by 0x427756: execlist (exec.c:1267)
==9652==    by 0x42717C: execode (exec.c:1073)
==9652==    by 0x431299: runshfunc (exec.c:5040)
==9652==    by 0x430E76: doshfunc (exec.c:4920)
==9652==    by 0x4302FB: execshfunc (exec.c:4557)
==9652==    by 0x42D8C1: execcmd (exec.c:3373)
==9652== 
==9652== 
==9652== 2 errors in context 2 of 2:
==9652== Conditional jump or move depends on uninitialised value(s)
==9652==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9652==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9652==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9652==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9652==    by 0x42D8E9: execcmd (exec.c:3378)
==9652==    by 0x428CA0: execpline2 (exec.c:1697)
==9652==    by 0x427FD2: execpline (exec.c:1484)
==9652==    by 0x42779A: execlist (exec.c:1275)
==9652==    by 0x42717C: execode (exec.c:1073)
==9652==    by 0x431299: runshfunc (exec.c:5040)
==9652==    by 0x430E76: doshfunc (exec.c:4920)
==9652==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9652== 
==9652== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9650-- Caught __NR_exit; running __libc_freeres()
==9655== Checked 4,768,408 bytes
==9655== 
==9650== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9650-by-pythonnut-on-???
==9650== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9650-by-pythonnut-on-???
==9650== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9650-by-pythonnut-on-???
==9650== 
==9650== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9650== don't want to do, unless you know exactly what you're doing,
==9650== or are doing some strange experiment):
==9650==   /usr/lib/valgrind/../../bin/vgdb --pid=9650 ...command...
==9650== 
==9650== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9650==   /path/to/gdb ./zsh
==9650== and then give GDB the following command
==9650==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9650
==9650== --pid is optional if only one valgrind process is running
==9650== 
==9655== LEAK SUMMARY:
==9655==    definitely lost: 2,181 bytes in 11 blocks
==9655==    indirectly lost: 6,756 bytes in 7 blocks
==9655==      possibly lost: 0 bytes in 0 blocks
==9655==    still reachable: 3,112,671 bytes in 68,932 blocks
==9655==         suppressed: 0 bytes in 0 blocks
==9655== Rerun with --leak-check=full to see details of leaked memory
==9655== 
==9655== Use --track-origins=yes to see where uninitialised values come from
==9655== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9655== 
==9655== 1 errors in context 1 of 2:
==9655== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9655==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9655==    by 0x488CD0: stringsubst (subst.c:301)
==9655==    by 0x48801B: prefork (subst.c:77)
==9655==    by 0x42B318: execcmd (exec.c:2619)
==9655==    by 0x428CA0: execpline2 (exec.c:1697)
==9655==    by 0x427FD2: execpline (exec.c:1484)
==9655==    by 0x427756: execlist (exec.c:1267)
==9655==    by 0x42717C: execode (exec.c:1073)
==9655==    by 0x431299: runshfunc (exec.c:5040)
==9655==    by 0x430E76: doshfunc (exec.c:4920)
==9655==    by 0x4302FB: execshfunc (exec.c:4557)
==9655==    by 0x42D8C1: execcmd (exec.c:3373)
==9655== 
==9655== 
==9655== 2 errors in context 2 of 2:
==9655== Conditional jump or move depends on uninitialised value(s)
==9655==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9655==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9655==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9655==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9655==    by 0x42D8E9: execcmd (exec.c:3378)
==9655==    by 0x428CA0: execpline2 (exec.c:1697)
==9655==    by 0x427FD2: execpline (exec.c:1484)
==9655==    by 0x42779A: execlist (exec.c:1275)
==9655==    by 0x42717C: execode (exec.c:1073)
==9655==    by 0x431299: runshfunc (exec.c:5040)
==9655==    by 0x430E76: doshfunc (exec.c:4920)
==9655==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9655== 
==9655== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9650-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9650== 
==9650== HEAP SUMMARY:
==9650==     in use at exit: 3,120,317 bytes in 68,958 blocks
==9650==   total heap usage: 1,463,630 allocs, 1,394,672 frees, 117,716,981 bytes allocated
==9650== 
--9657-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9657== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9657-by-pythonnut-on-???
==9657== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9657-by-pythonnut-on-???
==9657== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9657-by-pythonnut-on-???
==9657== 
==9657== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9657== don't want to do, unless you know exactly what you're doing,
==9657== or are doing some strange experiment):
==9657==   /usr/lib/valgrind/../../bin/vgdb --pid=9657 ...command...
==9657== 
==9657== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9657==   /path/to/gdb ./zsh
==9657== and then give GDB the following command
==9657==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9657
==9657== --pid is optional if only one valgrind process is running
==9657== 
client request: code 4d430005,  addr 0xFFEFF8FCC,  len 4
==9650== Searching for pointers to 68,958 not-freed blocks
--9650--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9650--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9650--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9650--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9650--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9650--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9650--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9650--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9650--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9650--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9650--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9650--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9650--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9650--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9650--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9650--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9650--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9650--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9650--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9650--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9650--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9650--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9650--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9650--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9650--   Scanning root segment: 0x701a000..0x701afff (4096)
--9650--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9650--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9650--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9650--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9650--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9650--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9650--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9650--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9650--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF5FBC,  len 4
==9650== Checked 4,781,824 bytes
==9650== 
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF7C9C,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
client request: code 4d430005,  addr 0xFFEFF6CCC,  len 4
==9650== LEAK SUMMARY:
==9650==    definitely lost: 2,181 bytes in 11 blocks
==9650==    indirectly lost: 6,756 bytes in 7 blocks
==9650==      possibly lost: 0 bytes in 0 blocks
==9650==    still reachable: 3,111,380 bytes in 68,940 blocks
==9650==         suppressed: 0 bytes in 0 blocks
==9650== Rerun with --leak-check=full to see details of leaked memory
==9650== 
==9650== Use --track-origins=yes to see where uninitialised values come from
==9650== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9650== 
==9650== 1 errors in context 1 of 2:
==9650== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9650==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9650==    by 0x488CD0: stringsubst (subst.c:301)
==9650==    by 0x48801B: prefork (subst.c:77)
==9650==    by 0x42B318: execcmd (exec.c:2619)
==9650==    by 0x428CA0: execpline2 (exec.c:1697)
==9650==    by 0x427FD2: execpline (exec.c:1484)
==9650==    by 0x427756: execlist (exec.c:1267)
==9650==    by 0x42717C: execode (exec.c:1073)
==9650==    by 0x431299: runshfunc (exec.c:5040)
==9650==    by 0x430E76: doshfunc (exec.c:4920)
==9650==    by 0x4302FB: execshfunc (exec.c:4557)
==9650==    by 0x42D8C1: execcmd (exec.c:3373)
==9650== 
==9650== 
==9650== 2 errors in context 2 of 2:
==9650== Conditional jump or move depends on uninitialised value(s)
==9650==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9650==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9650==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9650==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9650==    by 0x42D8E9: execcmd (exec.c:3378)
==9650==    by 0x428CA0: execpline2 (exec.c:1697)
==9650==    by 0x427FD2: execpline (exec.c:1484)
==9650==    by 0x42779A: execlist (exec.c:1275)
==9650==    by 0x42717C: execode (exec.c:1073)
==9650==    by 0x431299: runshfunc (exec.c:5040)
==9650==    by 0x430E76: doshfunc (exec.c:4920)
==9650==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9650== 
==9650== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF65AC,  len 4
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
--9658-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEC84C,  len 4
==9658== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9658-by-pythonnut-on-???
==9658== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9658-by-pythonnut-on-???
==9658== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9658-by-pythonnut-on-???
==9658== 
==9658== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9658== don't want to do, unless you know exactly what you're doing,
==9658== or are doing some strange experiment):
==9658==   /usr/lib/valgrind/../../bin/vgdb --pid=9658 ...command...
==9658== 
==9658== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9658==   /path/to/gdb ./zsh
==9658== and then give GDB the following command
==9658==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9658
==9658== --pid is optional if only one valgrind process is running
==9658== 
client request: code 4d430005,  addr 0xFFEFF773C,  len 4
--9658-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9660== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9660-by-pythonnut-on-???
==9660== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9660-by-pythonnut-on-???
==9660== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9660-by-pythonnut-on-???
==9660== 
==9660== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9660== don't want to do, unless you know exactly what you're doing,
==9660== or are doing some strange experiment):
==9660==   /usr/lib/valgrind/../../bin/vgdb --pid=9660 ...command...
==9660== 
==9660== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9660==   /path/to/gdb ./zsh
==9660== and then give GDB the following command
==9660==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9660
==9660== --pid is optional if only one valgrind process is running
==9660== 
==9658== 
==9658== HEAP SUMMARY:
==9658==     in use at exit: 3,120,324 bytes in 68,958 blocks
==9658==   total heap usage: 1,463,645 allocs, 1,394,687 frees, 117,721,979 bytes allocated
==9658== 
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
client request: code 4d430005,  addr 0xFFEFF327C,  len 4
==9661== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9661-by-pythonnut-on-???
==9661== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9661-by-pythonnut-on-???
==9661== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9661-by-pythonnut-on-???
==9661== 
==9661== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9661== don't want to do, unless you know exactly what you're doing,
==9661== or are doing some strange experiment):
==9661==   /usr/lib/valgrind/../../bin/vgdb --pid=9661 ...command...
==9661== 
==9661== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9661==   /path/to/gdb ./zsh
==9661== and then give GDB the following command
==9661==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9661
==9661== --pid is optional if only one valgrind process is running
==9661== 
==9658== Searching for pointers to 68,958 not-freed blocks
--9658--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9658--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9658--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9658--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9658--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9658--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9658--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9658--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9658--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9658--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9658--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9658--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9658--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9658--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9658--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9658--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9658--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9658--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9658--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9658--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9658--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9658--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9658--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9658--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9658--   Scanning root segment: 0x701a000..0x701afff (4096)
--9658--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9658--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9658--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9658--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9658--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9658--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9658--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9658--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9658--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9661-- Caught __NR_exit; running __libc_freeres()
--9661-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9661== 
==9661== HEAP SUMMARY:
==9661==     in use at exit: 3,153,255 bytes in 69,448 blocks
==9661==   total heap usage: 1,467,399 allocs, 1,397,951 frees, 119,729,617 bytes allocated
==9661== 
==9661== Searching for pointers to 69,448 not-freed blocks
--9661--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9661--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9661--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9661--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9661--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9661--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9661--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9661--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9661--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9661--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9661--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9661--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9661--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9661--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9661--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9661--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9661--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9661--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9661--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9661--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9661--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9661--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9661--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9661--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9661--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9661--   Scanning root segment: 0x701a000..0x701afff (4096)
--9661--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9661--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9661--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9661--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9661--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9661--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9661--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9661--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9661--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9658== Checked 4,781,960 bytes
==9658== 
==9658== LEAK SUMMARY:
==9658==    definitely lost: 2,181 bytes in 11 blocks
==9658==    indirectly lost: 6,756 bytes in 7 blocks
==9658==      possibly lost: 0 bytes in 0 blocks
==9658==    still reachable: 3,111,387 bytes in 68,940 blocks
==9658==         suppressed: 0 bytes in 0 blocks
==9658== Rerun with --leak-check=full to see details of leaked memory
==9658== 
==9658== Use --track-origins=yes to see where uninitialised values come from
==9658== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9658== 
==9658== 1 errors in context 1 of 2:
==9658== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9658==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9658==    by 0x488CD0: stringsubst (subst.c:301)
==9658==    by 0x48801B: prefork (subst.c:77)
==9658==    by 0x42B318: execcmd (exec.c:2619)
==9658==    by 0x428CA0: execpline2 (exec.c:1697)
==9658==    by 0x427FD2: execpline (exec.c:1484)
==9658==    by 0x427756: execlist (exec.c:1267)
==9658==    by 0x42717C: execode (exec.c:1073)
==9658==    by 0x431299: runshfunc (exec.c:5040)
==9658==    by 0x430E76: doshfunc (exec.c:4920)
==9658==    by 0x4302FB: execshfunc (exec.c:4557)
==9658==    by 0x42D8C1: execcmd (exec.c:3373)
==9658== 
==9658== 
==9658== 2 errors in context 2 of 2:
==9658== Conditional jump or move depends on uninitialised value(s)
==9658==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9658==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9658==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9658==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9658==    by 0x42D8E9: execcmd (exec.c:3378)
==9658==    by 0x428CA0: execpline2 (exec.c:1697)
==9658==    by 0x427FD2: execpline (exec.c:1484)
==9658==    by 0x42779A: execlist (exec.c:1275)
==9658==    by 0x42717C: execode (exec.c:1073)
==9658==    by 0x431299: runshfunc (exec.c:5040)
==9658==    by 0x430E76: doshfunc (exec.c:4920)
==9658==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9658== 
==9658== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9664-- Caught __NR_exit; running __libc_freeres()
==9664== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9664-by-pythonnut-on-???
==9664== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9664-by-pythonnut-on-???
==9664== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9664-by-pythonnut-on-???
==9664== 
==9664== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9664== don't want to do, unless you know exactly what you're doing,
==9664== or are doing some strange experiment):
==9664==   /usr/lib/valgrind/../../bin/vgdb --pid=9664 ...command...
==9664== 
==9664== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9664==   /path/to/gdb ./zsh
==9664== and then give GDB the following command
==9664==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9664
==9664== --pid is optional if only one valgrind process is running
==9664== 
--9664-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9661== Checked 4,856,456 bytes
==9661== 
==9664== 
==9664== HEAP SUMMARY:
==9664==     in use at exit: 3,120,484 bytes in 68,959 blocks
==9664==   total heap usage: 1,463,662 allocs, 1,394,703 frees, 117,726,830 bytes allocated
==9664== 
==9661== LEAK SUMMARY:
==9661==    definitely lost: 2,181 bytes in 11 blocks
==9661==    indirectly lost: 6,756 bytes in 7 blocks
==9661==      possibly lost: 0 bytes in 0 blocks
==9661==    still reachable: 3,144,318 bytes in 69,430 blocks
==9661==         suppressed: 0 bytes in 0 blocks
==9661== Rerun with --leak-check=full to see details of leaked memory
==9661== 
==9661== Use --track-origins=yes to see where uninitialised values come from
==9661== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9661== 
==9661== 1 errors in context 1 of 2:
==9661== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9661==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9661==    by 0x488CD0: stringsubst (subst.c:301)
==9661==    by 0x48801B: prefork (subst.c:77)
==9661==    by 0x42B318: execcmd (exec.c:2619)
==9661==    by 0x428CA0: execpline2 (exec.c:1697)
==9661==    by 0x427FD2: execpline (exec.c:1484)
==9661==    by 0x427756: execlist (exec.c:1267)
==9661==    by 0x42717C: execode (exec.c:1073)
==9661==    by 0x431299: runshfunc (exec.c:5040)
==9661==    by 0x430E76: doshfunc (exec.c:4920)
==9661==    by 0x4302FB: execshfunc (exec.c:4557)
==9661==    by 0x42D8C1: execcmd (exec.c:3373)
==9661== 
==9661== 
==9661== 2 errors in context 2 of 2:
==9661== Conditional jump or move depends on uninitialised value(s)
==9661==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9661==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9661==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9661==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9661==    by 0x42D8E9: execcmd (exec.c:3378)
==9661==    by 0x428CA0: execpline2 (exec.c:1697)
==9661==    by 0x427FD2: execpline (exec.c:1484)
==9661==    by 0x42779A: execlist (exec.c:1275)
==9661==    by 0x42717C: execode (exec.c:1073)
==9661==    by 0x431299: runshfunc (exec.c:5040)
==9661==    by 0x430E76: doshfunc (exec.c:4920)
==9661==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9661== 
==9661== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9660-- Caught __NR_exit; running __libc_freeres()
==9664== Searching for pointers to 68,959 not-freed blocks
--9664--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9664--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9664--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9664--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9664--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9664--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9664--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9664--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9664--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9664--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9664--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9664--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9664--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9664--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9664--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9664--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9664--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9664--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9664--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9664--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9664--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9664--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9664--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9664--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9664--   Scanning root segment: 0x701a000..0x701afff (4096)
--9664--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9664--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9664--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9664--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9664--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9664--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9664--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9664--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9664--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9660-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9660== 
==9660== HEAP SUMMARY:
==9660==     in use at exit: 3,150,973 bytes in 69,368 blocks
==9660==   total heap usage: 1,467,304 allocs, 1,397,936 frees, 119,497,678 bytes allocated
==9660== 
==9660== Searching for pointers to 69,368 not-freed blocks
--9660--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9660--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9660--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9660--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9660--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9660--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9660--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9660--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9660--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9660--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9660--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9660--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9660--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9660--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9660--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9660--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9660--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9660--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9660--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9660--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9660--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9660--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9660--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9660--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9660--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9660--   Scanning root segment: 0x701a000..0x701afff (4096)
--9660--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9660--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9660--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9660--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9660--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9660--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9660--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9660--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9660--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9664== Checked 4,781,304 bytes
==9664== 
==9664== LEAK SUMMARY:
==9664==    definitely lost: 2,181 bytes in 11 blocks
==9664==    indirectly lost: 6,756 bytes in 7 blocks
==9664==      possibly lost: 0 bytes in 0 blocks
==9664==    still reachable: 3,111,547 bytes in 68,941 blocks
==9664==         suppressed: 0 bytes in 0 blocks
==9664== Rerun with --leak-check=full to see details of leaked memory
==9664== 
==9664== Use --track-origins=yes to see where uninitialised values come from
==9664== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9664== 
==9664== 1 errors in context 1 of 2:
==9664== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9664==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9664==    by 0x488CD0: stringsubst (subst.c:301)
==9664==    by 0x48801B: prefork (subst.c:77)
==9664==    by 0x42B318: execcmd (exec.c:2619)
==9664==    by 0x428CA0: execpline2 (exec.c:1697)
==9664==    by 0x427FD2: execpline (exec.c:1484)
==9664==    by 0x427756: execlist (exec.c:1267)
==9664==    by 0x42717C: execode (exec.c:1073)
==9664==    by 0x431299: runshfunc (exec.c:5040)
==9664==    by 0x430E76: doshfunc (exec.c:4920)
==9664==    by 0x4302FB: execshfunc (exec.c:4557)
==9664==    by 0x42D8C1: execcmd (exec.c:3373)
==9664== 
==9664== 
==9664== 2 errors in context 2 of 2:
==9664== Conditional jump or move depends on uninitialised value(s)
==9664==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9664==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9664==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9664==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9664==    by 0x42D8E9: execcmd (exec.c:3378)
==9664==    by 0x428CA0: execpline2 (exec.c:1697)
==9664==    by 0x427FD2: execpline (exec.c:1484)
==9664==    by 0x42779A: execlist (exec.c:1275)
==9664==    by 0x42717C: execode (exec.c:1073)
==9664==    by 0x431299: runshfunc (exec.c:5040)
==9664==    by 0x430E76: doshfunc (exec.c:4920)
==9664==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9664== 
==9664== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9665== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9665-by-pythonnut-on-???
==9665== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9665-by-pythonnut-on-???
==9665== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9665-by-pythonnut-on-???
==9665== 
==9665== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9665== don't want to do, unless you know exactly what you're doing,
==9665== or are doing some strange experiment):
==9665==   /usr/lib/valgrind/../../bin/vgdb --pid=9665 ...command...
==9665== 
==9665== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9665==   /path/to/gdb ./zsh
==9665== and then give GDB the following command
==9665==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9665
==9665== --pid is optional if only one valgrind process is running
==9665== 
--9665-- Caught __NR_exit; running __libc_freeres()
==9660== Checked 4,852,480 bytes
==9660== 
--9665-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9665== 
==9665== HEAP SUMMARY:
==9665==     in use at exit: 3,120,658 bytes in 68,964 blocks
==9665==   total heap usage: 1,463,709 allocs, 1,394,745 frees, 117,735,782 bytes allocated
==9665== 
==9660== LEAK SUMMARY:
==9660==    definitely lost: 2,181 bytes in 11 blocks
==9660==    indirectly lost: 6,756 bytes in 7 blocks
==9660==      possibly lost: 0 bytes in 0 blocks
==9660==    still reachable: 3,142,036 bytes in 69,350 blocks
==9660==         suppressed: 0 bytes in 0 blocks
==9660== Rerun with --leak-check=full to see details of leaked memory
==9660== 
==9660== Use --track-origins=yes to see where uninitialised values come from
==9660== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9660== 
==9660== 1 errors in context 1 of 2:
==9660== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9660==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9660==    by 0x488CD0: stringsubst (subst.c:301)
==9660==    by 0x48801B: prefork (subst.c:77)
==9660==    by 0x42B318: execcmd (exec.c:2619)
==9660==    by 0x428CA0: execpline2 (exec.c:1697)
==9660==    by 0x427FD2: execpline (exec.c:1484)
==9660==    by 0x427756: execlist (exec.c:1267)
==9660==    by 0x42717C: execode (exec.c:1073)
==9660==    by 0x431299: runshfunc (exec.c:5040)
==9660==    by 0x430E76: doshfunc (exec.c:4920)
==9660==    by 0x4302FB: execshfunc (exec.c:4557)
==9660==    by 0x42D8C1: execcmd (exec.c:3373)
==9660== 
==9660== 
==9660== 2 errors in context 2 of 2:
==9660== Conditional jump or move depends on uninitialised value(s)
==9660==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9660==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9660==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9660==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9660==    by 0x42D8E9: execcmd (exec.c:3378)
==9660==    by 0x428CA0: execpline2 (exec.c:1697)
==9660==    by 0x427FD2: execpline (exec.c:1484)
==9660==    by 0x42779A: execlist (exec.c:1275)
==9660==    by 0x42717C: execode (exec.c:1073)
==9660==    by 0x431299: runshfunc (exec.c:5040)
==9660==    by 0x430E76: doshfunc (exec.c:4920)
==9660==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9660== 
==9660== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9666== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9666-by-pythonnut-on-???
==9666== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9666-by-pythonnut-on-???
==9666== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9666-by-pythonnut-on-???
==9666== 
==9666== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9666== don't want to do, unless you know exactly what you're doing,
==9666== or are doing some strange experiment):
==9666==   /usr/lib/valgrind/../../bin/vgdb --pid=9666 ...command...
==9666== 
==9666== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9666==   /path/to/gdb ./zsh
==9666== and then give GDB the following command
==9666==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9666
==9666== --pid is optional if only one valgrind process is running
==9666== 
==9665== Searching for pointers to 68,964 not-freed blocks
--9665--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9665--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9665--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9665--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9665--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9665--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9665--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9665--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9665--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9665--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9665--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9665--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9665--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9665--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9665--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9665--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9665--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9665--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9665--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9665--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9665--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9665--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9665--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9665--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9665--   Scanning root segment: 0x701a000..0x701afff (4096)
--9665--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9665--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9665--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9665--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9665--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9665--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9665--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9665--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9665--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
client request: code 4d430005,  addr 0xFFEFF2BEC,  len 4
==9667== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9667-by-pythonnut-on-???
==9667== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9667-by-pythonnut-on-???
==9667== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9667-by-pythonnut-on-???
==9667== 
==9667== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9667== don't want to do, unless you know exactly what you're doing,
==9667== or are doing some strange experiment):
==9667==   /usr/lib/valgrind/../../bin/vgdb --pid=9667 ...command...
==9667== 
==9667== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9667==   /path/to/gdb ./zsh
==9667== and then give GDB the following command
==9667==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9667
==9667== --pid is optional if only one valgrind process is running
==9667== 
--9667-- Caught __NR_exit; running __libc_freeres()
--9667-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9667== 
==9667== HEAP SUMMARY:
==9667==     in use at exit: 3,153,502 bytes in 69,456 blocks
==9667==   total heap usage: 1,467,416 allocs, 1,397,960 frees, 119,699,788 bytes allocated
==9667== 
==9667== Searching for pointers to 69,456 not-freed blocks
--9667--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9667--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9667--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9667--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9667--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9667--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9667--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9667--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9667--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9667--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9667--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9667--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9667--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9667--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9667--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9667--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9667--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9667--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9667--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9667--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9667--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9667--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9667--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9667--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9667--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9667--   Scanning root segment: 0x701a000..0x701afff (4096)
--9667--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9667--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9667--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9667--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9667--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9667--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9667--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9667--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9667--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9665== Checked 4,781,384 bytes
==9665== 
==9665== LEAK SUMMARY:
==9665==    definitely lost: 2,181 bytes in 11 blocks
==9665==    indirectly lost: 6,756 bytes in 7 blocks
==9665==      possibly lost: 0 bytes in 0 blocks
==9665==    still reachable: 3,111,721 bytes in 68,946 blocks
==9665==         suppressed: 0 bytes in 0 blocks
==9665== Rerun with --leak-check=full to see details of leaked memory
==9665== 
==9665== Use --track-origins=yes to see where uninitialised values come from
==9665== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9665== 
==9665== 1 errors in context 1 of 2:
==9665== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9665==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9665==    by 0x488CD0: stringsubst (subst.c:301)
==9665==    by 0x48801B: prefork (subst.c:77)
==9665==    by 0x42B318: execcmd (exec.c:2619)
==9665==    by 0x428CA0: execpline2 (exec.c:1697)
==9665==    by 0x427FD2: execpline (exec.c:1484)
==9665==    by 0x427756: execlist (exec.c:1267)
==9665==    by 0x42717C: execode (exec.c:1073)
==9665==    by 0x431299: runshfunc (exec.c:5040)
==9665==    by 0x430E76: doshfunc (exec.c:4920)
==9665==    by 0x4302FB: execshfunc (exec.c:4557)
==9665==    by 0x42D8C1: execcmd (exec.c:3373)
==9665== 
==9665== 
==9665== 2 errors in context 2 of 2:
==9665== Conditional jump or move depends on uninitialised value(s)
==9665==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9665==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9665==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9665==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9665==    by 0x42D8E9: execcmd (exec.c:3378)
==9665==    by 0x428CA0: execpline2 (exec.c:1697)
==9665==    by 0x427FD2: execpline (exec.c:1484)
==9665==    by 0x42779A: execlist (exec.c:1275)
==9665==    by 0x42717C: execode (exec.c:1073)
==9665==    by 0x431299: runshfunc (exec.c:5040)
==9665==    by 0x430E76: doshfunc (exec.c:4920)
==9665==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9665== 
==9665== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9668-- Caught __NR_exit; running __libc_freeres()
==9668== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9668-by-pythonnut-on-???
==9668== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9668-by-pythonnut-on-???
==9668== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9668-by-pythonnut-on-???
==9668== 
==9668== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9668== don't want to do, unless you know exactly what you're doing,
==9668== or are doing some strange experiment):
==9668==   /usr/lib/valgrind/../../bin/vgdb --pid=9668 ...command...
==9668== 
==9668== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9668==   /path/to/gdb ./zsh
==9668== and then give GDB the following command
==9668==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9668
==9668== --pid is optional if only one valgrind process is running
==9668== 
--9668-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9668== 
==9668== HEAP SUMMARY:
==9668==     in use at exit: 3,120,594 bytes in 68,964 blocks
==9668==   total heap usage: 1,463,689 allocs, 1,394,725 frees, 117,733,552 bytes allocated
==9668== 
==9667== Checked 4,857,184 bytes
==9667== 
==9668== Searching for pointers to 68,964 not-freed blocks
--9668--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9668--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9668--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9668--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9668--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9668--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9668--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9668--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9668--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9668--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9668--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9668--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9668--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9668--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9668--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9668--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9668--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9668--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9668--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9668--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9668--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9668--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9668--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9668--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9668--   Scanning root segment: 0x701a000..0x701afff (4096)
--9668--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9668--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9668--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9668--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9668--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9668--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9668--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9668--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9668--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9667== LEAK SUMMARY:
==9667==    definitely lost: 2,181 bytes in 11 blocks
==9667==    indirectly lost: 6,756 bytes in 7 blocks
==9667==      possibly lost: 0 bytes in 0 blocks
==9667==    still reachable: 3,144,565 bytes in 69,438 blocks
==9667==         suppressed: 0 bytes in 0 blocks
==9667== Rerun with --leak-check=full to see details of leaked memory
==9667== 
==9667== Use --track-origins=yes to see where uninitialised values come from
==9667== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9667== 
==9667== 1 errors in context 1 of 2:
==9667== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9667==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9667==    by 0x488CD0: stringsubst (subst.c:301)
==9667==    by 0x48801B: prefork (subst.c:77)
==9667==    by 0x42B318: execcmd (exec.c:2619)
==9667==    by 0x428CA0: execpline2 (exec.c:1697)
==9667==    by 0x427FD2: execpline (exec.c:1484)
==9667==    by 0x427756: execlist (exec.c:1267)
==9667==    by 0x42717C: execode (exec.c:1073)
==9667==    by 0x431299: runshfunc (exec.c:5040)
==9667==    by 0x430E76: doshfunc (exec.c:4920)
==9667==    by 0x4302FB: execshfunc (exec.c:4557)
==9667==    by 0x42D8C1: execcmd (exec.c:3373)
==9667== 
==9667== 
==9667== 2 errors in context 2 of 2:
==9667== Conditional jump or move depends on uninitialised value(s)
==9667==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9667==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9667==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9667==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9667==    by 0x42D8E9: execcmd (exec.c:3378)
==9667==    by 0x428CA0: execpline2 (exec.c:1697)
==9667==    by 0x427FD2: execpline (exec.c:1484)
==9667==    by 0x42779A: execlist (exec.c:1275)
==9667==    by 0x42717C: execode (exec.c:1073)
==9667==    by 0x431299: runshfunc (exec.c:5040)
==9667==    by 0x430E76: doshfunc (exec.c:4920)
==9667==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9667== 
==9667== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9666-- Caught __NR_exit; running __libc_freeres()
--9666-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9666== 
==9666== HEAP SUMMARY:
==9666==     in use at exit: 3,151,246 bytes in 69,376 blocks
==9666==   total heap usage: 1,467,319 allocs, 1,397,943 frees, 119,500,591 bytes allocated
==9666== 
==9666== Searching for pointers to 69,376 not-freed blocks
--9666--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9666--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9666--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9666--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9666--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9666--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9666--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9666--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9666--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9666--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9666--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9666--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9666--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9666--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9666--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9666--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9666--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9666--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9666--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9666--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9666--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9666--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9666--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9666--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9666--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9666--   Scanning root segment: 0x701a000..0x701afff (4096)
--9666--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9666--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9666--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9666--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9666--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9666--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9666--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9666--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9666--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9668== Checked 4,781,336 bytes
==9668== 
==9668== LEAK SUMMARY:
==9668==    definitely lost: 2,181 bytes in 11 blocks
==9668==    indirectly lost: 6,756 bytes in 7 blocks
==9668==      possibly lost: 0 bytes in 0 blocks
==9668==    still reachable: 3,111,657 bytes in 68,946 blocks
==9668==         suppressed: 0 bytes in 0 blocks
==9668== Rerun with --leak-check=full to see details of leaked memory
==9668== 
==9668== Use --track-origins=yes to see where uninitialised values come from
==9668== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9668== 
==9668== 1 errors in context 1 of 2:
==9668== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9668==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9668==    by 0x488CD0: stringsubst (subst.c:301)
==9668==    by 0x48801B: prefork (subst.c:77)
==9668==    by 0x42B318: execcmd (exec.c:2619)
==9668==    by 0x428CA0: execpline2 (exec.c:1697)
==9668==    by 0x427FD2: execpline (exec.c:1484)
==9668==    by 0x427756: execlist (exec.c:1267)
==9668==    by 0x42717C: execode (exec.c:1073)
==9668==    by 0x431299: runshfunc (exec.c:5040)
==9668==    by 0x430E76: doshfunc (exec.c:4920)
==9668==    by 0x4302FB: execshfunc (exec.c:4557)
==9668==    by 0x42D8C1: execcmd (exec.c:3373)
==9668== 
==9668== 
==9668== 2 errors in context 2 of 2:
==9668== Conditional jump or move depends on uninitialised value(s)
==9668==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9668==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9668==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9668==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9668==    by 0x42D8E9: execcmd (exec.c:3378)
==9668==    by 0x428CA0: execpline2 (exec.c:1697)
==9668==    by 0x427FD2: execpline (exec.c:1484)
==9668==    by 0x42779A: execlist (exec.c:1275)
==9668==    by 0x42717C: execode (exec.c:1073)
==9668==    by 0x431299: runshfunc (exec.c:5040)
==9668==    by 0x430E76: doshfunc (exec.c:4920)
==9668==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9668== 
==9668== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9669== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9669-by-pythonnut-on-???
==9669== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9669-by-pythonnut-on-???
==9669== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9669-by-pythonnut-on-???
==9669== 
==9669== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9669== don't want to do, unless you know exactly what you're doing,
==9669== or are doing some strange experiment):
==9669==   /usr/lib/valgrind/../../bin/vgdb --pid=9669 ...command...
==9669== 
==9669== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9669==   /path/to/gdb ./zsh
==9669== and then give GDB the following command
==9669==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9669
==9669== --pid is optional if only one valgrind process is running
==9669== 
--9669-- Caught __NR_exit; running __libc_freeres()
==9666== Checked 4,853,240 bytes
==9666== 
--9669-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9669== 
==9669== HEAP SUMMARY:
==9669==     in use at exit: 3,120,632 bytes in 68,965 blocks
==9669==   total heap usage: 1,463,702 allocs, 1,394,737 frees, 117,736,249 bytes allocated
==9669== 
==9666== LEAK SUMMARY:
==9666==    definitely lost: 2,181 bytes in 11 blocks
==9666==    indirectly lost: 6,756 bytes in 7 blocks
==9666==      possibly lost: 0 bytes in 0 blocks
==9666==    still reachable: 3,142,309 bytes in 69,358 blocks
==9666==         suppressed: 0 bytes in 0 blocks
==9666== Rerun with --leak-check=full to see details of leaked memory
==9666== 
==9666== Use --track-origins=yes to see where uninitialised values come from
==9666== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9666== 
==9666== 1 errors in context 1 of 2:
==9666== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9666==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9666==    by 0x488CD0: stringsubst (subst.c:301)
==9666==    by 0x48801B: prefork (subst.c:77)
==9666==    by 0x42B318: execcmd (exec.c:2619)
==9666==    by 0x428CA0: execpline2 (exec.c:1697)
==9666==    by 0x427FD2: execpline (exec.c:1484)
==9666==    by 0x427756: execlist (exec.c:1267)
==9666==    by 0x42717C: execode (exec.c:1073)
==9666==    by 0x431299: runshfunc (exec.c:5040)
==9666==    by 0x430E76: doshfunc (exec.c:4920)
==9666==    by 0x4302FB: execshfunc (exec.c:4557)
==9666==    by 0x42D8C1: execcmd (exec.c:3373)
==9666== 
==9666== 
==9666== 2 errors in context 2 of 2:
==9666== Conditional jump or move depends on uninitialised value(s)
==9666==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9666==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9666==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9666==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9666==    by 0x42D8E9: execcmd (exec.c:3378)
==9666==    by 0x428CA0: execpline2 (exec.c:1697)
==9666==    by 0x427FD2: execpline (exec.c:1484)
==9666==    by 0x42779A: execlist (exec.c:1275)
==9666==    by 0x42717C: execode (exec.c:1073)
==9666==    by 0x431299: runshfunc (exec.c:5040)
==9666==    by 0x430E76: doshfunc (exec.c:4920)
==9666==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9666== 
==9666== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
client request: code 4d430005,  addr 0xFFEFF73AC,  len 4
==9669== Searching for pointers to 68,965 not-freed blocks
--9669--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9669--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9669--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9669--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9669--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9669--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9669--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9669--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9669--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9669--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9669--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9669--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9669--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9669--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9669--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9669--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9669--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9669--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9669--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9669--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9669--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9669--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9669--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9669--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9669--   Scanning root segment: 0x701a000..0x701afff (4096)
--9669--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9669--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9669--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9669--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9669--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9669--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9669--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9669--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9669--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEC39C,  len 4
--9670-- Caught __NR_exit; running __libc_freeres()
==9670== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9670-by-pythonnut-on-???
==9670== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9670-by-pythonnut-on-???
==9670== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9670-by-pythonnut-on-???
==9670== 
==9670== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9670== don't want to do, unless you know exactly what you're doing,
==9670== or are doing some strange experiment):
==9670==   /usr/lib/valgrind/../../bin/vgdb --pid=9670 ...command...
==9670== 
==9670== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9670==   /path/to/gdb ./zsh
==9670== and then give GDB the following command
==9670==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9670
==9670== --pid is optional if only one valgrind process is running
==9670== 
--9670-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9670== 
==9670== HEAP SUMMARY:
==9670==     in use at exit: 3,153,073 bytes in 69,367 blocks
==9670==   total heap usage: 1,467,432 allocs, 1,398,065 frees, 119,516,054 bytes allocated
==9670== 
==9670== Searching for pointers to 69,367 not-freed blocks
--9670--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9670--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9670--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9670--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9670--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9670--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9670--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9670--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9670--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9670--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9670--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9670--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9670--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9670--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9670--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9670--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9670--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9670--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9670--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9670--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9670--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9670--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9670--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9670--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9670--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9670--   Scanning root segment: 0x701a000..0x701afff (4096)
--9670--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9670--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9670--   Scanning root segment: 0xae51000..0xae52fff (8192)
==9669== Checked 4,780,856 bytes
--9670--   Scanning root segment: 0xb054000..0xb054fff (4096)
==9669== 
--9670--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9670--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9670--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9670--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9670--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9669== LEAK SUMMARY:
==9669==    definitely lost: 2,181 bytes in 11 blocks
==9669==    indirectly lost: 6,756 bytes in 7 blocks
==9669==      possibly lost: 0 bytes in 0 blocks
==9669==    still reachable: 3,111,695 bytes in 68,947 blocks
==9669==         suppressed: 0 bytes in 0 blocks
==9669== Rerun with --leak-check=full to see details of leaked memory
==9669== 
==9669== Use --track-origins=yes to see where uninitialised values come from
==9669== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9669== 
==9669== 1 errors in context 1 of 2:
==9669== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9669==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9669==    by 0x488CD0: stringsubst (subst.c:301)
==9669==    by 0x48801B: prefork (subst.c:77)
==9669==    by 0x42B318: execcmd (exec.c:2619)
==9669==    by 0x428CA0: execpline2 (exec.c:1697)
==9669==    by 0x427FD2: execpline (exec.c:1484)
==9669==    by 0x427756: execlist (exec.c:1267)
==9669==    by 0x42717C: execode (exec.c:1073)
==9669==    by 0x431299: runshfunc (exec.c:5040)
==9669==    by 0x430E76: doshfunc (exec.c:4920)
==9669==    by 0x4302FB: execshfunc (exec.c:4557)
==9669==    by 0x42D8C1: execcmd (exec.c:3373)
==9669== 
==9669== 
==9669== 2 errors in context 2 of 2:
==9669== Conditional jump or move depends on uninitialised value(s)
==9669==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9669==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9669==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9669==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9669==    by 0x42D8E9: execcmd (exec.c:3378)
==9669==    by 0x428CA0: execpline2 (exec.c:1697)
==9669==    by 0x427FD2: execpline (exec.c:1484)
==9669==    by 0x42779A: execlist (exec.c:1275)
==9669==    by 0x42717C: execode (exec.c:1073)
==9669==    by 0x431299: runshfunc (exec.c:5040)
==9669==    by 0x430E76: doshfunc (exec.c:4920)
==9669==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9669== 
==9669== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9672== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9672-by-pythonnut-on-???
==9672== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9672-by-pythonnut-on-???
==9672== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9672-by-pythonnut-on-???
==9672== 
==9672== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9672== don't want to do, unless you know exactly what you're doing,
==9672== or are doing some strange experiment):
==9672==   /usr/lib/valgrind/../../bin/vgdb --pid=9672 ...command...
==9672== 
==9672== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9672==   /path/to/gdb ./zsh
==9672== and then give GDB the following command
==9672==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9672
==9672== --pid is optional if only one valgrind process is running
==9672== 
--9672-- Caught __NR_exit; running __libc_freeres()
--9672-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9672== 
==9672== HEAP SUMMARY:
==9672==     in use at exit: 3,119,143 bytes in 68,905 blocks
==9672==   total heap usage: 1,463,672 allocs, 1,394,767 frees, 117,739,247 bytes allocated
==9672== 
==9670== Checked 4,853,472 bytes
==9670== 
==9672== Searching for pointers to 68,905 not-freed blocks
--9672--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9672--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9672--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9672--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9672--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9672--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9672--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9672--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9672--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9672--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9672--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9672--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9672--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9672--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9672--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9672--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9672--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9672--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9672--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9672--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9672--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9672--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9672--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9672--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9672--   Scanning root segment: 0x701a000..0x701afff (4096)
--9672--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9672--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9672--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9672--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9672--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9672--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9672--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9672--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9672--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9670== LEAK SUMMARY:
==9670==    definitely lost: 2,181 bytes in 11 blocks
==9670==    indirectly lost: 6,756 bytes in 7 blocks
==9670==      possibly lost: 0 bytes in 0 blocks
==9670==    still reachable: 3,144,136 bytes in 69,349 blocks
==9670==         suppressed: 0 bytes in 0 blocks
==9670== Rerun with --leak-check=full to see details of leaked memory
==9670== 
==9670== Use --track-origins=yes to see where uninitialised values come from
==9670== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9670== 
==9670== 1 errors in context 1 of 2:
==9670== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9670==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9670==    by 0x488CD0: stringsubst (subst.c:301)
==9670==    by 0x48801B: prefork (subst.c:77)
==9670==    by 0x42B318: execcmd (exec.c:2619)
==9670==    by 0x428CA0: execpline2 (exec.c:1697)
==9670==    by 0x427FD2: execpline (exec.c:1484)
==9670==    by 0x427756: execlist (exec.c:1267)
==9670==    by 0x42717C: execode (exec.c:1073)
==9670==    by 0x431299: runshfunc (exec.c:5040)
==9670==    by 0x430E76: doshfunc (exec.c:4920)
==9670==    by 0x4302FB: execshfunc (exec.c:4557)
==9670==    by 0x42D8C1: execcmd (exec.c:3373)
==9670== 
==9670== 
==9670== 2 errors in context 2 of 2:
==9670== Conditional jump or move depends on uninitialised value(s)
==9670==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9670==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9670==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9670==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9670==    by 0x42D8E9: execcmd (exec.c:3378)
==9670==    by 0x428CA0: execpline2 (exec.c:1697)
==9670==    by 0x427FD2: execpline (exec.c:1484)
==9670==    by 0x42779A: execlist (exec.c:1275)
==9670==    by 0x42717C: execode (exec.c:1073)
==9670==    by 0x431299: runshfunc (exec.c:5040)
==9670==    by 0x430E76: doshfunc (exec.c:4920)
==9670==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9670== 
==9670== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9673== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9673-by-pythonnut-on-???
==9673== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9673-by-pythonnut-on-???
==9673== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9673-by-pythonnut-on-???
==9673== 
==9673== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9673== don't want to do, unless you know exactly what you're doing,
==9673== or are doing some strange experiment):
==9673==   /usr/lib/valgrind/../../bin/vgdb --pid=9673 ...command...
==9673== 
==9673== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9673==   /path/to/gdb ./zsh
==9673== and then give GDB the following command
==9673==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9673
==9673== --pid is optional if only one valgrind process is running
==9673== 
--9673-- Caught __NR_exit; running __libc_freeres()
--9673-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9673== 
==9673== HEAP SUMMARY:
==9673==     in use at exit: 3,152,257 bytes in 69,323 blocks
==9673==   total heap usage: 1,467,389 allocs, 1,398,066 frees, 119,515,536 bytes allocated
==9673== 
==9673== Searching for pointers to 69,323 not-freed blocks
--9673--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9673--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9673--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9673--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9673--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9673--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9673--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9673--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9673--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9673--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9673--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9673--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9673--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9673--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9673--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9673--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9673--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9673--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9673--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9673--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9673--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9673--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9673--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9673--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9673--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9673--   Scanning root segment: 0x701a000..0x701afff (4096)
--9673--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9673--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9673--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9673--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9673--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9673--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9673--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9673--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9673--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9672== Checked 4,780,312 bytes
==9672== 
==9672== LEAK SUMMARY:
==9672==    definitely lost: 2,181 bytes in 11 blocks
==9672==    indirectly lost: 6,756 bytes in 7 blocks
==9672==      possibly lost: 0 bytes in 0 blocks
==9672==    still reachable: 3,110,206 bytes in 68,887 blocks
==9672==         suppressed: 0 bytes in 0 blocks
==9672== Rerun with --leak-check=full to see details of leaked memory
==9672== 
==9672== Use --track-origins=yes to see where uninitialised values come from
==9672== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9672== 
==9672== 1 errors in context 1 of 2:
==9672== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9672==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9672==    by 0x488CD0: stringsubst (subst.c:301)
==9672==    by 0x48801B: prefork (subst.c:77)
==9672==    by 0x42B318: execcmd (exec.c:2619)
==9672==    by 0x428CA0: execpline2 (exec.c:1697)
==9672==    by 0x427FD2: execpline (exec.c:1484)
==9672==    by 0x427756: execlist (exec.c:1267)
==9672==    by 0x42717C: execode (exec.c:1073)
==9672==    by 0x431299: runshfunc (exec.c:5040)
==9672==    by 0x430E76: doshfunc (exec.c:4920)
==9672==    by 0x4302FB: execshfunc (exec.c:4557)
==9672==    by 0x42D8C1: execcmd (exec.c:3373)
==9672== 
==9672== 
==9672== 2 errors in context 2 of 2:
==9672== Conditional jump or move depends on uninitialised value(s)
==9672==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9672==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9672==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9672==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9672==    by 0x42D8E9: execcmd (exec.c:3378)
==9672==    by 0x428CA0: execpline2 (exec.c:1697)
==9672==    by 0x427FD2: execpline (exec.c:1484)
==9672==    by 0x42779A: execlist (exec.c:1275)
==9672==    by 0x42717C: execode (exec.c:1073)
==9672==    by 0x431299: runshfunc (exec.c:5040)
==9672==    by 0x430E76: doshfunc (exec.c:4920)
==9672==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9672== 
==9672== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9674== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9674-by-pythonnut-on-???
==9674== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9674-by-pythonnut-on-???
==9674== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9674-by-pythonnut-on-???
==9674== 
==9674== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9674== don't want to do, unless you know exactly what you're doing,
==9674== or are doing some strange experiment):
==9674==   /usr/lib/valgrind/../../bin/vgdb --pid=9674 ...command...
==9674== 
==9674== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9674==   /path/to/gdb ./zsh
==9674== and then give GDB the following command
==9674==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9674
==9674== --pid is optional if only one valgrind process is running
==9674== 
--9677-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9677== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9677-by-pythonnut-on-???
==9677== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9677-by-pythonnut-on-???
==9677== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9677-by-pythonnut-on-???
==9677== 
==9677== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9677== don't want to do, unless you know exactly what you're doing,
==9677== or are doing some strange experiment):
==9677==   /usr/lib/valgrind/../../bin/vgdb --pid=9677 ...command...
==9677== 
==9677== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9677==   /path/to/gdb ./zsh
==9677== and then give GDB the following command
==9677==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9677
==9677== --pid is optional if only one valgrind process is running
==9677== 
==9673== Checked 4,852,152 bytes
==9673== 
--9677-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9677== 
==9677== HEAP SUMMARY:
==9677==     in use at exit: 3,121,279 bytes in 69,145 blocks
==9677==   total heap usage: 1,464,046 allocs, 1,394,901 frees, 117,771,810 bytes allocated
==9677== 
==9673== LEAK SUMMARY:
==9673==    definitely lost: 2,181 bytes in 11 blocks
==9673==    indirectly lost: 6,756 bytes in 7 blocks
==9673==      possibly lost: 0 bytes in 0 blocks
==9673==    still reachable: 3,143,320 bytes in 69,305 blocks
==9673==         suppressed: 0 bytes in 0 blocks
==9673== Rerun with --leak-check=full to see details of leaked memory
==9673== 
==9673== Use --track-origins=yes to see where uninitialised values come from
==9673== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9673== 
==9673== 1 errors in context 1 of 2:
==9673== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9673==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9673==    by 0x488CD0: stringsubst (subst.c:301)
==9673==    by 0x48801B: prefork (subst.c:77)
==9673==    by 0x42B318: execcmd (exec.c:2619)
==9673==    by 0x428CA0: execpline2 (exec.c:1697)
==9673==    by 0x427FD2: execpline (exec.c:1484)
==9673==    by 0x427756: execlist (exec.c:1267)
==9673==    by 0x42717C: execode (exec.c:1073)
==9673==    by 0x431299: runshfunc (exec.c:5040)
==9673==    by 0x430E76: doshfunc (exec.c:4920)
==9673==    by 0x4302FB: execshfunc (exec.c:4557)
==9673==    by 0x42D8C1: execcmd (exec.c:3373)
==9673== 
==9673== 
==9673== 2 errors in context 2 of 2:
==9673== Conditional jump or move depends on uninitialised value(s)
==9673==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9673==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9673==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9673==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9673==    by 0x42D8E9: execcmd (exec.c:3378)
==9673==    by 0x428CA0: execpline2 (exec.c:1697)
==9673==    by 0x427FD2: execpline (exec.c:1484)
==9673==    by 0x42779A: execlist (exec.c:1275)
==9673==    by 0x42717C: execode (exec.c:1073)
==9673==    by 0x431299: runshfunc (exec.c:5040)
==9673==    by 0x430E76: doshfunc (exec.c:4920)
==9673==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9673== 
==9673== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFECF3C,  len 4
==9677== Searching for pointers to 69,145 not-freed blocks
--9677--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9677--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9677--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9677--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9677--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9677--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9677--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9677--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9677--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9677--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9677--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9677--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9677--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9677--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9677--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9677--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9677--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9677--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9677--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9677--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9677--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9677--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9677--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9677--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9677--   Scanning root segment: 0x701a000..0x701afff (4096)
--9677--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9677--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9677--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9677--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9677--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9677--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9677--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9677--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9677--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9680== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9680-by-pythonnut-on-???
==9680== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9680-by-pythonnut-on-???
==9680== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9680-by-pythonnut-on-???
==9680== 
==9680== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9680== don't want to do, unless you know exactly what you're doing,
==9680== or are doing some strange experiment):
==9680==   /usr/lib/valgrind/../../bin/vgdb --pid=9680 ...command...
==9680== 
==9680== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9680==   /path/to/gdb ./zsh
==9680== and then give GDB the following command
==9680==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9680
==9680== --pid is optional if only one valgrind process is running
==9680== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==9681== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9681-by-pythonnut-on-???
==9681== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9681-by-pythonnut-on-???
==9681== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9681-by-pythonnut-on-???
==9681== 
==9681== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9681== don't want to do, unless you know exactly what you're doing,
==9681== or are doing some strange experiment):
==9681==   /usr/lib/valgrind/../../bin/vgdb --pid=9681 ...command...
==9681== 
==9681== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9681==   /path/to/gdb ./zsh
==9681== and then give GDB the following command
==9681==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9681
==9681== --pid is optional if only one valgrind process is running
==9681== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
--9681-- Caught __NR_exit; running __libc_freeres()
--9681-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9677== Checked 4,778,616 bytes
==9677== 
==9681== 
==9681== HEAP SUMMARY:
==9681==     in use at exit: 3,160,061 bytes in 69,547 blocks
==9681==   total heap usage: 1,468,165 allocs, 1,398,618 frees, 119,801,712 bytes allocated
==9681== 
==9677== LEAK SUMMARY:
==9677==    definitely lost: 2,181 bytes in 11 blocks
==9677==    indirectly lost: 6,756 bytes in 7 blocks
==9677==      possibly lost: 0 bytes in 0 blocks
==9677==    still reachable: 3,112,342 bytes in 69,127 blocks
==9677==         suppressed: 0 bytes in 0 blocks
==9677== Rerun with --leak-check=full to see details of leaked memory
==9677== 
==9677== Use --track-origins=yes to see where uninitialised values come from
==9677== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9677== 
==9677== 1 errors in context 1 of 2:
==9677== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9677==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9677==    by 0x488CD0: stringsubst (subst.c:301)
==9677==    by 0x48801B: prefork (subst.c:77)
==9677==    by 0x42B318: execcmd (exec.c:2619)
==9677==    by 0x428CA0: execpline2 (exec.c:1697)
==9677==    by 0x427FD2: execpline (exec.c:1484)
==9677==    by 0x427756: execlist (exec.c:1267)
==9677==    by 0x42717C: execode (exec.c:1073)
==9677==    by 0x431299: runshfunc (exec.c:5040)
==9677==    by 0x430E76: doshfunc (exec.c:4920)
==9677==    by 0x4302FB: execshfunc (exec.c:4557)
==9677==    by 0x42D8C1: execcmd (exec.c:3373)
==9677== 
==9677== 
==9677== 2 errors in context 2 of 2:
==9677== Conditional jump or move depends on uninitialised value(s)
==9677==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9677==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9677==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9677==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9677==    by 0x42D8E9: execcmd (exec.c:3378)
==9677==    by 0x428CA0: execpline2 (exec.c:1697)
==9677==    by 0x427FD2: execpline (exec.c:1484)
==9677==    by 0x42779A: execlist (exec.c:1275)
==9677==    by 0x42717C: execode (exec.c:1073)
==9677==    by 0x431299: runshfunc (exec.c:5040)
==9677==    by 0x430E76: doshfunc (exec.c:4920)
==9677==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9677== 
==9677== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9674-- Caught __NR_exit; running __libc_freeres()
==9681== Searching for pointers to 69,547 not-freed blocks
--9681--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9681--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9681--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9681--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9681--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9681--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9681--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9681--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9681--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9681--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9681--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9681--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9681--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9681--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9681--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9681--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9681--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9681--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9681--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9681--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9681--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9681--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9681--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9681--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9681--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9681--   Scanning root segment: 0x701a000..0x701afff (4096)
--9681--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9681--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9681--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9681--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9681--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9681--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9681--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9681--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9681--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9674-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9674== 
==9674== HEAP SUMMARY:
==9674==     in use at exit: 3,121,215 bytes in 69,142 blocks
==9674==   total heap usage: 1,464,044 allocs, 1,394,902 frees, 117,771,569 bytes allocated
==9674== 
==9674== Searching for pointers to 69,142 not-freed blocks
--9674--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9674--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9674--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9674--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9674--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9674--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9674--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9674--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9674--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9674--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9674--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9674--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9674--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9674--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9674--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9674--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9674--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9674--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9674--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9674--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9674--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9674--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9674--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9674--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9674--   Scanning root segment: 0x701a000..0x701afff (4096)
--9674--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9674--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9674--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9674--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9674--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9674--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9674--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9674--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9674--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9681== Checked 4,877,224 bytes
==9681== 
==9681== LEAK SUMMARY:
==9681==    definitely lost: 2,181 bytes in 11 blocks
==9681==    indirectly lost: 6,756 bytes in 7 blocks
==9681==      possibly lost: 0 bytes in 0 blocks
==9681==    still reachable: 3,151,124 bytes in 69,529 blocks
==9681==         suppressed: 0 bytes in 0 blocks
==9681== Rerun with --leak-check=full to see details of leaked memory
==9681== 
==9681== Use --track-origins=yes to see where uninitialised values come from
==9681== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9681== 
==9681== 1 errors in context 1 of 2:
==9681== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9681==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9681==    by 0x488CD0: stringsubst (subst.c:301)
==9681==    by 0x48801B: prefork (subst.c:77)
==9681==    by 0x42B318: execcmd (exec.c:2619)
==9681==    by 0x428CA0: execpline2 (exec.c:1697)
==9681==    by 0x427FD2: execpline (exec.c:1484)
==9681==    by 0x427756: execlist (exec.c:1267)
==9681==    by 0x42717C: execode (exec.c:1073)
==9681==    by 0x431299: runshfunc (exec.c:5040)
==9681==    by 0x430E76: doshfunc (exec.c:4920)
==9681==    by 0x4302FB: execshfunc (exec.c:4557)
==9681==    by 0x42D8C1: execcmd (exec.c:3373)
==9681== 
==9681== 
==9681== 2 errors in context 2 of 2:
==9681== Conditional jump or move depends on uninitialised value(s)
==9681==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9681==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9681==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9681==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9681==    by 0x42D8E9: execcmd (exec.c:3378)
==9681==    by 0x428CA0: execpline2 (exec.c:1697)
==9681==    by 0x427FD2: execpline (exec.c:1484)
==9681==    by 0x42779A: execlist (exec.c:1275)
==9681==    by 0x42717C: execode (exec.c:1073)
==9681==    by 0x431299: runshfunc (exec.c:5040)
==9681==    by 0x430E76: doshfunc (exec.c:4920)
==9681==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9681== 
==9681== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9680-- Caught __NR_exit; running __libc_freeres()
==9674== Checked 4,777,928 bytes
==9674== 
--9680-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9680== 
==9680== HEAP SUMMARY:
==9680==     in use at exit: 3,157,709 bytes in 69,467 blocks
==9680==   total heap usage: 1,468,071 allocs, 1,398,604 frees, 119,602,517 bytes allocated
==9680== 
==9674== LEAK SUMMARY:
==9674==    definitely lost: 2,181 bytes in 11 blocks
==9674==    indirectly lost: 6,756 bytes in 7 blocks
==9674==      possibly lost: 0 bytes in 0 blocks
==9674==    still reachable: 3,112,278 bytes in 69,124 blocks
==9674==         suppressed: 0 bytes in 0 blocks
==9674== Rerun with --leak-check=full to see details of leaked memory
==9674== 
==9674== Use --track-origins=yes to see where uninitialised values come from
==9674== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9674== 
==9674== 1 errors in context 1 of 2:
==9674== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9674==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9674==    by 0x488CD0: stringsubst (subst.c:301)
==9674==    by 0x48801B: prefork (subst.c:77)
==9674==    by 0x42B318: execcmd (exec.c:2619)
==9674==    by 0x428CA0: execpline2 (exec.c:1697)
==9674==    by 0x427FD2: execpline (exec.c:1484)
==9674==    by 0x427756: execlist (exec.c:1267)
==9674==    by 0x42717C: execode (exec.c:1073)
==9674==    by 0x431299: runshfunc (exec.c:5040)
==9674==    by 0x430E76: doshfunc (exec.c:4920)
==9674==    by 0x4302FB: execshfunc (exec.c:4557)
==9674==    by 0x42D8C1: execcmd (exec.c:3373)
==9674== 
==9674== 
==9674== 2 errors in context 2 of 2:
==9674== Conditional jump or move depends on uninitialised value(s)
==9674==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9674==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9674==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9674==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9674==    by 0x42D8E9: execcmd (exec.c:3378)
==9674==    by 0x428CA0: execpline2 (exec.c:1697)
==9674==    by 0x427FD2: execpline (exec.c:1484)
==9674==    by 0x42779A: execlist (exec.c:1275)
==9674==    by 0x42717C: execode (exec.c:1073)
==9674==    by 0x431299: runshfunc (exec.c:5040)
==9674==    by 0x430E76: doshfunc (exec.c:4920)
==9674==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9674== 
==9674== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9680== Searching for pointers to 69,467 not-freed blocks
--9680--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9680--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9680--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9680--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9680--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9680--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9680--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9680--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9680--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9680--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9680--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9680--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9680--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9680--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9680--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9680--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9680--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9680--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9680--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9680--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9680--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9680--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9680--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9680--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9680--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9680--   Scanning root segment: 0x701a000..0x701afff (4096)
--9680--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9680--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9680--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9680--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9680--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9680--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9680--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9680--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9680--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9682-- Caught __NR_exit; running __libc_freeres()
==9682== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9682-by-pythonnut-on-???
==9682== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9682-by-pythonnut-on-???
==9682== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9682-by-pythonnut-on-???
==9682== 
==9682== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9682== don't want to do, unless you know exactly what you're doing,
==9682== or are doing some strange experiment):
==9682==   /usr/lib/valgrind/../../bin/vgdb --pid=9682 ...command...
==9682== 
==9682== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9682==   /path/to/gdb ./zsh
==9682== and then give GDB the following command
==9682==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9682
==9682== --pid is optional if only one valgrind process is running
==9682== 
--9682-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9682== 
==9682== HEAP SUMMARY:
==9682==     in use at exit: 3,121,222 bytes in 69,142 blocks
==9682==   total heap usage: 1,464,059 allocs, 1,394,917 frees, 117,776,567 bytes allocated
==9682== 
==9682== Searching for pointers to 69,142 not-freed blocks
--9682--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9682--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9682--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9682--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9682--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9682--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9682--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9682--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9682--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9682--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9682--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9682--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9682--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9682--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9682--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9682--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9682--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9682--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9682--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9682--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9682--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9682--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9682--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9682--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9682--   Scanning root segment: 0x701a000..0x701afff (4096)
--9682--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9682--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9682--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9682--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9682--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9682--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9682--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9682--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9682--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9680== Checked 4,856,792 bytes
==9680== 
==9680== LEAK SUMMARY:
==9680==    definitely lost: 2,181 bytes in 11 blocks
==9680==    indirectly lost: 6,756 bytes in 7 blocks
==9680==      possibly lost: 0 bytes in 0 blocks
==9680==    still reachable: 3,148,772 bytes in 69,449 blocks
==9680==         suppressed: 0 bytes in 0 blocks
==9680== Rerun with --leak-check=full to see details of leaked memory
==9680== 
==9680== Use --track-origins=yes to see where uninitialised values come from
==9680== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9680== 
==9680== 1 errors in context 1 of 2:
==9680== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9680==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9680==    by 0x488CD0: stringsubst (subst.c:301)
==9680==    by 0x48801B: prefork (subst.c:77)
==9680==    by 0x42B318: execcmd (exec.c:2619)
==9680==    by 0x428CA0: execpline2 (exec.c:1697)
==9680==    by 0x427FD2: execpline (exec.c:1484)
==9680==    by 0x427756: execlist (exec.c:1267)
==9680==    by 0x42717C: execode (exec.c:1073)
==9680==    by 0x431299: runshfunc (exec.c:5040)
==9680==    by 0x430E76: doshfunc (exec.c:4920)
==9680==    by 0x4302FB: execshfunc (exec.c:4557)
==9680==    by 0x42D8C1: execcmd (exec.c:3373)
==9680== 
==9680== 
==9680== 2 errors in context 2 of 2:
==9680== Conditional jump or move depends on uninitialised value(s)
==9680==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9680==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9680==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9680==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9680==    by 0x42D8E9: execcmd (exec.c:3378)
==9680==    by 0x428CA0: execpline2 (exec.c:1697)
==9680==    by 0x427FD2: execpline (exec.c:1484)
==9680==    by 0x42779A: execlist (exec.c:1275)
==9680==    by 0x42717C: execode (exec.c:1073)
==9680==    by 0x431299: runshfunc (exec.c:5040)
==9680==    by 0x430E76: doshfunc (exec.c:4920)
==9680==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9680== 
==9680== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
client request: code 4d430005,  addr 0xFFEFF5D5C,  len 4
==9683== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9683-by-pythonnut-on-???
==9683== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9683-by-pythonnut-on-???
==9683== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9683-by-pythonnut-on-???
==9683== 
==9683== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9683== don't want to do, unless you know exactly what you're doing,
==9683== or are doing some strange experiment):
==9683==   /usr/lib/valgrind/../../bin/vgdb --pid=9683 ...command...
==9683== 
==9683== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9683==   /path/to/gdb ./zsh
==9683== and then give GDB the following command
==9683==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9683
==9683== --pid is optional if only one valgrind process is running
==9683== 
==9684== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9684-by-pythonnut-on-???
==9684== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9684-by-pythonnut-on-???
==9684== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9684-by-pythonnut-on-???
==9684== 
==9684== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9684== don't want to do, unless you know exactly what you're doing,
==9684== or are doing some strange experiment):
==9684==   /usr/lib/valgrind/../../bin/vgdb --pid=9684 ...command...
==9684== 
==9684== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9684==   /path/to/gdb ./zsh
==9684== and then give GDB the following command
==9684==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9684
==9684== --pid is optional if only one valgrind process is running
==9684== 
==9682== Checked 4,778,072 bytes
==9682== 
--9684-- Caught __NR_exit; running __libc_freeres()
==9682== LEAK SUMMARY:
==9682==    definitely lost: 2,181 bytes in 11 blocks
==9682==    indirectly lost: 6,756 bytes in 7 blocks
==9682==      possibly lost: 0 bytes in 0 blocks
==9682==    still reachable: 3,112,285 bytes in 69,124 blocks
==9682==         suppressed: 0 bytes in 0 blocks
==9682== Rerun with --leak-check=full to see details of leaked memory
==9682== 
==9682== Use --track-origins=yes to see where uninitialised values come from
==9682== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9682== 
==9682== 1 errors in context 1 of 2:
==9682== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9682==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9682==    by 0x488CD0: stringsubst (subst.c:301)
==9682==    by 0x48801B: prefork (subst.c:77)
==9682==    by 0x42B318: execcmd (exec.c:2619)
==9682==    by 0x428CA0: execpline2 (exec.c:1697)
==9682==    by 0x427FD2: execpline (exec.c:1484)
==9682==    by 0x427756: execlist (exec.c:1267)
==9682==    by 0x42717C: execode (exec.c:1073)
==9682==    by 0x431299: runshfunc (exec.c:5040)
==9682==    by 0x430E76: doshfunc (exec.c:4920)
==9682==    by 0x4302FB: execshfunc (exec.c:4557)
==9682==    by 0x42D8C1: execcmd (exec.c:3373)
==9682== 
==9682== 
==9682== 2 errors in context 2 of 2:
==9682== Conditional jump or move depends on uninitialised value(s)
==9682==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9682==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9682==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9682==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9682==    by 0x42D8E9: execcmd (exec.c:3378)
==9682==    by 0x428CA0: execpline2 (exec.c:1697)
==9682==    by 0x427FD2: execpline (exec.c:1484)
==9682==    by 0x42779A: execlist (exec.c:1275)
==9682==    by 0x42717C: execode (exec.c:1073)
==9682==    by 0x431299: runshfunc (exec.c:5040)
==9682==    by 0x430E76: doshfunc (exec.c:4920)
==9682==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9682== 
==9682== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9684-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9684== 
==9684== HEAP SUMMARY:
==9684==     in use at exit: 3,166,244 bytes in 69,636 blocks
==9684==   total heap usage: 1,468,385 allocs, 1,398,749 frees, 119,863,331 bytes allocated
==9684== 
--9685-- Caught __NR_exit; running __libc_freeres()
==9685== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9685-by-pythonnut-on-???
==9685== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9685-by-pythonnut-on-???
==9685== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9685-by-pythonnut-on-???
==9685== 
==9685== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9685== don't want to do, unless you know exactly what you're doing,
==9685== or are doing some strange experiment):
==9685==   /usr/lib/valgrind/../../bin/vgdb --pid=9685 ...command...
==9685== 
==9685== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9685==   /path/to/gdb ./zsh
==9685== and then give GDB the following command
==9685==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9685
==9685== --pid is optional if only one valgrind process is running
==9685== 
==9684== Searching for pointers to 69,636 not-freed blocks
--9684--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9684--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9684--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9684--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9684--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9684--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9684--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9684--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9684--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9684--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9684--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9684--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9684--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9684--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9684--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9684--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9684--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9684--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9684--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9684--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9684--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9684--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9684--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9684--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9684--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9684--   Scanning root segment: 0x701a000..0x701afff (4096)
--9684--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9684--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9684--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9684--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9684--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9684--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9684--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9684--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9684--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9685-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9685== 
==9685== HEAP SUMMARY:
==9685==     in use at exit: 3,121,318 bytes in 69,142 blocks
==9685==   total heap usage: 1,464,075 allocs, 1,394,933 frees, 117,781,354 bytes allocated
==9685== 
==9685== Searching for pointers to 69,142 not-freed blocks
--9685--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9685--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9685--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9685--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9685--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9685--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9685--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9685--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9685--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9685--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9685--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9685--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9685--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9685--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9685--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9685--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9685--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9685--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9685--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9685--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9685--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9685--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9685--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9685--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9685--   Scanning root segment: 0x701a000..0x701afff (4096)
--9685--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9685--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9685--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9685--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9685--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9685--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9685--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9685--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9685--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9684== Checked 4,884,504 bytes
==9684== 
==9684== LEAK SUMMARY:
==9684==    definitely lost: 2,181 bytes in 11 blocks
==9684==    indirectly lost: 6,756 bytes in 7 blocks
==9684==      possibly lost: 0 bytes in 0 blocks
==9684==    still reachable: 3,157,307 bytes in 69,618 blocks
==9684==         suppressed: 0 bytes in 0 blocks
==9684== Rerun with --leak-check=full to see details of leaked memory
==9684== 
==9684== Use --track-origins=yes to see where uninitialised values come from
==9684== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9684== 
==9684== 1 errors in context 1 of 2:
==9684== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9684==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9684==    by 0x488CD0: stringsubst (subst.c:301)
==9684==    by 0x48801B: prefork (subst.c:77)
==9684==    by 0x42B318: execcmd (exec.c:2619)
==9684==    by 0x428CA0: execpline2 (exec.c:1697)
==9684==    by 0x427FD2: execpline (exec.c:1484)
==9684==    by 0x427756: execlist (exec.c:1267)
==9684==    by 0x42717C: execode (exec.c:1073)
==9684==    by 0x431299: runshfunc (exec.c:5040)
==9684==    by 0x430E76: doshfunc (exec.c:4920)
==9684==    by 0x4302FB: execshfunc (exec.c:4557)
==9684==    by 0x42D8C1: execcmd (exec.c:3373)
==9684== 
==9684== 
==9684== 2 errors in context 2 of 2:
==9684== Conditional jump or move depends on uninitialised value(s)
==9684==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9684==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9684==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9684==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9684==    by 0x42D8E9: execcmd (exec.c:3378)
==9684==    by 0x428CA0: execpline2 (exec.c:1697)
==9684==    by 0x427FD2: execpline (exec.c:1484)
==9684==    by 0x42779A: execlist (exec.c:1275)
==9684==    by 0x42717C: execode (exec.c:1073)
==9684==    by 0x431299: runshfunc (exec.c:5040)
==9684==    by 0x430E76: doshfunc (exec.c:4920)
==9684==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9684== 
==9684== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9683-- Caught __NR_exit; running __libc_freeres()
==9685== Checked 4,777,352 bytes
==9685== 
==9685== LEAK SUMMARY:
==9685==    definitely lost: 2,181 bytes in 11 blocks
==9685==    indirectly lost: 6,756 bytes in 7 blocks
==9685==      possibly lost: 0 bytes in 0 blocks
==9685==    still reachable: 3,112,381 bytes in 69,124 blocks
==9685==         suppressed: 0 bytes in 0 blocks
==9685== Rerun with --leak-check=full to see details of leaked memory
==9685== 
==9685== Use --track-origins=yes to see where uninitialised values come from
==9685== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9685== 
==9685== 1 errors in context 1 of 2:
==9685== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9685==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9685==    by 0x488CD0: stringsubst (subst.c:301)
==9685==    by 0x48801B: prefork (subst.c:77)
==9685==    by 0x42B318: execcmd (exec.c:2619)
==9685==    by 0x428CA0: execpline2 (exec.c:1697)
==9685==    by 0x427FD2: execpline (exec.c:1484)
==9685==    by 0x427756: execlist (exec.c:1267)
==9685==    by 0x42717C: execode (exec.c:1073)
==9685==    by 0x431299: runshfunc (exec.c:5040)
==9685==    by 0x430E76: doshfunc (exec.c:4920)
==9685==    by 0x4302FB: execshfunc (exec.c:4557)
==9685==    by 0x42D8C1: execcmd (exec.c:3373)
==9685== 
==9685== 
==9685== 2 errors in context 2 of 2:
==9685== Conditional jump or move depends on uninitialised value(s)
==9685==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9685==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9685==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9685==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9685==    by 0x42D8E9: execcmd (exec.c:3378)
==9685==    by 0x428CA0: execpline2 (exec.c:1697)
==9685==    by 0x427FD2: execpline (exec.c:1484)
==9685==    by 0x42779A: execlist (exec.c:1275)
==9685==    by 0x42717C: execode (exec.c:1073)
==9685==    by 0x431299: runshfunc (exec.c:5040)
==9685==    by 0x430E76: doshfunc (exec.c:4920)
==9685==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9685== 
==9685== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9683-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9683== 
==9683== HEAP SUMMARY:
==9683==     in use at exit: 3,163,869 bytes in 69,555 blocks
==9683==   total heap usage: 1,468,325 allocs, 1,398,770 frees, 119,633,433 bytes allocated
==9683== 
==9686== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9686-by-pythonnut-on-???
==9686== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9686-by-pythonnut-on-???
==9686== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9686-by-pythonnut-on-???
==9686== 
==9686== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9686== don't want to do, unless you know exactly what you're doing,
==9686== or are doing some strange experiment):
==9686==   /usr/lib/valgrind/../../bin/vgdb --pid=9686 ...command...
==9686== 
==9686== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9686==   /path/to/gdb ./zsh
==9686== and then give GDB the following command
==9686==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9686
==9686== --pid is optional if only one valgrind process is running
==9686== 
--9686-- Caught __NR_exit; running __libc_freeres()
==9683== Searching for pointers to 69,555 not-freed blocks
--9683--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9683--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9683--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9683--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9683--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9683--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9683--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9683--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9683--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9683--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9683--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9683--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9683--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9683--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9683--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9683--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9683--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9683--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9683--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9683--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9683--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9683--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9683--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9683--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9683--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9683--   Scanning root segment: 0x701a000..0x701afff (4096)
--9683--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9683--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9683--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9683--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9683--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9683--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9683--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9683--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9683--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9686-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9686== 
==9686== HEAP SUMMARY:
==9686==     in use at exit: 3,121,560 bytes in 69,148 blocks
==9686==   total heap usage: 1,464,123 allocs, 1,394,975 frees, 117,790,370 bytes allocated
==9686== 
==9686== Searching for pointers to 69,148 not-freed blocks
--9686--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9686--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9686--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9686--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9686--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9686--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9686--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9686--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9686--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9686--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9686--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9686--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9686--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9686--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9686--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9686--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9686--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9686--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9686--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9686--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9686--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9686--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9686--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9686--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9686--   Scanning root segment: 0x701a000..0x701afff (4096)
--9686--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9686--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9686--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9686--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9686--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9686--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9686--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9686--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9686--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9683== Checked 4,880,568 bytes
==9683== 
==9683== LEAK SUMMARY:
==9683==    definitely lost: 2,181 bytes in 11 blocks
==9683==    indirectly lost: 6,756 bytes in 7 blocks
==9683==      possibly lost: 0 bytes in 0 blocks
==9683==    still reachable: 3,154,932 bytes in 69,537 blocks
==9683==         suppressed: 0 bytes in 0 blocks
==9683== Rerun with --leak-check=full to see details of leaked memory
==9683== 
==9683== Use --track-origins=yes to see where uninitialised values come from
==9683== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9683== 
==9683== 1 errors in context 1 of 2:
==9683== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9683==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9683==    by 0x488CD0: stringsubst (subst.c:301)
==9683==    by 0x48801B: prefork (subst.c:77)
==9683==    by 0x42B318: execcmd (exec.c:2619)
==9683==    by 0x428CA0: execpline2 (exec.c:1697)
==9683==    by 0x427FD2: execpline (exec.c:1484)
==9683==    by 0x427756: execlist (exec.c:1267)
==9683==    by 0x42717C: execode (exec.c:1073)
==9683==    by 0x431299: runshfunc (exec.c:5040)
==9683==    by 0x430E76: doshfunc (exec.c:4920)
==9683==    by 0x4302FB: execshfunc (exec.c:4557)
==9683==    by 0x42D8C1: execcmd (exec.c:3373)
==9683== 
==9683== 
==9683== 2 errors in context 2 of 2:
==9683== Conditional jump or move depends on uninitialised value(s)
==9683==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9683==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9683==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9683==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9683==    by 0x42D8E9: execcmd (exec.c:3378)
==9683==    by 0x428CA0: execpline2 (exec.c:1697)
==9683==    by 0x427FD2: execpline (exec.c:1484)
==9683==    by 0x42779A: execlist (exec.c:1275)
==9683==    by 0x42717C: execode (exec.c:1073)
==9683==    by 0x431299: runshfunc (exec.c:5040)
==9683==    by 0x430E76: doshfunc (exec.c:4920)
==9683==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9683== 
==9683== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
client request: code 4d430005,  addr 0xFFEFF540C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
client request: code 4d430005,  addr 0xFFEFF4D8C,  len 4
==9686== Checked 4,777,496 bytes
==9686== 
client request: code 4d430005,  addr 0xFFEFF3DBC,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
client request: code 4d430005,  addr 0xFFEFF469C,  len 4
==9686== LEAK SUMMARY:
==9686==    definitely lost: 2,181 bytes in 11 blocks
==9686==    indirectly lost: 6,756 bytes in 7 blocks
==9686==      possibly lost: 0 bytes in 0 blocks
==9686==    still reachable: 3,112,623 bytes in 69,130 blocks
==9686==         suppressed: 0 bytes in 0 blocks
==9686== Rerun with --leak-check=full to see details of leaked memory
==9686== 
==9686== Use --track-origins=yes to see where uninitialised values come from
==9686== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9686== 
==9686== 1 errors in context 1 of 2:
==9686== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9686==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9686==    by 0x488CD0: stringsubst (subst.c:301)
==9686==    by 0x48801B: prefork (subst.c:77)
==9686==    by 0x42B318: execcmd (exec.c:2619)
==9686==    by 0x428CA0: execpline2 (exec.c:1697)
==9686==    by 0x427FD2: execpline (exec.c:1484)
==9686==    by 0x427756: execlist (exec.c:1267)
==9686==    by 0x42717C: execode (exec.c:1073)
==9686==    by 0x431299: runshfunc (exec.c:5040)
==9686==    by 0x430E76: doshfunc (exec.c:4920)
==9686==    by 0x4302FB: execshfunc (exec.c:4557)
==9686==    by 0x42D8C1: execcmd (exec.c:3373)
==9686== 
==9686== 
==9686== 2 errors in context 2 of 2:
==9686== Conditional jump or move depends on uninitialised value(s)
==9686==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9686==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9686==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9686==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9686==    by 0x42D8E9: execcmd (exec.c:3378)
==9686==    by 0x428CA0: execpline2 (exec.c:1697)
==9686==    by 0x427FD2: execpline (exec.c:1484)
==9686==    by 0x42779A: execlist (exec.c:1275)
==9686==    by 0x42717C: execode (exec.c:1073)
==9686==    by 0x431299: runshfunc (exec.c:5040)
==9686==    by 0x430E76: doshfunc (exec.c:4920)
==9686==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9686== 
==9686== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE992C,  len 4
--9688-- Caught __NR_exit; running __libc_freeres()
==9688== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9688-by-pythonnut-on-???
==9688== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9688-by-pythonnut-on-???
==9688== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9688-by-pythonnut-on-???
==9688== 
==9688== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9688== don't want to do, unless you know exactly what you're doing,
==9688== or are doing some strange experiment):
==9688==   /usr/lib/valgrind/../../bin/vgdb --pid=9688 ...command...
==9688== 
==9688== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9688==   /path/to/gdb ./zsh
==9688== and then give GDB the following command
==9688==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9688
==9688== --pid is optional if only one valgrind process is running
==9688== 
==9690== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9690-by-pythonnut-on-???
==9690== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9690-by-pythonnut-on-???
==9690== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9690-by-pythonnut-on-???
==9690== 
==9690== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9690== don't want to do, unless you know exactly what you're doing,
==9690== or are doing some strange experiment):
==9690==   /usr/lib/valgrind/../../bin/vgdb --pid=9690 ...command...
==9690== 
==9690== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9690==   /path/to/gdb ./zsh
==9690== and then give GDB the following command
==9690==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9690
==9690== --pid is optional if only one valgrind process is running
==9690== 
client request: code 4d430005,  addr 0xFFEFE87EC,  len 4
--9688-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9688== 
==9688== HEAP SUMMARY:
==9688==     in use at exit: 3,121,496 bytes in 69,148 blocks
==9688==   total heap usage: 1,464,103 allocs, 1,394,955 frees, 117,788,140 bytes allocated
==9688== 
==9689== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9689-by-pythonnut-on-???
==9689== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9689-by-pythonnut-on-???
==9689== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9689-by-pythonnut-on-???
==9689== 
==9689== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9689== don't want to do, unless you know exactly what you're doing,
==9689== or are doing some strange experiment):
==9689==   /usr/lib/valgrind/../../bin/vgdb --pid=9689 ...command...
==9689== 
==9689== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9689==   /path/to/gdb ./zsh
==9689== and then give GDB the following command
==9689==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9689
==9689== --pid is optional if only one valgrind process is running
==9689== 
--9689-- Caught __NR_exit; running __libc_freeres()
==9688== Searching for pointers to 69,148 not-freed blocks
--9688--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9688--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9689-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9688--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9688--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9688--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9688--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9688--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9688--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9688--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9688--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9688--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9688--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9688--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9688--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9688--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9688--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9688--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9688--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9688--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9688--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9688--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9688--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9688--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9688--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9688--   Scanning root segment: 0x701a000..0x701afff (4096)
--9688--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9688--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9688--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9688--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9688--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9688--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9688--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9688--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9688--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9689== 
==9689== HEAP SUMMARY:
==9689==     in use at exit: 3,172,620 bytes in 69,644 blocks
==9689==   total heap usage: 1,468,650 allocs, 1,399,006 frees, 119,679,406 bytes allocated
==9689== 
==9689== Searching for pointers to 69,644 not-freed blocks
--9689--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9689--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9689--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9689--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9689--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9689--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9689--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9689--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9689--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9689--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9689--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9689--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9689--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9689--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9689--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9689--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9689--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9689--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9689--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9689--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9689--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9689--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9689--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9689--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9689--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9689--   Scanning root segment: 0x701a000..0x701afff (4096)
--9689--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9689--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9689--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9689--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9689--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9689--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9689--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9689--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9689--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9688== Checked 4,777,448 bytes
==9688== 
==9688== LEAK SUMMARY:
==9688==    definitely lost: 2,181 bytes in 11 blocks
==9688==    indirectly lost: 6,756 bytes in 7 blocks
==9688==      possibly lost: 0 bytes in 0 blocks
==9688==    still reachable: 3,112,559 bytes in 69,130 blocks
==9688==         suppressed: 0 bytes in 0 blocks
==9688== Rerun with --leak-check=full to see details of leaked memory
==9688== 
==9688== Use --track-origins=yes to see where uninitialised values come from
==9688== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9688== 
==9688== 1 errors in context 1 of 2:
==9688== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9688==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9688==    by 0x488CD0: stringsubst (subst.c:301)
==9688==    by 0x48801B: prefork (subst.c:77)
==9688==    by 0x42B318: execcmd (exec.c:2619)
==9688==    by 0x428CA0: execpline2 (exec.c:1697)
==9688==    by 0x427FD2: execpline (exec.c:1484)
==9688==    by 0x427756: execlist (exec.c:1267)
==9688==    by 0x42717C: execode (exec.c:1073)
==9688==    by 0x431299: runshfunc (exec.c:5040)
==9688==    by 0x430E76: doshfunc (exec.c:4920)
==9688==    by 0x4302FB: execshfunc (exec.c:4557)
==9688==    by 0x42D8C1: execcmd (exec.c:3373)
==9688== 
==9688== 
==9688== 2 errors in context 2 of 2:
==9688== Conditional jump or move depends on uninitialised value(s)
==9688==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9688==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9688==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9688==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9688==    by 0x42D8E9: execcmd (exec.c:3378)
==9688==    by 0x428CA0: execpline2 (exec.c:1697)
==9688==    by 0x427FD2: execpline (exec.c:1484)
==9688==    by 0x42779A: execlist (exec.c:1275)
==9688==    by 0x42717C: execode (exec.c:1073)
==9688==    by 0x431299: runshfunc (exec.c:5040)
==9688==    by 0x430E76: doshfunc (exec.c:4920)
==9688==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9688== 
==9688== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9689== Checked 4,893,648 bytes
==9689== 
==9693== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9693-by-pythonnut-on-???
==9693== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9693-by-pythonnut-on-???
==9693== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9693-by-pythonnut-on-???
==9693== 
==9693== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9693== don't want to do, unless you know exactly what you're doing,
==9693== or are doing some strange experiment):
==9693==   /usr/lib/valgrind/../../bin/vgdb --pid=9693 ...command...
==9693== 
==9693== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9693==   /path/to/gdb ./zsh
==9693== and then give GDB the following command
==9693==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9693
==9693== --pid is optional if only one valgrind process is running
==9693== 
==9689== LEAK SUMMARY:
==9689==    definitely lost: 2,181 bytes in 11 blocks
==9689==    indirectly lost: 6,756 bytes in 7 blocks
==9689==      possibly lost: 0 bytes in 0 blocks
==9689==    still reachable: 3,163,683 bytes in 69,626 blocks
==9689==         suppressed: 0 bytes in 0 blocks
==9689== Rerun with --leak-check=full to see details of leaked memory
==9689== 
==9689== Use --track-origins=yes to see where uninitialised values come from
==9689== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9689== 
==9689== 1 errors in context 1 of 2:
==9689== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9689==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9689==    by 0x488CD0: stringsubst (subst.c:301)
==9689==    by 0x48801B: prefork (subst.c:77)
==9689==    by 0x42B318: execcmd (exec.c:2619)
==9689==    by 0x428CA0: execpline2 (exec.c:1697)
==9689==    by 0x427FD2: execpline (exec.c:1484)
==9689==    by 0x427756: execlist (exec.c:1267)
==9689==    by 0x42717C: execode (exec.c:1073)
==9689==    by 0x431299: runshfunc (exec.c:5040)
==9689==    by 0x430E76: doshfunc (exec.c:4920)
==9689==    by 0x4302FB: execshfunc (exec.c:4557)
==9689==    by 0x42D8C1: execcmd (exec.c:3373)
==9689== 
==9689== 
==9689== 2 errors in context 2 of 2:
==9689== Conditional jump or move depends on uninitialised value(s)
==9689==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9689==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9689==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9689==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9689==    by 0x42D8E9: execcmd (exec.c:3378)
==9689==    by 0x428CA0: execpline2 (exec.c:1697)
==9689==    by 0x427FD2: execpline (exec.c:1484)
==9689==    by 0x42779A: execlist (exec.c:1275)
==9689==    by 0x42717C: execode (exec.c:1073)
==9689==    by 0x431299: runshfunc (exec.c:5040)
==9689==    by 0x430E76: doshfunc (exec.c:4920)
==9689==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9689== 
==9689== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9693-- Caught __NR_exit; running __libc_freeres()
--9695-- Caught __NR_exit; running __libc_freeres()
--9693-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFE7F8C,  len 4
==9695== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9695-by-pythonnut-on-???
==9695== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9695-by-pythonnut-on-???
==9695== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9695-by-pythonnut-on-???
==9695== 
==9695== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9695== don't want to do, unless you know exactly what you're doing,
==9695== or are doing some strange experiment):
==9695==   /usr/lib/valgrind/../../bin/vgdb --pid=9695 ...command...
==9695== 
==9695== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9695==   /path/to/gdb ./zsh
==9695== and then give GDB the following command
==9695==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9695
==9695== --pid is optional if only one valgrind process is running
==9695== 
==9693== 
==9693== HEAP SUMMARY:
==9693==     in use at exit: 3,121,534 bytes in 69,149 blocks
==9693==   total heap usage: 1,464,116 allocs, 1,394,967 frees, 117,790,837 bytes allocated
==9693== 
--9695-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9695== 
==9695== HEAP SUMMARY:
==9695==     in use at exit: 3,172,776 bytes in 69,650 blocks
==9695==   total heap usage: 1,468,659 allocs, 1,399,009 frees, 119,681,402 bytes allocated
==9695== 
==9693== Searching for pointers to 69,149 not-freed blocks
--9693--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9693--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9693--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9693--   Scanning root segment: 0x4037000..0x403afff (16384)
--9693--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9693--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9693--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9693--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9693--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9693--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9693--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9693--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9693--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9693--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9693--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9693--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9693--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9693--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9693--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9693--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9693--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9693--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9693--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9693--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9693--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9693--   Scanning root segment: 0x701a000..0x701afff (4096)
--9693--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9693--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9693--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9693--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9693--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9693--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9693--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9693--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9693--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9695== Searching for pointers to 69,650 not-freed blocks
--9695--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9695--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9695--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9695--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9695--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9695--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9695--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9695--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9695--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9695--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9695--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9695--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9695--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9695--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9695--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9695--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9695--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9695--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9695--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9695--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9695--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9695--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9695--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9695--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9695--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9695--   Scanning root segment: 0x701a000..0x701afff (4096)
--9695--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9695--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9695--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9695--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9695--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9695--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9695--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9695--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9695--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9693== Checked 4,793,352 bytes
==9693== 
==9693== LEAK SUMMARY:
==9693==    definitely lost: 2,181 bytes in 11 blocks
==9693==    indirectly lost: 6,756 bytes in 7 blocks
==9693==      possibly lost: 0 bytes in 0 blocks
==9693==    still reachable: 3,112,597 bytes in 69,131 blocks
==9693==         suppressed: 0 bytes in 0 blocks
==9693== Rerun with --leak-check=full to see details of leaked memory
==9693== 
==9693== Use --track-origins=yes to see where uninitialised values come from
==9693== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9693== 
==9693== 1 errors in context 1 of 2:
==9693== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9693==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9693==    by 0x488CD0: stringsubst (subst.c:301)
==9693==    by 0x48801B: prefork (subst.c:77)
==9693==    by 0x42B318: execcmd (exec.c:2619)
==9693==    by 0x428CA0: execpline2 (exec.c:1697)
==9693==    by 0x427FD2: execpline (exec.c:1484)
==9693==    by 0x427756: execlist (exec.c:1267)
==9693==    by 0x42717C: execode (exec.c:1073)
==9693==    by 0x431299: runshfunc (exec.c:5040)
==9693==    by 0x430E76: doshfunc (exec.c:4920)
==9693==    by 0x4302FB: execshfunc (exec.c:4557)
==9693==    by 0x42D8C1: execcmd (exec.c:3373)
==9693== 
==9693== 
==9693== 2 errors in context 2 of 2:
==9693== Conditional jump or move depends on uninitialised value(s)
==9693==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9693==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9693==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9693==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9693==    by 0x42D8E9: execcmd (exec.c:3378)
==9693==    by 0x428CA0: execpline2 (exec.c:1697)
==9693==    by 0x427FD2: execpline (exec.c:1484)
==9693==    by 0x42779A: execlist (exec.c:1275)
==9693==    by 0x42717C: execode (exec.c:1073)
==9693==    by 0x431299: runshfunc (exec.c:5040)
==9693==    by 0x430E76: doshfunc (exec.c:4920)
==9693==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9693== 
==9693== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9695== Checked 4,894,928 bytes
==9695== 
==9695== LEAK SUMMARY:
==9695==    definitely lost: 2,181 bytes in 11 blocks
==9695==    indirectly lost: 6,756 bytes in 7 blocks
==9695==      possibly lost: 0 bytes in 0 blocks
==9695==    still reachable: 3,163,839 bytes in 69,632 blocks
==9695==         suppressed: 0 bytes in 0 blocks
==9695== Rerun with --leak-check=full to see details of leaked memory
==9695== 
==9695== Use --track-origins=yes to see where uninitialised values come from
==9695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9695== 
==9695== 1 errors in context 1 of 2:
==9695== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9695==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9695==    by 0x488CD0: stringsubst (subst.c:301)
==9695==    by 0x48801B: prefork (subst.c:77)
==9695==    by 0x42B318: execcmd (exec.c:2619)
==9695==    by 0x428CA0: execpline2 (exec.c:1697)
==9695==    by 0x427FD2: execpline (exec.c:1484)
==9695==    by 0x427756: execlist (exec.c:1267)
==9695==    by 0x42717C: execode (exec.c:1073)
==9695==    by 0x431299: runshfunc (exec.c:5040)
==9695==    by 0x430E76: doshfunc (exec.c:4920)
==9695==    by 0x4302FB: execshfunc (exec.c:4557)
==9695==    by 0x42D8C1: execcmd (exec.c:3373)
==9695== 
==9695== 
==9695== 2 errors in context 2 of 2:
==9695== Conditional jump or move depends on uninitialised value(s)
==9695==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9695==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9695==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9695==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9695==    by 0x42D8E9: execcmd (exec.c:3378)
==9695==    by 0x428CA0: execpline2 (exec.c:1697)
==9695==    by 0x427FD2: execpline (exec.c:1484)
==9695==    by 0x42779A: execlist (exec.c:1275)
==9695==    by 0x42717C: execode (exec.c:1073)
==9695==    by 0x431299: runshfunc (exec.c:5040)
==9695==    by 0x430E76: doshfunc (exec.c:4920)
==9695==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9695== 
==9695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9694-- Caught __NR_exit; running __libc_freeres()
==9694== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9694-by-pythonnut-on-???
==9694== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9694-by-pythonnut-on-???
==9694== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9694-by-pythonnut-on-???
==9694== 
==9694== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9694== don't want to do, unless you know exactly what you're doing,
==9694== or are doing some strange experiment):
==9694==   /usr/lib/valgrind/../../bin/vgdb --pid=9694 ...command...
==9694== 
==9694== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9694==   /path/to/gdb ./zsh
==9694== and then give GDB the following command
==9694==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9694
==9694== --pid is optional if only one valgrind process is running
==9694== 
--9694-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9694== 
==9694== HEAP SUMMARY:
==9694==     in use at exit: 3,172,712 bytes in 69,647 blocks
==9694==   total heap usage: 1,468,661 allocs, 1,399,014 frees, 119,681,946 bytes allocated
==9694== 
==9694== Searching for pointers to 69,647 not-freed blocks
--9694--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9694--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9694--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9694--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9694--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9694--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9694--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9694--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9694--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9694--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9694--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9694--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9694--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9694--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9694--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9694--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9694--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9694--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9694--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9694--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9694--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9694--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9694--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9694--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9694--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9694--   Scanning root segment: 0x701a000..0x701afff (4096)
--9694--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9694--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9694--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9694--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9694--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9694--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9694--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9694--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9694--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--7806-- Reading syms from /home/pythonnut/Downloads/cauldron/zsh/lib/zsh/5.0.7/zsh/regex.so
--7806--    svma 0x0000000d70, avma 0x000bc84d70
==9694== Checked 4,894,240 bytes
==9694== 
==9694== LEAK SUMMARY:
==9694==    definitely lost: 2,181 bytes in 11 blocks
==9694==    indirectly lost: 6,756 bytes in 7 blocks
==9694==      possibly lost: 0 bytes in 0 blocks
==9694==    still reachable: 3,163,775 bytes in 69,629 blocks
==9694==         suppressed: 0 bytes in 0 blocks
==9694== Rerun with --leak-check=full to see details of leaked memory
==9694== 
==9694== Use --track-origins=yes to see where uninitialised values come from
==9694== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9694== 
==9694== 1 errors in context 1 of 2:
==9694== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9694==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9694==    by 0x488CD0: stringsubst (subst.c:301)
==9694==    by 0x48801B: prefork (subst.c:77)
==9694==    by 0x42B318: execcmd (exec.c:2619)
==9694==    by 0x428CA0: execpline2 (exec.c:1697)
==9694==    by 0x427FD2: execpline (exec.c:1484)
==9694==    by 0x427756: execlist (exec.c:1267)
==9694==    by 0x42717C: execode (exec.c:1073)
==9694==    by 0x431299: runshfunc (exec.c:5040)
==9694==    by 0x430E76: doshfunc (exec.c:4920)
==9694==    by 0x4302FB: execshfunc (exec.c:4557)
==9694==    by 0x42D8C1: execcmd (exec.c:3373)
==9694== 
==9694== 
==9694== 2 errors in context 2 of 2:
==9694== Conditional jump or move depends on uninitialised value(s)
==9694==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9694==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9694==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9694==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9694==    by 0x42D8E9: execcmd (exec.c:3378)
==9694==    by 0x428CA0: execpline2 (exec.c:1697)
==9694==    by 0x427FD2: execpline (exec.c:1484)
==9694==    by 0x42779A: execlist (exec.c:1275)
==9694==    by 0x42717C: execode (exec.c:1073)
==9694==    by 0x431299: runshfunc (exec.c:5040)
==9694==    by 0x430E76: doshfunc (exec.c:4920)
==9694==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9694== 
==9694== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9697-by-pythonnut-on-???
==9697== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9697-by-pythonnut-on-???
==9697== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9697-by-pythonnut-on-???
==9697== 
==9697== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9697== don't want to do, unless you know exactly what you're doing,
==9697== or are doing some strange experiment):
==9697==   /usr/lib/valgrind/../../bin/vgdb --pid=9697 ...command...
==9697== 
==9697== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9697==   /path/to/gdb ./zsh
==9697== and then give GDB the following command
==9697==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9697
==9697== --pid is optional if only one valgrind process is running
==9697== 
--9698-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE77CC,  len 4
==9698== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9698-by-pythonnut-on-???
==9698== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9698-by-pythonnut-on-???
==9698== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9698-by-pythonnut-on-???
==9698== 
==9698== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9698== don't want to do, unless you know exactly what you're doing,
==9698== or are doing some strange experiment):
==9698==   /usr/lib/valgrind/../../bin/vgdb --pid=9698 ...command...
==9698== 
==9698== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9698==   /path/to/gdb ./zsh
==9698== and then give GDB the following command
==9698==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9698
==9698== --pid is optional if only one valgrind process is running
==9698== 
--9698-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9698== 
==9698== HEAP SUMMARY:
==9698==     in use at exit: 3,172,873 bytes in 69,653 blocks
==9698==   total heap usage: 1,468,666 allocs, 1,399,013 frees, 119,683,611 bytes allocated
==9698== 
==9698== Searching for pointers to 69,653 not-freed blocks
--9698--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9698--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9698--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9698--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9698--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9698--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9698--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9698--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9698--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9698--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9698--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9698--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9698--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9698--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9698--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9698--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9698--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9698--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9698--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9698--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9698--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9698--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9698--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9698--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9698--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9698--   Scanning root segment: 0x701a000..0x701afff (4096)
--9698--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9698--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9698--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9698--   Scanning root segment: 0xb054000..0xb054fff (4096)
==9700== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9700-by-pythonnut-on-???
==9700== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9700-by-pythonnut-on-???
==9700== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9700-by-pythonnut-on-???
==9700== 
==9700== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9700== don't want to do, unless you know exactly what you're doing,
==9700== or are doing some strange experiment):
==9700==   /usr/lib/valgrind/../../bin/vgdb --pid=9700 ...command...
==9700== 
==9700== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9700==   /path/to/gdb ./zsh
==9700== and then give GDB the following command
==9700==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9700
==9700== --pid is optional if only one valgrind process is running
--9698--   Scanning root segment: 0xb268000..0xb268fff (4096)
==9700== 
--9698--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9698--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9698--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9698--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9700-- Caught __NR_exit; running __libc_freeres()
--9700-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9700== 
==9700== HEAP SUMMARY:
==9700==     in use at exit: 3,140,020 bytes in 69,570 blocks
==9700==   total heap usage: 1,465,843 allocs, 1,396,273 frees, 117,901,385 bytes allocated
==9700== 
==9700== Searching for pointers to 69,570 not-freed blocks
--9700--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9700--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9700--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9700--   Scanning root segment: 0x4037000..0x403afff (16384)
--9700--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9700--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9700--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9700--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9700--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9700--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9700--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9700--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9700--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9700--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9700--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9700--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9700--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9700--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9700--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9700--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9700--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9700--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9700--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9700--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9700--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9700--   Scanning root segment: 0x701a000..0x701afff (4096)
--9700--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9700--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9700--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9700--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9700--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9700--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9700--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9700--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9700--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9700--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9698== Checked 4,895,528 bytes
==9698== 
==9698== LEAK SUMMARY:
==9698==    definitely lost: 2,181 bytes in 11 blocks
==9698==    indirectly lost: 6,756 bytes in 7 blocks
==9698==      possibly lost: 0 bytes in 0 blocks
==9698==    still reachable: 3,163,936 bytes in 69,635 blocks
==9698==         suppressed: 0 bytes in 0 blocks
==9698== Rerun with --leak-check=full to see details of leaked memory
==9698== 
==9698== Use --track-origins=yes to see where uninitialised values come from
==9698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9698== 
==9698== 1 errors in context 1 of 2:
==9698== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9698==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9698==    by 0x488CD0: stringsubst (subst.c:301)
==9698==    by 0x48801B: prefork (subst.c:77)
==9698==    by 0x42B318: execcmd (exec.c:2619)
==9698==    by 0x428CA0: execpline2 (exec.c:1697)
==9698==    by 0x427FD2: execpline (exec.c:1484)
==9698==    by 0x427756: execlist (exec.c:1267)
==9698==    by 0x42717C: execode (exec.c:1073)
==9698==    by 0x431299: runshfunc (exec.c:5040)
==9698==    by 0x430E76: doshfunc (exec.c:4920)
==9698==    by 0x4302FB: execshfunc (exec.c:4557)
==9698==    by 0x42D8C1: execcmd (exec.c:3373)
==9698== 
==9698== 
==9698== 2 errors in context 2 of 2:
==9698== Conditional jump or move depends on uninitialised value(s)
==9698==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9698==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9698==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9698==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9698==    by 0x42D8E9: execcmd (exec.c:3378)
==9698==    by 0x428CA0: execpline2 (exec.c:1697)
==9698==    by 0x427FD2: execpline (exec.c:1484)
==9698==    by 0x42779A: execlist (exec.c:1275)
==9698==    by 0x42717C: execode (exec.c:1073)
==9698==    by 0x431299: runshfunc (exec.c:5040)
==9698==    by 0x430E76: doshfunc (exec.c:4920)
==9698==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9698== 
==9698== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9697-- Caught __NR_exit; running __libc_freeres()
--9697-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9700== Checked 4,832,216 bytes
==9700== 
==9697== 
==9697== HEAP SUMMARY:
==9697==     in use at exit: 3,172,809 bytes in 69,650 blocks
==9697==   total heap usage: 1,468,668 allocs, 1,399,018 frees, 119,684,155 bytes allocated
==9697== 
==9700== LEAK SUMMARY:
==9700==    definitely lost: 2,181 bytes in 11 blocks
==9700==    indirectly lost: 6,756 bytes in 7 blocks
==9700==      possibly lost: 0 bytes in 0 blocks
==9700==    still reachable: 3,131,083 bytes in 69,552 blocks
==9700==         suppressed: 0 bytes in 0 blocks
==9700== Rerun with --leak-check=full to see details of leaked memory
==9700== 
==9700== Use --track-origins=yes to see where uninitialised values come from
==9700== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9700== 
==9700== 1 errors in context 1 of 2:
==9700== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9700==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9700==    by 0x488CD0: stringsubst (subst.c:301)
==9700==    by 0x48801B: prefork (subst.c:77)
==9700==    by 0x42B318: execcmd (exec.c:2619)
==9700==    by 0x428CA0: execpline2 (exec.c:1697)
==9700==    by 0x427FD2: execpline (exec.c:1484)
==9700==    by 0x427756: execlist (exec.c:1267)
==9700==    by 0x42717C: execode (exec.c:1073)
==9700==    by 0x431299: runshfunc (exec.c:5040)
==9700==    by 0x430E76: doshfunc (exec.c:4920)
==9700==    by 0x4302FB: execshfunc (exec.c:4557)
==9700==    by 0x42D8C1: execcmd (exec.c:3373)
==9700== 
==9700== 
==9700== 2 errors in context 2 of 2:
==9700== Conditional jump or move depends on uninitialised value(s)
==9700==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9700==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9700==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9700==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9700==    by 0x42D8E9: execcmd (exec.c:3378)
==9700==    by 0x428CA0: execpline2 (exec.c:1697)
==9700==    by 0x427FD2: execpline (exec.c:1484)
==9700==    by 0x42779A: execlist (exec.c:1275)
==9700==    by 0x42717C: execode (exec.c:1073)
==9700==    by 0x431299: runshfunc (exec.c:5040)
==9700==    by 0x430E76: doshfunc (exec.c:4920)
==9700==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9700== 
==9700== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== Searching for pointers to 69,650 not-freed blocks
--9697--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9697--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9697--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9697--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9697--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9697--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9697--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9697--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9697--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9697--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9697--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9697--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9697--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9697--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9697--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9697--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9697--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9697--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9697--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9697--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9697--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9697--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9697--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9697--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9697--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9697--   Scanning root segment: 0x701a000..0x701afff (4096)
--9697--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9697--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9697--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9697--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9697--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9697--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9697--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9697--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9697--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9697== Checked 4,894,848 bytes
==9697== 
==9697== LEAK SUMMARY:
==9697==    definitely lost: 2,181 bytes in 11 blocks
==9697==    indirectly lost: 6,756 bytes in 7 blocks
==9697==      possibly lost: 0 bytes in 0 blocks
==9697==    still reachable: 3,163,872 bytes in 69,632 blocks
==9697==         suppressed: 0 bytes in 0 blocks
==9697== Rerun with --leak-check=full to see details of leaked memory
==9697== 
==9697== Use --track-origins=yes to see where uninitialised values come from
==9697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9697== 
==9697== 1 errors in context 1 of 2:
==9697== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9697==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9697==    by 0x488CD0: stringsubst (subst.c:301)
==9697==    by 0x48801B: prefork (subst.c:77)
==9697==    by 0x42B318: execcmd (exec.c:2619)
==9697==    by 0x428CA0: execpline2 (exec.c:1697)
==9697==    by 0x427FD2: execpline (exec.c:1484)
==9697==    by 0x427756: execlist (exec.c:1267)
==9697==    by 0x42717C: execode (exec.c:1073)
==9697==    by 0x431299: runshfunc (exec.c:5040)
==9697==    by 0x430E76: doshfunc (exec.c:4920)
==9697==    by 0x4302FB: execshfunc (exec.c:4557)
==9697==    by 0x42D8C1: execcmd (exec.c:3373)
==9697== 
==9697== 
==9697== 2 errors in context 2 of 2:
==9697== Conditional jump or move depends on uninitialised value(s)
==9697==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9697==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9697==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9697==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9697==    by 0x42D8E9: execcmd (exec.c:3378)
==9697==    by 0x428CA0: execpline2 (exec.c:1697)
==9697==    by 0x427FD2: execpline (exec.c:1484)
==9697==    by 0x42779A: execlist (exec.c:1275)
==9697==    by 0x42717C: execode (exec.c:1073)
==9697==    by 0x431299: runshfunc (exec.c:5040)
==9697==    by 0x430E76: doshfunc (exec.c:4920)
==9697==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9697== 
==9697== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF757C,  len 4
client request: code 4d430005,  addr 0xFFEFF642C,  len 4
client request: code 4d430005,  addr 0xFFEFF933C,  len 4
--9657-- Caught __NR_exit; running __libc_freeres()
--9657-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9657== 
==9657== HEAP SUMMARY:
==9657==     in use at exit: 3,151,130 bytes in 69,168 blocks
==9657==   total heap usage: 1,468,759 allocs, 1,399,591 frees, 119,700,926 bytes allocated
==9657== 
==9657== Searching for pointers to 69,168 not-freed blocks
--9657--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9657--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9657--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9657--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9657--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9657--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9657--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9657--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9657--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9657--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9657--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9657--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9657--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9657--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9657--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9657--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9657--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9657--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9657--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9657--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9657--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9657--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9657--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9657--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9657--   Scanning root segment: 0x701a000..0x701afff (4096)
--9657--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9657--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9657--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9657--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9657--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9657--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9657--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9657--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9657--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9657== Checked 4,796,992 bytes
==9657== 
==9657== LEAK SUMMARY:
==9657==    definitely lost: 2,181 bytes in 11 blocks
==9657==    indirectly lost: 6,756 bytes in 7 blocks
==9657==      possibly lost: 0 bytes in 0 blocks
==9657==    still reachable: 3,142,193 bytes in 69,150 blocks
==9657==         suppressed: 0 bytes in 0 blocks
==9657== Rerun with --leak-check=full to see details of leaked memory
==9657== 
==9657== Use --track-origins=yes to see where uninitialised values come from
==9657== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9657== 
==9657== 1 errors in context 1 of 2:
==9657== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9657==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9657==    by 0x488CD0: stringsubst (subst.c:301)
==9657==    by 0x48801B: prefork (subst.c:77)
==9657==    by 0x42B318: execcmd (exec.c:2619)
==9657==    by 0x428CA0: execpline2 (exec.c:1697)
==9657==    by 0x427FD2: execpline (exec.c:1484)
==9657==    by 0x427756: execlist (exec.c:1267)
==9657==    by 0x42717C: execode (exec.c:1073)
==9657==    by 0x431299: runshfunc (exec.c:5040)
==9657==    by 0x430E76: doshfunc (exec.c:4920)
==9657==    by 0x4302FB: execshfunc (exec.c:4557)
==9657==    by 0x42D8C1: execcmd (exec.c:3373)
==9657== 
==9657== 
==9657== 2 errors in context 2 of 2:
==9657== Conditional jump or move depends on uninitialised value(s)
==9657==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9657==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9657==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9657==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9657==    by 0x42D8E9: execcmd (exec.c:3378)
==9657==    by 0x428CA0: execpline2 (exec.c:1697)
==9657==    by 0x427FD2: execpline (exec.c:1484)
==9657==    by 0x42779A: execlist (exec.c:1275)
==9657==    by 0x42717C: execode (exec.c:1073)
==9657==    by 0x431299: runshfunc (exec.c:5040)
==9657==    by 0x430E76: doshfunc (exec.c:4920)
==9657==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9657== 
==9657== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9653-- Caught __NR_exit; running __libc_freeres()
--9653-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9653== 
==9653== HEAP SUMMARY:
==9653==     in use at exit: 3,121,105 bytes in 68,939 blocks
==9653==   total heap usage: 1,463,641 allocs, 1,394,702 frees, 117,967,639 bytes allocated
==9653== 
==9653== Searching for pointers to 68,939 not-freed blocks
--9653--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9653--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9653--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9653--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9653--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9653--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9653--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9653--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9653--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9653--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9653--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9653--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9653--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9653--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9653--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9653--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9653--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9653--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9653--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9653--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9653--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9653--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9653--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9653--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9653--   Scanning root segment: 0x701a000..0x701afff (4096)
--9653--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9653--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9653--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9653--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9653--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9653--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9653--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9653--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9653--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9653== Checked 4,765,856 bytes
==9653== 
==9653== LEAK SUMMARY:
==9653==    definitely lost: 2,181 bytes in 11 blocks
==9653==    indirectly lost: 6,756 bytes in 7 blocks
==9653==      possibly lost: 0 bytes in 0 blocks
==9653==    still reachable: 3,112,168 bytes in 68,921 blocks
==9653==         suppressed: 0 bytes in 0 blocks
==9653== Rerun with --leak-check=full to see details of leaked memory
==9653== 
==9653== Use --track-origins=yes to see where uninitialised values come from
==9653== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9653== 
==9653== 1 errors in context 1 of 2:
==9653== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9653==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9653==    by 0x488CD0: stringsubst (subst.c:301)
==9653==    by 0x48801B: prefork (subst.c:77)
==9653==    by 0x42B318: execcmd (exec.c:2619)
==9653==    by 0x428CA0: execpline2 (exec.c:1697)
==9653==    by 0x427FD2: execpline (exec.c:1484)
==9653==    by 0x427756: execlist (exec.c:1267)
==9653==    by 0x42717C: execode (exec.c:1073)
==9653==    by 0x431299: runshfunc (exec.c:5040)
==9653==    by 0x430E76: doshfunc (exec.c:4920)
==9653==    by 0x4302FB: execshfunc (exec.c:4557)
==9653==    by 0x42D8C1: execcmd (exec.c:3373)
==9653== 
==9653== 
==9653== 2 errors in context 2 of 2:
==9653== Conditional jump or move depends on uninitialised value(s)
==9653==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9653==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9653==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9653==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9653==    by 0x42D8E9: execcmd (exec.c:3378)
==9653==    by 0x428CA0: execpline2 (exec.c:1697)
==9653==    by 0x427FD2: execpline (exec.c:1484)
==9653==    by 0x42779A: execlist (exec.c:1275)
==9653==    by 0x42717C: execode (exec.c:1073)
==9653==    by 0x431299: runshfunc (exec.c:5040)
==9653==    by 0x430E76: doshfunc (exec.c:4920)
==9653==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9653== 
==9653== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9704-- Caught __NR_exit; running __libc_freeres()
==9704== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9704-by-pythonnut-on-???
==9704== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9704-by-pythonnut-on-???
==9704== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9704-by-pythonnut-on-???
==9704== 
==9704== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9704== don't want to do, unless you know exactly what you're doing,
==9704== or are doing some strange experiment):
==9704==   /usr/lib/valgrind/../../bin/vgdb --pid=9704 ...command...
==9704== 
==9704== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9704==   /path/to/gdb ./zsh
==9704== and then give GDB the following command
==9704==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9704
==9704== --pid is optional if only one valgrind process is running
==9704== 
==9705== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9705-by-pythonnut-on-???
==9705== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9705-by-pythonnut-on-???
==9705== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9705-by-pythonnut-on-???
==9705== 
==9705== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9705== don't want to do, unless you know exactly what you're doing,
==9705== or are doing some strange experiment):
==9705==   /usr/lib/valgrind/../../bin/vgdb --pid=9705 ...command...
==9705== 
==9705== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9705==   /path/to/gdb ./zsh
==9705== and then give GDB the following command
==9705==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9705
==9705== --pid is optional if only one valgrind process is running
==9705== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9704-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9704== 
==9704== HEAP SUMMARY:
==9704==     in use at exit: 3,122,749 bytes in 68,991 blocks
==9704==   total heap usage: 1,463,700 allocs, 1,394,709 frees, 117,972,407 bytes allocated
==9704== 
==9704== Searching for pointers to 68,991 not-freed blocks
--9704--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9704--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9704--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9704--   Scanning root segment: 0x4037000..0x403afff (16384)
--9704--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9704--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9704--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9704--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9704--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9704--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9704--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9704--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9704--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9704--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9704--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9704--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9704--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9704--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9704--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9704--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9704--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9704--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9704--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9704--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9704--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9704--   Scanning root segment: 0x701a000..0x701afff (4096)
--9704--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9704--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9704--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9704--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9704--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9704--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9704--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9704--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9704--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9704== Checked 4,784,424 bytes
==9704== 
==9704== LEAK SUMMARY:
==9704==    definitely lost: 2,181 bytes in 11 blocks
==9704==    indirectly lost: 6,756 bytes in 7 blocks
==9704==      possibly lost: 0 bytes in 0 blocks
==9704==    still reachable: 3,113,812 bytes in 68,973 blocks
==9704==         suppressed: 0 bytes in 0 blocks
==9704== Rerun with --leak-check=full to see details of leaked memory
==9704== 
==9704== Use --track-origins=yes to see where uninitialised values come from
==9704== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9704== 
==9704== 1 errors in context 1 of 2:
==9704== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9704==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9704==    by 0x488CD0: stringsubst (subst.c:301)
==9704==    by 0x48801B: prefork (subst.c:77)
==9704==    by 0x42B318: execcmd (exec.c:2619)
==9704==    by 0x428CA0: execpline2 (exec.c:1697)
==9704==    by 0x427FD2: execpline (exec.c:1484)
==9704==    by 0x427756: execlist (exec.c:1267)
==9704==    by 0x42717C: execode (exec.c:1073)
==9704==    by 0x431299: runshfunc (exec.c:5040)
==9704==    by 0x430E76: doshfunc (exec.c:4920)
==9704==    by 0x4302FB: execshfunc (exec.c:4557)
==9704==    by 0x42D8C1: execcmd (exec.c:3373)
==9704== 
==9704== 
==9704== 2 errors in context 2 of 2:
==9704== Conditional jump or move depends on uninitialised value(s)
==9704==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9704==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9704==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9704==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9704==    by 0x42D8E9: execcmd (exec.c:3378)
==9704==    by 0x428CA0: execpline2 (exec.c:1697)
==9704==    by 0x427FD2: execpline (exec.c:1484)
==9704==    by 0x42779A: execlist (exec.c:1275)
==9704==    by 0x42717C: execode (exec.c:1073)
==9704==    by 0x431299: runshfunc (exec.c:5040)
==9704==    by 0x430E76: doshfunc (exec.c:4920)
==9704==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9704== 
==9704== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9703== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9703-by-pythonnut-on-???
==9703== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9703-by-pythonnut-on-???
==9703== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9703-by-pythonnut-on-???
==9703== 
==9703== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9703== don't want to do, unless you know exactly what you're doing,
==9703== or are doing some strange experiment):
==9703==   /usr/lib/valgrind/../../bin/vgdb --pid=9703 ...command...
==9703== 
==9703== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9703==   /path/to/gdb ./zsh
==9703== and then give GDB the following command
==9703==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9703
==9703== --pid is optional if only one valgrind process is running
==9703== 
--9703-- Caught __NR_exit; running __libc_freeres()
--9703-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9703== 
==9703== HEAP SUMMARY:
==9703==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9703==   total heap usage: 1,463,702 allocs, 1,394,714 frees, 117,972,951 bytes allocated
==9703== 
==9703== Searching for pointers to 68,988 not-freed blocks
--9703--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9703--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9703--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9703--   Scanning root segment: 0x4037000..0x403afff (16384)
--9703--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9703--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9703--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9703--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9703--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9703--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9703--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9703--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9703--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9703--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9703--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9703--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9703--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9703--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9703--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9703--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9703--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9703--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9703--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9703--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9703--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9703--   Scanning root segment: 0x701a000..0x701afff (4096)
--9703--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9703--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9703--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9703--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9703--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9703--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9703--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9703--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9703--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9703== Checked 4,783,736 bytes
==9703== 
==9703== LEAK SUMMARY:
==9703==    definitely lost: 2,181 bytes in 11 blocks
==9703==    indirectly lost: 6,756 bytes in 7 blocks
==9703==      possibly lost: 0 bytes in 0 blocks
==9703==    still reachable: 3,113,748 bytes in 68,970 blocks
==9703==         suppressed: 0 bytes in 0 blocks
==9703== Rerun with --leak-check=full to see details of leaked memory
==9703== 
==9703== Use --track-origins=yes to see where uninitialised values come from
==9703== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9703== 
==9703== 1 errors in context 1 of 2:
==9703== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9703==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9703==    by 0x488CD0: stringsubst (subst.c:301)
==9703==    by 0x48801B: prefork (subst.c:77)
==9703==    by 0x42B318: execcmd (exec.c:2619)
==9703==    by 0x428CA0: execpline2 (exec.c:1697)
==9703==    by 0x427FD2: execpline (exec.c:1484)
==9703==    by 0x427756: execlist (exec.c:1267)
==9703==    by 0x42717C: execode (exec.c:1073)
==9703==    by 0x431299: runshfunc (exec.c:5040)
==9703==    by 0x430E76: doshfunc (exec.c:4920)
==9703==    by 0x4302FB: execshfunc (exec.c:4557)
==9703==    by 0x42D8C1: execcmd (exec.c:3373)
==9703== 
==9703== 
==9703== 2 errors in context 2 of 2:
==9703== Conditional jump or move depends on uninitialised value(s)
==9703==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9703==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9703==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9703==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9703==    by 0x42D8E9: execcmd (exec.c:3378)
==9703==    by 0x428CA0: execpline2 (exec.c:1697)
==9703==    by 0x427FD2: execpline (exec.c:1484)
==9703==    by 0x42779A: execlist (exec.c:1275)
==9703==    by 0x42717C: execode (exec.c:1073)
==9703==    by 0x431299: runshfunc (exec.c:5040)
==9703==    by 0x430E76: doshfunc (exec.c:4920)
==9703==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9703== 
==9703== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9706== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9706-by-pythonnut-on-???
==9706== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9706-by-pythonnut-on-???
==9706== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9706-by-pythonnut-on-???
==9706== 
==9706== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9706== don't want to do, unless you know exactly what you're doing,
==9706== or are doing some strange experiment):
==9706==   /usr/lib/valgrind/../../bin/vgdb --pid=9706 ...command...
==9706== 
==9706== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9706==   /path/to/gdb ./zsh
==9706== and then give GDB the following command
==9706==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9706
==9706== --pid is optional if only one valgrind process is running
==9706== 
--9706-- Caught __NR_exit; running __libc_freeres()
--9706-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9706== 
==9706== HEAP SUMMARY:
==9706==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9706==   total heap usage: 1,463,717 allocs, 1,394,729 frees, 117,977,935 bytes allocated
==9706== 
==9706== Searching for pointers to 68,988 not-freed blocks
--9706--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9706--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9706--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9706--   Scanning root segment: 0x4037000..0x403afff (16384)
--9706--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9706--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9706--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9706--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9706--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9706--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9706--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9706--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9706--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9706--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9706--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9706--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9706--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9706--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9706--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9706--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9706--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9706--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9706--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9706--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9706--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9706--   Scanning root segment: 0x701a000..0x701afff (4096)
--9706--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9706--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9706--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9706--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9706--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9706--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9706--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9706--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9706--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9706== Checked 4,783,736 bytes
==9706== 
==9706== LEAK SUMMARY:
==9706==    definitely lost: 2,181 bytes in 11 blocks
==9706==    indirectly lost: 6,756 bytes in 7 blocks
==9706==      possibly lost: 0 bytes in 0 blocks
==9706==    still reachable: 3,113,748 bytes in 68,970 blocks
==9706==         suppressed: 0 bytes in 0 blocks
==9706== Rerun with --leak-check=full to see details of leaked memory
==9706== 
==9706== Use --track-origins=yes to see where uninitialised values come from
==9706== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9706== 
==9706== 1 errors in context 1 of 2:
==9706== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9706==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9706==    by 0x488CD0: stringsubst (subst.c:301)
==9706==    by 0x48801B: prefork (subst.c:77)
==9706==    by 0x42B318: execcmd (exec.c:2619)
==9706==    by 0x428CA0: execpline2 (exec.c:1697)
==9706==    by 0x427FD2: execpline (exec.c:1484)
==9706==    by 0x427756: execlist (exec.c:1267)
==9706==    by 0x42717C: execode (exec.c:1073)
==9706==    by 0x431299: runshfunc (exec.c:5040)
==9706==    by 0x430E76: doshfunc (exec.c:4920)
==9706==    by 0x4302FB: execshfunc (exec.c:4557)
==9706==    by 0x42D8C1: execcmd (exec.c:3373)
==9706== 
==9706== 
==9706== 2 errors in context 2 of 2:
==9706== Conditional jump or move depends on uninitialised value(s)
==9706==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9706==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9706==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9706==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9706==    by 0x42D8E9: execcmd (exec.c:3378)
==9706==    by 0x428CA0: execpline2 (exec.c:1697)
==9706==    by 0x427FD2: execpline (exec.c:1484)
==9706==    by 0x42779A: execlist (exec.c:1275)
==9706==    by 0x42717C: execode (exec.c:1073)
==9706==    by 0x431299: runshfunc (exec.c:5040)
==9706==    by 0x430E76: doshfunc (exec.c:4920)
==9706==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9706== 
==9706== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9707== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9707-by-pythonnut-on-???
==9707== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9707-by-pythonnut-on-???
==9707== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9707-by-pythonnut-on-???
==9707== 
==9707== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9707== don't want to do, unless you know exactly what you're doing,
==9707== or are doing some strange experiment):
==9707==   /usr/lib/valgrind/../../bin/vgdb --pid=9707 ...command...
==9707== 
==9707== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9707==   /path/to/gdb ./zsh
==9707== and then give GDB the following command
==9707==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9707
==9707== --pid is optional if only one valgrind process is running
==9707== 
--9707-- Caught __NR_exit; running __libc_freeres()
--9707-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9707== 
==9707== HEAP SUMMARY:
==9707==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9707==   total heap usage: 1,463,722 allocs, 1,394,734 frees, 117,980,048 bytes allocated
==9707== 
==9707== Searching for pointers to 68,988 not-freed blocks
--9707--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9707--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9707--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9707--   Scanning root segment: 0x4037000..0x403afff (16384)
--9707--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9707--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9707--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9707--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9707--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9707--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9707--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9707--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9707--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9707--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9707--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9707--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9707--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9707--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9707--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9707--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9707--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9707--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9707--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9707--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9707--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9707--   Scanning root segment: 0x701a000..0x701afff (4096)
--9707--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9707--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9707--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9707--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9707--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9707--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9707--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9707--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9707--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9707== Checked 4,783,736 bytes
==9707== 
==9707== LEAK SUMMARY:
==9707==    definitely lost: 2,181 bytes in 11 blocks
==9707==    indirectly lost: 6,756 bytes in 7 blocks
==9707==      possibly lost: 0 bytes in 0 blocks
==9707==    still reachable: 3,113,748 bytes in 68,970 blocks
==9707==         suppressed: 0 bytes in 0 blocks
==9707== Rerun with --leak-check=full to see details of leaked memory
==9707== 
==9707== Use --track-origins=yes to see where uninitialised values come from
==9707== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9707== 
==9707== 1 errors in context 1 of 2:
==9707== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9707==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9707==    by 0x488CD0: stringsubst (subst.c:301)
==9707==    by 0x48801B: prefork (subst.c:77)
==9707==    by 0x42B318: execcmd (exec.c:2619)
==9707==    by 0x428CA0: execpline2 (exec.c:1697)
==9707==    by 0x427FD2: execpline (exec.c:1484)
==9707==    by 0x427756: execlist (exec.c:1267)
==9707==    by 0x42717C: execode (exec.c:1073)
==9707==    by 0x431299: runshfunc (exec.c:5040)
==9707==    by 0x430E76: doshfunc (exec.c:4920)
==9707==    by 0x4302FB: execshfunc (exec.c:4557)
==9707==    by 0x42D8C1: execcmd (exec.c:3373)
==9707== 
==9707== 
==9707== 2 errors in context 2 of 2:
==9707== Conditional jump or move depends on uninitialised value(s)
==9707==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9707==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9707==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9707==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9707==    by 0x42D8E9: execcmd (exec.c:3378)
==9707==    by 0x428CA0: execpline2 (exec.c:1697)
==9707==    by 0x427FD2: execpline (exec.c:1484)
==9707==    by 0x42779A: execlist (exec.c:1275)
==9707==    by 0x42717C: execode (exec.c:1073)
==9707==    by 0x431299: runshfunc (exec.c:5040)
==9707==    by 0x430E76: doshfunc (exec.c:4920)
==9707==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9707== 
==9707== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9708-- Caught __NR_exit; running __libc_freeres()
==9708== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9708-by-pythonnut-on-???
==9708== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9708-by-pythonnut-on-???
==9708== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9708-by-pythonnut-on-???
==9708== 
==9708== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9708== don't want to do, unless you know exactly what you're doing,
==9708== or are doing some strange experiment):
==9708==   /usr/lib/valgrind/../../bin/vgdb --pid=9708 ...command...
==9708== 
==9708== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9708==   /path/to/gdb ./zsh
==9708== and then give GDB the following command
==9708==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9708
==9708== --pid is optional if only one valgrind process is running
==9708== 
--9708-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9708== 
==9708== HEAP SUMMARY:
==9708==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9708==   total heap usage: 1,463,727 allocs, 1,394,739 frees, 117,982,161 bytes allocated
==9708== 
==9708== Searching for pointers to 68,988 not-freed blocks
--9708--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9708--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9708--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9708--   Scanning root segment: 0x4037000..0x403afff (16384)
--9708--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9708--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9708--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9708--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9708--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9708--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9708--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9708--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9708--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9708--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9708--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9708--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9708--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9708--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9708--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9708--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9708--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9708--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9708--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9708--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9708--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9708--   Scanning root segment: 0x701a000..0x701afff (4096)
--9708--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9708--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9708--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9708--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9708--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9708--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9708--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9708--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9708--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9708== Checked 4,783,736 bytes
==9708== 
==9708== LEAK SUMMARY:
==9708==    definitely lost: 2,181 bytes in 11 blocks
==9708==    indirectly lost: 6,756 bytes in 7 blocks
==9708==      possibly lost: 0 bytes in 0 blocks
==9708==    still reachable: 3,113,748 bytes in 68,970 blocks
==9708==         suppressed: 0 bytes in 0 blocks
==9708== Rerun with --leak-check=full to see details of leaked memory
==9708== 
==9708== Use --track-origins=yes to see where uninitialised values come from
==9708== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9708== 
==9708== 1 errors in context 1 of 2:
==9708== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9708==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9708==    by 0x488CD0: stringsubst (subst.c:301)
==9708==    by 0x48801B: prefork (subst.c:77)
==9708==    by 0x42B318: execcmd (exec.c:2619)
==9708==    by 0x428CA0: execpline2 (exec.c:1697)
==9708==    by 0x427FD2: execpline (exec.c:1484)
==9708==    by 0x427756: execlist (exec.c:1267)
==9708==    by 0x42717C: execode (exec.c:1073)
==9708==    by 0x431299: runshfunc (exec.c:5040)
==9708==    by 0x430E76: doshfunc (exec.c:4920)
==9708==    by 0x4302FB: execshfunc (exec.c:4557)
==9708==    by 0x42D8C1: execcmd (exec.c:3373)
==9708== 
==9708== 
==9708== 2 errors in context 2 of 2:
==9708== Conditional jump or move depends on uninitialised value(s)
==9708==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9708==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9708==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9708==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9708==    by 0x42D8E9: execcmd (exec.c:3378)
==9708==    by 0x428CA0: execpline2 (exec.c:1697)
==9708==    by 0x427FD2: execpline (exec.c:1484)
==9708==    by 0x42779A: execlist (exec.c:1275)
==9708==    by 0x42717C: execode (exec.c:1073)
==9708==    by 0x431299: runshfunc (exec.c:5040)
==9708==    by 0x430E76: doshfunc (exec.c:4920)
==9708==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9708== 
==9708== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9709== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9709-by-pythonnut-on-???
==9709== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9709-by-pythonnut-on-???
==9709== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9709-by-pythonnut-on-???
==9709== 
==9709== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9709== don't want to do, unless you know exactly what you're doing,
==9709== or are doing some strange experiment):
==9709==   /usr/lib/valgrind/../../bin/vgdb --pid=9709 ...command...
==9709== 
==9709== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9709==   /path/to/gdb ./zsh
==9709== and then give GDB the following command
==9709==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9709
==9709== --pid is optional if only one valgrind process is running
==9709== 
--9709-- Caught __NR_exit; running __libc_freeres()
--9709-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9709== 
==9709== HEAP SUMMARY:
==9709==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9709==   total heap usage: 1,463,732 allocs, 1,394,744 frees, 117,984,274 bytes allocated
==9709== 
==9709== Searching for pointers to 68,988 not-freed blocks
--9709--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9709--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9709--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9709--   Scanning root segment: 0x4037000..0x403afff (16384)
--9709--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9709--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9709--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9709--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9709--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9709--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9709--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9709--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9709--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9709--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9709--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9709--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9709--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9709--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9709--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9709--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9709--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9709--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9709--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9709--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9709--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9709--   Scanning root segment: 0x701a000..0x701afff (4096)
--9709--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9709--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9709--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9709--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9709--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9709--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9709--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9709--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9709--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9709== Checked 4,783,736 bytes
==9709== 
==9709== LEAK SUMMARY:
==9709==    definitely lost: 2,181 bytes in 11 blocks
==9709==    indirectly lost: 6,756 bytes in 7 blocks
==9709==      possibly lost: 0 bytes in 0 blocks
==9709==    still reachable: 3,113,748 bytes in 68,970 blocks
==9709==         suppressed: 0 bytes in 0 blocks
==9709== Rerun with --leak-check=full to see details of leaked memory
==9709== 
==9709== Use --track-origins=yes to see where uninitialised values come from
==9709== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9709== 
==9709== 1 errors in context 1 of 2:
==9709== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9709==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9709==    by 0x488CD0: stringsubst (subst.c:301)
==9709==    by 0x48801B: prefork (subst.c:77)
==9709==    by 0x42B318: execcmd (exec.c:2619)
==9709==    by 0x428CA0: execpline2 (exec.c:1697)
==9709==    by 0x427FD2: execpline (exec.c:1484)
==9709==    by 0x427756: execlist (exec.c:1267)
==9709==    by 0x42717C: execode (exec.c:1073)
==9709==    by 0x431299: runshfunc (exec.c:5040)
==9709==    by 0x430E76: doshfunc (exec.c:4920)
==9709==    by 0x4302FB: execshfunc (exec.c:4557)
==9709==    by 0x42D8C1: execcmd (exec.c:3373)
==9709== 
==9709== 
==9709== 2 errors in context 2 of 2:
==9709== Conditional jump or move depends on uninitialised value(s)
==9709==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9709==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9709==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9709==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9709==    by 0x42D8E9: execcmd (exec.c:3378)
==9709==    by 0x428CA0: execpline2 (exec.c:1697)
==9709==    by 0x427FD2: execpline (exec.c:1484)
==9709==    by 0x42779A: execlist (exec.c:1275)
==9709==    by 0x42717C: execode (exec.c:1073)
==9709==    by 0x431299: runshfunc (exec.c:5040)
==9709==    by 0x430E76: doshfunc (exec.c:4920)
==9709==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9709== 
==9709== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9712== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9712-by-pythonnut-on-???
==9712== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9712-by-pythonnut-on-???
==9712== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9712-by-pythonnut-on-???
==9712== 
==9712== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9712== don't want to do, unless you know exactly what you're doing,
==9712== or are doing some strange experiment):
==9712==   /usr/lib/valgrind/../../bin/vgdb --pid=9712 ...command...
==9712== 
==9712== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9712==   /path/to/gdb ./zsh
==9712== and then give GDB the following command
==9712==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9712
==9712== --pid is optional if only one valgrind process is running
==9712== 
--9712-- Caught __NR_exit; running __libc_freeres()
--9712-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9712== 
==9712== HEAP SUMMARY:
==9712==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9712==   total heap usage: 1,463,737 allocs, 1,394,749 frees, 117,986,387 bytes allocated
==9712== 
==9712== Searching for pointers to 68,988 not-freed blocks
--9712--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9712--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9712--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9712--   Scanning root segment: 0x4037000..0x403afff (16384)
--9712--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9712--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9712--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9712--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9712--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9712--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9712--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9712--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9712--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9712--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9712--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9712--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9712--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9712--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9712--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9712--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9712--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9712--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9712--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9712--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9712--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9712--   Scanning root segment: 0x701a000..0x701afff (4096)
--9712--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9712--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9712--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9712--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9712--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9712--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9712--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9712--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9712--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9712== Checked 4,783,736 bytes
==9712== 
==9712== LEAK SUMMARY:
==9712==    definitely lost: 2,181 bytes in 11 blocks
==9712==    indirectly lost: 6,756 bytes in 7 blocks
==9712==      possibly lost: 0 bytes in 0 blocks
==9712==    still reachable: 3,113,748 bytes in 68,970 blocks
==9712==         suppressed: 0 bytes in 0 blocks
==9712== Rerun with --leak-check=full to see details of leaked memory
==9712== 
==9712== Use --track-origins=yes to see where uninitialised values come from
==9712== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9712== 
==9712== 1 errors in context 1 of 2:
==9712== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9712==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9712==    by 0x488CD0: stringsubst (subst.c:301)
==9712==    by 0x48801B: prefork (subst.c:77)
==9712==    by 0x42B318: execcmd (exec.c:2619)
==9712==    by 0x428CA0: execpline2 (exec.c:1697)
==9712==    by 0x427FD2: execpline (exec.c:1484)
==9712==    by 0x427756: execlist (exec.c:1267)
==9712==    by 0x42717C: execode (exec.c:1073)
==9712==    by 0x431299: runshfunc (exec.c:5040)
==9712==    by 0x430E76: doshfunc (exec.c:4920)
==9712==    by 0x4302FB: execshfunc (exec.c:4557)
==9712==    by 0x42D8C1: execcmd (exec.c:3373)
==9712== 
==9712== 
==9712== 2 errors in context 2 of 2:
==9712== Conditional jump or move depends on uninitialised value(s)
==9712==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9712==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9712==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9712==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9712==    by 0x42D8E9: execcmd (exec.c:3378)
==9712==    by 0x428CA0: execpline2 (exec.c:1697)
==9712==    by 0x427FD2: execpline (exec.c:1484)
==9712==    by 0x42779A: execlist (exec.c:1275)
==9712==    by 0x42717C: execode (exec.c:1073)
==9712==    by 0x431299: runshfunc (exec.c:5040)
==9712==    by 0x430E76: doshfunc (exec.c:4920)
==9712==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9712== 
==9712== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9713== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9713-by-pythonnut-on-???
==9713== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9713-by-pythonnut-on-???
==9713== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9713-by-pythonnut-on-???
==9713== 
==9713== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9713== don't want to do, unless you know exactly what you're doing,
==9713== or are doing some strange experiment):
==9713==   /usr/lib/valgrind/../../bin/vgdb --pid=9713 ...command...
==9713== 
==9713== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9713==   /path/to/gdb ./zsh
==9713== and then give GDB the following command
==9713==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9713
==9713== --pid is optional if only one valgrind process is running
==9713== 
--9713-- Caught __NR_exit; running __libc_freeres()
--9713-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9713== 
==9713== HEAP SUMMARY:
==9713==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9713==   total heap usage: 1,463,742 allocs, 1,394,754 frees, 117,988,496 bytes allocated
==9713== 
==9713== Searching for pointers to 68,988 not-freed blocks
--9713--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9713--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9713--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9713--   Scanning root segment: 0x4037000..0x403afff (16384)
--9713--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9713--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9713--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9713--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9713--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9713--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9713--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9713--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9713--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9713--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9713--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9713--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9713--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9713--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9713--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9713--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9713--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9713--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9713--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9713--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9713--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9713--   Scanning root segment: 0x701a000..0x701afff (4096)
--9713--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9713--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9713--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9713--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9713--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9713--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9713--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9713--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9713--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9713== Checked 4,783,736 bytes
==9713== 
==9713== LEAK SUMMARY:
==9713==    definitely lost: 2,181 bytes in 11 blocks
==9713==    indirectly lost: 6,756 bytes in 7 blocks
==9713==      possibly lost: 0 bytes in 0 blocks
==9713==    still reachable: 3,113,748 bytes in 68,970 blocks
==9713==         suppressed: 0 bytes in 0 blocks
==9713== Rerun with --leak-check=full to see details of leaked memory
==9713== 
==9713== Use --track-origins=yes to see where uninitialised values come from
==9713== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9713== 
==9713== 1 errors in context 1 of 2:
==9713== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9713==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9713==    by 0x488CD0: stringsubst (subst.c:301)
==9713==    by 0x48801B: prefork (subst.c:77)
==9713==    by 0x42B318: execcmd (exec.c:2619)
==9713==    by 0x428CA0: execpline2 (exec.c:1697)
==9713==    by 0x427FD2: execpline (exec.c:1484)
==9713==    by 0x427756: execlist (exec.c:1267)
==9713==    by 0x42717C: execode (exec.c:1073)
==9713==    by 0x431299: runshfunc (exec.c:5040)
==9713==    by 0x430E76: doshfunc (exec.c:4920)
==9713==    by 0x4302FB: execshfunc (exec.c:4557)
==9713==    by 0x42D8C1: execcmd (exec.c:3373)
==9713== 
==9713== 
==9713== 2 errors in context 2 of 2:
==9713== Conditional jump or move depends on uninitialised value(s)
==9713==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9713==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9713==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9713==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9713==    by 0x42D8E9: execcmd (exec.c:3378)
==9713==    by 0x428CA0: execpline2 (exec.c:1697)
==9713==    by 0x427FD2: execpline (exec.c:1484)
==9713==    by 0x42779A: execlist (exec.c:1275)
==9713==    by 0x42717C: execode (exec.c:1073)
==9713==    by 0x431299: runshfunc (exec.c:5040)
==9713==    by 0x430E76: doshfunc (exec.c:4920)
==9713==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9713== 
==9713== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9714== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9714-by-pythonnut-on-???
==9714== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9714-by-pythonnut-on-???
==9714== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9714-by-pythonnut-on-???
==9714== 
==9714== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9714== don't want to do, unless you know exactly what you're doing,
==9714== or are doing some strange experiment):
==9714==   /usr/lib/valgrind/../../bin/vgdb --pid=9714 ...command...
==9714== 
==9714== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9714==   /path/to/gdb ./zsh
==9714== and then give GDB the following command
==9714==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9714
==9714== --pid is optional if only one valgrind process is running
==9714== 
--9714-- Caught __NR_exit; running __libc_freeres()
--9714-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9714== 
==9714== HEAP SUMMARY:
==9714==     in use at exit: 3,122,685 bytes in 68,988 blocks
==9714==   total heap usage: 1,463,747 allocs, 1,394,759 frees, 117,990,613 bytes allocated
==9714== 
==9714== Searching for pointers to 68,988 not-freed blocks
--9714--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9714--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9714--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9714--   Scanning root segment: 0x4037000..0x403afff (16384)
--9714--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9714--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9714--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9714--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9714--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9714--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9714--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9714--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9714--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9714--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9714--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9714--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9714--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9714--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9714--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9714--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9714--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9714--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9714--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9714--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9714--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9714--   Scanning root segment: 0x701a000..0x701afff (4096)
--9714--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9714--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9714--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9714--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9714--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9714--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9714--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9714--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9714--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9714== Checked 4,783,736 bytes
==9714== 
==9714== LEAK SUMMARY:
==9714==    definitely lost: 2,181 bytes in 11 blocks
==9714==    indirectly lost: 6,756 bytes in 7 blocks
==9714==      possibly lost: 0 bytes in 0 blocks
==9714==    still reachable: 3,113,748 bytes in 68,970 blocks
==9714==         suppressed: 0 bytes in 0 blocks
==9714== Rerun with --leak-check=full to see details of leaked memory
==9714== 
==9714== Use --track-origins=yes to see where uninitialised values come from
==9714== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9714== 
==9714== 1 errors in context 1 of 2:
==9714== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9714==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9714==    by 0x488CD0: stringsubst (subst.c:301)
==9714==    by 0x48801B: prefork (subst.c:77)
==9714==    by 0x42B318: execcmd (exec.c:2619)
==9714==    by 0x428CA0: execpline2 (exec.c:1697)
==9714==    by 0x427FD2: execpline (exec.c:1484)
==9714==    by 0x427756: execlist (exec.c:1267)
==9714==    by 0x42717C: execode (exec.c:1073)
==9714==    by 0x431299: runshfunc (exec.c:5040)
==9714==    by 0x430E76: doshfunc (exec.c:4920)
==9714==    by 0x4302FB: execshfunc (exec.c:4557)
==9714==    by 0x42D8C1: execcmd (exec.c:3373)
==9714== 
==9714== 
==9714== 2 errors in context 2 of 2:
==9714== Conditional jump or move depends on uninitialised value(s)
==9714==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9714==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9714==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9714==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9714==    by 0x42D8E9: execcmd (exec.c:3378)
==9714==    by 0x428CA0: execpline2 (exec.c:1697)
==9714==    by 0x427FD2: execpline (exec.c:1484)
==9714==    by 0x42779A: execlist (exec.c:1275)
==9714==    by 0x42717C: execode (exec.c:1073)
==9714==    by 0x431299: runshfunc (exec.c:5040)
==9714==    by 0x430E76: doshfunc (exec.c:4920)
==9714==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9714== 
==9714== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9716-- Caught __NR_exit; running __libc_freeres()
==9717== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9717-by-pythonnut-on-???
==9717== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9717-by-pythonnut-on-???
==9717== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9717-by-pythonnut-on-???
==9717== 
==9717== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9717== don't want to do, unless you know exactly what you're doing,
==9717== or are doing some strange experiment):
==9717==   /usr/lib/valgrind/../../bin/vgdb --pid=9717 ...command...
==9717== 
==9717== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9717==   /path/to/gdb ./zsh
==9717== and then give GDB the following command
==9717==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9717
==9717== --pid is optional if only one valgrind process is running
==9717== 
==9716== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9716-by-pythonnut-on-???
==9716== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9716-by-pythonnut-on-???
==9716== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9716-by-pythonnut-on-???
==9716== 
==9716== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9716== don't want to do, unless you know exactly what you're doing,
==9716== or are doing some strange experiment):
==9716==   /usr/lib/valgrind/../../bin/vgdb --pid=9716 ...command...
==9716== 
==9716== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9716==   /path/to/gdb ./zsh
==9716== and then give GDB the following command
==9716==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9716
==9716== --pid is optional if only one valgrind process is running
==9716== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--9716-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9716== 
==9716== HEAP SUMMARY:
==9716==     in use at exit: 3,122,841 bytes in 68,993 blocks
==9716==   total heap usage: 1,463,751 allocs, 1,394,758 frees, 117,994,035 bytes allocated
==9716== 
==9716== Searching for pointers to 68,993 not-freed blocks
--9716--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9716--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9716--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9716--   Scanning root segment: 0x4037000..0x403afff (16384)
--9716--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9716--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9716--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9716--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9716--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9716--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9716--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9716--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9716--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9716--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9716--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9716--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9716--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9716--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9716--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9716--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9716--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9716--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9716--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9716--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9716--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9716--   Scanning root segment: 0x701a000..0x701afff (4096)
--9716--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9716--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9716--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9716--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9716--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9716--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9716--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9716--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9716--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9716== Checked 4,784,512 bytes
==9716== 
==9716== LEAK SUMMARY:
==9716==    definitely lost: 2,181 bytes in 11 blocks
==9716==    indirectly lost: 6,756 bytes in 7 blocks
==9716==      possibly lost: 0 bytes in 0 blocks
==9716==    still reachable: 3,113,904 bytes in 68,975 blocks
==9716==         suppressed: 0 bytes in 0 blocks
==9716== Rerun with --leak-check=full to see details of leaked memory
==9716== 
==9716== Use --track-origins=yes to see where uninitialised values come from
==9716== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9716== 
==9716== 1 errors in context 1 of 2:
==9716== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9716==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9716==    by 0x488CD0: stringsubst (subst.c:301)
==9716==    by 0x48801B: prefork (subst.c:77)
==9716==    by 0x42B318: execcmd (exec.c:2619)
==9716==    by 0x428CA0: execpline2 (exec.c:1697)
==9716==    by 0x427FD2: execpline (exec.c:1484)
==9716==    by 0x427756: execlist (exec.c:1267)
==9716==    by 0x42717C: execode (exec.c:1073)
==9716==    by 0x431299: runshfunc (exec.c:5040)
==9716==    by 0x430E76: doshfunc (exec.c:4920)
==9716==    by 0x4302FB: execshfunc (exec.c:4557)
==9716==    by 0x42D8C1: execcmd (exec.c:3373)
==9716== 
==9716== 
==9716== 2 errors in context 2 of 2:
==9716== Conditional jump or move depends on uninitialised value(s)
==9716==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9716==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9716==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9716==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9716==    by 0x42D8E9: execcmd (exec.c:3378)
==9716==    by 0x428CA0: execpline2 (exec.c:1697)
==9716==    by 0x427FD2: execpline (exec.c:1484)
==9716==    by 0x42779A: execlist (exec.c:1275)
==9716==    by 0x42717C: execode (exec.c:1073)
==9716==    by 0x431299: runshfunc (exec.c:5040)
==9716==    by 0x430E76: doshfunc (exec.c:4920)
==9716==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9716== 
==9716== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9715== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9715-by-pythonnut-on-???
==9715== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9715-by-pythonnut-on-???
==9715== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9715-by-pythonnut-on-???
==9715== 
==9715== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9715== don't want to do, unless you know exactly what you're doing,
==9715== or are doing some strange experiment):
==9715==   /usr/lib/valgrind/../../bin/vgdb --pid=9715 ...command...
==9715== 
==9715== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9715==   /path/to/gdb ./zsh
==9715== and then give GDB the following command
==9715==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9715
==9715== --pid is optional if only one valgrind process is running
==9715== 
--9715-- Caught __NR_exit; running __libc_freeres()
--9715-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9715== 
==9715== HEAP SUMMARY:
==9715==     in use at exit: 3,122,777 bytes in 68,990 blocks
==9715==   total heap usage: 1,463,753 allocs, 1,394,763 frees, 117,994,579 bytes allocated
==9715== 
==9715== Searching for pointers to 68,990 not-freed blocks
--9715--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9715--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9715--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9715--   Scanning root segment: 0x4037000..0x403afff (16384)
--9715--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9715--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9715--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9715--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9715--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9715--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9715--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9715--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9715--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9715--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9715--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9715--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9715--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9715--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9715--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9715--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9715--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9715--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9715--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9715--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9715--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9715--   Scanning root segment: 0x701a000..0x701afff (4096)
--9715--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9715--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9715--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9715--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9715--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9715--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9715--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9715--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9715--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9715== Checked 4,783,824 bytes
==9715== 
==9715== LEAK SUMMARY:
==9715==    definitely lost: 2,181 bytes in 11 blocks
==9715==    indirectly lost: 6,756 bytes in 7 blocks
==9715==      possibly lost: 0 bytes in 0 blocks
==9715==    still reachable: 3,113,840 bytes in 68,972 blocks
==9715==         suppressed: 0 bytes in 0 blocks
==9715== Rerun with --leak-check=full to see details of leaked memory
==9715== 
==9715== Use --track-origins=yes to see where uninitialised values come from
==9715== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9715== 
==9715== 1 errors in context 1 of 2:
==9715== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9715==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9715==    by 0x488CD0: stringsubst (subst.c:301)
==9715==    by 0x48801B: prefork (subst.c:77)
==9715==    by 0x42B318: execcmd (exec.c:2619)
==9715==    by 0x428CA0: execpline2 (exec.c:1697)
==9715==    by 0x427FD2: execpline (exec.c:1484)
==9715==    by 0x427756: execlist (exec.c:1267)
==9715==    by 0x42717C: execode (exec.c:1073)
==9715==    by 0x431299: runshfunc (exec.c:5040)
==9715==    by 0x430E76: doshfunc (exec.c:4920)
==9715==    by 0x4302FB: execshfunc (exec.c:4557)
==9715==    by 0x42D8C1: execcmd (exec.c:3373)
==9715== 
==9715== 
==9715== 2 errors in context 2 of 2:
==9715== Conditional jump or move depends on uninitialised value(s)
==9715==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9715==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9715==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9715==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9715==    by 0x42D8E9: execcmd (exec.c:3378)
==9715==    by 0x428CA0: execpline2 (exec.c:1697)
==9715==    by 0x427FD2: execpline (exec.c:1484)
==9715==    by 0x42779A: execlist (exec.c:1275)
==9715==    by 0x42717C: execode (exec.c:1073)
==9715==    by 0x431299: runshfunc (exec.c:5040)
==9715==    by 0x430E76: doshfunc (exec.c:4920)
==9715==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9715== 
==9715== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9651-- Caught __NR_exit; running __libc_freeres()
--9651-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9651== 
==9651== HEAP SUMMARY:
==9651==     in use at exit: 3,120,309 bytes in 68,923 blocks
==9651==   total heap usage: 1,463,752 allocs, 1,394,829 frees, 117,996,163 bytes allocated
==9651== 
==9651== Searching for pointers to 68,923 not-freed blocks
--9651--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9651--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9651--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9651--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9651--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9651--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9651--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9651--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9651--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9651--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9651--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9651--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9651--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9651--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9651--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9651--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9651--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9651--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9651--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9651--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9651--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9651--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9651--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9651--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9651--   Scanning root segment: 0x701a000..0x701afff (4096)
--9651--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9651--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9651--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9651--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9651--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9651--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9651--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9651--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9651--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9651== Checked 4,761,952 bytes
==9651== 
==9651== LEAK SUMMARY:
==9651==    definitely lost: 2,181 bytes in 11 blocks
==9651==    indirectly lost: 6,756 bytes in 7 blocks
==9651==      possibly lost: 0 bytes in 0 blocks
==9651==    still reachable: 3,111,372 bytes in 68,905 blocks
==9651==         suppressed: 0 bytes in 0 blocks
==9651== Rerun with --leak-check=full to see details of leaked memory
==9651== 
==9651== Use --track-origins=yes to see where uninitialised values come from
==9651== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9651== 
==9651== 1 errors in context 1 of 2:
==9651== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9651==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9651==    by 0x488CD0: stringsubst (subst.c:301)
==9651==    by 0x48801B: prefork (subst.c:77)
==9651==    by 0x42B318: execcmd (exec.c:2619)
==9651==    by 0x428CA0: execpline2 (exec.c:1697)
==9651==    by 0x427FD2: execpline (exec.c:1484)
==9651==    by 0x427756: execlist (exec.c:1267)
==9651==    by 0x42717C: execode (exec.c:1073)
==9651==    by 0x431299: runshfunc (exec.c:5040)
==9651==    by 0x430E76: doshfunc (exec.c:4920)
==9651==    by 0x4302FB: execshfunc (exec.c:4557)
==9651==    by 0x42D8C1: execcmd (exec.c:3373)
==9651== 
==9651== 
==9651== 2 errors in context 2 of 2:
==9651== Conditional jump or move depends on uninitialised value(s)
==9651==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9651==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9651==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9651==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9651==    by 0x42D8E9: execcmd (exec.c:3378)
==9651==    by 0x428CA0: execpline2 (exec.c:1697)
==9651==    by 0x427FD2: execpline (exec.c:1484)
==9651==    by 0x42779A: execlist (exec.c:1275)
==9651==    by 0x42717C: execode (exec.c:1073)
==9651==    by 0x431299: runshfunc (exec.c:5040)
==9651==    by 0x430E76: doshfunc (exec.c:4920)
==9651==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9651== 
==9651== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9720== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9720-by-pythonnut-on-???
==9720== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9720-by-pythonnut-on-???
==9720== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9720-by-pythonnut-on-???
==9720== 
==9720== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9720== don't want to do, unless you know exactly what you're doing,
==9720== or are doing some strange experiment):
==9720==   /usr/lib/valgrind/../../bin/vgdb --pid=9720 ...command...
==9720== 
==9720== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9720==   /path/to/gdb ./zsh
==9720== and then give GDB the following command
==9720==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9720
==9720== --pid is optional if only one valgrind process is running
==9720== 
==9722== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9722-by-pythonnut-on-???
==9722== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9722-by-pythonnut-on-???
==9722== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9722-by-pythonnut-on-???
==9722== 
==9722== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9722== don't want to do, unless you know exactly what you're doing,
==9722== or are doing some strange experiment):
==9722==   /usr/lib/valgrind/../../bin/vgdb --pid=9722 ...command...
==9722== 
==9722== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9722==   /path/to/gdb ./zsh
==9722== and then give GDB the following command
==9722==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9722
==9722== --pid is optional if only one valgrind process is running
==9722== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==9721== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9721-by-pythonnut-on-???
==9721== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9721-by-pythonnut-on-???
==9721== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9721-by-pythonnut-on-???
==9721== 
==9721== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9721== don't want to do, unless you know exactly what you're doing,
==9721== or are doing some strange experiment):
==9721==   /usr/lib/valgrind/../../bin/vgdb --pid=9721 ...command...
==9721== 
==9721== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9721==   /path/to/gdb ./zsh
==9721== and then give GDB the following command
==9721==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9721
==9721== --pid is optional if only one valgrind process is running
==9721== 
--9721-- Caught __NR_exit; running __libc_freeres()
--9721-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9721== 
==9721== HEAP SUMMARY:
==9721==     in use at exit: 3,120,813 bytes in 68,935 blocks
==9721==   total heap usage: 1,463,596 allocs, 1,394,661 frees, 117,953,095 bytes allocated
==9721== 
==9721== Searching for pointers to 68,935 not-freed blocks
--9721--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9721--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9721--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9721--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9721--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9721--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9721--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9721--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9721--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9721--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9721--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9721--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9721--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9721--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9721--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9721--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9721--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9721--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9721--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9721--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9721--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9721--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9721--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9721--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9721--   Scanning root segment: 0x701a000..0x701afff (4096)
--9721--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9721--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9721--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9721--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9721--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9721--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9721--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9721--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9721--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9721== Checked 4,764,504 bytes
==9721== 
==9721== LEAK SUMMARY:
==9721==    definitely lost: 2,181 bytes in 11 blocks
==9721==    indirectly lost: 6,756 bytes in 7 blocks
==9721==      possibly lost: 0 bytes in 0 blocks
==9721==    still reachable: 3,111,876 bytes in 68,917 blocks
==9721==         suppressed: 0 bytes in 0 blocks
==9721== Rerun with --leak-check=full to see details of leaked memory
==9721== 
==9721== Use --track-origins=yes to see where uninitialised values come from
==9721== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9721== 
==9721== 1 errors in context 1 of 2:
==9721== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9721==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9721==    by 0x488CD0: stringsubst (subst.c:301)
==9721==    by 0x48801B: prefork (subst.c:77)
==9721==    by 0x42B318: execcmd (exec.c:2619)
==9721==    by 0x428CA0: execpline2 (exec.c:1697)
==9721==    by 0x427FD2: execpline (exec.c:1484)
==9721==    by 0x427756: execlist (exec.c:1267)
==9721==    by 0x42717C: execode (exec.c:1073)
==9721==    by 0x431299: runshfunc (exec.c:5040)
==9721==    by 0x430E76: doshfunc (exec.c:4920)
==9721==    by 0x4302FB: execshfunc (exec.c:4557)
==9721==    by 0x42D8C1: execcmd (exec.c:3373)
==9721== 
==9721== 
==9721== 2 errors in context 2 of 2:
==9721== Conditional jump or move depends on uninitialised value(s)
==9721==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9721==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9721==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9721==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9721==    by 0x42D8E9: execcmd (exec.c:3378)
==9721==    by 0x428CA0: execpline2 (exec.c:1697)
==9721==    by 0x427FD2: execpline (exec.c:1484)
==9721==    by 0x42779A: execlist (exec.c:1275)
==9721==    by 0x42717C: execode (exec.c:1073)
==9721==    by 0x431299: runshfunc (exec.c:5040)
==9721==    by 0x430E76: doshfunc (exec.c:4920)
==9721==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9721== 
==9721== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9723-- REDIR: 0x59f1090 (libc.so.6:unsetenv) redirected to 0x4c319d0 (unsetenv)
==9723== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9723-by-pythonnut-on-???
==9723== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9723-by-pythonnut-on-???
==9723== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9723-by-pythonnut-on-???
==9723== 
==9723== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9723== don't want to do, unless you know exactly what you're doing,
==9723== or are doing some strange experiment):
==9723==   /usr/lib/valgrind/../../bin/vgdb --pid=9723 ...command...
==9723== 
==9723== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9723==   /path/to/gdb ./zsh
==9723== and then give GDB the following command
==9723==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9723
==9723== --pid is optional if only one valgrind process is running
==9723== 
client request: code 4d430005,  addr 0xFFEFFB37C,  len 4
client request: code 4d430005,  addr 0xFFEFF836C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFFA04C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF907C,  len 4
client request: code 4d430005,  addr 0xFFEFF895C,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
client request: code 4d430005,  addr 0xFFEFEEBFC,  len 4
client request: code 4d430005,  addr 0xFFEFF9AEC,  len 4
==9725== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9725-by-pythonnut-on-???
==9725== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9725-by-pythonnut-on-???
==9725== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9725-by-pythonnut-on-???
==9725== 
==9725== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9725== don't want to do, unless you know exactly what you're doing,
==9725== or are doing some strange experiment):
==9725==   /usr/lib/valgrind/../../bin/vgdb --pid=9725 ...command...
==9725== 
==9725== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9725==   /path/to/gdb ./zsh
==9725== and then give GDB the following command
==9725==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9725
==9725== --pid is optional if only one valgrind process is running
==9725== 
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
client request: code 4d430005,  addr 0xFFEFF562C,  len 4
==9726== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9726-by-pythonnut-on-???
==9726== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9726-by-pythonnut-on-???
==9726== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9726-by-pythonnut-on-???
==9726== 
==9726== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9726== don't want to do, unless you know exactly what you're doing,
==9726== or are doing some strange experiment):
==9726==   /usr/lib/valgrind/../../bin/vgdb --pid=9726 ...command...
==9726== 
==9726== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9726==   /path/to/gdb ./zsh
==9726== and then give GDB the following command
==9726==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9726
==9726== --pid is optional if only one valgrind process is running
==9726== 
--9726-- Caught __NR_exit; running __libc_freeres()
--9726-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9726== 
==9726== HEAP SUMMARY:
==9726==     in use at exit: 3,152,460 bytes in 69,433 blocks
==9726==   total heap usage: 1,467,367 allocs, 1,397,934 frees, 119,723,070 bytes allocated
==9726== 
==9726== Searching for pointers to 69,433 not-freed blocks
--9726--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9726--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9726--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9726--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9726--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9726--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9726--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9726--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9726--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9726--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9726--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9726--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9726--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9726--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9726--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9726--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9726--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9726--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9726--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9726--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9726--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9726--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9726--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9726--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9726--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9726--   Scanning root segment: 0x701a000..0x701afff (4096)
--9726--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9726--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9726--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9726--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9726--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9726--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9726--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9726--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9726--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9726== Checked 4,852,528 bytes
==9726== 
==9726== LEAK SUMMARY:
==9726==    definitely lost: 2,181 bytes in 11 blocks
==9726==    indirectly lost: 6,756 bytes in 7 blocks
==9726==      possibly lost: 0 bytes in 0 blocks
==9726==    still reachable: 3,143,523 bytes in 69,415 blocks
==9726==         suppressed: 0 bytes in 0 blocks
==9726== Rerun with --leak-check=full to see details of leaked memory
==9726== 
==9726== Use --track-origins=yes to see where uninitialised values come from
==9726== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9726== 
==9726== 1 errors in context 1 of 2:
==9726== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9726==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9726==    by 0x488CD0: stringsubst (subst.c:301)
==9726==    by 0x48801B: prefork (subst.c:77)
==9726==    by 0x42B318: execcmd (exec.c:2619)
==9726==    by 0x428CA0: execpline2 (exec.c:1697)
==9726==    by 0x427FD2: execpline (exec.c:1484)
==9726==    by 0x427756: execlist (exec.c:1267)
==9726==    by 0x42717C: execode (exec.c:1073)
==9726==    by 0x431299: runshfunc (exec.c:5040)
==9726==    by 0x430E76: doshfunc (exec.c:4920)
==9726==    by 0x4302FB: execshfunc (exec.c:4557)
==9726==    by 0x42D8C1: execcmd (exec.c:3373)
==9726== 
==9726== 
==9726== 2 errors in context 2 of 2:
==9726== Conditional jump or move depends on uninitialised value(s)
==9726==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9726==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9726==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9726==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9726==    by 0x42D8E9: execcmd (exec.c:3378)
==9726==    by 0x428CA0: execpline2 (exec.c:1697)
==9726==    by 0x427FD2: execpline (exec.c:1484)
==9726==    by 0x42779A: execlist (exec.c:1275)
==9726==    by 0x42717C: execode (exec.c:1073)
==9726==    by 0x431299: runshfunc (exec.c:5040)
==9726==    by 0x430E76: doshfunc (exec.c:4920)
==9726==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9726== 
==9726== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9725-- Caught __NR_exit; running __libc_freeres()
--9725-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9725== 
==9725== HEAP SUMMARY:
==9725==     in use at exit: 3,150,178 bytes in 69,353 blocks
==9725==   total heap usage: 1,467,272 allocs, 1,397,919 frees, 119,491,131 bytes allocated
==9725== 
==9725== Searching for pointers to 69,353 not-freed blocks
--9725--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9725--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9725--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9725--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9725--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9725--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9725--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9725--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9725--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9725--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9725--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9725--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9725--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9725--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9725--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9725--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9725--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9725--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9725--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9725--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9725--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9725--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9725--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9725--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9725--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9725--   Scanning root segment: 0x701a000..0x701afff (4096)
--9725--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9725--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9725--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9725--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9725--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9725--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9725--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9725--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9725--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9725== Checked 4,848,552 bytes
==9725== 
==9725== LEAK SUMMARY:
==9725==    definitely lost: 2,181 bytes in 11 blocks
==9725==    indirectly lost: 6,756 bytes in 7 blocks
==9725==      possibly lost: 0 bytes in 0 blocks
==9725==    still reachable: 3,141,241 bytes in 69,335 blocks
==9725==         suppressed: 0 bytes in 0 blocks
==9725== Rerun with --leak-check=full to see details of leaked memory
==9725== 
==9725== Use --track-origins=yes to see where uninitialised values come from
==9725== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9725== 
==9725== 1 errors in context 1 of 2:
==9725== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9725==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9725==    by 0x488CD0: stringsubst (subst.c:301)
==9725==    by 0x48801B: prefork (subst.c:77)
==9725==    by 0x42B318: execcmd (exec.c:2619)
==9725==    by 0x428CA0: execpline2 (exec.c:1697)
==9725==    by 0x427FD2: execpline (exec.c:1484)
==9725==    by 0x427756: execlist (exec.c:1267)
==9725==    by 0x42717C: execode (exec.c:1073)
==9725==    by 0x431299: runshfunc (exec.c:5040)
==9725==    by 0x430E76: doshfunc (exec.c:4920)
==9725==    by 0x4302FB: execshfunc (exec.c:4557)
==9725==    by 0x42D8C1: execcmd (exec.c:3373)
==9725== 
==9725== 
==9725== 2 errors in context 2 of 2:
==9725== Conditional jump or move depends on uninitialised value(s)
==9725==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9725==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9725==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9725==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9725==    by 0x42D8E9: execcmd (exec.c:3378)
==9725==    by 0x428CA0: execpline2 (exec.c:1697)
==9725==    by 0x427FD2: execpline (exec.c:1484)
==9725==    by 0x42779A: execlist (exec.c:1275)
==9725==    by 0x42717C: execode (exec.c:1073)
==9725==    by 0x431299: runshfunc (exec.c:5040)
==9725==    by 0x430E76: doshfunc (exec.c:4920)
==9725==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9725== 
==9725== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9727== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9727-by-pythonnut-on-???
==9727== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9727-by-pythonnut-on-???
==9727== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9727-by-pythonnut-on-???
==9727== 
==9727== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9727== don't want to do, unless you know exactly what you're doing,
==9727== or are doing some strange experiment):
==9727==   /usr/lib/valgrind/../../bin/vgdb --pid=9727 ...command...
==9727== 
==9727== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9727==   /path/to/gdb ./zsh
==9727== and then give GDB the following command
==9727==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9727
==9727== --pid is optional if only one valgrind process is running
==9727== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==9728== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9728-by-pythonnut-on-???
==9728== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9728-by-pythonnut-on-???
==9728== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9728-by-pythonnut-on-???
==9728== 
==9728== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9728== don't want to do, unless you know exactly what you're doing,
==9728== or are doing some strange experiment):
==9728==   /usr/lib/valgrind/../../bin/vgdb --pid=9728 ...command...
==9728== 
==9728== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9728==   /path/to/gdb ./zsh
==9728== and then give GDB the following command
==9728==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9728
==9728== --pid is optional if only one valgrind process is running
==9728== 
--9728-- Caught __NR_exit; running __libc_freeres()
--9728-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9728== 
==9728== HEAP SUMMARY:
==9728==     in use at exit: 3,152,707 bytes in 69,441 blocks
==9728==   total heap usage: 1,467,384 allocs, 1,397,943 frees, 119,693,241 bytes allocated
==9728== 
==9728== Searching for pointers to 69,441 not-freed blocks
--9728--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9728--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9728--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9728--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9728--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9728--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9728--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9728--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9728--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9728--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9728--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9728--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9728--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9728--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9728--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9728--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9728--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9728--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9728--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9728--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9728--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9728--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9728--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9728--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9728--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9728--   Scanning root segment: 0x701a000..0x701afff (4096)
--9728--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9728--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9728--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9728--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9728--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9728--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9728--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9728--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9728--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9728== Checked 4,853,256 bytes
==9728== 
==9728== LEAK SUMMARY:
==9728==    definitely lost: 2,181 bytes in 11 blocks
==9728==    indirectly lost: 6,756 bytes in 7 blocks
==9728==      possibly lost: 0 bytes in 0 blocks
==9728==    still reachable: 3,143,770 bytes in 69,423 blocks
==9728==         suppressed: 0 bytes in 0 blocks
==9728== Rerun with --leak-check=full to see details of leaked memory
==9728== 
==9728== Use --track-origins=yes to see where uninitialised values come from
==9728== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9728== 
==9728== 1 errors in context 1 of 2:
==9728== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9728==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9728==    by 0x488CD0: stringsubst (subst.c:301)
==9728==    by 0x48801B: prefork (subst.c:77)
==9728==    by 0x42B318: execcmd (exec.c:2619)
==9728==    by 0x428CA0: execpline2 (exec.c:1697)
==9728==    by 0x427FD2: execpline (exec.c:1484)
==9728==    by 0x427756: execlist (exec.c:1267)
==9728==    by 0x42717C: execode (exec.c:1073)
==9728==    by 0x431299: runshfunc (exec.c:5040)
==9728==    by 0x430E76: doshfunc (exec.c:4920)
==9728==    by 0x4302FB: execshfunc (exec.c:4557)
==9728==    by 0x42D8C1: execcmd (exec.c:3373)
==9728== 
==9728== 
==9728== 2 errors in context 2 of 2:
==9728== Conditional jump or move depends on uninitialised value(s)
==9728==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9728==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9728==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9728==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9728==    by 0x42D8E9: execcmd (exec.c:3378)
==9728==    by 0x428CA0: execpline2 (exec.c:1697)
==9728==    by 0x427FD2: execpline (exec.c:1484)
==9728==    by 0x42779A: execlist (exec.c:1275)
==9728==    by 0x42717C: execode (exec.c:1073)
==9728==    by 0x431299: runshfunc (exec.c:5040)
==9728==    by 0x430E76: doshfunc (exec.c:4920)
==9728==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9728== 
==9728== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9727-- Caught __NR_exit; running __libc_freeres()
--9727-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9727== 
==9727== HEAP SUMMARY:
==9727==     in use at exit: 3,150,451 bytes in 69,361 blocks
==9727==   total heap usage: 1,467,287 allocs, 1,397,926 frees, 119,494,044 bytes allocated
==9727== 
==9727== Searching for pointers to 69,361 not-freed blocks
--9727--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9727--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9727--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9727--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9727--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9727--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9727--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9727--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9727--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9727--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9727--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9727--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9727--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9727--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9727--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9727--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9727--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9727--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9727--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9727--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9727--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9727--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9727--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9727--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9727--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9727--   Scanning root segment: 0x701a000..0x701afff (4096)
--9727--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9727--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9727--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9727--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9727--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9727--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9727--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9727--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9727--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9727== Checked 4,849,312 bytes
==9727== 
==9727== LEAK SUMMARY:
==9727==    definitely lost: 2,181 bytes in 11 blocks
==9727==    indirectly lost: 6,756 bytes in 7 blocks
==9727==      possibly lost: 0 bytes in 0 blocks
==9727==    still reachable: 3,141,514 bytes in 69,343 blocks
==9727==         suppressed: 0 bytes in 0 blocks
==9727== Rerun with --leak-check=full to see details of leaked memory
==9727== 
==9727== Use --track-origins=yes to see where uninitialised values come from
==9727== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9727== 
==9727== 1 errors in context 1 of 2:
==9727== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9727==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9727==    by 0x488CD0: stringsubst (subst.c:301)
==9727==    by 0x48801B: prefork (subst.c:77)
==9727==    by 0x42B318: execcmd (exec.c:2619)
==9727==    by 0x428CA0: execpline2 (exec.c:1697)
==9727==    by 0x427FD2: execpline (exec.c:1484)
==9727==    by 0x427756: execlist (exec.c:1267)
==9727==    by 0x42717C: execode (exec.c:1073)
==9727==    by 0x431299: runshfunc (exec.c:5040)
==9727==    by 0x430E76: doshfunc (exec.c:4920)
==9727==    by 0x4302FB: execshfunc (exec.c:4557)
==9727==    by 0x42D8C1: execcmd (exec.c:3373)
==9727== 
==9727== 
==9727== 2 errors in context 2 of 2:
==9727== Conditional jump or move depends on uninitialised value(s)
==9727==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9727==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9727==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9727==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9727==    by 0x42D8E9: execcmd (exec.c:3378)
==9727==    by 0x428CA0: execpline2 (exec.c:1697)
==9727==    by 0x427FD2: execpline (exec.c:1484)
==9727==    by 0x42779A: execlist (exec.c:1275)
==9727==    by 0x42717C: execode (exec.c:1073)
==9727==    by 0x431299: runshfunc (exec.c:5040)
==9727==    by 0x430E76: doshfunc (exec.c:4920)
==9727==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9727== 
==9727== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFF975C,  len 4
client request: code 4d430005,  addr 0xFFEFEE74C,  len 4
--9731-- Caught __NR_exit; running __libc_freeres()
==9731== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9731-by-pythonnut-on-???
==9731== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9731-by-pythonnut-on-???
==9731== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9731-by-pythonnut-on-???
==9731== 
==9731== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9731== don't want to do, unless you know exactly what you're doing,
==9731== or are doing some strange experiment):
==9731==   /usr/lib/valgrind/../../bin/vgdb --pid=9731 ...command...
==9731== 
==9731== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9731==   /path/to/gdb ./zsh
==9731== and then give GDB the following command
==9731==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9731
==9731== --pid is optional if only one valgrind process is running
==9731== 
--9731-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9731== 
==9731== HEAP SUMMARY:
==9731==     in use at exit: 3,152,278 bytes in 69,352 blocks
==9731==   total heap usage: 1,467,400 allocs, 1,398,048 frees, 119,509,507 bytes allocated
==9731== 
==9731== Searching for pointers to 69,352 not-freed blocks
--9731--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9731--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9731--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9731--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9731--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9731--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9731--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9731--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9731--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9731--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9731--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9731--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9731--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9731--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9731--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9731--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9731--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9731--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9731--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9731--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9731--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9731--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9731--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9731--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9731--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9731--   Scanning root segment: 0x701a000..0x701afff (4096)
--9731--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9731--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9731--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9731--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9731--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9731--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9731--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9731--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9731--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9731== Checked 4,849,544 bytes
==9731== 
==9731== LEAK SUMMARY:
==9731==    definitely lost: 2,181 bytes in 11 blocks
==9731==    indirectly lost: 6,756 bytes in 7 blocks
==9731==      possibly lost: 0 bytes in 0 blocks
==9731==    still reachable: 3,143,341 bytes in 69,334 blocks
==9731==         suppressed: 0 bytes in 0 blocks
==9731== Rerun with --leak-check=full to see details of leaked memory
==9731== 
==9731== Use --track-origins=yes to see where uninitialised values come from
==9731== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9731== 
==9731== 1 errors in context 1 of 2:
==9731== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9731==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9731==    by 0x488CD0: stringsubst (subst.c:301)
==9731==    by 0x48801B: prefork (subst.c:77)
==9731==    by 0x42B318: execcmd (exec.c:2619)
==9731==    by 0x428CA0: execpline2 (exec.c:1697)
==9731==    by 0x427FD2: execpline (exec.c:1484)
==9731==    by 0x427756: execlist (exec.c:1267)
==9731==    by 0x42717C: execode (exec.c:1073)
==9731==    by 0x431299: runshfunc (exec.c:5040)
==9731==    by 0x430E76: doshfunc (exec.c:4920)
==9731==    by 0x4302FB: execshfunc (exec.c:4557)
==9731==    by 0x42D8C1: execcmd (exec.c:3373)
==9731== 
==9731== 
==9731== 2 errors in context 2 of 2:
==9731== Conditional jump or move depends on uninitialised value(s)
==9731==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9731==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9731==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9731==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9731==    by 0x42D8E9: execcmd (exec.c:3378)
==9731==    by 0x428CA0: execpline2 (exec.c:1697)
==9731==    by 0x427FD2: execpline (exec.c:1484)
==9731==    by 0x42779A: execlist (exec.c:1275)
==9731==    by 0x42717C: execode (exec.c:1073)
==9731==    by 0x431299: runshfunc (exec.c:5040)
==9731==    by 0x430E76: doshfunc (exec.c:4920)
==9731==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9731== 
==9731== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9733== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9733-by-pythonnut-on-???
==9733== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9733-by-pythonnut-on-???
==9733== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9733-by-pythonnut-on-???
==9733== 
==9733== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9733== don't want to do, unless you know exactly what you're doing,
==9733== or are doing some strange experiment):
==9733==   /usr/lib/valgrind/../../bin/vgdb --pid=9733 ...command...
==9733== 
==9733== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9733==   /path/to/gdb ./zsh
==9733== and then give GDB the following command
==9733==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9733
==9733== --pid is optional if only one valgrind process is running
==9733== 
--9733-- Caught __NR_exit; running __libc_freeres()
--9733-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9733== 
==9733== HEAP SUMMARY:
==9733==     in use at exit: 3,151,462 bytes in 69,308 blocks
==9733==   total heap usage: 1,467,357 allocs, 1,398,049 frees, 119,508,989 bytes allocated
==9733== 
==9733== Searching for pointers to 69,308 not-freed blocks
--9733--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9733--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9733--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9733--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9733--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9733--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9733--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9733--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9733--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9733--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9733--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9733--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9733--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9733--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9733--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9733--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9733--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9733--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9733--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9733--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9733--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9733--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9733--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9733--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9733--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9733--   Scanning root segment: 0x701a000..0x701afff (4096)
--9733--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9733--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9733--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9733--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9733--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9733--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9733--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9733--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9733--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9733== Checked 4,848,224 bytes
==9733== 
==9733== LEAK SUMMARY:
==9733==    definitely lost: 2,181 bytes in 11 blocks
==9733==    indirectly lost: 6,756 bytes in 7 blocks
==9733==      possibly lost: 0 bytes in 0 blocks
==9733==    still reachable: 3,142,525 bytes in 69,290 blocks
==9733==         suppressed: 0 bytes in 0 blocks
==9733== Rerun with --leak-check=full to see details of leaked memory
==9733== 
==9733== Use --track-origins=yes to see where uninitialised values come from
==9733== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9733== 
==9733== 1 errors in context 1 of 2:
==9733== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9733==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9733==    by 0x488CD0: stringsubst (subst.c:301)
==9733==    by 0x48801B: prefork (subst.c:77)
==9733==    by 0x42B318: execcmd (exec.c:2619)
==9733==    by 0x428CA0: execpline2 (exec.c:1697)
==9733==    by 0x427FD2: execpline (exec.c:1484)
==9733==    by 0x427756: execlist (exec.c:1267)
==9733==    by 0x42717C: execode (exec.c:1073)
==9733==    by 0x431299: runshfunc (exec.c:5040)
==9733==    by 0x430E76: doshfunc (exec.c:4920)
==9733==    by 0x4302FB: execshfunc (exec.c:4557)
==9733==    by 0x42D8C1: execcmd (exec.c:3373)
==9733== 
==9733== 
==9733== 2 errors in context 2 of 2:
==9733== Conditional jump or move depends on uninitialised value(s)
==9733==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9733==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9733==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9733==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9733==    by 0x42D8E9: execcmd (exec.c:3378)
==9733==    by 0x428CA0: execpline2 (exec.c:1697)
==9733==    by 0x427FD2: execpline (exec.c:1484)
==9733==    by 0x42779A: execlist (exec.c:1275)
==9733==    by 0x42717C: execode (exec.c:1073)
==9733==    by 0x431299: runshfunc (exec.c:5040)
==9733==    by 0x430E76: doshfunc (exec.c:4920)
==9733==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9733== 
==9733== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF2EC,  len 4
==9736== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9736-by-pythonnut-on-???
==9736== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9736-by-pythonnut-on-???
==9736== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9736-by-pythonnut-on-???
==9736== 
==9736== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9736== don't want to do, unless you know exactly what you're doing,
==9736== or are doing some strange experiment):
==9736==   /usr/lib/valgrind/../../bin/vgdb --pid=9736 ...command...
==9736== 
==9736== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9736==   /path/to/gdb ./zsh
==9736== and then give GDB the following command
==9736==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9736
==9736== --pid is optional if only one valgrind process is running
==9736== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
==9737== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9737-by-pythonnut-on-???
==9737== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9737-by-pythonnut-on-???
==9737== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9737-by-pythonnut-on-???
==9737== 
==9737== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9737== don't want to do, unless you know exactly what you're doing,
==9737== or are doing some strange experiment):
==9737==   /usr/lib/valgrind/../../bin/vgdb --pid=9737 ...command...
==9737== 
==9737== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9737==   /path/to/gdb ./zsh
==9737== and then give GDB the following command
==9737==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9737
==9737== --pid is optional if only one valgrind process is running
==9737== 
client request: code 4d430005,  addr 0xFFEFF6CEC,  len 4
--9737-- Caught __NR_exit; running __libc_freeres()
--9737-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9737== 
==9737== HEAP SUMMARY:
==9737==     in use at exit: 3,159,266 bytes in 69,532 blocks
==9737==   total heap usage: 1,468,133 allocs, 1,398,601 frees, 119,795,165 bytes allocated
==9737== 
==9737== Searching for pointers to 69,532 not-freed blocks
--9737--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9737--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9737--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9737--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9737--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9737--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9737--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9737--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9737--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9737--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9737--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9737--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9737--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9737--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9737--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9737--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9737--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9737--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9737--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9737--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9737--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9737--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9737--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9737--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9737--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9737--   Scanning root segment: 0x701a000..0x701afff (4096)
--9737--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9737--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9737--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9737--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9737--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9737--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9737--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9737--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9737--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9737== Checked 4,856,912 bytes
==9737== 
==9737== LEAK SUMMARY:
==9737==    definitely lost: 2,181 bytes in 11 blocks
==9737==    indirectly lost: 6,756 bytes in 7 blocks
==9737==      possibly lost: 0 bytes in 0 blocks
==9737==    still reachable: 3,150,329 bytes in 69,514 blocks
==9737==         suppressed: 0 bytes in 0 blocks
==9737== Rerun with --leak-check=full to see details of leaked memory
==9737== 
==9737== Use --track-origins=yes to see where uninitialised values come from
==9737== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9737== 
==9737== 1 errors in context 1 of 2:
==9737== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9737==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9737==    by 0x488CD0: stringsubst (subst.c:301)
==9737==    by 0x48801B: prefork (subst.c:77)
==9737==    by 0x42B318: execcmd (exec.c:2619)
==9737==    by 0x428CA0: execpline2 (exec.c:1697)
==9737==    by 0x427FD2: execpline (exec.c:1484)
==9737==    by 0x427756: execlist (exec.c:1267)
==9737==    by 0x42717C: execode (exec.c:1073)
==9737==    by 0x431299: runshfunc (exec.c:5040)
==9737==    by 0x430E76: doshfunc (exec.c:4920)
==9737==    by 0x4302FB: execshfunc (exec.c:4557)
==9737==    by 0x42D8C1: execcmd (exec.c:3373)
==9737== 
==9737== 
==9737== 2 errors in context 2 of 2:
==9737== Conditional jump or move depends on uninitialised value(s)
==9737==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9737==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9737==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9737==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9737==    by 0x42D8E9: execcmd (exec.c:3378)
==9737==    by 0x428CA0: execpline2 (exec.c:1697)
==9737==    by 0x427FD2: execpline (exec.c:1484)
==9737==    by 0x42779A: execlist (exec.c:1275)
==9737==    by 0x42717C: execode (exec.c:1073)
==9737==    by 0x431299: runshfunc (exec.c:5040)
==9737==    by 0x430E76: doshfunc (exec.c:4920)
==9737==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9737== 
==9737== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9736-- Caught __NR_exit; running __libc_freeres()
--9736-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9736== 
==9736== HEAP SUMMARY:
==9736==     in use at exit: 3,156,914 bytes in 69,452 blocks
==9736==   total heap usage: 1,468,039 allocs, 1,398,587 frees, 119,595,970 bytes allocated
==9736== 
==9736== Searching for pointers to 69,452 not-freed blocks
--9736--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9736--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9736--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9736--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9736--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9736--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9736--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9736--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9736--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9736--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9736--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9736--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9736--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9736--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9736--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9736--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9736--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9736--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9736--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9736--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9736--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9736--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9736--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9736--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9736--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9736--   Scanning root segment: 0x701a000..0x701afff (4096)
--9736--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9736--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9736--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9736--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9736--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9736--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9736--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9736--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9736--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9736== Checked 4,852,864 bytes
==9736== 
==9736== LEAK SUMMARY:
==9736==    definitely lost: 2,181 bytes in 11 blocks
==9736==    indirectly lost: 6,756 bytes in 7 blocks
==9736==      possibly lost: 0 bytes in 0 blocks
==9736==    still reachable: 3,147,977 bytes in 69,434 blocks
==9736==         suppressed: 0 bytes in 0 blocks
==9736== Rerun with --leak-check=full to see details of leaked memory
==9736== 
==9736== Use --track-origins=yes to see where uninitialised values come from
==9736== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9736== 
==9736== 1 errors in context 1 of 2:
==9736== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9736==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9736==    by 0x488CD0: stringsubst (subst.c:301)
==9736==    by 0x48801B: prefork (subst.c:77)
==9736==    by 0x42B318: execcmd (exec.c:2619)
==9736==    by 0x428CA0: execpline2 (exec.c:1697)
==9736==    by 0x427FD2: execpline (exec.c:1484)
==9736==    by 0x427756: execlist (exec.c:1267)
==9736==    by 0x42717C: execode (exec.c:1073)
==9736==    by 0x431299: runshfunc (exec.c:5040)
==9736==    by 0x430E76: doshfunc (exec.c:4920)
==9736==    by 0x4302FB: execshfunc (exec.c:4557)
==9736==    by 0x42D8C1: execcmd (exec.c:3373)
==9736== 
==9736== 
==9736== 2 errors in context 2 of 2:
==9736== Conditional jump or move depends on uninitialised value(s)
==9736==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9736==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9736==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9736==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9736==    by 0x42D8E9: execcmd (exec.c:3378)
==9736==    by 0x428CA0: execpline2 (exec.c:1697)
==9736==    by 0x427FD2: execpline (exec.c:1484)
==9736==    by 0x42779A: execlist (exec.c:1275)
==9736==    by 0x42717C: execode (exec.c:1073)
==9736==    by 0x431299: runshfunc (exec.c:5040)
==9736==    by 0x430E76: doshfunc (exec.c:4920)
==9736==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9736== 
==9736== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
client request: code 4d430005,  addr 0xFFEFF810C,  len 4
==9743== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9743-by-pythonnut-on-???
==9743== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9743-by-pythonnut-on-???
==9743== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9743-by-pythonnut-on-???
==9743== 
==9743== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9743== don't want to do, unless you know exactly what you're doing,
==9743== or are doing some strange experiment):
==9743==   /usr/lib/valgrind/../../bin/vgdb --pid=9743 ...command...
==9743== 
==9743== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9743==   /path/to/gdb ./zsh
==9743== and then give GDB the following command
==9743==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9743
==9743== --pid is optional if only one valgrind process is running
==9743== 
==9744== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9744-by-pythonnut-on-???
==9744== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9744-by-pythonnut-on-???
==9744== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9744-by-pythonnut-on-???
==9744== 
==9744== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9744== don't want to do, unless you know exactly what you're doing,
==9744== or are doing some strange experiment):
==9744==   /usr/lib/valgrind/../../bin/vgdb --pid=9744 ...command...
==9744== 
==9744== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9744==   /path/to/gdb ./zsh
==9744== and then give GDB the following command
==9744==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9744
==9744== --pid is optional if only one valgrind process is running
==9744== 
--9744-- Caught __NR_exit; running __libc_freeres()
--9744-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9744== 
==9744== HEAP SUMMARY:
==9744==     in use at exit: 3,165,425 bytes in 69,620 blocks
==9744==   total heap usage: 1,468,351 allocs, 1,398,731 frees, 119,856,736 bytes allocated
==9744== 
==9744== Searching for pointers to 69,620 not-freed blocks
--9744--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9744--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9744--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9744--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9744--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9744--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9744--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9744--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9744--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9744--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9744--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9744--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9744--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9744--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9744--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9744--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9744--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9744--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9744--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9744--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9744--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9744--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9744--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9744--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9744--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9744--   Scanning root segment: 0x701a000..0x701afff (4096)
--9744--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9744--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9744--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9744--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9744--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9744--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9744--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9744--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9744--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9744== Checked 4,880,560 bytes
==9744== 
==9744== LEAK SUMMARY:
==9744==    definitely lost: 2,181 bytes in 11 blocks
==9744==    indirectly lost: 6,756 bytes in 7 blocks
==9744==      possibly lost: 0 bytes in 0 blocks
==9744==    still reachable: 3,156,488 bytes in 69,602 blocks
==9744==         suppressed: 0 bytes in 0 blocks
==9744== Rerun with --leak-check=full to see details of leaked memory
==9744== 
==9744== Use --track-origins=yes to see where uninitialised values come from
==9744== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9744== 
==9744== 1 errors in context 1 of 2:
==9744== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9744==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9744==    by 0x488CD0: stringsubst (subst.c:301)
==9744==    by 0x48801B: prefork (subst.c:77)
==9744==    by 0x42B318: execcmd (exec.c:2619)
==9744==    by 0x428CA0: execpline2 (exec.c:1697)
==9744==    by 0x427FD2: execpline (exec.c:1484)
==9744==    by 0x427756: execlist (exec.c:1267)
==9744==    by 0x42717C: execode (exec.c:1073)
==9744==    by 0x431299: runshfunc (exec.c:5040)
==9744==    by 0x430E76: doshfunc (exec.c:4920)
==9744==    by 0x4302FB: execshfunc (exec.c:4557)
==9744==    by 0x42D8C1: execcmd (exec.c:3373)
==9744== 
==9744== 
==9744== 2 errors in context 2 of 2:
==9744== Conditional jump or move depends on uninitialised value(s)
==9744==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9744==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9744==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9744==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9744==    by 0x42D8E9: execcmd (exec.c:3378)
==9744==    by 0x428CA0: execpline2 (exec.c:1697)
==9744==    by 0x427FD2: execpline (exec.c:1484)
==9744==    by 0x42779A: execlist (exec.c:1275)
==9744==    by 0x42717C: execode (exec.c:1073)
==9744==    by 0x431299: runshfunc (exec.c:5040)
==9744==    by 0x430E76: doshfunc (exec.c:4920)
==9744==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9744== 
==9744== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9743-- Caught __NR_exit; running __libc_freeres()
--9743-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9743== 
==9743== HEAP SUMMARY:
==9743==     in use at exit: 3,163,074 bytes in 69,540 blocks
==9743==   total heap usage: 1,468,291 allocs, 1,398,751 frees, 119,626,838 bytes allocated
==9743== 
==9743== Searching for pointers to 69,540 not-freed blocks
--9743--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9743--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9743--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9743--   Scanning root segment: 0x4037000..0x4042fff (49152)
--9743--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9743--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9743--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9743--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9743--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9743--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9743--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9743--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9743--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9743--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9743--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9743--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9743--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9743--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9743--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9743--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9743--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9743--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9743--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9743--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9743--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9743--   Scanning root segment: 0x701a000..0x701afff (4096)
--9743--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9743--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9743--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9743--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9743--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9743--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9743--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9743--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9743--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9743== Checked 4,860,256 bytes
==9743== 
==9743== LEAK SUMMARY:
==9743==    definitely lost: 2,181 bytes in 11 blocks
==9743==    indirectly lost: 6,756 bytes in 7 blocks
==9743==      possibly lost: 0 bytes in 0 blocks
==9743==    still reachable: 3,154,137 bytes in 69,522 blocks
==9743==         suppressed: 0 bytes in 0 blocks
==9743== Rerun with --leak-check=full to see details of leaked memory
==9743== 
==9743== Use --track-origins=yes to see where uninitialised values come from
==9743== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9743== 
==9743== 1 errors in context 1 of 2:
==9743== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9743==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9743==    by 0x488CD0: stringsubst (subst.c:301)
==9743==    by 0x48801B: prefork (subst.c:77)
==9743==    by 0x42B318: execcmd (exec.c:2619)
==9743==    by 0x428CA0: execpline2 (exec.c:1697)
==9743==    by 0x427FD2: execpline (exec.c:1484)
==9743==    by 0x427756: execlist (exec.c:1267)
==9743==    by 0x42717C: execode (exec.c:1073)
==9743==    by 0x431299: runshfunc (exec.c:5040)
==9743==    by 0x430E76: doshfunc (exec.c:4920)
==9743==    by 0x4302FB: execshfunc (exec.c:4557)
==9743==    by 0x42D8C1: execcmd (exec.c:3373)
==9743== 
==9743== 
==9743== 2 errors in context 2 of 2:
==9743== Conditional jump or move depends on uninitialised value(s)
==9743==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9743==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9743==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9743==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9743==    by 0x42D8E9: execcmd (exec.c:3378)
==9743==    by 0x428CA0: execpline2 (exec.c:1697)
==9743==    by 0x427FD2: execpline (exec.c:1484)
==9743==    by 0x42779A: execlist (exec.c:1275)
==9743==    by 0x42717C: execode (exec.c:1073)
==9743==    by 0x431299: runshfunc (exec.c:5040)
==9743==    by 0x430E76: doshfunc (exec.c:4920)
==9743==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9743== 
==9743== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF77BC,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF713C,  len 4
client request: code 4d430005,  addr 0xFFEFF616C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFF6A4C,  len 4
client request: code 4d430005,  addr 0xFFEFEBCDC,  len 4
==9749== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9749-by-pythonnut-on-???
==9749== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9749-by-pythonnut-on-???
==9749== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9749-by-pythonnut-on-???
==9749== 
==9749== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9749== don't want to do, unless you know exactly what you're doing,
==9749== or are doing some strange experiment):
==9749==   /usr/lib/valgrind/../../bin/vgdb --pid=9749 ...command...
==9749== 
==9749== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9749==   /path/to/gdb ./zsh
==9749== and then give GDB the following command
==9749==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9749
==9749== --pid is optional if only one valgrind process is running
==9749== 
client request: code 4d430005,  addr 0xFFEFEAB9C,  len 4
==9748== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9748-by-pythonnut-on-???
==9748== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9748-by-pythonnut-on-???
==9748== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9748-by-pythonnut-on-???
==9748== 
==9748== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9748== don't want to do, unless you know exactly what you're doing,
==9748== or are doing some strange experiment):
==9748==   /usr/lib/valgrind/../../bin/vgdb --pid=9748 ...command...
==9748== 
==9748== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9748==   /path/to/gdb ./zsh
==9748== and then give GDB the following command
==9748==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9748
==9748== --pid is optional if only one valgrind process is running
==9748== 
--9748-- Caught __NR_exit; running __libc_freeres()
--9748-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9748== 
==9748== HEAP SUMMARY:
==9748==     in use at exit: 3,171,825 bytes in 69,629 blocks
==9748==   total heap usage: 1,468,617 allocs, 1,398,988 frees, 119,672,835 bytes allocated
==9748== 
==9748== Searching for pointers to 69,629 not-freed blocks
--9748--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9748--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9748--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9748--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9748--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9748--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9748--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9748--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9748--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9748--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9748--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9748--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9748--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9748--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9748--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9748--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9748--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9748--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9748--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9748--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9748--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9748--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9748--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9748--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9748--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9748--   Scanning root segment: 0x701a000..0x701afff (4096)
--9748--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9748--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9748--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9748--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9748--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9748--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9748--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9748--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9748--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9748== Checked 4,889,720 bytes
==9748== 
==9748== LEAK SUMMARY:
==9748==    definitely lost: 2,181 bytes in 11 blocks
==9748==    indirectly lost: 6,756 bytes in 7 blocks
==9748==      possibly lost: 0 bytes in 0 blocks
==9748==    still reachable: 3,162,888 bytes in 69,611 blocks
==9748==         suppressed: 0 bytes in 0 blocks
==9748== Rerun with --leak-check=full to see details of leaked memory
==9748== 
==9748== Use --track-origins=yes to see where uninitialised values come from
==9748== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9748== 
==9748== 1 errors in context 1 of 2:
==9748== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9748==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9748==    by 0x488CD0: stringsubst (subst.c:301)
==9748==    by 0x48801B: prefork (subst.c:77)
==9748==    by 0x42B318: execcmd (exec.c:2619)
==9748==    by 0x428CA0: execpline2 (exec.c:1697)
==9748==    by 0x427FD2: execpline (exec.c:1484)
==9748==    by 0x427756: execlist (exec.c:1267)
==9748==    by 0x42717C: execode (exec.c:1073)
==9748==    by 0x431299: runshfunc (exec.c:5040)
==9748==    by 0x430E76: doshfunc (exec.c:4920)
==9748==    by 0x4302FB: execshfunc (exec.c:4557)
==9748==    by 0x42D8C1: execcmd (exec.c:3373)
==9748== 
==9748== 
==9748== 2 errors in context 2 of 2:
==9748== Conditional jump or move depends on uninitialised value(s)
==9748==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9748==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9748==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9748==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9748==    by 0x42D8E9: execcmd (exec.c:3378)
==9748==    by 0x428CA0: execpline2 (exec.c:1697)
==9748==    by 0x427FD2: execpline (exec.c:1484)
==9748==    by 0x42779A: execlist (exec.c:1275)
==9748==    by 0x42717C: execode (exec.c:1073)
==9748==    by 0x431299: runshfunc (exec.c:5040)
==9748==    by 0x430E76: doshfunc (exec.c:4920)
==9748==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9748== 
==9748== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9751-- Caught __NR_exit; running __libc_freeres()
==9751== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9751-by-pythonnut-on-???
==9751== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9751-by-pythonnut-on-???
==9751== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9751-by-pythonnut-on-???
==9751== 
==9751== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9751== don't want to do, unless you know exactly what you're doing,
==9751== or are doing some strange experiment):
==9751==   /usr/lib/valgrind/../../bin/vgdb --pid=9751 ...command...
==9751== 
==9751== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9751==   /path/to/gdb ./zsh
==9751== and then give GDB the following command
==9751==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9751
==9751== --pid is optional if only one valgrind process is running
==9751== 
client request: code 4d430005,  addr 0xFFEFEA33C,  len 4
--9751-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9751== 
==9751== HEAP SUMMARY:
==9751==     in use at exit: 3,171,981 bytes in 69,635 blocks
==9751==   total heap usage: 1,468,626 allocs, 1,398,991 frees, 119,674,831 bytes allocated
==9751== 
==9751== Searching for pointers to 69,635 not-freed blocks
--9751--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9751--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9751--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9751--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9751--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9751--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9751--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9751--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9751--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9751--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9751--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9751--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9751--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9751--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9751--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9751--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9751--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9751--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9751--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9751--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9751--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9751--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9751--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9751--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9751--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9751--   Scanning root segment: 0x701a000..0x701afff (4096)
--9751--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9751--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9751--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9751--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9751--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9751--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9751--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9751--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9751--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9751== Checked 4,891,000 bytes
==9751== 
==9751== LEAK SUMMARY:
==9751==    definitely lost: 2,181 bytes in 11 blocks
==9751==    indirectly lost: 6,756 bytes in 7 blocks
==9751==      possibly lost: 0 bytes in 0 blocks
==9751==    still reachable: 3,163,044 bytes in 69,617 blocks
==9751==         suppressed: 0 bytes in 0 blocks
==9751== Rerun with --leak-check=full to see details of leaked memory
==9751== 
==9751== Use --track-origins=yes to see where uninitialised values come from
==9751== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9751== 
==9751== 1 errors in context 1 of 2:
==9751== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9751==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9751==    by 0x488CD0: stringsubst (subst.c:301)
==9751==    by 0x48801B: prefork (subst.c:77)
==9751==    by 0x42B318: execcmd (exec.c:2619)
==9751==    by 0x428CA0: execpline2 (exec.c:1697)
==9751==    by 0x427FD2: execpline (exec.c:1484)
==9751==    by 0x427756: execlist (exec.c:1267)
==9751==    by 0x42717C: execode (exec.c:1073)
==9751==    by 0x431299: runshfunc (exec.c:5040)
==9751==    by 0x430E76: doshfunc (exec.c:4920)
==9751==    by 0x4302FB: execshfunc (exec.c:4557)
==9751==    by 0x42D8C1: execcmd (exec.c:3373)
==9751== 
==9751== 
==9751== 2 errors in context 2 of 2:
==9751== Conditional jump or move depends on uninitialised value(s)
==9751==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9751==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9751==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9751==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9751==    by 0x42D8E9: execcmd (exec.c:3378)
==9751==    by 0x428CA0: execpline2 (exec.c:1697)
==9751==    by 0x427FD2: execpline (exec.c:1484)
==9751==    by 0x42779A: execlist (exec.c:1275)
==9751==    by 0x42717C: execode (exec.c:1073)
==9751==    by 0x431299: runshfunc (exec.c:5040)
==9751==    by 0x430E76: doshfunc (exec.c:4920)
==9751==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9751== 
==9751== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9750-- Caught __NR_exit; running __libc_freeres()
==9750== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9750-by-pythonnut-on-???
==9750== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9750-by-pythonnut-on-???
==9750== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9750-by-pythonnut-on-???
==9750== 
==9750== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9750== don't want to do, unless you know exactly what you're doing,
==9750== or are doing some strange experiment):
==9750==   /usr/lib/valgrind/../../bin/vgdb --pid=9750 ...command...
==9750== 
==9750== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9750==   /path/to/gdb ./zsh
==9750== and then give GDB the following command
==9750==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9750
==9750== --pid is optional if only one valgrind process is running
==9750== 
--9750-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9750== 
==9750== HEAP SUMMARY:
==9750==     in use at exit: 3,171,917 bytes in 69,632 blocks
==9750==   total heap usage: 1,468,628 allocs, 1,398,996 frees, 119,675,375 bytes allocated
==9750== 
==9750== Searching for pointers to 69,632 not-freed blocks
--9750--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9750--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9750--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9750--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9750--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9750--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9750--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9750--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9750--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9750--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9750--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9750--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9750--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9750--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9750--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9750--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9750--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9750--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9750--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9750--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9750--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9750--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9750--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9750--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9750--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9750--   Scanning root segment: 0x701a000..0x701afff (4096)
--9750--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9750--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9750--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9750--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9750--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9750--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9750--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9750--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9750--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9750== Checked 4,890,312 bytes
==9750== 
==9750== LEAK SUMMARY:
==9750==    definitely lost: 2,181 bytes in 11 blocks
==9750==    indirectly lost: 6,756 bytes in 7 blocks
==9750==      possibly lost: 0 bytes in 0 blocks
==9750==    still reachable: 3,162,980 bytes in 69,614 blocks
==9750==         suppressed: 0 bytes in 0 blocks
==9750== Rerun with --leak-check=full to see details of leaked memory
==9750== 
==9750== Use --track-origins=yes to see where uninitialised values come from
==9750== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9750== 
==9750== 1 errors in context 1 of 2:
==9750== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9750==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9750==    by 0x488CD0: stringsubst (subst.c:301)
==9750==    by 0x48801B: prefork (subst.c:77)
==9750==    by 0x42B318: execcmd (exec.c:2619)
==9750==    by 0x428CA0: execpline2 (exec.c:1697)
==9750==    by 0x427FD2: execpline (exec.c:1484)
==9750==    by 0x427756: execlist (exec.c:1267)
==9750==    by 0x42717C: execode (exec.c:1073)
==9750==    by 0x431299: runshfunc (exec.c:5040)
==9750==    by 0x430E76: doshfunc (exec.c:4920)
==9750==    by 0x4302FB: execshfunc (exec.c:4557)
==9750==    by 0x42D8C1: execcmd (exec.c:3373)
==9750== 
==9750== 
==9750== 2 errors in context 2 of 2:
==9750== Conditional jump or move depends on uninitialised value(s)
==9750==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9750==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9750==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9750==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9750==    by 0x42D8E9: execcmd (exec.c:3378)
==9750==    by 0x428CA0: execpline2 (exec.c:1697)
==9750==    by 0x427FD2: execpline (exec.c:1484)
==9750==    by 0x42779A: execlist (exec.c:1275)
==9750==    by 0x42717C: execode (exec.c:1073)
==9750==    by 0x431299: runshfunc (exec.c:5040)
==9750==    by 0x430E76: doshfunc (exec.c:4920)
==9750==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9750== 
==9750== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9753== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9753-by-pythonnut-on-???
==9753== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9753-by-pythonnut-on-???
==9753== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9753-by-pythonnut-on-???
==9753== 
==9753== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9753== don't want to do, unless you know exactly what you're doing,
==9753== or are doing some strange experiment):
==9753==   /usr/lib/valgrind/../../bin/vgdb --pid=9753 ...command...
==9753== 
==9753== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9753==   /path/to/gdb ./zsh
==9753== and then give GDB the following command
==9753==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9753
==9753== --pid is optional if only one valgrind process is running
==9753== 
--9754-- Caught __NR_exit; running __libc_freeres()
==9754== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9754-by-pythonnut-on-???
==9754== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9754-by-pythonnut-on-???
==9754== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9754-by-pythonnut-on-???
==9754== 
==9754== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9754== don't want to do, unless you know exactly what you're doing,
==9754== or are doing some strange experiment):
==9754==   /usr/lib/valgrind/../../bin/vgdb --pid=9754 ...command...
==9754== 
==9754== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9754==   /path/to/gdb ./zsh
==9754== and then give GDB the following command
==9754==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9754
==9754== --pid is optional if only one valgrind process is running
==9754== 
client request: code 4d430005,  addr 0xFFEFE9B7C,  len 4
--9754-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9754== 
==9754== HEAP SUMMARY:
==9754==     in use at exit: 3,172,078 bytes in 69,638 blocks
==9754==   total heap usage: 1,468,633 allocs, 1,398,995 frees, 119,677,040 bytes allocated
==9754== 
==9754== Searching for pointers to 69,638 not-freed blocks
--9754--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9754--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9754--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9754--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9754--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9754--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9754--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9754--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9754--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9754--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9754--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9754--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9754--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9754--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9754--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9754--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9754--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9754--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9754--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9754--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9754--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9754--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9754--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9754--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9754--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9754--   Scanning root segment: 0x701a000..0x701afff (4096)
--9754--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9754--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9754--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9754--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9754--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9754--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9754--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9754--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9754--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9754== Checked 4,891,600 bytes
==9754== 
==9754== LEAK SUMMARY:
==9754==    definitely lost: 2,181 bytes in 11 blocks
==9754==    indirectly lost: 6,756 bytes in 7 blocks
==9754==      possibly lost: 0 bytes in 0 blocks
==9754==    still reachable: 3,163,141 bytes in 69,620 blocks
==9754==         suppressed: 0 bytes in 0 blocks
==9754== Rerun with --leak-check=full to see details of leaked memory
==9754== 
==9754== Use --track-origins=yes to see where uninitialised values come from
==9754== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9754== 
==9754== 1 errors in context 1 of 2:
==9754== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9754==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9754==    by 0x488CD0: stringsubst (subst.c:301)
==9754==    by 0x48801B: prefork (subst.c:77)
==9754==    by 0x42B318: execcmd (exec.c:2619)
==9754==    by 0x428CA0: execpline2 (exec.c:1697)
==9754==    by 0x427FD2: execpline (exec.c:1484)
==9754==    by 0x427756: execlist (exec.c:1267)
==9754==    by 0x42717C: execode (exec.c:1073)
==9754==    by 0x431299: runshfunc (exec.c:5040)
==9754==    by 0x430E76: doshfunc (exec.c:4920)
==9754==    by 0x4302FB: execshfunc (exec.c:4557)
==9754==    by 0x42D8C1: execcmd (exec.c:3373)
==9754== 
==9754== 
==9754== 2 errors in context 2 of 2:
==9754== Conditional jump or move depends on uninitialised value(s)
==9754==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9754==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9754==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9754==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9754==    by 0x42D8E9: execcmd (exec.c:3378)
==9754==    by 0x428CA0: execpline2 (exec.c:1697)
==9754==    by 0x427FD2: execpline (exec.c:1484)
==9754==    by 0x42779A: execlist (exec.c:1275)
==9754==    by 0x42717C: execode (exec.c:1073)
==9754==    by 0x431299: runshfunc (exec.c:5040)
==9754==    by 0x430E76: doshfunc (exec.c:4920)
==9754==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9754== 
==9754== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9753-- Caught __NR_exit; running __libc_freeres()
--9753-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9753== 
==9753== HEAP SUMMARY:
==9753==     in use at exit: 3,172,014 bytes in 69,635 blocks
==9753==   total heap usage: 1,468,635 allocs, 1,399,000 frees, 119,677,584 bytes allocated
==9753== 
==9753== Searching for pointers to 69,635 not-freed blocks
--9753--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9753--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9753--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9753--   Scanning root segment: 0x4037000..0x4046fff (65536)
--9753--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9753--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9753--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9753--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9753--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9753--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9753--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9753--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9753--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9753--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9753--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9753--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9753--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9753--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9753--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9753--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9753--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9753--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9753--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9753--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9753--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9753--   Scanning root segment: 0x701a000..0x701afff (4096)
--9753--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9753--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9753--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9753--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9753--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9753--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9753--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9753--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9753--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9753== Checked 4,890,920 bytes
==9753== 
==9753== LEAK SUMMARY:
==9753==    definitely lost: 2,181 bytes in 11 blocks
==9753==    indirectly lost: 6,756 bytes in 7 blocks
==9753==      possibly lost: 0 bytes in 0 blocks
==9753==    still reachable: 3,163,077 bytes in 69,617 blocks
==9753==         suppressed: 0 bytes in 0 blocks
==9753== Rerun with --leak-check=full to see details of leaked memory
==9753== 
==9753== Use --track-origins=yes to see where uninitialised values come from
==9753== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9753== 
==9753== 1 errors in context 1 of 2:
==9753== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9753==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9753==    by 0x488CD0: stringsubst (subst.c:301)
==9753==    by 0x48801B: prefork (subst.c:77)
==9753==    by 0x42B318: execcmd (exec.c:2619)
==9753==    by 0x428CA0: execpline2 (exec.c:1697)
==9753==    by 0x427FD2: execpline (exec.c:1484)
==9753==    by 0x427756: execlist (exec.c:1267)
==9753==    by 0x42717C: execode (exec.c:1073)
==9753==    by 0x431299: runshfunc (exec.c:5040)
==9753==    by 0x430E76: doshfunc (exec.c:4920)
==9753==    by 0x4302FB: execshfunc (exec.c:4557)
==9753==    by 0x42D8C1: execcmd (exec.c:3373)
==9753== 
==9753== 
==9753== 2 errors in context 2 of 2:
==9753== Conditional jump or move depends on uninitialised value(s)
==9753==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9753==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9753==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9753==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9753==    by 0x42D8E9: execcmd (exec.c:3378)
==9753==    by 0x428CA0: execpline2 (exec.c:1697)
==9753==    by 0x427FD2: execpline (exec.c:1484)
==9753==    by 0x42779A: execlist (exec.c:1275)
==9753==    by 0x42717C: execode (exec.c:1073)
==9753==    by 0x431299: runshfunc (exec.c:5040)
==9753==    by 0x430E76: doshfunc (exec.c:4920)
==9753==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9753== 
==9753== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF992C,  len 4
client request: code 4d430005,  addr 0xFFEFF87DC,  len 4
client request: code 4d430005,  addr 0xFFEFFB6EC,  len 4
--9723-- Caught __NR_exit; running __libc_freeres()
--9723-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9723== 
==9723== HEAP SUMMARY:
==9723==     in use at exit: 3,150,335 bytes in 69,153 blocks
==9723==   total heap usage: 1,468,723 allocs, 1,399,570 frees, 119,694,283 bytes allocated
==9723== 
==9723== Searching for pointers to 69,153 not-freed blocks
--9723--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9723--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9723--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9723--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9723--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9723--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9723--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9723--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9723--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9723--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9723--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9723--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9723--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9723--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9723--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9723--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9723--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9723--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9723--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9723--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9723--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9723--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9723--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9723--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9723--   Scanning root segment: 0x701a000..0x701afff (4096)
--9723--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9723--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9723--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9723--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9723--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9723--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9723--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9723--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9723--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d6c0 __GI_strcpy
--7806--     new: 0x05a3c8e0 (__GI_strcpy         ) R-> (2008.0) 0x04c2d5f0 strcpy
==7806== Ignoring duplicate redirection:
--7806--     old: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d2a0 __GI_strcat
--7806--     new: 0x05a3b000 (__GI_strcat         ) R-> (2003.0) 0x04c2d1c0 strcat
==9723== Checked 4,793,088 bytes
==9723== 
==9723== LEAK SUMMARY:
==9723==    definitely lost: 2,181 bytes in 11 blocks
==9723==    indirectly lost: 6,756 bytes in 7 blocks
==9723==      possibly lost: 0 bytes in 0 blocks
==9723==    still reachable: 3,141,398 bytes in 69,135 blocks
==9723==         suppressed: 0 bytes in 0 blocks
==9723== Rerun with --leak-check=full to see details of leaked memory
==9723== 
==9723== Use --track-origins=yes to see where uninitialised values come from
==9723== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9723== 
==9723== 1 errors in context 1 of 2:
==9723== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9723==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9723==    by 0x488CD0: stringsubst (subst.c:301)
==9723==    by 0x48801B: prefork (subst.c:77)
==9723==    by 0x42B318: execcmd (exec.c:2619)
==9723==    by 0x428CA0: execpline2 (exec.c:1697)
==9723==    by 0x427FD2: execpline (exec.c:1484)
==9723==    by 0x427756: execlist (exec.c:1267)
==9723==    by 0x42717C: execode (exec.c:1073)
==9723==    by 0x431299: runshfunc (exec.c:5040)
==9723==    by 0x430E76: doshfunc (exec.c:4920)
==9723==    by 0x4302FB: execshfunc (exec.c:4557)
==9723==    by 0x42D8C1: execcmd (exec.c:3373)
==9723== 
==9723== 
==9723== 2 errors in context 2 of 2:
==9723== Conditional jump or move depends on uninitialised value(s)
==9723==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9723==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9723==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9723==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9723==    by 0x42D8E9: execcmd (exec.c:3378)
==9723==    by 0x428CA0: execpline2 (exec.c:1697)
==9723==    by 0x427FD2: execpline (exec.c:1484)
==9723==    by 0x42779A: execlist (exec.c:1275)
==9723==    by 0x42717C: execode (exec.c:1073)
==9723==    by 0x431299: runshfunc (exec.c:5040)
==9723==    by 0x430E76: doshfunc (exec.c:4920)
==9723==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9723== 
==9723== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--7806-- memcheck GC: 1000 nodes, 929 survivors ( 92.9%)
--7806-- memcheck GC: 1414 new table size (stepup)
--9720-- Caught __NR_exit; running __libc_freeres()
--9720-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9720== 
==9720== HEAP SUMMARY:
==9720==     in use at exit: 3,120,310 bytes in 68,924 blocks
==9720==   total heap usage: 1,463,615 allocs, 1,394,691 frees, 117,961,236 bytes allocated
==9720== 
==9720== Searching for pointers to 68,924 not-freed blocks
--9720--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9720--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9720--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9720--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9720--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9720--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9720--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9720--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9720--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9720--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9720--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9720--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9720--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9720--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9720--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9720--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9720--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9720--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9720--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9720--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9720--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9720--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9720--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9720--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9720--   Scanning root segment: 0x701a000..0x701afff (4096)
--9720--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9720--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9720--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9720--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9720--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9720--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9720--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9720--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9720--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9758== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9758-by-pythonnut-on-???
==9758== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9758-by-pythonnut-on-???
==9758== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9758-by-pythonnut-on-???
==9758== 
==9758== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9758== don't want to do, unless you know exactly what you're doing,
==9758== or are doing some strange experiment):
==9758==   /usr/lib/valgrind/../../bin/vgdb --pid=9758 ...command...
==9758== 
==9758== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9758==   /path/to/gdb ./zsh
==9758== and then give GDB the following command
==9758==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9758
==9758== --pid is optional if only one valgrind process is running
==9758== 
--9759-- Caught __NR_exit; running __libc_freeres()
==9759== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9759-by-pythonnut-on-???
==9759== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9759-by-pythonnut-on-???
==9759== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9759-by-pythonnut-on-???
==9759== 
==9759== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9759== don't want to do, unless you know exactly what you're doing,
==9759== or are doing some strange experiment):
==9759==   /usr/lib/valgrind/../../bin/vgdb --pid=9759 ...command...
==9759== 
==9759== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9759==   /path/to/gdb ./zsh
==9759== and then give GDB the following command
==9759==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9759
==9759== --pid is optional if only one valgrind process is running
==9759== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--9759-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9759== 
==9759== HEAP SUMMARY:
==9759==     in use at exit: 3,124,574 bytes in 69,166 blocks
==9759==   total heap usage: 1,582,709 allocs, 1,513,543 frees, 127,430,363 bytes allocated
==9759== 
==9720== Checked 4,761,952 bytes
==9720== 
==9759== Searching for pointers to 69,166 not-freed blocks
--9759--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9759--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9759--   Scanning root segment: 0x4022000..0x4026fff (20480)
==9720== LEAK SUMMARY:
==9720==    definitely lost: 2,181 bytes in 11 blocks
==9720==    indirectly lost: 6,756 bytes in 7 blocks
==9720==      possibly lost: 0 bytes in 0 blocks
==9720==    still reachable: 3,111,373 bytes in 68,906 blocks
==9720==         suppressed: 0 bytes in 0 blocks
==9720== Rerun with --leak-check=full to see details of leaked memory
==9720== 
--9759--   Scanning root segment: 0x4049000..0x404cfff (16384)
==9720== Use --track-origins=yes to see where uninitialised values come from
==9720== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9720== 
==9720== 1 errors in context 1 of 2:
==9720== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9720==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9720==    by 0x488CD0: stringsubst (subst.c:301)
==9720==    by 0x48801B: prefork (subst.c:77)
==9720==    by 0x42B318: execcmd (exec.c:2619)
--9759--   Scanning root segment: 0x4222000..0x4222fff (4096)
==9720==    by 0x428CA0: execpline2 (exec.c:1697)
==9720==    by 0x427FD2: execpline (exec.c:1484)
==9720==    by 0x427756: execlist (exec.c:1267)
==9720==    by 0x42717C: execode (exec.c:1073)
--9759--   Scanning root segment: 0x4223000..0x4223fff (4096)
==9720==    by 0x431299: runshfunc (exec.c:5040)
==9720==    by 0x430E76: doshfunc (exec.c:4920)
==9720==    by 0x4302FB: execshfunc (exec.c:4557)
==9720==    by 0x42D8C1: execcmd (exec.c:3373)
==9720== 
--9759--   Scanning root segment: 0x4224000..0x4224fff (4096)
==9720== 
==9720== 2 errors in context 2 of 2:
==9720== Conditional jump or move depends on uninitialised value(s)
==9720==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
--9759--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
==9720==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9720==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9720==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9720==    by 0x42D8E9: execcmd (exec.c:3378)
--9759--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==9720==    by 0x428CA0: execpline2 (exec.c:1697)
==9720==    by 0x427FD2: execpline (exec.c:1484)
==9720==    by 0x42779A: execlist (exec.c:1275)
==9720==    by 0x42717C: execode (exec.c:1073)
==9720==    by 0x431299: runshfunc (exec.c:5040)
--9759--   Scanning root segment: 0x5041000..0x5041fff (4096)
==9720==    by 0x430E76: doshfunc (exec.c:4920)
==9720==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9720== 
==9720== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9759--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9759--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9759--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9759--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9759--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9759--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9759--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9759--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9759--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9759--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9759--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9759--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9759--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9759--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9759--   Scanning root segment: 0x701a000..0x701afff (4096)
--9759--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9759--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9759--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9759--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9759--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9759--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9759--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9759--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9759--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9759--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9649-- Caught __NR_exit; running __libc_freeres()
--9649-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9649== 
==9649== HEAP SUMMARY:
==9649==     in use at exit: 3,119,648 bytes in 68,911 blocks
==9649==   total heap usage: 1,463,655 allocs, 1,394,744 frees, 117,956,621 bytes allocated
==9649== 
==9649== Searching for pointers to 68,911 not-freed blocks
--9649--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9649--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9649--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9649--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9649--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9649--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9649--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9649--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9649--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9649--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9649--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9649--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9649--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9649--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9649--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9649--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9649--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9649--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9649--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9649--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9649--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9649--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9649--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9649--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9649--   Scanning root segment: 0x701a000..0x701afff (4096)
--9649--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9649--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9649--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9649--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9649--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9649--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9649--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9649--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9649--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9759== Checked 4,785,792 bytes
==9759== 
==9759== LEAK SUMMARY:
==9759==    definitely lost: 2,189 bytes in 12 blocks
==9759==    indirectly lost: 6,756 bytes in 7 blocks
==9759==      possibly lost: 0 bytes in 0 blocks
==9759==    still reachable: 3,115,629 bytes in 69,147 blocks
==9759==         suppressed: 0 bytes in 0 blocks
==9759== Rerun with --leak-check=full to see details of leaked memory
==9759== 
==9759== Use --track-origins=yes to see where uninitialised values come from
==9759== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9759== 
==9759== 1 errors in context 1 of 2:
==9759== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9759==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9759==    by 0x488CD0: stringsubst (subst.c:301)
==9759==    by 0x48801B: prefork (subst.c:77)
==9759==    by 0x42B318: execcmd (exec.c:2619)
==9759==    by 0x428CA0: execpline2 (exec.c:1697)
==9759==    by 0x427FD2: execpline (exec.c:1484)
==9759==    by 0x427756: execlist (exec.c:1267)
==9759==    by 0x42717C: execode (exec.c:1073)
==9759==    by 0x431299: runshfunc (exec.c:5040)
==9759==    by 0x430E76: doshfunc (exec.c:4920)
==9759==    by 0x4302FB: execshfunc (exec.c:4557)
==9759==    by 0x42D8C1: execcmd (exec.c:3373)
==9759== 
==9759== 
==9759== 2 errors in context 2 of 2:
==9759== Conditional jump or move depends on uninitialised value(s)
==9759==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9759==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9759==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9759==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9759==    by 0x42D8E9: execcmd (exec.c:3378)
==9759==    by 0x428CA0: execpline2 (exec.c:1697)
==9759==    by 0x427FD2: execpline (exec.c:1484)
==9759==    by 0x42779A: execlist (exec.c:1275)
==9759==    by 0x42717C: execode (exec.c:1073)
==9759==    by 0x431299: runshfunc (exec.c:5040)
==9759==    by 0x430E76: doshfunc (exec.c:4920)
==9759==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9759== 
==9759== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9758-- Caught __NR_exit; running __libc_freeres()
--9758-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9758== 
client request: code 4d430005,  addr 0xFFEFEBF0C,  len 4
==9758== HEAP SUMMARY:
==9758==     in use at exit: 3,124,510 bytes in 69,163 blocks
==9758==   total heap usage: 1,582,707 allocs, 1,513,544 frees, 127,430,122 bytes allocated
==9758== 
==9649== Checked 4,760,648 bytes
==9649== 
==9758== Searching for pointers to 69,163 not-freed blocks
--9758--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9758--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9758--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9758--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9758--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9758--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9758--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9758--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9758--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9758--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9758--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9758--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9758--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9758--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9758--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9758--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9758--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9758--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9758--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9758--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9758--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9758--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9758--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9758--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9758--   Scanning root segment: 0x701a000..0x701afff (4096)
--9758--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9758--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9758--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9758--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9758--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9758--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9758--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9758--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9758--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9758--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9649== LEAK SUMMARY:
==9649==    definitely lost: 2,181 bytes in 11 blocks
==9649==    indirectly lost: 6,756 bytes in 7 blocks
==9649==      possibly lost: 0 bytes in 0 blocks
==9649==    still reachable: 3,110,711 bytes in 68,893 blocks
==9649==         suppressed: 0 bytes in 0 blocks
==9649== Rerun with --leak-check=full to see details of leaked memory
==9649== 
==9649== Use --track-origins=yes to see where uninitialised values come from
==9649== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9649== 
==9649== 1 errors in context 1 of 2:
==9649== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9649==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9649==    by 0x488CD0: stringsubst (subst.c:301)
==9649==    by 0x48801B: prefork (subst.c:77)
==9649==    by 0x42B318: execcmd (exec.c:2619)
==9649==    by 0x428CA0: execpline2 (exec.c:1697)
==9649==    by 0x427FD2: execpline (exec.c:1484)
==9649==    by 0x427756: execlist (exec.c:1267)
==9649==    by 0x42717C: execode (exec.c:1073)
==9649==    by 0x431299: runshfunc (exec.c:5040)
==9649==    by 0x430E76: doshfunc (exec.c:4920)
==9649==    by 0x4302FB: execshfunc (exec.c:4557)
==9649==    by 0x42D8C1: execcmd (exec.c:3373)
==9649== 
==9649== 
==9649== 2 errors in context 2 of 2:
==9649== Conditional jump or move depends on uninitialised value(s)
==9649==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9649==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9649==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9649==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9649==    by 0x42D8E9: execcmd (exec.c:3378)
==9649==    by 0x428CA0: execpline2 (exec.c:1697)
==9649==    by 0x427FD2: execpline (exec.c:1484)
==9649==    by 0x42779A: execlist (exec.c:1275)
==9649==    by 0x42717C: execode (exec.c:1073)
==9649==    by 0x431299: runshfunc (exec.c:5040)
==9649==    by 0x430E76: doshfunc (exec.c:4920)
==9649==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9649== 
==9649== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9758== Checked 4,785,104 bytes
==9758== 
==9758== LEAK SUMMARY:
==9758==    definitely lost: 2,189 bytes in 12 blocks
==9758==    indirectly lost: 6,756 bytes in 7 blocks
==9758==      possibly lost: 0 bytes in 0 blocks
==9758==    still reachable: 3,115,565 bytes in 69,144 blocks
==9758==         suppressed: 0 bytes in 0 blocks
==9758== Rerun with --leak-check=full to see details of leaked memory
==9758== 
==9758== Use --track-origins=yes to see where uninitialised values come from
==9758== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9758== 
==9758== 1 errors in context 1 of 2:
==9758== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9758==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9758==    by 0x488CD0: stringsubst (subst.c:301)
==9758==    by 0x48801B: prefork (subst.c:77)
==9758==    by 0x42B318: execcmd (exec.c:2619)
==9758==    by 0x428CA0: execpline2 (exec.c:1697)
==9758==    by 0x427FD2: execpline (exec.c:1484)
==9758==    by 0x427756: execlist (exec.c:1267)
==9758==    by 0x42717C: execode (exec.c:1073)
==9758==    by 0x431299: runshfunc (exec.c:5040)
==9758==    by 0x430E76: doshfunc (exec.c:4920)
==9758==    by 0x4302FB: execshfunc (exec.c:4557)
==9758==    by 0x42D8C1: execcmd (exec.c:3373)
==9758== 
==9758== 
==9758== 2 errors in context 2 of 2:
==9758== Conditional jump or move depends on uninitialised value(s)
==9758==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9758==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9758==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9758==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9758==    by 0x42D8E9: execcmd (exec.c:3378)
==9758==    by 0x428CA0: execpline2 (exec.c:1697)
==9758==    by 0x427FD2: execpline (exec.c:1484)
==9758==    by 0x42779A: execlist (exec.c:1275)
==9758==    by 0x42717C: execode (exec.c:1073)
==9758==    by 0x431299: runshfunc (exec.c:5040)
==9758==    by 0x430E76: doshfunc (exec.c:4920)
==9758==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9758== 
==9758== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9762== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9762-by-pythonnut-on-???
==9762== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9762-by-pythonnut-on-???
==9762== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9762-by-pythonnut-on-???
==9762== 
==9762== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9762== don't want to do, unless you know exactly what you're doing,
==9762== or are doing some strange experiment):
==9762==   /usr/lib/valgrind/../../bin/vgdb --pid=9762 ...command...
==9762== 
==9762== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9762==   /path/to/gdb ./zsh
==9762== and then give GDB the following command
==9762==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9762
==9762== --pid is optional if only one valgrind process is running
==9762== 
--9762-- Caught __NR_exit; running __libc_freeres()
--9762-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9762== 
==9762== HEAP SUMMARY:
==9762==     in use at exit: 3,124,517 bytes in 69,163 blocks
==9762==   total heap usage: 1,583,166 allocs, 1,514,003 frees, 127,705,186 bytes allocated
==9762== 
==9762== Searching for pointers to 69,163 not-freed blocks
--9762--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9762--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9762--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9762--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9762--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9762--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9762--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9762--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9762--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9762--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9762--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9762--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9762--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9762--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9762--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9762--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9762--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9762--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9762--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9762--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9762--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9762--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9762--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9762--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9762--   Scanning root segment: 0x701a000..0x701afff (4096)
--9762--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9762--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9762--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9762--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9762--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9762--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9762--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9762--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9762--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9762--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9762== Checked 4,785,144 bytes
==9762== 
==9762== LEAK SUMMARY:
==9762==    definitely lost: 2,189 bytes in 12 blocks
==9762==    indirectly lost: 6,756 bytes in 7 blocks
==9762==      possibly lost: 0 bytes in 0 blocks
==9762==    still reachable: 3,115,572 bytes in 69,144 blocks
==9762==         suppressed: 0 bytes in 0 blocks
==9762== Rerun with --leak-check=full to see details of leaked memory
==9762== 
==9762== Use --track-origins=yes to see where uninitialised values come from
==9762== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9762== 
==9762== 1 errors in context 1 of 2:
==9762== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9762==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9762==    by 0x488CD0: stringsubst (subst.c:301)
==9762==    by 0x48801B: prefork (subst.c:77)
==9762==    by 0x42B318: execcmd (exec.c:2619)
==9762==    by 0x428CA0: execpline2 (exec.c:1697)
==9762==    by 0x427FD2: execpline (exec.c:1484)
==9762==    by 0x427756: execlist (exec.c:1267)
==9762==    by 0x42717C: execode (exec.c:1073)
==9762==    by 0x431299: runshfunc (exec.c:5040)
==9762==    by 0x430E76: doshfunc (exec.c:4920)
==9762==    by 0x4302FB: execshfunc (exec.c:4557)
==9762==    by 0x42D8C1: execcmd (exec.c:3373)
==9762== 
==9762== 
==9762== 2 errors in context 2 of 2:
==9762== Conditional jump or move depends on uninitialised value(s)
==9762==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9762==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9762==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9762==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9762==    by 0x42D8E9: execcmd (exec.c:3378)
==9762==    by 0x428CA0: execpline2 (exec.c:1697)
==9762==    by 0x427FD2: execpline (exec.c:1484)
==9762==    by 0x42779A: execlist (exec.c:1275)
==9762==    by 0x42717C: execode (exec.c:1073)
==9762==    by 0x431299: runshfunc (exec.c:5040)
==9762==    by 0x430E76: doshfunc (exec.c:4920)
==9762==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9762== 
==9762== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9763-- Caught __NR_exit; running __libc_freeres()
==9763== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9763-by-pythonnut-on-???
==9763== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9763-by-pythonnut-on-???
==9763== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9763-by-pythonnut-on-???
==9763== 
==9763== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9763== don't want to do, unless you know exactly what you're doing,
==9763== or are doing some strange experiment):
==9763==   /usr/lib/valgrind/../../bin/vgdb --pid=9763 ...command...
==9763== 
==9763== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9763==   /path/to/gdb ./zsh
==9763== and then give GDB the following command
==9763==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9763
==9763== --pid is optional if only one valgrind process is running
==9763== 
--9763-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9763== 
==9763== HEAP SUMMARY:
==9763==     in use at exit: 3,124,613 bytes in 69,163 blocks
==9763==   total heap usage: 1,583,182 allocs, 1,514,019 frees, 127,709,973 bytes allocated
==9763== 
==9763== Searching for pointers to 69,163 not-freed blocks
--9763--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9763--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9763--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9763--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9763--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9763--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9763--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9763--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9763--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9763--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9763--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9763--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9763--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9763--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9763--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9763--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9763--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9763--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9763--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9763--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9763--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9763--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9763--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9763--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9763--   Scanning root segment: 0x701a000..0x701afff (4096)
--9763--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9763--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9763--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9763--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9763--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9763--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9763--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9763--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9763--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9763--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9763== Checked 4,784,424 bytes
==9763== 
==9763== LEAK SUMMARY:
==9763==    definitely lost: 2,189 bytes in 12 blocks
==9763==    indirectly lost: 6,756 bytes in 7 blocks
==9763==      possibly lost: 0 bytes in 0 blocks
==9763==    still reachable: 3,115,668 bytes in 69,144 blocks
==9763==         suppressed: 0 bytes in 0 blocks
==9763== Rerun with --leak-check=full to see details of leaked memory
==9763== 
==9763== Use --track-origins=yes to see where uninitialised values come from
==9763== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9763== 
==9763== 1 errors in context 1 of 2:
==9763== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9763==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9763==    by 0x488CD0: stringsubst (subst.c:301)
==9763==    by 0x48801B: prefork (subst.c:77)
==9763==    by 0x42B318: execcmd (exec.c:2619)
==9763==    by 0x428CA0: execpline2 (exec.c:1697)
==9763==    by 0x427FD2: execpline (exec.c:1484)
==9763==    by 0x427756: execlist (exec.c:1267)
==9763==    by 0x42717C: execode (exec.c:1073)
==9763==    by 0x431299: runshfunc (exec.c:5040)
==9763==    by 0x430E76: doshfunc (exec.c:4920)
==9763==    by 0x4302FB: execshfunc (exec.c:4557)
==9763==    by 0x42D8C1: execcmd (exec.c:3373)
==9763== 
==9763== 
==9763== 2 errors in context 2 of 2:
==9763== Conditional jump or move depends on uninitialised value(s)
==9763==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9763==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9763==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9763==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9763==    by 0x42D8E9: execcmd (exec.c:3378)
==9763==    by 0x428CA0: execpline2 (exec.c:1697)
==9763==    by 0x427FD2: execpline (exec.c:1484)
==9763==    by 0x42779A: execlist (exec.c:1275)
==9763==    by 0x42717C: execode (exec.c:1073)
==9763==    by 0x431299: runshfunc (exec.c:5040)
==9763==    by 0x430E76: doshfunc (exec.c:4920)
==9763==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9763== 
==9763== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9766== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9766-by-pythonnut-on-???
==9766== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9766-by-pythonnut-on-???
==9766== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9766-by-pythonnut-on-???
==9766== 
==9766== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9766== don't want to do, unless you know exactly what you're doing,
==9766== or are doing some strange experiment):
==9766==   /usr/lib/valgrind/../../bin/vgdb --pid=9766 ...command...
==9766== 
==9766== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9766==   /path/to/gdb ./zsh
==9766== and then give GDB the following command
==9766==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9766
==9766== --pid is optional if only one valgrind process is running
==9766== 
--9766-- Caught __NR_exit; running __libc_freeres()
--9766-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9766== 
==9766== HEAP SUMMARY:
==9766==     in use at exit: 3,124,859 bytes in 69,169 blocks
==9766==   total heap usage: 1,583,230 allocs, 1,514,061 frees, 127,718,997 bytes allocated
==9766== 
==9766== Searching for pointers to 69,169 not-freed blocks
--9766--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9766--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9766--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9766--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9766--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9766--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9766--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9766--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9766--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9766--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9766--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9766--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9766--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9766--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9766--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9766--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9766--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9766--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9766--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9766--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9766--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9766--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9766--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9766--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9766--   Scanning root segment: 0x701a000..0x701afff (4096)
--9766--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9766--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9766--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9766--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9766--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9766--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9766--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9766--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9766--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9766--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9766== Checked 4,784,584 bytes
==9766== 
==9766== LEAK SUMMARY:
==9766==    definitely lost: 2,189 bytes in 12 blocks
==9766==    indirectly lost: 6,756 bytes in 7 blocks
==9766==      possibly lost: 0 bytes in 0 blocks
==9766==    still reachable: 3,115,914 bytes in 69,150 blocks
==9766==         suppressed: 0 bytes in 0 blocks
==9766== Rerun with --leak-check=full to see details of leaked memory
==9766== 
==9766== Use --track-origins=yes to see where uninitialised values come from
==9766== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9766== 
==9766== 1 errors in context 1 of 2:
==9766== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9766==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9766==    by 0x488CD0: stringsubst (subst.c:301)
==9766==    by 0x48801B: prefork (subst.c:77)
==9766==    by 0x42B318: execcmd (exec.c:2619)
==9766==    by 0x428CA0: execpline2 (exec.c:1697)
==9766==    by 0x427FD2: execpline (exec.c:1484)
==9766==    by 0x427756: execlist (exec.c:1267)
==9766==    by 0x42717C: execode (exec.c:1073)
==9766==    by 0x431299: runshfunc (exec.c:5040)
==9766==    by 0x430E76: doshfunc (exec.c:4920)
==9766==    by 0x4302FB: execshfunc (exec.c:4557)
==9766==    by 0x42D8C1: execcmd (exec.c:3373)
==9766== 
==9766== 
==9766== 2 errors in context 2 of 2:
==9766== Conditional jump or move depends on uninitialised value(s)
==9766==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9766==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9766==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9766==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9766==    by 0x42D8E9: execcmd (exec.c:3378)
==9766==    by 0x428CA0: execpline2 (exec.c:1697)
==9766==    by 0x427FD2: execpline (exec.c:1484)
==9766==    by 0x42779A: execlist (exec.c:1275)
==9766==    by 0x42717C: execode (exec.c:1073)
==9766==    by 0x431299: runshfunc (exec.c:5040)
==9766==    by 0x430E76: doshfunc (exec.c:4920)
==9766==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9766== 
==9766== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9767-- Caught __NR_exit; running __libc_freeres()
==9767== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9767-by-pythonnut-on-???
==9767== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9767-by-pythonnut-on-???
==9767== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9767-by-pythonnut-on-???
==9767== 
==9767== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9767== don't want to do, unless you know exactly what you're doing,
==9767== or are doing some strange experiment):
==9767==   /usr/lib/valgrind/../../bin/vgdb --pid=9767 ...command...
==9767== 
==9767== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9767==   /path/to/gdb ./zsh
==9767== and then give GDB the following command
==9767==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9767
==9767== --pid is optional if only one valgrind process is running
==9767== 
--9767-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9767== 
==9767== HEAP SUMMARY:
==9767==     in use at exit: 3,124,795 bytes in 69,169 blocks
==9767==   total heap usage: 1,583,210 allocs, 1,514,041 frees, 127,716,767 bytes allocated
==9767== 
==9767== Searching for pointers to 69,169 not-freed blocks
--9767--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9767--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9767--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9767--   Scanning root segment: 0x4037000..0x403afff (16384)
--9767--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9767--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9767--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9767--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9767--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9767--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9767--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9767--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9767--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9767--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9767--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9767--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9767--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9767--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9767--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9767--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9767--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9767--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9767--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9767--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9767--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9767--   Scanning root segment: 0x701a000..0x701afff (4096)
--9767--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9767--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9767--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9767--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9767--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9767--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9767--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9767--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9767--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9767--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9767== Checked 4,800,904 bytes
==9767== 
==9767== LEAK SUMMARY:
==9767==    definitely lost: 2,189 bytes in 12 blocks
==9767==    indirectly lost: 6,756 bytes in 7 blocks
==9767==      possibly lost: 0 bytes in 0 blocks
==9767==    still reachable: 3,115,850 bytes in 69,150 blocks
==9767==         suppressed: 0 bytes in 0 blocks
==9767== Rerun with --leak-check=full to see details of leaked memory
==9767== 
==9767== Use --track-origins=yes to see where uninitialised values come from
==9767== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9767== 
==9767== 1 errors in context 1 of 2:
==9767== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9767==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9767==    by 0x488CD0: stringsubst (subst.c:301)
==9767==    by 0x48801B: prefork (subst.c:77)
==9767==    by 0x42B318: execcmd (exec.c:2619)
==9767==    by 0x428CA0: execpline2 (exec.c:1697)
==9767==    by 0x427FD2: execpline (exec.c:1484)
==9767==    by 0x427756: execlist (exec.c:1267)
==9767==    by 0x42717C: execode (exec.c:1073)
==9767==    by 0x431299: runshfunc (exec.c:5040)
==9767==    by 0x430E76: doshfunc (exec.c:4920)
==9767==    by 0x4302FB: execshfunc (exec.c:4557)
==9767==    by 0x42D8C1: execcmd (exec.c:3373)
==9767== 
==9767== 
==9767== 2 errors in context 2 of 2:
==9767== Conditional jump or move depends on uninitialised value(s)
==9767==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9767==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9767==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9767==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9767==    by 0x42D8E9: execcmd (exec.c:3378)
==9767==    by 0x428CA0: execpline2 (exec.c:1697)
==9767==    by 0x427FD2: execpline (exec.c:1484)
==9767==    by 0x42779A: execlist (exec.c:1275)
==9767==    by 0x42717C: execode (exec.c:1073)
==9767==    by 0x431299: runshfunc (exec.c:5040)
==9767==    by 0x430E76: doshfunc (exec.c:4920)
==9767==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9767== 
==9767== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9769== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9769-by-pythonnut-on-???
==9769== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9769-by-pythonnut-on-???
==9769== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9769-by-pythonnut-on-???
==9769== 
==9769== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9769== don't want to do, unless you know exactly what you're doing,
==9769== or are doing some strange experiment):
==9769==   /usr/lib/valgrind/../../bin/vgdb --pid=9769 ...command...
==9769== 
==9769== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9769==   /path/to/gdb ./zsh
==9769== and then give GDB the following command
==9769==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9769
==9769== --pid is optional if only one valgrind process is running
==9769== 
--9769-- Caught __NR_exit; running __libc_freeres()
--9769-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9769== 
==9769== HEAP SUMMARY:
==9769==     in use at exit: 3,124,833 bytes in 69,170 blocks
==9769==   total heap usage: 1,583,223 allocs, 1,514,053 frees, 127,719,464 bytes allocated
==9769== 
==9769== Searching for pointers to 69,170 not-freed blocks
--9769--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9769--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9769--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9769--   Scanning root segment: 0x4037000..0x403afff (16384)
--9769--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9769--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9769--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9769--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9769--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9769--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9769--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9769--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9769--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9769--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9769--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9769--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9769--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9769--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9769--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9769--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9769--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9769--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9769--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9769--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9769--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9769--   Scanning root segment: 0x701a000..0x701afff (4096)
--9769--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9769--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9769--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9769--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9769--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9769--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9769--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9769--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9769--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9769--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9769== Checked 4,800,424 bytes
==9769== 
==9769== LEAK SUMMARY:
==9769==    definitely lost: 2,189 bytes in 12 blocks
==9769==    indirectly lost: 6,756 bytes in 7 blocks
==9769==      possibly lost: 0 bytes in 0 blocks
==9769==    still reachable: 3,115,888 bytes in 69,151 blocks
==9769==         suppressed: 0 bytes in 0 blocks
==9769== Rerun with --leak-check=full to see details of leaked memory
==9769== 
==9769== Use --track-origins=yes to see where uninitialised values come from
==9769== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9769== 
==9769== 1 errors in context 1 of 2:
==9769== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9769==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9769==    by 0x488CD0: stringsubst (subst.c:301)
==9769==    by 0x48801B: prefork (subst.c:77)
==9769==    by 0x42B318: execcmd (exec.c:2619)
==9769==    by 0x428CA0: execpline2 (exec.c:1697)
==9769==    by 0x427FD2: execpline (exec.c:1484)
==9769==    by 0x427756: execlist (exec.c:1267)
==9769==    by 0x42717C: execode (exec.c:1073)
==9769==    by 0x431299: runshfunc (exec.c:5040)
==9769==    by 0x430E76: doshfunc (exec.c:4920)
==9769==    by 0x4302FB: execshfunc (exec.c:4557)
==9769==    by 0x42D8C1: execcmd (exec.c:3373)
==9769== 
==9769== 
==9769== 2 errors in context 2 of 2:
==9769== Conditional jump or move depends on uninitialised value(s)
==9769==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9769==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9769==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9769==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9769==    by 0x42D8E9: execcmd (exec.c:3378)
==9769==    by 0x428CA0: execpline2 (exec.c:1697)
==9769==    by 0x427FD2: execpline (exec.c:1484)
==9769==    by 0x42779A: execlist (exec.c:1275)
==9769==    by 0x42717C: execode (exec.c:1073)
==9769==    by 0x431299: runshfunc (exec.c:5040)
==9769==    by 0x430E76: doshfunc (exec.c:4920)
==9769==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9769== 
==9769== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9770== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9770-by-pythonnut-on-???
==9770== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9770-by-pythonnut-on-???
==9770== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9770-by-pythonnut-on-???
==9770== 
==9770== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9770== don't want to do, unless you know exactly what you're doing,
==9770== or are doing some strange experiment):
==9770==   /usr/lib/valgrind/../../bin/vgdb --pid=9770 ...command...
==9770== 
==9770== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9770==   /path/to/gdb ./zsh
==9770== and then give GDB the following command
==9770==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9770
==9770== --pid is optional if only one valgrind process is running
==9770== 
--9770-- Caught __NR_exit; running __libc_freeres()
--9770-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9770== 
==9770== HEAP SUMMARY:
==9770==     in use at exit: 3,124,052 bytes in 69,171 blocks
==9770==   total heap usage: 1,584,533 allocs, 1,515,362 frees, 127,789,264 bytes allocated
==9770== 
==9770== Searching for pointers to 69,171 not-freed blocks
--9770--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9770--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9770--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9770--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9770--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9770--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9770--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9770--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9770--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9770--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9770--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9770--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9770--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9770--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9770--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9770--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9770--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9770--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9770--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9770--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9770--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9770--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9770--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9770--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9770--   Scanning root segment: 0x701a000..0x701afff (4096)
--9770--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9770--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9770--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9770--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9770--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9770--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9770--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9770--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9770--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9770--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9770== Checked 4,785,920 bytes
==9770== 
==9770== LEAK SUMMARY:
==9770==    definitely lost: 2,189 bytes in 12 blocks
==9770==    indirectly lost: 6,756 bytes in 7 blocks
==9770==      possibly lost: 0 bytes in 0 blocks
==9770==    still reachable: 3,115,107 bytes in 69,152 blocks
==9770==         suppressed: 0 bytes in 0 blocks
==9770== Rerun with --leak-check=full to see details of leaked memory
==9770== 
==9770== Use --track-origins=yes to see where uninitialised values come from
==9770== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9770== 
==9770== 1 errors in context 1 of 2:
==9770== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9770==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9770==    by 0x488CD0: stringsubst (subst.c:301)
==9770==    by 0x48801B: prefork (subst.c:77)
==9770==    by 0x42B318: execcmd (exec.c:2619)
==9770==    by 0x428CA0: execpline2 (exec.c:1697)
==9770==    by 0x427FD2: execpline (exec.c:1484)
==9770==    by 0x427756: execlist (exec.c:1267)
==9770==    by 0x42717C: execode (exec.c:1073)
==9770==    by 0x431299: runshfunc (exec.c:5040)
==9770==    by 0x430E76: doshfunc (exec.c:4920)
==9770==    by 0x4302FB: execshfunc (exec.c:4557)
==9770==    by 0x42D8C1: execcmd (exec.c:3373)
==9770== 
==9770== 
==9770== 2 errors in context 2 of 2:
==9770== Conditional jump or move depends on uninitialised value(s)
==9770==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9770==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9770==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9770==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9770==    by 0x42D8E9: execcmd (exec.c:3378)
==9770==    by 0x428CA0: execpline2 (exec.c:1697)
==9770==    by 0x427FD2: execpline (exec.c:1484)
==9770==    by 0x42779A: execlist (exec.c:1275)
==9770==    by 0x42717C: execode (exec.c:1073)
==9770==    by 0x431299: runshfunc (exec.c:5040)
==9770==    by 0x430E76: doshfunc (exec.c:4920)
==9770==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9770== 
==9770== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9771-- Caught __NR_exit; running __libc_freeres()
==9771== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9771-by-pythonnut-on-???
==9771== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9771-by-pythonnut-on-???
==9771== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9771-by-pythonnut-on-???
==9771== 
==9771== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9771== don't want to do, unless you know exactly what you're doing,
==9771== or are doing some strange experiment):
==9771==   /usr/lib/valgrind/../../bin/vgdb --pid=9771 ...command...
==9771== 
==9771== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9771==   /path/to/gdb ./zsh
==9771== and then give GDB the following command
==9771==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9771
==9771== --pid is optional if only one valgrind process is running
==9771== 
--9771-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9771== 
==9771== HEAP SUMMARY:
==9771==     in use at exit: 3,124,116 bytes in 69,171 blocks
==9771==   total heap usage: 1,584,539 allocs, 1,515,368 frees, 127,797,840 bytes allocated
==9771== 
==9771== Searching for pointers to 69,171 not-freed blocks
--9771--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9771--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9771--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9771--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9771--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9771--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9771--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9771--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9771--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9771--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9771--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9771--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9771--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9771--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9771--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9771--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9771--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9771--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9771--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9771--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9771--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9771--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9771--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9771--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9771--   Scanning root segment: 0x701a000..0x701afff (4096)
--9771--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9771--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9771--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9771--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9771--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9771--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9771--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9771--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9771--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9771--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9771== Checked 4,788,016 bytes
==9771== 
==9771== LEAK SUMMARY:
==9771==    definitely lost: 2,189 bytes in 12 blocks
==9771==    indirectly lost: 6,756 bytes in 7 blocks
==9771==      possibly lost: 0 bytes in 0 blocks
==9771==    still reachable: 3,115,171 bytes in 69,152 blocks
==9771==         suppressed: 0 bytes in 0 blocks
==9771== Rerun with --leak-check=full to see details of leaked memory
==9771== 
==9771== Use --track-origins=yes to see where uninitialised values come from
==9771== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9771== 
==9771== 1 errors in context 1 of 2:
==9771== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9771==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9771==    by 0x488CD0: stringsubst (subst.c:301)
==9771==    by 0x48801B: prefork (subst.c:77)
==9771==    by 0x42B318: execcmd (exec.c:2619)
==9771==    by 0x428CA0: execpline2 (exec.c:1697)
==9771==    by 0x427FD2: execpline (exec.c:1484)
==9771==    by 0x427756: execlist (exec.c:1267)
==9771==    by 0x42717C: execode (exec.c:1073)
==9771==    by 0x431299: runshfunc (exec.c:5040)
==9771==    by 0x430E76: doshfunc (exec.c:4920)
==9771==    by 0x4302FB: execshfunc (exec.c:4557)
==9771==    by 0x42D8C1: execcmd (exec.c:3373)
==9771== 
==9771== 
==9771== 2 errors in context 2 of 2:
==9771== Conditional jump or move depends on uninitialised value(s)
==9771==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9771==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9771==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9771==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9771==    by 0x42D8E9: execcmd (exec.c:3378)
==9771==    by 0x428CA0: execpline2 (exec.c:1697)
==9771==    by 0x427FD2: execpline (exec.c:1484)
==9771==    by 0x42779A: execlist (exec.c:1275)
==9771==    by 0x42717C: execode (exec.c:1073)
==9771==    by 0x431299: runshfunc (exec.c:5040)
==9771==    by 0x430E76: doshfunc (exec.c:4920)
==9771==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9771== 
==9771== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9772== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9772-by-pythonnut-on-???
==9772== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9772-by-pythonnut-on-???
==9772== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9772-by-pythonnut-on-???
==9772== 
==9772== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9772== don't want to do, unless you know exactly what you're doing,
==9772== or are doing some strange experiment):
==9772==   /usr/lib/valgrind/../../bin/vgdb --pid=9772 ...command...
==9772== 
==9772== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9772==   /path/to/gdb ./zsh
==9772== and then give GDB the following command
==9772==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9772
==9772== --pid is optional if only one valgrind process is running
==9772== 
==9773== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9773-by-pythonnut-on-???
==9773== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9773-by-pythonnut-on-???
==9773== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9773-by-pythonnut-on-???
==9773== 
==9773== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9773== don't want to do, unless you know exactly what you're doing,
==9773== or are doing some strange experiment):
==9773==   /usr/lib/valgrind/../../bin/vgdb --pid=9773 ...command...
==9773== 
==9773== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9773==   /path/to/gdb ./zsh
==9773== and then give GDB the following command
==9773==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9773
==9773== --pid is optional if only one valgrind process is running
==9773== 
==9776== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9776-by-pythonnut-on-???
==9776== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9776-by-pythonnut-on-???
==9776== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9776-by-pythonnut-on-???
==9776== 
==9776== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9776== don't want to do, unless you know exactly what you're doing,
==9776== or are doing some strange experiment):
==9776==   /usr/lib/valgrind/../../bin/vgdb --pid=9776 ...command...
==9776== 
==9776== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9776==   /path/to/gdb ./zsh
==9776== and then give GDB the following command
==9776==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9776
==9776== --pid is optional if only one valgrind process is running
==9776== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--9776-- Caught __NR_exit; running __libc_freeres()
--9776-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9776== 
==9776== HEAP SUMMARY:
==9776==     in use at exit: 3,127,929 bytes in 69,238 blocks
==9776==   total heap usage: 1,584,700 allocs, 1,515,462 frees, 127,827,154 bytes allocated
==9776== 
==9776== Searching for pointers to 69,238 not-freed blocks
--9776--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9776--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9776--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9776--   Scanning root segment: 0x4037000..0x403afff (16384)
--9776--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9776--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9776--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9776--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9776--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9776--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9776--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9776--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9776--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9776--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9776--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9776--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9776--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9776--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9776--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9776--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9776--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9776--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9776--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9776--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9776--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9776--   Scanning root segment: 0x701a000..0x701afff (4096)
--9776--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9776--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9776--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9776--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9776--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9776--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9776--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9776--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9776--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9776--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9776== Checked 4,810,576 bytes
==9776== 
==9776== LEAK SUMMARY:
==9776==    definitely lost: 2,189 bytes in 12 blocks
==9776==    indirectly lost: 6,756 bytes in 7 blocks
==9776==      possibly lost: 0 bytes in 0 blocks
==9776==    still reachable: 3,118,984 bytes in 69,219 blocks
==9776==         suppressed: 0 bytes in 0 blocks
==9776== Rerun with --leak-check=full to see details of leaked memory
==9776== 
==9776== Use --track-origins=yes to see where uninitialised values come from
==9776== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9776== 
==9776== 1 errors in context 1 of 2:
==9776== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9776==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9776==    by 0x488CD0: stringsubst (subst.c:301)
==9776==    by 0x48801B: prefork (subst.c:77)
==9776==    by 0x42B318: execcmd (exec.c:2619)
==9776==    by 0x428CA0: execpline2 (exec.c:1697)
==9776==    by 0x427FD2: execpline (exec.c:1484)
==9776==    by 0x427756: execlist (exec.c:1267)
==9776==    by 0x42717C: execode (exec.c:1073)
==9776==    by 0x431299: runshfunc (exec.c:5040)
==9776==    by 0x430E76: doshfunc (exec.c:4920)
==9776==    by 0x4302FB: execshfunc (exec.c:4557)
==9776==    by 0x42D8C1: execcmd (exec.c:3373)
==9776== 
==9776== 
==9776== 2 errors in context 2 of 2:
==9776== Conditional jump or move depends on uninitialised value(s)
==9776==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9776==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9776==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9776==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9776==    by 0x42D8E9: execcmd (exec.c:3378)
==9776==    by 0x428CA0: execpline2 (exec.c:1697)
==9776==    by 0x427FD2: execpline (exec.c:1484)
==9776==    by 0x42779A: execlist (exec.c:1275)
==9776==    by 0x42717C: execode (exec.c:1073)
==9776==    by 0x431299: runshfunc (exec.c:5040)
==9776==    by 0x430E76: doshfunc (exec.c:4920)
==9776==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9776== 
==9776== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9779-- Caught __NR_exit; running __libc_freeres()
==9779== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9779-by-pythonnut-on-???
==9779== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9779-by-pythonnut-on-???
==9779== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9779-by-pythonnut-on-???
==9779== 
==9779== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9779== don't want to do, unless you know exactly what you're doing,
==9779== or are doing some strange experiment):
==9779==   /usr/lib/valgrind/../../bin/vgdb --pid=9779 ...command...
==9779== 
==9779== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9779==   /path/to/gdb ./zsh
==9779== and then give GDB the following command
==9779==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9779
==9779== --pid is optional if only one valgrind process is running
==9779== 
==9780== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9780-by-pythonnut-on-???
==9780== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9780-by-pythonnut-on-???
==9780== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9780-by-pythonnut-on-???
==9780== 
==9780== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9780== don't want to do, unless you know exactly what you're doing,
==9780== or are doing some strange experiment):
==9780==   /usr/lib/valgrind/../../bin/vgdb --pid=9780 ...command...
==9780== 
==9780== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9780==   /path/to/gdb ./zsh
==9780== and then give GDB the following command
==9780==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9780
==9780== --pid is optional if only one valgrind process is running
==9780== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9779-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9779== 
==9779== HEAP SUMMARY:
==9779==     in use at exit: 3,164,796 bytes in 69,245 blocks
==9779==   total heap usage: 1,584,707 allocs, 1,515,462 frees, 127,867,077 bytes allocated
==9779== 
==9779== Searching for pointers to 69,245 not-freed blocks
--9779--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9779--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9779--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9779--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9779--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9779--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9779--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9779--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9779--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9779--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9779--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9779--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9779--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9779--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9779--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9779--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9779--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9779--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9779--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9779--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9779--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9779--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9779--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9779--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9779--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9779--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9779--   Scanning root segment: 0x701a000..0x701afff (4096)
--9779--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9779--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9779--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9779--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9779--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9779--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9779--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9779--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9779--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9779--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9779== Checked 4,922,392 bytes
==9779== 
==9779== LEAK SUMMARY:
==9779==    definitely lost: 2,189 bytes in 12 blocks
==9779==    indirectly lost: 6,756 bytes in 7 blocks
==9779==      possibly lost: 0 bytes in 0 blocks
==9779==    still reachable: 3,155,851 bytes in 69,226 blocks
==9779==         suppressed: 0 bytes in 0 blocks
==9779== Rerun with --leak-check=full to see details of leaked memory
==9779== 
==9779== Use --track-origins=yes to see where uninitialised values come from
==9779== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9779== 
==9779== 1 errors in context 1 of 2:
==9779== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9779==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9779==    by 0x488CD0: stringsubst (subst.c:301)
==9779==    by 0x48801B: prefork (subst.c:77)
==9779==    by 0x42B318: execcmd (exec.c:2619)
==9779==    by 0x428CA0: execpline2 (exec.c:1697)
==9779==    by 0x427FD2: execpline (exec.c:1484)
==9779==    by 0x427756: execlist (exec.c:1267)
==9779==    by 0x42717C: execode (exec.c:1073)
==9779==    by 0x431299: runshfunc (exec.c:5040)
==9779==    by 0x430E76: doshfunc (exec.c:4920)
==9779==    by 0x4302FB: execshfunc (exec.c:4557)
==9779==    by 0x42D8C1: execcmd (exec.c:3373)
==9779== 
==9779== 
==9779== 2 errors in context 2 of 2:
==9779== Conditional jump or move depends on uninitialised value(s)
==9779==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9779==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9779==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9779==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9779==    by 0x42D8E9: execcmd (exec.c:3378)
==9779==    by 0x428CA0: execpline2 (exec.c:1697)
==9779==    by 0x427FD2: execpline (exec.c:1484)
==9779==    by 0x42779A: execlist (exec.c:1275)
==9779==    by 0x42717C: execode (exec.c:1073)
==9779==    by 0x431299: runshfunc (exec.c:5040)
==9779==    by 0x430E76: doshfunc (exec.c:4920)
==9779==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9779== 
==9779== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9778== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9778-by-pythonnut-on-???
==9778== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9778-by-pythonnut-on-???
==9778== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9778-by-pythonnut-on-???
==9778== 
==9778== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9778== don't want to do, unless you know exactly what you're doing,
==9778== or are doing some strange experiment):
==9778==   /usr/lib/valgrind/../../bin/vgdb --pid=9778 ...command...
==9778== 
==9778== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9778==   /path/to/gdb ./zsh
==9778== and then give GDB the following command
==9778==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9778
==9778== --pid is optional if only one valgrind process is running
==9778== 
--9778-- Caught __NR_exit; running __libc_freeres()
--9778-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9778== 
==9778== HEAP SUMMARY:
==9778==     in use at exit: 3,164,764 bytes in 69,242 blocks
==9778==   total heap usage: 1,584,710 allocs, 1,515,468 frees, 127,867,685 bytes allocated
==9778== 
==9778== Searching for pointers to 69,242 not-freed blocks
--9778--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9778--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9778--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9778--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9778--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9778--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9778--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9778--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9778--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9778--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9778--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9778--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9778--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9778--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9778--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9778--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9778--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9778--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9778--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9778--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9778--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9778--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9778--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9778--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9778--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9778--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9778--   Scanning root segment: 0x701a000..0x701afff (4096)
--9778--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9778--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9778--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9778--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9778--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9778--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9778--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9778--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9778--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9778--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9778== Checked 4,921,720 bytes
==9778== 
==9778== LEAK SUMMARY:
==9778==    definitely lost: 2,189 bytes in 12 blocks
==9778==    indirectly lost: 6,756 bytes in 7 blocks
==9778==      possibly lost: 0 bytes in 0 blocks
==9778==    still reachable: 3,155,819 bytes in 69,223 blocks
==9778==         suppressed: 0 bytes in 0 blocks
==9778== Rerun with --leak-check=full to see details of leaked memory
==9778== 
==9778== Use --track-origins=yes to see where uninitialised values come from
==9778== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9778== 
==9778== 1 errors in context 1 of 2:
==9778== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9778==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9778==    by 0x488CD0: stringsubst (subst.c:301)
==9778==    by 0x48801B: prefork (subst.c:77)
==9778==    by 0x42B318: execcmd (exec.c:2619)
==9778==    by 0x428CA0: execpline2 (exec.c:1697)
==9778==    by 0x427FD2: execpline (exec.c:1484)
==9778==    by 0x427756: execlist (exec.c:1267)
==9778==    by 0x42717C: execode (exec.c:1073)
==9778==    by 0x431299: runshfunc (exec.c:5040)
==9778==    by 0x430E76: doshfunc (exec.c:4920)
==9778==    by 0x4302FB: execshfunc (exec.c:4557)
==9778==    by 0x42D8C1: execcmd (exec.c:3373)
==9778== 
==9778== 
==9778== 2 errors in context 2 of 2:
==9778== Conditional jump or move depends on uninitialised value(s)
==9778==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9778==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9778==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9778==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9778==    by 0x42D8E9: execcmd (exec.c:3378)
==9778==    by 0x428CA0: execpline2 (exec.c:1697)
==9778==    by 0x427FD2: execpline (exec.c:1484)
==9778==    by 0x42779A: execlist (exec.c:1275)
==9778==    by 0x42717C: execode (exec.c:1073)
==9778==    by 0x431299: runshfunc (exec.c:5040)
==9778==    by 0x430E76: doshfunc (exec.c:4920)
==9778==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9778== 
==9778== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9781== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9781-by-pythonnut-on-???
==9781== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9781-by-pythonnut-on-???
==9781== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9781-by-pythonnut-on-???
==9781== 
==9781== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9781== don't want to do, unless you know exactly what you're doing,
==9781== or are doing some strange experiment):
==9781==   /usr/lib/valgrind/../../bin/vgdb --pid=9781 ...command...
==9781== 
==9781== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9781==   /path/to/gdb ./zsh
==9781== and then give GDB the following command
==9781==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9781
==9781== --pid is optional if only one valgrind process is running
==9781== 
==9782== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9782-by-pythonnut-on-???
==9782== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9782-by-pythonnut-on-???
==9782== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9782-by-pythonnut-on-???
==9782== 
==9782== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9782== don't want to do, unless you know exactly what you're doing,
==9782== or are doing some strange experiment):
==9782==   /usr/lib/valgrind/../../bin/vgdb --pid=9782 ...command...
==9782== 
==9782== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9782==   /path/to/gdb ./zsh
==9782== and then give GDB the following command
==9782==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9782
==9782== --pid is optional if only one valgrind process is running
==9782== 
--9782-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--9782-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9782== 
==9782== HEAP SUMMARY:
==9782==     in use at exit: 3,201,478 bytes in 69,248 blocks
==9782==   total heap usage: 1,584,716 allocs, 1,515,468 frees, 127,905,912 bytes allocated
==9782== 
==9782== Searching for pointers to 69,248 not-freed blocks
--9782--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9782--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9782--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9782--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9782--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9782--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9782--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9782--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9782--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9782--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9782--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9782--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9782--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9782--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9782--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9782--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9782--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9782--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9782--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9782--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9782--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9782--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9782--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9782--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9782--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9782--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9782--   Scanning root segment: 0x701a000..0x701afff (4096)
--9782--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9782--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9782--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9782--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9782--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9782--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9782--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9782--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9782--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9782--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9782== Checked 4,995,912 bytes
==9782== 
==9782== LEAK SUMMARY:
==9782==    definitely lost: 2,189 bytes in 12 blocks
==9782==    indirectly lost: 6,756 bytes in 7 blocks
==9782==      possibly lost: 0 bytes in 0 blocks
==9782==    still reachable: 3,192,533 bytes in 69,229 blocks
==9782==         suppressed: 0 bytes in 0 blocks
==9782== Rerun with --leak-check=full to see details of leaked memory
==9782== 
==9782== Use --track-origins=yes to see where uninitialised values come from
==9782== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9782== 
==9782== 1 errors in context 1 of 2:
==9782== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9782==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9782==    by 0x488CD0: stringsubst (subst.c:301)
==9782==    by 0x48801B: prefork (subst.c:77)
==9782==    by 0x42B318: execcmd (exec.c:2619)
==9782==    by 0x428CA0: execpline2 (exec.c:1697)
==9782==    by 0x427FD2: execpline (exec.c:1484)
==9782==    by 0x427756: execlist (exec.c:1267)
==9782==    by 0x42717C: execode (exec.c:1073)
==9782==    by 0x431299: runshfunc (exec.c:5040)
==9782==    by 0x430E76: doshfunc (exec.c:4920)
==9782==    by 0x4302FB: execshfunc (exec.c:4557)
==9782==    by 0x42D8C1: execcmd (exec.c:3373)
==9782== 
==9782== 
==9782== 2 errors in context 2 of 2:
==9782== Conditional jump or move depends on uninitialised value(s)
==9782==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9782==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9782==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9782==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9782==    by 0x42D8E9: execcmd (exec.c:3378)
==9782==    by 0x428CA0: execpline2 (exec.c:1697)
==9782==    by 0x427FD2: execpline (exec.c:1484)
==9782==    by 0x42779A: execlist (exec.c:1275)
==9782==    by 0x42717C: execode (exec.c:1073)
==9782==    by 0x431299: runshfunc (exec.c:5040)
==9782==    by 0x430E76: doshfunc (exec.c:4920)
==9782==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9782== 
==9782== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9781-- Caught __NR_exit; running __libc_freeres()
--9781-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9781== 
==9781== HEAP SUMMARY:
==9781==     in use at exit: 3,164,838 bytes in 69,245 blocks
==9781==   total heap usage: 1,584,719 allocs, 1,515,474 frees, 127,906,488 bytes allocated
==9781== 
==9781== Searching for pointers to 69,245 not-freed blocks
--9781--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9781--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9781--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9781--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9781--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9781--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9781--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9781--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9781--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9781--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9781--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9781--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9781--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9781--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9781--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9781--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9781--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9781--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9781--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9781--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9781--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9781--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9781--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9781--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9781--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9781--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9781--   Scanning root segment: 0x701a000..0x701afff (4096)
--9781--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9781--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9781--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9781--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9781--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9781--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9781--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9781--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9781--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9781--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9781== Checked 4,958,648 bytes
==9781== 
==9781== LEAK SUMMARY:
==9781==    definitely lost: 2,189 bytes in 12 blocks
==9781==    indirectly lost: 6,756 bytes in 7 blocks
==9781==      possibly lost: 0 bytes in 0 blocks
==9781==    still reachable: 3,155,893 bytes in 69,226 blocks
==9781==         suppressed: 0 bytes in 0 blocks
==9781== Rerun with --leak-check=full to see details of leaked memory
==9781== 
==9781== Use --track-origins=yes to see where uninitialised values come from
==9781== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9781== 
==9781== 1 errors in context 1 of 2:
==9781== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9781==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9781==    by 0x488CD0: stringsubst (subst.c:301)
==9781==    by 0x48801B: prefork (subst.c:77)
==9781==    by 0x42B318: execcmd (exec.c:2619)
==9781==    by 0x428CA0: execpline2 (exec.c:1697)
==9781==    by 0x427FD2: execpline (exec.c:1484)
==9781==    by 0x427756: execlist (exec.c:1267)
==9781==    by 0x42717C: execode (exec.c:1073)
==9781==    by 0x431299: runshfunc (exec.c:5040)
==9781==    by 0x430E76: doshfunc (exec.c:4920)
==9781==    by 0x4302FB: execshfunc (exec.c:4557)
==9781==    by 0x42D8C1: execcmd (exec.c:3373)
==9781== 
==9781== 
==9781== 2 errors in context 2 of 2:
==9781== Conditional jump or move depends on uninitialised value(s)
==9781==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9781==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9781==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9781==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9781==    by 0x42D8E9: execcmd (exec.c:3378)
==9781==    by 0x428CA0: execpline2 (exec.c:1697)
==9781==    by 0x427FD2: execpline (exec.c:1484)
==9781==    by 0x42779A: execlist (exec.c:1275)
==9781==    by 0x42717C: execode (exec.c:1073)
==9781==    by 0x431299: runshfunc (exec.c:5040)
==9781==    by 0x430E76: doshfunc (exec.c:4920)
==9781==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9781== 
==9781== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9784== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9784-by-pythonnut-on-???
==9784== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9784-by-pythonnut-on-???
==9784== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9784-by-pythonnut-on-???
==9784== 
==9784== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9784== don't want to do, unless you know exactly what you're doing,
==9784== or are doing some strange experiment):
==9784==   /usr/lib/valgrind/../../bin/vgdb --pid=9784 ...command...
==9784== 
==9784== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9784==   /path/to/gdb ./zsh
==9784== and then give GDB the following command
==9784==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9784
==9784== --pid is optional if only one valgrind process is running
==9784== 
--9785-- Caught __NR_exit; running __libc_freeres()
==9785== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9785-by-pythonnut-on-???
==9785== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9785-by-pythonnut-on-???
==9785== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9785-by-pythonnut-on-???
==9785== 
==9785== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9785== don't want to do, unless you know exactly what you're doing,
==9785== or are doing some strange experiment):
==9785==   /usr/lib/valgrind/../../bin/vgdb --pid=9785 ...command...
==9785== 
==9785== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9785==   /path/to/gdb ./zsh
==9785== and then give GDB the following command
==9785==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9785
==9785== --pid is optional if only one valgrind process is running
==9785== 
--9785-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9785== 
==9785== HEAP SUMMARY:
==9785==     in use at exit: 3,165,694 bytes in 69,251 blocks
==9785==   total heap usage: 1,584,728 allocs, 1,515,477 frees, 127,874,200 bytes allocated
==9785== 
==9785== Searching for pointers to 69,251 not-freed blocks
--9785--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9785--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9785--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9785--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9785--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9785--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9785--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9785--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9785--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9785--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9785--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9785--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9785--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9785--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9785--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9785--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9785--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9785--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9785--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9785--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9785--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9785--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9785--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9785--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9785--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9785--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9785--   Scanning root segment: 0x701a000..0x701afff (4096)
--9785--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9785--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9785--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9785--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9785--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9785--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9785--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9785--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9785--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9785--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9785== Checked 4,922,968 bytes
==9785== 
==9785== LEAK SUMMARY:
==9785==    definitely lost: 2,189 bytes in 12 blocks
==9785==    indirectly lost: 6,756 bytes in 7 blocks
==9785==      possibly lost: 0 bytes in 0 blocks
==9785==    still reachable: 3,156,749 bytes in 69,232 blocks
==9785==         suppressed: 0 bytes in 0 blocks
==9785== Rerun with --leak-check=full to see details of leaked memory
==9785== 
==9785== Use --track-origins=yes to see where uninitialised values come from
==9785== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9785== 
==9785== 1 errors in context 1 of 2:
==9785== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9785==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9785==    by 0x488CD0: stringsubst (subst.c:301)
==9785==    by 0x48801B: prefork (subst.c:77)
==9785==    by 0x42B318: execcmd (exec.c:2619)
==9785==    by 0x428CA0: execpline2 (exec.c:1697)
==9785==    by 0x427FD2: execpline (exec.c:1484)
==9785==    by 0x427756: execlist (exec.c:1267)
==9785==    by 0x42717C: execode (exec.c:1073)
==9785==    by 0x431299: runshfunc (exec.c:5040)
==9785==    by 0x430E76: doshfunc (exec.c:4920)
==9785==    by 0x4302FB: execshfunc (exec.c:4557)
==9785==    by 0x42D8C1: execcmd (exec.c:3373)
==9785== 
==9785== 
==9785== 2 errors in context 2 of 2:
==9785== Conditional jump or move depends on uninitialised value(s)
==9785==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9785==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9785==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9785==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9785==    by 0x42D8E9: execcmd (exec.c:3378)
==9785==    by 0x428CA0: execpline2 (exec.c:1697)
==9785==    by 0x427FD2: execpline (exec.c:1484)
==9785==    by 0x42779A: execlist (exec.c:1275)
==9785==    by 0x42717C: execode (exec.c:1073)
==9785==    by 0x431299: runshfunc (exec.c:5040)
==9785==    by 0x430E76: doshfunc (exec.c:4920)
==9785==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9785== 
==9785== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9784-- Caught __NR_exit; running __libc_freeres()
--9784-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9784== 
==9784== HEAP SUMMARY:
==9784==     in use at exit: 3,165,459 bytes in 69,251 blocks
==9784==   total heap usage: 1,584,765 allocs, 1,515,514 frees, 127,883,709 bytes allocated
==9784== 
==9784== Searching for pointers to 69,251 not-freed blocks
--9784--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9784--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9784--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9784--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9784--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9784--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9784--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9784--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9784--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9784--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9784--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9784--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9784--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9784--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9784--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9784--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9784--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9784--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9784--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9784--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9784--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9784--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9784--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9784--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9784--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9784--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9784--   Scanning root segment: 0x701a000..0x701afff (4096)
--9784--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9784--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9784--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9784--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9784--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9784--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9784--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9784--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9784--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9784--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9784== Checked 4,922,160 bytes
==9784== 
==9784== LEAK SUMMARY:
==9784==    definitely lost: 2,189 bytes in 12 blocks
==9784==    indirectly lost: 6,756 bytes in 7 blocks
==9784==      possibly lost: 0 bytes in 0 blocks
==9784==    still reachable: 3,156,514 bytes in 69,232 blocks
==9784==         suppressed: 0 bytes in 0 blocks
==9784== Rerun with --leak-check=full to see details of leaked memory
==9784== 
==9784== Use --track-origins=yes to see where uninitialised values come from
==9784== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9784== 
==9784== 1 errors in context 1 of 2:
==9784== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9784==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9784==    by 0x488CD0: stringsubst (subst.c:301)
==9784==    by 0x48801B: prefork (subst.c:77)
==9784==    by 0x42B318: execcmd (exec.c:2619)
==9784==    by 0x428CA0: execpline2 (exec.c:1697)
==9784==    by 0x427FD2: execpline (exec.c:1484)
==9784==    by 0x427756: execlist (exec.c:1267)
==9784==    by 0x42717C: execode (exec.c:1073)
==9784==    by 0x431299: runshfunc (exec.c:5040)
==9784==    by 0x430E76: doshfunc (exec.c:4920)
==9784==    by 0x4302FB: execshfunc (exec.c:4557)
==9784==    by 0x42D8C1: execcmd (exec.c:3373)
==9784== 
==9784== 
==9784== 2 errors in context 2 of 2:
==9784== Conditional jump or move depends on uninitialised value(s)
==9784==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9784==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9784==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9784==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9784==    by 0x42D8E9: execcmd (exec.c:3378)
==9784==    by 0x428CA0: execpline2 (exec.c:1697)
==9784==    by 0x427FD2: execpline (exec.c:1484)
==9784==    by 0x42779A: execlist (exec.c:1275)
==9784==    by 0x42717C: execode (exec.c:1073)
==9784==    by 0x431299: runshfunc (exec.c:5040)
==9784==    by 0x430E76: doshfunc (exec.c:4920)
==9784==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9784== 
==9784== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9788-- Caught __NR_exit; running __libc_freeres()
==9788== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9788-by-pythonnut-on-???
==9788== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9788-by-pythonnut-on-???
==9788== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9788-by-pythonnut-on-???
==9788== 
==9788== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9788== don't want to do, unless you know exactly what you're doing,
==9788== or are doing some strange experiment):
==9788==   /usr/lib/valgrind/../../bin/vgdb --pid=9788 ...command...
==9788== 
==9788== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9788==   /path/to/gdb ./zsh
==9788== and then give GDB the following command
==9788==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9788
==9788== --pid is optional if only one valgrind process is running
==9788== 
client request: code 4d430005,  addr 0xFFEFEAE9C,  len 4
--9788-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9789-- Caught __NR_exit; running __libc_freeres()
==9788== 
==9788== HEAP SUMMARY:
==9788==     in use at exit: 3,128,508 bytes in 69,251 blocks
==9788==   total heap usage: 1,584,737 allocs, 1,515,486 frees, 127,877,620 bytes allocated
==9788== 
==9789== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9789-by-pythonnut-on-???
==9789== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9789-by-pythonnut-on-???
==9789== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9789-by-pythonnut-on-???
==9789== 
==9789== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9789== don't want to do, unless you know exactly what you're doing,
==9789== or are doing some strange experiment):
==9789==   /usr/lib/valgrind/../../bin/vgdb --pid=9789 ...command...
==9789== 
==9789== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9789==   /path/to/gdb ./zsh
==9789== and then give GDB the following command
==9789==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9789
==9789== --pid is optional if only one valgrind process is running
==9789== 
--9789-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9789== 
==9788== Searching for pointers to 69,251 not-freed blocks
--9788--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9788--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9788--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9788--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9788--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9788--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9788--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9788--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9788--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9788--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9788--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9788--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9788--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9788--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9788--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9788--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9788--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9788--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9788--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9788--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9788--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9788--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9788--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9788--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9789== HEAP SUMMARY:
==9789==     in use at exit: 3,128,508 bytes in 69,251 blocks
==9789==   total heap usage: 1,584,742 allocs, 1,515,491 frees, 127,879,708 bytes allocated
==9789== 
--9788--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9788--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9788--   Scanning root segment: 0x701a000..0x701afff (4096)
--9788--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9788--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9788--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9788--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9788--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9788--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9788--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9788--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9788--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9788--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9789== Searching for pointers to 69,251 not-freed blocks
--9789--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9789--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9789--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9789--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9789--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9789--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9789--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9789--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9789--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9789--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9789--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9789--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9789--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9789--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9789--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9789--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9789--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9789--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9789--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9789--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9789--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9789--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9789--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9789--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9789--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9789--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9789--   Scanning root segment: 0x701a000..0x701afff (4096)
--9789--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9789--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9789--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9789--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9789--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9789--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9789--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9789--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9789--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9789--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9788== Checked 4,884,776 bytes
==9788== 
==9789== Checked 4,884,896 bytes
==9789== 
==9788== LEAK SUMMARY:
==9788==    definitely lost: 2,189 bytes in 12 blocks
==9788==    indirectly lost: 6,756 bytes in 7 blocks
==9788==      possibly lost: 0 bytes in 0 blocks
==9788==    still reachable: 3,119,563 bytes in 69,232 blocks
==9788==         suppressed: 0 bytes in 0 blocks
==9788== Rerun with --leak-check=full to see details of leaked memory
==9788== 
==9788== Use --track-origins=yes to see where uninitialised values come from
==9788== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9788== 
==9788== 1 errors in context 1 of 2:
==9788== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9788==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9788==    by 0x488CD0: stringsubst (subst.c:301)
==9788==    by 0x48801B: prefork (subst.c:77)
==9788==    by 0x42B318: execcmd (exec.c:2619)
==9788==    by 0x428CA0: execpline2 (exec.c:1697)
==9788==    by 0x427FD2: execpline (exec.c:1484)
==9788==    by 0x427756: execlist (exec.c:1267)
==9788==    by 0x42717C: execode (exec.c:1073)
==9788==    by 0x431299: runshfunc (exec.c:5040)
==9788==    by 0x430E76: doshfunc (exec.c:4920)
==9788==    by 0x4302FB: execshfunc (exec.c:4557)
==9788==    by 0x42D8C1: execcmd (exec.c:3373)
==9788== 
==9788== 
==9788== 2 errors in context 2 of 2:
==9788== Conditional jump or move depends on uninitialised value(s)
==9788==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9788==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9788==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9788==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9788==    by 0x42D8E9: execcmd (exec.c:3378)
==9788==    by 0x428CA0: execpline2 (exec.c:1697)
==9788==    by 0x427FD2: execpline (exec.c:1484)
==9788==    by 0x42779A: execlist (exec.c:1275)
==9788==    by 0x42717C: execode (exec.c:1073)
==9788==    by 0x431299: runshfunc (exec.c:5040)
==9788==    by 0x430E76: doshfunc (exec.c:4920)
==9788==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9788== 
==9788== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9789== LEAK SUMMARY:
==9789==    definitely lost: 2,213 bytes in 13 blocks
==9789==    indirectly lost: 6,796 bytes in 9 blocks
==9789==      possibly lost: 0 bytes in 0 blocks
==9789==    still reachable: 3,119,499 bytes in 69,229 blocks
==9789==         suppressed: 0 bytes in 0 blocks
==9789== Rerun with --leak-check=full to see details of leaked memory
==9789== 
==9789== Use --track-origins=yes to see where uninitialised values come from
==9789== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9789== 
==9789== 1 errors in context 1 of 2:
==9789== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9789==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9789==    by 0x488CD0: stringsubst (subst.c:301)
==9789==    by 0x48801B: prefork (subst.c:77)
==9789==    by 0x42B318: execcmd (exec.c:2619)
==9789==    by 0x428CA0: execpline2 (exec.c:1697)
==9789==    by 0x427FD2: execpline (exec.c:1484)
==9789==    by 0x427756: execlist (exec.c:1267)
==9789==    by 0x42717C: execode (exec.c:1073)
==9789==    by 0x431299: runshfunc (exec.c:5040)
==9789==    by 0x430E76: doshfunc (exec.c:4920)
==9789==    by 0x4302FB: execshfunc (exec.c:4557)
==9789==    by 0x42D8C1: execcmd (exec.c:3373)
==9789== 
==9789== 
==9789== 2 errors in context 2 of 2:
==9789== Conditional jump or move depends on uninitialised value(s)
==9789==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9789==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9789==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9789==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9789==    by 0x42D8E9: execcmd (exec.c:3378)
==9789==    by 0x428CA0: execpline2 (exec.c:1697)
==9789==    by 0x427FD2: execpline (exec.c:1484)
==9789==    by 0x42779A: execlist (exec.c:1275)
==9789==    by 0x42717C: execode (exec.c:1073)
==9789==    by 0x431299: runshfunc (exec.c:5040)
==9789==    by 0x430E76: doshfunc (exec.c:4920)
==9789==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9789== 
==9789== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEB81C,  len 4
--9773-- Caught __NR_exit; running __libc_freeres()
--9773-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9773== 
==9773== HEAP SUMMARY:
==9773==     in use at exit: 3,127,562 bytes in 69,228 blocks
==9773==   total heap usage: 1,584,743 allocs, 1,515,515 frees, 127,880,276 bytes allocated
==9773== 
==9773== Searching for pointers to 69,228 not-freed blocks
--9773--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9773--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9773--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9773--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9773--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9773--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9773--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9773--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9773--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9773--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9773--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9773--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9773--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9773--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9773--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9773--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9773--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9773--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9773--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9773--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9773--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9773--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9773--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9773--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9773--   Scanning root segment: 0x701a000..0x701afff (4096)
--9773--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9773--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9773--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9773--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9773--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9773--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9773--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9773--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9773--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9773--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9773== Checked 4,791,768 bytes
==9773== 
==9773== LEAK SUMMARY:
==9773==    definitely lost: 2,189 bytes in 12 blocks
==9773==    indirectly lost: 6,756 bytes in 7 blocks
==9773==      possibly lost: 0 bytes in 0 blocks
==9773==    still reachable: 3,118,617 bytes in 69,209 blocks
==9773==         suppressed: 0 bytes in 0 blocks
==9773== Rerun with --leak-check=full to see details of leaked memory
==9773== 
==9773== Use --track-origins=yes to see where uninitialised values come from
==9773== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9773== 
==9773== 1 errors in context 1 of 2:
==9773== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9773==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9773==    by 0x488CD0: stringsubst (subst.c:301)
==9773==    by 0x48801B: prefork (subst.c:77)
==9773==    by 0x42B318: execcmd (exec.c:2619)
==9773==    by 0x428CA0: execpline2 (exec.c:1697)
==9773==    by 0x427FD2: execpline (exec.c:1484)
==9773==    by 0x427756: execlist (exec.c:1267)
==9773==    by 0x42717C: execode (exec.c:1073)
==9773==    by 0x431299: runshfunc (exec.c:5040)
==9773==    by 0x430E76: doshfunc (exec.c:4920)
==9773==    by 0x4302FB: execshfunc (exec.c:4557)
==9773==    by 0x42D8C1: execcmd (exec.c:3373)
==9773== 
==9773== 
==9773== 2 errors in context 2 of 2:
==9773== Conditional jump or move depends on uninitialised value(s)
==9773==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9773==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9773==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9773==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9773==    by 0x42D8E9: execcmd (exec.c:3378)
==9773==    by 0x428CA0: execpline2 (exec.c:1697)
==9773==    by 0x427FD2: execpline (exec.c:1484)
==9773==    by 0x42779A: execlist (exec.c:1275)
==9773==    by 0x42717C: execode (exec.c:1073)
==9773==    by 0x431299: runshfunc (exec.c:5040)
==9773==    by 0x430E76: doshfunc (exec.c:4920)
==9773==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9773== 
==9773== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9793== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9793-by-pythonnut-on-???
==9793== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9793-by-pythonnut-on-???
==9793== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9793-by-pythonnut-on-???
==9793== 
==9793== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9793== don't want to do, unless you know exactly what you're doing,
==9793== or are doing some strange experiment):
==9793==   /usr/lib/valgrind/../../bin/vgdb --pid=9793 ...command...
==9793== 
==9793== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9793==   /path/to/gdb ./zsh
==9793== and then give GDB the following command
==9793==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9793
==9793== --pid is optional if only one valgrind process is running
==9793== 
==9792== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9792-by-pythonnut-on-???
==9792== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9792-by-pythonnut-on-???
==9792== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9792-by-pythonnut-on-???
==9792== 
==9792== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9792== don't want to do, unless you know exactly what you're doing,
==9792== or are doing some strange experiment):
==9792==   /usr/lib/valgrind/../../bin/vgdb --pid=9792 ...command...
==9792== 
==9792== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9792==   /path/to/gdb ./zsh
==9792== and then give GDB the following command
==9792==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9792
==9792== --pid is optional if only one valgrind process is running
==9792== 
--9793-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEC14C,  len 4
client request: code 4d430005,  addr 0xFFEFEC0AC,  len 4
--9793-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9793== 
==9793== HEAP SUMMARY:
==9793==     in use at exit: 3,127,452 bytes in 69,229 blocks
==9793==   total heap usage: 1,584,688 allocs, 1,515,459 frees, 127,829,685 bytes allocated
==9793== 
==9793== Searching for pointers to 69,229 not-freed blocks
--9793--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9793--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9793--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9793--   Scanning root segment: 0x4037000..0x403afff (16384)
--9793--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9793--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9793--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9793--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9793--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9793--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9793--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9793--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9793--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9793--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9793--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9793--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9793--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9793--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9793--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9793--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9793--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9793--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9793--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9793--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9793--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9793--   Scanning root segment: 0x701a000..0x701afff (4096)
--9793--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9793--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9793--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9793--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9793--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9793--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9793--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9793--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9793--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9793--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9793== Checked 4,809,000 bytes
==9793== 
==9793== LEAK SUMMARY:
==9793==    definitely lost: 2,189 bytes in 12 blocks
==9793==    indirectly lost: 6,756 bytes in 7 blocks
==9793==      possibly lost: 0 bytes in 0 blocks
==9793==    still reachable: 3,118,507 bytes in 69,210 blocks
==9793==         suppressed: 0 bytes in 0 blocks
==9793== Rerun with --leak-check=full to see details of leaked memory
==9793== 
==9793== Use --track-origins=yes to see where uninitialised values come from
==9793== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9793== 
==9793== 1 errors in context 1 of 2:
==9793== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9793==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9793==    by 0x488CD0: stringsubst (subst.c:301)
==9793==    by 0x48801B: prefork (subst.c:77)
==9793==    by 0x42B318: execcmd (exec.c:2619)
==9793==    by 0x428CA0: execpline2 (exec.c:1697)
==9793==    by 0x427FD2: execpline (exec.c:1484)
==9793==    by 0x427756: execlist (exec.c:1267)
==9793==    by 0x42717C: execode (exec.c:1073)
==9793==    by 0x431299: runshfunc (exec.c:5040)
==9793==    by 0x430E76: doshfunc (exec.c:4920)
==9793==    by 0x4302FB: execshfunc (exec.c:4557)
==9793==    by 0x42D8C1: execcmd (exec.c:3373)
==9793== 
==9793== 
==9793== 2 errors in context 2 of 2:
==9793== Conditional jump or move depends on uninitialised value(s)
==9793==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9793==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9793==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9793==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9793==    by 0x42D8E9: execcmd (exec.c:3378)
==9793==    by 0x428CA0: execpline2 (exec.c:1697)
==9793==    by 0x427FD2: execpline (exec.c:1484)
==9793==    by 0x42779A: execlist (exec.c:1275)
==9793==    by 0x42717C: execode (exec.c:1073)
==9793==    by 0x431299: runshfunc (exec.c:5040)
==9793==    by 0x430E76: doshfunc (exec.c:4920)
==9793==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9793== 
==9793== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9792-- Caught __NR_exit; running __libc_freeres()
--9792-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9792== 
==9792== HEAP SUMMARY:
==9792==     in use at exit: 3,127,388 bytes in 69,226 blocks
==9792==   total heap usage: 1,584,693 allocs, 1,515,467 frees, 127,830,541 bytes allocated
==9792== 
==9792== Searching for pointers to 69,226 not-freed blocks
--9792--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9792--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9792--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9792--   Scanning root segment: 0x4037000..0x403afff (16384)
--9792--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9792--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9792--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9792--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9792--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9792--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9792--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9792--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9792--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9792--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9792--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9792--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9792--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9792--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9792--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9792--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9792--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9792--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9792--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9792--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9792--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9792--   Scanning root segment: 0x701a000..0x701afff (4096)
--9792--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9792--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9792--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9792--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9792--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9792--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9792--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9792--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9792--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9792--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9792== Checked 4,808,312 bytes
==9792== 
==9792== LEAK SUMMARY:
==9792==    definitely lost: 2,189 bytes in 12 blocks
==9792==    indirectly lost: 6,756 bytes in 7 blocks
==9792==      possibly lost: 0 bytes in 0 blocks
==9792==    still reachable: 3,118,443 bytes in 69,207 blocks
==9792==         suppressed: 0 bytes in 0 blocks
==9792== Rerun with --leak-check=full to see details of leaked memory
==9792== 
==9792== Use --track-origins=yes to see where uninitialised values come from
==9792== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9792== 
==9792== 1 errors in context 1 of 2:
==9792== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9792==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9792==    by 0x488CD0: stringsubst (subst.c:301)
==9792==    by 0x48801B: prefork (subst.c:77)
==9792==    by 0x42B318: execcmd (exec.c:2619)
==9792==    by 0x428CA0: execpline2 (exec.c:1697)
==9792==    by 0x427FD2: execpline (exec.c:1484)
==9792==    by 0x427756: execlist (exec.c:1267)
==9792==    by 0x42717C: execode (exec.c:1073)
==9792==    by 0x431299: runshfunc (exec.c:5040)
==9792==    by 0x430E76: doshfunc (exec.c:4920)
==9792==    by 0x4302FB: execshfunc (exec.c:4557)
==9792==    by 0x42D8C1: execcmd (exec.c:3373)
==9792== 
==9792== 
==9792== 2 errors in context 2 of 2:
==9792== Conditional jump or move depends on uninitialised value(s)
==9792==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9792==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9792==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9792==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9792==    by 0x42D8E9: execcmd (exec.c:3378)
==9792==    by 0x428CA0: execpline2 (exec.c:1697)
==9792==    by 0x427FD2: execpline (exec.c:1484)
==9792==    by 0x42779A: execlist (exec.c:1275)
==9792==    by 0x42717C: execode (exec.c:1073)
==9792==    by 0x431299: runshfunc (exec.c:5040)
==9792==    by 0x430E76: doshfunc (exec.c:4920)
==9792==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9792== 
==9792== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9796== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9796-by-pythonnut-on-???
==9796== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9796-by-pythonnut-on-???
==9796== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9796-by-pythonnut-on-???
==9796== 
==9796== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9796== don't want to do, unless you know exactly what you're doing,
==9796== or are doing some strange experiment):
==9796==   /usr/lib/valgrind/../../bin/vgdb --pid=9796 ...command...
==9796== 
==9796== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9796==   /path/to/gdb ./zsh
==9796== and then give GDB the following command
==9796==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9796
==9796== --pid is optional if only one valgrind process is running
==9796== 
==9797== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9797-by-pythonnut-on-???
==9797== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9797-by-pythonnut-on-???
==9797== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9797-by-pythonnut-on-???
==9797== 
==9797== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9797== don't want to do, unless you know exactly what you're doing,
==9797== or are doing some strange experiment):
==9797==   /usr/lib/valgrind/../../bin/vgdb --pid=9797 ...command...
==9797== 
==9797== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9797==   /path/to/gdb ./zsh
==9797== and then give GDB the following command
==9797==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9797
==9797== --pid is optional if only one valgrind process is running
==9797== 
--9797-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEACEC,  len 4
client request: code 4d430005,  addr 0xFFEFEAC4C,  len 4
--9797-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9797== 
==9797== HEAP SUMMARY:
==9797==     in use at exit: 3,127,696 bytes in 69,232 blocks
==9797==   total heap usage: 1,584,722 allocs, 1,515,490 frees, 127,842,976 bytes allocated
==9797== 
==9797== Searching for pointers to 69,232 not-freed blocks
--9797--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9797--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9797--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9797--   Scanning root segment: 0x4037000..0x403afff (16384)
--9797--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9797--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9797--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9797--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9797--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9797--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9797--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9797--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9797--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9797--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9797--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9797--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9797--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9797--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9797--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9797--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9797--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9797--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9797--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9797--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9797--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9797--   Scanning root segment: 0x701a000..0x701afff (4096)
--9797--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9797--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9797--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9797--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9797--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9797--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9797--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9797--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9797--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9797--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9797== Checked 4,810,552 bytes
==9797== 
==9797== LEAK SUMMARY:
==9797==    definitely lost: 2,189 bytes in 12 blocks
==9797==    indirectly lost: 6,756 bytes in 7 blocks
==9797==      possibly lost: 0 bytes in 0 blocks
==9797==    still reachable: 3,118,751 bytes in 69,213 blocks
==9797==         suppressed: 0 bytes in 0 blocks
==9797== Rerun with --leak-check=full to see details of leaked memory
==9797== 
==9797== Use --track-origins=yes to see where uninitialised values come from
==9797== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9797== 
==9797== 1 errors in context 1 of 2:
==9797== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9797==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9797==    by 0x488CD0: stringsubst (subst.c:301)
==9797==    by 0x48801B: prefork (subst.c:77)
==9797==    by 0x42B318: execcmd (exec.c:2619)
==9797==    by 0x428CA0: execpline2 (exec.c:1697)
==9797==    by 0x427FD2: execpline (exec.c:1484)
==9797==    by 0x427756: execlist (exec.c:1267)
==9797==    by 0x42717C: execode (exec.c:1073)
==9797==    by 0x431299: runshfunc (exec.c:5040)
==9797==    by 0x430E76: doshfunc (exec.c:4920)
==9797==    by 0x4302FB: execshfunc (exec.c:4557)
==9797==    by 0x42D8C1: execcmd (exec.c:3373)
==9797== 
==9797== 
==9797== 2 errors in context 2 of 2:
==9797== Conditional jump or move depends on uninitialised value(s)
==9797==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9797==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9797==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9797==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9797==    by 0x42D8E9: execcmd (exec.c:3378)
==9797==    by 0x428CA0: execpline2 (exec.c:1697)
==9797==    by 0x427FD2: execpline (exec.c:1484)
==9797==    by 0x42779A: execlist (exec.c:1275)
==9797==    by 0x42717C: execode (exec.c:1073)
==9797==    by 0x431299: runshfunc (exec.c:5040)
==9797==    by 0x430E76: doshfunc (exec.c:4920)
==9797==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9797== 
==9797== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9796-- Caught __NR_exit; running __libc_freeres()
--9796-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9796== 
==9796== HEAP SUMMARY:
==9796==     in use at exit: 3,127,727 bytes in 69,233 blocks
==9796==   total heap usage: 1,584,718 allocs, 1,515,485 frees, 127,839,424 bytes allocated
==9796== 
==9796== Searching for pointers to 69,233 not-freed blocks
--9796--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9796--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9796--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9796--   Scanning root segment: 0x4037000..0x403afff (16384)
--9796--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9796--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9796--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9796--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9796--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9796--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9796--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9796--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9796--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9796--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9796--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9796--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9796--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9796--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9796--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9796--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9796--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9796--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9796--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9796--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9796--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9796--   Scanning root segment: 0x701a000..0x701afff (4096)
--9796--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9796--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9796--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9796--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9796--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9796--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9796--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9796--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9796--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9796--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9796== Checked 4,810,256 bytes
==9796== 
==9796== LEAK SUMMARY:
==9796==    definitely lost: 2,189 bytes in 12 blocks
==9796==    indirectly lost: 6,756 bytes in 7 blocks
==9796==      possibly lost: 0 bytes in 0 blocks
==9796==    still reachable: 3,118,782 bytes in 69,214 blocks
==9796==         suppressed: 0 bytes in 0 blocks
==9796== Rerun with --leak-check=full to see details of leaked memory
==9796== 
==9796== Use --track-origins=yes to see where uninitialised values come from
==9796== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9796== 
==9796== 1 errors in context 1 of 2:
==9796== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9796==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9796==    by 0x488CD0: stringsubst (subst.c:301)
==9796==    by 0x48801B: prefork (subst.c:77)
==9796==    by 0x42B318: execcmd (exec.c:2619)
==9796==    by 0x428CA0: execpline2 (exec.c:1697)
==9796==    by 0x427FD2: execpline (exec.c:1484)
==9796==    by 0x427756: execlist (exec.c:1267)
==9796==    by 0x42717C: execode (exec.c:1073)
==9796==    by 0x431299: runshfunc (exec.c:5040)
==9796==    by 0x430E76: doshfunc (exec.c:4920)
==9796==    by 0x4302FB: execshfunc (exec.c:4557)
==9796==    by 0x42D8C1: execcmd (exec.c:3373)
==9796== 
==9796== 
==9796== 2 errors in context 2 of 2:
==9796== Conditional jump or move depends on uninitialised value(s)
==9796==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9796==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9796==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9796==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9796==    by 0x42D8E9: execcmd (exec.c:3378)
==9796==    by 0x428CA0: execpline2 (exec.c:1697)
==9796==    by 0x427FD2: execpline (exec.c:1484)
==9796==    by 0x42779A: execlist (exec.c:1275)
==9796==    by 0x42717C: execode (exec.c:1073)
==9796==    by 0x431299: runshfunc (exec.c:5040)
==9796==    by 0x430E76: doshfunc (exec.c:4920)
==9796==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9796== 
==9796== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9803== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9803-by-pythonnut-on-???
==9803== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9803-by-pythonnut-on-???
==9803== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9803-by-pythonnut-on-???
==9803== 
==9803== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9803== don't want to do, unless you know exactly what you're doing,
==9803== or are doing some strange experiment):
==9803==   /usr/lib/valgrind/../../bin/vgdb --pid=9803 ...command...
==9803== 
==9803== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9803==   /path/to/gdb ./zsh
==9803== and then give GDB the following command
==9803==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9803
==9803== --pid is optional if only one valgrind process is running
==9803== 
client request: code 4d430005,  addr 0xFFEFEB23C,  len 4
==9802== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9802-by-pythonnut-on-???
==9802== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9802-by-pythonnut-on-???
==9802== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9802-by-pythonnut-on-???
==9802== 
==9802== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9802== don't want to do, unless you know exactly what you're doing,
==9802== or are doing some strange experiment):
==9802==   /usr/lib/valgrind/../../bin/vgdb --pid=9802 ...command...
==9802== 
==9802== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9802==   /path/to/gdb ./zsh
==9802== and then give GDB the following command
==9802==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9802
==9802== --pid is optional if only one valgrind process is running
==9802== 
--9802-- Caught __NR_exit; running __libc_freeres()
--9802-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9802== 
==9802== HEAP SUMMARY:
==9802==     in use at exit: 3,127,987 bytes in 69,238 blocks
==9802==   total heap usage: 1,584,729 allocs, 1,515,491 frees, 127,844,564 bytes allocated
==9802== 
==9802== Searching for pointers to 69,238 not-freed blocks
--9802--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9802--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9802--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9802--   Scanning root segment: 0x4037000..0x403afff (16384)
--9802--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9802--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9802--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9802--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9802--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9802--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9802--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9802--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9802--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9802--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9802--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9802--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9802--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9802--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9802--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9802--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9802--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9802--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9802--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9802--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9802--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9802--   Scanning root segment: 0x701a000..0x701afff (4096)
--9802--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9802--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9802--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9802--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9802--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9802--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9802--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9802--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9802--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9802--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9802== Checked 4,810,256 bytes
==9802== 
==9802== LEAK SUMMARY:
==9802==    definitely lost: 2,189 bytes in 12 blocks
==9802==    indirectly lost: 6,756 bytes in 7 blocks
==9802==      possibly lost: 0 bytes in 0 blocks
==9802==    still reachable: 3,119,042 bytes in 69,219 blocks
==9802==         suppressed: 0 bytes in 0 blocks
==9802== Rerun with --leak-check=full to see details of leaked memory
==9802== 
==9802== Use --track-origins=yes to see where uninitialised values come from
==9802== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9802== 
==9802== 1 errors in context 1 of 2:
==9802== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9802==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9802==    by 0x488CD0: stringsubst (subst.c:301)
==9802==    by 0x48801B: prefork (subst.c:77)
==9802==    by 0x42B318: execcmd (exec.c:2619)
==9802==    by 0x428CA0: execpline2 (exec.c:1697)
==9802==    by 0x427FD2: execpline (exec.c:1484)
==9802==    by 0x427756: execlist (exec.c:1267)
==9802==    by 0x42717C: execode (exec.c:1073)
==9802==    by 0x431299: runshfunc (exec.c:5040)
==9802==    by 0x430E76: doshfunc (exec.c:4920)
==9802==    by 0x4302FB: execshfunc (exec.c:4557)
==9802==    by 0x42D8C1: execcmd (exec.c:3373)
==9802== 
==9802== 
==9802== 2 errors in context 2 of 2:
==9802== Conditional jump or move depends on uninitialised value(s)
==9802==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9802==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9802==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9802==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9802==    by 0x42D8E9: execcmd (exec.c:3378)
==9802==    by 0x428CA0: execpline2 (exec.c:1697)
==9802==    by 0x427FD2: execpline (exec.c:1484)
==9802==    by 0x42779A: execlist (exec.c:1275)
==9802==    by 0x42717C: execode (exec.c:1073)
==9802==    by 0x431299: runshfunc (exec.c:5040)
==9802==    by 0x430E76: doshfunc (exec.c:4920)
==9802==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9802== 
==9802== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEAD8C,  len 4
--9804-- Caught __NR_exit; running __libc_freeres()
==9804== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9804-by-pythonnut-on-???
==9804== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9804-by-pythonnut-on-???
==9804== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9804-by-pythonnut-on-???
==9804== 
==9804== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9804== don't want to do, unless you know exactly what you're doing,
==9804== or are doing some strange experiment):
==9804==   /usr/lib/valgrind/../../bin/vgdb --pid=9804 ...command...
==9804== 
==9804== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9804==   /path/to/gdb ./zsh
==9804== and then give GDB the following command
==9804==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9804
==9804== --pid is optional if only one valgrind process is running
==9804== 
--9804-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9804== 
==9804== HEAP SUMMARY:
==9804==     in use at exit: 3,128,016 bytes in 69,239 blocks
==9804==   total heap usage: 1,584,734 allocs, 1,515,495 frees, 127,846,705 bytes allocated
==9804== 
==9804== Searching for pointers to 69,239 not-freed blocks
--9804--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9804--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9804--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9804--   Scanning root segment: 0x4037000..0x403afff (16384)
--9804--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9804--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9804--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9804--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9804--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9804--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9804--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9804--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9804--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9804--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9804--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9804--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9804--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9804--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9804--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9804--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9804--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9804--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9804--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9804--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9804--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9804--   Scanning root segment: 0x701a000..0x701afff (4096)
--9804--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9804--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9804--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9804--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9804--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9804--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9804--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9804--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9804--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9804--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9804== Checked 4,810,552 bytes
==9804== 
==9804== LEAK SUMMARY:
==9804==    definitely lost: 2,189 bytes in 12 blocks
==9804==    indirectly lost: 6,756 bytes in 7 blocks
==9804==      possibly lost: 0 bytes in 0 blocks
==9804==    still reachable: 3,119,071 bytes in 69,220 blocks
==9804==         suppressed: 0 bytes in 0 blocks
==9804== Rerun with --leak-check=full to see details of leaked memory
==9804== 
==9804== Use --track-origins=yes to see where uninitialised values come from
==9804== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9804== 
==9804== 1 errors in context 1 of 2:
==9804== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9804==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9804==    by 0x488CD0: stringsubst (subst.c:301)
==9804==    by 0x48801B: prefork (subst.c:77)
==9804==    by 0x42B318: execcmd (exec.c:2619)
==9804==    by 0x428CA0: execpline2 (exec.c:1697)
==9804==    by 0x427FD2: execpline (exec.c:1484)
==9804==    by 0x427756: execlist (exec.c:1267)
==9804==    by 0x42717C: execode (exec.c:1073)
==9804==    by 0x431299: runshfunc (exec.c:5040)
==9804==    by 0x430E76: doshfunc (exec.c:4920)
==9804==    by 0x4302FB: execshfunc (exec.c:4557)
==9804==    by 0x42D8C1: execcmd (exec.c:3373)
==9804== 
==9804== 
==9804== 2 errors in context 2 of 2:
==9804== Conditional jump or move depends on uninitialised value(s)
==9804==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9804==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9804==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9804==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9804==    by 0x42D8E9: execcmd (exec.c:3378)
==9804==    by 0x428CA0: execpline2 (exec.c:1697)
==9804==    by 0x427FD2: execpline (exec.c:1484)
==9804==    by 0x42779A: execlist (exec.c:1275)
==9804==    by 0x42717C: execode (exec.c:1073)
==9804==    by 0x431299: runshfunc (exec.c:5040)
==9804==    by 0x430E76: doshfunc (exec.c:4920)
==9804==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9804== 
==9804== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9806== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9806-by-pythonnut-on-???
==9806== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9806-by-pythonnut-on-???
==9806== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9806-by-pythonnut-on-???
==9806== 
==9806== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9806== don't want to do, unless you know exactly what you're doing,
==9806== or are doing some strange experiment):
==9806==   /usr/lib/valgrind/../../bin/vgdb --pid=9806 ...command...
==9806== 
==9806== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9806==   /path/to/gdb ./zsh
==9806== and then give GDB the following command
==9806==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9806
==9806== --pid is optional if only one valgrind process is running
==9806== 
client request: code 4d430005,  addr 0xFFEFEB70C,  len 4
client request: code 4d430005,  addr 0xFFEFEB08C,  len 4
--9772-- Caught __NR_exit; running __libc_freeres()
--9772-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9772== 
==9772== HEAP SUMMARY:
==9772==     in use at exit: 3,126,120 bytes in 69,190 blocks
==9772==   total heap usage: 1,584,743 allocs, 1,515,553 frees, 127,850,645 bytes allocated
==9772== 
==9772== Searching for pointers to 69,190 not-freed blocks
--9772--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9772--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9772--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9772--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9772--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9772--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9772--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9772--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9772--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9772--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9772--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9772--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9772--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9772--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9772--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9772--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9772--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9772--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9772--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9772--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9772--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9772--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9772--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9772--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9772--   Scanning root segment: 0x701a000..0x701afff (4096)
--9772--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9772--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9772--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9772--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9772--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9772--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9772--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9772--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9772--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9772--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9772== Checked 4,788,384 bytes
==9772== 
==9772== LEAK SUMMARY:
==9772==    definitely lost: 2,189 bytes in 12 blocks
==9772==    indirectly lost: 6,756 bytes in 7 blocks
==9772==      possibly lost: 0 bytes in 0 blocks
==9772==    still reachable: 3,117,175 bytes in 69,171 blocks
==9772==         suppressed: 0 bytes in 0 blocks
==9772== Rerun with --leak-check=full to see details of leaked memory
==9772== 
==9772== Use --track-origins=yes to see where uninitialised values come from
==9772== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9772== 
==9772== 1 errors in context 1 of 2:
==9772== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9772==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9772==    by 0x488CD0: stringsubst (subst.c:301)
==9772==    by 0x48801B: prefork (subst.c:77)
==9772==    by 0x42B318: execcmd (exec.c:2619)
==9772==    by 0x428CA0: execpline2 (exec.c:1697)
==9772==    by 0x427FD2: execpline (exec.c:1484)
==9772==    by 0x427756: execlist (exec.c:1267)
==9772==    by 0x42717C: execode (exec.c:1073)
==9772==    by 0x431299: runshfunc (exec.c:5040)
==9772==    by 0x430E76: doshfunc (exec.c:4920)
==9772==    by 0x4302FB: execshfunc (exec.c:4557)
==9772==    by 0x42D8C1: execcmd (exec.c:3373)
==9772== 
==9772== 
==9772== 2 errors in context 2 of 2:
==9772== Conditional jump or move depends on uninitialised value(s)
==9772==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9772==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9772==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9772==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9772==    by 0x42D8E9: execcmd (exec.c:3378)
==9772==    by 0x428CA0: execpline2 (exec.c:1697)
==9772==    by 0x427FD2: execpline (exec.c:1484)
==9772==    by 0x42779A: execlist (exec.c:1275)
==9772==    by 0x42717C: execode (exec.c:1073)
==9772==    by 0x431299: runshfunc (exec.c:5040)
==9772==    by 0x430E76: doshfunc (exec.c:4920)
==9772==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9772== 
==9772== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9808== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9808-by-pythonnut-on-???
==9808== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9808-by-pythonnut-on-???
==9808== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9808-by-pythonnut-on-???
==9808== 
==9808== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9808== don't want to do, unless you know exactly what you're doing,
==9808== or are doing some strange experiment):
==9808==   /usr/lib/valgrind/../../bin/vgdb --pid=9808 ...command...
==9808== 
==9808== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9808==   /path/to/gdb ./zsh
==9808== and then give GDB the following command
==9808==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9808
==9808== --pid is optional if only one valgrind process is running
==9808== 
--9809-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==9810== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9810-by-pythonnut-on-???
==9810== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9810-by-pythonnut-on-???
==9810== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9810-by-pythonnut-on-???
==9810== 
==9810== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9810== don't want to do, unless you know exactly what you're doing,
==9810== or are doing some strange experiment):
==9810==   /usr/lib/valgrind/../../bin/vgdb --pid=9810 ...command...
==9810== 
==9810== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9810==   /path/to/gdb ./zsh
==9810== and then give GDB the following command
==9810==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9810
==9810== --pid is optional if only one valgrind process is running
==9810== 
==9809== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9809-by-pythonnut-on-???
==9809== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9809-by-pythonnut-on-???
==9809== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9809-by-pythonnut-on-???
==9809== 
==9809== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9809== don't want to do, unless you know exactly what you're doing,
==9809== or are doing some strange experiment):
==9809==   /usr/lib/valgrind/../../bin/vgdb --pid=9809 ...command...
==9809== 
==9809== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9809==   /path/to/gdb ./zsh
==9809== and then give GDB the following command
==9809==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9809
==9809== --pid is optional if only one valgrind process is running
==9809== 
--9809-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9809== 
==9809== HEAP SUMMARY:
==9809==     in use at exit: 3,111,895 bytes in 68,920 blocks
==9809==   total heap usage: 1,584,898 allocs, 1,515,978 frees, 127,820,518 bytes allocated
==9809== 
==9809== Searching for pointers to 68,920 not-freed blocks
--9809--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9809--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9809--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9809--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9809--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9809--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9809--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9809--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9809--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9809--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9809--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9809--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9809--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9809--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9809--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9809--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9809--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9809--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9809--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9809--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9809--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9809--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9809--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9809--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9809--   Scanning root segment: 0x701a000..0x701afff (4096)
--9809--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9809--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9809--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9809--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9809--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9809--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9809--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9809--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9809--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9809--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9809== Checked 4,767,936 bytes
==9809== 
==9809== LEAK SUMMARY:
==9809==    definitely lost: 2,189 bytes in 12 blocks
==9809==    indirectly lost: 6,756 bytes in 7 blocks
==9809==      possibly lost: 0 bytes in 0 blocks
==9809==    still reachable: 3,102,950 bytes in 68,901 blocks
==9809==         suppressed: 0 bytes in 0 blocks
==9809== Rerun with --leak-check=full to see details of leaked memory
==9809== 
==9809== Use --track-origins=yes to see where uninitialised values come from
==9809== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9809== 
==9809== 1 errors in context 1 of 2:
==9809== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9809==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9809==    by 0x488CD0: stringsubst (subst.c:301)
==9809==    by 0x48801B: prefork (subst.c:77)
==9809==    by 0x42B318: execcmd (exec.c:2619)
==9809==    by 0x428CA0: execpline2 (exec.c:1697)
==9809==    by 0x427FD2: execpline (exec.c:1484)
==9809==    by 0x427756: execlist (exec.c:1267)
==9809==    by 0x42717C: execode (exec.c:1073)
==9809==    by 0x431299: runshfunc (exec.c:5040)
==9809==    by 0x430E76: doshfunc (exec.c:4920)
==9809==    by 0x4302FB: execshfunc (exec.c:4557)
==9809==    by 0x42D8C1: execcmd (exec.c:3373)
==9809== 
==9809== 
==9809== 2 errors in context 2 of 2:
==9809== Conditional jump or move depends on uninitialised value(s)
==9809==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9809==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9809==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9809==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9809==    by 0x42D8E9: execcmd (exec.c:3378)
==9809==    by 0x428CA0: execpline2 (exec.c:1697)
==9809==    by 0x427FD2: execpline (exec.c:1484)
==9809==    by 0x42779A: execlist (exec.c:1275)
==9809==    by 0x42717C: execode (exec.c:1073)
==9809==    by 0x431299: runshfunc (exec.c:5040)
==9809==    by 0x430E76: doshfunc (exec.c:4920)
==9809==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9809== 
==9809== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9808-- Caught __NR_exit; running __libc_freeres()
--9808-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9808== 
==9808== HEAP SUMMARY:
==9808==     in use at exit: 3,111,532 bytes in 68,910 blocks
==9808==   total heap usage: 1,584,901 allocs, 1,515,991 frees, 127,821,158 bytes allocated
==9808== 
==9808== Searching for pointers to 68,910 not-freed blocks
--9808--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9808--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9808--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9808--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9808--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9808--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9808--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9808--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9808--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9808--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9808--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9808--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9808--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9808--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9808--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9808--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9808--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9808--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9808--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9808--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9808--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9808--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9808--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9808--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9808--   Scanning root segment: 0x701a000..0x701afff (4096)
--9808--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9808--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9808--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9808--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9808--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9808--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9808--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9808--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9808--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9808--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9808== Checked 4,765,624 bytes
==9808== 
==9808== LEAK SUMMARY:
==9808==    definitely lost: 2,189 bytes in 12 blocks
==9808==    indirectly lost: 6,756 bytes in 7 blocks
==9808==      possibly lost: 0 bytes in 0 blocks
==9808==    still reachable: 3,102,587 bytes in 68,891 blocks
==9808==         suppressed: 0 bytes in 0 blocks
==9808== Rerun with --leak-check=full to see details of leaked memory
==9808== 
==9808== Use --track-origins=yes to see where uninitialised values come from
==9808== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9808== 
==9808== 1 errors in context 1 of 2:
==9808== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9808==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9808==    by 0x488CD0: stringsubst (subst.c:301)
==9808==    by 0x48801B: prefork (subst.c:77)
==9808==    by 0x42B318: execcmd (exec.c:2619)
==9808==    by 0x428CA0: execpline2 (exec.c:1697)
==9808==    by 0x427FD2: execpline (exec.c:1484)
==9808==    by 0x427756: execlist (exec.c:1267)
==9808==    by 0x42717C: execode (exec.c:1073)
==9808==    by 0x431299: runshfunc (exec.c:5040)
==9808==    by 0x430E76: doshfunc (exec.c:4920)
==9808==    by 0x4302FB: execshfunc (exec.c:4557)
==9808==    by 0x42D8C1: execcmd (exec.c:3373)
==9808== 
==9808== 
==9808== 2 errors in context 2 of 2:
==9808== Conditional jump or move depends on uninitialised value(s)
==9808==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9808==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9808==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9808==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9808==    by 0x42D8E9: execcmd (exec.c:3378)
==9808==    by 0x428CA0: execpline2 (exec.c:1697)
==9808==    by 0x427FD2: execpline (exec.c:1484)
==9808==    by 0x42779A: execlist (exec.c:1275)
==9808==    by 0x42717C: execode (exec.c:1073)
==9808==    by 0x431299: runshfunc (exec.c:5040)
==9808==    by 0x430E76: doshfunc (exec.c:4920)
==9808==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9808== 
==9808== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9814-- Caught __NR_exit; running __libc_freeres()
==9815== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9815-by-pythonnut-on-???
==9815== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9815-by-pythonnut-on-???
==9815== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9815-by-pythonnut-on-???
==9815== 
==9815== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9815== don't want to do, unless you know exactly what you're doing,
==9815== or are doing some strange experiment):
==9815==   /usr/lib/valgrind/../../bin/vgdb --pid=9815 ...command...
==9815== 
==9815== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9815==   /path/to/gdb ./zsh
==9815== and then give GDB the following command
==9815==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9815
==9815== --pid is optional if only one valgrind process is running
==9815== 
==9814== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9814-by-pythonnut-on-???
==9813== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9813-by-pythonnut-on-???
==9814== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9814-by-pythonnut-on-???
==9813== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9813-by-pythonnut-on-???
==9814== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9814-by-pythonnut-on-???
==9813== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9813-by-pythonnut-on-???
==9814== 
==9813== 
==9814== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9814== don't want to do, unless you know exactly what you're doing,
==9814== or are doing some strange experiment):
==9814==   /usr/lib/valgrind/../../bin/vgdb --pid=9814 ...command...
==9813== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9813== don't want to do, unless you know exactly what you're doing,
==9813== or are doing some strange experiment):
==9813==   /usr/lib/valgrind/../../bin/vgdb --pid=9813 ...command...
==9814== 
==9813== 
==9814== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9814==   /path/to/gdb ./zsh
==9814== and then give GDB the following command
==9814==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9814
==9814== --pid is optional if only one valgrind process is running
==9813== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9813==   /path/to/gdb ./zsh
==9813== and then give GDB the following command
==9813==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9813
==9814== 
==9813== --pid is optional if only one valgrind process is running
==9813== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
--9814-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
==9814== 
==9814== HEAP SUMMARY:
==9814==     in use at exit: 3,111,978 bytes in 68,921 blocks
==9814==   total heap usage: 1,584,931 allocs, 1,516,010 frees, 127,833,642 bytes allocated
==9814== 
==9814== Searching for pointers to 68,921 not-freed blocks
--9814--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9814--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9814--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9814--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9814--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9814--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9814--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9814--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9814--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9814--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9814--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9814--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9814--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9814--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9814--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9814--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9814--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9814--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9814--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9814--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9814--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9814--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9814--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9814--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9814--   Scanning root segment: 0x701a000..0x701afff (4096)
--9814--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9814--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9814--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9814--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9814--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9814--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9814--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9814--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9814--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9814--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9814== Checked 4,770,000 bytes
==9814== 
==9814== LEAK SUMMARY:
==9814==    definitely lost: 2,189 bytes in 12 blocks
==9814==    indirectly lost: 6,756 bytes in 7 blocks
==9814==      possibly lost: 0 bytes in 0 blocks
==9814==    still reachable: 3,103,033 bytes in 68,902 blocks
==9814==         suppressed: 0 bytes in 0 blocks
==9814== Rerun with --leak-check=full to see details of leaked memory
==9814== 
==9814== Use --track-origins=yes to see where uninitialised values come from
==9814== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9814== 
==9814== 1 errors in context 1 of 2:
==9814== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9814==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9814==    by 0x488CD0: stringsubst (subst.c:301)
==9814==    by 0x48801B: prefork (subst.c:77)
==9814==    by 0x42B318: execcmd (exec.c:2619)
==9814==    by 0x428CA0: execpline2 (exec.c:1697)
==9814==    by 0x427FD2: execpline (exec.c:1484)
==9814==    by 0x427756: execlist (exec.c:1267)
==9814==    by 0x42717C: execode (exec.c:1073)
==9814==    by 0x431299: runshfunc (exec.c:5040)
==9814==    by 0x430E76: doshfunc (exec.c:4920)
==9814==    by 0x4302FB: execshfunc (exec.c:4557)
==9814==    by 0x42D8C1: execcmd (exec.c:3373)
==9814== 
==9814== 
==9814== 2 errors in context 2 of 2:
==9814== Conditional jump or move depends on uninitialised value(s)
==9814==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9814==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9814==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9814==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9814==    by 0x42D8E9: execcmd (exec.c:3378)
==9814==    by 0x428CA0: execpline2 (exec.c:1697)
==9814==    by 0x427FD2: execpline (exec.c:1484)
==9814==    by 0x42779A: execlist (exec.c:1275)
==9814==    by 0x42717C: execode (exec.c:1073)
==9814==    by 0x431299: runshfunc (exec.c:5040)
==9814==    by 0x430E76: doshfunc (exec.c:4920)
==9814==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9814== 
==9814== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9813-- Caught __NR_exit; running __libc_freeres()
--9813-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9813== 
==9813== HEAP SUMMARY:
==9813==     in use at exit: 3,111,946 bytes in 68,921 blocks
==9813==   total heap usage: 1,584,935 allocs, 1,516,014 frees, 127,833,210 bytes allocated
==9813== 
==9813== Searching for pointers to 68,921 not-freed blocks
--9813--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9813--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9813--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9813--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9813--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9813--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9813--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9813--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9813--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9813--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9813--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9813--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9813--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9813--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9813--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9813--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9813--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9813--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9813--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9813--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9813--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9813--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9813--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9813--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9813--   Scanning root segment: 0x701a000..0x701afff (4096)
--9813--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9813--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9813--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9813--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9813--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9813--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9813--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9813--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9813--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9813--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9813== Checked 4,769,672 bytes
==9813== 
==9813== LEAK SUMMARY:
==9813==    definitely lost: 2,189 bytes in 12 blocks
==9813==    indirectly lost: 6,756 bytes in 7 blocks
==9813==      possibly lost: 0 bytes in 0 blocks
==9813==    still reachable: 3,103,001 bytes in 68,902 blocks
==9813==         suppressed: 0 bytes in 0 blocks
==9813== Rerun with --leak-check=full to see details of leaked memory
==9813== 
==9813== Use --track-origins=yes to see where uninitialised values come from
==9813== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9813== 
==9813== 1 errors in context 1 of 2:
==9813== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9813==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9813==    by 0x488CD0: stringsubst (subst.c:301)
==9813==    by 0x48801B: prefork (subst.c:77)
==9813==    by 0x42B318: execcmd (exec.c:2619)
==9813==    by 0x428CA0: execpline2 (exec.c:1697)
==9813==    by 0x427FD2: execpline (exec.c:1484)
==9813==    by 0x427756: execlist (exec.c:1267)
==9813==    by 0x42717C: execode (exec.c:1073)
==9813==    by 0x431299: runshfunc (exec.c:5040)
==9813==    by 0x430E76: doshfunc (exec.c:4920)
==9813==    by 0x4302FB: execshfunc (exec.c:4557)
==9813==    by 0x42D8C1: execcmd (exec.c:3373)
==9813== 
==9813== 
==9813== 2 errors in context 2 of 2:
==9813== Conditional jump or move depends on uninitialised value(s)
==9813==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9813==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9813==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9813==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9813==    by 0x42D8E9: execcmd (exec.c:3378)
==9813==    by 0x428CA0: execpline2 (exec.c:1697)
==9813==    by 0x427FD2: execpline (exec.c:1484)
==9813==    by 0x42779A: execlist (exec.c:1275)
==9813==    by 0x42717C: execode (exec.c:1073)
==9813==    by 0x431299: runshfunc (exec.c:5040)
==9813==    by 0x430E76: doshfunc (exec.c:4920)
==9813==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9813== 
==9813== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--9817-- Caught __NR_exit; running __libc_freeres()
==9817== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9817-by-pythonnut-on-???
==9817== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9817-by-pythonnut-on-???
==9817== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9817-by-pythonnut-on-???
==9817== 
==9817== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9817== don't want to do, unless you know exactly what you're doing,
==9817== or are doing some strange experiment):
==9817==   /usr/lib/valgrind/../../bin/vgdb --pid=9817 ...command...
==9817== 
==9817== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9817==   /path/to/gdb ./zsh
==9817== and then give GDB the following command
==9817==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9817
==9817== --pid is optional if only one valgrind process is running
==9817== 
--9817-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9817== 
==9817== HEAP SUMMARY:
==9817==     in use at exit: 3,112,215 bytes in 68,926 blocks
==9817==   total heap usage: 1,584,946 allocs, 1,516,020 frees, 127,838,304 bytes allocated
==9817== 
==9817== Searching for pointers to 68,926 not-freed blocks
--9817--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9817--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9817--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9817--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9817--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9817--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9817--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9817--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9817--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9817--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9817--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9817--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9817--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9817--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9817--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9817--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9817--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9817--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9817--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9817--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9817--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9817--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9817--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9817--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9817--   Scanning root segment: 0x701a000..0x701afff (4096)
--9817--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9817--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9817--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9817--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9817--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9817--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9817--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9817--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9817--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9817--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9817== Checked 4,769,664 bytes
==9817== 
==9817== LEAK SUMMARY:
==9817==    definitely lost: 2,189 bytes in 12 blocks
==9817==    indirectly lost: 6,756 bytes in 7 blocks
==9817==      possibly lost: 0 bytes in 0 blocks
==9817==    still reachable: 3,103,270 bytes in 68,907 blocks
==9817==         suppressed: 0 bytes in 0 blocks
==9817== Rerun with --leak-check=full to see details of leaked memory
==9817== 
==9817== Use --track-origins=yes to see where uninitialised values come from
==9817== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9817== 
==9817== 1 errors in context 1 of 2:
==9817== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9817==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9817==    by 0x488CD0: stringsubst (subst.c:301)
==9817==    by 0x48801B: prefork (subst.c:77)
==9817==    by 0x42B318: execcmd (exec.c:2619)
==9817==    by 0x428CA0: execpline2 (exec.c:1697)
==9817==    by 0x427FD2: execpline (exec.c:1484)
==9817==    by 0x427756: execlist (exec.c:1267)
==9817==    by 0x42717C: execode (exec.c:1073)
==9817==    by 0x431299: runshfunc (exec.c:5040)
==9817==    by 0x430E76: doshfunc (exec.c:4920)
==9817==    by 0x4302FB: execshfunc (exec.c:4557)
==9817==    by 0x42D8C1: execcmd (exec.c:3373)
==9817== 
==9817== 
==9817== 2 errors in context 2 of 2:
==9817== Conditional jump or move depends on uninitialised value(s)
==9817==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9817==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9817==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9817==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9817==    by 0x42D8E9: execcmd (exec.c:3378)
==9817==    by 0x428CA0: execpline2 (exec.c:1697)
==9817==    by 0x427FD2: execpline (exec.c:1484)
==9817==    by 0x42779A: execlist (exec.c:1275)
==9817==    by 0x42717C: execode (exec.c:1073)
==9817==    by 0x431299: runshfunc (exec.c:5040)
==9817==    by 0x430E76: doshfunc (exec.c:4920)
==9817==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9817== 
==9817== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9819== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9819-by-pythonnut-on-???
==9819== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9819-by-pythonnut-on-???
==9819== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9819-by-pythonnut-on-???
==9819== 
==9819== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9819== don't want to do, unless you know exactly what you're doing,
==9819== or are doing some strange experiment):
==9819==   /usr/lib/valgrind/../../bin/vgdb --pid=9819 ...command...
==9819== 
==9819== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9819==   /path/to/gdb ./zsh
==9819== and then give GDB the following command
==9819==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9819
==9819== --pid is optional if only one valgrind process is running
==9819== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9819-- Caught __NR_exit; running __libc_freeres()
--9819-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9819== 
==9819== HEAP SUMMARY:
==9819==     in use at exit: 3,112,322 bytes in 68,930 blocks
==9819==   total heap usage: 1,584,954 allocs, 1,516,024 frees, 127,840,523 bytes allocated
==9819== 
==9819== Searching for pointers to 68,930 not-freed blocks
--9819--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9819--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9819--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9819--   Scanning root segment: 0x4037000..0x403afff (16384)
--9819--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9819--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9819--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9819--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9819--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9819--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9819--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9819--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9819--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9819--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9819--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9819--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9819--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9819--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9819--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9819--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9819--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9819--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9819--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9819--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9819--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9819--   Scanning root segment: 0x701a000..0x701afff (4096)
--9819--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9819--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9819--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9819--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9819--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9819--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9819--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9819--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9819--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9819--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9819== Checked 4,786,416 bytes
==9819== 
==9819== LEAK SUMMARY:
==9819==    definitely lost: 2,189 bytes in 12 blocks
==9819==    indirectly lost: 6,756 bytes in 7 blocks
==9819==      possibly lost: 0 bytes in 0 blocks
==9819==    still reachable: 3,103,377 bytes in 68,911 blocks
==9819==         suppressed: 0 bytes in 0 blocks
==9819== Rerun with --leak-check=full to see details of leaked memory
==9819== 
==9819== Use --track-origins=yes to see where uninitialised values come from
==9819== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9819== 
==9819== 1 errors in context 1 of 2:
==9819== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9819==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9819==    by 0x488CD0: stringsubst (subst.c:301)
==9819==    by 0x48801B: prefork (subst.c:77)
==9819==    by 0x42B318: execcmd (exec.c:2619)
==9819==    by 0x428CA0: execpline2 (exec.c:1697)
==9819==    by 0x427FD2: execpline (exec.c:1484)
==9819==    by 0x427756: execlist (exec.c:1267)
==9819==    by 0x42717C: execode (exec.c:1073)
==9819==    by 0x431299: runshfunc (exec.c:5040)
==9819==    by 0x430E76: doshfunc (exec.c:4920)
==9819==    by 0x4302FB: execshfunc (exec.c:4557)
==9819==    by 0x42D8C1: execcmd (exec.c:3373)
==9819== 
==9819== 
==9819== 2 errors in context 2 of 2:
==9819== Conditional jump or move depends on uninitialised value(s)
==9819==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9819==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9819==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9819==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9819==    by 0x42D8E9: execcmd (exec.c:3378)
==9819==    by 0x428CA0: execpline2 (exec.c:1697)
==9819==    by 0x427FD2: execpline (exec.c:1484)
==9819==    by 0x42779A: execlist (exec.c:1275)
==9819==    by 0x42717C: execode (exec.c:1073)
==9819==    by 0x431299: runshfunc (exec.c:5040)
==9819==    by 0x430E76: doshfunc (exec.c:4920)
==9819==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9819== 
==9819== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--9823-- Caught __NR_exit; running __libc_freeres()
==9823== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9823-by-pythonnut-on-???
==9823== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9823-by-pythonnut-on-???
==9823== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9823-by-pythonnut-on-???
==9823== 
==9823== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9823== don't want to do, unless you know exactly what you're doing,
==9823== or are doing some strange experiment):
==9823==   /usr/lib/valgrind/../../bin/vgdb --pid=9823 ...command...
==9823== 
==9823== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9823==   /path/to/gdb ./zsh
==9823== and then give GDB the following command
==9823==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9823
==9823== --pid is optional if only one valgrind process is running
==9823== 
--9823-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9823== 
==9823== HEAP SUMMARY:
==9823==     in use at exit: 3,111,612 bytes in 68,915 blocks
==9823==   total heap usage: 1,585,004 allocs, 1,516,089 frees, 127,846,992 bytes allocated
==9823== 
==9823== Searching for pointers to 68,915 not-freed blocks
--9823--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9823--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9823--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9823--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9823--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9823--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9823--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9823--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9823--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9823--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9823--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9823--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9823--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9823--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9823--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9823--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9823--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9823--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9823--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9823--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9823--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9823--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9823--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9823--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9823--   Scanning root segment: 0x701a000..0x701afff (4096)
--9823--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9823--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9823--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9823--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9823--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9823--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9823--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9823--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9823--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9823--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9823== Checked 4,786,576 bytes
==9823== 
==9823== LEAK SUMMARY:
==9823==    definitely lost: 2,189 bytes in 12 blocks
==9823==    indirectly lost: 6,756 bytes in 7 blocks
==9823==      possibly lost: 0 bytes in 0 blocks
==9823==    still reachable: 3,102,667 bytes in 68,896 blocks
==9823==         suppressed: 0 bytes in 0 blocks
==9823== Rerun with --leak-check=full to see details of leaked memory
==9823== 
==9823== Use --track-origins=yes to see where uninitialised values come from
==9823== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9823== 
==9823== 1 errors in context 1 of 2:
==9823== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9823==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9823==    by 0x488CD0: stringsubst (subst.c:301)
==9823==    by 0x48801B: prefork (subst.c:77)
==9823==    by 0x42B318: execcmd (exec.c:2619)
==9823==    by 0x428CA0: execpline2 (exec.c:1697)
==9823==    by 0x427FD2: execpline (exec.c:1484)
==9823==    by 0x427756: execlist (exec.c:1267)
==9823==    by 0x42717C: execode (exec.c:1073)
==9823==    by 0x431299: runshfunc (exec.c:5040)
==9823==    by 0x430E76: doshfunc (exec.c:4920)
==9823==    by 0x4302FB: execshfunc (exec.c:4557)
==9823==    by 0x42D8C1: execcmd (exec.c:3373)
==9823== 
==9823== 
==9823== 2 errors in context 2 of 2:
==9823== Conditional jump or move depends on uninitialised value(s)
==9823==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9823==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9823==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9823==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9823==    by 0x42D8E9: execcmd (exec.c:3378)
==9823==    by 0x428CA0: execpline2 (exec.c:1697)
==9823==    by 0x427FD2: execpline (exec.c:1484)
==9823==    by 0x42779A: execlist (exec.c:1275)
==9823==    by 0x42717C: execode (exec.c:1073)
==9823==    by 0x431299: runshfunc (exec.c:5040)
==9823==    by 0x430E76: doshfunc (exec.c:4920)
==9823==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9823== 
==9823== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9824== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9824-by-pythonnut-on-???
==9824== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9824-by-pythonnut-on-???
==9824== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9824-by-pythonnut-on-???
==9824== 
==9824== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9824== don't want to do, unless you know exactly what you're doing,
==9824== or are doing some strange experiment):
==9824==   /usr/lib/valgrind/../../bin/vgdb --pid=9824 ...command...
==9824== 
==9824== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9824==   /path/to/gdb ./zsh
==9824== and then give GDB the following command
==9824==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9824
==9824== --pid is optional if only one valgrind process is running
==9824== 
--9824-- Caught __NR_exit; running __libc_freeres()
--9824-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9824== 
==9824== HEAP SUMMARY:
==9824==     in use at exit: 3,113,041 bytes in 68,962 blocks
==9824==   total heap usage: 1,585,096 allocs, 1,516,134 frees, 127,855,102 bytes allocated
==9824== 
==9824== Searching for pointers to 68,962 not-freed blocks
--9824--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9824--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9824--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9824--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9824--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9824--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9824--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9824--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9824--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9824--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9824--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9824--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9824--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9824--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9824--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9824--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9824--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9824--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9824--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9824--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9824--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9824--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9824--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9824--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9824--   Scanning root segment: 0x701a000..0x701afff (4096)
--9824--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9824--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9824--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9824--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9824--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9824--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9824--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9824--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9824--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9824--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9824== Checked 4,767,064 bytes
==9824== 
==9824== LEAK SUMMARY:
==9824==    definitely lost: 2,189 bytes in 12 blocks
==9824==    indirectly lost: 6,756 bytes in 7 blocks
==9824==      possibly lost: 0 bytes in 0 blocks
==9824==    still reachable: 3,104,096 bytes in 68,943 blocks
==9824==         suppressed: 0 bytes in 0 blocks
==9824== Rerun with --leak-check=full to see details of leaked memory
==9824== 
==9824== Use --track-origins=yes to see where uninitialised values come from
==9824== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9824== 
==9824== 1 errors in context 1 of 2:
==9824== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9824==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9824==    by 0x488CD0: stringsubst (subst.c:301)
==9824==    by 0x48801B: prefork (subst.c:77)
==9824==    by 0x42B318: execcmd (exec.c:2619)
==9824==    by 0x428CA0: execpline2 (exec.c:1697)
==9824==    by 0x427FD2: execpline (exec.c:1484)
==9824==    by 0x427756: execlist (exec.c:1267)
==9824==    by 0x42717C: execode (exec.c:1073)
==9824==    by 0x431299: runshfunc (exec.c:5040)
==9824==    by 0x430E76: doshfunc (exec.c:4920)
==9824==    by 0x4302FB: execshfunc (exec.c:4557)
==9824==    by 0x42D8C1: execcmd (exec.c:3373)
==9824== 
==9824== 
==9824== 2 errors in context 2 of 2:
==9824== Conditional jump or move depends on uninitialised value(s)
==9824==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9824==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9824==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9824==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9824==    by 0x42D8E9: execcmd (exec.c:3378)
==9824==    by 0x428CA0: execpline2 (exec.c:1697)
==9824==    by 0x427FD2: execpline (exec.c:1484)
==9824==    by 0x42779A: execlist (exec.c:1275)
==9824==    by 0x42717C: execode (exec.c:1073)
==9824==    by 0x431299: runshfunc (exec.c:5040)
==9824==    by 0x430E76: doshfunc (exec.c:4920)
==9824==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9824== 
==9824== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9827== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9827-by-pythonnut-on-???
==9827== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9827-by-pythonnut-on-???
==9827== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9827-by-pythonnut-on-???
==9827== 
==9827== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9827== don't want to do, unless you know exactly what you're doing,
==9827== or are doing some strange experiment):
==9827==   /usr/lib/valgrind/../../bin/vgdb --pid=9827 ...command...
==9827== 
==9827== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9827==   /path/to/gdb ./zsh
==9827== and then give GDB the following command
==9827==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9827
==9827== --pid is optional if only one valgrind process is running
==9827== 
==9828== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9828-by-pythonnut-on-???
==9828== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9828-by-pythonnut-on-???
==9828== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9828-by-pythonnut-on-???
==9828== 
==9828== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9828== don't want to do, unless you know exactly what you're doing,
==9828== or are doing some strange experiment):
==9828==   /usr/lib/valgrind/../../bin/vgdb --pid=9828 ...command...
==9828== 
==9828== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9828==   /path/to/gdb ./zsh
==9828== and then give GDB the following command
==9828==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9828
==9828== --pid is optional if only one valgrind process is running
==9828== 
==9829== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9829-by-pythonnut-on-???
==9829== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9829-by-pythonnut-on-???
==9829== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9829-by-pythonnut-on-???
==9829== 
==9829== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9829== don't want to do, unless you know exactly what you're doing,
==9829== or are doing some strange experiment):
==9829==   /usr/lib/valgrind/../../bin/vgdb --pid=9829 ...command...
==9829== 
==9829== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9829==   /path/to/gdb ./zsh
==9829== and then give GDB the following command
==9829==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9829
==9829== --pid is optional if only one valgrind process is running
==9829== 
client request: code 4d430005,  addr 0xFFEFF0B2C,  len 4
--9829-- Caught __NR_exit; running __libc_freeres()
--9829-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9829== 
==9829== HEAP SUMMARY:
==9829==     in use at exit: 3,116,830 bytes in 69,028 blocks
==9829==   total heap usage: 1,585,237 allocs, 1,516,209 frees, 127,886,085 bytes allocated
==9829== 
==9829== Searching for pointers to 69,028 not-freed blocks
--9829--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9829--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9829--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9829--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9829--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9829--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9829--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9829--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9829--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9829--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9829--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9829--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9829--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9829--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9829--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9829--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9829--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9829--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9829--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9829--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9829--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9829--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9829--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9829--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9829--   Scanning root segment: 0x701a000..0x701afff (4096)
--9829--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9829--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9829--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9829--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9829--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9829--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9829--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9829--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9829--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9829--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9829== Checked 4,774,480 bytes
==9829== 
==9829== LEAK SUMMARY:
==9829==    definitely lost: 2,189 bytes in 12 blocks
==9829==    indirectly lost: 6,756 bytes in 7 blocks
==9829==      possibly lost: 0 bytes in 0 blocks
==9829==    still reachable: 3,107,885 bytes in 69,009 blocks
==9829==         suppressed: 0 bytes in 0 blocks
==9829== Rerun with --leak-check=full to see details of leaked memory
==9829== 
==9829== Use --track-origins=yes to see where uninitialised values come from
==9829== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9829== 
==9829== 1 errors in context 1 of 2:
==9829== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9829==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9829==    by 0x488CD0: stringsubst (subst.c:301)
==9829==    by 0x48801B: prefork (subst.c:77)
==9829==    by 0x42B318: execcmd (exec.c:2619)
==9829==    by 0x428CA0: execpline2 (exec.c:1697)
==9829==    by 0x427FD2: execpline (exec.c:1484)
==9829==    by 0x427756: execlist (exec.c:1267)
==9829==    by 0x42717C: execode (exec.c:1073)
==9829==    by 0x431299: runshfunc (exec.c:5040)
==9829==    by 0x430E76: doshfunc (exec.c:4920)
==9829==    by 0x4302FB: execshfunc (exec.c:4557)
==9829==    by 0x42D8C1: execcmd (exec.c:3373)
==9829== 
==9829== 
==9829== 2 errors in context 2 of 2:
==9829== Conditional jump or move depends on uninitialised value(s)
==9829==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9829==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9829==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9829==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9829==    by 0x42D8E9: execcmd (exec.c:3378)
==9829==    by 0x428CA0: execpline2 (exec.c:1697)
==9829==    by 0x427FD2: execpline (exec.c:1484)
==9829==    by 0x42779A: execlist (exec.c:1275)
==9829==    by 0x42717C: execode (exec.c:1073)
==9829==    by 0x431299: runshfunc (exec.c:5040)
==9829==    by 0x430E76: doshfunc (exec.c:4920)
==9829==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9829== 
==9829== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9832-- Caught __NR_exit; running __libc_freeres()
==9832== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9832-by-pythonnut-on-???
==9832== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9832-by-pythonnut-on-???
==9832== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9832-by-pythonnut-on-???
==9832== 
==9832== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9832== don't want to do, unless you know exactly what you're doing,
==9832== or are doing some strange experiment):
==9832==   /usr/lib/valgrind/../../bin/vgdb --pid=9832 ...command...
==9832== 
==9832== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9832==   /path/to/gdb ./zsh
==9832== and then give GDB the following command
==9832==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9832
==9832== --pid is optional if only one valgrind process is running
==9832== 
==9833== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9833-by-pythonnut-on-???
==9833== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9833-by-pythonnut-on-???
==9833== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9833-by-pythonnut-on-???
==9833== 
==9833== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9833== don't want to do, unless you know exactly what you're doing,
==9833== or are doing some strange experiment):
==9833==   /usr/lib/valgrind/../../bin/vgdb --pid=9833 ...command...
==9833== 
==9833== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9833==   /path/to/gdb ./zsh
==9833== and then give GDB the following command
==9833==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9833
==9833== --pid is optional if only one valgrind process is running
==9833== 
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9832-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9832== 
==9832== HEAP SUMMARY:
==9832==     in use at exit: 3,153,721 bytes in 69,036 blocks
==9832==   total heap usage: 1,585,245 allocs, 1,516,209 frees, 127,926,032 bytes allocated
==9832== 
==9832== Searching for pointers to 69,036 not-freed blocks
--9832--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9832--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9832--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9832--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9832--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9832--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9832--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9832--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9832--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9832--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9832--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9832--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9832--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9832--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9832--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9832--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9832--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9832--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9832--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9832--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9832--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9832--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9832--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9832--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9832--   Scanning root segment: 0x701a000..0x701afff (4096)
--9832--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9832--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9832--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9832--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9832--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9832--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9832--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9832--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9832--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9832--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9832== Checked 4,886,288 bytes
==9832== 
==9832== LEAK SUMMARY:
==9832==    definitely lost: 2,189 bytes in 12 blocks
==9832==    indirectly lost: 6,756 bytes in 7 blocks
==9832==      possibly lost: 0 bytes in 0 blocks
==9832==    still reachable: 3,144,776 bytes in 69,017 blocks
==9832==         suppressed: 0 bytes in 0 blocks
==9832== Rerun with --leak-check=full to see details of leaked memory
==9832== 
==9832== Use --track-origins=yes to see where uninitialised values come from
==9832== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9832== 
==9832== 1 errors in context 1 of 2:
==9832== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9832==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9832==    by 0x488CD0: stringsubst (subst.c:301)
==9832==    by 0x48801B: prefork (subst.c:77)
==9832==    by 0x42B318: execcmd (exec.c:2619)
==9832==    by 0x428CA0: execpline2 (exec.c:1697)
==9832==    by 0x427FD2: execpline (exec.c:1484)
==9832==    by 0x427756: execlist (exec.c:1267)
==9832==    by 0x42717C: execode (exec.c:1073)
==9832==    by 0x431299: runshfunc (exec.c:5040)
==9832==    by 0x430E76: doshfunc (exec.c:4920)
==9832==    by 0x4302FB: execshfunc (exec.c:4557)
==9832==    by 0x42D8C1: execcmd (exec.c:3373)
==9832== 
==9832== 
==9832== 2 errors in context 2 of 2:
==9832== Conditional jump or move depends on uninitialised value(s)
==9832==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9832==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9832==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9832==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9832==    by 0x42D8E9: execcmd (exec.c:3378)
==9832==    by 0x428CA0: execpline2 (exec.c:1697)
==9832==    by 0x427FD2: execpline (exec.c:1484)
==9832==    by 0x42779A: execlist (exec.c:1275)
==9832==    by 0x42717C: execode (exec.c:1073)
==9832==    by 0x431299: runshfunc (exec.c:5040)
==9832==    by 0x430E76: doshfunc (exec.c:4920)
==9832==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9832== 
==9832== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9831== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9831-by-pythonnut-on-???
==9831== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9831-by-pythonnut-on-???
==9831== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9831-by-pythonnut-on-???
==9831== 
==9831== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9831== don't want to do, unless you know exactly what you're doing,
==9831== or are doing some strange experiment):
==9831==   /usr/lib/valgrind/../../bin/vgdb --pid=9831 ...command...
==9831== 
==9831== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9831==   /path/to/gdb ./zsh
==9831== and then give GDB the following command
==9831==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9831
==9831== --pid is optional if only one valgrind process is running
==9831== 
--9831-- Caught __NR_exit; running __libc_freeres()
--9831-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9831== 
==9831== HEAP SUMMARY:
==9831==     in use at exit: 3,153,657 bytes in 69,033 blocks
==9831==   total heap usage: 1,585,247 allocs, 1,516,214 frees, 127,926,576 bytes allocated
==9831== 
==9831== Searching for pointers to 69,033 not-freed blocks
--9831--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9831--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9831--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9831--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9831--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9831--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9831--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9831--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9831--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9831--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9831--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9831--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9831--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9831--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9831--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9831--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9831--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9831--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9831--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9831--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9831--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9831--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9831--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9831--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9831--   Scanning root segment: 0x701a000..0x701afff (4096)
--9831--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9831--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9831--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9831--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9831--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9831--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9831--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9831--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9831--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9831--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9831== Checked 4,885,616 bytes
==9831== 
==9831== LEAK SUMMARY:
==9831==    definitely lost: 2,189 bytes in 12 blocks
==9831==    indirectly lost: 6,756 bytes in 7 blocks
==9831==      possibly lost: 0 bytes in 0 blocks
==9831==    still reachable: 3,144,712 bytes in 69,014 blocks
==9831==         suppressed: 0 bytes in 0 blocks
==9831== Rerun with --leak-check=full to see details of leaked memory
==9831== 
==9831== Use --track-origins=yes to see where uninitialised values come from
==9831== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9831== 
==9831== 1 errors in context 1 of 2:
==9831== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9831==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9831==    by 0x488CD0: stringsubst (subst.c:301)
==9831==    by 0x48801B: prefork (subst.c:77)
==9831==    by 0x42B318: execcmd (exec.c:2619)
==9831==    by 0x428CA0: execpline2 (exec.c:1697)
==9831==    by 0x427FD2: execpline (exec.c:1484)
==9831==    by 0x427756: execlist (exec.c:1267)
==9831==    by 0x42717C: execode (exec.c:1073)
==9831==    by 0x431299: runshfunc (exec.c:5040)
==9831==    by 0x430E76: doshfunc (exec.c:4920)
==9831==    by 0x4302FB: execshfunc (exec.c:4557)
==9831==    by 0x42D8C1: execcmd (exec.c:3373)
==9831== 
==9831== 
==9831== 2 errors in context 2 of 2:
==9831== Conditional jump or move depends on uninitialised value(s)
==9831==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9831==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9831==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9831==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9831==    by 0x42D8E9: execcmd (exec.c:3378)
==9831==    by 0x428CA0: execpline2 (exec.c:1697)
==9831==    by 0x427FD2: execpline (exec.c:1484)
==9831==    by 0x42779A: execlist (exec.c:1275)
==9831==    by 0x42717C: execode (exec.c:1073)
==9831==    by 0x431299: runshfunc (exec.c:5040)
==9831==    by 0x430E76: doshfunc (exec.c:4920)
==9831==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9831== 
==9831== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9834== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9834-by-pythonnut-on-???
==9834== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9834-by-pythonnut-on-???
==9834== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9834-by-pythonnut-on-???
==9834== 
==9834== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9834== don't want to do, unless you know exactly what you're doing,
==9834== or are doing some strange experiment):
==9834==   /usr/lib/valgrind/../../bin/vgdb --pid=9834 ...command...
==9834== 
==9834== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9834==   /path/to/gdb ./zsh
==9834== and then give GDB the following command
==9834==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9834
==9834== --pid is optional if only one valgrind process is running
==9834== 
==9835== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9835-by-pythonnut-on-???
==9835== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9835-by-pythonnut-on-???
==9835== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9835-by-pythonnut-on-???
==9835== 
==9835== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9835== don't want to do, unless you know exactly what you're doing,
==9835== or are doing some strange experiment):
==9835==   /usr/lib/valgrind/../../bin/vgdb --pid=9835 ...command...
==9835== 
==9835== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9835==   /path/to/gdb ./zsh
==9835== and then give GDB the following command
==9835==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9835
==9835== --pid is optional if only one valgrind process is running
==9835== 
--9835-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF172C,  len 4
--9835-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9835== 
==9835== HEAP SUMMARY:
==9835==     in use at exit: 3,190,371 bytes in 69,039 blocks
==9835==   total heap usage: 1,585,254 allocs, 1,516,215 frees, 127,964,867 bytes allocated
==9835== 
==9835== Searching for pointers to 69,039 not-freed blocks
--9835--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9835--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9835--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9835--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9835--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9835--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9835--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9835--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9835--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9835--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9835--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9835--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9835--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9835--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9835--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9835--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9835--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9835--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9835--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9835--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9835--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9835--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9835--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9835--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9835--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9835--   Scanning root segment: 0x701a000..0x701afff (4096)
--9835--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9835--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9835--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9835--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9835--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9835--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9835--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9835--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9835--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9835--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9835== Checked 4,959,800 bytes
==9835== 
==9835== LEAK SUMMARY:
==9835==    definitely lost: 2,189 bytes in 12 blocks
==9835==    indirectly lost: 6,756 bytes in 7 blocks
==9835==      possibly lost: 0 bytes in 0 blocks
==9835==    still reachable: 3,181,426 bytes in 69,020 blocks
==9835==         suppressed: 0 bytes in 0 blocks
==9835== Rerun with --leak-check=full to see details of leaked memory
==9835== 
==9835== Use --track-origins=yes to see where uninitialised values come from
==9835== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9835== 
==9835== 1 errors in context 1 of 2:
==9835== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9835==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9835==    by 0x488CD0: stringsubst (subst.c:301)
==9835==    by 0x48801B: prefork (subst.c:77)
==9835==    by 0x42B318: execcmd (exec.c:2619)
==9835==    by 0x428CA0: execpline2 (exec.c:1697)
==9835==    by 0x427FD2: execpline (exec.c:1484)
==9835==    by 0x427756: execlist (exec.c:1267)
==9835==    by 0x42717C: execode (exec.c:1073)
==9835==    by 0x431299: runshfunc (exec.c:5040)
==9835==    by 0x430E76: doshfunc (exec.c:4920)
==9835==    by 0x4302FB: execshfunc (exec.c:4557)
==9835==    by 0x42D8C1: execcmd (exec.c:3373)
==9835== 
==9835== 
==9835== 2 errors in context 2 of 2:
==9835== Conditional jump or move depends on uninitialised value(s)
==9835==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9835==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9835==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9835==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9835==    by 0x42D8E9: execcmd (exec.c:3378)
==9835==    by 0x428CA0: execpline2 (exec.c:1697)
==9835==    by 0x427FD2: execpline (exec.c:1484)
==9835==    by 0x42779A: execlist (exec.c:1275)
==9835==    by 0x42717C: execode (exec.c:1073)
==9835==    by 0x431299: runshfunc (exec.c:5040)
==9835==    by 0x430E76: doshfunc (exec.c:4920)
==9835==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9835== 
==9835== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9834-- Caught __NR_exit; running __libc_freeres()
--9834-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9834== 
==9834== HEAP SUMMARY:
==9834==     in use at exit: 3,153,731 bytes in 69,036 blocks
==9834==   total heap usage: 1,585,257 allocs, 1,516,221 frees, 127,965,443 bytes allocated
==9834== 
==9834== Searching for pointers to 69,036 not-freed blocks
--9834--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9834--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9834--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9834--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9834--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9834--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9834--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9834--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9834--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9834--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9834--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9834--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9834--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9834--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9834--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9834--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9834--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9834--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9834--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9834--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9834--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9834--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9834--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9834--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9834--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9834--   Scanning root segment: 0x701a000..0x701afff (4096)
--9834--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9834--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9834--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9834--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9834--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9834--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9834--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9834--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9834--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9834--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9834== Checked 4,922,544 bytes
==9834== 
==9834== LEAK SUMMARY:
==9834==    definitely lost: 2,189 bytes in 12 blocks
==9834==    indirectly lost: 6,756 bytes in 7 blocks
==9834==      possibly lost: 0 bytes in 0 blocks
==9834==    still reachable: 3,144,786 bytes in 69,017 blocks
==9834==         suppressed: 0 bytes in 0 blocks
==9834== Rerun with --leak-check=full to see details of leaked memory
==9834== 
==9834== Use --track-origins=yes to see where uninitialised values come from
==9834== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9834== 
==9834== 1 errors in context 1 of 2:
==9834== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9834==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9834==    by 0x488CD0: stringsubst (subst.c:301)
==9834==    by 0x48801B: prefork (subst.c:77)
==9834==    by 0x42B318: execcmd (exec.c:2619)
==9834==    by 0x428CA0: execpline2 (exec.c:1697)
==9834==    by 0x427FD2: execpline (exec.c:1484)
==9834==    by 0x427756: execlist (exec.c:1267)
==9834==    by 0x42717C: execode (exec.c:1073)
==9834==    by 0x431299: runshfunc (exec.c:5040)
==9834==    by 0x430E76: doshfunc (exec.c:4920)
==9834==    by 0x4302FB: execshfunc (exec.c:4557)
==9834==    by 0x42D8C1: execcmd (exec.c:3373)
==9834== 
==9834== 
==9834== 2 errors in context 2 of 2:
==9834== Conditional jump or move depends on uninitialised value(s)
==9834==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9834==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9834==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9834==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9834==    by 0x42D8E9: execcmd (exec.c:3378)
==9834==    by 0x428CA0: execpline2 (exec.c:1697)
==9834==    by 0x427FD2: execpline (exec.c:1484)
==9834==    by 0x42779A: execlist (exec.c:1275)
==9834==    by 0x42717C: execode (exec.c:1073)
==9834==    by 0x431299: runshfunc (exec.c:5040)
==9834==    by 0x430E76: doshfunc (exec.c:4920)
==9834==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9834== 
==9834== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9839== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9839-by-pythonnut-on-???
==9839== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9839-by-pythonnut-on-???
==9839== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9839-by-pythonnut-on-???
==9839== 
==9839== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9839== don't want to do, unless you know exactly what you're doing,
==9839== or are doing some strange experiment):
==9839==   /usr/lib/valgrind/../../bin/vgdb --pid=9839 ...command...
==9839== 
==9839== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9839==   /path/to/gdb ./zsh
==9839== and then give GDB the following command
==9839==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9839
==9839== --pid is optional if only one valgrind process is running
==9839== 
--9840-- Caught __NR_exit; running __libc_freeres()
==9840== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9840-by-pythonnut-on-???
==9840== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9840-by-pythonnut-on-???
==9840== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9840-by-pythonnut-on-???
==9840== 
==9840== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9840== don't want to do, unless you know exactly what you're doing,
==9840== or are doing some strange experiment):
==9840==   /usr/lib/valgrind/../../bin/vgdb --pid=9840 ...command...
==9840== 
==9840== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9840==   /path/to/gdb ./zsh
==9840== and then give GDB the following command
==9840==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9840
==9840== --pid is optional if only one valgrind process is running
==9840== 
--9840-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9840== 
==9840== HEAP SUMMARY:
==9840==     in use at exit: 3,154,587 bytes in 69,042 blocks
==9840==   total heap usage: 1,585,266 allocs, 1,516,224 frees, 127,933,155 bytes allocated
==9840== 
==9840== Searching for pointers to 69,042 not-freed blocks
--9840--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9840--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9840--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9840--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9840--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9840--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9840--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9840--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9840--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9840--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9840--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9840--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9840--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9840--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9840--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9840--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9840--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9840--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9840--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9840--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9840--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9840--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9840--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9840--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9840--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9840--   Scanning root segment: 0x701a000..0x701afff (4096)
--9840--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9840--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9840--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9840--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9840--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9840--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9840--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9840--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9840--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9840--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9840== Checked 4,903,240 bytes
==9840== 
==9840== LEAK SUMMARY:
==9840==    definitely lost: 2,189 bytes in 12 blocks
==9840==    indirectly lost: 6,756 bytes in 7 blocks
==9840==      possibly lost: 0 bytes in 0 blocks
==9840==    still reachable: 3,145,642 bytes in 69,023 blocks
==9840==         suppressed: 0 bytes in 0 blocks
==9840== Rerun with --leak-check=full to see details of leaked memory
==9840== 
==9840== Use --track-origins=yes to see where uninitialised values come from
==9840== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9840== 
==9840== 1 errors in context 1 of 2:
==9840== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9840==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9840==    by 0x488CD0: stringsubst (subst.c:301)
==9840==    by 0x48801B: prefork (subst.c:77)
==9840==    by 0x42B318: execcmd (exec.c:2619)
==9840==    by 0x428CA0: execpline2 (exec.c:1697)
==9840==    by 0x427FD2: execpline (exec.c:1484)
==9840==    by 0x427756: execlist (exec.c:1267)
==9840==    by 0x42717C: execode (exec.c:1073)
==9840==    by 0x431299: runshfunc (exec.c:5040)
==9840==    by 0x430E76: doshfunc (exec.c:4920)
==9840==    by 0x4302FB: execshfunc (exec.c:4557)
==9840==    by 0x42D8C1: execcmd (exec.c:3373)
==9840== 
==9840== 
==9840== 2 errors in context 2 of 2:
==9840== Conditional jump or move depends on uninitialised value(s)
==9840==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9840==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9840==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9840==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9840==    by 0x42D8E9: execcmd (exec.c:3378)
==9840==    by 0x428CA0: execpline2 (exec.c:1697)
==9840==    by 0x427FD2: execpline (exec.c:1484)
==9840==    by 0x42779A: execlist (exec.c:1275)
==9840==    by 0x42717C: execode (exec.c:1073)
==9840==    by 0x431299: runshfunc (exec.c:5040)
==9840==    by 0x430E76: doshfunc (exec.c:4920)
==9840==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9840== 
==9840== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9839-- Caught __NR_exit; running __libc_freeres()
--9839-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9839== 
==9839== HEAP SUMMARY:
==9839==     in use at exit: 3,154,352 bytes in 69,042 blocks
==9839==   total heap usage: 1,585,303 allocs, 1,516,261 frees, 127,942,664 bytes allocated
==9839== 
==9839== Searching for pointers to 69,042 not-freed blocks
--9839--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9839--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9839--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9839--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9839--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9839--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9839--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9839--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9839--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9839--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9839--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9839--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9839--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9839--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9839--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9839--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9839--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9839--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9839--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9839--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9839--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9839--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9839--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9839--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9839--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9839--   Scanning root segment: 0x701a000..0x701afff (4096)
--9839--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9839--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9839--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9839--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9839--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9839--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9839--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9839--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9839--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9839--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9839== Checked 4,902,440 bytes
==9839== 
==9839== LEAK SUMMARY:
==9839==    definitely lost: 2,189 bytes in 12 blocks
==9839==    indirectly lost: 6,756 bytes in 7 blocks
==9839==      possibly lost: 0 bytes in 0 blocks
==9839==    still reachable: 3,145,407 bytes in 69,023 blocks
==9839==         suppressed: 0 bytes in 0 blocks
==9839== Rerun with --leak-check=full to see details of leaked memory
==9839== 
==9839== Use --track-origins=yes to see where uninitialised values come from
==9839== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9839== 
==9839== 1 errors in context 1 of 2:
==9839== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9839==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9839==    by 0x488CD0: stringsubst (subst.c:301)
==9839==    by 0x48801B: prefork (subst.c:77)
==9839==    by 0x42B318: execcmd (exec.c:2619)
==9839==    by 0x428CA0: execpline2 (exec.c:1697)
==9839==    by 0x427FD2: execpline (exec.c:1484)
==9839==    by 0x427756: execlist (exec.c:1267)
==9839==    by 0x42717C: execode (exec.c:1073)
==9839==    by 0x431299: runshfunc (exec.c:5040)
==9839==    by 0x430E76: doshfunc (exec.c:4920)
==9839==    by 0x4302FB: execshfunc (exec.c:4557)
==9839==    by 0x42D8C1: execcmd (exec.c:3373)
==9839== 
==9839== 
==9839== 2 errors in context 2 of 2:
==9839== Conditional jump or move depends on uninitialised value(s)
==9839==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9839==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9839==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9839==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9839==    by 0x42D8E9: execcmd (exec.c:3378)
==9839==    by 0x428CA0: execpline2 (exec.c:1697)
==9839==    by 0x427FD2: execpline (exec.c:1484)
==9839==    by 0x42779A: execlist (exec.c:1275)
==9839==    by 0x42717C: execode (exec.c:1073)
==9839==    by 0x431299: runshfunc (exec.c:5040)
==9839==    by 0x430E76: doshfunc (exec.c:4920)
==9839==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9839== 
==9839== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9841-- Caught __NR_exit; running __libc_freeres()
==9841== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9841-by-pythonnut-on-???
==9841== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9841-by-pythonnut-on-???
==9841== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9841-by-pythonnut-on-???
==9841== 
==9841== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9841== don't want to do, unless you know exactly what you're doing,
==9841== or are doing some strange experiment):
==9841==   /usr/lib/valgrind/../../bin/vgdb --pid=9841 ...command...
==9841== 
==9841== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9841==   /path/to/gdb ./zsh
==9841== and then give GDB the following command
==9841==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9841
==9841== --pid is optional if only one valgrind process is running
==9841== 
client request: code 4d430005,  addr 0xFFEFF1DAC,  len 4
--9841-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9841== 
--9842-- Caught __NR_exit; running __libc_freeres()
==9841== HEAP SUMMARY:
==9841==     in use at exit: 3,117,401 bytes in 69,042 blocks
==9841==   total heap usage: 1,585,275 allocs, 1,516,233 frees, 127,936,575 bytes allocated
==9841== 
==9842== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9842-by-pythonnut-on-???
==9842== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9842-by-pythonnut-on-???
==9842== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9842-by-pythonnut-on-???
==9842== 
==9842== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9842== don't want to do, unless you know exactly what you're doing,
==9842== or are doing some strange experiment):
==9842==   /usr/lib/valgrind/../../bin/vgdb --pid=9842 ...command...
==9842== 
==9842== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9842==   /path/to/gdb ./zsh
==9842== and then give GDB the following command
==9842==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9842
==9842== --pid is optional if only one valgrind process is running
==9842== 
==9841== Searching for pointers to 69,042 not-freed blocks
--9841--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9841--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9841--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9841--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9841--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9841--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9841--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9841--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9841--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9841--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9841--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9841--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9841--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9841--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9841--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9841--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9841--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9841--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9841--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9841--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9841--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9841--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9841--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9841--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9841--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9841--   Scanning root segment: 0x701a000..0x701afff (4096)
--9841--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9841--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9841--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9841--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9841--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9841--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9841--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9841--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9841--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9841--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9842-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9842== 
==9842== HEAP SUMMARY:
==9842==     in use at exit: 3,117,401 bytes in 69,042 blocks
==9842==   total heap usage: 1,585,280 allocs, 1,516,238 frees, 127,938,663 bytes allocated
==9842== 
==9842== Searching for pointers to 69,042 not-freed blocks
--9842--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9842--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9842--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9842--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9842--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9842--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9842--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9842--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9842--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9842--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9842--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9842--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9842--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9842--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9842--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9842--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9842--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9842--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9842--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9842--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9842--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9842--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9842--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9842--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9842--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9842--   Scanning root segment: 0x701a000..0x701afff (4096)
--9842--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9842--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9842--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9842--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9842--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9842--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9842--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9842--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9842--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9842--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9841== Checked 4,865,048 bytes
==9841== 
==9841== LEAK SUMMARY:
==9841==    definitely lost: 2,189 bytes in 12 blocks
==9841==    indirectly lost: 6,756 bytes in 7 blocks
==9841==      possibly lost: 0 bytes in 0 blocks
==9841==    still reachable: 3,108,456 bytes in 69,023 blocks
==9841==         suppressed: 0 bytes in 0 blocks
==9841== Rerun with --leak-check=full to see details of leaked memory
==9841== 
==9841== Use --track-origins=yes to see where uninitialised values come from
==9841== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9841== 
==9841== 1 errors in context 1 of 2:
==9841== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9841==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9841==    by 0x488CD0: stringsubst (subst.c:301)
==9841==    by 0x48801B: prefork (subst.c:77)
==9841==    by 0x42B318: execcmd (exec.c:2619)
==9841==    by 0x428CA0: execpline2 (exec.c:1697)
==9841==    by 0x427FD2: execpline (exec.c:1484)
==9841==    by 0x427756: execlist (exec.c:1267)
==9841==    by 0x42717C: execode (exec.c:1073)
==9841==    by 0x431299: runshfunc (exec.c:5040)
==9841==    by 0x430E76: doshfunc (exec.c:4920)
==9841==    by 0x4302FB: execshfunc (exec.c:4557)
==9841==    by 0x42D8C1: execcmd (exec.c:3373)
==9841== 
==9841== 
==9841== 2 errors in context 2 of 2:
==9841== Conditional jump or move depends on uninitialised value(s)
==9841==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9841==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9841==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9841==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9841==    by 0x42D8E9: execcmd (exec.c:3378)
==9841==    by 0x428CA0: execpline2 (exec.c:1697)
==9841==    by 0x427FD2: execpline (exec.c:1484)
==9841==    by 0x42779A: execlist (exec.c:1275)
==9841==    by 0x42717C: execode (exec.c:1073)
==9841==    by 0x431299: runshfunc (exec.c:5040)
==9841==    by 0x430E76: doshfunc (exec.c:4920)
==9841==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9841== 
==9841== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9842== Checked 4,865,176 bytes
==9842== 
==9842== LEAK SUMMARY:
==9842==    definitely lost: 2,213 bytes in 13 blocks
==9842==    indirectly lost: 6,796 bytes in 9 blocks
==9842==      possibly lost: 0 bytes in 0 blocks
==9842==    still reachable: 3,108,392 bytes in 69,020 blocks
==9842==         suppressed: 0 bytes in 0 blocks
==9842== Rerun with --leak-check=full to see details of leaked memory
==9842== 
==9842== Use --track-origins=yes to see where uninitialised values come from
==9842== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9842== 
==9842== 1 errors in context 1 of 2:
==9842== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9842==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9842==    by 0x488CD0: stringsubst (subst.c:301)
==9842==    by 0x48801B: prefork (subst.c:77)
==9842==    by 0x42B318: execcmd (exec.c:2619)
==9842==    by 0x428CA0: execpline2 (exec.c:1697)
==9842==    by 0x427FD2: execpline (exec.c:1484)
==9842==    by 0x427756: execlist (exec.c:1267)
==9842==    by 0x42717C: execode (exec.c:1073)
==9842==    by 0x431299: runshfunc (exec.c:5040)
==9842==    by 0x430E76: doshfunc (exec.c:4920)
==9842==    by 0x4302FB: execshfunc (exec.c:4557)
==9842==    by 0x42D8C1: execcmd (exec.c:3373)
==9842== 
==9842== 
==9842== 2 errors in context 2 of 2:
==9842== Conditional jump or move depends on uninitialised value(s)
==9842==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9842==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9842==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9842==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9842==    by 0x42D8E9: execcmd (exec.c:3378)
==9842==    by 0x428CA0: execpline2 (exec.c:1697)
==9842==    by 0x427FD2: execpline (exec.c:1484)
==9842==    by 0x42779A: execlist (exec.c:1275)
==9842==    by 0x42717C: execode (exec.c:1073)
==9842==    by 0x431299: runshfunc (exec.c:5040)
==9842==    by 0x430E76: doshfunc (exec.c:4920)
==9842==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9842== 
==9842== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9844== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9844-by-pythonnut-on-???
==9844== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9844-by-pythonnut-on-???
==9844== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9844-by-pythonnut-on-???
==9844== 
==9844== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9844== don't want to do, unless you know exactly what you're doing,
==9844== or are doing some strange experiment):
==9844==   /usr/lib/valgrind/../../bin/vgdb --pid=9844 ...command...
==9844== 
==9844== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9844==   /path/to/gdb ./zsh
==9844== and then give GDB the following command
==9844==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9844
==9844== --pid is optional if only one valgrind process is running
==9844== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
--9828-- Caught __NR_exit; running __libc_freeres()
--9828-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9828== 
==9828== HEAP SUMMARY:
==9828==     in use at exit: 3,116,455 bytes in 69,019 blocks
==9828==   total heap usage: 1,585,281 allocs, 1,516,262 frees, 127,939,231 bytes allocated
==9828== 
==9828== Searching for pointers to 69,019 not-freed blocks
--9828--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9828--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9828--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9828--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9828--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9828--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9828--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9828--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9828--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9828--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9828--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9828--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9828--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9828--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9828--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9828--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9828--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9828--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9828--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9828--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9828--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9828--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9828--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9828--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9828--   Scanning root segment: 0x701a000..0x701afff (4096)
--9828--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9828--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9828--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9828--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9828--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9828--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9828--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9828--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9828--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9828--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9828== Checked 4,772,048 bytes
==9828== 
==9828== LEAK SUMMARY:
==9828==    definitely lost: 2,189 bytes in 12 blocks
==9828==    indirectly lost: 6,756 bytes in 7 blocks
==9828==      possibly lost: 0 bytes in 0 blocks
==9828==    still reachable: 3,107,510 bytes in 69,000 blocks
==9828==         suppressed: 0 bytes in 0 blocks
==9828== Rerun with --leak-check=full to see details of leaked memory
==9828== 
==9828== Use --track-origins=yes to see where uninitialised values come from
==9828== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9828== 
==9828== 1 errors in context 1 of 2:
==9828== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9828==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9828==    by 0x488CD0: stringsubst (subst.c:301)
==9828==    by 0x48801B: prefork (subst.c:77)
==9828==    by 0x42B318: execcmd (exec.c:2619)
==9828==    by 0x428CA0: execpline2 (exec.c:1697)
==9828==    by 0x427FD2: execpline (exec.c:1484)
==9828==    by 0x427756: execlist (exec.c:1267)
==9828==    by 0x42717C: execode (exec.c:1073)
==9828==    by 0x431299: runshfunc (exec.c:5040)
==9828==    by 0x430E76: doshfunc (exec.c:4920)
==9828==    by 0x4302FB: execshfunc (exec.c:4557)
==9828==    by 0x42D8C1: execcmd (exec.c:3373)
==9828== 
==9828== 
==9828== 2 errors in context 2 of 2:
==9828== Conditional jump or move depends on uninitialised value(s)
==9828==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9828==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9828==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9828==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9828==    by 0x42D8E9: execcmd (exec.c:3378)
==9828==    by 0x428CA0: execpline2 (exec.c:1697)
==9828==    by 0x427FD2: execpline (exec.c:1484)
==9828==    by 0x42779A: execlist (exec.c:1275)
==9828==    by 0x42717C: execode (exec.c:1073)
==9828==    by 0x431299: runshfunc (exec.c:5040)
==9828==    by 0x430E76: doshfunc (exec.c:4920)
==9828==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9828== 
==9828== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9846== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9846-by-pythonnut-on-???
==9846== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9846-by-pythonnut-on-???
==9846== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9846-by-pythonnut-on-???
==9846== 
==9846== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9846== don't want to do, unless you know exactly what you're doing,
==9846== or are doing some strange experiment):
==9846==   /usr/lib/valgrind/../../bin/vgdb --pid=9846 ...command...
==9846== 
==9846== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9846==   /path/to/gdb ./zsh
==9846== and then give GDB the following command
==9846==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9846
==9846== --pid is optional if only one valgrind process is running
==9846== 
==9845== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9845-by-pythonnut-on-???
==9845== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9845-by-pythonnut-on-???
==9845== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9845-by-pythonnut-on-???
==9845== 
==9845== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9845== don't want to do, unless you know exactly what you're doing,
==9845== or are doing some strange experiment):
==9845==   /usr/lib/valgrind/../../bin/vgdb --pid=9845 ...command...
==9845== 
==9845== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9845==   /path/to/gdb ./zsh
==9845== and then give GDB the following command
==9845==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9845
==9845== --pid is optional if only one valgrind process is running
==9845== 
--9846-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF305C,  len 4
client request: code 4d430005,  addr 0xFFEFF2FBC,  len 4
--9846-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9846== 
==9846== HEAP SUMMARY:
==9846==     in use at exit: 3,116,345 bytes in 69,020 blocks
==9846==   total heap usage: 1,585,226 allocs, 1,516,206 frees, 127,888,600 bytes allocated
==9846== 
==9846== Searching for pointers to 69,020 not-freed blocks
--9846--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9846--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9846--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9846--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9846--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9846--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9846--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9846--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9846--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9846--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9846--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9846--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9846--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9846--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9846--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9846--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9846--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9846--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9846--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9846--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9846--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9846--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9846--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9846--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9846--   Scanning root segment: 0x701a000..0x701afff (4096)
--9846--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9846--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9846--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9846--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9846--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9846--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9846--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9846--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9846--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9846--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9846== Checked 4,773,128 bytes
==9846== 
==9846== LEAK SUMMARY:
==9846==    definitely lost: 2,189 bytes in 12 blocks
==9846==    indirectly lost: 6,756 bytes in 7 blocks
==9846==      possibly lost: 0 bytes in 0 blocks
==9846==    still reachable: 3,107,400 bytes in 69,001 blocks
==9846==         suppressed: 0 bytes in 0 blocks
==9846== Rerun with --leak-check=full to see details of leaked memory
==9846== 
==9846== Use --track-origins=yes to see where uninitialised values come from
==9846== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9846== 
==9846== 1 errors in context 1 of 2:
==9846== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9846==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9846==    by 0x488CD0: stringsubst (subst.c:301)
==9846==    by 0x48801B: prefork (subst.c:77)
==9846==    by 0x42B318: execcmd (exec.c:2619)
==9846==    by 0x428CA0: execpline2 (exec.c:1697)
==9846==    by 0x427FD2: execpline (exec.c:1484)
==9846==    by 0x427756: execlist (exec.c:1267)
==9846==    by 0x42717C: execode (exec.c:1073)
==9846==    by 0x431299: runshfunc (exec.c:5040)
==9846==    by 0x430E76: doshfunc (exec.c:4920)
==9846==    by 0x4302FB: execshfunc (exec.c:4557)
==9846==    by 0x42D8C1: execcmd (exec.c:3373)
==9846== 
==9846== 
==9846== 2 errors in context 2 of 2:
==9846== Conditional jump or move depends on uninitialised value(s)
==9846==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9846==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9846==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9846==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9846==    by 0x42D8E9: execcmd (exec.c:3378)
==9846==    by 0x428CA0: execpline2 (exec.c:1697)
==9846==    by 0x427FD2: execpline (exec.c:1484)
==9846==    by 0x42779A: execlist (exec.c:1275)
==9846==    by 0x42717C: execode (exec.c:1073)
==9846==    by 0x431299: runshfunc (exec.c:5040)
==9846==    by 0x430E76: doshfunc (exec.c:4920)
==9846==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9846== 
==9846== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9845-- Caught __NR_exit; running __libc_freeres()
--9845-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9845== 
==9845== HEAP SUMMARY:
==9845==     in use at exit: 3,116,281 bytes in 69,017 blocks
==9845==   total heap usage: 1,585,231 allocs, 1,516,214 frees, 127,889,456 bytes allocated
==9845== 
==9845== Searching for pointers to 69,017 not-freed blocks
--9845--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9845--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9845--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9845--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9845--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9845--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9845--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9845--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9845--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9845--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9845--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9845--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9845--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9845--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9845--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9845--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9845--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9845--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9845--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9845--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9845--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9845--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9845--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9845--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9845--   Scanning root segment: 0x701a000..0x701afff (4096)
--9845--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9845--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9845--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9845--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9845--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9845--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9845--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9845--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9845--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9845--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9845== Checked 4,772,440 bytes
==9845== 
==9845== LEAK SUMMARY:
==9845==    definitely lost: 2,189 bytes in 12 blocks
==9845==    indirectly lost: 6,756 bytes in 7 blocks
==9845==      possibly lost: 0 bytes in 0 blocks
==9845==    still reachable: 3,107,336 bytes in 68,998 blocks
==9845==         suppressed: 0 bytes in 0 blocks
==9845== Rerun with --leak-check=full to see details of leaked memory
==9845== 
==9845== Use --track-origins=yes to see where uninitialised values come from
==9845== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9845== 
==9845== 1 errors in context 1 of 2:
==9845== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9845==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9845==    by 0x488CD0: stringsubst (subst.c:301)
==9845==    by 0x48801B: prefork (subst.c:77)
==9845==    by 0x42B318: execcmd (exec.c:2619)
==9845==    by 0x428CA0: execpline2 (exec.c:1697)
==9845==    by 0x427FD2: execpline (exec.c:1484)
==9845==    by 0x427756: execlist (exec.c:1267)
==9845==    by 0x42717C: execode (exec.c:1073)
==9845==    by 0x431299: runshfunc (exec.c:5040)
==9845==    by 0x430E76: doshfunc (exec.c:4920)
==9845==    by 0x4302FB: execshfunc (exec.c:4557)
==9845==    by 0x42D8C1: execcmd (exec.c:3373)
==9845== 
==9845== 
==9845== 2 errors in context 2 of 2:
==9845== Conditional jump or move depends on uninitialised value(s)
==9845==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9845==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9845==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9845==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9845==    by 0x42D8E9: execcmd (exec.c:3378)
==9845==    by 0x428CA0: execpline2 (exec.c:1697)
==9845==    by 0x427FD2: execpline (exec.c:1484)
==9845==    by 0x42779A: execlist (exec.c:1275)
==9845==    by 0x42717C: execode (exec.c:1073)
==9845==    by 0x431299: runshfunc (exec.c:5040)
==9845==    by 0x430E76: doshfunc (exec.c:4920)
==9845==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9845== 
==9845== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9851== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9851-by-pythonnut-on-???
==9851== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9851-by-pythonnut-on-???
==9851== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9851-by-pythonnut-on-???
==9851== 
==9851== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9851== don't want to do, unless you know exactly what you're doing,
==9851== or are doing some strange experiment):
==9851==   /usr/lib/valgrind/../../bin/vgdb --pid=9851 ...command...
==9851== 
==9851== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9851==   /path/to/gdb ./zsh
==9851== and then give GDB the following command
==9851==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9851
==9851== --pid is optional if only one valgrind process is running
==9851== 
==9852== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9852-by-pythonnut-on-???
==9852== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9852-by-pythonnut-on-???
==9852== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9852-by-pythonnut-on-???
==9852== 
==9852== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9852== don't want to do, unless you know exactly what you're doing,
==9852== or are doing some strange experiment):
==9852==   /usr/lib/valgrind/../../bin/vgdb --pid=9852 ...command...
==9852== 
==9852== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9852==   /path/to/gdb ./zsh
==9852== and then give GDB the following command
==9852==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9852
==9852== --pid is optional if only one valgrind process is running
==9852== 
--9852-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF1BFC,  len 4
client request: code 4d430005,  addr 0xFFEFF1B5C,  len 4
--9852-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9852== 
==9852== HEAP SUMMARY:
==9852==     in use at exit: 3,116,597 bytes in 69,022 blocks
==9852==   total heap usage: 1,585,260 allocs, 1,516,238 frees, 127,901,931 bytes allocated
==9852== 
==9852== Searching for pointers to 69,022 not-freed blocks
--9852--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9852--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9852--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9852--   Scanning root segment: 0x4037000..0x403afff (16384)
--9852--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9852--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9852--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9852--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9852--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9852--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9852--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9852--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9852--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9852--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9852--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9852--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9852--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9852--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9852--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9852--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9852--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9852--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9852--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9852--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9852--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9852--   Scanning root segment: 0x701a000..0x701afff (4096)
--9852--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9852--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9852--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9852--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9852--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9852--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9852--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9852--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9852--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9852--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9852== Checked 4,791,064 bytes
==9852== 
==9852== LEAK SUMMARY:
==9852==    definitely lost: 2,189 bytes in 12 blocks
==9852==    indirectly lost: 6,756 bytes in 7 blocks
==9852==      possibly lost: 0 bytes in 0 blocks
==9852==    still reachable: 3,107,652 bytes in 69,003 blocks
==9852==         suppressed: 0 bytes in 0 blocks
==9852== Rerun with --leak-check=full to see details of leaked memory
==9852== 
==9852== Use --track-origins=yes to see where uninitialised values come from
==9852== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9852== 
==9852== 1 errors in context 1 of 2:
==9852== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9852==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9852==    by 0x488CD0: stringsubst (subst.c:301)
==9852==    by 0x48801B: prefork (subst.c:77)
==9852==    by 0x42B318: execcmd (exec.c:2619)
==9852==    by 0x428CA0: execpline2 (exec.c:1697)
==9852==    by 0x427FD2: execpline (exec.c:1484)
==9852==    by 0x427756: execlist (exec.c:1267)
==9852==    by 0x42717C: execode (exec.c:1073)
==9852==    by 0x431299: runshfunc (exec.c:5040)
==9852==    by 0x430E76: doshfunc (exec.c:4920)
==9852==    by 0x4302FB: execshfunc (exec.c:4557)
==9852==    by 0x42D8C1: execcmd (exec.c:3373)
==9852== 
==9852== 
==9852== 2 errors in context 2 of 2:
==9852== Conditional jump or move depends on uninitialised value(s)
==9852==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9852==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9852==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9852==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9852==    by 0x42D8E9: execcmd (exec.c:3378)
==9852==    by 0x428CA0: execpline2 (exec.c:1697)
==9852==    by 0x427FD2: execpline (exec.c:1484)
==9852==    by 0x42779A: execlist (exec.c:1275)
==9852==    by 0x42717C: execode (exec.c:1073)
==9852==    by 0x431299: runshfunc (exec.c:5040)
==9852==    by 0x430E76: doshfunc (exec.c:4920)
==9852==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9852== 
==9852== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9851-- Caught __NR_exit; running __libc_freeres()
--9851-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9851== 
==9851== HEAP SUMMARY:
==9851==     in use at exit: 3,116,596 bytes in 69,023 blocks
==9851==   total heap usage: 1,585,256 allocs, 1,516,233 frees, 127,898,379 bytes allocated
==9851== 
==9851== Searching for pointers to 69,023 not-freed blocks
--9851--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9851--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9851--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9851--   Scanning root segment: 0x4037000..0x403afff (16384)
--9851--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9851--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9851--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9851--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9851--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9851--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9851--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9851--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9851--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9851--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9851--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9851--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9851--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9851--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9851--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9851--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9851--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9851--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9851--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9851--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9851--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9851--   Scanning root segment: 0x701a000..0x701afff (4096)
--9851--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9851--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9851--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9851--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9851--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9851--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9851--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9851--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9851--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9851--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9851== Checked 4,790,744 bytes
==9851== 
==9851== LEAK SUMMARY:
==9851==    definitely lost: 2,189 bytes in 12 blocks
==9851==    indirectly lost: 6,756 bytes in 7 blocks
==9851==      possibly lost: 0 bytes in 0 blocks
==9851==    still reachable: 3,107,651 bytes in 69,004 blocks
==9851==         suppressed: 0 bytes in 0 blocks
==9851== Rerun with --leak-check=full to see details of leaked memory
==9851== 
==9851== Use --track-origins=yes to see where uninitialised values come from
==9851== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9851== 
==9851== 1 errors in context 1 of 2:
==9851== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9851==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9851==    by 0x488CD0: stringsubst (subst.c:301)
==9851==    by 0x48801B: prefork (subst.c:77)
==9851==    by 0x42B318: execcmd (exec.c:2619)
==9851==    by 0x428CA0: execpline2 (exec.c:1697)
==9851==    by 0x427FD2: execpline (exec.c:1484)
==9851==    by 0x427756: execlist (exec.c:1267)
==9851==    by 0x42717C: execode (exec.c:1073)
==9851==    by 0x431299: runshfunc (exec.c:5040)
==9851==    by 0x430E76: doshfunc (exec.c:4920)
==9851==    by 0x4302FB: execshfunc (exec.c:4557)
==9851==    by 0x42D8C1: execcmd (exec.c:3373)
==9851== 
==9851== 
==9851== 2 errors in context 2 of 2:
==9851== Conditional jump or move depends on uninitialised value(s)
==9851==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9851==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9851==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9851==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9851==    by 0x42D8E9: execcmd (exec.c:3378)
==9851==    by 0x428CA0: execpline2 (exec.c:1697)
==9851==    by 0x427FD2: execpline (exec.c:1484)
==9851==    by 0x42779A: execlist (exec.c:1275)
==9851==    by 0x42717C: execode (exec.c:1073)
==9851==    by 0x431299: runshfunc (exec.c:5040)
==9851==    by 0x430E76: doshfunc (exec.c:4920)
==9851==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9851== 
==9851== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9856== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9856-by-pythonnut-on-???
==9856== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9856-by-pythonnut-on-???
==9856== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9856-by-pythonnut-on-???
==9856== 
==9856== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9856== don't want to do, unless you know exactly what you're doing,
==9856== or are doing some strange experiment):
==9856==   /usr/lib/valgrind/../../bin/vgdb --pid=9856 ...command...
==9856== 
==9856== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9856==   /path/to/gdb ./zsh
==9856== and then give GDB the following command
==9856==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9856
==9856== --pid is optional if only one valgrind process is running
==9856== 
client request: code 4d430005,  addr 0xFFEFF214C,  len 4
==9855== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9855-by-pythonnut-on-???
==9855== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9855-by-pythonnut-on-???
==9855== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9855-by-pythonnut-on-???
==9855== 
==9855== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9855== don't want to do, unless you know exactly what you're doing,
==9855== or are doing some strange experiment):
==9855==   /usr/lib/valgrind/../../bin/vgdb --pid=9855 ...command...
==9855== 
==9855== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9855==   /path/to/gdb ./zsh
==9855== and then give GDB the following command
==9855==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9855
==9855== --pid is optional if only one valgrind process is running
==9855== 
--9855-- Caught __NR_exit; running __libc_freeres()
--9855-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9855== 
==9855== HEAP SUMMARY:
==9855==     in use at exit: 3,116,888 bytes in 69,028 blocks
==9855==   total heap usage: 1,585,267 allocs, 1,516,239 frees, 127,903,519 bytes allocated
==9855== 
==9855== Searching for pointers to 69,028 not-freed blocks
--9855--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9855--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9855--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9855--   Scanning root segment: 0x4037000..0x403afff (16384)
--9855--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9855--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9855--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9855--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9855--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9855--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9855--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9855--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9855--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9855--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9855--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9855--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9855--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9855--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9855--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9855--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9855--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9855--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9855--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9855--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9855--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9855--   Scanning root segment: 0x701a000..0x701afff (4096)
--9855--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9855--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9855--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9855--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9855--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9855--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9855--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9855--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9855--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9855--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9855== Checked 4,790,760 bytes
==9855== 
==9855== LEAK SUMMARY:
==9855==    definitely lost: 2,189 bytes in 12 blocks
==9855==    indirectly lost: 6,756 bytes in 7 blocks
==9855==      possibly lost: 0 bytes in 0 blocks
==9855==    still reachable: 3,107,943 bytes in 69,009 blocks
==9855==         suppressed: 0 bytes in 0 blocks
==9855== Rerun with --leak-check=full to see details of leaked memory
==9855== 
==9855== Use --track-origins=yes to see where uninitialised values come from
==9855== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9855== 
==9855== 1 errors in context 1 of 2:
==9855== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9855==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9855==    by 0x488CD0: stringsubst (subst.c:301)
==9855==    by 0x48801B: prefork (subst.c:77)
==9855==    by 0x42B318: execcmd (exec.c:2619)
==9855==    by 0x428CA0: execpline2 (exec.c:1697)
==9855==    by 0x427FD2: execpline (exec.c:1484)
==9855==    by 0x427756: execlist (exec.c:1267)
==9855==    by 0x42717C: execode (exec.c:1073)
==9855==    by 0x431299: runshfunc (exec.c:5040)
==9855==    by 0x430E76: doshfunc (exec.c:4920)
==9855==    by 0x4302FB: execshfunc (exec.c:4557)
==9855==    by 0x42D8C1: execcmd (exec.c:3373)
==9855== 
==9855== 
==9855== 2 errors in context 2 of 2:
==9855== Conditional jump or move depends on uninitialised value(s)
==9855==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9855==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9855==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9855==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9855==    by 0x42D8E9: execcmd (exec.c:3378)
==9855==    by 0x428CA0: execpline2 (exec.c:1697)
==9855==    by 0x427FD2: execpline (exec.c:1484)
==9855==    by 0x42779A: execlist (exec.c:1275)
==9855==    by 0x42717C: execode (exec.c:1073)
==9855==    by 0x431299: runshfunc (exec.c:5040)
==9855==    by 0x430E76: doshfunc (exec.c:4920)
==9855==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9855== 
==9855== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1C9C,  len 4
--9857-- Caught __NR_exit; running __libc_freeres()
==9857== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9857-by-pythonnut-on-???
==9857== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9857-by-pythonnut-on-???
==9857== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9857-by-pythonnut-on-???
==9857== 
==9857== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9857== don't want to do, unless you know exactly what you're doing,
==9857== or are doing some strange experiment):
==9857==   /usr/lib/valgrind/../../bin/vgdb --pid=9857 ...command...
==9857== 
==9857== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9857==   /path/to/gdb ./zsh
==9857== and then give GDB the following command
==9857==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9857
==9857== --pid is optional if only one valgrind process is running
==9857== 
--9857-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9857== 
==9857== HEAP SUMMARY:
==9857==     in use at exit: 3,116,917 bytes in 69,029 blocks
==9857==   total heap usage: 1,585,272 allocs, 1,516,243 frees, 127,905,660 bytes allocated
==9857== 
==9857== Searching for pointers to 69,029 not-freed blocks
--9857--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9857--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9857--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9857--   Scanning root segment: 0x4037000..0x403afff (16384)
--9857--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9857--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9857--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9857--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9857--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9857--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9857--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9857--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9857--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9857--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9857--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9857--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9857--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9857--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9857--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9857--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9857--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9857--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9857--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9857--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9857--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9857--   Scanning root segment: 0x701a000..0x701afff (4096)
--9857--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9857--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9857--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9857--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9857--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9857--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9857--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9857--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9857--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9857--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9857== Checked 4,791,056 bytes
==9857== 
==9857== LEAK SUMMARY:
==9857==    definitely lost: 2,189 bytes in 12 blocks
==9857==    indirectly lost: 6,756 bytes in 7 blocks
==9857==      possibly lost: 0 bytes in 0 blocks
==9857==    still reachable: 3,107,972 bytes in 69,010 blocks
==9857==         suppressed: 0 bytes in 0 blocks
==9857== Rerun with --leak-check=full to see details of leaked memory
==9857== 
==9857== Use --track-origins=yes to see where uninitialised values come from
==9857== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9857== 
==9857== 1 errors in context 1 of 2:
==9857== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9857==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9857==    by 0x488CD0: stringsubst (subst.c:301)
==9857==    by 0x48801B: prefork (subst.c:77)
==9857==    by 0x42B318: execcmd (exec.c:2619)
==9857==    by 0x428CA0: execpline2 (exec.c:1697)
==9857==    by 0x427FD2: execpline (exec.c:1484)
==9857==    by 0x427756: execlist (exec.c:1267)
==9857==    by 0x42717C: execode (exec.c:1073)
==9857==    by 0x431299: runshfunc (exec.c:5040)
==9857==    by 0x430E76: doshfunc (exec.c:4920)
==9857==    by 0x4302FB: execshfunc (exec.c:4557)
==9857==    by 0x42D8C1: execcmd (exec.c:3373)
==9857== 
==9857== 
==9857== 2 errors in context 2 of 2:
==9857== Conditional jump or move depends on uninitialised value(s)
==9857==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9857==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9857==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9857==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9857==    by 0x42D8E9: execcmd (exec.c:3378)
==9857==    by 0x428CA0: execpline2 (exec.c:1697)
==9857==    by 0x427FD2: execpline (exec.c:1484)
==9857==    by 0x42779A: execlist (exec.c:1275)
==9857==    by 0x42717C: execode (exec.c:1073)
==9857==    by 0x431299: runshfunc (exec.c:5040)
==9857==    by 0x430E76: doshfunc (exec.c:4920)
==9857==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9857== 
==9857== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9859== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9859-by-pythonnut-on-???
==9859== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9859-by-pythonnut-on-???
==9859== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9859-by-pythonnut-on-???
==9859== 
==9859== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9859== don't want to do, unless you know exactly what you're doing,
==9859== or are doing some strange experiment):
==9859==   /usr/lib/valgrind/../../bin/vgdb --pid=9859 ...command...
==9859== 
==9859== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9859==   /path/to/gdb ./zsh
==9859== and then give GDB the following command
==9859==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9859
==9859== --pid is optional if only one valgrind process is running
==9859== 
client request: code 4d430005,  addr 0xFFEFF261C,  len 4
client request: code 4d430005,  addr 0xFFEFF1F9C,  len 4
--9827-- Caught __NR_exit; running __libc_freeres()
--9827-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9827== 
==9827== HEAP SUMMARY:
==9827==     in use at exit: 3,115,045 bytes in 68,981 blocks
==9827==   total heap usage: 1,585,281 allocs, 1,516,300 frees, 127,909,600 bytes allocated
==9827== 
==9827== Searching for pointers to 68,981 not-freed blocks
--9827--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9827--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9827--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9827--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9827--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9827--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9827--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9827--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9827--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9827--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9827--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9827--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9827--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9827--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9827--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9827--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9827--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9827--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9827--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9827--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9827--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9827--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9827--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9827--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9827--   Scanning root segment: 0x701a000..0x701afff (4096)
--9827--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9827--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9827--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9827--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9827--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9827--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9827--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9827--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9827--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9827--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9827== Checked 4,768,904 bytes
==9827== 
==9827== LEAK SUMMARY:
==9827==    definitely lost: 2,189 bytes in 12 blocks
==9827==    indirectly lost: 6,756 bytes in 7 blocks
==9827==      possibly lost: 0 bytes in 0 blocks
==9827==    still reachable: 3,106,100 bytes in 68,962 blocks
==9827==         suppressed: 0 bytes in 0 blocks
==9827== Rerun with --leak-check=full to see details of leaked memory
==9827== 
==9827== Use --track-origins=yes to see where uninitialised values come from
==9827== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9827== 
==9827== 1 errors in context 1 of 2:
==9827== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9827==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9827==    by 0x488CD0: stringsubst (subst.c:301)
==9827==    by 0x48801B: prefork (subst.c:77)
==9827==    by 0x42B318: execcmd (exec.c:2619)
==9827==    by 0x428CA0: execpline2 (exec.c:1697)
==9827==    by 0x427FD2: execpline (exec.c:1484)
==9827==    by 0x427756: execlist (exec.c:1267)
==9827==    by 0x42717C: execode (exec.c:1073)
==9827==    by 0x431299: runshfunc (exec.c:5040)
==9827==    by 0x430E76: doshfunc (exec.c:4920)
==9827==    by 0x4302FB: execshfunc (exec.c:4557)
==9827==    by 0x42D8C1: execcmd (exec.c:3373)
==9827== 
==9827== 
==9827== 2 errors in context 2 of 2:
==9827== Conditional jump or move depends on uninitialised value(s)
==9827==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9827==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9827==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9827==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9827==    by 0x42D8E9: execcmd (exec.c:3378)
==9827==    by 0x428CA0: execpline2 (exec.c:1697)
==9827==    by 0x427FD2: execpline (exec.c:1484)
==9827==    by 0x42779A: execlist (exec.c:1275)
==9827==    by 0x42717C: execode (exec.c:1073)
==9827==    by 0x431299: runshfunc (exec.c:5040)
==9827==    by 0x430E76: doshfunc (exec.c:4920)
==9827==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9827== 
==9827== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9861== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9861-by-pythonnut-on-???
==9861== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9861-by-pythonnut-on-???
==9861== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9861-by-pythonnut-on-???
==9861== 
==9861== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9861== don't want to do, unless you know exactly what you're doing,
==9861== or are doing some strange experiment):
==9861==   /usr/lib/valgrind/../../bin/vgdb --pid=9861 ...command...
==9861== 
==9861== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9861==   /path/to/gdb ./zsh
==9861== and then give GDB the following command
==9861==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9861
==9861== --pid is optional if only one valgrind process is running
==9861== 
==9862== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9862-by-pythonnut-on-???
==9862== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9862-by-pythonnut-on-???
==9862== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9862-by-pythonnut-on-???
==9862== 
==9862== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9862== don't want to do, unless you know exactly what you're doing,
==9862== or are doing some strange experiment):
==9862==   /usr/lib/valgrind/../../bin/vgdb --pid=9862 ...command...
==9862== 
==9862== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9862==   /path/to/gdb ./zsh
==9862== and then give GDB the following command
==9862==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9862
==9862== --pid is optional if only one valgrind process is running
==9862== 
client request: code 4d430005,  addr 0xFFEFF07BC,  len 4
==9863== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9863-by-pythonnut-on-???
==9863== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9863-by-pythonnut-on-???
==9863== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9863-by-pythonnut-on-???
==9863== 
==9863== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9863== don't want to do, unless you know exactly what you're doing,
==9863== or are doing some strange experiment):
==9863==   /usr/lib/valgrind/../../bin/vgdb --pid=9863 ...command...
==9863== 
==9863== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9863==   /path/to/gdb ./zsh
==9863== and then give GDB the following command
==9863==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9863
==9863== --pid is optional if only one valgrind process is running
==9863== 
--9863-- Caught __NR_exit; running __libc_freeres()
--9863-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9863== 
==9863== HEAP SUMMARY:
==9863==     in use at exit: 3,116,894 bytes in 69,028 blocks
==9863==   total heap usage: 1,585,241 allocs, 1,516,213 frees, 127,888,261 bytes allocated
==9863== 
==9863== Searching for pointers to 69,028 not-freed blocks
--9863--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9863--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9863--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9863--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9863--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9863--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9863--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9863--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9863--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9863--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9863--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9863--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9863--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9863--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9863--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9863--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9863--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9863--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9863--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9863--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9863--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9863--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9863--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9863--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9863--   Scanning root segment: 0x701a000..0x701afff (4096)
--9863--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9863--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9863--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9863--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9863--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9863--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9863--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9863--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9863--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9863--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9863== Checked 4,774,744 bytes
==9863== 
==9863== LEAK SUMMARY:
==9863==    definitely lost: 2,189 bytes in 12 blocks
==9863==    indirectly lost: 6,756 bytes in 7 blocks
==9863==      possibly lost: 0 bytes in 0 blocks
==9863==    still reachable: 3,107,949 bytes in 69,009 blocks
==9863==         suppressed: 0 bytes in 0 blocks
==9863== Rerun with --leak-check=full to see details of leaked memory
==9863== 
==9863== Use --track-origins=yes to see where uninitialised values come from
==9863== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9863== 
==9863== 1 errors in context 1 of 2:
==9863== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9863==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9863==    by 0x488CD0: stringsubst (subst.c:301)
==9863==    by 0x48801B: prefork (subst.c:77)
==9863==    by 0x42B318: execcmd (exec.c:2619)
==9863==    by 0x428CA0: execpline2 (exec.c:1697)
==9863==    by 0x427FD2: execpline (exec.c:1484)
==9863==    by 0x427756: execlist (exec.c:1267)
==9863==    by 0x42717C: execode (exec.c:1073)
==9863==    by 0x431299: runshfunc (exec.c:5040)
==9863==    by 0x430E76: doshfunc (exec.c:4920)
==9863==    by 0x4302FB: execshfunc (exec.c:4557)
==9863==    by 0x42D8C1: execcmd (exec.c:3373)
==9863== 
==9863== 
==9863== 2 errors in context 2 of 2:
==9863== Conditional jump or move depends on uninitialised value(s)
==9863==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9863==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9863==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9863==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9863==    by 0x42D8E9: execcmd (exec.c:3378)
==9863==    by 0x428CA0: execpline2 (exec.c:1697)
==9863==    by 0x427FD2: execpline (exec.c:1484)
==9863==    by 0x42779A: execlist (exec.c:1275)
==9863==    by 0x42717C: execode (exec.c:1073)
==9863==    by 0x431299: runshfunc (exec.c:5040)
==9863==    by 0x430E76: doshfunc (exec.c:4920)
==9863==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9863== 
==9863== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9868-- Caught __NR_exit; running __libc_freeres()
==9868== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9868-by-pythonnut-on-???
==9868== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9868-by-pythonnut-on-???
==9868== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9868-by-pythonnut-on-???
==9868== 
==9868== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9868== don't want to do, unless you know exactly what you're doing,
==9868== or are doing some strange experiment):
==9868==   /usr/lib/valgrind/../../bin/vgdb --pid=9868 ...command...
==9868== 
==9868== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9868==   /path/to/gdb ./zsh
==9868== and then give GDB the following command
==9868==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9868
==9868== --pid is optional if only one valgrind process is running
==9868== 
==9869== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9869-by-pythonnut-on-???
==9869== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9869-by-pythonnut-on-???
==9869== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9869-by-pythonnut-on-???
==9869== 
==9869== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9869== don't want to do, unless you know exactly what you're doing,
==9869== or are doing some strange experiment):
==9869==   /usr/lib/valgrind/../../bin/vgdb --pid=9869 ...command...
==9869== 
==9869== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9869==   /path/to/gdb ./zsh
==9869== and then give GDB the following command
==9869==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9869
==9869== --pid is optional if only one valgrind process is running
==9869== 
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9868-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9868== 
==9868== HEAP SUMMARY:
==9868==     in use at exit: 3,153,785 bytes in 69,036 blocks
==9868==   total heap usage: 1,585,249 allocs, 1,516,213 frees, 127,928,208 bytes allocated
==9868== 
==9868== Searching for pointers to 69,036 not-freed blocks
--9868--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9868--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9868--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9868--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9868--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9868--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9868--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9868--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9868--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9868--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9868--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9868--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9868--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9868--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9868--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9868--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9868--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9868--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9868--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9868--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9868--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9868--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9868--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9868--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9868--   Scanning root segment: 0x701a000..0x701afff (4096)
--9868--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9868--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9868--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9868--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9868--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9868--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9868--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9868--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9868--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9868--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9868== Checked 4,886,552 bytes
==9868== 
==9868== LEAK SUMMARY:
==9868==    definitely lost: 2,189 bytes in 12 blocks
==9868==    indirectly lost: 6,756 bytes in 7 blocks
==9868==      possibly lost: 0 bytes in 0 blocks
==9868==    still reachable: 3,144,840 bytes in 69,017 blocks
==9868==         suppressed: 0 bytes in 0 blocks
==9868== Rerun with --leak-check=full to see details of leaked memory
==9868== 
==9868== Use --track-origins=yes to see where uninitialised values come from
==9868== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9868== 
==9868== 1 errors in context 1 of 2:
==9868== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9868==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9868==    by 0x488CD0: stringsubst (subst.c:301)
==9868==    by 0x48801B: prefork (subst.c:77)
==9868==    by 0x42B318: execcmd (exec.c:2619)
==9868==    by 0x428CA0: execpline2 (exec.c:1697)
==9868==    by 0x427FD2: execpline (exec.c:1484)
==9868==    by 0x427756: execlist (exec.c:1267)
==9868==    by 0x42717C: execode (exec.c:1073)
==9868==    by 0x431299: runshfunc (exec.c:5040)
==9868==    by 0x430E76: doshfunc (exec.c:4920)
==9868==    by 0x4302FB: execshfunc (exec.c:4557)
==9868==    by 0x42D8C1: execcmd (exec.c:3373)
==9868== 
==9868== 
==9868== 2 errors in context 2 of 2:
==9868== Conditional jump or move depends on uninitialised value(s)
==9868==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9868==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9868==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9868==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9868==    by 0x42D8E9: execcmd (exec.c:3378)
==9868==    by 0x428CA0: execpline2 (exec.c:1697)
==9868==    by 0x427FD2: execpline (exec.c:1484)
==9868==    by 0x42779A: execlist (exec.c:1275)
==9868==    by 0x42717C: execode (exec.c:1073)
==9868==    by 0x431299: runshfunc (exec.c:5040)
==9868==    by 0x430E76: doshfunc (exec.c:4920)
==9868==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9868== 
==9868== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9867== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9867-by-pythonnut-on-???
==9867== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9867-by-pythonnut-on-???
==9867== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9867-by-pythonnut-on-???
==9867== 
==9867== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9867== don't want to do, unless you know exactly what you're doing,
==9867== or are doing some strange experiment):
==9867==   /usr/lib/valgrind/../../bin/vgdb --pid=9867 ...command...
==9867== 
==9867== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9867==   /path/to/gdb ./zsh
==9867== and then give GDB the following command
==9867==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9867
==9867== --pid is optional if only one valgrind process is running
==9867== 
--9867-- Caught __NR_exit; running __libc_freeres()
--9867-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9867== 
==9867== HEAP SUMMARY:
==9867==     in use at exit: 3,153,721 bytes in 69,033 blocks
==9867==   total heap usage: 1,585,251 allocs, 1,516,218 frees, 127,928,752 bytes allocated
==9867== 
==9867== Searching for pointers to 69,033 not-freed blocks
--9867--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9867--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9867--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9867--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9867--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9867--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9867--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9867--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9867--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9867--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9867--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9867--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9867--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9867--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9867--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9867--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9867--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9867--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9867--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9867--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9867--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9867--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9867--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9867--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9867--   Scanning root segment: 0x701a000..0x701afff (4096)
--9867--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9867--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9867--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9867--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9867--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9867--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9867--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9867--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9867--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9867--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9867== Checked 4,885,880 bytes
==9867== 
==9867== LEAK SUMMARY:
==9867==    definitely lost: 2,189 bytes in 12 blocks
==9867==    indirectly lost: 6,756 bytes in 7 blocks
==9867==      possibly lost: 0 bytes in 0 blocks
==9867==    still reachable: 3,144,776 bytes in 69,014 blocks
==9867==         suppressed: 0 bytes in 0 blocks
==9867== Rerun with --leak-check=full to see details of leaked memory
==9867== 
==9867== Use --track-origins=yes to see where uninitialised values come from
==9867== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9867== 
==9867== 1 errors in context 1 of 2:
==9867== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9867==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9867==    by 0x488CD0: stringsubst (subst.c:301)
==9867==    by 0x48801B: prefork (subst.c:77)
==9867==    by 0x42B318: execcmd (exec.c:2619)
==9867==    by 0x428CA0: execpline2 (exec.c:1697)
==9867==    by 0x427FD2: execpline (exec.c:1484)
==9867==    by 0x427756: execlist (exec.c:1267)
==9867==    by 0x42717C: execode (exec.c:1073)
==9867==    by 0x431299: runshfunc (exec.c:5040)
==9867==    by 0x430E76: doshfunc (exec.c:4920)
==9867==    by 0x4302FB: execshfunc (exec.c:4557)
==9867==    by 0x42D8C1: execcmd (exec.c:3373)
==9867== 
==9867== 
==9867== 2 errors in context 2 of 2:
==9867== Conditional jump or move depends on uninitialised value(s)
==9867==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9867==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9867==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9867==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9867==    by 0x42D8E9: execcmd (exec.c:3378)
==9867==    by 0x428CA0: execpline2 (exec.c:1697)
==9867==    by 0x427FD2: execpline (exec.c:1484)
==9867==    by 0x42779A: execlist (exec.c:1275)
==9867==    by 0x42717C: execode (exec.c:1073)
==9867==    by 0x431299: runshfunc (exec.c:5040)
==9867==    by 0x430E76: doshfunc (exec.c:4920)
==9867==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9867== 
==9867== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9870== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9870-by-pythonnut-on-???
==9870== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9870-by-pythonnut-on-???
==9870== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9870-by-pythonnut-on-???
==9870== 
==9870== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9870== don't want to do, unless you know exactly what you're doing,
==9870== or are doing some strange experiment):
==9870==   /usr/lib/valgrind/../../bin/vgdb --pid=9870 ...command...
==9870== 
==9870== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9870==   /path/to/gdb ./zsh
==9870== and then give GDB the following command
==9870==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9870
==9870== --pid is optional if only one valgrind process is running
==9870== 
==9871== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9871-by-pythonnut-on-???
==9871== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9871-by-pythonnut-on-???
==9871== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9871-by-pythonnut-on-???
==9871== 
==9871== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9871== don't want to do, unless you know exactly what you're doing,
==9871== or are doing some strange experiment):
==9871==   /usr/lib/valgrind/../../bin/vgdb --pid=9871 ...command...
==9871== 
==9871== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9871==   /path/to/gdb ./zsh
==9871== and then give GDB the following command
==9871==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9871
==9871== --pid is optional if only one valgrind process is running
==9871== 
--9871-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF13BC,  len 4
--9871-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9871== 
==9871== HEAP SUMMARY:
==9871==     in use at exit: 3,190,435 bytes in 69,039 blocks
==9871==   total heap usage: 1,585,258 allocs, 1,516,219 frees, 127,967,043 bytes allocated
==9871== 
==9871== Searching for pointers to 69,039 not-freed blocks
--9871--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9871--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9871--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9871--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9871--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9871--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9871--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9871--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9871--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9871--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9871--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9871--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9871--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9871--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9871--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9871--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9871--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9871--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9871--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9871--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9871--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9871--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9871--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9871--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9871--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9871--   Scanning root segment: 0x701a000..0x701afff (4096)
--9871--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9871--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9871--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9871--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9871--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9871--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9871--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9871--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9871--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9871--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9871== Checked 4,960,064 bytes
==9871== 
==9871== LEAK SUMMARY:
==9871==    definitely lost: 2,189 bytes in 12 blocks
==9871==    indirectly lost: 6,756 bytes in 7 blocks
==9871==      possibly lost: 0 bytes in 0 blocks
==9871==    still reachable: 3,181,490 bytes in 69,020 blocks
==9871==         suppressed: 0 bytes in 0 blocks
==9871== Rerun with --leak-check=full to see details of leaked memory
==9871== 
==9871== Use --track-origins=yes to see where uninitialised values come from
==9871== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9871== 
==9871== 1 errors in context 1 of 2:
==9871== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9871==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9871==    by 0x488CD0: stringsubst (subst.c:301)
==9871==    by 0x48801B: prefork (subst.c:77)
==9871==    by 0x42B318: execcmd (exec.c:2619)
==9871==    by 0x428CA0: execpline2 (exec.c:1697)
==9871==    by 0x427FD2: execpline (exec.c:1484)
==9871==    by 0x427756: execlist (exec.c:1267)
==9871==    by 0x42717C: execode (exec.c:1073)
==9871==    by 0x431299: runshfunc (exec.c:5040)
==9871==    by 0x430E76: doshfunc (exec.c:4920)
==9871==    by 0x4302FB: execshfunc (exec.c:4557)
==9871==    by 0x42D8C1: execcmd (exec.c:3373)
==9871== 
==9871== 
==9871== 2 errors in context 2 of 2:
==9871== Conditional jump or move depends on uninitialised value(s)
==9871==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9871==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9871==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9871==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9871==    by 0x42D8E9: execcmd (exec.c:3378)
==9871==    by 0x428CA0: execpline2 (exec.c:1697)
==9871==    by 0x427FD2: execpline (exec.c:1484)
==9871==    by 0x42779A: execlist (exec.c:1275)
==9871==    by 0x42717C: execode (exec.c:1073)
==9871==    by 0x431299: runshfunc (exec.c:5040)
==9871==    by 0x430E76: doshfunc (exec.c:4920)
==9871==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9871== 
==9871== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9870-- Caught __NR_exit; running __libc_freeres()
--9870-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9870== 
==9870== HEAP SUMMARY:
==9870==     in use at exit: 3,153,795 bytes in 69,036 blocks
==9870==   total heap usage: 1,585,261 allocs, 1,516,225 frees, 127,967,619 bytes allocated
==9870== 
==9870== Searching for pointers to 69,036 not-freed blocks
--9870--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9870--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9870--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9870--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9870--   Scanning root segment: 0x41d6000..0x41defff (36864)
--9870--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9870--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9870--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9870--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9870--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9870--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9870--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9870--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9870--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9870--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9870--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9870--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9870--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9870--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9870--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9870--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9870--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9870--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9870--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9870--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9870--   Scanning root segment: 0x701a000..0x701afff (4096)
--9870--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9870--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9870--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9870--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9870--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9870--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9870--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9870--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9870--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9870--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9870== Checked 4,922,808 bytes
==9870== 
==9870== LEAK SUMMARY:
==9870==    definitely lost: 2,189 bytes in 12 blocks
==9870==    indirectly lost: 6,756 bytes in 7 blocks
==9870==      possibly lost: 0 bytes in 0 blocks
==9870==    still reachable: 3,144,850 bytes in 69,017 blocks
==9870==         suppressed: 0 bytes in 0 blocks
==9870== Rerun with --leak-check=full to see details of leaked memory
==9870== 
==9870== Use --track-origins=yes to see where uninitialised values come from
==9870== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9870== 
==9870== 1 errors in context 1 of 2:
==9870== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9870==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9870==    by 0x488CD0: stringsubst (subst.c:301)
==9870==    by 0x48801B: prefork (subst.c:77)
==9870==    by 0x42B318: execcmd (exec.c:2619)
==9870==    by 0x428CA0: execpline2 (exec.c:1697)
==9870==    by 0x427FD2: execpline (exec.c:1484)
==9870==    by 0x427756: execlist (exec.c:1267)
==9870==    by 0x42717C: execode (exec.c:1073)
==9870==    by 0x431299: runshfunc (exec.c:5040)
==9870==    by 0x430E76: doshfunc (exec.c:4920)
==9870==    by 0x4302FB: execshfunc (exec.c:4557)
==9870==    by 0x42D8C1: execcmd (exec.c:3373)
==9870== 
==9870== 
==9870== 2 errors in context 2 of 2:
==9870== Conditional jump or move depends on uninitialised value(s)
==9870==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9870==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9870==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9870==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9870==    by 0x42D8E9: execcmd (exec.c:3378)
==9870==    by 0x428CA0: execpline2 (exec.c:1697)
==9870==    by 0x427FD2: execpline (exec.c:1484)
==9870==    by 0x42779A: execlist (exec.c:1275)
==9870==    by 0x42717C: execode (exec.c:1073)
==9870==    by 0x431299: runshfunc (exec.c:5040)
==9870==    by 0x430E76: doshfunc (exec.c:4920)
==9870==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9870== 
==9870== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9873== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9873-by-pythonnut-on-???
==9873== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9873-by-pythonnut-on-???
==9873== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9873-by-pythonnut-on-???
==9873== 
==9873== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9873== don't want to do, unless you know exactly what you're doing,
==9873== or are doing some strange experiment):
==9873==   /usr/lib/valgrind/../../bin/vgdb --pid=9873 ...command...
==9873== 
==9873== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9873==   /path/to/gdb ./zsh
==9873== and then give GDB the following command
==9873==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9873
==9873== --pid is optional if only one valgrind process is running
==9873== 
--9874-- Caught __NR_exit; running __libc_freeres()
==9874== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9874-by-pythonnut-on-???
==9874== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9874-by-pythonnut-on-???
==9874== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9874-by-pythonnut-on-???
==9874== 
==9874== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9874== don't want to do, unless you know exactly what you're doing,
==9874== or are doing some strange experiment):
==9874==   /usr/lib/valgrind/../../bin/vgdb --pid=9874 ...command...
==9874== 
==9874== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9874==   /path/to/gdb ./zsh
==9874== and then give GDB the following command
==9874==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9874
==9874== --pid is optional if only one valgrind process is running
==9874== 
--9874-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9874== 
==9874== HEAP SUMMARY:
==9874==     in use at exit: 3,154,651 bytes in 69,042 blocks
==9874==   total heap usage: 1,585,270 allocs, 1,516,228 frees, 127,935,331 bytes allocated
==9874== 
==9874== Searching for pointers to 69,042 not-freed blocks
--9874--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9874--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9874--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9874--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9874--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9874--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9874--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9874--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9874--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9874--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9874--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9874--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9874--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9874--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9874--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9874--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9874--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9874--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9874--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9874--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9874--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9874--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9874--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9874--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9874--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9874--   Scanning root segment: 0x701a000..0x701afff (4096)
--9874--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9874--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9874--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9874--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9874--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9874--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9874--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9874--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9874--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9874--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9874== Checked 4,903,504 bytes
==9874== 
==9874== LEAK SUMMARY:
==9874==    definitely lost: 2,189 bytes in 12 blocks
==9874==    indirectly lost: 6,756 bytes in 7 blocks
==9874==      possibly lost: 0 bytes in 0 blocks
==9874==    still reachable: 3,145,706 bytes in 69,023 blocks
==9874==         suppressed: 0 bytes in 0 blocks
==9874== Rerun with --leak-check=full to see details of leaked memory
==9874== 
==9874== Use --track-origins=yes to see where uninitialised values come from
==9874== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9874== 
==9874== 1 errors in context 1 of 2:
==9874== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9874==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9874==    by 0x488CD0: stringsubst (subst.c:301)
==9874==    by 0x48801B: prefork (subst.c:77)
==9874==    by 0x42B318: execcmd (exec.c:2619)
==9874==    by 0x428CA0: execpline2 (exec.c:1697)
==9874==    by 0x427FD2: execpline (exec.c:1484)
==9874==    by 0x427756: execlist (exec.c:1267)
==9874==    by 0x42717C: execode (exec.c:1073)
==9874==    by 0x431299: runshfunc (exec.c:5040)
==9874==    by 0x430E76: doshfunc (exec.c:4920)
==9874==    by 0x4302FB: execshfunc (exec.c:4557)
==9874==    by 0x42D8C1: execcmd (exec.c:3373)
==9874== 
==9874== 
==9874== 2 errors in context 2 of 2:
==9874== Conditional jump or move depends on uninitialised value(s)
==9874==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9874==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9874==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9874==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9874==    by 0x42D8E9: execcmd (exec.c:3378)
==9874==    by 0x428CA0: execpline2 (exec.c:1697)
==9874==    by 0x427FD2: execpline (exec.c:1484)
==9874==    by 0x42779A: execlist (exec.c:1275)
==9874==    by 0x42717C: execode (exec.c:1073)
==9874==    by 0x431299: runshfunc (exec.c:5040)
==9874==    by 0x430E76: doshfunc (exec.c:4920)
==9874==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9874== 
==9874== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9873-- Caught __NR_exit; running __libc_freeres()
--9873-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9873== 
==9873== HEAP SUMMARY:
==9873==     in use at exit: 3,154,416 bytes in 69,042 blocks
==9873==   total heap usage: 1,585,307 allocs, 1,516,265 frees, 127,944,840 bytes allocated
==9873== 
==9873== Searching for pointers to 69,042 not-freed blocks
--9873--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9873--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9873--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9873--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9873--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9873--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9873--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9873--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9873--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9873--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9873--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9873--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9873--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9873--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9873--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9873--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9873--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9873--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9873--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9873--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9873--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9873--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9873--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9873--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9873--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9873--   Scanning root segment: 0x701a000..0x701afff (4096)
--9873--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9873--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9873--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9873--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9873--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9873--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9873--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9873--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9873--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9873--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9873== Checked 4,902,704 bytes
==9873== 
==9873== LEAK SUMMARY:
==9873==    definitely lost: 2,189 bytes in 12 blocks
==9873==    indirectly lost: 6,756 bytes in 7 blocks
==9873==      possibly lost: 0 bytes in 0 blocks
==9873==    still reachable: 3,145,471 bytes in 69,023 blocks
==9873==         suppressed: 0 bytes in 0 blocks
==9873== Rerun with --leak-check=full to see details of leaked memory
==9873== 
==9873== Use --track-origins=yes to see where uninitialised values come from
==9873== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9873== 
==9873== 1 errors in context 1 of 2:
==9873== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9873==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9873==    by 0x488CD0: stringsubst (subst.c:301)
==9873==    by 0x48801B: prefork (subst.c:77)
==9873==    by 0x42B318: execcmd (exec.c:2619)
==9873==    by 0x428CA0: execpline2 (exec.c:1697)
==9873==    by 0x427FD2: execpline (exec.c:1484)
==9873==    by 0x427756: execlist (exec.c:1267)
==9873==    by 0x42717C: execode (exec.c:1073)
==9873==    by 0x431299: runshfunc (exec.c:5040)
==9873==    by 0x430E76: doshfunc (exec.c:4920)
==9873==    by 0x4302FB: execshfunc (exec.c:4557)
==9873==    by 0x42D8C1: execcmd (exec.c:3373)
==9873== 
==9873== 
==9873== 2 errors in context 2 of 2:
==9873== Conditional jump or move depends on uninitialised value(s)
==9873==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9873==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9873==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9873==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9873==    by 0x42D8E9: execcmd (exec.c:3378)
==9873==    by 0x428CA0: execpline2 (exec.c:1697)
==9873==    by 0x427FD2: execpline (exec.c:1484)
==9873==    by 0x42779A: execlist (exec.c:1275)
==9873==    by 0x42717C: execode (exec.c:1073)
==9873==    by 0x431299: runshfunc (exec.c:5040)
==9873==    by 0x430E76: doshfunc (exec.c:4920)
==9873==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9873== 
==9873== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9877-- Caught __NR_exit; running __libc_freeres()
==9877== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9877-by-pythonnut-on-???
==9877== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9877-by-pythonnut-on-???
==9877== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9877-by-pythonnut-on-???
==9877== 
==9877== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9877== don't want to do, unless you know exactly what you're doing,
==9877== or are doing some strange experiment):
==9877==   /usr/lib/valgrind/../../bin/vgdb --pid=9877 ...command...
==9877== 
==9877== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9877==   /path/to/gdb ./zsh
==9877== and then give GDB the following command
==9877==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9877
==9877== --pid is optional if only one valgrind process is running
==9877== 
client request: code 4d430005,  addr 0xFFEFF1A3C,  len 4
--9877-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9878-- Caught __NR_exit; running __libc_freeres()
==9877== 
==9877== HEAP SUMMARY:
==9877==     in use at exit: 3,117,465 bytes in 69,042 blocks
==9877==   total heap usage: 1,585,279 allocs, 1,516,237 frees, 127,938,751 bytes allocated
==9877== 
==9878== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9878-by-pythonnut-on-???
==9878== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9878-by-pythonnut-on-???
==9878== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9878-by-pythonnut-on-???
==9878== 
==9878== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9878== don't want to do, unless you know exactly what you're doing,
==9878== or are doing some strange experiment):
==9878==   /usr/lib/valgrind/../../bin/vgdb --pid=9878 ...command...
==9878== 
==9878== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9878==   /path/to/gdb ./zsh
==9878== and then give GDB the following command
==9878==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9878
==9878== --pid is optional if only one valgrind process is running
==9878== 
--9878-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9877== Searching for pointers to 69,042 not-freed blocks
==9878== 
--9877--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9877--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9877--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9877--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9877--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9877--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9877--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9877--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9877--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9877--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9877--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9877--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9877--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9877--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9877--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9877--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9877--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9877--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9877--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9877--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9877--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9877--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9877--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9877--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9877--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9877--   Scanning root segment: 0x701a000..0x701afff (4096)
--9877--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9877--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9877--   Scanning root segment: 0xae51000..0xae52fff (8192)
==9878== HEAP SUMMARY:
==9878==     in use at exit: 3,117,465 bytes in 69,042 blocks
==9878==   total heap usage: 1,585,284 allocs, 1,516,242 frees, 127,940,839 bytes allocated
==9878== 
--9877--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9877--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9877--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9877--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9877--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9877--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9877--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9878== Searching for pointers to 69,042 not-freed blocks
--9878--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9878--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9878--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9878--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9878--   Scanning root segment: 0x41d6000..0x41d9fff (16384)
--9878--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9878--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9878--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9878--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9878--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9878--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9878--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9878--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9878--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9878--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9878--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9878--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9878--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9878--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9878--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9878--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9878--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9878--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9878--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9878--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9878--   Scanning root segment: 0x701a000..0x701afff (4096)
--9878--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9878--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9878--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9878--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9878--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9878--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9878--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9878--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9878--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9878--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9877== Checked 4,865,312 bytes
==9877== 
==9877== LEAK SUMMARY:
==9877==    definitely lost: 2,189 bytes in 12 blocks
==9877==    indirectly lost: 6,756 bytes in 7 blocks
==9877==      possibly lost: 0 bytes in 0 blocks
==9877==    still reachable: 3,108,520 bytes in 69,023 blocks
==9877==         suppressed: 0 bytes in 0 blocks
==9877== Rerun with --leak-check=full to see details of leaked memory
==9877== 
==9877== Use --track-origins=yes to see where uninitialised values come from
==9877== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9877== 
==9877== 1 errors in context 1 of 2:
==9877== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9877==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9877==    by 0x488CD0: stringsubst (subst.c:301)
==9877==    by 0x48801B: prefork (subst.c:77)
==9877==    by 0x42B318: execcmd (exec.c:2619)
==9877==    by 0x428CA0: execpline2 (exec.c:1697)
==9877==    by 0x427FD2: execpline (exec.c:1484)
==9877==    by 0x427756: execlist (exec.c:1267)
==9877==    by 0x42717C: execode (exec.c:1073)
==9877==    by 0x431299: runshfunc (exec.c:5040)
==9877==    by 0x430E76: doshfunc (exec.c:4920)
==9877==    by 0x4302FB: execshfunc (exec.c:4557)
==9877==    by 0x42D8C1: execcmd (exec.c:3373)
==9877== 
==9877== 
==9877== 2 errors in context 2 of 2:
==9877== Conditional jump or move depends on uninitialised value(s)
==9877==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9877==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9877==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9877==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9877==    by 0x42D8E9: execcmd (exec.c:3378)
==9877==    by 0x428CA0: execpline2 (exec.c:1697)
==9877==    by 0x427FD2: execpline (exec.c:1484)
==9877==    by 0x42779A: execlist (exec.c:1275)
==9877==    by 0x42717C: execode (exec.c:1073)
==9877==    by 0x431299: runshfunc (exec.c:5040)
==9877==    by 0x430E76: doshfunc (exec.c:4920)
==9877==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9877== 
==9877== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9878== Checked 4,865,440 bytes
==9878== 
==9878== LEAK SUMMARY:
==9878==    definitely lost: 2,213 bytes in 13 blocks
==9878==    indirectly lost: 6,796 bytes in 9 blocks
==9878==      possibly lost: 0 bytes in 0 blocks
==9878==    still reachable: 3,108,456 bytes in 69,020 blocks
==9878==         suppressed: 0 bytes in 0 blocks
==9878== Rerun with --leak-check=full to see details of leaked memory
==9878== 
==9878== Use --track-origins=yes to see where uninitialised values come from
==9878== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9878== 
==9878== 1 errors in context 1 of 2:
==9878== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9878==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9878==    by 0x488CD0: stringsubst (subst.c:301)
==9878==    by 0x48801B: prefork (subst.c:77)
==9878==    by 0x42B318: execcmd (exec.c:2619)
==9878==    by 0x428CA0: execpline2 (exec.c:1697)
==9878==    by 0x427FD2: execpline (exec.c:1484)
==9878==    by 0x427756: execlist (exec.c:1267)
==9878==    by 0x42717C: execode (exec.c:1073)
==9878==    by 0x431299: runshfunc (exec.c:5040)
==9878==    by 0x430E76: doshfunc (exec.c:4920)
==9878==    by 0x4302FB: execshfunc (exec.c:4557)
==9878==    by 0x42D8C1: execcmd (exec.c:3373)
==9878== 
==9878== 
==9878== 2 errors in context 2 of 2:
==9878== Conditional jump or move depends on uninitialised value(s)
==9878==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9878==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9878==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9878==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9878==    by 0x42D8E9: execcmd (exec.c:3378)
==9878==    by 0x428CA0: execpline2 (exec.c:1697)
==9878==    by 0x427FD2: execpline (exec.c:1484)
==9878==    by 0x42779A: execlist (exec.c:1275)
==9878==    by 0x42717C: execode (exec.c:1073)
==9878==    by 0x431299: runshfunc (exec.c:5040)
==9878==    by 0x430E76: doshfunc (exec.c:4920)
==9878==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9878== 
==9878== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9880== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9880-by-pythonnut-on-???
==9880== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9880-by-pythonnut-on-???
==9880== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9880-by-pythonnut-on-???
==9880== 
==9880== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9880== don't want to do, unless you know exactly what you're doing,
==9880== or are doing some strange experiment):
==9880==   /usr/lib/valgrind/../../bin/vgdb --pid=9880 ...command...
==9880== 
==9880== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9880==   /path/to/gdb ./zsh
==9880== and then give GDB the following command
==9880==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9880
==9880== --pid is optional if only one valgrind process is running
==9880== 
client request: code 4d430005,  addr 0xFFEFF23BC,  len 4
--9862-- Caught __NR_exit; running __libc_freeres()
--9862-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9862== 
==9862== HEAP SUMMARY:
==9862==     in use at exit: 3,116,519 bytes in 69,019 blocks
==9862==   total heap usage: 1,585,285 allocs, 1,516,266 frees, 127,941,407 bytes allocated
==9862== 
==9862== Searching for pointers to 69,019 not-freed blocks
--9862--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9862--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9862--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9862--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9862--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9862--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9862--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9862--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9862--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9862--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9862--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9862--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9862--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9862--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9862--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9862--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9862--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9862--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9862--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9862--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9862--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9862--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9862--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9862--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9862--   Scanning root segment: 0x701a000..0x701afff (4096)
--9862--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9862--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9862--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9862--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9862--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9862--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9862--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9862--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9862--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9862--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9862== Checked 4,772,312 bytes
==9862== 
==9862== LEAK SUMMARY:
==9862==    definitely lost: 2,189 bytes in 12 blocks
==9862==    indirectly lost: 6,756 bytes in 7 blocks
==9862==      possibly lost: 0 bytes in 0 blocks
==9862==    still reachable: 3,107,574 bytes in 69,000 blocks
==9862==         suppressed: 0 bytes in 0 blocks
==9862== Rerun with --leak-check=full to see details of leaked memory
==9862== 
==9862== Use --track-origins=yes to see where uninitialised values come from
==9862== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9862== 
==9862== 1 errors in context 1 of 2:
==9862== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9862==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9862==    by 0x488CD0: stringsubst (subst.c:301)
==9862==    by 0x48801B: prefork (subst.c:77)
==9862==    by 0x42B318: execcmd (exec.c:2619)
==9862==    by 0x428CA0: execpline2 (exec.c:1697)
==9862==    by 0x427FD2: execpline (exec.c:1484)
==9862==    by 0x427756: execlist (exec.c:1267)
==9862==    by 0x42717C: execode (exec.c:1073)
==9862==    by 0x431299: runshfunc (exec.c:5040)
==9862==    by 0x430E76: doshfunc (exec.c:4920)
==9862==    by 0x4302FB: execshfunc (exec.c:4557)
==9862==    by 0x42D8C1: execcmd (exec.c:3373)
==9862== 
==9862== 
==9862== 2 errors in context 2 of 2:
==9862== Conditional jump or move depends on uninitialised value(s)
==9862==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9862==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9862==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9862==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9862==    by 0x42D8E9: execcmd (exec.c:3378)
==9862==    by 0x428CA0: execpline2 (exec.c:1697)
==9862==    by 0x427FD2: execpline (exec.c:1484)
==9862==    by 0x42779A: execlist (exec.c:1275)
==9862==    by 0x42717C: execode (exec.c:1073)
==9862==    by 0x431299: runshfunc (exec.c:5040)
==9862==    by 0x430E76: doshfunc (exec.c:4920)
==9862==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9862== 
==9862== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9882-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF2CEC,  len 4
==9882== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9882-by-pythonnut-on-???
==9882== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9882-by-pythonnut-on-???
==9882== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9882-by-pythonnut-on-???
==9882== 
==9882== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9882== don't want to do, unless you know exactly what you're doing,
==9882== or are doing some strange experiment):
==9882==   /usr/lib/valgrind/../../bin/vgdb --pid=9882 ...command...
==9882== 
==9882== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9882==   /path/to/gdb ./zsh
==9882== and then give GDB the following command
==9882==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9882
==9882== --pid is optional if only one valgrind process is running
==9882== 
client request: code 4d430005,  addr 0xFFEFF2C4C,  len 4
--9882-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9882== 
==9882== HEAP SUMMARY:
==9882==     in use at exit: 3,116,409 bytes in 69,020 blocks
==9882==   total heap usage: 1,585,230 allocs, 1,516,210 frees, 127,890,776 bytes allocated
==9882== 
==9882== Searching for pointers to 69,020 not-freed blocks
--9882--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9882--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9882--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9882--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9882--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9882--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9882--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9882--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9882--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9882--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9882--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9882--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9882--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9882--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9882--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9882--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9882--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9882--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9882--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9882--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9882--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9882--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9882--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9882--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9882--   Scanning root segment: 0x701a000..0x701afff (4096)
--9882--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9882--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9882--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9882--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9882--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9882--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9882--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9882--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9882--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9882--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9882== Checked 4,773,392 bytes
==9882== 
==9882== LEAK SUMMARY:
==9882==    definitely lost: 2,189 bytes in 12 blocks
==9882==    indirectly lost: 6,756 bytes in 7 blocks
==9882==      possibly lost: 0 bytes in 0 blocks
==9882==    still reachable: 3,107,464 bytes in 69,001 blocks
==9882==         suppressed: 0 bytes in 0 blocks
==9882== Rerun with --leak-check=full to see details of leaked memory
==9882== 
==9882== Use --track-origins=yes to see where uninitialised values come from
==9882== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9882== 
==9882== 1 errors in context 1 of 2:
==9882== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9882==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9882==    by 0x488CD0: stringsubst (subst.c:301)
==9882==    by 0x48801B: prefork (subst.c:77)
==9882==    by 0x42B318: execcmd (exec.c:2619)
==9882==    by 0x428CA0: execpline2 (exec.c:1697)
==9882==    by 0x427FD2: execpline (exec.c:1484)
==9882==    by 0x427756: execlist (exec.c:1267)
==9882==    by 0x42717C: execode (exec.c:1073)
==9882==    by 0x431299: runshfunc (exec.c:5040)
==9882==    by 0x430E76: doshfunc (exec.c:4920)
==9882==    by 0x4302FB: execshfunc (exec.c:4557)
==9882==    by 0x42D8C1: execcmd (exec.c:3373)
==9882== 
==9882== 
==9882== 2 errors in context 2 of 2:
==9882== Conditional jump or move depends on uninitialised value(s)
==9882==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9882==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9882==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9882==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9882==    by 0x42D8E9: execcmd (exec.c:3378)
==9882==    by 0x428CA0: execpline2 (exec.c:1697)
==9882==    by 0x427FD2: execpline (exec.c:1484)
==9882==    by 0x42779A: execlist (exec.c:1275)
==9882==    by 0x42717C: execode (exec.c:1073)
==9882==    by 0x431299: runshfunc (exec.c:5040)
==9882==    by 0x430E76: doshfunc (exec.c:4920)
==9882==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9882== 
==9882== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9881-- Caught __NR_exit; running __libc_freeres()
==9881== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9881-by-pythonnut-on-???
==9881== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9881-by-pythonnut-on-???
==9881== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9881-by-pythonnut-on-???
==9881== 
==9881== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9881== don't want to do, unless you know exactly what you're doing,
==9881== or are doing some strange experiment):
==9881==   /usr/lib/valgrind/../../bin/vgdb --pid=9881 ...command...
==9881== 
==9881== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9881==   /path/to/gdb ./zsh
==9881== and then give GDB the following command
==9881==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9881
==9881== --pid is optional if only one valgrind process is running
==9881== 
--9881-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9881== 
==9881== HEAP SUMMARY:
==9881==     in use at exit: 3,116,345 bytes in 69,017 blocks
==9881==   total heap usage: 1,585,235 allocs, 1,516,218 frees, 127,891,632 bytes allocated
==9881== 
==9881== Searching for pointers to 69,017 not-freed blocks
--9881--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9881--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9881--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9881--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9881--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9881--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9881--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9881--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9881--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9881--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9881--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9881--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9881--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9881--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9881--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9881--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9881--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9881--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9881--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9881--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9881--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9881--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9881--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9881--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9881--   Scanning root segment: 0x701a000..0x701afff (4096)
--9881--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9881--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9881--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9881--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9881--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9881--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9881--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9881--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9881--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9881--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9881== Checked 4,772,704 bytes
==9881== 
==9881== LEAK SUMMARY:
==9881==    definitely lost: 2,189 bytes in 12 blocks
==9881==    indirectly lost: 6,756 bytes in 7 blocks
==9881==      possibly lost: 0 bytes in 0 blocks
==9881==    still reachable: 3,107,400 bytes in 68,998 blocks
==9881==         suppressed: 0 bytes in 0 blocks
==9881== Rerun with --leak-check=full to see details of leaked memory
==9881== 
==9881== Use --track-origins=yes to see where uninitialised values come from
==9881== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9881== 
==9881== 1 errors in context 1 of 2:
==9881== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9881==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9881==    by 0x488CD0: stringsubst (subst.c:301)
==9881==    by 0x48801B: prefork (subst.c:77)
==9881==    by 0x42B318: execcmd (exec.c:2619)
==9881==    by 0x428CA0: execpline2 (exec.c:1697)
==9881==    by 0x427FD2: execpline (exec.c:1484)
==9881==    by 0x427756: execlist (exec.c:1267)
==9881==    by 0x42717C: execode (exec.c:1073)
==9881==    by 0x431299: runshfunc (exec.c:5040)
==9881==    by 0x430E76: doshfunc (exec.c:4920)
==9881==    by 0x4302FB: execshfunc (exec.c:4557)
==9881==    by 0x42D8C1: execcmd (exec.c:3373)
==9881== 
==9881== 
==9881== 2 errors in context 2 of 2:
==9881== Conditional jump or move depends on uninitialised value(s)
==9881==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9881==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9881==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9881==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9881==    by 0x42D8E9: execcmd (exec.c:3378)
==9881==    by 0x428CA0: execpline2 (exec.c:1697)
==9881==    by 0x427FD2: execpline (exec.c:1484)
==9881==    by 0x42779A: execlist (exec.c:1275)
==9881==    by 0x42717C: execode (exec.c:1073)
==9881==    by 0x431299: runshfunc (exec.c:5040)
==9881==    by 0x430E76: doshfunc (exec.c:4920)
==9881==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9881== 
==9881== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9886-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF188C,  len 4
==9886== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9886-by-pythonnut-on-???
==9886== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9886-by-pythonnut-on-???
==9886== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9886-by-pythonnut-on-???
==9886== 
==9886== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9886== don't want to do, unless you know exactly what you're doing,
==9886== or are doing some strange experiment):
==9886==   /usr/lib/valgrind/../../bin/vgdb --pid=9886 ...command...
==9886== 
==9886== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9886==   /path/to/gdb ./zsh
==9886== and then give GDB the following command
==9886==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9886
==9886== --pid is optional if only one valgrind process is running
==9886== 
client request: code 4d430005,  addr 0xFFEFF17EC,  len 4
--9886-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9886== 
==9886== HEAP SUMMARY:
==9886==     in use at exit: 3,116,661 bytes in 69,022 blocks
==9886==   total heap usage: 1,585,264 allocs, 1,516,242 frees, 127,904,107 bytes allocated
==9886== 
==9886== Searching for pointers to 69,022 not-freed blocks
--9886--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9886--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9886--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9886--   Scanning root segment: 0x4037000..0x403afff (16384)
--9886--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9886--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9886--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9886--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9886--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9886--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9886--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9886--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9886--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9886--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9886--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9886--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9886--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9886--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9886--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9886--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9886--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9886--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9886--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9886--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9886--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9886--   Scanning root segment: 0x701a000..0x701afff (4096)
--9886--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9886--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9886--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9886--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9886--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9886--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9886--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9886--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9886--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9886--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9886== Checked 4,791,328 bytes
==9886== 
==9886== LEAK SUMMARY:
==9886==    definitely lost: 2,189 bytes in 12 blocks
==9886==    indirectly lost: 6,756 bytes in 7 blocks
==9886==      possibly lost: 0 bytes in 0 blocks
==9886==    still reachable: 3,107,716 bytes in 69,003 blocks
==9886==         suppressed: 0 bytes in 0 blocks
==9886== Rerun with --leak-check=full to see details of leaked memory
==9886== 
==9886== Use --track-origins=yes to see where uninitialised values come from
==9886== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9886== 
==9886== 1 errors in context 1 of 2:
==9886== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9886==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9886==    by 0x488CD0: stringsubst (subst.c:301)
==9886==    by 0x48801B: prefork (subst.c:77)
==9886==    by 0x42B318: execcmd (exec.c:2619)
==9886==    by 0x428CA0: execpline2 (exec.c:1697)
==9886==    by 0x427FD2: execpline (exec.c:1484)
==9886==    by 0x427756: execlist (exec.c:1267)
==9886==    by 0x42717C: execode (exec.c:1073)
==9886==    by 0x431299: runshfunc (exec.c:5040)
==9886==    by 0x430E76: doshfunc (exec.c:4920)
==9886==    by 0x4302FB: execshfunc (exec.c:4557)
==9886==    by 0x42D8C1: execcmd (exec.c:3373)
==9886== 
==9886== 
==9886== 2 errors in context 2 of 2:
==9886== Conditional jump or move depends on uninitialised value(s)
==9886==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9886==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9886==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9886==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9886==    by 0x42D8E9: execcmd (exec.c:3378)
==9886==    by 0x428CA0: execpline2 (exec.c:1697)
==9886==    by 0x427FD2: execpline (exec.c:1484)
==9886==    by 0x42779A: execlist (exec.c:1275)
==9886==    by 0x42717C: execode (exec.c:1073)
==9886==    by 0x431299: runshfunc (exec.c:5040)
==9886==    by 0x430E76: doshfunc (exec.c:4920)
==9886==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9886== 
==9886== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9885-- Caught __NR_exit; running __libc_freeres()
==9885== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9885-by-pythonnut-on-???
==9885== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9885-by-pythonnut-on-???
==9885== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9885-by-pythonnut-on-???
==9885== 
==9885== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9885== don't want to do, unless you know exactly what you're doing,
==9885== or are doing some strange experiment):
==9885==   /usr/lib/valgrind/../../bin/vgdb --pid=9885 ...command...
==9885== 
==9885== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9885==   /path/to/gdb ./zsh
==9885== and then give GDB the following command
==9885==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9885
==9885== --pid is optional if only one valgrind process is running
==9885== 
--9885-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9885== 
==9885== HEAP SUMMARY:
==9885==     in use at exit: 3,116,660 bytes in 69,023 blocks
==9885==   total heap usage: 1,585,260 allocs, 1,516,237 frees, 127,900,555 bytes allocated
==9885== 
==9885== Searching for pointers to 69,023 not-freed blocks
--9885--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9885--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9885--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9885--   Scanning root segment: 0x4037000..0x403afff (16384)
--9885--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9885--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9885--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9885--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9885--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9885--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9885--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9885--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9885--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9885--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9885--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9885--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9885--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9885--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9885--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9885--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9885--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9885--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9885--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9885--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9885--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9885--   Scanning root segment: 0x701a000..0x701afff (4096)
--9885--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9885--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9885--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9885--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9885--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9885--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9885--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9885--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9885--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9885--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9885== Checked 4,791,008 bytes
==9885== 
==9885== LEAK SUMMARY:
==9885==    definitely lost: 2,189 bytes in 12 blocks
==9885==    indirectly lost: 6,756 bytes in 7 blocks
==9885==      possibly lost: 0 bytes in 0 blocks
==9885==    still reachable: 3,107,715 bytes in 69,004 blocks
==9885==         suppressed: 0 bytes in 0 blocks
==9885== Rerun with --leak-check=full to see details of leaked memory
==9885== 
==9885== Use --track-origins=yes to see where uninitialised values come from
==9885== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9885== 
==9885== 1 errors in context 1 of 2:
==9885== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9885==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9885==    by 0x488CD0: stringsubst (subst.c:301)
==9885==    by 0x48801B: prefork (subst.c:77)
==9885==    by 0x42B318: execcmd (exec.c:2619)
==9885==    by 0x428CA0: execpline2 (exec.c:1697)
==9885==    by 0x427FD2: execpline (exec.c:1484)
==9885==    by 0x427756: execlist (exec.c:1267)
==9885==    by 0x42717C: execode (exec.c:1073)
==9885==    by 0x431299: runshfunc (exec.c:5040)
==9885==    by 0x430E76: doshfunc (exec.c:4920)
==9885==    by 0x4302FB: execshfunc (exec.c:4557)
==9885==    by 0x42D8C1: execcmd (exec.c:3373)
==9885== 
==9885== 
==9885== 2 errors in context 2 of 2:
==9885== Conditional jump or move depends on uninitialised value(s)
==9885==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9885==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9885==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9885==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9885==    by 0x42D8E9: execcmd (exec.c:3378)
==9885==    by 0x428CA0: execpline2 (exec.c:1697)
==9885==    by 0x427FD2: execpline (exec.c:1484)
==9885==    by 0x42779A: execlist (exec.c:1275)
==9885==    by 0x42717C: execode (exec.c:1073)
==9885==    by 0x431299: runshfunc (exec.c:5040)
==9885==    by 0x430E76: doshfunc (exec.c:4920)
==9885==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9885== 
==9885== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF1DDC,  len 4
--9891-- Caught __NR_exit; running __libc_freeres()
==9891== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9891-by-pythonnut-on-???
==9891== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9891-by-pythonnut-on-???
==9891== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9891-by-pythonnut-on-???
==9891== 
==9891== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9891== don't want to do, unless you know exactly what you're doing,
==9891== or are doing some strange experiment):
==9891==   /usr/lib/valgrind/../../bin/vgdb --pid=9891 ...command...
==9891== 
==9891== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9891==   /path/to/gdb ./zsh
==9891== and then give GDB the following command
==9891==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9891
==9891== --pid is optional if only one valgrind process is running
==9891== 
--9891-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9891== 
==9891== HEAP SUMMARY:
==9891==     in use at exit: 3,116,952 bytes in 69,028 blocks
==9891==   total heap usage: 1,585,271 allocs, 1,516,243 frees, 127,905,695 bytes allocated
==9891== 
==9891== Searching for pointers to 69,028 not-freed blocks
--9891--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9891--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9891--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9891--   Scanning root segment: 0x4037000..0x403afff (16384)
--9891--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9891--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9891--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9891--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9891--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9891--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9891--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9891--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9891--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9891--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9891--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9891--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9891--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9891--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9891--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9891--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9891--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9891--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9891--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9891--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9891--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9891--   Scanning root segment: 0x701a000..0x701afff (4096)
--9891--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9891--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9891--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9891--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9891--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9891--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9891--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9891--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9891--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9891--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9891== Checked 4,791,024 bytes
==9891== 
==9891== LEAK SUMMARY:
==9891==    definitely lost: 2,189 bytes in 12 blocks
==9891==    indirectly lost: 6,756 bytes in 7 blocks
==9891==      possibly lost: 0 bytes in 0 blocks
==9891==    still reachable: 3,108,007 bytes in 69,009 blocks
==9891==         suppressed: 0 bytes in 0 blocks
==9891== Rerun with --leak-check=full to see details of leaked memory
==9891== 
==9891== Use --track-origins=yes to see where uninitialised values come from
==9891== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9891== 
==9891== 1 errors in context 1 of 2:
==9891== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9891==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9891==    by 0x488CD0: stringsubst (subst.c:301)
==9891==    by 0x48801B: prefork (subst.c:77)
==9891==    by 0x42B318: execcmd (exec.c:2619)
==9891==    by 0x428CA0: execpline2 (exec.c:1697)
==9891==    by 0x427FD2: execpline (exec.c:1484)
==9891==    by 0x427756: execlist (exec.c:1267)
==9891==    by 0x42717C: execode (exec.c:1073)
==9891==    by 0x431299: runshfunc (exec.c:5040)
==9891==    by 0x430E76: doshfunc (exec.c:4920)
==9891==    by 0x4302FB: execshfunc (exec.c:4557)
==9891==    by 0x42D8C1: execcmd (exec.c:3373)
==9891== 
==9891== 
==9891== 2 errors in context 2 of 2:
==9891== Conditional jump or move depends on uninitialised value(s)
==9891==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9891==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9891==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9891==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9891==    by 0x42D8E9: execcmd (exec.c:3378)
==9891==    by 0x428CA0: execpline2 (exec.c:1697)
==9891==    by 0x427FD2: execpline (exec.c:1484)
==9891==    by 0x42779A: execlist (exec.c:1275)
==9891==    by 0x42717C: execode (exec.c:1073)
==9891==    by 0x431299: runshfunc (exec.c:5040)
==9891==    by 0x430E76: doshfunc (exec.c:4920)
==9891==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9891== 
==9891== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF192C,  len 4
--9893-- Caught __NR_exit; running __libc_freeres()
==9893== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9893-by-pythonnut-on-???
==9893== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9893-by-pythonnut-on-???
==9893== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9893-by-pythonnut-on-???
==9893== 
==9893== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9893== don't want to do, unless you know exactly what you're doing,
==9893== or are doing some strange experiment):
==9893==   /usr/lib/valgrind/../../bin/vgdb --pid=9893 ...command...
==9893== 
==9893== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9893==   /path/to/gdb ./zsh
==9893== and then give GDB the following command
==9893==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9893
==9893== --pid is optional if only one valgrind process is running
==9893== 
--9893-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9893== 
==9893== HEAP SUMMARY:
==9893==     in use at exit: 3,116,981 bytes in 69,029 blocks
==9893==   total heap usage: 1,585,276 allocs, 1,516,247 frees, 127,907,836 bytes allocated
==9893== 
==9893== Searching for pointers to 69,029 not-freed blocks
--9893--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9893--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9893--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9893--   Scanning root segment: 0x4037000..0x403afff (16384)
--9893--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9893--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9893--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9893--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9893--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9893--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9893--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9893--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9893--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9893--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9893--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9893--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9893--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9893--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9893--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9893--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9893--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9893--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9893--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9893--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9893--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9893--   Scanning root segment: 0x701a000..0x701afff (4096)
--9893--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9893--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9893--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9893--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9893--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9893--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9893--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9893--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9893--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9893--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9893== Checked 4,791,320 bytes
==9893== 
==9893== LEAK SUMMARY:
==9893==    definitely lost: 2,189 bytes in 12 blocks
==9893==    indirectly lost: 6,756 bytes in 7 blocks
==9893==      possibly lost: 0 bytes in 0 blocks
==9893==    still reachable: 3,108,036 bytes in 69,010 blocks
==9893==         suppressed: 0 bytes in 0 blocks
==9893== Rerun with --leak-check=full to see details of leaked memory
==9893== 
==9893== Use --track-origins=yes to see where uninitialised values come from
==9893== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9893== 
==9893== 1 errors in context 1 of 2:
==9893== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9893==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9893==    by 0x488CD0: stringsubst (subst.c:301)
==9893==    by 0x48801B: prefork (subst.c:77)
==9893==    by 0x42B318: execcmd (exec.c:2619)
==9893==    by 0x428CA0: execpline2 (exec.c:1697)
==9893==    by 0x427FD2: execpline (exec.c:1484)
==9893==    by 0x427756: execlist (exec.c:1267)
==9893==    by 0x42717C: execode (exec.c:1073)
==9893==    by 0x431299: runshfunc (exec.c:5040)
==9893==    by 0x430E76: doshfunc (exec.c:4920)
==9893==    by 0x4302FB: execshfunc (exec.c:4557)
==9893==    by 0x42D8C1: execcmd (exec.c:3373)
==9893== 
==9893== 
==9893== 2 errors in context 2 of 2:
==9893== Conditional jump or move depends on uninitialised value(s)
==9893==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9893==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9893==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9893==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9893==    by 0x42D8E9: execcmd (exec.c:3378)
==9893==    by 0x428CA0: execpline2 (exec.c:1697)
==9893==    by 0x427FD2: execpline (exec.c:1484)
==9893==    by 0x42779A: execlist (exec.c:1275)
==9893==    by 0x42717C: execode (exec.c:1073)
==9893==    by 0x431299: runshfunc (exec.c:5040)
==9893==    by 0x430E76: doshfunc (exec.c:4920)
==9893==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9893== 
==9893== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF22AC,  len 4
client request: code 4d430005,  addr 0xFFEFF1C2C,  len 4
--9861-- Caught __NR_exit; running __libc_freeres()
--9861-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9861== 
==9861== HEAP SUMMARY:
==9861==     in use at exit: 3,115,109 bytes in 68,981 blocks
==9861==   total heap usage: 1,585,285 allocs, 1,516,304 frees, 127,911,776 bytes allocated
==9861== 
==9861== Searching for pointers to 68,981 not-freed blocks
--9861--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9861--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9861--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9861--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9861--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9861--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9861--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9861--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9861--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9861--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9861--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9861--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9861--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9861--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9861--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9861--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9861--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9861--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9861--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9861--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9861--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9861--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9861--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9861--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9861--   Scanning root segment: 0x701a000..0x701afff (4096)
--9861--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9861--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9861--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9861--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9861--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9861--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9861--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9861--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9861--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9861--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9861== Checked 4,769,168 bytes
==9861== 
==9861== LEAK SUMMARY:
==9861==    definitely lost: 2,189 bytes in 12 blocks
==9861==    indirectly lost: 6,756 bytes in 7 blocks
==9861==      possibly lost: 0 bytes in 0 blocks
==9861==    still reachable: 3,106,164 bytes in 68,962 blocks
==9861==         suppressed: 0 bytes in 0 blocks
==9861== Rerun with --leak-check=full to see details of leaked memory
==9861== 
==9861== Use --track-origins=yes to see where uninitialised values come from
==9861== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9861== 
==9861== 1 errors in context 1 of 2:
==9861== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9861==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9861==    by 0x488CD0: stringsubst (subst.c:301)
==9861==    by 0x48801B: prefork (subst.c:77)
==9861==    by 0x42B318: execcmd (exec.c:2619)
==9861==    by 0x428CA0: execpline2 (exec.c:1697)
==9861==    by 0x427FD2: execpline (exec.c:1484)
==9861==    by 0x427756: execlist (exec.c:1267)
==9861==    by 0x42717C: execode (exec.c:1073)
==9861==    by 0x431299: runshfunc (exec.c:5040)
==9861==    by 0x430E76: doshfunc (exec.c:4920)
==9861==    by 0x4302FB: execshfunc (exec.c:4557)
==9861==    by 0x42D8C1: execcmd (exec.c:3373)
==9861== 
==9861== 
==9861== 2 errors in context 2 of 2:
==9861== Conditional jump or move depends on uninitialised value(s)
==9861==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9861==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9861==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9861==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9861==    by 0x42D8E9: execcmd (exec.c:3378)
==9861==    by 0x428CA0: execpline2 (exec.c:1697)
==9861==    by 0x427FD2: execpline (exec.c:1484)
==9861==    by 0x42779A: execlist (exec.c:1275)
==9861==    by 0x42717C: execode (exec.c:1073)
==9861==    by 0x431299: runshfunc (exec.c:5040)
==9861==    by 0x430E76: doshfunc (exec.c:4920)
==9861==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9861== 
==9861== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
client request: code 4d430005,  addr 0xFFEFFD9EC,  len 4
==9897== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9897-by-pythonnut-on-???
==9897== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9897-by-pythonnut-on-???
==9897== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9897-by-pythonnut-on-???
==9897== 
==9897== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9897== don't want to do, unless you know exactly what you're doing,
==9897== or are doing some strange experiment):
==9897==   /usr/lib/valgrind/../../bin/vgdb --pid=9897 ...command...
==9897== 
==9897== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9897==   /path/to/gdb ./zsh
==9897== and then give GDB the following command
==9897==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9897
==9897== --pid is optional if only one valgrind process is running
==9897== 
--9897-- Caught __NR_exit; running __libc_freeres()
--9897-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9897== 
==9897== HEAP SUMMARY:
==9897==     in use at exit: 3,113,934 bytes in 68,981 blocks
==9897==   total heap usage: 1,592,381 allocs, 1,523,400 frees, 128,702,342 bytes allocated
==9897== 
==9897== Searching for pointers to 68,981 not-freed blocks
--9897--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9897--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9897--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9897--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9897--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9897--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9897--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9897--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9897--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9897--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9897--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9897--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9897--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9897--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9897--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9897--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9897--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9897--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9897--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9897--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9897--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9897--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9897--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9897--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9897--   Scanning root segment: 0x701a000..0x701afff (4096)
--9897--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9897--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9897--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9897--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9897--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9897--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9897--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9897--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9897--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9897--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9897== Checked 4,770,240 bytes
==9897== 
==9897== LEAK SUMMARY:
==9897==    definitely lost: 2,189 bytes in 12 blocks
==9897==    indirectly lost: 6,756 bytes in 7 blocks
==9897==      possibly lost: 0 bytes in 0 blocks
==9897==    still reachable: 3,104,989 bytes in 68,962 blocks
==9897==         suppressed: 0 bytes in 0 blocks
==9897== Rerun with --leak-check=full to see details of leaked memory
==9897== 
==9897== Use --track-origins=yes to see where uninitialised values come from
==9897== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9897== 
==9897== 1 errors in context 1 of 2:
==9897== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9897==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9897==    by 0x488CD0: stringsubst (subst.c:301)
==9897==    by 0x48801B: prefork (subst.c:77)
==9897==    by 0x42B318: execcmd (exec.c:2619)
==9897==    by 0x428CA0: execpline2 (exec.c:1697)
==9897==    by 0x427FD2: execpline (exec.c:1484)
==9897==    by 0x427756: execlist (exec.c:1267)
==9897==    by 0x42717C: execode (exec.c:1073)
==9897==    by 0x431299: runshfunc (exec.c:5040)
==9897==    by 0x430E76: doshfunc (exec.c:4920)
==9897==    by 0x4302FB: execshfunc (exec.c:4557)
==9897==    by 0x42D8C1: execcmd (exec.c:3373)
==9897== 
==9897== 
==9897== 2 errors in context 2 of 2:
==9897== Conditional jump or move depends on uninitialised value(s)
==9897==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9897==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9897==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9897==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9897==    by 0x42D8E9: execcmd (exec.c:3378)
==9897==    by 0x428CA0: execpline2 (exec.c:1697)
==9897==    by 0x427FD2: execpline (exec.c:1484)
==9897==    by 0x42779A: execlist (exec.c:1275)
==9897==    by 0x42717C: execode (exec.c:1073)
==9897==    by 0x431299: runshfunc (exec.c:5040)
==9897==    by 0x430E76: doshfunc (exec.c:4920)
==9897==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9897== 
==9897== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9898== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9898-by-pythonnut-on-???
==9898== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9898-by-pythonnut-on-???
==9898== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9898-by-pythonnut-on-???
==9898== 
==9898== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9898== don't want to do, unless you know exactly what you're doing,
==9898== or are doing some strange experiment):
==9898==   /usr/lib/valgrind/../../bin/vgdb --pid=9898 ...command...
==9898== 
==9898== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9898==   /path/to/gdb ./zsh
==9898== and then give GDB the following command
==9898==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9898
==9898== --pid is optional if only one valgrind process is running
==9898== 
==9901== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9901-by-pythonnut-on-???
==9901== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9901-by-pythonnut-on-???
==9901== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9901-by-pythonnut-on-???
==9901== 
==9901== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9901== don't want to do, unless you know exactly what you're doing,
==9901== or are doing some strange experiment):
==9901==   /usr/lib/valgrind/../../bin/vgdb --pid=9901 ...command...
==9901== 
==9901== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9901==   /path/to/gdb ./zsh
==9901== and then give GDB the following command
==9901==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9901
==9901== --pid is optional if only one valgrind process is running
==9901== 
==9900== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9900-by-pythonnut-on-???
==9900== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9900-by-pythonnut-on-???
==9900== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9900-by-pythonnut-on-???
==9900== 
==9900== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9900== don't want to do, unless you know exactly what you're doing,
==9900== or are doing some strange experiment):
==9900==   /usr/lib/valgrind/../../bin/vgdb --pid=9900 ...command...
==9900== 
==9900== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9900==   /path/to/gdb ./zsh
==9900== and then give GDB the following command
==9900==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9900
==9900== --pid is optional if only one valgrind process is running
==9900== 
==9904== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9904-by-pythonnut-on-???
==9904== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9904-by-pythonnut-on-???
==9904== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9904-by-pythonnut-on-???
==9904== 
==9904== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9904== don't want to do, unless you know exactly what you're doing,
==9904== or are doing some strange experiment):
==9904==   /usr/lib/valgrind/../../bin/vgdb --pid=9904 ...command...
==9904== 
==9904== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9904==   /path/to/gdb ./zsh
==9904== and then give GDB the following command
==9904==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9904
==9904== --pid is optional if only one valgrind process is running
==9904== 
==9906== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9906-by-pythonnut-on-???
==9906== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9906-by-pythonnut-on-???
==9906== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9906-by-pythonnut-on-???
==9906== 
==9906== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9906== don't want to do, unless you know exactly what you're doing,
==9906== or are doing some strange experiment):
==9906==   /usr/lib/valgrind/../../bin/vgdb --pid=9906 ...command...
==9906== 
==9906== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9906==   /path/to/gdb ./zsh
==9906== and then give GDB the following command
==9906==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9906
==9906== --pid is optional if only one valgrind process is running
==9906== 
==9907== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9907-by-pythonnut-on-???
==9907== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9907-by-pythonnut-on-???
==9907== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9907-by-pythonnut-on-???
==9907== 
==9907== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9907== don't want to do, unless you know exactly what you're doing,
==9907== or are doing some strange experiment):
==9907==   /usr/lib/valgrind/../../bin/vgdb --pid=9907 ...command...
==9907== 
==9907== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9907==   /path/to/gdb ./zsh
==9907== and then give GDB the following command
==9907==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9907
==9907== --pid is optional if only one valgrind process is running
==9907== 
==9908== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9908-by-pythonnut-on-???
==9908== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9908-by-pythonnut-on-???
==9908== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9908-by-pythonnut-on-???
==9908== 
==9908== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9908== don't want to do, unless you know exactly what you're doing,
==9908== or are doing some strange experiment):
==9908==   /usr/lib/valgrind/../../bin/vgdb --pid=9908 ...command...
==9908== 
==9908== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9908==   /path/to/gdb ./zsh
==9908== and then give GDB the following command
==9908==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9908
==9908== --pid is optional if only one valgrind process is running
==9908== 
--9908-- Caught __NR_exit; running __libc_freeres()
==9911== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9911-by-pythonnut-on-???
==9911== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9911-by-pythonnut-on-???
==9911== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9911-by-pythonnut-on-???
==9911== 
==9911== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9911== don't want to do, unless you know exactly what you're doing,
==9911== or are doing some strange experiment):
==9911==   /usr/lib/valgrind/../../bin/vgdb --pid=9911 ...command...
==9911== 
==9911== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9911==   /path/to/gdb ./zsh
==9911== and then give GDB the following command
==9911==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9911
==9911== --pid is optional if only one valgrind process is running
==9911== 
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
--9904-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--9908-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9904-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9908== 
==9910== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9910-by-pythonnut-on-???
==9910== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9910-by-pythonnut-on-???
==9910== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9910-by-pythonnut-on-???
==9910== 
==9910== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9910== don't want to do, unless you know exactly what you're doing,
==9910== or are doing some strange experiment):
==9910==   /usr/lib/valgrind/../../bin/vgdb --pid=9910 ...command...
==9910== 
==9910== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9910==   /path/to/gdb ./zsh
==9910== and then give GDB the following command
==9910==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9910
==9910== --pid is optional if only one valgrind process is running
==9910== 
==9908== HEAP SUMMARY:
==9908==     in use at exit: 3,112,898 bytes in 68,969 blocks
==9908==   total heap usage: 1,592,169 allocs, 1,523,200 frees, 128,480,436 bytes allocated
==9908== 
--9910-- Caught __NR_exit; running __libc_freeres()
==9904== 
==9904== HEAP SUMMARY:
==9904==     in use at exit: 3,119,663 bytes in 69,189 blocks
==9904==   total heap usage: 1,592,603 allocs, 1,523,414 frees, 128,713,418 bytes allocated
==9904== 
==9908== Searching for pointers to 68,969 not-freed blocks
--9910-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9908--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9908--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9908--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9908--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9908--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9908--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9908--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9908--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9908--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9908--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9908--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9908--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9908--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9908--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9908--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9908--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9908--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9908--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9908--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9908--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9908--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9908--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9908--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9908--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9908--   Scanning root segment: 0x701a000..0x701afff (4096)
--9908--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9908--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9908--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9908--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9908--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9908--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9908--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9908--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9908--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9908--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9904== Searching for pointers to 69,189 not-freed blocks
--9904--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9904--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9904--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9904--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9904--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9904--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9904--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9904--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9904--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9904--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9904--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9904--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9904--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9904--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9904--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9904--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9904--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9904--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9904--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9904--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9904--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9904--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9904--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9904--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9904--   Scanning root segment: 0x701a000..0x701afff (4096)
--9904--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9904--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9904--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9904--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9904--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9904--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9904--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9904--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9904--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9904--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9910== 
==9910== HEAP SUMMARY:
==9910==     in use at exit: 3,114,049 bytes in 68,958 blocks
==9910==   total heap usage: 1,592,155 allocs, 1,523,197 frees, 128,591,332 bytes allocated
==9910== 
==9910== Searching for pointers to 68,958 not-freed blocks
--9910--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9910--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9910--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9910--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9910--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9910--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9910--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9910--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9910--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9910--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9910--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9910--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9910--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9910--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9910--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9910--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9910--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9910--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9910--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9910--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9910--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9910--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9910--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9910--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9910--   Scanning root segment: 0x701a000..0x701afff (4096)
--9910--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9910--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9910--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9910--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9910--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9910--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9910--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9910--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9910--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9910--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9904== Checked 4,779,408 bytes
==9904== 
==9908== Checked 4,768,144 bytes
==9908== 
==9904== LEAK SUMMARY:
==9904==    definitely lost: 2,189 bytes in 12 blocks
==9904==    indirectly lost: 6,756 bytes in 7 blocks
==9904==      possibly lost: 0 bytes in 0 blocks
==9904==    still reachable: 3,110,718 bytes in 69,170 blocks
==9904==         suppressed: 0 bytes in 0 blocks
==9904== Rerun with --leak-check=full to see details of leaked memory
==9904== 
==9904== Use --track-origins=yes to see where uninitialised values come from
==9904== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9904== 
==9904== 1 errors in context 1 of 2:
==9904== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9904==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9904==    by 0x488CD0: stringsubst (subst.c:301)
==9904==    by 0x48801B: prefork (subst.c:77)
==9904==    by 0x42B318: execcmd (exec.c:2619)
==9904==    by 0x428CA0: execpline2 (exec.c:1697)
==9904==    by 0x427FD2: execpline (exec.c:1484)
==9904==    by 0x427756: execlist (exec.c:1267)
==9904==    by 0x42717C: execode (exec.c:1073)
==9904==    by 0x431299: runshfunc (exec.c:5040)
==9904==    by 0x430E76: doshfunc (exec.c:4920)
==9904==    by 0x4302FB: execshfunc (exec.c:4557)
==9904==    by 0x42D8C1: execcmd (exec.c:3373)
==9904== 
==9904== 
==9904== 2 errors in context 2 of 2:
==9904== Conditional jump or move depends on uninitialised value(s)
==9904==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9904==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9904==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9904==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9904==    by 0x42D8E9: execcmd (exec.c:3378)
==9904==    by 0x428CA0: execpline2 (exec.c:1697)
==9904==    by 0x427FD2: execpline (exec.c:1484)
==9904==    by 0x42779A: execlist (exec.c:1275)
==9904==    by 0x42717C: execode (exec.c:1073)
==9904==    by 0x431299: runshfunc (exec.c:5040)
==9904==    by 0x430E76: doshfunc (exec.c:4920)
==9904==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9904== 
==9904== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9908== LEAK SUMMARY:
==9908==    definitely lost: 2,189 bytes in 12 blocks
==9908==    indirectly lost: 6,756 bytes in 7 blocks
==9908==      possibly lost: 0 bytes in 0 blocks
==9908==    still reachable: 3,103,953 bytes in 68,950 blocks
==9908==         suppressed: 0 bytes in 0 blocks
==9908== Rerun with --leak-check=full to see details of leaked memory
==9908== 
==9908== Use --track-origins=yes to see where uninitialised values come from
==9908== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9908== 
==9908== 1 errors in context 1 of 2:
==9908== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9908==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9908==    by 0x488CD0: stringsubst (subst.c:301)
==9908==    by 0x48801B: prefork (subst.c:77)
==9908==    by 0x42B318: execcmd (exec.c:2619)
==9908==    by 0x428CA0: execpline2 (exec.c:1697)
==9908==    by 0x427FD2: execpline (exec.c:1484)
==9908==    by 0x427756: execlist (exec.c:1267)
==9908==    by 0x42717C: execode (exec.c:1073)
==9908==    by 0x431299: runshfunc (exec.c:5040)
==9908==    by 0x430E76: doshfunc (exec.c:4920)
==9908==    by 0x4302FB: execshfunc (exec.c:4557)
==9908==    by 0x42D8C1: execcmd (exec.c:3373)
==9908== 
==9908== 
==9908== 2 errors in context 2 of 2:
==9908== Conditional jump or move depends on uninitialised value(s)
==9908==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9908==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9908==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9908==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9908==    by 0x42D8E9: execcmd (exec.c:3378)
==9908==    by 0x428CA0: execpline2 (exec.c:1697)
==9908==    by 0x427FD2: execpline (exec.c:1484)
==9908==    by 0x42779A: execlist (exec.c:1275)
==9908==    by 0x42717C: execode (exec.c:1073)
==9908==    by 0x431299: runshfunc (exec.c:5040)
==9908==    by 0x430E76: doshfunc (exec.c:4920)
==9908==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9908== 
==9908== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9901-- Caught __NR_exit; running __libc_freeres()
==9910== Checked 4,774,944 bytes
==9910== 
--9905-- Caught __NR_exit; running __libc_freeres()
==9905== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9905-by-pythonnut-on-???
==9905== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9905-by-pythonnut-on-???
==9905== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9905-by-pythonnut-on-???
==9905== 
==9905== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9905== don't want to do, unless you know exactly what you're doing,
==9905== or are doing some strange experiment):
==9905==   /usr/lib/valgrind/../../bin/vgdb --pid=9905 ...command...
==9905== 
==9905== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9905==   /path/to/gdb ./zsh
==9905== and then give GDB the following command
==9905==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9905
==9905== --pid is optional if only one valgrind process is running
==9905== 
==9910== LEAK SUMMARY:
==9910==    definitely lost: 2,189 bytes in 12 blocks
==9910==    indirectly lost: 6,756 bytes in 7 blocks
==9910==      possibly lost: 0 bytes in 0 blocks
==9910==    still reachable: 3,105,104 bytes in 68,939 blocks
==9910==         suppressed: 0 bytes in 0 blocks
==9910== Rerun with --leak-check=full to see details of leaked memory
==9910== 
==9910== Use --track-origins=yes to see where uninitialised values come from
==9910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9910== 
==9910== 1 errors in context 1 of 2:
==9910== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9910==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9910==    by 0x488CD0: stringsubst (subst.c:301)
==9910==    by 0x48801B: prefork (subst.c:77)
==9910==    by 0x42B318: execcmd (exec.c:2619)
==9910==    by 0x428CA0: execpline2 (exec.c:1697)
==9910==    by 0x427FD2: execpline (exec.c:1484)
==9910==    by 0x427756: execlist (exec.c:1267)
==9910==    by 0x42717C: execode (exec.c:1073)
==9910==    by 0x431299: runshfunc (exec.c:5040)
==9910==    by 0x430E76: doshfunc (exec.c:4920)
==9910==    by 0x4302FB: execshfunc (exec.c:4557)
==9910==    by 0x42D8C1: execcmd (exec.c:3373)
==9910== 
==9910== 
==9910== 2 errors in context 2 of 2:
==9910== Conditional jump or move depends on uninitialised value(s)
==9910==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9910==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9910==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9910==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9910==    by 0x42D8E9: execcmd (exec.c:3378)
==9910==    by 0x428CA0: execpline2 (exec.c:1697)
==9910==    by 0x427FD2: execpline (exec.c:1484)
==9910==    by 0x42779A: execlist (exec.c:1275)
==9910==    by 0x42717C: execode (exec.c:1073)
==9910==    by 0x431299: runshfunc (exec.c:5040)
==9910==    by 0x430E76: doshfunc (exec.c:4920)
==9910==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9910== 
==9910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9901-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9901== 
--9905-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9901== HEAP SUMMARY:
==9901==     in use at exit: 3,117,680 bytes in 69,117 blocks
==9901==   total heap usage: 1,592,181 allocs, 1,523,064 frees, 128,474,628 bytes allocated
==9901== 
==9905== 
==9905== HEAP SUMMARY:
==9905==     in use at exit: 3,112,834 bytes in 68,966 blocks
==9905==   total heap usage: 1,592,167 allocs, 1,523,201 frees, 128,480,195 bytes allocated
==9905== 
client request: code 4d430005,  addr 0xFFEFF073C,  len 4
==9901== Searching for pointers to 69,117 not-freed blocks
--9901--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9901--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9901--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9901--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9901--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9901--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9901--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9901--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9901--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9901--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9901--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9901--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9901--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9901--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9901--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9901--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9901--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9901--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9901--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9901--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9901--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9901--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9901--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9901--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9901--   Scanning root segment: 0x701a000..0x701afff (4096)
--9901--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9901--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9901--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9901--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9901--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9901--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9901--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9901--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9901--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9901--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9905== Searching for pointers to 68,966 not-freed blocks
--9905--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9905--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9905--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9905--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9905--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9905--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9905--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9905--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9905--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9905--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9905--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9905--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9905--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9905--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9905--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9905--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9905--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9905--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9905--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9905--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9905--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9905--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9905--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9905--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9905--   Scanning root segment: 0x701a000..0x701afff (4096)
--9905--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9905--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9905--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9905--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9905--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9905--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9905--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9905--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9905--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9905--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9901== Checked 4,775,600 bytes
==9901== 
==9905== Checked 4,767,456 bytes
==9905== 
==9901== LEAK SUMMARY:
==9901==    definitely lost: 2,189 bytes in 12 blocks
==9901==    indirectly lost: 6,756 bytes in 7 blocks
==9901==      possibly lost: 0 bytes in 0 blocks
==9901==    still reachable: 3,108,735 bytes in 69,098 blocks
==9901==         suppressed: 0 bytes in 0 blocks
==9901== Rerun with --leak-check=full to see details of leaked memory
==9901== 
==9901== Use --track-origins=yes to see where uninitialised values come from
==9901== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9901== 
==9901== 1 errors in context 1 of 2:
==9901== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9901==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9901==    by 0x488CD0: stringsubst (subst.c:301)
==9901==    by 0x48801B: prefork (subst.c:77)
==9901==    by 0x42B318: execcmd (exec.c:2619)
==9901==    by 0x428CA0: execpline2 (exec.c:1697)
==9901==    by 0x427FD2: execpline (exec.c:1484)
==9901==    by 0x427756: execlist (exec.c:1267)
==9901==    by 0x42717C: execode (exec.c:1073)
==9901==    by 0x431299: runshfunc (exec.c:5040)
==9901==    by 0x430E76: doshfunc (exec.c:4920)
==9901==    by 0x4302FB: execshfunc (exec.c:4557)
==9901==    by 0x42D8C1: execcmd (exec.c:3373)
==9901== 
==9901== 
==9901== 2 errors in context 2 of 2:
==9901== Conditional jump or move depends on uninitialised value(s)
==9901==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9901==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9901==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9901==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9901==    by 0x42D8E9: execcmd (exec.c:3378)
==9901==    by 0x428CA0: execpline2 (exec.c:1697)
==9901==    by 0x427FD2: execpline (exec.c:1484)
==9901==    by 0x42779A: execlist (exec.c:1275)
==9901==    by 0x42717C: execode (exec.c:1073)
==9901==    by 0x431299: runshfunc (exec.c:5040)
==9901==    by 0x430E76: doshfunc (exec.c:4920)
==9901==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9901== 
==9901== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9905== LEAK SUMMARY:
==9905==    definitely lost: 2,189 bytes in 12 blocks
==9905==    indirectly lost: 6,756 bytes in 7 blocks
==9905==      possibly lost: 0 bytes in 0 blocks
==9905==    still reachable: 3,103,889 bytes in 68,947 blocks
==9905==         suppressed: 0 bytes in 0 blocks
==9905== Rerun with --leak-check=full to see details of leaked memory
==9905== 
==9905== Use --track-origins=yes to see where uninitialised values come from
==9905== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9905== 
==9905== 1 errors in context 1 of 2:
==9905== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9905==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9905==    by 0x488CD0: stringsubst (subst.c:301)
==9905==    by 0x48801B: prefork (subst.c:77)
==9905==    by 0x42B318: execcmd (exec.c:2619)
==9905==    by 0x428CA0: execpline2 (exec.c:1697)
==9905==    by 0x427FD2: execpline (exec.c:1484)
==9905==    by 0x427756: execlist (exec.c:1267)
==9905==    by 0x42717C: execode (exec.c:1073)
==9905==    by 0x431299: runshfunc (exec.c:5040)
==9905==    by 0x430E76: doshfunc (exec.c:4920)
==9905==    by 0x4302FB: execshfunc (exec.c:4557)
==9905==    by 0x42D8C1: execcmd (exec.c:3373)
==9905== 
==9905== 
==9905== 2 errors in context 2 of 2:
==9905== Conditional jump or move depends on uninitialised value(s)
==9905==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9905==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9905==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9905==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9905==    by 0x42D8E9: execcmd (exec.c:3378)
==9905==    by 0x428CA0: execpline2 (exec.c:1697)
==9905==    by 0x427FD2: execpline (exec.c:1484)
==9905==    by 0x42779A: execlist (exec.c:1275)
==9905==    by 0x42717C: execode (exec.c:1073)
==9905==    by 0x431299: runshfunc (exec.c:5040)
==9905==    by 0x430E76: doshfunc (exec.c:4920)
==9905==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9905== 
==9905== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9899== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9899-by-pythonnut-on-???
==9899== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9899-by-pythonnut-on-???
==9899== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9899-by-pythonnut-on-???
==9899== 
==9899== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9899== don't want to do, unless you know exactly what you're doing,
==9899== or are doing some strange experiment):
==9899==   /usr/lib/valgrind/../../bin/vgdb --pid=9899 ...command...
==9899== 
==9899== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9899==   /path/to/gdb ./zsh
==9899== and then give GDB the following command
==9899==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9899
==9899== --pid is optional if only one valgrind process is running
==9899== 
--9899-- Caught __NR_exit; running __libc_freeres()
--9930-- Caught __NR_exit; running __libc_freeres()
==9930== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9930-by-pythonnut-on-???
==9930== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9930-by-pythonnut-on-???
==9930== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9930-by-pythonnut-on-???
==9930== 
==9930== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9930== don't want to do, unless you know exactly what you're doing,
==9930== or are doing some strange experiment):
==9930==   /usr/lib/valgrind/../../bin/vgdb --pid=9930 ...command...
==9930== 
==9930== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9930==   /path/to/gdb ./zsh
==9930== and then give GDB the following command
==9930==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9930
==9930== --pid is optional if only one valgrind process is running
==9930== 
--9899-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9899== 
--9930-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9899== HEAP SUMMARY:
==9899==     in use at exit: 3,115,695 bytes in 69,046 blocks
==9899==   total heap usage: 1,592,139 allocs, 1,523,093 frees, 128,477,878 bytes allocated
==9899== 
==9930== 
==9930== HEAP SUMMARY:
==9930==     in use at exit: 3,112,841 bytes in 68,966 blocks
==9930==   total heap usage: 1,592,182 allocs, 1,523,216 frees, 128,485,193 bytes allocated
==9930== 
==9899== Searching for pointers to 69,046 not-freed blocks
--9899--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9899--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9899--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9899--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9899--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9899--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9899--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9899--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9899--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9899--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9899--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9899--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9899--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9899--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9899--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9899--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9899--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9899--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9899--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9899--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9899--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9899--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9899--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9899--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9899--   Scanning root segment: 0x701a000..0x701afff (4096)
--9899--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9899--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9899--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9899--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9899--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9899--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9899--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9899--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9899--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9899--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9930== Searching for pointers to 68,966 not-freed blocks
--9930--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9930--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9930--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9930--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9930--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9930--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9930--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9930--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9930--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9930--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9930--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9930--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9930--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9930--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9930--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9930--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9930--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9930--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9930--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9930--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9930--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9930--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9930--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9930--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9930--   Scanning root segment: 0x701a000..0x701afff (4096)
--9930--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9930--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9930--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9930--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9930--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9930--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9930--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9930--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9930--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9930--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9899== Checked 4,772,608 bytes
==9899== 
==9930== Checked 4,767,592 bytes
==9930== 
==9899== LEAK SUMMARY:
==9899==    definitely lost: 2,189 bytes in 12 blocks
==9899==    indirectly lost: 6,756 bytes in 7 blocks
==9899==      possibly lost: 0 bytes in 0 blocks
==9899==    still reachable: 3,106,750 bytes in 69,027 blocks
==9899==         suppressed: 0 bytes in 0 blocks
==9899== Rerun with --leak-check=full to see details of leaked memory
==9899== 
==9899== Use --track-origins=yes to see where uninitialised values come from
==9899== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9899== 
==9899== 1 errors in context 1 of 2:
==9899== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9899==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9899==    by 0x488CD0: stringsubst (subst.c:301)
==9899==    by 0x48801B: prefork (subst.c:77)
==9899==    by 0x42B318: execcmd (exec.c:2619)
==9899==    by 0x428CA0: execpline2 (exec.c:1697)
==9899==    by 0x427FD2: execpline (exec.c:1484)
==9899==    by 0x427756: execlist (exec.c:1267)
==9899==    by 0x42717C: execode (exec.c:1073)
==9899==    by 0x431299: runshfunc (exec.c:5040)
==9899==    by 0x430E76: doshfunc (exec.c:4920)
==9899==    by 0x4302FB: execshfunc (exec.c:4557)
==9899==    by 0x42D8C1: execcmd (exec.c:3373)
==9899== 
==9899== 
==9899== 2 errors in context 2 of 2:
==9899== Conditional jump or move depends on uninitialised value(s)
==9899==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9899==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9899==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9899==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9899==    by 0x42D8E9: execcmd (exec.c:3378)
==9899==    by 0x428CA0: execpline2 (exec.c:1697)
==9899==    by 0x427FD2: execpline (exec.c:1484)
==9899==    by 0x42779A: execlist (exec.c:1275)
==9899==    by 0x42717C: execode (exec.c:1073)
==9899==    by 0x431299: runshfunc (exec.c:5040)
==9899==    by 0x430E76: doshfunc (exec.c:4920)
==9899==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9899== 
==9899== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9912-- Caught __NR_exit; running __libc_freeres()
==9930== LEAK SUMMARY:
==9930==    definitely lost: 2,189 bytes in 12 blocks
==9930==    indirectly lost: 6,756 bytes in 7 blocks
==9930==      possibly lost: 0 bytes in 0 blocks
==9930==    still reachable: 3,103,896 bytes in 68,947 blocks
==9930==         suppressed: 0 bytes in 0 blocks
==9930== Rerun with --leak-check=full to see details of leaked memory
==9930== 
==9930== Use --track-origins=yes to see where uninitialised values come from
==9930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9930== 
==9930== 1 errors in context 1 of 2:
==9930== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9930==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9930==    by 0x488CD0: stringsubst (subst.c:301)
==9930==    by 0x48801B: prefork (subst.c:77)
==9930==    by 0x42B318: execcmd (exec.c:2619)
==9930==    by 0x428CA0: execpline2 (exec.c:1697)
==9930==    by 0x427FD2: execpline (exec.c:1484)
==9930==    by 0x427756: execlist (exec.c:1267)
==9930==    by 0x42717C: execode (exec.c:1073)
==9930==    by 0x431299: runshfunc (exec.c:5040)
==9930==    by 0x430E76: doshfunc (exec.c:4920)
==9930==    by 0x4302FB: execshfunc (exec.c:4557)
==9930==    by 0x42D8C1: execcmd (exec.c:3373)
==9930== 
==9930== 
==9930== 2 errors in context 2 of 2:
==9930== Conditional jump or move depends on uninitialised value(s)
==9930==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9930==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9930==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9930==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9930==    by 0x42D8E9: execcmd (exec.c:3378)
==9930==    by 0x428CA0: execpline2 (exec.c:1697)
==9930==    by 0x427FD2: execpline (exec.c:1484)
==9930==    by 0x42779A: execlist (exec.c:1275)
==9930==    by 0x42717C: execode (exec.c:1073)
==9930==    by 0x431299: runshfunc (exec.c:5040)
==9930==    by 0x430E76: doshfunc (exec.c:4920)
==9930==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9930== 
==9930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9912== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9912-by-pythonnut-on-???
==9912== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9912-by-pythonnut-on-???
==9912== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9912-by-pythonnut-on-???
==9912== 
==9912== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9912== don't want to do, unless you know exactly what you're doing,
==9912== or are doing some strange experiment):
==9912==   /usr/lib/valgrind/../../bin/vgdb --pid=9912 ...command...
==9912== 
==9912== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9912==   /path/to/gdb ./zsh
==9912== and then give GDB the following command
==9912==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9912
==9912== --pid is optional if only one valgrind process is running
==9912== 
--9912-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9965== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9965-by-pythonnut-on-???
==9965== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9965-by-pythonnut-on-???
==9965== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9965-by-pythonnut-on-???
==9965== 
==9965== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9965== don't want to do, unless you know exactly what you're doing,
==9965== or are doing some strange experiment):
==9965==   /usr/lib/valgrind/../../bin/vgdb --pid=9965 ...command...
==9965== 
==9965== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9965==   /path/to/gdb ./zsh
==9965== and then give GDB the following command
==9965==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9965
==9965== --pid is optional if only one valgrind process is running
==9965== 
--9965-- Caught __NR_exit; running __libc_freeres()
==9912== 
==9912== HEAP SUMMARY:
==9912==     in use at exit: 3,114,408 bytes in 68,966 blocks
==9912==   total heap usage: 1,592,170 allocs, 1,523,204 frees, 128,595,347 bytes allocated
==9912== 
--9964-- Caught __NR_exit; running __libc_freeres()
==9964== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9964-by-pythonnut-on-???
==9964== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9964-by-pythonnut-on-???
==9964== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9964-by-pythonnut-on-???
==9964== 
==9964== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9964== don't want to do, unless you know exactly what you're doing,
==9964== or are doing some strange experiment):
==9964==   /usr/lib/valgrind/../../bin/vgdb --pid=9964 ...command...
==9964== 
==9964== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9964==   /path/to/gdb ./zsh
==9964== and then give GDB the following command
==9964==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9964
==9964== --pid is optional if only one valgrind process is running
==9964== 
--9965-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9912== Searching for pointers to 68,966 not-freed blocks
--9912--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9912--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9912--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9912--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9912--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9912--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9912--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9912--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9912--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9912--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9912--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9912--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9912--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9912--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9912--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9912--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9912--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9912--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9912--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9912--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9912--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9912--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9912--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9912--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9912--   Scanning root segment: 0x701a000..0x701afff (4096)
--9912--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9912--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9912--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9912--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9912--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9912--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9912--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9964-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9912--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9912--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9912--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9965== 
==9965== HEAP SUMMARY:
==9965==     in use at exit: 3,117,442 bytes in 69,113 blocks
==9965==   total heap usage: 1,592,159 allocs, 1,523,046 frees, 128,472,711 bytes allocated
==9965== 
==9964== 
==9964== HEAP SUMMARY:
==9964==     in use at exit: 3,113,001 bytes in 68,967 blocks
==9964==   total heap usage: 1,592,199 allocs, 1,523,232 frees, 128,490,044 bytes allocated
==9964== 
==9965== Searching for pointers to 69,113 not-freed blocks
--9965--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9965--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9965--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9965--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9965--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9965--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9965--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9965--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9965--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9965--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9965--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9965--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9965--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9965--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9965--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9965--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9965--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9965--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9965--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9965--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9965--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9965--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9965--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9965--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9965--   Scanning root segment: 0x701a000..0x701afff (4096)
--9965--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9965--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9965--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9965--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9965--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9965--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9965--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9965--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9965--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9965--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9964== Searching for pointers to 68,967 not-freed blocks
--9964--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9964--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9964--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9964--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9964--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9964--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9964--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9964--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9964--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9964--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9964--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9964--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9964--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9964--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9964--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9964--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9964--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9964--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9964--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9964--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9964--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9964--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9964--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9964--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9964--   Scanning root segment: 0x701a000..0x701afff (4096)
--9964--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9964--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9964--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9964--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9964--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9964--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9964--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9964--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9964--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9964--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9912== Checked 4,775,008 bytes
==9912== 
==9912== LEAK SUMMARY:
==9912==    definitely lost: 2,189 bytes in 12 blocks
==9912==    indirectly lost: 6,756 bytes in 7 blocks
==9912==      possibly lost: 0 bytes in 0 blocks
==9912==    still reachable: 3,105,463 bytes in 68,947 blocks
==9912==         suppressed: 0 bytes in 0 blocks
==9912== Rerun with --leak-check=full to see details of leaked memory
==9912== 
==9912== Use --track-origins=yes to see where uninitialised values come from
==9912== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9912== 
==9912== 1 errors in context 1 of 2:
==9912== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9912==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9912==    by 0x488CD0: stringsubst (subst.c:301)
==9912==    by 0x48801B: prefork (subst.c:77)
==9912==    by 0x42B318: execcmd (exec.c:2619)
==9912==    by 0x428CA0: execpline2 (exec.c:1697)
==9912==    by 0x427FD2: execpline (exec.c:1484)
==9912==    by 0x427756: execlist (exec.c:1267)
==9912==    by 0x42717C: execode (exec.c:1073)
==9912==    by 0x431299: runshfunc (exec.c:5040)
==9912==    by 0x430E76: doshfunc (exec.c:4920)
==9912==    by 0x4302FB: execshfunc (exec.c:4557)
==9912==    by 0x42D8C1: execcmd (exec.c:3373)
==9912== 
==9912== 
==9912== 2 errors in context 2 of 2:
==9912== Conditional jump or move depends on uninitialised value(s)
==9912==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9912==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9912==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9912==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9912==    by 0x42D8E9: execcmd (exec.c:3378)
==9912==    by 0x428CA0: execpline2 (exec.c:1697)
==9912==    by 0x427FD2: execpline (exec.c:1484)
==9912==    by 0x42779A: execlist (exec.c:1275)
==9912==    by 0x42717C: execode (exec.c:1073)
==9912==    by 0x431299: runshfunc (exec.c:5040)
==9912==    by 0x430E76: doshfunc (exec.c:4920)
==9912==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9912== 
==9912== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9907-- Caught __NR_exit; running __libc_freeres()
==9965== Checked 4,775,984 bytes
==9965== 
==9964== Checked 4,766,936 bytes
==9964== 
--9907-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9965== LEAK SUMMARY:
==9965==    definitely lost: 2,189 bytes in 12 blocks
==9965==    indirectly lost: 6,756 bytes in 7 blocks
==9965==      possibly lost: 0 bytes in 0 blocks
==9965==    still reachable: 3,108,497 bytes in 69,094 blocks
==9965==         suppressed: 0 bytes in 0 blocks
==9965== Rerun with --leak-check=full to see details of leaked memory
==9965== 
==9965== Use --track-origins=yes to see where uninitialised values come from
==9965== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9965== 
==9965== 1 errors in context 1 of 2:
==9965== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9965==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9965==    by 0x488CD0: stringsubst (subst.c:301)
==9965==    by 0x48801B: prefork (subst.c:77)
==9965==    by 0x42B318: execcmd (exec.c:2619)
==9965==    by 0x428CA0: execpline2 (exec.c:1697)
==9965==    by 0x427FD2: execpline (exec.c:1484)
==9965==    by 0x427756: execlist (exec.c:1267)
==9965==    by 0x42717C: execode (exec.c:1073)
==9965==    by 0x431299: runshfunc (exec.c:5040)
==9965==    by 0x430E76: doshfunc (exec.c:4920)
==9965==    by 0x4302FB: execshfunc (exec.c:4557)
==9965==    by 0x42D8C1: execcmd (exec.c:3373)
==9965== 
==9965== 
==9965== 2 errors in context 2 of 2:
==9965== Conditional jump or move depends on uninitialised value(s)
==9965==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9965==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9965==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9965==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9965==    by 0x42D8E9: execcmd (exec.c:3378)
==9965==    by 0x428CA0: execpline2 (exec.c:1697)
==9965==    by 0x427FD2: execpline (exec.c:1484)
==9965==    by 0x42779A: execlist (exec.c:1275)
==9965==    by 0x42717C: execode (exec.c:1073)
==9965==    by 0x431299: runshfunc (exec.c:5040)
==9965==    by 0x430E76: doshfunc (exec.c:4920)
==9965==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9965== 
==9965== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9964== LEAK SUMMARY:
==9964==    definitely lost: 2,189 bytes in 12 blocks
==9964==    indirectly lost: 6,756 bytes in 7 blocks
==9964==      possibly lost: 0 bytes in 0 blocks
==9964==    still reachable: 3,104,056 bytes in 68,948 blocks
==9964==         suppressed: 0 bytes in 0 blocks
==9964== Rerun with --leak-check=full to see details of leaked memory
==9964== 
==9964== Use --track-origins=yes to see where uninitialised values come from
==9964== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9964== 
==9964== 1 errors in context 1 of 2:
==9964== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9964==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9964==    by 0x488CD0: stringsubst (subst.c:301)
==9964==    by 0x48801B: prefork (subst.c:77)
==9964==    by 0x42B318: execcmd (exec.c:2619)
==9964==    by 0x428CA0: execpline2 (exec.c:1697)
==9964==    by 0x427FD2: execpline (exec.c:1484)
==9964==    by 0x427756: execlist (exec.c:1267)
==9964==    by 0x42717C: execode (exec.c:1073)
==9964==    by 0x431299: runshfunc (exec.c:5040)
==9964==    by 0x430E76: doshfunc (exec.c:4920)
==9964==    by 0x4302FB: execshfunc (exec.c:4557)
==9964==    by 0x42D8C1: execcmd (exec.c:3373)
==9964== 
==9964== 
==9964== 2 errors in context 2 of 2:
==9964== Conditional jump or move depends on uninitialised value(s)
==9964==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9964==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9964==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9964==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9964==    by 0x42D8E9: execcmd (exec.c:3378)
==9964==    by 0x428CA0: execpline2 (exec.c:1697)
==9964==    by 0x427FD2: execpline (exec.c:1484)
==9964==    by 0x42779A: execlist (exec.c:1275)
==9964==    by 0x42717C: execode (exec.c:1073)
==9964==    by 0x431299: runshfunc (exec.c:5040)
==9964==    by 0x430E76: doshfunc (exec.c:4920)
==9964==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9964== 
==9964== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9963-by-pythonnut-on-???
==9963== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9963-by-pythonnut-on-???
==9963== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9963-by-pythonnut-on-???
==9963== 
==9963== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9963== don't want to do, unless you know exactly what you're doing,
==9963== or are doing some strange experiment):
==9963==   /usr/lib/valgrind/../../bin/vgdb --pid=9963 ...command...
==9963== 
==9963== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9963==   /path/to/gdb ./zsh
==9963== and then give GDB the following command
==9963==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9963
==9963== --pid is optional if only one valgrind process is running
==9963== 
==9907== 
==9907== HEAP SUMMARY:
==9907==     in use at exit: 3,113,546 bytes in 68,947 blocks
==9907==   total heap usage: 1,592,179 allocs, 1,523,232 frees, 128,597,350 bytes allocated
==9907== 
==9967== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9967-by-pythonnut-on-???
==9967== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9967-by-pythonnut-on-???
==9967== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9967-by-pythonnut-on-???
==9967== 
==9967== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9967== don't want to do, unless you know exactly what you're doing,
==9967== or are doing some strange experiment):
==9967==   /usr/lib/valgrind/../../bin/vgdb --pid=9967 ...command...
==9967== 
==9967== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9967==   /path/to/gdb ./zsh
==9967== and then give GDB the following command
==9967==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9967
==9967== --pid is optional if only one valgrind process is running
==9967== 
==9966== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9966-by-pythonnut-on-???
==9966== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9966-by-pythonnut-on-???
==9966== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9966-by-pythonnut-on-???
==9966== 
==9966== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9966== don't want to do, unless you know exactly what you're doing,
==9966== or are doing some strange experiment):
==9966==   /usr/lib/valgrind/../../bin/vgdb --pid=9966 ...command...
==9966== 
==9966== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9966==   /path/to/gdb ./zsh
==9966== and then give GDB the following command
==9966==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9966
==9966== --pid is optional if only one valgrind process is running
==9966== 
==9968== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9968-by-pythonnut-on-???
==9968== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9968-by-pythonnut-on-???
==9968== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9968-by-pythonnut-on-???
==9968== 
==9968== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9968== don't want to do, unless you know exactly what you're doing,
==9968== or are doing some strange experiment):
==9968==   /usr/lib/valgrind/../../bin/vgdb --pid=9968 ...command...
==9968== 
==9968== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9968==   /path/to/gdb ./zsh
==9968== and then give GDB the following command
==9968==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9968
==9968== --pid is optional if only one valgrind process is running
==9968== 
==9907== Searching for pointers to 68,947 not-freed blocks
--9907--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9907--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9907--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9907--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9907--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9907--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9907--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9907--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9907--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9907--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9907--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9907--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9907--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9907--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9907--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9907--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9907--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9907--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9907--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9907--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9907--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9907--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9907--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9907--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9966-- Caught __NR_exit; running __libc_freeres()
--9907--   Scanning root segment: 0x701a000..0x701afff (4096)
--9907--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9907--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9907--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9907--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9907--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9907--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9907--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9907--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9907--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9907--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFECD7C,  len 4
==9970== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9970-by-pythonnut-on-???
==9970== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9970-by-pythonnut-on-???
==9970== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9970-by-pythonnut-on-???
==9970== 
==9970== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9970== don't want to do, unless you know exactly what you're doing,
==9970== or are doing some strange experiment):
==9970==   /usr/lib/valgrind/../../bin/vgdb --pid=9970 ...command...
==9970== 
==9970== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9970==   /path/to/gdb ./zsh
==9970== and then give GDB the following command
==9970==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9970
==9970== --pid is optional if only one valgrind process is running
==9970== 
--9966-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9966== 
==9969== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9969-by-pythonnut-on-???
==9969== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9969-by-pythonnut-on-???
==9969== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9969-by-pythonnut-on-???
==9969== 
==9969== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9969== don't want to do, unless you know exactly what you're doing,
==9969== or are doing some strange experiment):
==9969==   /usr/lib/valgrind/../../bin/vgdb --pid=9969 ...command...
==9969== 
==9969== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9969==   /path/to/gdb ./zsh
==9969== and then give GDB the following command
==9969==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9969
==9969== --pid is optional if only one valgrind process is running
==9969== 
--9969-- Caught __NR_exit; running __libc_freeres()
==9966== HEAP SUMMARY:
==9966==     in use at exit: 3,113,175 bytes in 68,972 blocks
==9966==   total heap usage: 1,592,246 allocs, 1,523,274 frees, 128,498,996 bytes allocated
==9966== 
--9969-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9966== Searching for pointers to 68,972 not-freed blocks
--9966--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9966--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9966--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9966--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9966--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9966--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9966--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9966--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9966--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9966--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9966--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9966--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9966--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9966--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9966--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9966--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9966--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9966--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9966--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9966--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9966--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9966--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9966--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9966--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9966--   Scanning root segment: 0x701a000..0x701afff (4096)
--9966--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9966--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9966--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9966--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9966--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9966--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9966--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9966--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9966--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9966--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9969== 
==9969== HEAP SUMMARY:
==9969==     in use at exit: 3,120,378 bytes in 69,179 blocks
==9969==   total heap usage: 1,592,290 allocs, 1,523,111 frees, 128,599,239 bytes allocated
==9969== 
==9907== Checked 4,772,392 bytes
==9907== 
==9969== Searching for pointers to 69,179 not-freed blocks
--9969--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9969--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9969--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9969--   Scanning root segment: 0x4037000..0x403afff (16384)
--9969--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9969--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9969--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9969--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9969--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9969--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9969--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9969--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9969--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9969--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9969--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9969--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9969--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9969--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9969--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9969--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9969--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9969--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9969--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9969--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9969--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9969--   Scanning root segment: 0x701a000..0x701afff (4096)
--9969--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9969--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9969--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9969--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9969--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9969--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9969--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9969--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9969--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9969--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9907== LEAK SUMMARY:
==9907==    definitely lost: 2,189 bytes in 12 blocks
==9907==    indirectly lost: 6,756 bytes in 7 blocks
==9907==      possibly lost: 0 bytes in 0 blocks
==9907==    still reachable: 3,104,601 bytes in 68,928 blocks
==9907==         suppressed: 0 bytes in 0 blocks
==9907== Rerun with --leak-check=full to see details of leaked memory
==9907== 
==9907== Use --track-origins=yes to see where uninitialised values come from
==9907== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9907== 
==9907== 1 errors in context 1 of 2:
==9907== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9907==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9907==    by 0x488CD0: stringsubst (subst.c:301)
==9907==    by 0x48801B: prefork (subst.c:77)
==9907==    by 0x42B318: execcmd (exec.c:2619)
==9907==    by 0x428CA0: execpline2 (exec.c:1697)
==9907==    by 0x427FD2: execpline (exec.c:1484)
==9907==    by 0x427756: execlist (exec.c:1267)
==9907==    by 0x42717C: execode (exec.c:1073)
==9907==    by 0x431299: runshfunc (exec.c:5040)
==9907==    by 0x430E76: doshfunc (exec.c:4920)
==9907==    by 0x4302FB: execshfunc (exec.c:4557)
==9907==    by 0x42D8C1: execcmd (exec.c:3373)
==9907== 
==9907== 
==9907== 2 errors in context 2 of 2:
==9907== Conditional jump or move depends on uninitialised value(s)
==9907==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9907==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9907==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9907==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9907==    by 0x42D8E9: execcmd (exec.c:3378)
==9907==    by 0x428CA0: execpline2 (exec.c:1697)
==9907==    by 0x427FD2: execpline (exec.c:1484)
==9907==    by 0x42779A: execlist (exec.c:1275)
==9907==    by 0x42717C: execode (exec.c:1073)
==9907==    by 0x431299: runshfunc (exec.c:5040)
==9907==    by 0x430E76: doshfunc (exec.c:4920)
==9907==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9907== 
==9907== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9974-- Caught __NR_exit; running __libc_freeres()
==9974== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9974-by-pythonnut-on-???
==9974== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9974-by-pythonnut-on-???
==9974== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9974-by-pythonnut-on-???
==9974== 
==9974== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9974== don't want to do, unless you know exactly what you're doing,
==9974== or are doing some strange experiment):
==9974==   /usr/lib/valgrind/../../bin/vgdb --pid=9974 ...command...
==9974== 
==9974== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9974==   /path/to/gdb ./zsh
==9974== and then give GDB the following command
==9974==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9974
==9974== --pid is optional if only one valgrind process is running
==9974== 
==9966== Checked 4,767,040 bytes
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
==9966== 
--9974-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9974== 
==9966== LEAK SUMMARY:
==9966==    definitely lost: 2,189 bytes in 12 blocks
==9966==    indirectly lost: 6,756 bytes in 7 blocks
==9966==      possibly lost: 0 bytes in 0 blocks
==9966==    still reachable: 3,104,230 bytes in 68,953 blocks
==9966==         suppressed: 0 bytes in 0 blocks
==9966== Rerun with --leak-check=full to see details of leaked memory
==9966== 
==9966== Use --track-origins=yes to see where uninitialised values come from
==9966== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9966== 
==9966== 1 errors in context 1 of 2:
==9966== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9966==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9966==    by 0x488CD0: stringsubst (subst.c:301)
==9966==    by 0x48801B: prefork (subst.c:77)
==9966==    by 0x42B318: execcmd (exec.c:2619)
==9966==    by 0x428CA0: execpline2 (exec.c:1697)
==9966==    by 0x427FD2: execpline (exec.c:1484)
==9966==    by 0x427756: execlist (exec.c:1267)
==9966==    by 0x42717C: execode (exec.c:1073)
==9966==    by 0x431299: runshfunc (exec.c:5040)
==9966==    by 0x430E76: doshfunc (exec.c:4920)
==9966==    by 0x4302FB: execshfunc (exec.c:4557)
==9966==    by 0x42D8C1: execcmd (exec.c:3373)
==9966== 
==9966== 
==9966== 2 errors in context 2 of 2:
==9966== Conditional jump or move depends on uninitialised value(s)
==9966==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9966==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9966==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9966==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9966==    by 0x42D8E9: execcmd (exec.c:3378)
==9966==    by 0x428CA0: execpline2 (exec.c:1697)
==9966==    by 0x427FD2: execpline (exec.c:1484)
==9966==    by 0x42779A: execlist (exec.c:1275)
==9966==    by 0x42717C: execode (exec.c:1073)
==9966==    by 0x431299: runshfunc (exec.c:5040)
==9966==    by 0x430E76: doshfunc (exec.c:4920)
==9966==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9966== 
==9966== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9974== HEAP SUMMARY:
==9974==     in use at exit: 3,115,319 bytes in 69,009 blocks
==9974==   total heap usage: 1,592,246 allocs, 1,523,237 frees, 128,606,023 bytes allocated
==9974== 
==9969== Checked 4,799,448 bytes
==9969== 
--9976-- Caught __NR_exit; running __libc_freeres()
==9974== Searching for pointers to 69,009 not-freed blocks
--9974--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9974--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9976== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9976-by-pythonnut-on-???
--9974--   Scanning root segment: 0x4022000..0x4026fff (20480)
==9976== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9976-by-pythonnut-on-???
==9976== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9976-by-pythonnut-on-???
==9976== 
==9976== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9976== don't want to do, unless you know exactly what you're doing,
==9976== or are doing some strange experiment):
==9976==   /usr/lib/valgrind/../../bin/vgdb --pid=9976 ...command...
==9976== 
==9976== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9976==   /path/to/gdb ./zsh
==9976== and then give GDB the following command
==9976==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9976
==9976== --pid is optional if only one valgrind process is running
==9976== 
--9974--   Scanning root segment: 0x4037000..0x403afff (16384)
--9974--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9974--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9974--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9974--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9974--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9974--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9974--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9974--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9974--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9974--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9974--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9974--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9974--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9974--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9974--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9974--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9974--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==9969== LEAK SUMMARY:
==9969==    definitely lost: 2,189 bytes in 12 blocks
==9969==    indirectly lost: 6,756 bytes in 7 blocks
==9969==      possibly lost: 0 bytes in 0 blocks
==9969==    still reachable: 3,111,433 bytes in 69,160 blocks
==9969==         suppressed: 0 bytes in 0 blocks
==9969== Rerun with --leak-check=full to see details of leaked memory
==9969== 
==9969== Use --track-origins=yes to see where uninitialised values come from
==9969== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9969== 
==9969== 1 errors in context 1 of 2:
==9969== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9969==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9969==    by 0x488CD0: stringsubst (subst.c:301)
==9969==    by 0x48801B: prefork (subst.c:77)
==9969==    by 0x42B318: execcmd (exec.c:2619)
==9969==    by 0x428CA0: execpline2 (exec.c:1697)
==9969==    by 0x427FD2: execpline (exec.c:1484)
==9969==    by 0x427756: execlist (exec.c:1267)
==9969==    by 0x42717C: execode (exec.c:1073)
==9969==    by 0x431299: runshfunc (exec.c:5040)
==9969==    by 0x430E76: doshfunc (exec.c:4920)
==9969==    by 0x4302FB: execshfunc (exec.c:4557)
==9969==    by 0x42D8C1: execcmd (exec.c:3373)
==9969== 
==9969== 
==9969== 2 errors in context 2 of 2:
--9974--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==9969== Conditional jump or move depends on uninitialised value(s)
==9969==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9969==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9969==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9969==    by 0x40EFC2: execbuiltin (builtin.c:450)
--9974--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==9969==    by 0x42D8E9: execcmd (exec.c:3378)
==9969==    by 0x428CA0: execpline2 (exec.c:1697)
==9969==    by 0x427FD2: execpline (exec.c:1484)
==9969==    by 0x42779A: execlist (exec.c:1275)
--9974--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==9969==    by 0x42717C: execode (exec.c:1073)
==9969==    by 0x431299: runshfunc (exec.c:5040)
==9969==    by 0x430E76: doshfunc (exec.c:4920)
==9969==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9969== 
==9969== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9974--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9974--   Scanning root segment: 0x701a000..0x701afff (4096)
--9974--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9974--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9974--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9974--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9974--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9974--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9974--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9974--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9974--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9974--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9976-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9976== 
==9977== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9977-by-pythonnut-on-???
==9977== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9977-by-pythonnut-on-???
==9977== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9977-by-pythonnut-on-???
==9977== 
==9977== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9977== don't want to do, unless you know exactly what you're doing,
==9977== or are doing some strange experiment):
==9977==   /usr/lib/valgrind/../../bin/vgdb --pid=9977 ...command...
==9977== 
==9977== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9977==   /path/to/gdb ./zsh
==9977== and then give GDB the following command
==9977==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9977
==9977== --pid is optional if only one valgrind process is running
==9977== 
==9976== HEAP SUMMARY:
==9976==     in use at exit: 3,113,111 bytes in 68,972 blocks
==9976==   total heap usage: 1,592,226 allocs, 1,523,254 frees, 128,496,766 bytes allocated
==9976== 
==9978== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9978-by-pythonnut-on-???
==9978== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9978-by-pythonnut-on-???
==9978== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9978-by-pythonnut-on-???
==9978== 
==9978== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9978== don't want to do, unless you know exactly what you're doing,
==9978== or are doing some strange experiment):
==9978==   /usr/lib/valgrind/../../bin/vgdb --pid=9978 ...command...
==9978== 
==9978== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9978==   /path/to/gdb ./zsh
==9978== and then give GDB the following command
==9978==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9978
==9978== --pid is optional if only one valgrind process is running
==9978== 
==9976== Searching for pointers to 68,972 not-freed blocks
--9976--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9976--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9976--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9976--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9978-- Caught __NR_exit; running __libc_freeres()
--9976--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9976--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9976--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9976--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9976--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9976--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9976--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9976--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9976--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9976--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9976--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9976--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9976--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9976--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9976--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9976--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9976--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9976--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9976--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9976--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9976--   Scanning root segment: 0x701a000..0x701afff (4096)
--9976--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9976--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9976--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9976--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9976--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9976--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9976--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9976--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9976--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9976--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9978-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9978== 
==9978== HEAP SUMMARY:
==9978==     in use at exit: 3,193,757 bytes in 69,186 blocks
==9978==   total heap usage: 1,592,298 allocs, 1,523,112 frees, 128,675,770 bytes allocated
==9978== 
==9974== Checked 4,791,040 bytes
==9974== 
==9978== Searching for pointers to 69,186 not-freed blocks
--9978--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9978--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9978--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9978--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9978--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9978--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9978--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9978--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9978--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9978--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9978--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9978--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9978--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9978--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9978--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9978--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9978--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9978--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9978--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9978--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9978--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9978--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9978--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9978--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9978--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9978--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9978--   Scanning root segment: 0x701a000..0x701afff (4096)
--9978--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9978--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9978--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9978--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9978--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9978--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9978--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9978--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9978--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9978--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9974== LEAK SUMMARY:
==9974==    definitely lost: 2,189 bytes in 12 blocks
==9974==    indirectly lost: 6,756 bytes in 7 blocks
==9974==      possibly lost: 0 bytes in 0 blocks
==9974==    still reachable: 3,106,374 bytes in 68,990 blocks
==9974==         suppressed: 0 bytes in 0 blocks
==9974== Rerun with --leak-check=full to see details of leaked memory
==9974== 
==9974== Use --track-origins=yes to see where uninitialised values come from
==9974== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9974== 
==9974== 1 errors in context 1 of 2:
==9974== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9974==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9974==    by 0x488CD0: stringsubst (subst.c:301)
==9974==    by 0x48801B: prefork (subst.c:77)
==9974==    by 0x42B318: execcmd (exec.c:2619)
==9974==    by 0x428CA0: execpline2 (exec.c:1697)
==9974==    by 0x427FD2: execpline (exec.c:1484)
==9974==    by 0x427756: execlist (exec.c:1267)
==9974==    by 0x42717C: execode (exec.c:1073)
==9974==    by 0x431299: runshfunc (exec.c:5040)
==9974==    by 0x430E76: doshfunc (exec.c:4920)
==9974==    by 0x4302FB: execshfunc (exec.c:4557)
==9974==    by 0x42D8C1: execcmd (exec.c:3373)
==9974== 
==9974== 
==9974== 2 errors in context 2 of 2:
==9974== Conditional jump or move depends on uninitialised value(s)
==9974==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9974==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9974==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9974==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9974==    by 0x42D8E9: execcmd (exec.c:3378)
==9974==    by 0x428CA0: execpline2 (exec.c:1697)
==9974==    by 0x427FD2: execpline (exec.c:1484)
==9974==    by 0x42779A: execlist (exec.c:1275)
==9974==    by 0x42717C: execode (exec.c:1073)
==9974==    by 0x431299: runshfunc (exec.c:5040)
==9974==    by 0x430E76: doshfunc (exec.c:4920)
==9974==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9974== 
==9974== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9973-- Caught __NR_exit; running __libc_freeres()
==9973== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9973-by-pythonnut-on-???
==9973== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9973-by-pythonnut-on-???
==9973== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9973-by-pythonnut-on-???
==9973== 
==9973== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9973== don't want to do, unless you know exactly what you're doing,
==9973== or are doing some strange experiment):
==9973==   /usr/lib/valgrind/../../bin/vgdb --pid=9973 ...command...
==9973== 
==9973== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9973==   /path/to/gdb ./zsh
==9973== and then give GDB the following command
==9973==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9973
==9973== --pid is optional if only one valgrind process is running
==9973== 
==9976== Checked 4,766,968 bytes
==9976== 
--9973-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9976== LEAK SUMMARY:
==9976==    definitely lost: 2,189 bytes in 12 blocks
==9976==    indirectly lost: 6,756 bytes in 7 blocks
==9976==      possibly lost: 0 bytes in 0 blocks
==9976==    still reachable: 3,104,166 bytes in 68,953 blocks
==9976==         suppressed: 0 bytes in 0 blocks
==9976== Rerun with --leak-check=full to see details of leaked memory
==9976== 
==9976== Use --track-origins=yes to see where uninitialised values come from
==9976== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9976== 
==9976== 1 errors in context 1 of 2:
==9976== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9976==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9976==    by 0x488CD0: stringsubst (subst.c:301)
==9976==    by 0x48801B: prefork (subst.c:77)
==9976==    by 0x42B318: execcmd (exec.c:2619)
==9976==    by 0x428CA0: execpline2 (exec.c:1697)
==9976==    by 0x427FD2: execpline (exec.c:1484)
==9976==    by 0x427756: execlist (exec.c:1267)
==9976==    by 0x42717C: execode (exec.c:1073)
==9976==    by 0x431299: runshfunc (exec.c:5040)
==9976==    by 0x430E76: doshfunc (exec.c:4920)
==9976==    by 0x4302FB: execshfunc (exec.c:4557)
==9976==    by 0x42D8C1: execcmd (exec.c:3373)
==9976== 
==9976== 
==9976== 2 errors in context 2 of 2:
==9976== Conditional jump or move depends on uninitialised value(s)
==9976==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9976==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9976==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9976==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9976==    by 0x42D8E9: execcmd (exec.c:3378)
==9976==    by 0x428CA0: execpline2 (exec.c:1697)
==9976==    by 0x427FD2: execpline (exec.c:1484)
==9976==    by 0x42779A: execlist (exec.c:1275)
==9976==    by 0x42717C: execode (exec.c:1073)
==9976==    by 0x431299: runshfunc (exec.c:5040)
==9976==    by 0x430E76: doshfunc (exec.c:4920)
==9976==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9976== 
==9976== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9973== 
==9973== HEAP SUMMARY:
==9973==     in use at exit: 3,115,255 bytes in 69,006 blocks
==9973==   total heap usage: 1,592,248 allocs, 1,523,242 frees, 128,606,567 bytes allocated
==9973== 
==9973== Searching for pointers to 69,006 not-freed blocks
--9973--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9973--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9973--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9973--   Scanning root segment: 0x4037000..0x403afff (16384)
--9973--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9973--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9973--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9973--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9973--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9973--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9973--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9973--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9973--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9973--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9973--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9973--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9973--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9973--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9973--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9973--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9973--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9973--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9973--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9973--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9973--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9973--   Scanning root segment: 0x701a000..0x701afff (4096)
--9973--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9973--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9973--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9973--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9973--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9973--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9973--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9973--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9973--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9973--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9979== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9979-by-pythonnut-on-???
==9979== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9979-by-pythonnut-on-???
==9979== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9979-by-pythonnut-on-???
==9979== 
==9979== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9979== don't want to do, unless you know exactly what you're doing,
==9979== or are doing some strange experiment):
==9979==   /usr/lib/valgrind/../../bin/vgdb --pid=9979 ...command...
==9979== 
==9979== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9979==   /path/to/gdb ./zsh
==9979== and then give GDB the following command
==9979==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9979
==9979== --pid is optional if only one valgrind process is running
==9979== 
==9978== Checked 4,984,352 bytes
==9978== 
--9979-- Caught __NR_exit; running __libc_freeres()
==9978== LEAK SUMMARY:
==9978==    definitely lost: 2,189 bytes in 12 blocks
==9978==    indirectly lost: 6,756 bytes in 7 blocks
==9978==      possibly lost: 0 bytes in 0 blocks
==9978==    still reachable: 3,184,812 bytes in 69,167 blocks
==9978==         suppressed: 0 bytes in 0 blocks
==9978== Rerun with --leak-check=full to see details of leaked memory
==9978== 
==9978== Use --track-origins=yes to see where uninitialised values come from
==9978== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9978== 
==9978== 1 errors in context 1 of 2:
==9978== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9978==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9978==    by 0x488CD0: stringsubst (subst.c:301)
==9978==    by 0x48801B: prefork (subst.c:77)
==9978==    by 0x42B318: execcmd (exec.c:2619)
==9978==    by 0x428CA0: execpline2 (exec.c:1697)
==9978==    by 0x427FD2: execpline (exec.c:1484)
==9978==    by 0x427756: execlist (exec.c:1267)
==9978==    by 0x42717C: execode (exec.c:1073)
==9978==    by 0x431299: runshfunc (exec.c:5040)
==9978==    by 0x430E76: doshfunc (exec.c:4920)
==9978==    by 0x4302FB: execshfunc (exec.c:4557)
==9978==    by 0x42D8C1: execcmd (exec.c:3373)
==9978== 
==9978== 
==9978== 2 errors in context 2 of 2:
==9978== Conditional jump or move depends on uninitialised value(s)
==9978==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9978==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9978==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9978==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9978==    by 0x42D8E9: execcmd (exec.c:3378)
==9978==    by 0x428CA0: execpline2 (exec.c:1697)
==9978==    by 0x427FD2: execpline (exec.c:1484)
==9978==    by 0x42779A: execlist (exec.c:1275)
==9978==    by 0x42717C: execode (exec.c:1073)
==9978==    by 0x431299: runshfunc (exec.c:5040)
==9978==    by 0x430E76: doshfunc (exec.c:4920)
==9978==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9978== 
==9978== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9979-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9979== 
==9979== HEAP SUMMARY:
==9979==     in use at exit: 3,113,140 bytes in 68,973 blocks
==9979==   total heap usage: 1,592,239 allocs, 1,523,266 frees, 128,499,454 bytes allocated
==9979== 
==9979== Searching for pointers to 68,973 not-freed blocks
--9979--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9979--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9979--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9979--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9979--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9979--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9979--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9979--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9979--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9979--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9979--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9979--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9979--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9979--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9979--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9979--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9979--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9979--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9979--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9979--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9979--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9979--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9979--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9979--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9979--   Scanning root segment: 0x701a000..0x701afff (4096)
--9979--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9979--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9979--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9979--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9979--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9979--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9979--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9979--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9979--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9979--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9973== Checked 4,790,352 bytes
==9973== 
==9973== LEAK SUMMARY:
==9973==    definitely lost: 2,189 bytes in 12 blocks
==9973==    indirectly lost: 6,756 bytes in 7 blocks
==9973==      possibly lost: 0 bytes in 0 blocks
==9973==    still reachable: 3,106,310 bytes in 68,987 blocks
==9973==         suppressed: 0 bytes in 0 blocks
==9973== Rerun with --leak-check=full to see details of leaked memory
==9973== 
==9973== Use --track-origins=yes to see where uninitialised values come from
==9973== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9973== 
==9973== 1 errors in context 1 of 2:
==9973== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9973==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9973==    by 0x488CD0: stringsubst (subst.c:301)
==9973==    by 0x48801B: prefork (subst.c:77)
==9973==    by 0x42B318: execcmd (exec.c:2619)
==9973==    by 0x428CA0: execpline2 (exec.c:1697)
==9973==    by 0x427FD2: execpline (exec.c:1484)
==9973==    by 0x427756: execlist (exec.c:1267)
==9973==    by 0x42717C: execode (exec.c:1073)
==9973==    by 0x431299: runshfunc (exec.c:5040)
==9973==    by 0x430E76: doshfunc (exec.c:4920)
==9973==    by 0x4302FB: execshfunc (exec.c:4557)
==9973==    by 0x42D8C1: execcmd (exec.c:3373)
==9973== 
==9973== 
==9973== 2 errors in context 2 of 2:
==9973== Conditional jump or move depends on uninitialised value(s)
==9973==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9973==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9973==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9973==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9973==    by 0x42D8E9: execcmd (exec.c:3378)
==9973==    by 0x428CA0: execpline2 (exec.c:1697)
==9973==    by 0x427FD2: execpline (exec.c:1484)
==9973==    by 0x42779A: execlist (exec.c:1275)
==9973==    by 0x42717C: execode (exec.c:1073)
==9973==    by 0x431299: runshfunc (exec.c:5040)
==9973==    by 0x430E76: doshfunc (exec.c:4920)
==9973==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9973== 
==9973== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9980-by-pythonnut-on-???
==9980== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9980-by-pythonnut-on-???
==9980== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9980-by-pythonnut-on-???
==9980== 
==9980== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9980== don't want to do, unless you know exactly what you're doing,
==9980== or are doing some strange experiment):
==9980==   /usr/lib/valgrind/../../bin/vgdb --pid=9980 ...command...
==9980== 
==9980== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9980==   /path/to/gdb ./zsh
==9980== and then give GDB the following command
==9980==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9980
==9980== --pid is optional if only one valgrind process is running
==9980== 
--9980-- Caught __NR_exit; running __libc_freeres()
--9980-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9980== 
==9980== HEAP SUMMARY:
==9980==     in use at exit: 3,115,259 bytes in 69,006 blocks
==9980==   total heap usage: 1,592,264 allocs, 1,523,258 frees, 128,611,563 bytes allocated
==9980== 
==9979== Checked 4,766,480 bytes
==9979== 
==9979== LEAK SUMMARY:
==9979==    definitely lost: 2,189 bytes in 12 blocks
==9979==    indirectly lost: 6,756 bytes in 7 blocks
==9979==      possibly lost: 0 bytes in 0 blocks
==9979==    still reachable: 3,104,195 bytes in 68,954 blocks
==9979==         suppressed: 0 bytes in 0 blocks
==9979== Rerun with --leak-check=full to see details of leaked memory
==9979== 
==9979== Use --track-origins=yes to see where uninitialised values come from
==9979== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9979== 
==9979== 1 errors in context 1 of 2:
==9979== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9979==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9979==    by 0x488CD0: stringsubst (subst.c:301)
==9979==    by 0x48801B: prefork (subst.c:77)
==9979==    by 0x42B318: execcmd (exec.c:2619)
==9979==    by 0x428CA0: execpline2 (exec.c:1697)
==9979==    by 0x427FD2: execpline (exec.c:1484)
==9979==    by 0x427756: execlist (exec.c:1267)
==9979==    by 0x42717C: execode (exec.c:1073)
==9979==    by 0x431299: runshfunc (exec.c:5040)
==9979==    by 0x430E76: doshfunc (exec.c:4920)
==9979==    by 0x4302FB: execshfunc (exec.c:4557)
==9979==    by 0x42D8C1: execcmd (exec.c:3373)
==9979== 
==9979== 
==9979== 2 errors in context 2 of 2:
==9979== Conditional jump or move depends on uninitialised value(s)
==9979==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9979==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9979==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9979==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9979==    by 0x42D8E9: execcmd (exec.c:3378)
==9979==    by 0x428CA0: execpline2 (exec.c:1697)
==9979==    by 0x427FD2: execpline (exec.c:1484)
==9979==    by 0x42779A: execlist (exec.c:1275)
==9979==    by 0x42717C: execode (exec.c:1073)
==9979==    by 0x431299: runshfunc (exec.c:5040)
==9979==    by 0x430E76: doshfunc (exec.c:4920)
==9979==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9979== 
==9979== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== Searching for pointers to 69,006 not-freed blocks
--9980--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9980--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9980--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9980--   Scanning root segment: 0x4037000..0x403afff (16384)
--9980--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9980--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9980--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9980--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9980--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9980--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9980--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9980--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9980--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9980--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9980--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9980--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9980--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9980--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9980--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9980--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9980--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9980--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9980--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9980--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9980--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9980--   Scanning root segment: 0x701a000..0x701afff (4096)
--9980--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9980--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9980--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9980--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9980--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9980--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9980--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9980--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9980--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9980--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9981== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9981-by-pythonnut-on-???
==9981== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9981-by-pythonnut-on-???
==9981== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9981-by-pythonnut-on-???
==9981== 
==9981== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9981== don't want to do, unless you know exactly what you're doing,
==9981== or are doing some strange experiment):
==9981==   /usr/lib/valgrind/../../bin/vgdb --pid=9981 ...command...
==9981== 
==9981== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9981==   /path/to/gdb ./zsh
==9981== and then give GDB the following command
==9981==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9981
==9981== --pid is optional if only one valgrind process is running
==9981== 
--9981-- Caught __NR_exit; running __libc_freeres()
--9981-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9981== 
==9981== HEAP SUMMARY:
==9981==     in use at exit: 3,111,651 bytes in 68,913 blocks
==9981==   total heap usage: 1,592,209 allocs, 1,523,296 frees, 128,502,445 bytes allocated
==9981== 
==9980== Checked 4,790,360 bytes
==9980== 
==9981== Searching for pointers to 68,913 not-freed blocks
--9981--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9981--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9981--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9981--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9981--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9981--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9981--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9981--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9981--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9981--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9981--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9981--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9981--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9981--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9981--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9981--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9981--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9981--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9981--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9981--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9981--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9981--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9981--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9981--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9981--   Scanning root segment: 0x701a000..0x701afff (4096)
--9981--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9981--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9981--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9981--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9981--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9981--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9981--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9981--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9981--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9981--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9980== LEAK SUMMARY:
==9980==    definitely lost: 2,189 bytes in 12 blocks
==9980==    indirectly lost: 6,756 bytes in 7 blocks
==9980==      possibly lost: 0 bytes in 0 blocks
==9980==    still reachable: 3,106,314 bytes in 68,987 blocks
==9980==         suppressed: 0 bytes in 0 blocks
==9980== Rerun with --leak-check=full to see details of leaked memory
==9980== 
==9980== Use --track-origins=yes to see where uninitialised values come from
==9980== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9980== 
==9980== 1 errors in context 1 of 2:
==9980== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9980==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9980==    by 0x488CD0: stringsubst (subst.c:301)
==9980==    by 0x48801B: prefork (subst.c:77)
==9980==    by 0x42B318: execcmd (exec.c:2619)
==9980==    by 0x428CA0: execpline2 (exec.c:1697)
==9980==    by 0x427FD2: execpline (exec.c:1484)
==9980==    by 0x427756: execlist (exec.c:1267)
==9980==    by 0x42717C: execode (exec.c:1073)
==9980==    by 0x431299: runshfunc (exec.c:5040)
==9980==    by 0x430E76: doshfunc (exec.c:4920)
==9980==    by 0x4302FB: execshfunc (exec.c:4557)
==9980==    by 0x42D8C1: execcmd (exec.c:3373)
==9980== 
==9980== 
==9980== 2 errors in context 2 of 2:
==9980== Conditional jump or move depends on uninitialised value(s)
==9980==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9980==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9980==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9980==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9980==    by 0x42D8E9: execcmd (exec.c:3378)
==9980==    by 0x428CA0: execpline2 (exec.c:1697)
==9980==    by 0x427FD2: execpline (exec.c:1484)
==9980==    by 0x42779A: execlist (exec.c:1275)
==9980==    by 0x42717C: execode (exec.c:1073)
==9980==    by 0x431299: runshfunc (exec.c:5040)
==9980==    by 0x430E76: doshfunc (exec.c:4920)
==9980==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9980== 
==9980== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9982== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9982-by-pythonnut-on-???
==9982== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9982-by-pythonnut-on-???
==9982== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9982-by-pythonnut-on-???
==9982== 
==9982== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9982== don't want to do, unless you know exactly what you're doing,
==9982== or are doing some strange experiment):
==9982==   /usr/lib/valgrind/../../bin/vgdb --pid=9982 ...command...
==9982== 
==9982== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9982==   /path/to/gdb ./zsh
==9982== and then give GDB the following command
==9982==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9982
==9982== --pid is optional if only one valgrind process is running
==9982== 
--9982-- Caught __NR_exit; running __libc_freeres()
--9982-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9982== 
==9982== HEAP SUMMARY:
==9982==     in use at exit: 3,115,258 bytes in 69,006 blocks
==9982==   total heap usage: 1,592,269 allocs, 1,523,263 frees, 128,613,676 bytes allocated
==9982== 
--9977-- Caught __NR_exit; running __libc_freeres()
==9982== Searching for pointers to 69,006 not-freed blocks
--9982--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9982--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9982--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9982--   Scanning root segment: 0x4037000..0x403afff (16384)
--9982--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9982--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9982--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9982--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9982--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9982--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9982--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9982--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9982--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9982--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9982--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9982--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9982--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9982--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9982--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9982--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9982--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9982--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9982--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9982--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9982--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9982--   Scanning root segment: 0x701a000..0x701afff (4096)
--9982--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9982--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9982--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9982--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9982--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9982--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9982--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9982--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9982--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9982--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9981== Checked 4,765,936 bytes
==9981== 
--9977-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9977== 
==9977== HEAP SUMMARY:
==9977==     in use at exit: 3,157,330 bytes in 69,186 blocks
==9977==   total heap usage: 1,596,016 allocs, 1,526,830 frees, 129,903,927 bytes allocated
==9977== 
==9981== LEAK SUMMARY:
==9981==    definitely lost: 2,189 bytes in 12 blocks
==9981==    indirectly lost: 6,756 bytes in 7 blocks
==9981==      possibly lost: 0 bytes in 0 blocks
==9981==    still reachable: 3,102,706 bytes in 68,894 blocks
==9981==         suppressed: 0 bytes in 0 blocks
==9981== Rerun with --leak-check=full to see details of leaked memory
==9981== 
==9981== Use --track-origins=yes to see where uninitialised values come from
==9981== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9981== 
==9981== 1 errors in context 1 of 2:
==9981== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9981==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9981==    by 0x488CD0: stringsubst (subst.c:301)
==9981==    by 0x48801B: prefork (subst.c:77)
==9981==    by 0x42B318: execcmd (exec.c:2619)
==9981==    by 0x428CA0: execpline2 (exec.c:1697)
==9981==    by 0x427FD2: execpline (exec.c:1484)
==9981==    by 0x427756: execlist (exec.c:1267)
==9981==    by 0x42717C: execode (exec.c:1073)
==9981==    by 0x431299: runshfunc (exec.c:5040)
==9981==    by 0x430E76: doshfunc (exec.c:4920)
==9981==    by 0x4302FB: execshfunc (exec.c:4557)
==9981==    by 0x42D8C1: execcmd (exec.c:3373)
==9981== 
==9981== 
==9981== 2 errors in context 2 of 2:
==9981== Conditional jump or move depends on uninitialised value(s)
==9981==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9981==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9981==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9981==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9981==    by 0x42D8E9: execcmd (exec.c:3378)
==9981==    by 0x428CA0: execpline2 (exec.c:1697)
==9981==    by 0x427FD2: execpline (exec.c:1484)
==9981==    by 0x42779A: execlist (exec.c:1275)
==9981==    by 0x42717C: execode (exec.c:1073)
==9981==    by 0x431299: runshfunc (exec.c:5040)
==9981==    by 0x430E76: doshfunc (exec.c:4920)
==9981==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9981== 
==9981== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9977== Searching for pointers to 69,186 not-freed blocks
--9977--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9977--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9977--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9977--   Scanning root segment: 0x4037000..0x4043fff (53248)
--9977--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9977--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--9977--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9977--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9977--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9977--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9977--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9977--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9977--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9977--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9977--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9977--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9977--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9977--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9977--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9977--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9977--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9977--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9977--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9977--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9977--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9977--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9977--   Scanning root segment: 0x701a000..0x701afff (4096)
--9977--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9977--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9977--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9977--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9977--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9977--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9977--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9977--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9977--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9977--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9984-- Caught __NR_exit; running __libc_freeres()
==9984== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9984-by-pythonnut-on-???
==9984== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9984-by-pythonnut-on-???
==9984== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9984-by-pythonnut-on-???
==9984== 
==9984== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9984== don't want to do, unless you know exactly what you're doing,
==9984== or are doing some strange experiment):
==9984==   /usr/lib/valgrind/../../bin/vgdb --pid=9984 ...command...
==9984== 
==9984== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9984==   /path/to/gdb ./zsh
==9984== and then give GDB the following command
==9984==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9984
==9984== --pid is optional if only one valgrind process is running
==9984== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==9982== Checked 4,790,360 bytes
==9982== 
--9984-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9982== LEAK SUMMARY:
==9982==    definitely lost: 2,189 bytes in 12 blocks
==9982==    indirectly lost: 6,756 bytes in 7 blocks
==9982==      possibly lost: 0 bytes in 0 blocks
==9982==    still reachable: 3,106,313 bytes in 68,987 blocks
==9982==         suppressed: 0 bytes in 0 blocks
==9982== Rerun with --leak-check=full to see details of leaked memory
==9982== 
==9982== Use --track-origins=yes to see where uninitialised values come from
==9982== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9982== 
==9982== 1 errors in context 1 of 2:
==9982== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9982==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9982==    by 0x488CD0: stringsubst (subst.c:301)
==9982==    by 0x48801B: prefork (subst.c:77)
==9982==    by 0x42B318: execcmd (exec.c:2619)
==9982==    by 0x428CA0: execpline2 (exec.c:1697)
==9982==    by 0x427FD2: execpline (exec.c:1484)
==9982==    by 0x427756: execlist (exec.c:1267)
==9982==    by 0x42717C: execode (exec.c:1073)
==9982==    by 0x431299: runshfunc (exec.c:5040)
==9982==    by 0x430E76: doshfunc (exec.c:4920)
==9982==    by 0x4302FB: execshfunc (exec.c:4557)
==9982==    by 0x42D8C1: execcmd (exec.c:3373)
==9982== 
==9982== 
==9982== 2 errors in context 2 of 2:
==9982== Conditional jump or move depends on uninitialised value(s)
==9982==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9982==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9982==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9982==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9982==    by 0x42D8E9: execcmd (exec.c:3378)
==9982==    by 0x428CA0: execpline2 (exec.c:1697)
==9982==    by 0x427FD2: execpline (exec.c:1484)
==9982==    by 0x42779A: execlist (exec.c:1275)
==9982==    by 0x42717C: execode (exec.c:1073)
==9982==    by 0x431299: runshfunc (exec.c:5040)
==9982==    by 0x430E76: doshfunc (exec.c:4920)
==9982==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9982== 
==9982== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9984== 
==9984== HEAP SUMMARY:
==9984==     in use at exit: 3,123,883 bytes in 69,153 blocks
==9984==   total heap usage: 1,592,581 allocs, 1,523,428 frees, 128,531,730 bytes allocated
==9984== 
==9986== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9986-by-pythonnut-on-???
==9986== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9986-by-pythonnut-on-???
==9986== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9986-by-pythonnut-on-???
==9986== 
==9986== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9986== don't want to do, unless you know exactly what you're doing,
==9986== or are doing some strange experiment):
==9986==   /usr/lib/valgrind/../../bin/vgdb --pid=9986 ...command...
==9986== 
==9986== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9986==   /path/to/gdb ./zsh
==9986== and then give GDB the following command
==9986==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9986
==9986== --pid is optional if only one valgrind process is running
==9986== 
--9986-- Caught __NR_exit; running __libc_freeres()
==9977== Checked 4,947,240 bytes
==9977== 
==9984== Searching for pointers to 69,153 not-freed blocks
--9984--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9984--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9984--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9984--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9984--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9984--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9984--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9984--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9984--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9984--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9984--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9984--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9984--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9984--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9984--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9984--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9984--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9984--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9984--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9984--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9984--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9984--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9984--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9984--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9984--   Scanning root segment: 0x701a000..0x701afff (4096)
--9984--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9984--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9984--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9984--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9984--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9984--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9984--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9984--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9984--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9984--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--9986-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9986== 
==9986== HEAP SUMMARY:
==9986==     in use at exit: 3,115,257 bytes in 69,006 blocks
==9986==   total heap usage: 1,592,274 allocs, 1,523,268 frees, 128,615,789 bytes allocated
==9986== 
==9977== LEAK SUMMARY:
==9977==    definitely lost: 2,189 bytes in 12 blocks
==9977==    indirectly lost: 6,756 bytes in 7 blocks
==9977==      possibly lost: 0 bytes in 0 blocks
==9977==    still reachable: 3,148,385 bytes in 69,167 blocks
==9977==         suppressed: 0 bytes in 0 blocks
==9977== Rerun with --leak-check=full to see details of leaked memory
==9977== 
==9977== Use --track-origins=yes to see where uninitialised values come from
==9977== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9977== 
==9977== 1 errors in context 1 of 2:
==9977== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9977==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9977==    by 0x488CD0: stringsubst (subst.c:301)
==9977==    by 0x48801B: prefork (subst.c:77)
==9977==    by 0x42B318: execcmd (exec.c:2619)
==9977==    by 0x428CA0: execpline2 (exec.c:1697)
==9977==    by 0x427FD2: execpline (exec.c:1484)
==9977==    by 0x427756: execlist (exec.c:1267)
==9977==    by 0x42717C: execode (exec.c:1073)
==9977==    by 0x431299: runshfunc (exec.c:5040)
==9977==    by 0x430E76: doshfunc (exec.c:4920)
==9977==    by 0x4302FB: execshfunc (exec.c:4557)
==9977==    by 0x42D8C1: execcmd (exec.c:3373)
==9977== 
==9977== 
==9977== 2 errors in context 2 of 2:
==9977== Conditional jump or move depends on uninitialised value(s)
==9977==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9977==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9977==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9977==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9977==    by 0x42D8E9: execcmd (exec.c:3378)
==9977==    by 0x428CA0: execpline2 (exec.c:1697)
==9977==    by 0x427FD2: execpline (exec.c:1484)
==9977==    by 0x42779A: execlist (exec.c:1275)
==9977==    by 0x42717C: execode (exec.c:1073)
==9977==    by 0x431299: runshfunc (exec.c:5040)
==9977==    by 0x430E76: doshfunc (exec.c:4920)
==9977==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9977== 
==9977== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== Searching for pointers to 69,006 not-freed blocks
--9986--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9986--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9986--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9986--   Scanning root segment: 0x4037000..0x403afff (16384)
--9986--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9986--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9986--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9986--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9986--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9986--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9986--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9986--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9986--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9986--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9986--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9986--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9986--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9986--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9986--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9986--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9986--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9986--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9986--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9986--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9986--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9986--   Scanning root segment: 0x701a000..0x701afff (4096)
--9986--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9986--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9986--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9986--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9986--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9986--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9986--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9986--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9986--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9986--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9989-by-pythonnut-on-???
==9989== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9989-by-pythonnut-on-???
==9989== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9989-by-pythonnut-on-???
==9989== 
==9989== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9989== don't want to do, unless you know exactly what you're doing,
==9989== or are doing some strange experiment):
==9989==   /usr/lib/valgrind/../../bin/vgdb --pid=9989 ...command...
==9989== 
==9989== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9989==   /path/to/gdb ./zsh
==9989== and then give GDB the following command
==9989==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9989
==9989== --pid is optional if only one valgrind process is running
==9989== 
--9989-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEDFFC,  len 4
--9990-- Caught __NR_exit; running __libc_freeres()
--9989-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9990== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9990-by-pythonnut-on-???
==9990== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9990-by-pythonnut-on-???
==9990== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9990-by-pythonnut-on-???
==9990== 
==9990== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9990== don't want to do, unless you know exactly what you're doing,
==9990== or are doing some strange experiment):
==9990==   /usr/lib/valgrind/../../bin/vgdb --pid=9990 ...command...
==9990== 
==9990== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9990==   /path/to/gdb ./zsh
==9990== and then give GDB the following command
==9990==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9990
==9990== --pid is optional if only one valgrind process is running
==9990== 
==9989== 
==9989== HEAP SUMMARY:
==9989==     in use at exit: 3,163,544 bytes in 69,186 blocks
==9989==   total heap usage: 1,592,303 allocs, 1,523,117 frees, 128,684,264 bytes allocated
==9989== 
--9990-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9990== 
==9984== Checked 4,785,176 bytes
==9984== 
==9990== HEAP SUMMARY:
==9990==     in use at exit: 3,142,072 bytes in 69,186 blocks
==9990==   total heap usage: 1,592,309 allocs, 1,523,123 frees, 128,686,384 bytes allocated
==9990== 
==9989== Searching for pointers to 69,186 not-freed blocks
--9989--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9989--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9989--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9989--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9989--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9989--   Scanning root segment: 0x41d6000..0x4204fff (192512)
--9989--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9989--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9989--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9989--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9989--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9989--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9989--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9989--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9989--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9989--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9989--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9989--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9989--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9989--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9989--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9989--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9989--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9989--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9989--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9989--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9989--   Scanning root segment: 0x701a000..0x701afff (4096)
--9989--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9989--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9989--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9989--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9989--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9989--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9989--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9989--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9989--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9989--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9984== LEAK SUMMARY:
==9984==    definitely lost: 2,189 bytes in 12 blocks
==9984==    indirectly lost: 6,756 bytes in 7 blocks
==9984==      possibly lost: 0 bytes in 0 blocks
==9984==    still reachable: 3,114,938 bytes in 69,134 blocks
==9984==         suppressed: 0 bytes in 0 blocks
==9984== Rerun with --leak-check=full to see details of leaked memory
==9984== 
==9984== Use --track-origins=yes to see where uninitialised values come from
==9984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9984== 
==9984== 1 errors in context 1 of 2:
==9984== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9984==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9984==    by 0x488CD0: stringsubst (subst.c:301)
==9984==    by 0x48801B: prefork (subst.c:77)
==9984==    by 0x42B318: execcmd (exec.c:2619)
==9984==    by 0x428CA0: execpline2 (exec.c:1697)
==9984==    by 0x427FD2: execpline (exec.c:1484)
==9984==    by 0x427756: execlist (exec.c:1267)
==9984==    by 0x42717C: execode (exec.c:1073)
==9984==    by 0x431299: runshfunc (exec.c:5040)
==9984==    by 0x430E76: doshfunc (exec.c:4920)
==9984==    by 0x4302FB: execshfunc (exec.c:4557)
==9984==    by 0x42D8C1: execcmd (exec.c:3373)
==9984== 
==9984== 
==9984== 2 errors in context 2 of 2:
==9984== Conditional jump or move depends on uninitialised value(s)
==9984==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9984==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9984==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9984==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9984==    by 0x42D8E9: execcmd (exec.c:3378)
==9984==    by 0x428CA0: execpline2 (exec.c:1697)
==9984==    by 0x427FD2: execpline (exec.c:1484)
==9984==    by 0x42779A: execlist (exec.c:1275)
==9984==    by 0x42717C: execode (exec.c:1073)
==9984==    by 0x431299: runshfunc (exec.c:5040)
==9984==    by 0x430E76: doshfunc (exec.c:4920)
==9984==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9984== 
==9984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== Checked 4,790,360 bytes
==9986== 
--9983-- Caught __NR_exit; running __libc_freeres()
==9990== Searching for pointers to 69,186 not-freed blocks
--9990--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9990--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9990--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9990--   Scanning root segment: 0x4037000..0x4047fff (69632)
--9990--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9990--   Scanning root segment: 0x41d6000..0x4204fff (192512)
==9983== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9983-by-pythonnut-on-???
==9983== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9983-by-pythonnut-on-???
==9983== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9983-by-pythonnut-on-???
==9983== 
==9983== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9983== don't want to do, unless you know exactly what you're doing,
==9983== or are doing some strange experiment):
==9983==   /usr/lib/valgrind/../../bin/vgdb --pid=9983 ...command...
==9983== 
==9983== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9983==   /path/to/gdb ./zsh
==9983== and then give GDB the following command
==9983==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9983
==9983== --pid is optional if only one valgrind process is running
==9983== 
--9990--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9990--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9990--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9990--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9990--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9990--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9990--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9990--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9990--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9990--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9990--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9990--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9990--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9990--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9990--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9990--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9990--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9990--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9990--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9990--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9990--   Scanning root segment: 0x701a000..0x701afff (4096)
--9990--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9990--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9990--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9990--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9990--   Scanning root segment: 0xb268000..0xb268fff (4096)
==9986== LEAK SUMMARY:
==9986==    definitely lost: 2,189 bytes in 12 blocks
--9990--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==9986==    indirectly lost: 6,756 bytes in 7 blocks
==9986==      possibly lost: 0 bytes in 0 blocks
==9986==    still reachable: 3,106,312 bytes in 68,987 blocks
==9986==         suppressed: 0 bytes in 0 blocks
==9986== Rerun with --leak-check=full to see details of leaked memory
==9986== 
--9990--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9990--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
==9986== Use --track-origins=yes to see where uninitialised values come from
==9986== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9986== 
==9986== 1 errors in context 1 of 2:
==9986== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--9990--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
==9986==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9986==    by 0x488CD0: stringsubst (subst.c:301)
==9986==    by 0x48801B: prefork (subst.c:77)
==9986==    by 0x42B318: execcmd (exec.c:2619)
--9990--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9986==    by 0x428CA0: execpline2 (exec.c:1697)
==9986==    by 0x427FD2: execpline (exec.c:1484)
==9986==    by 0x427756: execlist (exec.c:1267)
==9986==    by 0x42717C: execode (exec.c:1073)
==9986==    by 0x431299: runshfunc (exec.c:5040)
==9986==    by 0x430E76: doshfunc (exec.c:4920)
==9986==    by 0x4302FB: execshfunc (exec.c:4557)
==9986==    by 0x42D8C1: execcmd (exec.c:3373)
==9986== 
==9986== 
==9986== 2 errors in context 2 of 2:
==9986== Conditional jump or move depends on uninitialised value(s)
==9986==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9986==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9986==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9986==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9986==    by 0x42D8E9: execcmd (exec.c:3378)
==9986==    by 0x428CA0: execpline2 (exec.c:1697)
==9986==    by 0x427FD2: execpline (exec.c:1484)
==9986==    by 0x42779A: execlist (exec.c:1275)
==9986==    by 0x42717C: execode (exec.c:1073)
==9986==    by 0x431299: runshfunc (exec.c:5040)
==9986==    by 0x430E76: doshfunc (exec.c:4920)
==9986==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9986== 
==9986== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9983-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9992== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9992-by-pythonnut-on-???
==9992== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9992-by-pythonnut-on-???
==9992== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9992-by-pythonnut-on-???
==9992== 
==9992== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9992== don't want to do, unless you know exactly what you're doing,
==9992== or are doing some strange experiment):
==9992==   /usr/lib/valgrind/../../bin/vgdb --pid=9992 ...command...
==9992== 
==9992== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9992==   /path/to/gdb ./zsh
==9992== and then give GDB the following command
==9992==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9992
==9992== --pid is optional if only one valgrind process is running
==9992== 
--9992-- Caught __NR_exit; running __libc_freeres()
==9983== 
==9983== HEAP SUMMARY:
==9983==     in use at exit: 3,123,819 bytes in 69,150 blocks
==9983==   total heap usage: 1,592,579 allocs, 1,523,429 frees, 128,531,489 bytes allocated
==9983== 
--9992-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9992== 
==9992== HEAP SUMMARY:
==9992==     in use at exit: 3,115,256 bytes in 69,006 blocks
==9992==   total heap usage: 1,592,279 allocs, 1,523,273 frees, 128,617,902 bytes allocated
==9992== 
==9983== Searching for pointers to 69,150 not-freed blocks
--9983--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9983--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9983--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9983--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9983--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9983--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9983--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9983--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9983--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9983--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9983--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9983--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9983--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9983--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9983--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9983--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9983--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9983--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9983--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9983--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9983--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9983--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9983--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9983--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9983--   Scanning root segment: 0x701a000..0x701afff (4096)
--9983--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9983--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9983--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9983--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9983--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9983--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9983--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9983--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9983--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9983--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== Checked 5,088,288 bytes
==9989== 
==9992== Searching for pointers to 69,006 not-freed blocks
--9992--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9992--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9992--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9992--   Scanning root segment: 0x4037000..0x403afff (16384)
--9992--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9992--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9992--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9992--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9992--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9992--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9992--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9992--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9992--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9992--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9992--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9992--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9992--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9992--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9992--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9992--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9992--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9992--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9992--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9992--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9992--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9992--   Scanning root segment: 0x701a000..0x701afff (4096)
--9992--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9992--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9992--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9992--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9992--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9992--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9992--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9992--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9992--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9992--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9989== LEAK SUMMARY:
==9989==    definitely lost: 2,189 bytes in 12 blocks
==9989==    indirectly lost: 6,756 bytes in 7 blocks
==9989==      possibly lost: 0 bytes in 0 blocks
==9989==    still reachable: 3,154,599 bytes in 69,167 blocks
==9989==         suppressed: 0 bytes in 0 blocks
==9989== Rerun with --leak-check=full to see details of leaked memory
==9989== 
==9989== Use --track-origins=yes to see where uninitialised values come from
==9989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9989== 
==9989== 1 errors in context 1 of 2:
==9989== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9989==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9989==    by 0x488CD0: stringsubst (subst.c:301)
==9989==    by 0x48801B: prefork (subst.c:77)
==9989==    by 0x42B318: execcmd (exec.c:2619)
==9989==    by 0x428CA0: execpline2 (exec.c:1697)
==9989==    by 0x427FD2: execpline (exec.c:1484)
==9989==    by 0x427756: execlist (exec.c:1267)
==9989==    by 0x42717C: execode (exec.c:1073)
==9989==    by 0x431299: runshfunc (exec.c:5040)
==9989==    by 0x430E76: doshfunc (exec.c:4920)
==9989==    by 0x4302FB: execshfunc (exec.c:4557)
==9989==    by 0x42D8C1: execcmd (exec.c:3373)
==9989== 
==9989== 
==9989== 2 errors in context 2 of 2:
==9989== Conditional jump or move depends on uninitialised value(s)
==9989==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9989==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9989==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9989==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9989==    by 0x42D8E9: execcmd (exec.c:3378)
==9989==    by 0x428CA0: execpline2 (exec.c:1697)
==9989==    by 0x427FD2: execpline (exec.c:1484)
==9989==    by 0x42779A: execlist (exec.c:1275)
==9989==    by 0x42717C: execode (exec.c:1073)
==9989==    by 0x431299: runshfunc (exec.c:5040)
==9989==    by 0x430E76: doshfunc (exec.c:4920)
==9989==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9989== 
==9989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9990== Checked 5,066,936 bytes
==9990== 
==9990== LEAK SUMMARY:
==9990==    definitely lost: 2,213 bytes in 13 blocks
==9990==    indirectly lost: 6,796 bytes in 9 blocks
==9990==      possibly lost: 0 bytes in 0 blocks
==9990==    still reachable: 3,133,063 bytes in 69,164 blocks
==9990==         suppressed: 0 bytes in 0 blocks
==9990== Rerun with --leak-check=full to see details of leaked memory
==9990== 
==9990== Use --track-origins=yes to see where uninitialised values come from
==9990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9990== 
==9990== 1 errors in context 1 of 2:
==9990== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9990==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9990==    by 0x488CD0: stringsubst (subst.c:301)
==9990==    by 0x48801B: prefork (subst.c:77)
==9990==    by 0x42B318: execcmd (exec.c:2619)
==9990==    by 0x428CA0: execpline2 (exec.c:1697)
==9990==    by 0x427FD2: execpline (exec.c:1484)
==9990==    by 0x427756: execlist (exec.c:1267)
==9990==    by 0x42717C: execode (exec.c:1073)
==9990==    by 0x431299: runshfunc (exec.c:5040)
==9990==    by 0x430E76: doshfunc (exec.c:4920)
==9990==    by 0x4302FB: execshfunc (exec.c:4557)
==9990==    by 0x42D8C1: execcmd (exec.c:3373)
==9990== 
==9990== 
==9990== 2 errors in context 2 of 2:
==9990== Conditional jump or move depends on uninitialised value(s)
==9990==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9990==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9990==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9990==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9990==    by 0x42D8E9: execcmd (exec.c:3378)
==9990==    by 0x428CA0: execpline2 (exec.c:1697)
==9990==    by 0x427FD2: execpline (exec.c:1484)
==9990==    by 0x42779A: execlist (exec.c:1275)
==9990==    by 0x42717C: execode (exec.c:1073)
==9990==    by 0x431299: runshfunc (exec.c:5040)
==9990==    by 0x430E76: doshfunc (exec.c:4920)
==9990==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9990== 
==9990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9993== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9993-by-pythonnut-on-???
==9993== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9993-by-pythonnut-on-???
==9993== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9993-by-pythonnut-on-???
==9993== 
==9993== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9993== don't want to do, unless you know exactly what you're doing,
==9993== or are doing some strange experiment):
==9993==   /usr/lib/valgrind/../../bin/vgdb --pid=9993 ...command...
==9993== 
==9993== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9993==   /path/to/gdb ./zsh
==9993== and then give GDB the following command
==9993==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9993
==9993== --pid is optional if only one valgrind process is running
==9993== 
client request: code 4d430005,  addr 0xFFEFEE97C,  len 4
--9968-- Caught __NR_exit; running __libc_freeres()
==9983== Checked 4,784,488 bytes
==9983== 
==9992== Checked 4,790,360 bytes
==9992== 
--9968-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9983== LEAK SUMMARY:
==9983==    definitely lost: 2,189 bytes in 12 blocks
==9983==    indirectly lost: 6,756 bytes in 7 blocks
==9983==      possibly lost: 0 bytes in 0 blocks
==9983==    still reachable: 3,114,874 bytes in 69,131 blocks
==9983==         suppressed: 0 bytes in 0 blocks
==9983== Rerun with --leak-check=full to see details of leaked memory
==9983== 
==9983== Use --track-origins=yes to see where uninitialised values come from
==9983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9983== 
==9983== 1 errors in context 1 of 2:
==9983== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9983==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9983==    by 0x488CD0: stringsubst (subst.c:301)
==9983==    by 0x48801B: prefork (subst.c:77)
==9983==    by 0x42B318: execcmd (exec.c:2619)
==9983==    by 0x428CA0: execpline2 (exec.c:1697)
==9983==    by 0x427FD2: execpline (exec.c:1484)
==9983==    by 0x427756: execlist (exec.c:1267)
==9983==    by 0x42717C: execode (exec.c:1073)
==9983==    by 0x431299: runshfunc (exec.c:5040)
==9983==    by 0x430E76: doshfunc (exec.c:4920)
==9983==    by 0x4302FB: execshfunc (exec.c:4557)
==9983==    by 0x42D8C1: execcmd (exec.c:3373)
==9983== 
==9983== 
==9983== 2 errors in context 2 of 2:
==9983== Conditional jump or move depends on uninitialised value(s)
==9983==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9983==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9983==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9983==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9983==    by 0x42D8E9: execcmd (exec.c:3378)
==9983==    by 0x428CA0: execpline2 (exec.c:1697)
==9983==    by 0x427FD2: execpline (exec.c:1484)
==9983==    by 0x42779A: execlist (exec.c:1275)
==9983==    by 0x42717C: execode (exec.c:1073)
==9983==    by 0x431299: runshfunc (exec.c:5040)
==9983==    by 0x430E76: doshfunc (exec.c:4920)
==9983==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9983== 
==9983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9968== 
==9968== HEAP SUMMARY:
==9968==     in use at exit: 3,119,891 bytes in 69,168 blocks
==9968==   total heap usage: 1,592,310 allocs, 1,523,142 frees, 128,686,952 bytes allocated
==9968== 
==9992== LEAK SUMMARY:
==9992==    definitely lost: 2,189 bytes in 12 blocks
==9992==    indirectly lost: 6,756 bytes in 7 blocks
==9992==      possibly lost: 0 bytes in 0 blocks
==9992==    still reachable: 3,106,311 bytes in 68,987 blocks
==9992==         suppressed: 0 bytes in 0 blocks
==9992== Rerun with --leak-check=full to see details of leaked memory
==9992== 
==9992== Use --track-origins=yes to see where uninitialised values come from
==9992== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9992== 
==9992== 1 errors in context 1 of 2:
==9992== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9992==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9992==    by 0x488CD0: stringsubst (subst.c:301)
==9992==    by 0x48801B: prefork (subst.c:77)
==9992==    by 0x42B318: execcmd (exec.c:2619)
==9992==    by 0x428CA0: execpline2 (exec.c:1697)
==9992==    by 0x427FD2: execpline (exec.c:1484)
==9992==    by 0x427756: execlist (exec.c:1267)
==9992==    by 0x42717C: execode (exec.c:1073)
==9992==    by 0x431299: runshfunc (exec.c:5040)
==9992==    by 0x430E76: doshfunc (exec.c:4920)
==9992==    by 0x4302FB: execshfunc (exec.c:4557)
==9992==    by 0x42D8C1: execcmd (exec.c:3373)
==9992== 
==9992== 
==9992== 2 errors in context 2 of 2:
==9992== Conditional jump or move depends on uninitialised value(s)
==9992==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9992==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9992==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9992==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9992==    by 0x42D8E9: execcmd (exec.c:3378)
==9992==    by 0x428CA0: execpline2 (exec.c:1697)
==9992==    by 0x427FD2: execpline (exec.c:1484)
==9992==    by 0x42779A: execlist (exec.c:1275)
==9992==    by 0x42717C: execode (exec.c:1073)
==9992==    by 0x431299: runshfunc (exec.c:5040)
==9992==    by 0x430E76: doshfunc (exec.c:4920)
==9992==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9992== 
==9992== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9994-- Caught __NR_exit; running __libc_freeres()
==9995== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9995-by-pythonnut-on-???
==9995== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9995-by-pythonnut-on-???
==9995== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9995-by-pythonnut-on-???
==9995== 
==9995== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9995== don't want to do, unless you know exactly what you're doing,
==9995== or are doing some strange experiment):
==9995==   /usr/lib/valgrind/../../bin/vgdb --pid=9995 ...command...
==9995== 
==9995== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9995==   /path/to/gdb ./zsh
==9995== and then give GDB the following command
==9995==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9995
==9995== --pid is optional if only one valgrind process is running
==9995== 
--9995-- Caught __NR_exit; running __libc_freeres()
==9968== Searching for pointers to 69,168 not-freed blocks
--9968--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9968--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9968--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9968--   Scanning root segment: 0x4037000..0x403afff (16384)
--9968--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9968--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9968--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9968--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9968--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9968--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9968--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9968--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9968--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9968--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9968--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9968--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9968--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9968--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9968--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9968--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9968--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9968--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9968--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9968--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9968--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9968--   Scanning root segment: 0x701a000..0x701afff (4096)
--9968--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9968--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9968--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9968--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9968--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9968--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9968--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9968--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9968--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9968--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9994== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9994-by-pythonnut-on-???
==9994== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9994-by-pythonnut-on-???
==9994== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9994-by-pythonnut-on-???
==9994== 
==9994== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9994== don't want to do, unless you know exactly what you're doing,
==9994== or are doing some strange experiment):
==9994==   /usr/lib/valgrind/../../bin/vgdb --pid=9994 ...command...
==9994== 
==9994== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9994==   /path/to/gdb ./zsh
==9994== and then give GDB the following command
==9994==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9994
==9994== --pid is optional if only one valgrind process is running
==9994== 
--9994-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9995-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9994== 
==9994== HEAP SUMMARY:
==9994==     in use at exit: 3,123,826 bytes in 69,150 blocks
==9994==   total heap usage: 1,592,594 allocs, 1,523,444 frees, 128,536,487 bytes allocated
==9994== 
==9995== 
==9995== HEAP SUMMARY:
==9995==     in use at exit: 3,115,255 bytes in 69,006 blocks
==9995==   total heap usage: 1,592,284 allocs, 1,523,278 frees, 128,620,015 bytes allocated
==9995== 
==9994== Searching for pointers to 69,150 not-freed blocks
--9994--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9994--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9994--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9994--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9994--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9994--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9994--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9994--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9994--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9994--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9994--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9994--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9994--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9994--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9994--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9994--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9994--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9994--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9994--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9994--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9994--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9994--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9994--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9994--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9994--   Scanning root segment: 0x701a000..0x701afff (4096)
--9994--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9994--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9994--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9994--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9994--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9994--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9994--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9994--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9994--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9994--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9995== Searching for pointers to 69,006 not-freed blocks
--9995--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9995--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9995--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9995--   Scanning root segment: 0x4037000..0x403afff (16384)
--9995--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9995--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9995--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9995--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9995--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9995--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9995--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9995--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9995--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9995--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9995--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9995--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9995--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9995--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9995--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9995--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9995--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9995--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9995--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9995--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9995--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9995--   Scanning root segment: 0x701a000..0x701afff (4096)
--9995--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9995--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9995--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9995--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9995--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9995--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9995--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9995--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9995--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9995--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9968== Checked 4,796,920 bytes
==9968== 
==9968== LEAK SUMMARY:
==9968==    definitely lost: 2,189 bytes in 12 blocks
==9968==    indirectly lost: 6,756 bytes in 7 blocks
==9968==      possibly lost: 0 bytes in 0 blocks
==9968==    still reachable: 3,110,946 bytes in 69,149 blocks
==9968==         suppressed: 0 bytes in 0 blocks
==9968== Rerun with --leak-check=full to see details of leaked memory
==9968== 
==9968== Use --track-origins=yes to see where uninitialised values come from
==9968== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9968== 
==9968== 1 errors in context 1 of 2:
==9968== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9968==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9968==    by 0x488CD0: stringsubst (subst.c:301)
==9968==    by 0x48801B: prefork (subst.c:77)
==9968==    by 0x42B318: execcmd (exec.c:2619)
==9968==    by 0x428CA0: execpline2 (exec.c:1697)
==9968==    by 0x427FD2: execpline (exec.c:1484)
==9968==    by 0x427756: execlist (exec.c:1267)
==9968==    by 0x42717C: execode (exec.c:1073)
==9968==    by 0x431299: runshfunc (exec.c:5040)
==9968==    by 0x430E76: doshfunc (exec.c:4920)
==9968==    by 0x4302FB: execshfunc (exec.c:4557)
==9968==    by 0x42D8C1: execcmd (exec.c:3373)
==9968== 
==9968== 
==9968== 2 errors in context 2 of 2:
==9968== Conditional jump or move depends on uninitialised value(s)
==9968==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9968==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9968==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9968==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9968==    by 0x42D8E9: execcmd (exec.c:3378)
==9968==    by 0x428CA0: execpline2 (exec.c:1697)
==9968==    by 0x427FD2: execpline (exec.c:1484)
==9968==    by 0x42779A: execlist (exec.c:1275)
==9968==    by 0x42717C: execode (exec.c:1073)
==9968==    by 0x431299: runshfunc (exec.c:5040)
==9968==    by 0x430E76: doshfunc (exec.c:4920)
==9968==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9968== 
==9968== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9994== Checked 4,784,632 bytes
==9994== 
==9996== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9996-by-pythonnut-on-???
==9996== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9996-by-pythonnut-on-???
==9996== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9996-by-pythonnut-on-???
==9996== 
==9996== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9996== don't want to do, unless you know exactly what you're doing,
==9996== or are doing some strange experiment):
==9996==   /usr/lib/valgrind/../../bin/vgdb --pid=9996 ...command...
==9996== 
==9996== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9996==   /path/to/gdb ./zsh
==9996== and then give GDB the following command
==9996==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9996
==9996== --pid is optional if only one valgrind process is running
==9996== 
==9995== Checked 4,790,360 bytes
==9995== 
--9996-- Caught __NR_exit; running __libc_freeres()
==9994== LEAK SUMMARY:
==9994==    definitely lost: 2,189 bytes in 12 blocks
==9994==    indirectly lost: 6,756 bytes in 7 blocks
==9994==      possibly lost: 0 bytes in 0 blocks
==9994==    still reachable: 3,114,881 bytes in 69,131 blocks
==9994==         suppressed: 0 bytes in 0 blocks
==9994== Rerun with --leak-check=full to see details of leaked memory
==9994== 
==9994== Use --track-origins=yes to see where uninitialised values come from
==9994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9994== 
==9994== 1 errors in context 1 of 2:
==9994== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9994==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9994==    by 0x488CD0: stringsubst (subst.c:301)
==9994==    by 0x48801B: prefork (subst.c:77)
==9994==    by 0x42B318: execcmd (exec.c:2619)
==9994==    by 0x428CA0: execpline2 (exec.c:1697)
==9994==    by 0x427FD2: execpline (exec.c:1484)
==9994==    by 0x427756: execlist (exec.c:1267)
==9994==    by 0x42717C: execode (exec.c:1073)
==9994==    by 0x431299: runshfunc (exec.c:5040)
==9994==    by 0x430E76: doshfunc (exec.c:4920)
==9994==    by 0x4302FB: execshfunc (exec.c:4557)
==9994==    by 0x42D8C1: execcmd (exec.c:3373)
==9994== 
==9994== 
==9994== 2 errors in context 2 of 2:
==9994== Conditional jump or move depends on uninitialised value(s)
==9994==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9994==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9994==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9994==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9994==    by 0x42D8E9: execcmd (exec.c:3378)
==9994==    by 0x428CA0: execpline2 (exec.c:1697)
==9994==    by 0x427FD2: execpline (exec.c:1484)
==9994==    by 0x42779A: execlist (exec.c:1275)
==9994==    by 0x42717C: execode (exec.c:1073)
==9994==    by 0x431299: runshfunc (exec.c:5040)
==9994==    by 0x430E76: doshfunc (exec.c:4920)
==9994==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9994== 
==9994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEF77C,  len 4
==9995== LEAK SUMMARY:
==9995==    definitely lost: 2,189 bytes in 12 blocks
==9995==    indirectly lost: 6,756 bytes in 7 blocks
==9995==      possibly lost: 0 bytes in 0 blocks
==9995==    still reachable: 3,106,310 bytes in 68,987 blocks
==9995==         suppressed: 0 bytes in 0 blocks
==9995== Rerun with --leak-check=full to see details of leaked memory
==9995== 
==9995== Use --track-origins=yes to see where uninitialised values come from
==9995== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9995== 
==9995== 1 errors in context 1 of 2:
==9995== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9995==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9995==    by 0x488CD0: stringsubst (subst.c:301)
==9995==    by 0x48801B: prefork (subst.c:77)
==9995==    by 0x42B318: execcmd (exec.c:2619)
==9995==    by 0x428CA0: execpline2 (exec.c:1697)
==9995==    by 0x427FD2: execpline (exec.c:1484)
==9995==    by 0x427756: execlist (exec.c:1267)
==9995==    by 0x42717C: execode (exec.c:1073)
==9995==    by 0x431299: runshfunc (exec.c:5040)
==9995==    by 0x430E76: doshfunc (exec.c:4920)
==9995==    by 0x4302FB: execshfunc (exec.c:4557)
==9995==    by 0x42D8C1: execcmd (exec.c:3373)
==9995== 
==9995== 
==9995== 2 errors in context 2 of 2:
==9995== Conditional jump or move depends on uninitialised value(s)
==9995==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9995==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9995==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9995==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9995==    by 0x42D8E9: execcmd (exec.c:3378)
==9995==    by 0x428CA0: execpline2 (exec.c:1697)
==9995==    by 0x427FD2: execpline (exec.c:1484)
==9995==    by 0x42779A: execlist (exec.c:1275)
==9995==    by 0x42717C: execode (exec.c:1073)
==9995==    by 0x431299: runshfunc (exec.c:5040)
==9995==    by 0x430E76: doshfunc (exec.c:4920)
==9995==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9995== 
==9995== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9999== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9999-by-pythonnut-on-???
==9999== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9999-by-pythonnut-on-???
==9999== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9999-by-pythonnut-on-???
==9999== 
==9999== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9999== don't want to do, unless you know exactly what you're doing,
==9999== or are doing some strange experiment):
==9999==   /usr/lib/valgrind/../../bin/vgdb --pid=9999 ...command...
==9999== 
==9999== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9999==   /path/to/gdb ./zsh
==9999== and then give GDB the following command
==9999==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9999
==9999== --pid is optional if only one valgrind process is running
==9999== 
==9998== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-9998-by-pythonnut-on-???
==9998== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-9998-by-pythonnut-on-???
==9998== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-9998-by-pythonnut-on-???
==9998== 
==9998== TO CONTROL THIS PROCESS USING vgdb (which you probably
==9998== don't want to do, unless you know exactly what you're doing,
==9998== or are doing some strange experiment):
==9998==   /usr/lib/valgrind/../../bin/vgdb --pid=9998 ...command...
==9998== 
==9998== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==9998==   /path/to/gdb ./zsh
==9998== and then give GDB the following command
==9998==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=9998
==9998== --pid is optional if only one valgrind process is running
==9998== 
--9999-- Caught __NR_exit; running __libc_freeres()
--9996-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9996== 
--9998-- Caught __NR_exit; running __libc_freeres()
==9996== HEAP SUMMARY:
==9996==     in use at exit: 3,157,401 bytes in 69,169 blocks
==9996==   total heap usage: 1,592,274 allocs, 1,523,105 frees, 128,637,790 bytes allocated
==9996== 
--9999-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--9998-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9996== Searching for pointers to 69,169 not-freed blocks
--9996--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9996--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==9999== 
--9996--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9996--   Scanning root segment: 0x4037000..0x404cfff (90112)
--9996--   Scanning root segment: 0x41d6000..0x41edfff (98304)
--9996--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9996--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9996--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9996--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9996--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9996--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9996--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9996--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9996--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9996--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9996--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9996--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9996--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9996--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9996--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9996--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9996--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9996--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9996--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==9999== HEAP SUMMARY:
==9999==     in use at exit: 3,115,254 bytes in 69,006 blocks
==9999==   total heap usage: 1,592,292 allocs, 1,523,286 frees, 128,623,668 bytes allocated
==9999== 
--9996--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9996--   Scanning root segment: 0x701a000..0x701afff (4096)
--9996--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9996--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9996--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9996--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9996--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9996--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9996--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9996--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9996--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9996--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9998== 
==9998== HEAP SUMMARY:
==9998==     in use at exit: 3,123,922 bytes in 69,150 blocks
==9998==   total heap usage: 1,592,610 allocs, 1,523,460 frees, 128,541,274 bytes allocated
==9998== 
==9998== Searching for pointers to 69,150 not-freed blocks
--9998--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9998--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9998--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9998--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9998--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9998--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9998--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9998--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9998--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9998--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9998--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9998--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9998--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9998--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9998--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9998--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9998--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9998--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9998--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9998--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9998--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9998--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9998--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9998--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9998--   Scanning root segment: 0x701a000..0x701afff (4096)
--9998--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9998--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9998--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9998--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9998--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9998--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9998--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9998--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9998--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9998--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9999== Searching for pointers to 69,006 not-freed blocks
--9999--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9999--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9999--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9999--   Scanning root segment: 0x4037000..0x403afff (16384)
--9999--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9999--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9999--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9999--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9999--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9999--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9999--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9999--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9999--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9999--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9999--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9999--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9999--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9999--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9999--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9999--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9999--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9999--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9999--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9999--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9999--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9999--   Scanning root segment: 0x701a000..0x701afff (4096)
--9999--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9999--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9999--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9999--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9999--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9999--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9999--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9999--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9999--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9999--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9996== Checked 4,990,792 bytes
==9996== 
==9996== LEAK SUMMARY:
==9996==    definitely lost: 2,189 bytes in 12 blocks
==9996==    indirectly lost: 6,756 bytes in 7 blocks
==9996==      possibly lost: 0 bytes in 0 blocks
==9996==    still reachable: 3,148,456 bytes in 69,150 blocks
==9996==         suppressed: 0 bytes in 0 blocks
==9996== Rerun with --leak-check=full to see details of leaked memory
==9996== 
==9996== Use --track-origins=yes to see where uninitialised values come from
==9996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9996== 
==9996== 1 errors in context 1 of 2:
==9996== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9996==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9996==    by 0x488CD0: stringsubst (subst.c:301)
==9996==    by 0x48801B: prefork (subst.c:77)
==9996==    by 0x42B318: execcmd (exec.c:2619)
==9996==    by 0x428CA0: execpline2 (exec.c:1697)
==9996==    by 0x427FD2: execpline (exec.c:1484)
==9996==    by 0x427756: execlist (exec.c:1267)
==9996==    by 0x42717C: execode (exec.c:1073)
==9996==    by 0x431299: runshfunc (exec.c:5040)
==9996==    by 0x430E76: doshfunc (exec.c:4920)
==9996==    by 0x4302FB: execshfunc (exec.c:4557)
==9996==    by 0x42D8C1: execcmd (exec.c:3373)
==9996== 
==9996== 
==9996== 2 errors in context 2 of 2:
==9996== Conditional jump or move depends on uninitialised value(s)
==9996==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9996==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9996==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9996==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9996==    by 0x42D8E9: execcmd (exec.c:3378)
==9996==    by 0x428CA0: execpline2 (exec.c:1697)
==9996==    by 0x427FD2: execpline (exec.c:1484)
==9996==    by 0x42779A: execlist (exec.c:1275)
==9996==    by 0x42717C: execode (exec.c:1073)
==9996==    by 0x431299: runshfunc (exec.c:5040)
==9996==    by 0x430E76: doshfunc (exec.c:4920)
==9996==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9996== 
==9996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9967-- Caught __NR_exit; running __libc_freeres()
==9998== Checked 4,783,912 bytes
==9998== 
==9999== Checked 4,790,360 bytes
==9999== 
==9998== LEAK SUMMARY:
==9998==    definitely lost: 2,189 bytes in 12 blocks
==9998==    indirectly lost: 6,756 bytes in 7 blocks
==9998==      possibly lost: 0 bytes in 0 blocks
==9998==    still reachable: 3,114,977 bytes in 69,131 blocks
==9998==         suppressed: 0 bytes in 0 blocks
==9998== Rerun with --leak-check=full to see details of leaked memory
==9998== 
==9998== Use --track-origins=yes to see where uninitialised values come from
==9998== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9998== 
==9998== 1 errors in context 1 of 2:
==9998== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9998==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9998==    by 0x488CD0: stringsubst (subst.c:301)
==9998==    by 0x48801B: prefork (subst.c:77)
==9998==    by 0x42B318: execcmd (exec.c:2619)
==9998==    by 0x428CA0: execpline2 (exec.c:1697)
==9998==    by 0x427FD2: execpline (exec.c:1484)
==9998==    by 0x427756: execlist (exec.c:1267)
==9998==    by 0x42717C: execode (exec.c:1073)
==9998==    by 0x431299: runshfunc (exec.c:5040)
==9998==    by 0x430E76: doshfunc (exec.c:4920)
==9998==    by 0x4302FB: execshfunc (exec.c:4557)
==9998==    by 0x42D8C1: execcmd (exec.c:3373)
==9998== 
==9998== 
==9998== 2 errors in context 2 of 2:
==9998== Conditional jump or move depends on uninitialised value(s)
==9998==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9998==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9998==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9998==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9998==    by 0x42D8E9: execcmd (exec.c:3378)
==9998==    by 0x428CA0: execpline2 (exec.c:1697)
==9998==    by 0x427FD2: execpline (exec.c:1484)
==9998==    by 0x42779A: execlist (exec.c:1275)
==9998==    by 0x42717C: execode (exec.c:1073)
==9998==    by 0x431299: runshfunc (exec.c:5040)
==9998==    by 0x430E76: doshfunc (exec.c:4920)
==9998==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9998== 
==9998== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9967-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9967== 
==9967== HEAP SUMMARY:
==9967==     in use at exit: 3,118,632 bytes in 69,135 blocks
==9967==   total heap usage: 1,592,277 allocs, 1,523,142 frees, 128,638,366 bytes allocated
==9967== 
==9999== LEAK SUMMARY:
==9999==    definitely lost: 2,189 bytes in 12 blocks
==9999==    indirectly lost: 6,756 bytes in 7 blocks
==9999==      possibly lost: 0 bytes in 0 blocks
==9999==    still reachable: 3,106,309 bytes in 68,987 blocks
==9999==         suppressed: 0 bytes in 0 blocks
==9999== Rerun with --leak-check=full to see details of leaked memory
==9999== 
==9999== Use --track-origins=yes to see where uninitialised values come from
==9999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9999== 
==9999== 1 errors in context 1 of 2:
==9999== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9999==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9999==    by 0x488CD0: stringsubst (subst.c:301)
==9999==    by 0x48801B: prefork (subst.c:77)
==9999==    by 0x42B318: execcmd (exec.c:2619)
==9999==    by 0x428CA0: execpline2 (exec.c:1697)
==9999==    by 0x427FD2: execpline (exec.c:1484)
==9999==    by 0x427756: execlist (exec.c:1267)
==9999==    by 0x42717C: execode (exec.c:1073)
==9999==    by 0x431299: runshfunc (exec.c:5040)
==9999==    by 0x430E76: doshfunc (exec.c:4920)
==9999==    by 0x4302FB: execshfunc (exec.c:4557)
==9999==    by 0x42D8C1: execcmd (exec.c:3373)
==9999== 
==9999== 
==9999== 2 errors in context 2 of 2:
==9999== Conditional jump or move depends on uninitialised value(s)
==9999==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9999==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9999==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9999==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9999==    by 0x42D8E9: execcmd (exec.c:3378)
==9999==    by 0x428CA0: execpline2 (exec.c:1697)
==9999==    by 0x427FD2: execpline (exec.c:1484)
==9999==    by 0x42779A: execlist (exec.c:1275)
==9999==    by 0x42717C: execode (exec.c:1073)
==9999==    by 0x431299: runshfunc (exec.c:5040)
==9999==    by 0x430E76: doshfunc (exec.c:4920)
==9999==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9999== 
==9999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10000-by-pythonnut-on-???
==10000== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10000-by-pythonnut-on-???
==10000== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10000-by-pythonnut-on-???
==10000== 
==10000== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10000== don't want to do, unless you know exactly what you're doing,
==10000== or are doing some strange experiment):
==10000==   /usr/lib/valgrind/../../bin/vgdb --pid=10000 ...command...
==10000== 
==10000== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10000==   /path/to/gdb ./zsh
==10000== and then give GDB the following command
==10000==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10000
==10000== --pid is optional if only one valgrind process is running
==10000== 
--10001-- Caught __NR_exit; running __libc_freeres()
==10001== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10001-by-pythonnut-on-???
==10001== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10001-by-pythonnut-on-???
==10001== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10001-by-pythonnut-on-???
==10001== 
==10001== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10001== don't want to do, unless you know exactly what you're doing,
==10001== or are doing some strange experiment):
==10001==   /usr/lib/valgrind/../../bin/vgdb --pid=10001 ...command...
==10001== 
==10001== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10001==   /path/to/gdb ./zsh
==10001== and then give GDB the following command
==10001==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10001
==10001== --pid is optional if only one valgrind process is running
==10001== 
--10000-- Caught __NR_exit; running __libc_freeres()
==9967== Searching for pointers to 69,135 not-freed blocks
--9967--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9967--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9967--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9967--   Scanning root segment: 0x4037000..0x403afff (16384)
--9967--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9967--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9967--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9967--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9967--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9967--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9967--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9967--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9967--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9967--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9967--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9967--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9967--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9967--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9967--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9967--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9967--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9967--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9967--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9967--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9967--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9967--   Scanning root segment: 0x701a000..0x701afff (4096)
--9967--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9967--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9967--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9967--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9967--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9967--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9967--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9967--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9967--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9967--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10001-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10000-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10001== 
==10001== HEAP SUMMARY:
==10001==     in use at exit: 3,115,257 bytes in 69,006 blocks
==10001==   total heap usage: 1,592,294 allocs, 1,523,288 frees, 128,624,245 bytes allocated
==10001== 
==10000== 
==10000== HEAP SUMMARY:
==10000==     in use at exit: 3,124,164 bytes in 69,156 blocks
==10000==   total heap usage: 1,592,658 allocs, 1,523,502 frees, 128,550,290 bytes allocated
==10000== 
==10001== Searching for pointers to 69,006 not-freed blocks
--10001--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10001--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10001--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10001--   Scanning root segment: 0x4037000..0x403afff (16384)
--10001--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10001--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10001--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10001--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10001--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10001--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10001--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10001--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10001--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10001--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10001--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10001--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10001--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10001--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10001--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10001--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10001--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10001--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10001--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10001--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10001--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10001--   Scanning root segment: 0x701a000..0x701afff (4096)
--10001--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10001--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10001--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10001--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10001--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10001--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10001--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10001--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10001--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10001--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10000== Searching for pointers to 69,156 not-freed blocks
--10000--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10000--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10000--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10000--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10000--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10000--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10000--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10000--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10000--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10000--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10000--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10000--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10000--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10000--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10000--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10000--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10000--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10000--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10000--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10000--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10000--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10000--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10000--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10000--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10000--   Scanning root segment: 0x701a000..0x701afff (4096)
--10000--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10000--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10000--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10000--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10000--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10000--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10000--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10000--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10000--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10000--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9967== Checked 4,793,912 bytes
==9967== 
==9967== LEAK SUMMARY:
==9967==    definitely lost: 2,189 bytes in 12 blocks
==9967==    indirectly lost: 6,756 bytes in 7 blocks
==9967==      possibly lost: 0 bytes in 0 blocks
==9967==    still reachable: 3,109,687 bytes in 69,116 blocks
==9967==         suppressed: 0 bytes in 0 blocks
==9967== Rerun with --leak-check=full to see details of leaked memory
==9967== 
==9967== Use --track-origins=yes to see where uninitialised values come from
==9967== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9967== 
==9967== 1 errors in context 1 of 2:
==9967== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9967==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9967==    by 0x488CD0: stringsubst (subst.c:301)
==9967==    by 0x48801B: prefork (subst.c:77)
==9967==    by 0x42B318: execcmd (exec.c:2619)
==9967==    by 0x428CA0: execpline2 (exec.c:1697)
==9967==    by 0x427FD2: execpline (exec.c:1484)
==9967==    by 0x427756: execlist (exec.c:1267)
==9967==    by 0x42717C: execode (exec.c:1073)
==9967==    by 0x431299: runshfunc (exec.c:5040)
==9967==    by 0x430E76: doshfunc (exec.c:4920)
==9967==    by 0x4302FB: execshfunc (exec.c:4557)
==9967==    by 0x42D8C1: execcmd (exec.c:3373)
==9967== 
==9967== 
==9967== 2 errors in context 2 of 2:
==9967== Conditional jump or move depends on uninitialised value(s)
==9967==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9967==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9967==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9967==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9967==    by 0x42D8E9: execcmd (exec.c:3378)
==9967==    by 0x428CA0: execpline2 (exec.c:1697)
==9967==    by 0x427FD2: execpline (exec.c:1484)
==9967==    by 0x42779A: execlist (exec.c:1275)
==9967==    by 0x42717C: execode (exec.c:1073)
==9967==    by 0x431299: runshfunc (exec.c:5040)
==9967==    by 0x430E76: doshfunc (exec.c:4920)
==9967==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9967== 
==9967== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10001== Checked 4,790,360 bytes
==10001== 
==10000== Checked 4,784,080 bytes
==10000== 
==10001== LEAK SUMMARY:
==10001==    definitely lost: 2,189 bytes in 12 blocks
==10001==    indirectly lost: 6,756 bytes in 7 blocks
==10001==      possibly lost: 0 bytes in 0 blocks
==10001==    still reachable: 3,106,312 bytes in 68,987 blocks
==10001==         suppressed: 0 bytes in 0 blocks
==10001== Rerun with --leak-check=full to see details of leaked memory
==10001== 
==10001== Use --track-origins=yes to see where uninitialised values come from
==10001== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10001== 
==10001== 1 errors in context 1 of 2:
==10001== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10001==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10001==    by 0x488CD0: stringsubst (subst.c:301)
==10001==    by 0x48801B: prefork (subst.c:77)
==10001==    by 0x42B318: execcmd (exec.c:2619)
==10001==    by 0x428CA0: execpline2 (exec.c:1697)
==10001==    by 0x427FD2: execpline (exec.c:1484)
==10001==    by 0x427756: execlist (exec.c:1267)
==10001==    by 0x42717C: execode (exec.c:1073)
==10001==    by 0x431299: runshfunc (exec.c:5040)
==10001==    by 0x430E76: doshfunc (exec.c:4920)
==10001==    by 0x4302FB: execshfunc (exec.c:4557)
==10001==    by 0x42D8C1: execcmd (exec.c:3373)
==10001== 
==10001== 
==10001== 2 errors in context 2 of 2:
==10001== Conditional jump or move depends on uninitialised value(s)
==10001==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10001==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10001==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10001==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10001==    by 0x42D8E9: execcmd (exec.c:3378)
==10001==    by 0x428CA0: execpline2 (exec.c:1697)
==10001==    by 0x427FD2: execpline (exec.c:1484)
==10001==    by 0x42779A: execlist (exec.c:1275)
==10001==    by 0x42717C: execode (exec.c:1073)
==10001==    by 0x431299: runshfunc (exec.c:5040)
==10001==    by 0x430E76: doshfunc (exec.c:4920)
==10001==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10001== 
==10001== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== LEAK SUMMARY:
==10000==    definitely lost: 2,189 bytes in 12 blocks
==10000==    indirectly lost: 6,756 bytes in 7 blocks
==10000==      possibly lost: 0 bytes in 0 blocks
==10000==    still reachable: 3,115,219 bytes in 69,137 blocks
==10000==         suppressed: 0 bytes in 0 blocks
==10000== Rerun with --leak-check=full to see details of leaked memory
==10000== 
==10000== Use --track-origins=yes to see where uninitialised values come from
==10000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10000== 
==10000== 1 errors in context 1 of 2:
==10000== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10000==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10000==    by 0x488CD0: stringsubst (subst.c:301)
==10000==    by 0x48801B: prefork (subst.c:77)
==10000==    by 0x42B318: execcmd (exec.c:2619)
==10000==    by 0x428CA0: execpline2 (exec.c:1697)
==10000==    by 0x427FD2: execpline (exec.c:1484)
==10000==    by 0x427756: execlist (exec.c:1267)
==10000==    by 0x42717C: execode (exec.c:1073)
==10000==    by 0x431299: runshfunc (exec.c:5040)
==10000==    by 0x430E76: doshfunc (exec.c:4920)
==10000==    by 0x4302FB: execshfunc (exec.c:4557)
==10000==    by 0x42D8C1: execcmd (exec.c:3373)
==10000== 
==10000== 
==10000== 2 errors in context 2 of 2:
==10000== Conditional jump or move depends on uninitialised value(s)
==10000==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10000==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10000==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10000==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10000==    by 0x42D8E9: execcmd (exec.c:3378)
==10000==    by 0x428CA0: execpline2 (exec.c:1697)
==10000==    by 0x427FD2: execpline (exec.c:1484)
==10000==    by 0x42779A: execlist (exec.c:1275)
==10000==    by 0x42717C: execode (exec.c:1073)
==10000==    by 0x431299: runshfunc (exec.c:5040)
==10000==    by 0x430E76: doshfunc (exec.c:4920)
==10000==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10000== 
==10000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10004== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10004-by-pythonnut-on-???
==10004== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10004-by-pythonnut-on-???
==10004== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10004-by-pythonnut-on-???
==10004== 
==10004== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10004== don't want to do, unless you know exactly what you're doing,
==10004== or are doing some strange experiment):
==10004==   /usr/lib/valgrind/../../bin/vgdb --pid=10004 ...command...
==10004== 
==10004== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10004==   /path/to/gdb ./zsh
==10004== and then give GDB the following command
==10004==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10004
==10004== --pid is optional if only one valgrind process is running
==10004== 
--10006-- Caught __NR_exit; running __libc_freeres()
==10006== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10006-by-pythonnut-on-???
==10006== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10006-by-pythonnut-on-???
==10006== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10006-by-pythonnut-on-???
==10006== 
==10006== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10006== don't want to do, unless you know exactly what you're doing,
==10006== or are doing some strange experiment):
==10006==   /usr/lib/valgrind/../../bin/vgdb --pid=10006 ...command...
==10006== 
==10006== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10006==   /path/to/gdb ./zsh
==10006== and then give GDB the following command
==10006==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10006
==10006== --pid is optional if only one valgrind process is running
==10006== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--10005-- Caught __NR_exit; running __libc_freeres()
--10006-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10005== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10005-by-pythonnut-on-???
==10005== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10005-by-pythonnut-on-???
==10005== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10005-by-pythonnut-on-???
==10005== 
==10005== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10005== don't want to do, unless you know exactly what you're doing,
==10005== or are doing some strange experiment):
==10005==   /usr/lib/valgrind/../../bin/vgdb --pid=10005 ...command...
==10005== 
==10005== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10005==   /path/to/gdb ./zsh
==10005== and then give GDB the following command
==10005==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10005
==10005== --pid is optional if only one valgrind process is running
==10005== 
==10006== 
==10006== HEAP SUMMARY:
==10006==     in use at exit: 3,115,507 bytes in 69,011 blocks
==10006==   total heap usage: 1,592,300 allocs, 1,523,289 frees, 128,627,859 bytes allocated
==10006== 
--10005-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10005== 
==10005== HEAP SUMMARY:
==10005==     in use at exit: 3,124,100 bytes in 69,156 blocks
==10005==   total heap usage: 1,592,638 allocs, 1,523,482 frees, 128,548,060 bytes allocated
==10005== 
==10006== Searching for pointers to 69,011 not-freed blocks
--10006--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10006--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10006--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10006--   Scanning root segment: 0x4037000..0x403afff (16384)
--10006--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10006--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10006--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10006--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10006--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10006--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10006--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10006--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10006--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10006--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10006--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10006--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10006--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10006--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10006--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10006--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10006--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10006--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10006--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10006--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10006--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10006--   Scanning root segment: 0x701a000..0x701afff (4096)
--10006--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10006--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10006--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10006--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10006--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10006--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10006--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10006--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10006--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10006--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10005== Searching for pointers to 69,156 not-freed blocks
--10005--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10005--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10005--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10005--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10005--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10005--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10005--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10005--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10005--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10005--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10005--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10005--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10005--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10005--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10005--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10005--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10005--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10005--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10005--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10005--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10005--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10005--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10005--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10005--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10005--   Scanning root segment: 0x701a000..0x701afff (4096)
--10005--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10005--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10005--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10005--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10005--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10005--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10005--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10005--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10005--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10005--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10006== Checked 4,791,232 bytes
==10006== 
==10006== LEAK SUMMARY:
==10006==    definitely lost: 2,189 bytes in 12 blocks
==10006==    indirectly lost: 6,756 bytes in 7 blocks
==10006==      possibly lost: 0 bytes in 0 blocks
==10006==    still reachable: 3,106,562 bytes in 68,992 blocks
==10006==         suppressed: 0 bytes in 0 blocks
==10006== Rerun with --leak-check=full to see details of leaked memory
==10006== 
==10006== Use --track-origins=yes to see where uninitialised values come from
==10006== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10006== 
==10006== 1 errors in context 1 of 2:
==10006== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10006==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10006==    by 0x488CD0: stringsubst (subst.c:301)
==10006==    by 0x48801B: prefork (subst.c:77)
==10006==    by 0x42B318: execcmd (exec.c:2619)
==10006==    by 0x428CA0: execpline2 (exec.c:1697)
==10006==    by 0x427FD2: execpline (exec.c:1484)
==10006==    by 0x427756: execlist (exec.c:1267)
==10006==    by 0x42717C: execode (exec.c:1073)
==10006==    by 0x431299: runshfunc (exec.c:5040)
==10006==    by 0x430E76: doshfunc (exec.c:4920)
==10006==    by 0x4302FB: execshfunc (exec.c:4557)
==10006==    by 0x42D8C1: execcmd (exec.c:3373)
==10006== 
==10006== 
==10006== 2 errors in context 2 of 2:
==10006== Conditional jump or move depends on uninitialised value(s)
==10006==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10006==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10006==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10006==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10006==    by 0x42D8E9: execcmd (exec.c:3378)
==10006==    by 0x428CA0: execpline2 (exec.c:1697)
==10006==    by 0x427FD2: execpline (exec.c:1484)
==10006==    by 0x42779A: execlist (exec.c:1275)
==10006==    by 0x42717C: execode (exec.c:1073)
==10006==    by 0x431299: runshfunc (exec.c:5040)
==10006==    by 0x430E76: doshfunc (exec.c:4920)
==10006==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10006== 
==10006== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10004-- Caught __NR_exit; running __libc_freeres()
==10005== Checked 4,784,008 bytes
==10005== 
==10005== LEAK SUMMARY:
==10005==    definitely lost: 2,189 bytes in 12 blocks
==10005==    indirectly lost: 6,756 bytes in 7 blocks
==10005==      possibly lost: 0 bytes in 0 blocks
==10005==    still reachable: 3,115,155 bytes in 69,137 blocks
==10005==         suppressed: 0 bytes in 0 blocks
==10005== Rerun with --leak-check=full to see details of leaked memory
==10005== 
==10005== Use --track-origins=yes to see where uninitialised values come from
==10005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10005== 
==10005== 1 errors in context 1 of 2:
==10005== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10005==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10005==    by 0x488CD0: stringsubst (subst.c:301)
==10005==    by 0x48801B: prefork (subst.c:77)
==10005==    by 0x42B318: execcmd (exec.c:2619)
==10005==    by 0x428CA0: execpline2 (exec.c:1697)
==10005==    by 0x427FD2: execpline (exec.c:1484)
==10005==    by 0x427756: execlist (exec.c:1267)
==10005==    by 0x42717C: execode (exec.c:1073)
==10005==    by 0x431299: runshfunc (exec.c:5040)
==10005==    by 0x430E76: doshfunc (exec.c:4920)
==10005==    by 0x4302FB: execshfunc (exec.c:4557)
==10005==    by 0x42D8C1: execcmd (exec.c:3373)
==10005== 
==10005== 
==10005== 2 errors in context 2 of 2:
==10005== Conditional jump or move depends on uninitialised value(s)
==10005==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10005==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10005==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10005==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10005==    by 0x42D8E9: execcmd (exec.c:3378)
==10005==    by 0x428CA0: execpline2 (exec.c:1697)
==10005==    by 0x427FD2: execpline (exec.c:1484)
==10005==    by 0x42779A: execlist (exec.c:1275)
==10005==    by 0x42717C: execode (exec.c:1073)
==10005==    by 0x431299: runshfunc (exec.c:5040)
==10005==    by 0x430E76: doshfunc (exec.c:4920)
==10005==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10005== 
==10005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10004-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10004== 
==10004== HEAP SUMMARY:
==10004==     in use at exit: 3,115,283 bytes in 69,008 blocks
==10004==   total heap usage: 1,592,303 allocs, 1,523,295 frees, 128,628,435 bytes allocated
==10004== 
==10008== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10008-by-pythonnut-on-???
==10008== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10008-by-pythonnut-on-???
==10008== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10008-by-pythonnut-on-???
==10008== 
==10008== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10008== don't want to do, unless you know exactly what you're doing,
==10008== or are doing some strange experiment):
==10008==   /usr/lib/valgrind/../../bin/vgdb --pid=10008 ...command...
==10008== 
==10008== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10008==   /path/to/gdb ./zsh
==10008== and then give GDB the following command
==10008==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10008
==10008== --pid is optional if only one valgrind process is running
==10008== 
==10004== Searching for pointers to 69,008 not-freed blocks
--10004--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10004--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10004--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10004--   Scanning root segment: 0x4037000..0x403afff (16384)
--10004--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10004--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10004--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10004--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10004--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10004--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10004--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10004--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10004--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10004--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10004--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10004--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10004--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10004--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10004--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10004--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10004--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10004--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10004--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10004--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10004--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10004--   Scanning root segment: 0x701a000..0x701afff (4096)
--10004--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10004--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10004--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10004--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10004--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10004--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10004--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10004--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10004--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10004--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10008-- Caught __NR_exit; running __libc_freeres()
--10008-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10008== 
==10008== HEAP SUMMARY:
==10008==     in use at exit: 3,124,129 bytes in 69,157 blocks
==10008==   total heap usage: 1,592,651 allocs, 1,523,494 frees, 128,550,748 bytes allocated
==10008== 
==10008== Searching for pointers to 69,157 not-freed blocks
--10008--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10008--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10008--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10008--   Scanning root segment: 0x4037000..0x403afff (16384)
--10008--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10008--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10008--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10008--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10008--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10008--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10008--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10008--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10008--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10008--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10008--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10008--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10008--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10008--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10008--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10008--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10008--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10008--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10008--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10008--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10008--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10008--   Scanning root segment: 0x701a000..0x701afff (4096)
--10008--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10008--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10008--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10008--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10008--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10008--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10008--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10008--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10008--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10008--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10004== Checked 4,790,376 bytes
==10004== 
==10004== LEAK SUMMARY:
==10004==    definitely lost: 2,189 bytes in 12 blocks
==10004==    indirectly lost: 6,756 bytes in 7 blocks
==10004==      possibly lost: 0 bytes in 0 blocks
==10004==    still reachable: 3,106,338 bytes in 68,989 blocks
==10004==         suppressed: 0 bytes in 0 blocks
==10004== Rerun with --leak-check=full to see details of leaked memory
==10004== 
==10004== Use --track-origins=yes to see where uninitialised values come from
==10004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10004== 
==10004== 1 errors in context 1 of 2:
==10004== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10004==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10004==    by 0x488CD0: stringsubst (subst.c:301)
==10004==    by 0x48801B: prefork (subst.c:77)
==10004==    by 0x42B318: execcmd (exec.c:2619)
==10004==    by 0x428CA0: execpline2 (exec.c:1697)
==10004==    by 0x427FD2: execpline (exec.c:1484)
==10004==    by 0x427756: execlist (exec.c:1267)
==10004==    by 0x42717C: execode (exec.c:1073)
==10004==    by 0x431299: runshfunc (exec.c:5040)
==10004==    by 0x430E76: doshfunc (exec.c:4920)
==10004==    by 0x4302FB: execshfunc (exec.c:4557)
==10004==    by 0x42D8C1: execcmd (exec.c:3373)
==10004== 
==10004== 
==10004== 2 errors in context 2 of 2:
==10004== Conditional jump or move depends on uninitialised value(s)
==10004==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10004==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10004==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10004==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10004==    by 0x42D8E9: execcmd (exec.c:3378)
==10004==    by 0x428CA0: execpline2 (exec.c:1697)
==10004==    by 0x427FD2: execpline (exec.c:1484)
==10004==    by 0x42779A: execlist (exec.c:1275)
==10004==    by 0x42717C: execode (exec.c:1073)
==10004==    by 0x431299: runshfunc (exec.c:5040)
==10004==    by 0x430E76: doshfunc (exec.c:4920)
==10004==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10004== 
==10004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9906-- Caught __NR_exit; running __libc_freeres()
--9906-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9906== 
==9906== HEAP SUMMARY:
==9906==     in use at exit: 3,112,789 bytes in 68,931 blocks
==9906==   total heap usage: 1,592,302 allocs, 1,523,371 frees, 128,630,225 bytes allocated
==9906== 
==10008== Checked 4,799,904 bytes
==10008== 
==9906== Searching for pointers to 68,931 not-freed blocks
--9906--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9906--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9906--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9906--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9906--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9906--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9906--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9906--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9906--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9906--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9906--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9906--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9906--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9906--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9906--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9906--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9906--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9906--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9906--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9906--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9906--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9906--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9906--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9906--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9906--   Scanning root segment: 0x701a000..0x701afff (4096)
--9906--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9906--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9906--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9906--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9906--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9906--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9906--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9906--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9906--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9906--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10008== LEAK SUMMARY:
==10008==    definitely lost: 2,189 bytes in 12 blocks
==10008==    indirectly lost: 6,756 bytes in 7 blocks
==10008==      possibly lost: 0 bytes in 0 blocks
==10008==    still reachable: 3,115,184 bytes in 69,138 blocks
==10008==         suppressed: 0 bytes in 0 blocks
==10008== Rerun with --leak-check=full to see details of leaked memory
==10008== 
==10008== Use --track-origins=yes to see where uninitialised values come from
==10008== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10008== 
==10008== 1 errors in context 1 of 2:
==10008== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10008==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10008==    by 0x488CD0: stringsubst (subst.c:301)
==10008==    by 0x48801B: prefork (subst.c:77)
==10008==    by 0x42B318: execcmd (exec.c:2619)
==10008==    by 0x428CA0: execpline2 (exec.c:1697)
==10008==    by 0x427FD2: execpline (exec.c:1484)
==10008==    by 0x427756: execlist (exec.c:1267)
==10008==    by 0x42717C: execode (exec.c:1073)
==10008==    by 0x431299: runshfunc (exec.c:5040)
==10008==    by 0x430E76: doshfunc (exec.c:4920)
==10008==    by 0x4302FB: execshfunc (exec.c:4557)
==10008==    by 0x42D8C1: execcmd (exec.c:3373)
==10008== 
==10008== 
==10008== 2 errors in context 2 of 2:
==10008== Conditional jump or move depends on uninitialised value(s)
==10008==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10008==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10008==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10008==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10008==    by 0x42D8E9: execcmd (exec.c:3378)
==10008==    by 0x428CA0: execpline2 (exec.c:1697)
==10008==    by 0x427FD2: execpline (exec.c:1484)
==10008==    by 0x42779A: execlist (exec.c:1275)
==10008==    by 0x42717C: execode (exec.c:1073)
==10008==    by 0x431299: runshfunc (exec.c:5040)
==10008==    by 0x430E76: doshfunc (exec.c:4920)
==10008==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10008== 
==10008== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10009-by-pythonnut-on-???
==10009== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10009-by-pythonnut-on-???
==10009== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10009-by-pythonnut-on-???
==10009== 
==10009== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10009== don't want to do, unless you know exactly what you're doing,
==10009== or are doing some strange experiment):
==10009==   /usr/lib/valgrind/../../bin/vgdb --pid=10009 ...command...
==10009== 
==10009== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10009==   /path/to/gdb ./zsh
==10009== and then give GDB the following command
==10009==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10009
==10009== --pid is optional if only one valgrind process is running
==10009== 
==10010== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10010-by-pythonnut-on-???
==10010== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10010-by-pythonnut-on-???
==10010== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10010-by-pythonnut-on-???
==10010== 
==10010== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10010== don't want to do, unless you know exactly what you're doing,
==10010== or are doing some strange experiment):
==10010==   /usr/lib/valgrind/../../bin/vgdb --pid=10010 ...command...
==10010== 
==10010== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10010==   /path/to/gdb ./zsh
==10010== and then give GDB the following command
==10010==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10010
==10010== --pid is optional if only one valgrind process is running
==10010== 
==9906== Checked 4,768,520 bytes
==9906== 
--10011-- Caught __NR_exit; running __libc_freeres()
--10009-- Caught __NR_exit; running __libc_freeres()
==9906== LEAK SUMMARY:
==9906==    definitely lost: 2,189 bytes in 12 blocks
==9906==    indirectly lost: 6,756 bytes in 7 blocks
==9906==      possibly lost: 0 bytes in 0 blocks
==9906==    still reachable: 3,103,844 bytes in 68,912 blocks
==9906==         suppressed: 0 bytes in 0 blocks
==9906== Rerun with --leak-check=full to see details of leaked memory
==9906== 
==9906== Use --track-origins=yes to see where uninitialised values come from
==9906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9906== 
==9906== 1 errors in context 1 of 2:
==9906== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9906==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9906==    by 0x488CD0: stringsubst (subst.c:301)
==9906==    by 0x48801B: prefork (subst.c:77)
==9906==    by 0x42B318: execcmd (exec.c:2619)
==9906==    by 0x428CA0: execpline2 (exec.c:1697)
==9906==    by 0x427FD2: execpline (exec.c:1484)
==9906==    by 0x427756: execlist (exec.c:1267)
==9906==    by 0x42717C: execode (exec.c:1073)
==9906==    by 0x431299: runshfunc (exec.c:5040)
==9906==    by 0x430E76: doshfunc (exec.c:4920)
==9906==    by 0x4302FB: execshfunc (exec.c:4557)
==9906==    by 0x42D8C1: execcmd (exec.c:3373)
==9906== 
==9906== 
==9906== 2 errors in context 2 of 2:
==9906== Conditional jump or move depends on uninitialised value(s)
==9906==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9906==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9906==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9906==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9906==    by 0x42D8E9: execcmd (exec.c:3378)
==9906==    by 0x428CA0: execpline2 (exec.c:1697)
==9906==    by 0x427FD2: execpline (exec.c:1484)
==9906==    by 0x42779A: execlist (exec.c:1275)
==9906==    by 0x42717C: execode (exec.c:1073)
==9906==    by 0x431299: runshfunc (exec.c:5040)
==9906==    by 0x430E76: doshfunc (exec.c:4920)
==9906==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9906== 
==9906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10011== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10011-by-pythonnut-on-???
==10011== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10011-by-pythonnut-on-???
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==10011== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10011-by-pythonnut-on-???
==10011== 
==10011== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10011== don't want to do, unless you know exactly what you're doing,
==10011== or are doing some strange experiment):
==10011==   /usr/lib/valgrind/../../bin/vgdb --pid=10011 ...command...
==10011== 
==10011== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10011==   /path/to/gdb ./zsh
==10011== and then give GDB the following command
==10011==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10011
==10011== --pid is optional if only one valgrind process is running
==10011== 
--10011-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10013== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10013-by-pythonnut-on-???
==10013== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10013-by-pythonnut-on-???
==10013== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10013-by-pythonnut-on-???
==10013== 
==10013== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10013== don't want to do, unless you know exactly what you're doing,
==10013== or are doing some strange experiment):
==10013==   /usr/lib/valgrind/../../bin/vgdb --pid=10013 ...command...
==10013== 
==10013== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10013==   /path/to/gdb ./zsh
==10013== and then give GDB the following command
==10013==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10013
==10013== --pid is optional if only one valgrind process is running
==10013== 
--10009-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10011== 
==10011== HEAP SUMMARY:
==10011==     in use at exit: 3,124,601 bytes in 69,169 blocks
==10011==   total heap usage: 1,594,304 allocs, 1,525,135 frees, 128,640,509 bytes allocated
==10011== 
==10009== 
==10015== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10015-by-pythonnut-on-???
==10015== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10015-by-pythonnut-on-???
==10015== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10015-by-pythonnut-on-???
==10015== 
==10015== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10015== don't want to do, unless you know exactly what you're doing,
==10015== or are doing some strange experiment):
==10015==   /usr/lib/valgrind/../../bin/vgdb --pid=10015 ...command...
==10015== 
==10015== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10015==   /path/to/gdb ./zsh
==10015== and then give GDB the following command
==10015==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10015
==10015== --pid is optional if only one valgrind process is running
==10015== 
==10009== HEAP SUMMARY:
==10009==     in use at exit: 3,153,741 bytes in 69,133 blocks
==10009==   total heap usage: 1,592,204 allocs, 1,523,071 frees, 128,618,029 bytes allocated
==10009== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==10014== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10014-by-pythonnut-on-???
==10014== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10014-by-pythonnut-on-???
==10014== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10014-by-pythonnut-on-???
==10014== 
==10014== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10014== don't want to do, unless you know exactly what you're doing,
==10014== or are doing some strange experiment):
==10014==   /usr/lib/valgrind/../../bin/vgdb --pid=10014 ...command...
==10014== 
==10014== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10014==   /path/to/gdb ./zsh
==10014== and then give GDB the following command
==10014==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10014
==10014== --pid is optional if only one valgrind process is running
==10014== 
--10014-- Caught __NR_exit; running __libc_freeres()
==10011== Searching for pointers to 69,169 not-freed blocks
--10011--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10011--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10011--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10011--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10011--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10011--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10011--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10011--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10011--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10011--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10011--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10011--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10011--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10011--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10011--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10011--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10011--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10011--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10011--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10011--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10011--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10011--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10011--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10011--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10011--   Scanning root segment: 0x701a000..0x701afff (4096)
--10011--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10011--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10011--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10011--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10011--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10011--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10011--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10011--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10011--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10011--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10009== Searching for pointers to 69,133 not-freed blocks
--10009--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10009--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10009--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10009--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10009--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10009--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10009--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10009--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10009--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10009--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10009--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10009--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10009--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10009--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10009--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10009--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10009--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10009--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10009--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10009--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10009--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10009--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10009--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10009--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10009--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10009--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10009--   Scanning root segment: 0x701a000..0x701afff (4096)
--10009--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10009--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10009--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10009--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10009--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10009--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10009--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10009--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10009--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10009--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10009--   Scanning root segment: 0xbe86000..0xbe99fff (81920)
--10009--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10014-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10014== 
==10014== HEAP SUMMARY:
==10014==     in use at exit: 3,113,357 bytes in 68,943 blocks
==10014==   total heap usage: 1,592,129 allocs, 1,523,186 frees, 128,585,032 bytes allocated
==10014== 
==10014== Searching for pointers to 68,943 not-freed blocks
--10014--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10014--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10014--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10014--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10014--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10014--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10014--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10014--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10014--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10014--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10014--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10014--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10014--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10014--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10014--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10014--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10014--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10014--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10014--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10014--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10014--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10014--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10014--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10014--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10014--   Scanning root segment: 0x701a000..0x701afff (4096)
--10014--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10014--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10014--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10014--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10014--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10014--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10014--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10014--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10014--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10014--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10011== Checked 4,785,832 bytes
==10011== 
==10011== LEAK SUMMARY:
==10011==    definitely lost: 2,197 bytes in 13 blocks
==10011==    indirectly lost: 6,756 bytes in 7 blocks
==10011==      possibly lost: 0 bytes in 0 blocks
==10011==    still reachable: 3,115,648 bytes in 69,149 blocks
==10011==         suppressed: 0 bytes in 0 blocks
==10011== Rerun with --leak-check=full to see details of leaked memory
==10011== 
==10011== Use --track-origins=yes to see where uninitialised values come from
==10011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10011== 
==10011== 1 errors in context 1 of 2:
==10011== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10011==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10011==    by 0x488CD0: stringsubst (subst.c:301)
==10011==    by 0x48801B: prefork (subst.c:77)
==10011==    by 0x42B318: execcmd (exec.c:2619)
==10011==    by 0x428CA0: execpline2 (exec.c:1697)
==10011==    by 0x427FD2: execpline (exec.c:1484)
==10011==    by 0x427756: execlist (exec.c:1267)
==10011==    by 0x42717C: execode (exec.c:1073)
==10011==    by 0x431299: runshfunc (exec.c:5040)
==10011==    by 0x430E76: doshfunc (exec.c:4920)
==10011==    by 0x4302FB: execshfunc (exec.c:4557)
==10011==    by 0x42D8C1: execcmd (exec.c:3373)
==10011== 
==10011== 
==10011== 2 errors in context 2 of 2:
==10011== Conditional jump or move depends on uninitialised value(s)
==10011==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10011==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10011==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10011==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10011==    by 0x42D8E9: execcmd (exec.c:3378)
==10011==    by 0x428CA0: execpline2 (exec.c:1697)
==10011==    by 0x427FD2: execpline (exec.c:1484)
==10011==    by 0x42779A: execlist (exec.c:1275)
==10011==    by 0x42717C: execode (exec.c:1073)
==10011==    by 0x431299: runshfunc (exec.c:5040)
==10011==    by 0x430E76: doshfunc (exec.c:4920)
==10011==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10011== 
==10011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== Checked 5,386,464 bytes
==10009== 
--10010-- Caught __NR_exit; running __libc_freeres()
==10009== LEAK SUMMARY:
==10009==    definitely lost: 2,189 bytes in 12 blocks
==10009==    indirectly lost: 6,756 bytes in 7 blocks
==10009==      possibly lost: 0 bytes in 0 blocks
==10009==    still reachable: 3,144,796 bytes in 69,114 blocks
==10009==         suppressed: 0 bytes in 0 blocks
==10009== Rerun with --leak-check=full to see details of leaked memory
==10009== 
==10009== Use --track-origins=yes to see where uninitialised values come from
==10009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10009== 
==10009== 1 errors in context 1 of 2:
==10009== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10009==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10009==    by 0x488CD0: stringsubst (subst.c:301)
==10009==    by 0x48801B: prefork (subst.c:77)
==10009==    by 0x42B318: execcmd (exec.c:2619)
==10009==    by 0x428CA0: execpline2 (exec.c:1697)
==10009==    by 0x427FD2: execpline (exec.c:1484)
==10009==    by 0x427756: execlist (exec.c:1267)
==10009==    by 0x42717C: execode (exec.c:1073)
==10009==    by 0x431299: runshfunc (exec.c:5040)
==10009==    by 0x430E76: doshfunc (exec.c:4920)
==10009==    by 0x4302FB: execshfunc (exec.c:4557)
==10009==    by 0x42D8C1: execcmd (exec.c:3373)
==10009== 
==10009== 
==10009== 2 errors in context 2 of 2:
==10009== Conditional jump or move depends on uninitialised value(s)
==10009==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10009==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10009==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10009==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10009==    by 0x42D8E9: execcmd (exec.c:3378)
==10009==    by 0x428CA0: execpline2 (exec.c:1697)
==10009==    by 0x427FD2: execpline (exec.c:1484)
==10009==    by 0x42779A: execlist (exec.c:1275)
==10009==    by 0x42717C: execode (exec.c:1073)
==10009==    by 0x431299: runshfunc (exec.c:5040)
==10009==    by 0x430E76: doshfunc (exec.c:4920)
==10009==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10009== 
==10009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10010-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10014== Checked 4,771,136 bytes
==10010== 
==10014== 
==10010== HEAP SUMMARY:
==10010==     in use at exit: 3,124,537 bytes in 69,166 blocks
==10010==   total heap usage: 1,594,302 allocs, 1,525,136 frees, 128,640,268 bytes allocated
==10010== 
--10016-- Caught __NR_exit; running __libc_freeres()
==10016== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10016-by-pythonnut-on-???
==10016== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10016-by-pythonnut-on-???
==10016== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10016-by-pythonnut-on-???
==10016== 
==10016== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10016== don't want to do, unless you know exactly what you're doing,
==10016== or are doing some strange experiment):
==10016==   /usr/lib/valgrind/../../bin/vgdb --pid=10016 ...command...
==10016== 
==10016== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10016==   /path/to/gdb ./zsh
==10016== and then give GDB the following command
==10016==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10016
==10016== --pid is optional if only one valgrind process is running
==10016== 
==10014== LEAK SUMMARY:
==10014==    definitely lost: 2,189 bytes in 12 blocks
==10014==    indirectly lost: 6,756 bytes in 7 blocks
==10014==      possibly lost: 0 bytes in 0 blocks
==10014==    still reachable: 3,104,412 bytes in 68,924 blocks
==10014==         suppressed: 0 bytes in 0 blocks
==10014== Rerun with --leak-check=full to see details of leaked memory
==10014== 
==10014== Use --track-origins=yes to see where uninitialised values come from
==10014== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10014== 
==10014== 1 errors in context 1 of 2:
==10014== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10014==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10014==    by 0x488CD0: stringsubst (subst.c:301)
==10014==    by 0x48801B: prefork (subst.c:77)
==10014==    by 0x42B318: execcmd (exec.c:2619)
==10014==    by 0x428CA0: execpline2 (exec.c:1697)
==10014==    by 0x427FD2: execpline (exec.c:1484)
==10014==    by 0x427756: execlist (exec.c:1267)
==10014==    by 0x42717C: execode (exec.c:1073)
==10014==    by 0x431299: runshfunc (exec.c:5040)
==10014==    by 0x430E76: doshfunc (exec.c:4920)
==10014==    by 0x4302FB: execshfunc (exec.c:4557)
==10014==    by 0x42D8C1: execcmd (exec.c:3373)
==10014== 
==10014== 
==10014== 2 errors in context 2 of 2:
==10014== Conditional jump or move depends on uninitialised value(s)
==10014==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10014==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10014==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10014==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10014==    by 0x42D8E9: execcmd (exec.c:3378)
==10014==    by 0x428CA0: execpline2 (exec.c:1697)
==10014==    by 0x427FD2: execpline (exec.c:1484)
==10014==    by 0x42779A: execlist (exec.c:1275)
==10014==    by 0x42717C: execode (exec.c:1073)
==10014==    by 0x431299: runshfunc (exec.c:5040)
==10014==    by 0x430E76: doshfunc (exec.c:4920)
==10014==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10014== 
==10014== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10016-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10010== Searching for pointers to 69,166 not-freed blocks
--10010--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10010--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10010--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10010--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10010--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10010--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10010--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10010--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10010--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10010--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10010--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10010--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10010--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10010--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10010--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10010--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10010--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10010--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10010--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10010--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10010--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10010--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10010--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10010--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10010--   Scanning root segment: 0x701a000..0x701afff (4096)
--10010--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10010--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10010--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10010--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10010--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10010--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10010--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10010--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10010--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10010--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10016== 
==10016== HEAP SUMMARY:
==10016==     in use at exit: 3,144,080 bytes in 69,928 blocks
==10016==   total heap usage: 1,593,029 allocs, 1,523,101 frees, 128,633,903 bytes allocated
==10016== 
client request: code 4d430005,  addr 0xFFEFF2AEC,  len 4
==10016== Searching for pointers to 69,928 not-freed blocks
--10016--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10016--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10016--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10016--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10016--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10016--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10016--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10016--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10016--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10016--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10016--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10016--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10016--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10016--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10016--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10016--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10016--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10016--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10016--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10016--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10016--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10016--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10016--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10016--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10016--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10016--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10016--   Scanning root segment: 0x701a000..0x701afff (4096)
--10016--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10016--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10016--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10016--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10016--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10016--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10016--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10016--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10016--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10016--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10016--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10016--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10010== Checked 4,785,144 bytes
==10010== 
==10010== LEAK SUMMARY:
==10010==    definitely lost: 2,197 bytes in 13 blocks
==10010==    indirectly lost: 6,756 bytes in 7 blocks
==10010==      possibly lost: 0 bytes in 0 blocks
==10010==    still reachable: 3,115,584 bytes in 69,146 blocks
==10010==         suppressed: 0 bytes in 0 blocks
==10010== Rerun with --leak-check=full to see details of leaked memory
==10010== 
==10010== Use --track-origins=yes to see where uninitialised values come from
==10010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10010== 
==10010== 1 errors in context 1 of 2:
==10010== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10010==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10010==    by 0x488CD0: stringsubst (subst.c:301)
==10010==    by 0x48801B: prefork (subst.c:77)
==10010==    by 0x42B318: execcmd (exec.c:2619)
==10010==    by 0x428CA0: execpline2 (exec.c:1697)
==10010==    by 0x427FD2: execpline (exec.c:1484)
==10010==    by 0x427756: execlist (exec.c:1267)
==10010==    by 0x42717C: execode (exec.c:1073)
==10010==    by 0x431299: runshfunc (exec.c:5040)
==10010==    by 0x430E76: doshfunc (exec.c:4920)
==10010==    by 0x4302FB: execshfunc (exec.c:4557)
==10010==    by 0x42D8C1: execcmd (exec.c:3373)
==10010== 
==10010== 
==10010== 2 errors in context 2 of 2:
==10010== Conditional jump or move depends on uninitialised value(s)
==10010==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10010==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10010==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10010==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10010==    by 0x42D8E9: execcmd (exec.c:3378)
==10010==    by 0x428CA0: execpline2 (exec.c:1697)
==10010==    by 0x427FD2: execpline (exec.c:1484)
==10010==    by 0x42779A: execlist (exec.c:1275)
==10010==    by 0x42717C: execode (exec.c:1073)
==10010==    by 0x431299: runshfunc (exec.c:5040)
==10010==    by 0x430E76: doshfunc (exec.c:4920)
==10010==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10010== 
==10010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10016== Checked 5,700,080 bytes
==10016== 
--10017-- Caught __NR_exit; running __libc_freeres()
--10065-- Caught __NR_exit; running __libc_freeres()
==10065== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10065-by-pythonnut-on-???
==10065== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10065-by-pythonnut-on-???
==10065== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10065-by-pythonnut-on-???
==10065== 
==10065== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10065== don't want to do, unless you know exactly what you're doing,
==10065== or are doing some strange experiment):
==10065==   /usr/lib/valgrind/../../bin/vgdb --pid=10065 ...command...
==10065== 
==10065== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10065==   /path/to/gdb ./zsh
==10065== and then give GDB the following command
==10065==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10065
==10065== --pid is optional if only one valgrind process is running
==10065== 
==10017== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10017-by-pythonnut-on-???
==10017== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10017-by-pythonnut-on-???
==10017== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10017-by-pythonnut-on-???
==10017== 
==10017== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10017== don't want to do, unless you know exactly what you're doing,
==10017== or are doing some strange experiment):
==10017==   /usr/lib/valgrind/../../bin/vgdb --pid=10017 ...command...
==10017== 
==10017== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10017==   /path/to/gdb ./zsh
==10017== and then give GDB the following command
==10017==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10017
==10017== --pid is optional if only one valgrind process is running
==10017== 
==10016== LEAK SUMMARY:
==10016==    definitely lost: 2,189 bytes in 12 blocks
==10016==    indirectly lost: 6,756 bytes in 7 blocks
==10016==      possibly lost: 0 bytes in 0 blocks
==10016==    still reachable: 3,135,135 bytes in 69,909 blocks
==10016==         suppressed: 0 bytes in 0 blocks
==10016== Rerun with --leak-check=full to see details of leaked memory
==10016== 
==10016== Use --track-origins=yes to see where uninitialised values come from
==10016== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10016== 
==10016== 1 errors in context 1 of 2:
==10016== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10016==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10016==    by 0x488CD0: stringsubst (subst.c:301)
==10016==    by 0x48801B: prefork (subst.c:77)
==10016==    by 0x42B318: execcmd (exec.c:2619)
==10016==    by 0x428CA0: execpline2 (exec.c:1697)
==10016==    by 0x427FD2: execpline (exec.c:1484)
==10016==    by 0x427756: execlist (exec.c:1267)
==10016==    by 0x42717C: execode (exec.c:1073)
==10016==    by 0x431299: runshfunc (exec.c:5040)
==10016==    by 0x430E76: doshfunc (exec.c:4920)
==10016==    by 0x4302FB: execshfunc (exec.c:4557)
==10016==    by 0x42D8C1: execcmd (exec.c:3373)
==10016== 
==10016== 
==10016== 2 errors in context 2 of 2:
==10016== Conditional jump or move depends on uninitialised value(s)
==10016==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10016==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10016==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10016==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10016==    by 0x42D8E9: execcmd (exec.c:3378)
==10016==    by 0x428CA0: execpline2 (exec.c:1697)
==10016==    by 0x427FD2: execpline (exec.c:1484)
==10016==    by 0x42779A: execlist (exec.c:1275)
==10016==    by 0x42717C: execode (exec.c:1073)
==10016==    by 0x431299: runshfunc (exec.c:5040)
==10016==    by 0x430E76: doshfunc (exec.c:4920)
==10016==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10016== 
==10016== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10017-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10065-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10065== 
==10017== 
==10065== HEAP SUMMARY:
==10065==     in use at exit: 3,124,544 bytes in 69,166 blocks
==10065==   total heap usage: 1,594,317 allocs, 1,525,151 frees, 128,645,266 bytes allocated
==10065== 
==10017== HEAP SUMMARY:
==10017==     in use at exit: 3,113,716 bytes in 68,951 blocks
==10017==   total heap usage: 1,592,144 allocs, 1,523,193 frees, 128,589,047 bytes allocated
==10017== 
==10068== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10068-by-pythonnut-on-???
==10068== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10068-by-pythonnut-on-???
==10068== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10068-by-pythonnut-on-???
==10068== 
==10068== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10068== don't want to do, unless you know exactly what you're doing,
==10068== or are doing some strange experiment):
==10068==   /usr/lib/valgrind/../../bin/vgdb --pid=10068 ...command...
==10068== 
==10068== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10068==   /path/to/gdb ./zsh
==10068== and then give GDB the following command
==10068==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10068
==10068== --pid is optional if only one valgrind process is running
==10068== 
--10068-- Caught __NR_exit; running __libc_freeres()
==10065== Searching for pointers to 69,166 not-freed blocks
--10065--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10065--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10065--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10065--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10065--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10065--   Scanning root segment: 0x4223000..0x4223fff (4096)
==10017== Searching for pointers to 68,951 not-freed blocks
--10017--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10065--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10065--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10065--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10065--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10017--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10065--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10065--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10065--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10065--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10065--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10065--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10065--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10065--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10065--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10065--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10017--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10017--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10017--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10017--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10065--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10017--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10017--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10017--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10065--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10017--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10017--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10017--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10065--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10017--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10065--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10017--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10017--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10017--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10065--   Scanning root segment: 0x701a000..0x701afff (4096)
--10017--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10065--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10065--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10017--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10065--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10017--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10065--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10017--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10065--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10065--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10065--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10065--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10065--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10065--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10017--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10017--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10017--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10017--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10017--   Scanning root segment: 0x701a000..0x701afff (4096)
--10017--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10017--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10017--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10017--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10017--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10017--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10017--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10017--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10017--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10017--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10068-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10068== 
==10068== HEAP SUMMARY:
==10068==     in use at exit: 3,144,192 bytes in 69,929 blocks
==10068==   total heap usage: 1,593,047 allocs, 1,523,118 frees, 128,638,745 bytes allocated
==10068== 
==10068== Searching for pointers to 69,929 not-freed blocks
--10068--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10068--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10068--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10068--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10068--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10068--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10068--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10068--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10068--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10068--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10068--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10068--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10068--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10068--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10068--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10068--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10068--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10068--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10068--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10068--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10068--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10068--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10068--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10068--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10068--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10068--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10068--   Scanning root segment: 0x701a000..0x701afff (4096)
--10068--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10068--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10068--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10068--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10068--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10068--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10068--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10068--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10068--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10068--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10068--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10068--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10065== Checked 4,785,280 bytes
==10065== 
==10017== Checked 4,771,200 bytes
==10017== 
==10065== LEAK SUMMARY:
==10065==    definitely lost: 2,197 bytes in 13 blocks
==10065==    indirectly lost: 6,756 bytes in 7 blocks
==10065==      possibly lost: 0 bytes in 0 blocks
==10065==    still reachable: 3,115,591 bytes in 69,146 blocks
==10065==         suppressed: 0 bytes in 0 blocks
==10065== Rerun with --leak-check=full to see details of leaked memory
==10065== 
==10065== Use --track-origins=yes to see where uninitialised values come from
==10065== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10065== 
==10065== 1 errors in context 1 of 2:
==10065== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10065==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10065==    by 0x488CD0: stringsubst (subst.c:301)
==10065==    by 0x48801B: prefork (subst.c:77)
==10065==    by 0x42B318: execcmd (exec.c:2619)
==10065==    by 0x428CA0: execpline2 (exec.c:1697)
==10065==    by 0x427FD2: execpline (exec.c:1484)
==10065==    by 0x427756: execlist (exec.c:1267)
==10065==    by 0x42717C: execode (exec.c:1073)
==10065==    by 0x431299: runshfunc (exec.c:5040)
==10065==    by 0x430E76: doshfunc (exec.c:4920)
==10065==    by 0x4302FB: execshfunc (exec.c:4557)
==10065==    by 0x42D8C1: execcmd (exec.c:3373)
==10065== 
==10065== 
==10065== 2 errors in context 2 of 2:
==10065== Conditional jump or move depends on uninitialised value(s)
==10065==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10065==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10065==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10065==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10065==    by 0x42D8E9: execcmd (exec.c:3378)
==10065==    by 0x428CA0: execpline2 (exec.c:1697)
==10065==    by 0x427FD2: execpline (exec.c:1484)
==10065==    by 0x42779A: execlist (exec.c:1275)
==10065==    by 0x42717C: execode (exec.c:1073)
==10065==    by 0x431299: runshfunc (exec.c:5040)
==10065==    by 0x430E76: doshfunc (exec.c:4920)
==10065==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10065== 
==10065== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10017== LEAK SUMMARY:
==10017==    definitely lost: 2,189 bytes in 12 blocks
==10017==    indirectly lost: 6,756 bytes in 7 blocks
==10017==      possibly lost: 0 bytes in 0 blocks
==10017==    still reachable: 3,104,771 bytes in 68,932 blocks
==10017==         suppressed: 0 bytes in 0 blocks
==10017== Rerun with --leak-check=full to see details of leaked memory
==10017== 
==10017== Use --track-origins=yes to see where uninitialised values come from
==10017== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10017== 
==10017== 1 errors in context 1 of 2:
==10017== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10017==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10017==    by 0x488CD0: stringsubst (subst.c:301)
==10017==    by 0x48801B: prefork (subst.c:77)
==10017==    by 0x42B318: execcmd (exec.c:2619)
==10017==    by 0x428CA0: execpline2 (exec.c:1697)
==10017==    by 0x427FD2: execpline (exec.c:1484)
==10017==    by 0x427756: execlist (exec.c:1267)
==10017==    by 0x42717C: execode (exec.c:1073)
==10017==    by 0x431299: runshfunc (exec.c:5040)
==10017==    by 0x430E76: doshfunc (exec.c:4920)
==10017==    by 0x4302FB: execshfunc (exec.c:4557)
==10017==    by 0x42D8C1: execcmd (exec.c:3373)
==10017== 
==10017== 
==10017== 2 errors in context 2 of 2:
==10017== Conditional jump or move depends on uninitialised value(s)
==10017==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10017==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10017==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10017==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10017==    by 0x42D8E9: execcmd (exec.c:3378)
==10017==    by 0x428CA0: execpline2 (exec.c:1697)
==10017==    by 0x427FD2: execpline (exec.c:1484)
==10017==    by 0x42779A: execlist (exec.c:1275)
==10017==    by 0x42717C: execode (exec.c:1073)
==10017==    by 0x431299: runshfunc (exec.c:5040)
==10017==    by 0x430E76: doshfunc (exec.c:4920)
==10017==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10017== 
==10017== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10013-- Caught __NR_exit; running __libc_freeres()
--10069-- Caught __NR_exit; running __libc_freeres()
==10068== Checked 5,700,184 bytes
==10068== 
--10013-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10069== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10069-by-pythonnut-on-???
==10069== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10069-by-pythonnut-on-???
==10069== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10069-by-pythonnut-on-???
==10069== 
==10069== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10069== don't want to do, unless you know exactly what you're doing,
==10069== or are doing some strange experiment):
==10069==   /usr/lib/valgrind/../../bin/vgdb --pid=10069 ...command...
==10069== 
==10069== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10069==   /path/to/gdb ./zsh
==10069== and then give GDB the following command
==10069==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10069
==10069== --pid is optional if only one valgrind process is running
==10069== 
==10013== 
==10013== HEAP SUMMARY:
==10013==     in use at exit: 3,112,854 bytes in 68,932 blocks
==10013==   total heap usage: 1,592,153 allocs, 1,523,221 frees, 128,591,050 bytes allocated
==10013== 
==10068== LEAK SUMMARY:
==10068==    definitely lost: 2,189 bytes in 12 blocks
==10068==    indirectly lost: 6,756 bytes in 7 blocks
==10068==      possibly lost: 0 bytes in 0 blocks
==10068==    still reachable: 3,135,247 bytes in 69,910 blocks
==10068==         suppressed: 0 bytes in 0 blocks
==10068== Rerun with --leak-check=full to see details of leaked memory
==10068== 
==10068== Use --track-origins=yes to see where uninitialised values come from
==10068== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10068== 
==10068== 1 errors in context 1 of 2:
==10068== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10068==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10068==    by 0x488CD0: stringsubst (subst.c:301)
==10068==    by 0x48801B: prefork (subst.c:77)
==10068==    by 0x42B318: execcmd (exec.c:2619)
==10068==    by 0x428CA0: execpline2 (exec.c:1697)
==10068==    by 0x427FD2: execpline (exec.c:1484)
==10068==    by 0x427756: execlist (exec.c:1267)
==10068==    by 0x42717C: execode (exec.c:1073)
==10068==    by 0x431299: runshfunc (exec.c:5040)
==10068==    by 0x430E76: doshfunc (exec.c:4920)
==10068==    by 0x4302FB: execshfunc (exec.c:4557)
==10068==    by 0x42D8C1: execcmd (exec.c:3373)
==10068== 
==10068== 
==10068== 2 errors in context 2 of 2:
==10068== Conditional jump or move depends on uninitialised value(s)
==10068==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10068==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10068==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10068==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10068==    by 0x42D8E9: execcmd (exec.c:3378)
==10068==    by 0x428CA0: execpline2 (exec.c:1697)
==10068==    by 0x427FD2: execpline (exec.c:1484)
==10068==    by 0x42779A: execlist (exec.c:1275)
==10068==    by 0x42717C: execode (exec.c:1073)
==10068==    by 0x431299: runshfunc (exec.c:5040)
==10068==    by 0x430E76: doshfunc (exec.c:4920)
==10068==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10068== 
==10068== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10069-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10069== 
==10069== HEAP SUMMARY:
==10069==     in use at exit: 3,124,640 bytes in 69,166 blocks
==10069==   total heap usage: 1,594,333 allocs, 1,525,167 frees, 128,650,053 bytes allocated
==10069== 
==10070== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10070-by-pythonnut-on-???
==10070== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10070-by-pythonnut-on-???
==10070== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10070-by-pythonnut-on-???
==10070== 
==10070== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10070== don't want to do, unless you know exactly what you're doing,
==10070== or are doing some strange experiment):
==10070==   /usr/lib/valgrind/../../bin/vgdb --pid=10070 ...command...
==10070== 
==10070== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10070==   /path/to/gdb ./zsh
==10070== and then give GDB the following command
==10070==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10070
==10070== --pid is optional if only one valgrind process is running
==10070== 
==10013== Searching for pointers to 68,932 not-freed blocks
--10013--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10013--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10013--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10013--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10013--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10013--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10013--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10013--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10013--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10013--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10013--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10013--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10013--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10013--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10013--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10013--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10013--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10013--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10013--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10070-- Caught __NR_exit; running __libc_freeres()
--10013--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10013--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10013--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10013--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10013--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10013--   Scanning root segment: 0x701a000..0x701afff (4096)
--10013--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10013--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10013--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10013--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10013--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10013--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10013--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10013--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10013--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10013--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10069== Searching for pointers to 69,166 not-freed blocks
--10069--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10069--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10069--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10069--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10069--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10069--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10069--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10069--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10069--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10069--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10069--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10069--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10069--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10069--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10069--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10069--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10069--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10069--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10069--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10069--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10069--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10069--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10069--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10069--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10069--   Scanning root segment: 0x701a000..0x701afff (4096)
--10069--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10069--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10069--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10069--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10069--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10069--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10069--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10069--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10069--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10069--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10070-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10070== 
==10070== HEAP SUMMARY:
==10070==     in use at exit: 3,144,192 bytes in 69,929 blocks
==10070==   total heap usage: 1,593,062 allocs, 1,523,133 frees, 128,643,454 bytes allocated
==10070== 
==10070== Searching for pointers to 69,929 not-freed blocks
--10070--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10070--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10070--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10070--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10070--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10070--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10070--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10070--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10070--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10070--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10070--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10070--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10070--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10070--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10070--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10070--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10070--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10070--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10070--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10070--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10070--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10070--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10070--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10070--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10070--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10070--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10070--   Scanning root segment: 0x701a000..0x701afff (4096)
--10070--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10070--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10070--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10070--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10070--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10070--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10070--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10070--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10070--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10070--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10070--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
--10070--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10013== Checked 4,768,584 bytes
==10013== 
==10069== Checked 4,784,560 bytes
==10069== 
==10013== LEAK SUMMARY:
==10013==    definitely lost: 2,189 bytes in 12 blocks
==10013==    indirectly lost: 6,756 bytes in 7 blocks
==10013==      possibly lost: 0 bytes in 0 blocks
==10013==    still reachable: 3,103,909 bytes in 68,913 blocks
==10013==         suppressed: 0 bytes in 0 blocks
==10013== Rerun with --leak-check=full to see details of leaked memory
==10013== 
==10013== Use --track-origins=yes to see where uninitialised values come from
==10013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10013== 
==10013== 1 errors in context 1 of 2:
==10013== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10013==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10013==    by 0x488CD0: stringsubst (subst.c:301)
==10013==    by 0x48801B: prefork (subst.c:77)
==10013==    by 0x42B318: execcmd (exec.c:2619)
==10013==    by 0x428CA0: execpline2 (exec.c:1697)
==10013==    by 0x427FD2: execpline (exec.c:1484)
==10013==    by 0x427756: execlist (exec.c:1267)
==10013==    by 0x42717C: execode (exec.c:1073)
==10013==    by 0x431299: runshfunc (exec.c:5040)
==10013==    by 0x430E76: doshfunc (exec.c:4920)
==10013==    by 0x4302FB: execshfunc (exec.c:4557)
==10013==    by 0x42D8C1: execcmd (exec.c:3373)
==10013== 
==10013== 
==10013== 2 errors in context 2 of 2:
==10013== Conditional jump or move depends on uninitialised value(s)
==10013==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10013==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10013==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10013==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10013==    by 0x42D8E9: execcmd (exec.c:3378)
==10013==    by 0x428CA0: execpline2 (exec.c:1697)
==10013==    by 0x427FD2: execpline (exec.c:1484)
==10013==    by 0x42779A: execlist (exec.c:1275)
==10013==    by 0x42717C: execode (exec.c:1073)
==10013==    by 0x431299: runshfunc (exec.c:5040)
==10013==    by 0x430E76: doshfunc (exec.c:4920)
==10013==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10013== 
==10013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10069== LEAK SUMMARY:
==10069==    definitely lost: 2,197 bytes in 13 blocks
==10069==    indirectly lost: 6,756 bytes in 7 blocks
==10069==      possibly lost: 0 bytes in 0 blocks
==10069==    still reachable: 3,115,687 bytes in 69,146 blocks
==10069==         suppressed: 0 bytes in 0 blocks
==10069== Rerun with --leak-check=full to see details of leaked memory
==10069== 
==10069== Use --track-origins=yes to see where uninitialised values come from
==10069== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10069== 
==10069== 1 errors in context 1 of 2:
==10069== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10069==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10069==    by 0x488CD0: stringsubst (subst.c:301)
==10069==    by 0x48801B: prefork (subst.c:77)
==10069==    by 0x42B318: execcmd (exec.c:2619)
==10069==    by 0x428CA0: execpline2 (exec.c:1697)
==10069==    by 0x427FD2: execpline (exec.c:1484)
==10069==    by 0x427756: execlist (exec.c:1267)
==10069==    by 0x42717C: execode (exec.c:1073)
==10069==    by 0x431299: runshfunc (exec.c:5040)
==10069==    by 0x430E76: doshfunc (exec.c:4920)
==10069==    by 0x4302FB: execshfunc (exec.c:4557)
==10069==    by 0x42D8C1: execcmd (exec.c:3373)
==10069== 
==10069== 
==10069== 2 errors in context 2 of 2:
==10069== Conditional jump or move depends on uninitialised value(s)
==10069==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10069==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10069==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10069==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10069==    by 0x42D8E9: execcmd (exec.c:3378)
==10069==    by 0x428CA0: execpline2 (exec.c:1697)
==10069==    by 0x427FD2: execpline (exec.c:1484)
==10069==    by 0x42779A: execlist (exec.c:1275)
==10069==    by 0x42717C: execode (exec.c:1073)
==10069==    by 0x431299: runshfunc (exec.c:5040)
==10069==    by 0x430E76: doshfunc (exec.c:4920)
==10069==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10069== 
==10069== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9900-- Caught __NR_exit; running __libc_freeres()
--9900-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10070== Checked 5,700,184 bytes
==10070== 
==9900== 
==9900== HEAP SUMMARY:
==9900==     in use at exit: 3,112,089 bytes in 68,919 blocks
==9900==   total heap usage: 1,592,188 allocs, 1,523,269 frees, 128,588,521 bytes allocated
==9900== 
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10070== LEAK SUMMARY:
==10070==    definitely lost: 2,189 bytes in 12 blocks
==10070==    indirectly lost: 6,756 bytes in 7 blocks
==10070==      possibly lost: 0 bytes in 0 blocks
==10070==    still reachable: 3,135,247 bytes in 69,910 blocks
==10070==         suppressed: 0 bytes in 0 blocks
==10070== Rerun with --leak-check=full to see details of leaked memory
==10070== 
==10070== Use --track-origins=yes to see where uninitialised values come from
==10070== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10070== 
==10070== 1 errors in context 1 of 2:
==10070== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10070==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10070==    by 0x488CD0: stringsubst (subst.c:301)
==10070==    by 0x48801B: prefork (subst.c:77)
==10070==    by 0x42B318: execcmd (exec.c:2619)
==10070==    by 0x428CA0: execpline2 (exec.c:1697)
==10070==    by 0x427FD2: execpline (exec.c:1484)
==10070==    by 0x427756: execlist (exec.c:1267)
==10070==    by 0x42717C: execode (exec.c:1073)
==10070==    by 0x431299: runshfunc (exec.c:5040)
==10070==    by 0x430E76: doshfunc (exec.c:4920)
==10070==    by 0x4302FB: execshfunc (exec.c:4557)
==10070==    by 0x42D8C1: execcmd (exec.c:3373)
==10070== 
==10070== 
==10070== 2 errors in context 2 of 2:
==10070== Conditional jump or move depends on uninitialised value(s)
==10070==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10070==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10070==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10070==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10070==    by 0x42D8E9: execcmd (exec.c:3378)
==10070==    by 0x428CA0: execpline2 (exec.c:1697)
==10070==    by 0x427FD2: execpline (exec.c:1484)
==10070==    by 0x42779A: execlist (exec.c:1275)
==10070==    by 0x42717C: execode (exec.c:1073)
==10070==    by 0x431299: runshfunc (exec.c:5040)
==10070==    by 0x430E76: doshfunc (exec.c:4920)
==10070==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10070== 
==10070== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9900== Searching for pointers to 68,919 not-freed blocks
--9900--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9900--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9900--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9900--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9900--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9900--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9900--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9900--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9900--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9900--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9900--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9900--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9900--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9900--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9900--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9900--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9900--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9900--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9900--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9900--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9900--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9900--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9900--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9900--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9900--   Scanning root segment: 0x701a000..0x701afff (4096)
--9900--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9900--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9900--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9900--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9900--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9900--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9900--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9900--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9900--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9900--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10073== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10073-by-pythonnut-on-???
==10073== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10073-by-pythonnut-on-???
==10073== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10073-by-pythonnut-on-???
==10073== 
==10073== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10073== don't want to do, unless you know exactly what you're doing,
==10073== or are doing some strange experiment):
==10073==   /usr/lib/valgrind/../../bin/vgdb --pid=10073 ...command...
==10073== 
==10073== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10073==   /path/to/gdb ./zsh
==10073== and then give GDB the following command
==10073==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10073
==10073== --pid is optional if only one valgrind process is running
==10073== 
--10073-- Caught __NR_exit; running __libc_freeres()
==10072== 
==10072== Process terminating with default action of signal 15 (SIGTERM)
==10072==    at 0x59EEDC7: kill (in /usr/lib/libc-2.20.so)
==10072==    by 0x4505D6: bin_kill (jobs.c:2451)
==10072==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10072==    by 0x42D8E9: execcmd (exec.c:3378)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x427756: execlist (exec.c:1267)
==10072==    by 0x45689D: execif (loop.c:525)
==10072==    by 0x42D731: execcmd (exec.c:3336)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x427756: execlist (exec.c:1267)
--10072-- Caught __NR_exit; running __libc_freeres()
==10072== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10072-by-pythonnut-on-???
==10072== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10072-by-pythonnut-on-???
==10072== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10072-by-pythonnut-on-???
==10072== 
==10072== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10072== don't want to do, unless you know exactly what you're doing,
==10072== or are doing some strange experiment):
==10072==   /usr/lib/valgrind/../../bin/vgdb --pid=10072 ...command...
==10072== 
==10072== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10072==   /path/to/gdb ./zsh
==10072== and then give GDB the following command
==10072==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10072
==10072== --pid is optional if only one valgrind process is running
==10072== 
==10074== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10074-by-pythonnut-on-???
==10074== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10074-by-pythonnut-on-???
==10074== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10074-by-pythonnut-on-???
==10074== 
==10074== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10074== don't want to do, unless you know exactly what you're doing,
==10074== or are doing some strange experiment):
==10074==   /usr/lib/valgrind/../../bin/vgdb --pid=10074 ...command...
==10074== 
==10074== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10074==   /path/to/gdb ./zsh
==10074== and then give GDB the following command
==10074==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10074
==10074== --pid is optional if only one valgrind process is running
==10074== 
--10073-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10073== 
--10072-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10073== HEAP SUMMARY:
==10073==     in use at exit: 3,144,192 bytes in 69,929 blocks
==10073==   total heap usage: 1,593,075 allocs, 1,523,146 frees, 128,648,157 bytes allocated
==10073== 
client request: code 4d430005,  addr 0xFFEFED0EC,  len 4
==10072== 
==10072== HEAP SUMMARY:
==10072==     in use at exit: 3,128,661 bytes in 69,244 blocks
==10072==   total heap usage: 1,594,711 allocs, 1,525,467 frees, 128,786,033 bytes allocated
==10072== 
==10076== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10076-by-pythonnut-on-???
==10076== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10076-by-pythonnut-on-???
==10076== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10076-by-pythonnut-on-???
==10076== 
==10076== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10076== don't want to do, unless you know exactly what you're doing,
==10076== or are doing some strange experiment):
==10076==   /usr/lib/valgrind/../../bin/vgdb --pid=10076 ...command...
==10076== 
==10076== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10076==   /path/to/gdb ./zsh
==10076== and then give GDB the following command
==10076==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10076
==10076== --pid is optional if only one valgrind process is running
==10076== 
--10076-- Caught __NR_exit; running __libc_freeres()
==10073== Searching for pointers to 69,929 not-freed blocks
--10073--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10073--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10073--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10073--   Scanning root segment: 0x4037000..0x4047fff (69632)
--10073--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10073--   Scanning root segment: 0x41d6000..0x421efff (299008)
--10073--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10073--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10073--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10073--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10073--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10073--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10073--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10073--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10073--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10073--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10073--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10073--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10073--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10073--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10073--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10073--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10073--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10073--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10073--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10073--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10073--   Scanning root segment: 0x701a000..0x701afff (4096)
--10073--   Scanning root segment: 0x881b000..0x8838fff (122880)
--10073--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10073--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10073--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10073--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10073--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10073--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10073--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10073--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10073--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10073--   Scanning root segment: 0xbe86000..0xbee8fff (405504)
==10072== Searching for pointers to 69,244 not-freed blocks
--10073--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10072--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10072--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10072--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10072--   Scanning root segment: 0x4037000..0x403afff (16384)
--10072--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10072--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10072--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10072--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10072--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10072--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10072--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10072--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10072--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10072--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10072--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10072--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10072--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10072--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10072--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10072--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10072--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10072--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10072--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10072--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10072--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10072--   Scanning root segment: 0x701a000..0x701afff (4096)
--10072--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10072--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10072--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10072--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10072--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10072--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10072--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10072--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10072--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10072--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9900== Checked 4,767,184 bytes
==9900== 
--10076-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10076== 
==10076== HEAP SUMMARY:
==10076==     in use at exit: 3,124,904 bytes in 69,172 blocks
==10076==   total heap usage: 1,594,861 allocs, 1,525,689 frees, 128,802,641 bytes allocated
==10076== 
==9900== LEAK SUMMARY:
==9900==    definitely lost: 2,189 bytes in 12 blocks
==9900==    indirectly lost: 6,756 bytes in 7 blocks
==9900==      possibly lost: 0 bytes in 0 blocks
==9900==    still reachable: 3,103,144 bytes in 68,900 blocks
==9900==         suppressed: 0 bytes in 0 blocks
==9900== Rerun with --leak-check=full to see details of leaked memory
==9900== 
==9900== Use --track-origins=yes to see where uninitialised values come from
==9900== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9900== 
==9900== 1 errors in context 1 of 2:
==9900== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9900==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9900==    by 0x488CD0: stringsubst (subst.c:301)
==9900==    by 0x48801B: prefork (subst.c:77)
==9900==    by 0x42B318: execcmd (exec.c:2619)
==9900==    by 0x428CA0: execpline2 (exec.c:1697)
==9900==    by 0x427FD2: execpline (exec.c:1484)
==9900==    by 0x427756: execlist (exec.c:1267)
==9900==    by 0x42717C: execode (exec.c:1073)
==9900==    by 0x431299: runshfunc (exec.c:5040)
==9900==    by 0x430E76: doshfunc (exec.c:4920)
==9900==    by 0x4302FB: execshfunc (exec.c:4557)
==9900==    by 0x42D8C1: execcmd (exec.c:3373)
==9900== 
==9900== 
==9900== 2 errors in context 2 of 2:
==9900== Conditional jump or move depends on uninitialised value(s)
==9900==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9900==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9900==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9900==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9900==    by 0x42D8E9: execcmd (exec.c:3378)
==9900==    by 0x428CA0: execpline2 (exec.c:1697)
==9900==    by 0x427FD2: execpline (exec.c:1484)
==9900==    by 0x42779A: execlist (exec.c:1275)
==9900==    by 0x42717C: execode (exec.c:1073)
==9900==    by 0x431299: runshfunc (exec.c:5040)
==9900==    by 0x430E76: doshfunc (exec.c:4920)
==9900==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9900== 
==9900== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10076== Searching for pointers to 69,172 not-freed blocks
--10076--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10076--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10076--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10076--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10076--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10076--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10076--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10076--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10076--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10076--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10076--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10076--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10076--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10076--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10076--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10076--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10076--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10076--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10076--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10076--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10076--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10076--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10076--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10076--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10076--   Scanning root segment: 0x701a000..0x701afff (4096)
--10076--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10076--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10076--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10076--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10076--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10076--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10076--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10076--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10076--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10076--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10073== Checked 5,700,184 bytes
==10073== 
==10072== Checked 4,808,368 bytes
==10072== 
==10073== LEAK SUMMARY:
==10073==    definitely lost: 2,189 bytes in 12 blocks
==10073==    indirectly lost: 6,756 bytes in 7 blocks
==10073==      possibly lost: 0 bytes in 0 blocks
==10073==    still reachable: 3,135,247 bytes in 69,910 blocks
==10073==         suppressed: 0 bytes in 0 blocks
==10073== Rerun with --leak-check=full to see details of leaked memory
==10073== 
==10073== Use --track-origins=yes to see where uninitialised values come from
==10073== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10073== 
==10073== 1 errors in context 1 of 2:
==10073== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10073==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10073==    by 0x488CD0: stringsubst (subst.c:301)
==10073==    by 0x48801B: prefork (subst.c:77)
==10073==    by 0x42B318: execcmd (exec.c:2619)
==10073==    by 0x428CA0: execpline2 (exec.c:1697)
==10073==    by 0x427FD2: execpline (exec.c:1484)
==10073==    by 0x427756: execlist (exec.c:1267)
==10073==    by 0x42717C: execode (exec.c:1073)
==10073==    by 0x431299: runshfunc (exec.c:5040)
==10073==    by 0x430E76: doshfunc (exec.c:4920)
==10073==    by 0x4302FB: execshfunc (exec.c:4557)
==10073==    by 0x42D8C1: execcmd (exec.c:3373)
==10073== 
==10073== 
==10073== 2 errors in context 2 of 2:
==10073== Conditional jump or move depends on uninitialised value(s)
==10073==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10073==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10073==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10073==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10073==    by 0x42D8E9: execcmd (exec.c:3378)
==10073==    by 0x428CA0: execpline2 (exec.c:1697)
==10073==    by 0x427FD2: execpline (exec.c:1484)
==10073==    by 0x42779A: execlist (exec.c:1275)
==10073==    by 0x42717C: execode (exec.c:1073)
==10073==    by 0x431299: runshfunc (exec.c:5040)
==10073==    by 0x430E76: doshfunc (exec.c:4920)
==10073==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10073== 
==10073== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10072== LEAK SUMMARY:
==10072==    definitely lost: 2,197 bytes in 13 blocks
==10072==    indirectly lost: 6,756 bytes in 7 blocks
==10072==      possibly lost: 0 bytes in 0 blocks
==10072==    still reachable: 3,119,708 bytes in 69,224 blocks
==10072==         suppressed: 0 bytes in 0 blocks
==10072== Rerun with --leak-check=full to see details of leaked memory
==10072== 
==10072== Use --track-origins=yes to see where uninitialised values come from
==10072== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10072== 
==10072== 1 errors in context 1 of 2:
==10072== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10072==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10072==    by 0x488CD0: stringsubst (subst.c:301)
==10072==    by 0x48801B: prefork (subst.c:77)
==10072==    by 0x42B318: execcmd (exec.c:2619)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x427756: execlist (exec.c:1267)
==10072==    by 0x42717C: execode (exec.c:1073)
==10072==    by 0x431299: runshfunc (exec.c:5040)
==10072==    by 0x430E76: doshfunc (exec.c:4920)
==10072==    by 0x4302FB: execshfunc (exec.c:4557)
==10072==    by 0x42D8C1: execcmd (exec.c:3373)
==10072== 
==10072== 
==10072== 2 errors in context 2 of 2:
==10072== Conditional jump or move depends on uninitialised value(s)
==10072==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10072==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10072==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10072==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10072==    by 0x42D8E9: execcmd (exec.c:3378)
==10072==    by 0x428CA0: execpline2 (exec.c:1697)
==10072==    by 0x427FD2: execpline (exec.c:1484)
==10072==    by 0x42779A: execlist (exec.c:1275)
==10072==    by 0x42717C: execode (exec.c:1073)
==10072==    by 0x431299: runshfunc (exec.c:5040)
==10072==    by 0x430E76: doshfunc (exec.c:4920)
==10072==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10072== 
==10072== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9963-- Caught __NR_exit; running __libc_freeres()
--9963-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10076== Checked 4,784,720 bytes
==10076== 
==9963== 
==9963== HEAP SUMMARY:
==9963==     in use at exit: 3,115,893 bytes in 69,048 blocks
==9963==   total heap usage: 1,593,017 allocs, 1,523,969 frees, 128,647,287 bytes allocated
==9963== 
==10076== LEAK SUMMARY:
==10076==    definitely lost: 2,197 bytes in 13 blocks
==10076==    indirectly lost: 6,756 bytes in 7 blocks
==10076==      possibly lost: 0 bytes in 0 blocks
==10076==    still reachable: 3,115,951 bytes in 69,152 blocks
==10076==         suppressed: 0 bytes in 0 blocks
==10076== Rerun with --leak-check=full to see details of leaked memory
==10076== 
==10076== Use --track-origins=yes to see where uninitialised values come from
==10076== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10076== 
==10076== 1 errors in context 1 of 2:
==10076== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10076==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10076==    by 0x488CD0: stringsubst (subst.c:301)
==10076==    by 0x48801B: prefork (subst.c:77)
==10076==    by 0x42B318: execcmd (exec.c:2619)
==10076==    by 0x428CA0: execpline2 (exec.c:1697)
==10076==    by 0x427FD2: execpline (exec.c:1484)
==10076==    by 0x427756: execlist (exec.c:1267)
==10076==    by 0x42717C: execode (exec.c:1073)
==10076==    by 0x431299: runshfunc (exec.c:5040)
==10076==    by 0x430E76: doshfunc (exec.c:4920)
==10076==    by 0x4302FB: execshfunc (exec.c:4557)
==10076==    by 0x42D8C1: execcmd (exec.c:3373)
==10076== 
==10076== 
==10076== 2 errors in context 2 of 2:
==10076== Conditional jump or move depends on uninitialised value(s)
==10076==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10076==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10076==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10076==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10076==    by 0x42D8E9: execcmd (exec.c:3378)
==10076==    by 0x428CA0: execpline2 (exec.c:1697)
==10076==    by 0x427FD2: execpline (exec.c:1484)
==10076==    by 0x42779A: execlist (exec.c:1275)
==10076==    by 0x42717C: execode (exec.c:1073)
==10076==    by 0x431299: runshfunc (exec.c:5040)
==10076==    by 0x430E76: doshfunc (exec.c:4920)
==10076==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10076== 
==10076== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== Searching for pointers to 69,048 not-freed blocks
--9963--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9963--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9963--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9963--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9963--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9963--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9963--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9963--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9963--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9963--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9963--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9963--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9963--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9963--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9963--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9963--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9963--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9963--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9963--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9963--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9963--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9963--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9963--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9963--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9963--   Scanning root segment: 0x701a000..0x701afff (4096)
--9963--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9963--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9963--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9963--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9963--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9963--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9963--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9963--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9963--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9963--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10077-- Caught __NR_exit; running __libc_freeres()
==10077== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10077-by-pythonnut-on-???
==10077== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10077-by-pythonnut-on-???
==10077== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10077-by-pythonnut-on-???
==10077== 
==10077== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10077== don't want to do, unless you know exactly what you're doing,
==10077== or are doing some strange experiment):
==10077==   /usr/lib/valgrind/../../bin/vgdb --pid=10077 ...command...
==10077== 
==10077== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10077==   /path/to/gdb ./zsh
==10077== and then give GDB the following command
==10077==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10077
==10077== --pid is optional if only one valgrind process is running
==10077== 
--10077-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10077== 
==10077== HEAP SUMMARY:
==10077==     in use at exit: 3,124,808 bytes in 69,172 blocks
==10077==   total heap usage: 1,594,841 allocs, 1,525,669 frees, 128,800,411 bytes allocated
==10077== 
==10077== Searching for pointers to 69,172 not-freed blocks
--10077--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10077--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10077--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10077--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10077--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10077--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10077--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10077--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10077--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10077--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10077--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10077--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10077--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10077--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10077--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10077--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10077--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10077--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10077--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10077--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10077--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10077--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10077--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10077--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10077--   Scanning root segment: 0x701a000..0x701afff (4096)
--10077--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10077--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10077--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10077--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10077--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10077--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10077--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10077--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10077--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10077--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==9963== Checked 4,772,800 bytes
==9963== 
==9963== LEAK SUMMARY:
==9963==    definitely lost: 2,189 bytes in 12 blocks
==9963==    indirectly lost: 6,756 bytes in 7 blocks
==9963==      possibly lost: 0 bytes in 0 blocks
==9963==    still reachable: 3,106,948 bytes in 69,029 blocks
==9963==         suppressed: 0 bytes in 0 blocks
==9963== Rerun with --leak-check=full to see details of leaked memory
==9963== 
==9963== Use --track-origins=yes to see where uninitialised values come from
==9963== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9963== 
==9963== 1 errors in context 1 of 2:
==9963== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9963==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9963==    by 0x488CD0: stringsubst (subst.c:301)
==9963==    by 0x48801B: prefork (subst.c:77)
==9963==    by 0x42B318: execcmd (exec.c:2619)
==9963==    by 0x428CA0: execpline2 (exec.c:1697)
==9963==    by 0x427FD2: execpline (exec.c:1484)
==9963==    by 0x427756: execlist (exec.c:1267)
==9963==    by 0x42717C: execode (exec.c:1073)
==9963==    by 0x431299: runshfunc (exec.c:5040)
==9963==    by 0x430E76: doshfunc (exec.c:4920)
==9963==    by 0x4302FB: execshfunc (exec.c:4557)
==9963==    by 0x42D8C1: execcmd (exec.c:3373)
==9963== 
==9963== 
==9963== 2 errors in context 2 of 2:
==9963== Conditional jump or move depends on uninitialised value(s)
==9963==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9963==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9963==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9963==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9963==    by 0x42D8E9: execcmd (exec.c:3378)
==9963==    by 0x428CA0: execpline2 (exec.c:1697)
==9963==    by 0x427FD2: execpline (exec.c:1484)
==9963==    by 0x42779A: execlist (exec.c:1275)
==9963==    by 0x42717C: execode (exec.c:1073)
==9963==    by 0x431299: runshfunc (exec.c:5040)
==9963==    by 0x430E76: doshfunc (exec.c:4920)
==9963==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9963== 
==9963== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--9898-- Caught __NR_exit; running __libc_freeres()
--9898-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==9898== 
==9898== HEAP SUMMARY:
==9898==     in use at exit: 3,113,785 bytes in 68,977 blocks
==9898==   total heap usage: 1,592,046 allocs, 1,523,069 frees, 128,469,578 bytes allocated
==9898== 
==10077== Checked 4,784,624 bytes
==10077== 
==9898== Searching for pointers to 68,977 not-freed blocks
--9898--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--9898--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--9898--   Scanning root segment: 0x4022000..0x4026fff (20480)
--9898--   Scanning root segment: 0x4049000..0x404cfff (16384)
--9898--   Scanning root segment: 0x4222000..0x4222fff (4096)
--9898--   Scanning root segment: 0x4223000..0x4223fff (4096)
--9898--   Scanning root segment: 0x4224000..0x4224fff (4096)
--9898--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--9898--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--9898--   Scanning root segment: 0x5041000..0x5041fff (4096)
--9898--   Scanning root segment: 0x5245000..0x5245fff (4096)
--9898--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--9898--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--9898--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--9898--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--9898--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--9898--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--9898--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--9898--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--9898--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--9898--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--9898--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--9898--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--9898--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--9898--   Scanning root segment: 0x701a000..0x701afff (4096)
--9898--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--9898--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--9898--   Scanning root segment: 0xae51000..0xae52fff (8192)
--9898--   Scanning root segment: 0xb054000..0xb054fff (4096)
--9898--   Scanning root segment: 0xb268000..0xb268fff (4096)
--9898--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--9898--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--9898--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--9898--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--9898--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10077== LEAK SUMMARY:
==10077==    definitely lost: 2,197 bytes in 13 blocks
==10077==    indirectly lost: 6,756 bytes in 7 blocks
==10077==      possibly lost: 0 bytes in 0 blocks
==10077==    still reachable: 3,115,855 bytes in 69,152 blocks
==10077==         suppressed: 0 bytes in 0 blocks
==10077== Rerun with --leak-check=full to see details of leaked memory
==10077== 
==10077== Use --track-origins=yes to see where uninitialised values come from
==10077== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10077== 
==10077== 1 errors in context 1 of 2:
==10077== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10077==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10077==    by 0x488CD0: stringsubst (subst.c:301)
==10077==    by 0x48801B: prefork (subst.c:77)
==10077==    by 0x42B318: execcmd (exec.c:2619)
==10077==    by 0x428CA0: execpline2 (exec.c:1697)
==10077==    by 0x427FD2: execpline (exec.c:1484)
==10077==    by 0x427756: execlist (exec.c:1267)
==10077==    by 0x42717C: execode (exec.c:1073)
==10077==    by 0x431299: runshfunc (exec.c:5040)
==10077==    by 0x430E76: doshfunc (exec.c:4920)
==10077==    by 0x4302FB: execshfunc (exec.c:4557)
==10077==    by 0x42D8C1: execcmd (exec.c:3373)
==10077== 
==10077== 
==10077== 2 errors in context 2 of 2:
==10077== Conditional jump or move depends on uninitialised value(s)
==10077==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10077==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10077==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10077==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10077==    by 0x42D8E9: execcmd (exec.c:3378)
==10077==    by 0x428CA0: execpline2 (exec.c:1697)
==10077==    by 0x427FD2: execpline (exec.c:1484)
==10077==    by 0x42779A: execlist (exec.c:1275)
==10077==    by 0x42717C: execode (exec.c:1073)
==10077==    by 0x431299: runshfunc (exec.c:5040)
==10077==    by 0x430E76: doshfunc (exec.c:4920)
==10077==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10077== 
==10077== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEC70C,  len 4
==10079== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10079-by-pythonnut-on-???
==10079== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10079-by-pythonnut-on-???
==10079== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10079-by-pythonnut-on-???
==10079== 
==10079== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10079== don't want to do, unless you know exactly what you're doing,
==10079== or are doing some strange experiment):
==10079==   /usr/lib/valgrind/../../bin/vgdb --pid=10079 ...command...
==10079== 
==10079== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10079==   /path/to/gdb ./zsh
==10079== and then give GDB the following command
==10079==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10079
==10079== --pid is optional if only one valgrind process is running
==10079== 
--10080-- Caught __NR_exit; running __libc_freeres()
==10080== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10080-by-pythonnut-on-???
==10080== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10080-by-pythonnut-on-???
==10080== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10080-by-pythonnut-on-???
==10080== 
==10080== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10080== don't want to do, unless you know exactly what you're doing,
==10080== or are doing some strange experiment):
==10080==   /usr/lib/valgrind/../../bin/vgdb --pid=10080 ...command...
==10080== 
==10080== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10080==   /path/to/gdb ./zsh
==10080== and then give GDB the following command
==10080==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10080
==10080== --pid is optional if only one valgrind process is running
==10080== 
client request: code 4d430005,  addr 0xFFEFED07C,  len 4
==9898== Checked 4,770,304 bytes
==9898== 
--10080-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10080== 
==10080== HEAP SUMMARY:
==10080==     in use at exit: 3,128,702 bytes in 69,255 blocks
==10080==   total heap usage: 1,595,036 allocs, 1,525,781 frees, 128,818,731 bytes allocated
==10080== 
==9898== LEAK SUMMARY:
==9898==    definitely lost: 2,189 bytes in 12 blocks
==9898==    indirectly lost: 6,756 bytes in 7 blocks
==9898==      possibly lost: 0 bytes in 0 blocks
==9898==    still reachable: 3,104,840 bytes in 68,958 blocks
==9898==         suppressed: 0 bytes in 0 blocks
==9898== Rerun with --leak-check=full to see details of leaked memory
==9898== 
==9898== Use --track-origins=yes to see where uninitialised values come from
==9898== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==9898== 
==9898== 1 errors in context 1 of 2:
==9898== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==9898==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==9898==    by 0x488CD0: stringsubst (subst.c:301)
==9898==    by 0x48801B: prefork (subst.c:77)
==9898==    by 0x42B318: execcmd (exec.c:2619)
==9898==    by 0x428CA0: execpline2 (exec.c:1697)
==9898==    by 0x427FD2: execpline (exec.c:1484)
==9898==    by 0x427756: execlist (exec.c:1267)
==9898==    by 0x42717C: execode (exec.c:1073)
==9898==    by 0x431299: runshfunc (exec.c:5040)
==9898==    by 0x430E76: doshfunc (exec.c:4920)
==9898==    by 0x4302FB: execshfunc (exec.c:4557)
==9898==    by 0x42D8C1: execcmd (exec.c:3373)
==9898== 
==9898== 
==9898== 2 errors in context 2 of 2:
==9898== Conditional jump or move depends on uninitialised value(s)
==9898==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==9898==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==9898==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==9898==    by 0x40EFC2: execbuiltin (builtin.c:450)
==9898==    by 0x42D8E9: execcmd (exec.c:3378)
==9898==    by 0x428CA0: execpline2 (exec.c:1697)
==9898==    by 0x427FD2: execpline (exec.c:1484)
==9898==    by 0x42779A: execlist (exec.c:1275)
==9898==    by 0x42717C: execode (exec.c:1073)
==9898==    by 0x431299: runshfunc (exec.c:5040)
==9898==    by 0x430E76: doshfunc (exec.c:4920)
==9898==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==9898== 
==9898== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10080== Searching for pointers to 69,255 not-freed blocks
--10080--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10080--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10080--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10080--   Scanning root segment: 0x4037000..0x403afff (16384)
--10080--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10080--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10080--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10080--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10080--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10080--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10080--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10080--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10080--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10080--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10080--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10080--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10080--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10080--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10080--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10080--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10080--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10080--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10080--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10080--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10080--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10080--   Scanning root segment: 0x701a000..0x701afff (4096)
--10080--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10080--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10080--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10080--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10080--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10080--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10080--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10080--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10080--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10080--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10080== Checked 4,808,080 bytes
==10080== 
==10080== LEAK SUMMARY:
==10080==    definitely lost: 2,197 bytes in 13 blocks
==10080==    indirectly lost: 6,756 bytes in 7 blocks
==10080==      possibly lost: 0 bytes in 0 blocks
==10080==    still reachable: 3,119,749 bytes in 69,235 blocks
==10080==         suppressed: 0 bytes in 0 blocks
==10080== Rerun with --leak-check=full to see details of leaked memory
==10080== 
==10080== Use --track-origins=yes to see where uninitialised values come from
==10080== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10080== 
==10080== 1 errors in context 1 of 2:
==10080== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10080==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10080==    by 0x488CD0: stringsubst (subst.c:301)
==10080==    by 0x48801B: prefork (subst.c:77)
==10080==    by 0x42B318: execcmd (exec.c:2619)
==10080==    by 0x428CA0: execpline2 (exec.c:1697)
==10080==    by 0x427FD2: execpline (exec.c:1484)
==10080==    by 0x427756: execlist (exec.c:1267)
==10080==    by 0x42717C: execode (exec.c:1073)
==10080==    by 0x431299: runshfunc (exec.c:5040)
==10080==    by 0x430E76: doshfunc (exec.c:4920)
==10080==    by 0x4302FB: execshfunc (exec.c:4557)
==10080==    by 0x42D8C1: execcmd (exec.c:3373)
==10080== 
==10080== 
==10080== 2 errors in context 2 of 2:
==10080== Conditional jump or move depends on uninitialised value(s)
==10080==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10080==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10080==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10080==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10080==    by 0x42D8E9: execcmd (exec.c:3378)
==10080==    by 0x428CA0: execpline2 (exec.c:1697)
==10080==    by 0x427FD2: execpline (exec.c:1484)
==10080==    by 0x42779A: execlist (exec.c:1275)
==10080==    by 0x42717C: execode (exec.c:1073)
==10080==    by 0x431299: runshfunc (exec.c:5040)
==10080==    by 0x430E76: doshfunc (exec.c:4920)
==10080==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10080== 
==10080== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10079-- Caught __NR_exit; running __libc_freeres()
--10079-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10079== 
==10079== HEAP SUMMARY:
==10079==     in use at exit: 3,128,638 bytes in 69,252 blocks
==10079==   total heap usage: 1,595,034 allocs, 1,525,782 frees, 128,818,490 bytes allocated
==10079== 
==10079== Searching for pointers to 69,252 not-freed blocks
--10079--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10079--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10079--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10079--   Scanning root segment: 0x4037000..0x403afff (16384)
--10079--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10079--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10079--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10079--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10079--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10079--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10079--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10079--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10079--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10079--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10079--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10079--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10079--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10079--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10079--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10079--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10079--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10079--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10079--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10079--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10079--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10079--   Scanning root segment: 0x701a000..0x701afff (4096)
--10079--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10079--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10079--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10079--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10079--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10079--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10079--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10079--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10079--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10079--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10079== Checked 4,807,392 bytes
==10079== 
==10079== LEAK SUMMARY:
==10079==    definitely lost: 2,197 bytes in 13 blocks
==10079==    indirectly lost: 6,756 bytes in 7 blocks
==10079==      possibly lost: 0 bytes in 0 blocks
==10079==    still reachable: 3,119,685 bytes in 69,232 blocks
==10079==         suppressed: 0 bytes in 0 blocks
==10079== Rerun with --leak-check=full to see details of leaked memory
==10079== 
==10079== Use --track-origins=yes to see where uninitialised values come from
==10079== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10079== 
==10079== 1 errors in context 1 of 2:
==10079== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10079==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10079==    by 0x488CD0: stringsubst (subst.c:301)
==10079==    by 0x48801B: prefork (subst.c:77)
==10079==    by 0x42B318: execcmd (exec.c:2619)
==10079==    by 0x428CA0: execpline2 (exec.c:1697)
==10079==    by 0x427FD2: execpline (exec.c:1484)
==10079==    by 0x427756: execlist (exec.c:1267)
==10079==    by 0x42717C: execode (exec.c:1073)
==10079==    by 0x431299: runshfunc (exec.c:5040)
==10079==    by 0x430E76: doshfunc (exec.c:4920)
==10079==    by 0x4302FB: execshfunc (exec.c:4557)
==10079==    by 0x42D8C1: execcmd (exec.c:3373)
==10079== 
==10079== 
==10079== 2 errors in context 2 of 2:
==10079== Conditional jump or move depends on uninitialised value(s)
==10079==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10079==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10079==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10079==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10079==    by 0x42D8E9: execcmd (exec.c:3378)
==10079==    by 0x428CA0: execpline2 (exec.c:1697)
==10079==    by 0x427FD2: execpline (exec.c:1484)
==10079==    by 0x42779A: execlist (exec.c:1275)
==10079==    by 0x42717C: execode (exec.c:1073)
==10079==    by 0x431299: runshfunc (exec.c:5040)
==10079==    by 0x430E76: doshfunc (exec.c:4920)
==10079==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10079== 
==10079== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10084-- Caught __NR_exit; running __libc_freeres()
==10084== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10084-by-pythonnut-on-???
==10084== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10084-by-pythonnut-on-???
==10084== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10084-by-pythonnut-on-???
==10084== 
==10084== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10084== don't want to do, unless you know exactly what you're doing,
==10084== or are doing some strange experiment):
==10084==   /usr/lib/valgrind/../../bin/vgdb --pid=10084 ...command...
==10084== 
==10084== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10084==   /path/to/gdb ./zsh
==10084== and then give GDB the following command
==10084==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10084
==10084== --pid is optional if only one valgrind process is running
==10084== 
--10084-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10084== 
==10084== HEAP SUMMARY:
==10084==     in use at exit: 3,128,645 bytes in 69,252 blocks
==10084==   total heap usage: 1,595,049 allocs, 1,525,797 frees, 128,823,488 bytes allocated
==10084== 
==10084== Searching for pointers to 69,252 not-freed blocks
--10084--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10084--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10084--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10084--   Scanning root segment: 0x4037000..0x403afff (16384)
--10084--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10084--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10084--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10084--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10084--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10084--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10084--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10084--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10084--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10084--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10084--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10084--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10084--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10084--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10084--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10084--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10084--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10084--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10084--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10084--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10084--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10084--   Scanning root segment: 0x701a000..0x701afff (4096)
--10084--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10084--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10084--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10084--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10084--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10084--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10084--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10084--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10084--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10084--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10084== Checked 4,807,528 bytes
==10084== 
==10084== LEAK SUMMARY:
==10084==    definitely lost: 2,197 bytes in 13 blocks
==10084==    indirectly lost: 6,756 bytes in 7 blocks
==10084==      possibly lost: 0 bytes in 0 blocks
==10084==    still reachable: 3,119,692 bytes in 69,232 blocks
==10084==         suppressed: 0 bytes in 0 blocks
==10084== Rerun with --leak-check=full to see details of leaked memory
==10084== 
==10084== Use --track-origins=yes to see where uninitialised values come from
==10084== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10084== 
==10084== 1 errors in context 1 of 2:
==10084== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10084==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10084==    by 0x488CD0: stringsubst (subst.c:301)
==10084==    by 0x48801B: prefork (subst.c:77)
==10084==    by 0x42B318: execcmd (exec.c:2619)
==10084==    by 0x428CA0: execpline2 (exec.c:1697)
==10084==    by 0x427FD2: execpline (exec.c:1484)
==10084==    by 0x427756: execlist (exec.c:1267)
==10084==    by 0x42717C: execode (exec.c:1073)
==10084==    by 0x431299: runshfunc (exec.c:5040)
==10084==    by 0x430E76: doshfunc (exec.c:4920)
==10084==    by 0x4302FB: execshfunc (exec.c:4557)
==10084==    by 0x42D8C1: execcmd (exec.c:3373)
==10084== 
==10084== 
==10084== 2 errors in context 2 of 2:
==10084== Conditional jump or move depends on uninitialised value(s)
==10084==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10084==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10084==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10084==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10084==    by 0x42D8E9: execcmd (exec.c:3378)
==10084==    by 0x428CA0: execpline2 (exec.c:1697)
==10084==    by 0x427FD2: execpline (exec.c:1484)
==10084==    by 0x42779A: execlist (exec.c:1275)
==10084==    by 0x42717C: execode (exec.c:1073)
==10084==    by 0x431299: runshfunc (exec.c:5040)
==10084==    by 0x430E76: doshfunc (exec.c:4920)
==10084==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10084== 
==10084== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10085-- Caught __NR_exit; running __libc_freeres()
==10085== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10085-by-pythonnut-on-???
==10085== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10085-by-pythonnut-on-???
==10085== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10085-by-pythonnut-on-???
==10085== 
==10085== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10085== don't want to do, unless you know exactly what you're doing,
==10085== or are doing some strange experiment):
==10085==   /usr/lib/valgrind/../../bin/vgdb --pid=10085 ...command...
==10085== 
==10085== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10085==   /path/to/gdb ./zsh
==10085== and then give GDB the following command
==10085==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10085
==10085== --pid is optional if only one valgrind process is running
==10085== 
--10085-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10085== 
==10085== HEAP SUMMARY:
==10085==     in use at exit: 3,128,741 bytes in 69,252 blocks
==10085==   total heap usage: 1,595,065 allocs, 1,525,813 frees, 128,828,275 bytes allocated
==10085== 
==10085== Searching for pointers to 69,252 not-freed blocks
--10085--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10085--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10085--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10085--   Scanning root segment: 0x4037000..0x403afff (16384)
--10085--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10085--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10085--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10085--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10085--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10085--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10085--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10085--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10085--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10085--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10085--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10085--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10085--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10085--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10085--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10085--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10085--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10085--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10085--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10085--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10085--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10085--   Scanning root segment: 0x701a000..0x701afff (4096)
--10085--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10085--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10085--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10085--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10085--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10085--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10085--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10085--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10085--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10085--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10085== Checked 4,806,808 bytes
==10085== 
==10085== LEAK SUMMARY:
==10085==    definitely lost: 2,197 bytes in 13 blocks
==10085==    indirectly lost: 6,756 bytes in 7 blocks
==10085==      possibly lost: 0 bytes in 0 blocks
==10085==    still reachable: 3,119,788 bytes in 69,232 blocks
==10085==         suppressed: 0 bytes in 0 blocks
==10085== Rerun with --leak-check=full to see details of leaked memory
==10085== 
==10085== Use --track-origins=yes to see where uninitialised values come from
==10085== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10085== 
==10085== 1 errors in context 1 of 2:
==10085== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10085==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10085==    by 0x488CD0: stringsubst (subst.c:301)
==10085==    by 0x48801B: prefork (subst.c:77)
==10085==    by 0x42B318: execcmd (exec.c:2619)
==10085==    by 0x428CA0: execpline2 (exec.c:1697)
==10085==    by 0x427FD2: execpline (exec.c:1484)
==10085==    by 0x427756: execlist (exec.c:1267)
==10085==    by 0x42717C: execode (exec.c:1073)
==10085==    by 0x431299: runshfunc (exec.c:5040)
==10085==    by 0x430E76: doshfunc (exec.c:4920)
==10085==    by 0x4302FB: execshfunc (exec.c:4557)
==10085==    by 0x42D8C1: execcmd (exec.c:3373)
==10085== 
==10085== 
==10085== 2 errors in context 2 of 2:
==10085== Conditional jump or move depends on uninitialised value(s)
==10085==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10085==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10085==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10085==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10085==    by 0x42D8E9: execcmd (exec.c:3378)
==10085==    by 0x428CA0: execpline2 (exec.c:1697)
==10085==    by 0x427FD2: execpline (exec.c:1484)
==10085==    by 0x42779A: execlist (exec.c:1275)
==10085==    by 0x42717C: execode (exec.c:1073)
==10085==    by 0x431299: runshfunc (exec.c:5040)
==10085==    by 0x430E76: doshfunc (exec.c:4920)
==10085==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10085== 
==10085== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10086== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10086-by-pythonnut-on-???
==10086== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10086-by-pythonnut-on-???
==10086== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10086-by-pythonnut-on-???
==10086== 
==10086== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10086== don't want to do, unless you know exactly what you're doing,
==10086== or are doing some strange experiment):
==10086==   /usr/lib/valgrind/../../bin/vgdb --pid=10086 ...command...
==10086== 
==10086== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10086==   /path/to/gdb ./zsh
==10086== and then give GDB the following command
==10086==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10086
==10086== --pid is optional if only one valgrind process is running
==10086== 
--10086-- Caught __NR_exit; running __libc_freeres()
--10086-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10086== 
==10086== HEAP SUMMARY:
==10086==     in use at exit: 3,129,015 bytes in 69,258 blocks
==10086==   total heap usage: 1,595,113 allocs, 1,525,855 frees, 128,837,299 bytes allocated
==10086== 
==10086== Searching for pointers to 69,258 not-freed blocks
--10086--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10086--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10086--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10086--   Scanning root segment: 0x4037000..0x403afff (16384)
--10086--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10086--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10086--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10086--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10086--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10086--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10086--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10086--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10086--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10086--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10086--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10086--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10086--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10086--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10086--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10086--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10086--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10086--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10086--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10086--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10086--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10086--   Scanning root segment: 0x701a000..0x701afff (4096)
--10086--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10086--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10086--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10086--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10086--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10086--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10086--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10086--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10086--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10086--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10086== Checked 4,807,000 bytes
==10086== 
==10086== LEAK SUMMARY:
==10086==    definitely lost: 2,197 bytes in 13 blocks
==10086==    indirectly lost: 6,756 bytes in 7 blocks
==10086==      possibly lost: 0 bytes in 0 blocks
==10086==    still reachable: 3,120,062 bytes in 69,238 blocks
==10086==         suppressed: 0 bytes in 0 blocks
==10086== Rerun with --leak-check=full to see details of leaked memory
==10086== 
==10086== Use --track-origins=yes to see where uninitialised values come from
==10086== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10086== 
==10086== 1 errors in context 1 of 2:
==10086== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10086==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10086==    by 0x488CD0: stringsubst (subst.c:301)
==10086==    by 0x48801B: prefork (subst.c:77)
==10086==    by 0x42B318: execcmd (exec.c:2619)
==10086==    by 0x428CA0: execpline2 (exec.c:1697)
==10086==    by 0x427FD2: execpline (exec.c:1484)
==10086==    by 0x427756: execlist (exec.c:1267)
==10086==    by 0x42717C: execode (exec.c:1073)
==10086==    by 0x431299: runshfunc (exec.c:5040)
==10086==    by 0x430E76: doshfunc (exec.c:4920)
==10086==    by 0x4302FB: execshfunc (exec.c:4557)
==10086==    by 0x42D8C1: execcmd (exec.c:3373)
==10086== 
==10086== 
==10086== 2 errors in context 2 of 2:
==10086== Conditional jump or move depends on uninitialised value(s)
==10086==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10086==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10086==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10086==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10086==    by 0x42D8E9: execcmd (exec.c:3378)
==10086==    by 0x428CA0: execpline2 (exec.c:1697)
==10086==    by 0x427FD2: execpline (exec.c:1484)
==10086==    by 0x42779A: execlist (exec.c:1275)
==10086==    by 0x42717C: execode (exec.c:1073)
==10086==    by 0x431299: runshfunc (exec.c:5040)
==10086==    by 0x430E76: doshfunc (exec.c:4920)
==10086==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10086== 
==10086== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10087-- Caught __NR_exit; running __libc_freeres()
==10087== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10087-by-pythonnut-on-???
==10087== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10087-by-pythonnut-on-???
==10087== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10087-by-pythonnut-on-???
==10087== 
==10087== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10087== don't want to do, unless you know exactly what you're doing,
==10087== or are doing some strange experiment):
==10087==   /usr/lib/valgrind/../../bin/vgdb --pid=10087 ...command...
==10087== 
==10087== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10087==   /path/to/gdb ./zsh
==10087== and then give GDB the following command
==10087==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10087
==10087== --pid is optional if only one valgrind process is running
==10087== 
--10087-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10087== 
==10087== HEAP SUMMARY:
==10087==     in use at exit: 3,128,919 bytes in 69,258 blocks
==10087==   total heap usage: 1,595,093 allocs, 1,525,835 frees, 128,835,069 bytes allocated
==10087== 
==10087== Searching for pointers to 69,258 not-freed blocks
--10087--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10087--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10087--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10087--   Scanning root segment: 0x4037000..0x403afff (16384)
--10087--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10087--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10087--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10087--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10087--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10087--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10087--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10087--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10087--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10087--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10087--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10087--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10087--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10087--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10087--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10087--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10087--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10087--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10087--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10087--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10087--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10087--   Scanning root segment: 0x701a000..0x701afff (4096)
--10087--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10087--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10087--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10087--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10087--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10087--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10087--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10087--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10087--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10087--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10087== Checked 4,806,904 bytes
==10087== 
==10087== LEAK SUMMARY:
==10087==    definitely lost: 2,197 bytes in 13 blocks
==10087==    indirectly lost: 6,756 bytes in 7 blocks
==10087==      possibly lost: 0 bytes in 0 blocks
==10087==    still reachable: 3,119,966 bytes in 69,238 blocks
==10087==         suppressed: 0 bytes in 0 blocks
==10087== Rerun with --leak-check=full to see details of leaked memory
==10087== 
==10087== Use --track-origins=yes to see where uninitialised values come from
==10087== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10087== 
==10087== 1 errors in context 1 of 2:
==10087== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10087==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10087==    by 0x488CD0: stringsubst (subst.c:301)
==10087==    by 0x48801B: prefork (subst.c:77)
==10087==    by 0x42B318: execcmd (exec.c:2619)
==10087==    by 0x428CA0: execpline2 (exec.c:1697)
==10087==    by 0x427FD2: execpline (exec.c:1484)
==10087==    by 0x427756: execlist (exec.c:1267)
==10087==    by 0x42717C: execode (exec.c:1073)
==10087==    by 0x431299: runshfunc (exec.c:5040)
==10087==    by 0x430E76: doshfunc (exec.c:4920)
==10087==    by 0x4302FB: execshfunc (exec.c:4557)
==10087==    by 0x42D8C1: execcmd (exec.c:3373)
==10087== 
==10087== 
==10087== 2 errors in context 2 of 2:
==10087== Conditional jump or move depends on uninitialised value(s)
==10087==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10087==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10087==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10087==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10087==    by 0x42D8E9: execcmd (exec.c:3378)
==10087==    by 0x428CA0: execpline2 (exec.c:1697)
==10087==    by 0x427FD2: execpline (exec.c:1484)
==10087==    by 0x42779A: execlist (exec.c:1275)
==10087==    by 0x42717C: execode (exec.c:1073)
==10087==    by 0x431299: runshfunc (exec.c:5040)
==10087==    by 0x430E76: doshfunc (exec.c:4920)
==10087==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10087== 
==10087== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10088== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10088-by-pythonnut-on-???
==10088== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10088-by-pythonnut-on-???
==10088== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10088-by-pythonnut-on-???
==10088== 
==10088== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10088== don't want to do, unless you know exactly what you're doing,
==10088== or are doing some strange experiment):
==10088==   /usr/lib/valgrind/../../bin/vgdb --pid=10088 ...command...
==10088== 
==10088== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10088==   /path/to/gdb ./zsh
==10088== and then give GDB the following command
==10088==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10088
==10088== --pid is optional if only one valgrind process is running
==10088== 
--10088-- Caught __NR_exit; running __libc_freeres()
--10088-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10088== 
==10088== HEAP SUMMARY:
==10088==     in use at exit: 3,128,947 bytes in 69,259 blocks
==10088==   total heap usage: 1,595,106 allocs, 1,525,847 frees, 128,837,756 bytes allocated
==10088== 
==10088== Searching for pointers to 69,259 not-freed blocks
--10088--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10088--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10088--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10088--   Scanning root segment: 0x4037000..0x403afff (16384)
--10088--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10088--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10088--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10088--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10088--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10088--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10088--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10088--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10088--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10088--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10088--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10088--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10088--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10088--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10088--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10088--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10088--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10088--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10088--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10088--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10088--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10088--   Scanning root segment: 0x701a000..0x701afff (4096)
--10088--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10088--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10088--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10088--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10088--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10088--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10088--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10088--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10088--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10088--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10088== Checked 4,806,416 bytes
==10088== 
==10088== LEAK SUMMARY:
==10088==    definitely lost: 2,197 bytes in 13 blocks
==10088==    indirectly lost: 6,756 bytes in 7 blocks
==10088==      possibly lost: 0 bytes in 0 blocks
==10088==    still reachable: 3,119,994 bytes in 69,239 blocks
==10088==         suppressed: 0 bytes in 0 blocks
==10088== Rerun with --leak-check=full to see details of leaked memory
==10088== 
==10088== Use --track-origins=yes to see where uninitialised values come from
==10088== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10088== 
==10088== 1 errors in context 1 of 2:
==10088== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10088==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10088==    by 0x488CD0: stringsubst (subst.c:301)
==10088==    by 0x48801B: prefork (subst.c:77)
==10088==    by 0x42B318: execcmd (exec.c:2619)
==10088==    by 0x428CA0: execpline2 (exec.c:1697)
==10088==    by 0x427FD2: execpline (exec.c:1484)
==10088==    by 0x427756: execlist (exec.c:1267)
==10088==    by 0x42717C: execode (exec.c:1073)
==10088==    by 0x431299: runshfunc (exec.c:5040)
==10088==    by 0x430E76: doshfunc (exec.c:4920)
==10088==    by 0x4302FB: execshfunc (exec.c:4557)
==10088==    by 0x42D8C1: execcmd (exec.c:3373)
==10088== 
==10088== 
==10088== 2 errors in context 2 of 2:
==10088== Conditional jump or move depends on uninitialised value(s)
==10088==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10088==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10088==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10088==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10088==    by 0x42D8E9: execcmd (exec.c:3378)
==10088==    by 0x428CA0: execpline2 (exec.c:1697)
==10088==    by 0x427FD2: execpline (exec.c:1484)
==10088==    by 0x42779A: execlist (exec.c:1275)
==10088==    by 0x42717C: execode (exec.c:1073)
==10088==    by 0x431299: runshfunc (exec.c:5040)
==10088==    by 0x430E76: doshfunc (exec.c:4920)
==10088==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10088== 
==10088== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10091-- Caught __NR_exit; running __libc_freeres()
==10091== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10091-by-pythonnut-on-???
==10091== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10091-by-pythonnut-on-???
==10091== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10091-by-pythonnut-on-???
==10091== 
==10091== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10091== don't want to do, unless you know exactly what you're doing,
==10091== or are doing some strange experiment):
==10091==   /usr/lib/valgrind/../../bin/vgdb --pid=10091 ...command...
==10091== 
==10091== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10091==   /path/to/gdb ./zsh
==10091== and then give GDB the following command
==10091==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10091
==10091== --pid is optional if only one valgrind process is running
==10091== 
--10091-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10091== 
==10091== HEAP SUMMARY:
==10091==     in use at exit: 3,128,687 bytes in 69,251 blocks
==10091==   total heap usage: 1,595,264 allocs, 1,526,013 frees, 128,856,323 bytes allocated
==10091== 
==10091== Searching for pointers to 69,251 not-freed blocks
--10091--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10091--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10091--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10091--   Scanning root segment: 0x4037000..0x403afff (16384)
--10091--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10091--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10091--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10091--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10091--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10091--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10091--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10091--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10091--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10091--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10091--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10091--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10091--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10091--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10091--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10091--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10091--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10091--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10091--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10091--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10091--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10091--   Scanning root segment: 0x701a000..0x701afff (4096)
--10091--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10091--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10091--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10091--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10091--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10091--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10091--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10091--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10091--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10091--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10091== Checked 4,806,920 bytes
==10091== 
==10091== LEAK SUMMARY:
==10091==    definitely lost: 2,197 bytes in 13 blocks
==10091==    indirectly lost: 6,756 bytes in 7 blocks
==10091==      possibly lost: 0 bytes in 0 blocks
==10091==    still reachable: 3,119,734 bytes in 69,231 blocks
==10091==         suppressed: 0 bytes in 0 blocks
==10091== Rerun with --leak-check=full to see details of leaked memory
==10091== 
==10091== Use --track-origins=yes to see where uninitialised values come from
==10091== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10091== 
==10091== 1 errors in context 1 of 2:
==10091== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10091==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10091==    by 0x488CD0: stringsubst (subst.c:301)
==10091==    by 0x48801B: prefork (subst.c:77)
==10091==    by 0x42B318: execcmd (exec.c:2619)
==10091==    by 0x428CA0: execpline2 (exec.c:1697)
==10091==    by 0x427FD2: execpline (exec.c:1484)
==10091==    by 0x427756: execlist (exec.c:1267)
==10091==    by 0x42717C: execode (exec.c:1073)
==10091==    by 0x431299: runshfunc (exec.c:5040)
==10091==    by 0x430E76: doshfunc (exec.c:4920)
==10091==    by 0x4302FB: execshfunc (exec.c:4557)
==10091==    by 0x42D8C1: execcmd (exec.c:3373)
==10091== 
==10091== 
==10091== 2 errors in context 2 of 2:
==10091== Conditional jump or move depends on uninitialised value(s)
==10091==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10091==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10091==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10091==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10091==    by 0x42D8E9: execcmd (exec.c:3378)
==10091==    by 0x428CA0: execpline2 (exec.c:1697)
==10091==    by 0x427FD2: execpline (exec.c:1484)
==10091==    by 0x42779A: execlist (exec.c:1275)
==10091==    by 0x42717C: execode (exec.c:1073)
==10091==    by 0x431299: runshfunc (exec.c:5040)
==10091==    by 0x430E76: doshfunc (exec.c:4920)
==10091==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10091== 
==10091== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10092== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10092-by-pythonnut-on-???
==10092== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10092-by-pythonnut-on-???
==10092== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10092-by-pythonnut-on-???
==10092== 
==10092== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10092== don't want to do, unless you know exactly what you're doing,
==10092== or are doing some strange experiment):
==10092==   /usr/lib/valgrind/../../bin/vgdb --pid=10092 ...command...
==10092== 
==10092== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10092==   /path/to/gdb ./zsh
==10092== and then give GDB the following command
==10092==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10092
==10092== --pid is optional if only one valgrind process is running
==10092== 
--10092-- Caught __NR_exit; running __libc_freeres()
--10092-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10092== 
==10092== HEAP SUMMARY:
==10092==     in use at exit: 3,124,847 bytes in 69,174 blocks
==10092==   total heap usage: 1,595,297 allocs, 1,526,123 frees, 128,861,592 bytes allocated
==10092== 
==10092== Searching for pointers to 69,174 not-freed blocks
--10092--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10092--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10092--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10092--   Scanning root segment: 0x4037000..0x403afff (16384)
--10092--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10092--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10092--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10092--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10092--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10092--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10092--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10092--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10092--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10092--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10092--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10092--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10092--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10092--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10092--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10092--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10092--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10092--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10092--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10092--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10092--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10092--   Scanning root segment: 0x701a000..0x701afff (4096)
--10092--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10092--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10092--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10092--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10092--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10092--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10092--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10092--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10092--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10092--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10092== Checked 4,800,528 bytes
==10092== 
==10092== LEAK SUMMARY:
==10092==    definitely lost: 2,197 bytes in 13 blocks
==10092==    indirectly lost: 6,756 bytes in 7 blocks
==10092==      possibly lost: 0 bytes in 0 blocks
==10092==    still reachable: 3,115,894 bytes in 69,154 blocks
==10092==         suppressed: 0 bytes in 0 blocks
==10092== Rerun with --leak-check=full to see details of leaked memory
==10092== 
==10092== Use --track-origins=yes to see where uninitialised values come from
==10092== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10092== 
==10092== 1 errors in context 1 of 2:
==10092== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10092==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10092==    by 0x488CD0: stringsubst (subst.c:301)
==10092==    by 0x48801B: prefork (subst.c:77)
==10092==    by 0x42B318: execcmd (exec.c:2619)
==10092==    by 0x428CA0: execpline2 (exec.c:1697)
==10092==    by 0x427FD2: execpline (exec.c:1484)
==10092==    by 0x427756: execlist (exec.c:1267)
==10092==    by 0x42717C: execode (exec.c:1073)
==10092==    by 0x431299: runshfunc (exec.c:5040)
==10092==    by 0x430E76: doshfunc (exec.c:4920)
==10092==    by 0x4302FB: execshfunc (exec.c:4557)
==10092==    by 0x42D8C1: execcmd (exec.c:3373)
==10092== 
==10092== 
==10092== 2 errors in context 2 of 2:
==10092== Conditional jump or move depends on uninitialised value(s)
==10092==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10092==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10092==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10092==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10092==    by 0x42D8E9: execcmd (exec.c:3378)
==10092==    by 0x428CA0: execpline2 (exec.c:1697)
==10092==    by 0x427FD2: execpline (exec.c:1484)
==10092==    by 0x42779A: execlist (exec.c:1275)
==10092==    by 0x42717C: execode (exec.c:1073)
==10092==    by 0x431299: runshfunc (exec.c:5040)
==10092==    by 0x430E76: doshfunc (exec.c:4920)
==10092==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10092== 
==10092== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10093== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10093-by-pythonnut-on-???
==10093== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10093-by-pythonnut-on-???
==10093== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10093-by-pythonnut-on-???
==10093== 
==10093== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10093== don't want to do, unless you know exactly what you're doing,
==10093== or are doing some strange experiment):
==10093==   /usr/lib/valgrind/../../bin/vgdb --pid=10093 ...command...
==10093== 
==10093== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10093==   /path/to/gdb ./zsh
==10093== and then give GDB the following command
==10093==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10093
==10093== --pid is optional if only one valgrind process is running
==10093== 
--10093-- Caught __NR_exit; running __libc_freeres()
--10093-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10093== 
==10093== HEAP SUMMARY:
==10093==     in use at exit: 3,123,579 bytes in 69,168 blocks
==10093==   total heap usage: 1,597,387 allocs, 1,528,219 frees, 128,978,445 bytes allocated
==10093== 
==10093== Searching for pointers to 69,168 not-freed blocks
--10093--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10093--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10093--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10093--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10093--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10093--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10093--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10093--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10093--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10093--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10093--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10093--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10093--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10093--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10093--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10093--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10093--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10093--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10093--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10093--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10093--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10093--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10093--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10093--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10093--   Scanning root segment: 0x701a000..0x701afff (4096)
--10093--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10093--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10093--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10093--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10093--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10093--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10093--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10093--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10093--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10093--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10093== Checked 4,785,608 bytes
==10093== 
==10093== LEAK SUMMARY:
==10093==    definitely lost: 2,197 bytes in 13 blocks
==10093==    indirectly lost: 6,756 bytes in 7 blocks
==10093==      possibly lost: 0 bytes in 0 blocks
==10093==    still reachable: 3,114,626 bytes in 69,148 blocks
==10093==         suppressed: 0 bytes in 0 blocks
==10093== Rerun with --leak-check=full to see details of leaked memory
==10093== 
==10093== Use --track-origins=yes to see where uninitialised values come from
==10093== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10093== 
==10093== 1 errors in context 1 of 2:
==10093== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10093==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10093==    by 0x488CD0: stringsubst (subst.c:301)
==10093==    by 0x48801B: prefork (subst.c:77)
==10093==    by 0x42B318: execcmd (exec.c:2619)
==10093==    by 0x428CA0: execpline2 (exec.c:1697)
==10093==    by 0x427FD2: execpline (exec.c:1484)
==10093==    by 0x427756: execlist (exec.c:1267)
==10093==    by 0x42717C: execode (exec.c:1073)
==10093==    by 0x431299: runshfunc (exec.c:5040)
==10093==    by 0x430E76: doshfunc (exec.c:4920)
==10093==    by 0x4302FB: execshfunc (exec.c:4557)
==10093==    by 0x42D8C1: execcmd (exec.c:3373)
==10093== 
==10093== 
==10093== 2 errors in context 2 of 2:
==10093== Conditional jump or move depends on uninitialised value(s)
==10093==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10093==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10093==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10093==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10093==    by 0x42D8E9: execcmd (exec.c:3378)
==10093==    by 0x428CA0: execpline2 (exec.c:1697)
==10093==    by 0x427FD2: execpline (exec.c:1484)
==10093==    by 0x42779A: execlist (exec.c:1275)
==10093==    by 0x42717C: execode (exec.c:1073)
==10093==    by 0x431299: runshfunc (exec.c:5040)
==10093==    by 0x430E76: doshfunc (exec.c:4920)
==10093==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10093== 
==10093== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10094-- Caught __NR_exit; running __libc_freeres()
==10094== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10094-by-pythonnut-on-???
==10094== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10094-by-pythonnut-on-???
==10094== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10094-by-pythonnut-on-???
==10094== 
==10094== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10094== don't want to do, unless you know exactly what you're doing,
==10094== or are doing some strange experiment):
==10094==   /usr/lib/valgrind/../../bin/vgdb --pid=10094 ...command...
==10094== 
==10094== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10094==   /path/to/gdb ./zsh
==10094== and then give GDB the following command
==10094==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10094
==10094== --pid is optional if only one valgrind process is running
==10094== 
--10094-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10094== 
==10094== HEAP SUMMARY:
==10094==     in use at exit: 3,123,643 bytes in 69,168 blocks
==10094==   total heap usage: 1,597,393 allocs, 1,528,225 frees, 128,987,021 bytes allocated
==10094== 
==10094== Searching for pointers to 69,168 not-freed blocks
--10094--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10094--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10094--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10094--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10094--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10094--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10094--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10094--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10094--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10094--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10094--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10094--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10094--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10094--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10094--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10094--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10094--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10094--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10094--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10094--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10094--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10094--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10094--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10094--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10094--   Scanning root segment: 0x701a000..0x701afff (4096)
--10094--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10094--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10094--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10094--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10094--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10094--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10094--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10094--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10094--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10094--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10094== Checked 4,787,704 bytes
==10094== 
==10094== LEAK SUMMARY:
==10094==    definitely lost: 2,197 bytes in 13 blocks
==10094==    indirectly lost: 6,756 bytes in 7 blocks
==10094==      possibly lost: 0 bytes in 0 blocks
==10094==    still reachable: 3,114,690 bytes in 69,148 blocks
==10094==         suppressed: 0 bytes in 0 blocks
==10094== Rerun with --leak-check=full to see details of leaked memory
==10094== 
==10094== Use --track-origins=yes to see where uninitialised values come from
==10094== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10094== 
==10094== 1 errors in context 1 of 2:
==10094== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10094==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10094==    by 0x488CD0: stringsubst (subst.c:301)
==10094==    by 0x48801B: prefork (subst.c:77)
==10094==    by 0x42B318: execcmd (exec.c:2619)
==10094==    by 0x428CA0: execpline2 (exec.c:1697)
==10094==    by 0x427FD2: execpline (exec.c:1484)
==10094==    by 0x427756: execlist (exec.c:1267)
==10094==    by 0x42717C: execode (exec.c:1073)
==10094==    by 0x431299: runshfunc (exec.c:5040)
==10094==    by 0x430E76: doshfunc (exec.c:4920)
==10094==    by 0x4302FB: execshfunc (exec.c:4557)
==10094==    by 0x42D8C1: execcmd (exec.c:3373)
==10094== 
==10094== 
==10094== 2 errors in context 2 of 2:
==10094== Conditional jump or move depends on uninitialised value(s)
==10094==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10094==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10094==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10094==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10094==    by 0x42D8E9: execcmd (exec.c:3378)
==10094==    by 0x428CA0: execpline2 (exec.c:1697)
==10094==    by 0x427FD2: execpline (exec.c:1484)
==10094==    by 0x42779A: execlist (exec.c:1275)
==10094==    by 0x42717C: execode (exec.c:1073)
==10094==    by 0x431299: runshfunc (exec.c:5040)
==10094==    by 0x430E76: doshfunc (exec.c:4920)
==10094==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10094== 
==10094== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10095== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10095-by-pythonnut-on-???
==10095== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10095-by-pythonnut-on-???
==10095== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10095-by-pythonnut-on-???
==10095== 
==10095== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10095== don't want to do, unless you know exactly what you're doing,
==10095== or are doing some strange experiment):
==10095==   /usr/lib/valgrind/../../bin/vgdb --pid=10095 ...command...
==10095== 
==10095== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10095==   /path/to/gdb ./zsh
==10095== and then give GDB the following command
==10095==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10095
==10095== --pid is optional if only one valgrind process is running
==10095== 
==10096== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10096-by-pythonnut-on-???
==10096== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10096-by-pythonnut-on-???
==10096== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10096-by-pythonnut-on-???
==10096== 
==10096== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10096== don't want to do, unless you know exactly what you're doing,
==10096== or are doing some strange experiment):
==10096==   /usr/lib/valgrind/../../bin/vgdb --pid=10096 ...command...
==10096== 
==10096== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10096==   /path/to/gdb ./zsh
==10096== and then give GDB the following command
==10096==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10096
==10096== --pid is optional if only one valgrind process is running
==10096== 
==10097== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10097-by-pythonnut-on-???
==10097== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10097-by-pythonnut-on-???
==10097== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10097-by-pythonnut-on-???
==10097== 
==10097== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10097== don't want to do, unless you know exactly what you're doing,
==10097== or are doing some strange experiment):
==10097==   /usr/lib/valgrind/../../bin/vgdb --pid=10097 ...command...
==10097== 
==10097== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10097==   /path/to/gdb ./zsh
==10097== and then give GDB the following command
==10097==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10097
==10097== --pid is optional if only one valgrind process is running
==10097== 
client request: code 4d430005,  addr 0xFFEFE9C1C,  len 4
--10097-- Caught __NR_exit; running __libc_freeres()
--10097-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10097== 
==10097== HEAP SUMMARY:
==10097==     in use at exit: 3,127,462 bytes in 69,235 blocks
==10097==   total heap usage: 1,597,554 allocs, 1,528,319 frees, 129,016,345 bytes allocated
==10097== 
==10097== Searching for pointers to 69,235 not-freed blocks
--10097--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10097--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10097--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10097--   Scanning root segment: 0x4037000..0x403afff (16384)
--10097--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10097--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10097--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10097--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10097--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10097--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10097--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10097--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10097--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10097--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10097--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10097--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10097--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10097--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10097--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10097--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10097--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10097--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10097--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10097--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10097--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10097--   Scanning root segment: 0x701a000..0x701afff (4096)
--10097--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10097--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10097--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10097--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10097--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10097--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10097--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10097--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10097--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10097--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10097== Checked 4,810,048 bytes
==10097== 
==10097== LEAK SUMMARY:
==10097==    definitely lost: 2,197 bytes in 13 blocks
==10097==    indirectly lost: 6,756 bytes in 7 blocks
==10097==      possibly lost: 0 bytes in 0 blocks
==10097==    still reachable: 3,118,509 bytes in 69,215 blocks
==10097==         suppressed: 0 bytes in 0 blocks
==10097== Rerun with --leak-check=full to see details of leaked memory
==10097== 
==10097== Use --track-origins=yes to see where uninitialised values come from
==10097== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10097== 
==10097== 1 errors in context 1 of 2:
==10097== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10097==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10097==    by 0x488CD0: stringsubst (subst.c:301)
==10097==    by 0x48801B: prefork (subst.c:77)
==10097==    by 0x42B318: execcmd (exec.c:2619)
==10097==    by 0x428CA0: execpline2 (exec.c:1697)
==10097==    by 0x427FD2: execpline (exec.c:1484)
==10097==    by 0x427756: execlist (exec.c:1267)
==10097==    by 0x42717C: execode (exec.c:1073)
==10097==    by 0x431299: runshfunc (exec.c:5040)
==10097==    by 0x430E76: doshfunc (exec.c:4920)
==10097==    by 0x4302FB: execshfunc (exec.c:4557)
==10097==    by 0x42D8C1: execcmd (exec.c:3373)
==10097== 
==10097== 
==10097== 2 errors in context 2 of 2:
==10097== Conditional jump or move depends on uninitialised value(s)
==10097==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10097==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10097==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10097==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10097==    by 0x42D8E9: execcmd (exec.c:3378)
==10097==    by 0x428CA0: execpline2 (exec.c:1697)
==10097==    by 0x427FD2: execpline (exec.c:1484)
==10097==    by 0x42779A: execlist (exec.c:1275)
==10097==    by 0x42717C: execode (exec.c:1073)
==10097==    by 0x431299: runshfunc (exec.c:5040)
==10097==    by 0x430E76: doshfunc (exec.c:4920)
==10097==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10097== 
==10097== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10102== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10102-by-pythonnut-on-???
==10102== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10102-by-pythonnut-on-???
==10102== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10102-by-pythonnut-on-???
==10102== 
==10102== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10102== don't want to do, unless you know exactly what you're doing,
==10102== or are doing some strange experiment):
==10102==   /usr/lib/valgrind/../../bin/vgdb --pid=10102 ...command...
==10102== 
==10102== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10102==   /path/to/gdb ./zsh
==10102== and then give GDB the following command
==10102==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10102
==10102== --pid is optional if only one valgrind process is running
==10102== 
--10102-- Caught __NR_exit; running __libc_freeres()
==10103== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10103-by-pythonnut-on-???
==10103== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10103-by-pythonnut-on-???
==10103== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10103-by-pythonnut-on-???
==10103== 
==10103== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10103== don't want to do, unless you know exactly what you're doing,
==10103== or are doing some strange experiment):
==10103==   /usr/lib/valgrind/../../bin/vgdb --pid=10103 ...command...
==10103== 
==10103== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10103==   /path/to/gdb ./zsh
==10103== and then give GDB the following command
==10103==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10103
==10103== --pid is optional if only one valgrind process is running
==10103== 
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--10102-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10102== 
==10102== HEAP SUMMARY:
==10102==     in use at exit: 3,164,329 bytes in 69,242 blocks
==10102==   total heap usage: 1,597,561 allocs, 1,528,319 frees, 129,056,268 bytes allocated
==10102== 
==10102== Searching for pointers to 69,242 not-freed blocks
--10102--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10102--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10102--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10102--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10102--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10102--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10102--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10102--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10102--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10102--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10102--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10102--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10102--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10102--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10102--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10102--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10102--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10102--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10102--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10102--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10102--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10102--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10102--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10102--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10102--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10102--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10102--   Scanning root segment: 0x701a000..0x701afff (4096)
--10102--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10102--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10102--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10102--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10102--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10102--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10102--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10102--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10102--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10102--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10102== Checked 4,921,864 bytes
==10102== 
==10102== LEAK SUMMARY:
==10102==    definitely lost: 2,197 bytes in 13 blocks
==10102==    indirectly lost: 6,756 bytes in 7 blocks
==10102==      possibly lost: 0 bytes in 0 blocks
==10102==    still reachable: 3,155,376 bytes in 69,222 blocks
==10102==         suppressed: 0 bytes in 0 blocks
==10102== Rerun with --leak-check=full to see details of leaked memory
==10102== 
==10102== Use --track-origins=yes to see where uninitialised values come from
==10102== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10102== 
==10102== 1 errors in context 1 of 2:
==10102== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10102==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10102==    by 0x488CD0: stringsubst (subst.c:301)
==10102==    by 0x48801B: prefork (subst.c:77)
==10102==    by 0x42B318: execcmd (exec.c:2619)
==10102==    by 0x428CA0: execpline2 (exec.c:1697)
==10102==    by 0x427FD2: execpline (exec.c:1484)
==10102==    by 0x427756: execlist (exec.c:1267)
==10102==    by 0x42717C: execode (exec.c:1073)
==10102==    by 0x431299: runshfunc (exec.c:5040)
==10102==    by 0x430E76: doshfunc (exec.c:4920)
==10102==    by 0x4302FB: execshfunc (exec.c:4557)
==10102==    by 0x42D8C1: execcmd (exec.c:3373)
==10102== 
==10102== 
==10102== 2 errors in context 2 of 2:
==10102== Conditional jump or move depends on uninitialised value(s)
==10102==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10102==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10102==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10102==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10102==    by 0x42D8E9: execcmd (exec.c:3378)
==10102==    by 0x428CA0: execpline2 (exec.c:1697)
==10102==    by 0x427FD2: execpline (exec.c:1484)
==10102==    by 0x42779A: execlist (exec.c:1275)
==10102==    by 0x42717C: execode (exec.c:1073)
==10102==    by 0x431299: runshfunc (exec.c:5040)
==10102==    by 0x430E76: doshfunc (exec.c:4920)
==10102==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10102== 
==10102== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10101== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10101-by-pythonnut-on-???
==10101== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10101-by-pythonnut-on-???
==10101== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10101-by-pythonnut-on-???
==10101== 
==10101== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10101== don't want to do, unless you know exactly what you're doing,
==10101== or are doing some strange experiment):
==10101==   /usr/lib/valgrind/../../bin/vgdb --pid=10101 ...command...
==10101== 
==10101== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10101==   /path/to/gdb ./zsh
==10101== and then give GDB the following command
==10101==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10101
==10101== --pid is optional if only one valgrind process is running
==10101== 
--10101-- Caught __NR_exit; running __libc_freeres()
--10101-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10101== 
==10101== HEAP SUMMARY:
==10101==     in use at exit: 3,164,297 bytes in 69,239 blocks
==10101==   total heap usage: 1,597,564 allocs, 1,528,325 frees, 129,056,876 bytes allocated
==10101== 
==10101== Searching for pointers to 69,239 not-freed blocks
--10101--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10101--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10101--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10101--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10101--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10101--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10101--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10101--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10101--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10101--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10101--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10101--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10101--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10101--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10101--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10101--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10101--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10101--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10101--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10101--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10101--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10101--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10101--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10101--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10101--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10101--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10101--   Scanning root segment: 0x701a000..0x701afff (4096)
--10101--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10101--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10101--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10101--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10101--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10101--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10101--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10101--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10101--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10101--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10101== Checked 4,921,192 bytes
==10101== 
==10101== LEAK SUMMARY:
==10101==    definitely lost: 2,197 bytes in 13 blocks
==10101==    indirectly lost: 6,756 bytes in 7 blocks
==10101==      possibly lost: 0 bytes in 0 blocks
==10101==    still reachable: 3,155,344 bytes in 69,219 blocks
==10101==         suppressed: 0 bytes in 0 blocks
==10101== Rerun with --leak-check=full to see details of leaked memory
==10101== 
==10101== Use --track-origins=yes to see where uninitialised values come from
==10101== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10101== 
==10101== 1 errors in context 1 of 2:
==10101== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10101==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10101==    by 0x488CD0: stringsubst (subst.c:301)
==10101==    by 0x48801B: prefork (subst.c:77)
==10101==    by 0x42B318: execcmd (exec.c:2619)
==10101==    by 0x428CA0: execpline2 (exec.c:1697)
==10101==    by 0x427FD2: execpline (exec.c:1484)
==10101==    by 0x427756: execlist (exec.c:1267)
==10101==    by 0x42717C: execode (exec.c:1073)
==10101==    by 0x431299: runshfunc (exec.c:5040)
==10101==    by 0x430E76: doshfunc (exec.c:4920)
==10101==    by 0x4302FB: execshfunc (exec.c:4557)
==10101==    by 0x42D8C1: execcmd (exec.c:3373)
==10101== 
==10101== 
==10101== 2 errors in context 2 of 2:
==10101== Conditional jump or move depends on uninitialised value(s)
==10101==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10101==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10101==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10101==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10101==    by 0x42D8E9: execcmd (exec.c:3378)
==10101==    by 0x428CA0: execpline2 (exec.c:1697)
==10101==    by 0x427FD2: execpline (exec.c:1484)
==10101==    by 0x42779A: execlist (exec.c:1275)
==10101==    by 0x42717C: execode (exec.c:1073)
==10101==    by 0x431299: runshfunc (exec.c:5040)
==10101==    by 0x430E76: doshfunc (exec.c:4920)
==10101==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10101== 
==10101== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10104== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10104-by-pythonnut-on-???
==10104== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10104-by-pythonnut-on-???
==10104== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10104-by-pythonnut-on-???
==10104== 
==10104== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10104== don't want to do, unless you know exactly what you're doing,
==10104== or are doing some strange experiment):
==10104==   /usr/lib/valgrind/../../bin/vgdb --pid=10104 ...command...
==10104== 
==10104== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10104==   /path/to/gdb ./zsh
==10104== and then give GDB the following command
==10104==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10104
==10104== --pid is optional if only one valgrind process is running
==10104== 
==10105== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10105-by-pythonnut-on-???
==10105== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10105-by-pythonnut-on-???
==10105== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10105-by-pythonnut-on-???
==10105== 
==10105== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10105== don't want to do, unless you know exactly what you're doing,
==10105== or are doing some strange experiment):
==10105==   /usr/lib/valgrind/../../bin/vgdb --pid=10105 ...command...
==10105== 
==10105== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10105==   /path/to/gdb ./zsh
==10105== and then give GDB the following command
==10105==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10105
==10105== --pid is optional if only one valgrind process is running
==10105== 
--10105-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA81C,  len 4
--10105-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10105== 
==10105== HEAP SUMMARY:
==10105==     in use at exit: 3,201,015 bytes in 69,245 blocks
==10105==   total heap usage: 1,597,570 allocs, 1,528,325 frees, 129,095,111 bytes allocated
==10105== 
==10105== Searching for pointers to 69,245 not-freed blocks
--10105--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10105--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10105--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10105--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10105--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10105--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10105--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10105--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10105--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10105--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10105--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10105--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10105--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10105--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10105--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10105--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10105--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10105--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10105--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10105--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10105--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10105--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10105--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10105--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10105--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10105--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10105--   Scanning root segment: 0x701a000..0x701afff (4096)
--10105--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10105--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10105--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10105--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10105--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10105--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10105--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10105--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10105--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10105--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10105== Checked 4,995,392 bytes
==10105== 
==10105== LEAK SUMMARY:
==10105==    definitely lost: 2,197 bytes in 13 blocks
==10105==    indirectly lost: 6,756 bytes in 7 blocks
==10105==      possibly lost: 0 bytes in 0 blocks
==10105==    still reachable: 3,192,062 bytes in 69,225 blocks
==10105==         suppressed: 0 bytes in 0 blocks
==10105== Rerun with --leak-check=full to see details of leaked memory
==10105== 
==10105== Use --track-origins=yes to see where uninitialised values come from
==10105== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10105== 
==10105== 1 errors in context 1 of 2:
==10105== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10105==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10105==    by 0x488CD0: stringsubst (subst.c:301)
==10105==    by 0x48801B: prefork (subst.c:77)
==10105==    by 0x42B318: execcmd (exec.c:2619)
==10105==    by 0x428CA0: execpline2 (exec.c:1697)
==10105==    by 0x427FD2: execpline (exec.c:1484)
==10105==    by 0x427756: execlist (exec.c:1267)
==10105==    by 0x42717C: execode (exec.c:1073)
==10105==    by 0x431299: runshfunc (exec.c:5040)
==10105==    by 0x430E76: doshfunc (exec.c:4920)
==10105==    by 0x4302FB: execshfunc (exec.c:4557)
==10105==    by 0x42D8C1: execcmd (exec.c:3373)
==10105== 
==10105== 
==10105== 2 errors in context 2 of 2:
==10105== Conditional jump or move depends on uninitialised value(s)
==10105==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10105==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10105==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10105==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10105==    by 0x42D8E9: execcmd (exec.c:3378)
==10105==    by 0x428CA0: execpline2 (exec.c:1697)
==10105==    by 0x427FD2: execpline (exec.c:1484)
==10105==    by 0x42779A: execlist (exec.c:1275)
==10105==    by 0x42717C: execode (exec.c:1073)
==10105==    by 0x431299: runshfunc (exec.c:5040)
==10105==    by 0x430E76: doshfunc (exec.c:4920)
==10105==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10105== 
==10105== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10104-- Caught __NR_exit; running __libc_freeres()
--10104-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10104== 
==10104== HEAP SUMMARY:
==10104==     in use at exit: 3,164,375 bytes in 69,242 blocks
==10104==   total heap usage: 1,597,573 allocs, 1,528,331 frees, 129,095,687 bytes allocated
==10104== 
==10104== Searching for pointers to 69,242 not-freed blocks
--10104--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10104--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10104--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10104--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10104--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10104--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10104--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10104--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10104--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10104--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10104--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10104--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10104--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10104--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10104--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10104--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10104--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10104--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10104--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10104--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10104--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10104--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10104--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10104--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10104--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10104--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10104--   Scanning root segment: 0x701a000..0x701afff (4096)
--10104--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10104--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10104--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10104--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10104--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10104--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10104--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10104--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10104--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10104--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10104== Checked 4,958,136 bytes
==10104== 
==10104== LEAK SUMMARY:
==10104==    definitely lost: 2,197 bytes in 13 blocks
==10104==    indirectly lost: 6,756 bytes in 7 blocks
==10104==      possibly lost: 0 bytes in 0 blocks
==10104==    still reachable: 3,155,422 bytes in 69,222 blocks
==10104==         suppressed: 0 bytes in 0 blocks
==10104== Rerun with --leak-check=full to see details of leaked memory
==10104== 
==10104== Use --track-origins=yes to see where uninitialised values come from
==10104== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10104== 
==10104== 1 errors in context 1 of 2:
==10104== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10104==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10104==    by 0x488CD0: stringsubst (subst.c:301)
==10104==    by 0x48801B: prefork (subst.c:77)
==10104==    by 0x42B318: execcmd (exec.c:2619)
==10104==    by 0x428CA0: execpline2 (exec.c:1697)
==10104==    by 0x427FD2: execpline (exec.c:1484)
==10104==    by 0x427756: execlist (exec.c:1267)
==10104==    by 0x42717C: execode (exec.c:1073)
==10104==    by 0x431299: runshfunc (exec.c:5040)
==10104==    by 0x430E76: doshfunc (exec.c:4920)
==10104==    by 0x4302FB: execshfunc (exec.c:4557)
==10104==    by 0x42D8C1: execcmd (exec.c:3373)
==10104== 
==10104== 
==10104== 2 errors in context 2 of 2:
==10104== Conditional jump or move depends on uninitialised value(s)
==10104==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10104==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10104==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10104==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10104==    by 0x42D8E9: execcmd (exec.c:3378)
==10104==    by 0x428CA0: execpline2 (exec.c:1697)
==10104==    by 0x427FD2: execpline (exec.c:1484)
==10104==    by 0x42779A: execlist (exec.c:1275)
==10104==    by 0x42717C: execode (exec.c:1073)
==10104==    by 0x431299: runshfunc (exec.c:5040)
==10104==    by 0x430E76: doshfunc (exec.c:4920)
==10104==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10104== 
==10104== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10107== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10107-by-pythonnut-on-???
==10107== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10107-by-pythonnut-on-???
==10107== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10107-by-pythonnut-on-???
==10107== 
==10107== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10107== don't want to do, unless you know exactly what you're doing,
==10107== or are doing some strange experiment):
==10107==   /usr/lib/valgrind/../../bin/vgdb --pid=10107 ...command...
==10107== 
==10107== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10107==   /path/to/gdb ./zsh
==10107== and then give GDB the following command
==10107==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10107
==10107== --pid is optional if only one valgrind process is running
==10107== 
==10108== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10108-by-pythonnut-on-???
==10108== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10108-by-pythonnut-on-???
==10108== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10108-by-pythonnut-on-???
==10108== 
==10108== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10108== don't want to do, unless you know exactly what you're doing,
==10108== or are doing some strange experiment):
==10108==   /usr/lib/valgrind/../../bin/vgdb --pid=10108 ...command...
==10108== 
==10108== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10108==   /path/to/gdb ./zsh
==10108== and then give GDB the following command
==10108==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10108
==10108== --pid is optional if only one valgrind process is running
==10108== 
--10108-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEA64C,  len 4
--10108-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10108== 
==10108== HEAP SUMMARY:
==10108==     in use at exit: 3,201,101 bytes in 69,248 blocks
==10108==   total heap usage: 1,597,583 allocs, 1,528,335 frees, 129,100,397 bytes allocated
==10108== 
==10108== Searching for pointers to 69,248 not-freed blocks
--10108--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10108--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10108--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10108--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10108--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10108--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10108--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10108--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10108--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10108--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10108--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10108--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10108--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10108--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10108--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10108--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10108--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10108--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10108--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10108--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10108--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10108--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10108--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10108--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10108--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10108--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10108--   Scanning root segment: 0x701a000..0x701afff (4096)
--10108--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10108--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10108--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10108--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10108--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10108--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10108--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10108--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10108--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10108--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10108== Checked 4,995,744 bytes
==10108== 
==10108== LEAK SUMMARY:
==10108==    definitely lost: 2,197 bytes in 13 blocks
==10108==    indirectly lost: 6,756 bytes in 7 blocks
==10108==      possibly lost: 0 bytes in 0 blocks
==10108==    still reachable: 3,192,148 bytes in 69,228 blocks
==10108==         suppressed: 0 bytes in 0 blocks
==10108== Rerun with --leak-check=full to see details of leaked memory
==10108== 
==10108== Use --track-origins=yes to see where uninitialised values come from
==10108== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10108== 
==10108== 1 errors in context 1 of 2:
==10108== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10108==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10108==    by 0x488CD0: stringsubst (subst.c:301)
==10108==    by 0x48801B: prefork (subst.c:77)
==10108==    by 0x42B318: execcmd (exec.c:2619)
==10108==    by 0x428CA0: execpline2 (exec.c:1697)
==10108==    by 0x427FD2: execpline (exec.c:1484)
==10108==    by 0x427756: execlist (exec.c:1267)
==10108==    by 0x42717C: execode (exec.c:1073)
==10108==    by 0x431299: runshfunc (exec.c:5040)
==10108==    by 0x430E76: doshfunc (exec.c:4920)
==10108==    by 0x4302FB: execshfunc (exec.c:4557)
==10108==    by 0x42D8C1: execcmd (exec.c:3373)
==10108== 
==10108== 
==10108== 2 errors in context 2 of 2:
==10108== Conditional jump or move depends on uninitialised value(s)
==10108==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10108==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10108==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10108==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10108==    by 0x42D8E9: execcmd (exec.c:3378)
==10108==    by 0x428CA0: execpline2 (exec.c:1697)
==10108==    by 0x427FD2: execpline (exec.c:1484)
==10108==    by 0x42779A: execlist (exec.c:1275)
==10108==    by 0x42717C: execode (exec.c:1073)
==10108==    by 0x431299: runshfunc (exec.c:5040)
==10108==    by 0x430E76: doshfunc (exec.c:4920)
==10108==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10108== 
==10108== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10107-- Caught __NR_exit; running __libc_freeres()
--10107-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10107== 
==10107== HEAP SUMMARY:
==10107==     in use at exit: 3,164,461 bytes in 69,245 blocks
==10107==   total heap usage: 1,597,586 allocs, 1,528,341 frees, 129,100,973 bytes allocated
==10107== 
==10107== Searching for pointers to 69,245 not-freed blocks
--10107--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10107--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10107--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10107--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10107--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10107--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10107--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10107--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10107--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10107--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10107--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10107--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10107--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10107--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10107--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10107--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10107--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10107--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10107--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10107--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10107--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10107--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10107--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10107--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10107--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10107--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10107--   Scanning root segment: 0x701a000..0x701afff (4096)
--10107--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10107--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10107--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10107--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10107--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10107--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10107--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10107--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10107--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10107--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10107== Checked 4,958,488 bytes
==10107== 
==10107== LEAK SUMMARY:
==10107==    definitely lost: 2,197 bytes in 13 blocks
==10107==    indirectly lost: 6,756 bytes in 7 blocks
==10107==      possibly lost: 0 bytes in 0 blocks
==10107==    still reachable: 3,155,508 bytes in 69,225 blocks
==10107==         suppressed: 0 bytes in 0 blocks
==10107== Rerun with --leak-check=full to see details of leaked memory
==10107== 
==10107== Use --track-origins=yes to see where uninitialised values come from
==10107== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10107== 
==10107== 1 errors in context 1 of 2:
==10107== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10107==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10107==    by 0x488CD0: stringsubst (subst.c:301)
==10107==    by 0x48801B: prefork (subst.c:77)
==10107==    by 0x42B318: execcmd (exec.c:2619)
==10107==    by 0x428CA0: execpline2 (exec.c:1697)
==10107==    by 0x427FD2: execpline (exec.c:1484)
==10107==    by 0x427756: execlist (exec.c:1267)
==10107==    by 0x42717C: execode (exec.c:1073)
==10107==    by 0x431299: runshfunc (exec.c:5040)
==10107==    by 0x430E76: doshfunc (exec.c:4920)
==10107==    by 0x4302FB: execshfunc (exec.c:4557)
==10107==    by 0x42D8C1: execcmd (exec.c:3373)
==10107== 
==10107== 
==10107== 2 errors in context 2 of 2:
==10107== Conditional jump or move depends on uninitialised value(s)
==10107==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10107==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10107==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10107==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10107==    by 0x42D8E9: execcmd (exec.c:3378)
==10107==    by 0x428CA0: execpline2 (exec.c:1697)
==10107==    by 0x427FD2: execpline (exec.c:1484)
==10107==    by 0x42779A: execlist (exec.c:1275)
==10107==    by 0x42717C: execode (exec.c:1073)
==10107==    by 0x431299: runshfunc (exec.c:5040)
==10107==    by 0x430E76: doshfunc (exec.c:4920)
==10107==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10107== 
==10107== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10112== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10112-by-pythonnut-on-???
==10112== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10112-by-pythonnut-on-???
==10112== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10112-by-pythonnut-on-???
==10112== 
==10112== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10112== don't want to do, unless you know exactly what you're doing,
==10112== or are doing some strange experiment):
==10112==   /usr/lib/valgrind/../../bin/vgdb --pid=10112 ...command...
==10112== 
==10112== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10112==   /path/to/gdb ./zsh
==10112== and then give GDB the following command
==10112==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10112
==10112== --pid is optional if only one valgrind process is running
==10112== 
--10113-- Caught __NR_exit; running __libc_freeres()
==10113== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10113-by-pythonnut-on-???
==10113== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10113-by-pythonnut-on-???
==10113== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10113-by-pythonnut-on-???
==10113== 
==10113== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10113== don't want to do, unless you know exactly what you're doing,
==10113== or are doing some strange experiment):
==10113==   /usr/lib/valgrind/../../bin/vgdb --pid=10113 ...command...
==10113== 
==10113== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10113==   /path/to/gdb ./zsh
==10113== and then give GDB the following command
==10113==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10113
==10113== --pid is optional if only one valgrind process is running
==10113== 
client request: code 4d430005,  addr 0xFFEFE9B1C,  len 4
--10113-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10113== 
==10113== HEAP SUMMARY:
==10113==     in use at exit: 3,164,525 bytes in 69,248 blocks
==10113==   total heap usage: 1,597,596 allocs, 1,528,348 frees, 129,070,534 bytes allocated
==10113== 
==10113== Searching for pointers to 69,248 not-freed blocks
--10113--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10113--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10113--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10113--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10113--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10113--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10113--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10113--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10113--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10113--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10113--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10113--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10113--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10113--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10113--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10113--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10113--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10113--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10113--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10113--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10113--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10113--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10113--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10113--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10113--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10113--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10113--   Scanning root segment: 0x701a000..0x701afff (4096)
--10113--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10113--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10113--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10113--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10113--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10113--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10113--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10113--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10113--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10113--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10113== Checked 4,923,136 bytes
==10113== 
==10113== LEAK SUMMARY:
==10113==    definitely lost: 2,197 bytes in 13 blocks
==10113==    indirectly lost: 6,756 bytes in 7 blocks
==10113==      possibly lost: 0 bytes in 0 blocks
==10113==    still reachable: 3,155,572 bytes in 69,228 blocks
==10113==         suppressed: 0 bytes in 0 blocks
==10113== Rerun with --leak-check=full to see details of leaked memory
==10113== 
==10113== Use --track-origins=yes to see where uninitialised values come from
==10113== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10113== 
==10113== 1 errors in context 1 of 2:
==10113== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10113==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10113==    by 0x488CD0: stringsubst (subst.c:301)
==10113==    by 0x48801B: prefork (subst.c:77)
==10113==    by 0x42B318: execcmd (exec.c:2619)
==10113==    by 0x428CA0: execpline2 (exec.c:1697)
==10113==    by 0x427FD2: execpline (exec.c:1484)
==10113==    by 0x427756: execlist (exec.c:1267)
==10113==    by 0x42717C: execode (exec.c:1073)
==10113==    by 0x431299: runshfunc (exec.c:5040)
==10113==    by 0x430E76: doshfunc (exec.c:4920)
==10113==    by 0x4302FB: execshfunc (exec.c:4557)
==10113==    by 0x42D8C1: execcmd (exec.c:3373)
==10113== 
==10113== 
==10113== 2 errors in context 2 of 2:
==10113== Conditional jump or move depends on uninitialised value(s)
==10113==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10113==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10113==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10113==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10113==    by 0x42D8E9: execcmd (exec.c:3378)
==10113==    by 0x428CA0: execpline2 (exec.c:1697)
==10113==    by 0x427FD2: execpline (exec.c:1484)
==10113==    by 0x42779A: execlist (exec.c:1275)
==10113==    by 0x42717C: execode (exec.c:1073)
==10113==    by 0x431299: runshfunc (exec.c:5040)
==10113==    by 0x430E76: doshfunc (exec.c:4920)
==10113==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10113== 
==10113== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10112-- Caught __NR_exit; running __libc_freeres()
--10112-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10112== 
==10112== HEAP SUMMARY:
==10112==     in use at exit: 3,164,557 bytes in 69,245 blocks
==10112==   total heap usage: 1,597,599 allocs, 1,528,354 frees, 129,071,206 bytes allocated
==10112== 
==10112== Searching for pointers to 69,245 not-freed blocks
--10112--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10112--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10112--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10112--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10112--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10112--   Scanning root segment: 0x41d6000..0x41defff (36864)
--10112--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10112--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10112--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10112--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10112--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10112--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10112--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10112--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10112--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10112--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10112--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10112--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10112--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10112--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10112--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10112--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10112--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10112--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10112--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10112--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10112--   Scanning root segment: 0x701a000..0x701afff (4096)
--10112--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10112--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10112--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10112--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10112--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10112--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10112--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10112--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10112--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10112--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10112== Checked 4,922,520 bytes
==10112== 
==10112== LEAK SUMMARY:
==10112==    definitely lost: 2,197 bytes in 13 blocks
==10112==    indirectly lost: 6,756 bytes in 7 blocks
==10112==      possibly lost: 0 bytes in 0 blocks
==10112==    still reachable: 3,155,604 bytes in 69,225 blocks
==10112==         suppressed: 0 bytes in 0 blocks
==10112== Rerun with --leak-check=full to see details of leaked memory
==10112== 
==10112== Use --track-origins=yes to see where uninitialised values come from
==10112== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10112== 
==10112== 1 errors in context 1 of 2:
==10112== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10112==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10112==    by 0x488CD0: stringsubst (subst.c:301)
==10112==    by 0x48801B: prefork (subst.c:77)
==10112==    by 0x42B318: execcmd (exec.c:2619)
==10112==    by 0x428CA0: execpline2 (exec.c:1697)
==10112==    by 0x427FD2: execpline (exec.c:1484)
==10112==    by 0x427756: execlist (exec.c:1267)
==10112==    by 0x42717C: execode (exec.c:1073)
==10112==    by 0x431299: runshfunc (exec.c:5040)
==10112==    by 0x430E76: doshfunc (exec.c:4920)
==10112==    by 0x4302FB: execshfunc (exec.c:4557)
==10112==    by 0x42D8C1: execcmd (exec.c:3373)
==10112== 
==10112== 
==10112== 2 errors in context 2 of 2:
==10112== Conditional jump or move depends on uninitialised value(s)
==10112==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10112==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10112==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10112==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10112==    by 0x42D8E9: execcmd (exec.c:3378)
==10112==    by 0x428CA0: execpline2 (exec.c:1697)
==10112==    by 0x427FD2: execpline (exec.c:1484)
==10112==    by 0x42779A: execlist (exec.c:1275)
==10112==    by 0x42717C: execode (exec.c:1073)
==10112==    by 0x431299: runshfunc (exec.c:5040)
==10112==    by 0x430E76: doshfunc (exec.c:4920)
==10112==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10112== 
==10112== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10115== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10115-by-pythonnut-on-???
==10115== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10115-by-pythonnut-on-???
==10115== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10115-by-pythonnut-on-???
==10115== 
==10115== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10115== don't want to do, unless you know exactly what you're doing,
==10115== or are doing some strange experiment):
==10115==   /usr/lib/valgrind/../../bin/vgdb --pid=10115 ...command...
==10115== 
==10115== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10115==   /path/to/gdb ./zsh
==10115== and then give GDB the following command
==10115==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10115
==10115== --pid is optional if only one valgrind process is running
==10115== 
==10116== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10116-by-pythonnut-on-???
==10116== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10116-by-pythonnut-on-???
==10116== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10116-by-pythonnut-on-???
==10116== 
==10116== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10116== don't want to do, unless you know exactly what you're doing,
==10116== or are doing some strange experiment):
==10116==   /usr/lib/valgrind/../../bin/vgdb --pid=10116 ...command...
==10116== 
==10116== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10116==   /path/to/gdb ./zsh
==10116== and then give GDB the following command
==10116==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10116
==10116== --pid is optional if only one valgrind process is running
==10116== 
--10116-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE9FCC,  len 4
--10116-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10116== 
==10116== HEAP SUMMARY:
==10116==     in use at exit: 3,201,301 bytes in 69,251 blocks
==10116==   total heap usage: 1,597,606 allocs, 1,528,355 frees, 129,109,679 bytes allocated
==10116== 
==10116== Searching for pointers to 69,251 not-freed blocks
--10116--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10116--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10116--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10116--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10116--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10116--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10116--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10116--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10116--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10116--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10116--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10116--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10116--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10116--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10116--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10116--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10116--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10116--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10116--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10116--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10116--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10116--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10116--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10116--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10116--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10116--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10116--   Scanning root segment: 0x701a000..0x701afff (4096)
--10116--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10116--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10116--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10116--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10116--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10116--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10116--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10116--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10116--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10116--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10116== Checked 4,996,480 bytes
==10116== 
==10116== LEAK SUMMARY:
==10116==    definitely lost: 2,197 bytes in 13 blocks
==10116==    indirectly lost: 6,756 bytes in 7 blocks
==10116==      possibly lost: 0 bytes in 0 blocks
==10116==    still reachable: 3,192,348 bytes in 69,231 blocks
==10116==         suppressed: 0 bytes in 0 blocks
==10116== Rerun with --leak-check=full to see details of leaked memory
==10116== 
==10116== Use --track-origins=yes to see where uninitialised values come from
==10116== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10116== 
==10116== 1 errors in context 1 of 2:
==10116== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10116==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10116==    by 0x488CD0: stringsubst (subst.c:301)
==10116==    by 0x48801B: prefork (subst.c:77)
==10116==    by 0x42B318: execcmd (exec.c:2619)
==10116==    by 0x428CA0: execpline2 (exec.c:1697)
==10116==    by 0x427FD2: execpline (exec.c:1484)
==10116==    by 0x427756: execlist (exec.c:1267)
==10116==    by 0x42717C: execode (exec.c:1073)
==10116==    by 0x431299: runshfunc (exec.c:5040)
==10116==    by 0x430E76: doshfunc (exec.c:4920)
==10116==    by 0x4302FB: execshfunc (exec.c:4557)
==10116==    by 0x42D8C1: execcmd (exec.c:3373)
==10116== 
==10116== 
==10116== 2 errors in context 2 of 2:
==10116== Conditional jump or move depends on uninitialised value(s)
==10116==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10116==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10116==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10116==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10116==    by 0x42D8E9: execcmd (exec.c:3378)
==10116==    by 0x428CA0: execpline2 (exec.c:1697)
==10116==    by 0x427FD2: execpline (exec.c:1484)
==10116==    by 0x42779A: execlist (exec.c:1275)
==10116==    by 0x42717C: execode (exec.c:1073)
==10116==    by 0x431299: runshfunc (exec.c:5040)
==10116==    by 0x430E76: doshfunc (exec.c:4920)
==10116==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10116== 
==10116== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10115-- Caught __NR_exit; running __libc_freeres()
--10115-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10115== 
==10115== HEAP SUMMARY:
==10115==     in use at exit: 3,164,757 bytes in 69,248 blocks
==10115==   total heap usage: 1,597,609 allocs, 1,528,361 frees, 129,110,351 bytes allocated
==10115== 
==10115== Searching for pointers to 69,248 not-freed blocks
--10115--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10115--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10115--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10115--   Scanning root segment: 0x4037000..0x4043fff (53248)
--10115--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10115--   Scanning root segment: 0x41d6000..0x41e7fff (73728)
--10115--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10115--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10115--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10115--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10115--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10115--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10115--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10115--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10115--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10115--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10115--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10115--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10115--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10115--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10115--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10115--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10115--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10115--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10115--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10115--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10115--   Scanning root segment: 0x701a000..0x701afff (4096)
--10115--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10115--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10115--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10115--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10115--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10115--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10115--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10115--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10115--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10115--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10115== Checked 4,959,304 bytes
==10115== 
==10115== LEAK SUMMARY:
==10115==    definitely lost: 2,197 bytes in 13 blocks
==10115==    indirectly lost: 6,756 bytes in 7 blocks
==10115==      possibly lost: 0 bytes in 0 blocks
==10115==    still reachable: 3,155,804 bytes in 69,228 blocks
==10115==         suppressed: 0 bytes in 0 blocks
==10115== Rerun with --leak-check=full to see details of leaked memory
==10115== 
==10115== Use --track-origins=yes to see where uninitialised values come from
==10115== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10115== 
==10115== 1 errors in context 1 of 2:
==10115== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10115==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10115==    by 0x488CD0: stringsubst (subst.c:301)
==10115==    by 0x48801B: prefork (subst.c:77)
==10115==    by 0x42B318: execcmd (exec.c:2619)
==10115==    by 0x428CA0: execpline2 (exec.c:1697)
==10115==    by 0x427FD2: execpline (exec.c:1484)
==10115==    by 0x427756: execlist (exec.c:1267)
==10115==    by 0x42717C: execode (exec.c:1073)
==10115==    by 0x431299: runshfunc (exec.c:5040)
==10115==    by 0x430E76: doshfunc (exec.c:4920)
==10115==    by 0x4302FB: execshfunc (exec.c:4557)
==10115==    by 0x42D8C1: execcmd (exec.c:3373)
==10115== 
==10115== 
==10115== 2 errors in context 2 of 2:
==10115== Conditional jump or move depends on uninitialised value(s)
==10115==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10115==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10115==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10115==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10115==    by 0x42D8E9: execcmd (exec.c:3378)
==10115==    by 0x428CA0: execpline2 (exec.c:1697)
==10115==    by 0x427FD2: execpline (exec.c:1484)
==10115==    by 0x42779A: execlist (exec.c:1275)
==10115==    by 0x42717C: execode (exec.c:1073)
==10115==    by 0x431299: runshfunc (exec.c:5040)
==10115==    by 0x430E76: doshfunc (exec.c:4920)
==10115==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10115== 
==10115== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10096-- Caught __NR_exit; running __libc_freeres()
--10096-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10096== 
==10096== HEAP SUMMARY:
==10096==     in use at exit: 3,127,063 bytes in 69,225 blocks
==10096==   total heap usage: 1,597,615 allocs, 1,528,390 frees, 129,078,241 bytes allocated
==10096== 
==10096== Searching for pointers to 69,225 not-freed blocks
--10096--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10096--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10096--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10096--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10096--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10096--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10096--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10096--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10096--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10096--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10096--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10096--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10096--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10096--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10096--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10096--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10096--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10096--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10096--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10096--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10096--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10096--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10096--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10096--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10096--   Scanning root segment: 0x701a000..0x701afff (4096)
--10096--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10096--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10096--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10096--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10096--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10096--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10096--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10096--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10096--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10096--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10096== Checked 4,791,208 bytes
==10096== 
==10096== LEAK SUMMARY:
==10096==    definitely lost: 2,197 bytes in 13 blocks
==10096==    indirectly lost: 6,756 bytes in 7 blocks
==10096==      possibly lost: 0 bytes in 0 blocks
==10096==    still reachable: 3,118,110 bytes in 69,205 blocks
==10096==         suppressed: 0 bytes in 0 blocks
==10096== Rerun with --leak-check=full to see details of leaked memory
==10096== 
==10096== Use --track-origins=yes to see where uninitialised values come from
==10096== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10096== 
==10096== 1 errors in context 1 of 2:
==10096== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10096==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10096==    by 0x488CD0: stringsubst (subst.c:301)
==10096==    by 0x48801B: prefork (subst.c:77)
==10096==    by 0x42B318: execcmd (exec.c:2619)
==10096==    by 0x428CA0: execpline2 (exec.c:1697)
==10096==    by 0x427FD2: execpline (exec.c:1484)
==10096==    by 0x427756: execlist (exec.c:1267)
==10096==    by 0x42717C: execode (exec.c:1073)
==10096==    by 0x431299: runshfunc (exec.c:5040)
==10096==    by 0x430E76: doshfunc (exec.c:4920)
==10096==    by 0x4302FB: execshfunc (exec.c:4557)
==10096==    by 0x42D8C1: execcmd (exec.c:3373)
==10096== 
==10096== 
==10096== 2 errors in context 2 of 2:
==10096== Conditional jump or move depends on uninitialised value(s)
==10096==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10096==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10096==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10096==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10096==    by 0x42D8E9: execcmd (exec.c:3378)
==10096==    by 0x428CA0: execpline2 (exec.c:1697)
==10096==    by 0x427FD2: execpline (exec.c:1484)
==10096==    by 0x42779A: execlist (exec.c:1275)
==10096==    by 0x42717C: execode (exec.c:1073)
==10096==    by 0x431299: runshfunc (exec.c:5040)
==10096==    by 0x430E76: doshfunc (exec.c:4920)
==10096==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10096== 
==10096== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10095-- Caught __NR_exit; running __libc_freeres()
--10095-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10095== 
==10095== HEAP SUMMARY:
==10095==     in use at exit: 3,125,647 bytes in 69,187 blocks
==10095==   total heap usage: 1,597,514 allocs, 1,528,327 frees, 129,006,363 bytes allocated
==10095== 
==10095== Searching for pointers to 69,187 not-freed blocks
--10095--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10095--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10095--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10095--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10095--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10095--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10095--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10095--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10095--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10095--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10095--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10095--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10095--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10095--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10095--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10095--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10095--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10095--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10095--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10095--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10095--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10095--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10095--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10095--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10095--   Scanning root segment: 0x701a000..0x701afff (4096)
--10095--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10095--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10095--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10095--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10095--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10095--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10095--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10095--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10095--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10095--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10095== Checked 4,788,048 bytes
==10095== 
==10095== LEAK SUMMARY:
==10095==    definitely lost: 2,197 bytes in 13 blocks
==10095==    indirectly lost: 6,756 bytes in 7 blocks
==10095==      possibly lost: 0 bytes in 0 blocks
==10095==    still reachable: 3,116,694 bytes in 69,167 blocks
==10095==         suppressed: 0 bytes in 0 blocks
==10095== Rerun with --leak-check=full to see details of leaked memory
==10095== 
==10095== Use --track-origins=yes to see where uninitialised values come from
==10095== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10095== 
==10095== 1 errors in context 1 of 2:
==10095== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10095==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10095==    by 0x488CD0: stringsubst (subst.c:301)
==10095==    by 0x48801B: prefork (subst.c:77)
==10095==    by 0x42B318: execcmd (exec.c:2619)
==10095==    by 0x428CA0: execpline2 (exec.c:1697)
==10095==    by 0x427FD2: execpline (exec.c:1484)
==10095==    by 0x427756: execlist (exec.c:1267)
==10095==    by 0x42717C: execode (exec.c:1073)
==10095==    by 0x431299: runshfunc (exec.c:5040)
==10095==    by 0x430E76: doshfunc (exec.c:4920)
==10095==    by 0x4302FB: execshfunc (exec.c:4557)
==10095==    by 0x42D8C1: execcmd (exec.c:3373)
==10095== 
==10095== 
==10095== 2 errors in context 2 of 2:
==10095== Conditional jump or move depends on uninitialised value(s)
==10095==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10095==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10095==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10095==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10095==    by 0x42D8E9: execcmd (exec.c:3378)
==10095==    by 0x428CA0: execpline2 (exec.c:1697)
==10095==    by 0x427FD2: execpline (exec.c:1484)
==10095==    by 0x42779A: execlist (exec.c:1275)
==10095==    by 0x42717C: execode (exec.c:1073)
==10095==    by 0x431299: runshfunc (exec.c:5040)
==10095==    by 0x430E76: doshfunc (exec.c:4920)
==10095==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10095== 
==10095== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10120-by-pythonnut-on-???
==10120== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10120-by-pythonnut-on-???
==10120== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10120-by-pythonnut-on-???
==10120== 
==10120== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10120== don't want to do, unless you know exactly what you're doing,
==10120== or are doing some strange experiment):
==10120==   /usr/lib/valgrind/../../bin/vgdb --pid=10120 ...command...
==10120== 
==10120== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10120==   /path/to/gdb ./zsh
==10120== and then give GDB the following command
==10120==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10120
==10120== --pid is optional if only one valgrind process is running
==10120== 
==10121== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10121-by-pythonnut-on-???
==10121== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10121-by-pythonnut-on-???
==10121== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10121-by-pythonnut-on-???
==10121== 
==10121== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10121== don't want to do, unless you know exactly what you're doing,
==10121== or are doing some strange experiment):
==10121==   /usr/lib/valgrind/../../bin/vgdb --pid=10121 ...command...
==10121== 
==10121== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10121==   /path/to/gdb ./zsh
==10121== and then give GDB the following command
==10121==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10121
==10121== --pid is optional if only one valgrind process is running
==10121== 
==10123== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10123-by-pythonnut-on-???
==10123== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10123-by-pythonnut-on-???
==10123== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10123-by-pythonnut-on-???
==10123== 
==10123== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10123== don't want to do, unless you know exactly what you're doing,
==10123== or are doing some strange experiment):
==10123==   /usr/lib/valgrind/../../bin/vgdb --pid=10123 ...command...
==10123== 
==10123== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10123==   /path/to/gdb ./zsh
==10123== and then give GDB the following command
==10123==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10123
==10123== --pid is optional if only one valgrind process is running
==10123== 
--10122-- Caught __NR_exit; running __libc_freeres()
==10122== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10122-by-pythonnut-on-???
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==10122== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10122-by-pythonnut-on-???
==10122== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10122-by-pythonnut-on-???
==10122== 
==10122== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10122== don't want to do, unless you know exactly what you're doing,
==10122== or are doing some strange experiment):
==10122==   /usr/lib/valgrind/../../bin/vgdb --pid=10122 ...command...
==10122== 
==10122== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10122==   /path/to/gdb ./zsh
==10122== and then give GDB the following command
==10122==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10122
==10122== --pid is optional if only one valgrind process is running
==10122== 
==10125== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10125-by-pythonnut-on-???
==10125== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10125-by-pythonnut-on-???
==10125== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10125-by-pythonnut-on-???
==10125== 
==10125== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10125== don't want to do, unless you know exactly what you're doing,
==10125== or are doing some strange experiment):
==10125==   /usr/lib/valgrind/../../bin/vgdb --pid=10125 ...command...
==10125== 
==10125== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10125==   /path/to/gdb ./zsh
==10125== and then give GDB the following command
==10125==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10125
==10125== --pid is optional if only one valgrind process is running
==10125== 
--10122-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10126== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10126-by-pythonnut-on-???
==10126== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10126-by-pythonnut-on-???
==10126== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10126-by-pythonnut-on-???
==10126== 
==10126== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10126== don't want to do, unless you know exactly what you're doing,
==10126== or are doing some strange experiment):
==10126==   /usr/lib/valgrind/../../bin/vgdb --pid=10126 ...command...
==10126== 
==10126== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10126==   /path/to/gdb ./zsh
==10126== and then give GDB the following command
==10126==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10126
==10126== --pid is optional if only one valgrind process is running
==10126== 
==10122== 
==10122== HEAP SUMMARY:
==10122==     in use at exit: 3,111,995 bytes in 68,923 blocks
==10122==   total heap usage: 1,597,746 allocs, 1,528,823 frees, 129,009,694 bytes allocated
==10122== 
client request: code 4d430005,  addr 0xFFEFE66FC,  len 4
--10126-- Caught __NR_exit; running __libc_freeres()
==10122== Searching for pointers to 68,923 not-freed blocks
--10122--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10122--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10122--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10122--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10122--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10122--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10122--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10122--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10122--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10122--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10122--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10122--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10122--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10122--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10122--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10122--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10122--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10122--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10122--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10122--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10122--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10122--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10122--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10122--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10122--   Scanning root segment: 0x701a000..0x701afff (4096)
--10122--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10122--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10122--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10122--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10122--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10122--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10122--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10122--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10122--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10122--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10126-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10126== 
==10126== HEAP SUMMARY:
==10126==     in use at exit: 3,137,562 bytes in 69,547 blocks
==10126==   total heap usage: 1,595,146 allocs, 1,525,599 frees, 128,918,844 bytes allocated
==10126== 
==10126== Searching for pointers to 69,547 not-freed blocks
--10126--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10126--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10126--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10126--   Scanning root segment: 0x4037000..0x403efff (32768)
--10126--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10126--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10126--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10126--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10126--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10126--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10126--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10126--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10126--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10126--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10126--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10126--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10126--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10126--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10126--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10126--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10126--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10126--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10126--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10126--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10126--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10126--   Scanning root segment: 0x701a000..0x701afff (4096)
--10126--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10126--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10126--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10126--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10126--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10126--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10126--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10126--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10126--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10126--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10122== Checked 4,768,120 bytes
==10122== 
==10122== LEAK SUMMARY:
==10122==    definitely lost: 2,197 bytes in 13 blocks
==10122==    indirectly lost: 6,756 bytes in 7 blocks
==10122==      possibly lost: 0 bytes in 0 blocks
==10122==    still reachable: 3,103,042 bytes in 68,903 blocks
==10122==         suppressed: 0 bytes in 0 blocks
==10122== Rerun with --leak-check=full to see details of leaked memory
==10122== 
==10122== Use --track-origins=yes to see where uninitialised values come from
==10122== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10122== 
==10122== 1 errors in context 1 of 2:
==10122== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10122==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10122==    by 0x488CD0: stringsubst (subst.c:301)
==10122==    by 0x48801B: prefork (subst.c:77)
==10122==    by 0x42B318: execcmd (exec.c:2619)
==10122==    by 0x428CA0: execpline2 (exec.c:1697)
==10122==    by 0x427FD2: execpline (exec.c:1484)
==10122==    by 0x427756: execlist (exec.c:1267)
==10122==    by 0x42717C: execode (exec.c:1073)
==10122==    by 0x431299: runshfunc (exec.c:5040)
==10122==    by 0x430E76: doshfunc (exec.c:4920)
==10122==    by 0x4302FB: execshfunc (exec.c:4557)
==10122==    by 0x42D8C1: execcmd (exec.c:3373)
==10122== 
==10122== 
==10122== 2 errors in context 2 of 2:
==10122== Conditional jump or move depends on uninitialised value(s)
==10122==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10122==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10122==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10122==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10122==    by 0x42D8E9: execcmd (exec.c:3378)
==10122==    by 0x428CA0: execpline2 (exec.c:1697)
==10122==    by 0x427FD2: execpline (exec.c:1484)
==10122==    by 0x42779A: execlist (exec.c:1275)
==10122==    by 0x42717C: execode (exec.c:1073)
==10122==    by 0x431299: runshfunc (exec.c:5040)
==10122==    by 0x430E76: doshfunc (exec.c:4920)
==10122==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10122== 
==10122== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10120-- Caught __NR_exit; running __libc_freeres()
==10126== Checked 4,841,488 bytes
==10126== 
--10120-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10120== 
==10120== HEAP SUMMARY:
==10120==     in use at exit: 3,111,628 bytes in 68,913 blocks
==10120==   total heap usage: 1,597,749 allocs, 1,528,836 frees, 129,010,334 bytes allocated
==10120== 
==10126== LEAK SUMMARY:
==10126==    definitely lost: 2,221 bytes in 14 blocks
==10126==    indirectly lost: 6,796 bytes in 9 blocks
==10126==      possibly lost: 0 bytes in 0 blocks
==10126==    still reachable: 3,128,545 bytes in 69,524 blocks
==10126==         suppressed: 0 bytes in 0 blocks
==10126== Rerun with --leak-check=full to see details of leaked memory
==10126== 
==10126== Use --track-origins=yes to see where uninitialised values come from
==10126== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10126== 
==10126== 1 errors in context 1 of 2:
==10126== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10126==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10126==    by 0x488CD0: stringsubst (subst.c:301)
==10126==    by 0x48801B: prefork (subst.c:77)
==10126==    by 0x42B318: execcmd (exec.c:2619)
==10126==    by 0x428CA0: execpline2 (exec.c:1697)
==10126==    by 0x427FD2: execpline (exec.c:1484)
==10126==    by 0x427756: execlist (exec.c:1267)
==10126==    by 0x42717C: execode (exec.c:1073)
==10126==    by 0x431299: runshfunc (exec.c:5040)
==10126==    by 0x430E76: doshfunc (exec.c:4920)
==10126==    by 0x4302FB: execshfunc (exec.c:4557)
==10126==    by 0x42D8C1: execcmd (exec.c:3373)
==10126== 
==10126== 
==10126== 2 errors in context 2 of 2:
==10126== Conditional jump or move depends on uninitialised value(s)
==10126==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10126==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10126==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10126==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10126==    by 0x42D8E9: execcmd (exec.c:3378)
==10126==    by 0x428CA0: execpline2 (exec.c:1697)
==10126==    by 0x427FD2: execpline (exec.c:1484)
==10126==    by 0x42779A: execlist (exec.c:1275)
==10126==    by 0x42717C: execode (exec.c:1073)
==10126==    by 0x431299: runshfunc (exec.c:5040)
==10126==    by 0x430E76: doshfunc (exec.c:4920)
==10126==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10126== 
==10126== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== Searching for pointers to 68,913 not-freed blocks
--10120--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10120--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10120--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10120--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10120--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10120--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10120--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10120--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10120--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10120--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10120--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10120--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10120--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10120--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10120--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10120--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10120--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10120--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10120--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10120--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10120--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10120--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10120--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10120--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10120--   Scanning root segment: 0x701a000..0x701afff (4096)
--10120--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10120--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10120--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10120--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10120--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10120--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10120--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10120--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10120--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10120--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFE6BAC,  len 4
==10120== Checked 4,765,792 bytes
==10120== 
==10120== LEAK SUMMARY:
==10120==    definitely lost: 2,197 bytes in 13 blocks
==10120==    indirectly lost: 6,756 bytes in 7 blocks
==10120==      possibly lost: 0 bytes in 0 blocks
==10120==    still reachable: 3,102,675 bytes in 68,893 blocks
==10120==         suppressed: 0 bytes in 0 blocks
==10120== Rerun with --leak-check=full to see details of leaked memory
==10120== 
==10120== Use --track-origins=yes to see where uninitialised values come from
==10120== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10120== 
==10120== 1 errors in context 1 of 2:
==10120== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10120==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10120==    by 0x488CD0: stringsubst (subst.c:301)
==10120==    by 0x48801B: prefork (subst.c:77)
==10120==    by 0x42B318: execcmd (exec.c:2619)
==10120==    by 0x428CA0: execpline2 (exec.c:1697)
==10120==    by 0x427FD2: execpline (exec.c:1484)
==10120==    by 0x427756: execlist (exec.c:1267)
==10120==    by 0x42717C: execode (exec.c:1073)
==10120==    by 0x431299: runshfunc (exec.c:5040)
==10120==    by 0x430E76: doshfunc (exec.c:4920)
==10120==    by 0x4302FB: execshfunc (exec.c:4557)
==10120==    by 0x42D8C1: execcmd (exec.c:3373)
==10120== 
==10120== 
==10120== 2 errors in context 2 of 2:
==10120== Conditional jump or move depends on uninitialised value(s)
==10120==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10120==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10120==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10120==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10120==    by 0x42D8E9: execcmd (exec.c:3378)
==10120==    by 0x428CA0: execpline2 (exec.c:1697)
==10120==    by 0x427FD2: execpline (exec.c:1484)
==10120==    by 0x42779A: execlist (exec.c:1275)
==10120==    by 0x42717C: execode (exec.c:1073)
==10120==    by 0x431299: runshfunc (exec.c:5040)
==10120==    by 0x430E76: doshfunc (exec.c:4920)
==10120==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10120== 
==10120== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10128-- Caught __NR_exit; running __libc_freeres()
--10177-- Caught __NR_exit; running __libc_freeres()
==10128== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10128-by-pythonnut-on-???
==10128== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10128-by-pythonnut-on-???
==10128== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10128-by-pythonnut-on-???
==10128== 
==10128== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10128== don't want to do, unless you know exactly what you're doing,
==10128== or are doing some strange experiment):
==10128==   /usr/lib/valgrind/../../bin/vgdb --pid=10128 ...command...
==10128== 
==10128== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10128==   /path/to/gdb ./zsh
==10128== and then give GDB the following command
==10128==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10128
==10128== --pid is optional if only one valgrind process is running
==10128== 
==10177== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10177-by-pythonnut-on-???
==10177== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10177-by-pythonnut-on-???
==10177== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10177-by-pythonnut-on-???
==10177== 
==10177== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10177== don't want to do, unless you know exactly what you're doing,
==10177== or are doing some strange experiment):
==10177==   /usr/lib/valgrind/../../bin/vgdb --pid=10177 ...command...
==10177== 
==10177== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10177==   /path/to/gdb ./zsh
==10177== and then give GDB the following command
==10177==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10177
==10177== --pid is optional if only one valgrind process is running
==10177== 
--10128-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
==10128== 
==10128== HEAP SUMMARY:
==10128==     in use at exit: 3,137,839 bytes in 69,552 blocks
==10128==   total heap usage: 1,595,159 allocs, 1,525,607 frees, 128,922,841 bytes allocated
==10128== 
--10177-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
==10177== 
==10177== HEAP SUMMARY:
==10177==     in use at exit: 3,112,084 bytes in 68,925 blocks
==10177==   total heap usage: 1,597,788 allocs, 1,528,863 frees, 129,025,954 bytes allocated
==10177== 
==10128== Searching for pointers to 69,552 not-freed blocks
--10128--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10128--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10128--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10128--   Scanning root segment: 0x4037000..0x403efff (32768)
--10128--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10128--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10128--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10128--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10128--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10128--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10128--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10128--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10128--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10128--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10128--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10128--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10128--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10128--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10128--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10128--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10128--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10128--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10128--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10128--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10128--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10128--   Scanning root segment: 0x701a000..0x701afff (4096)
--10128--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10128--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10128--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10128--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10128--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10128--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10128--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10128--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10128--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10128--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10177== Searching for pointers to 68,925 not-freed blocks
--10177--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10177--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10177--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10177--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10177--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10177--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10177--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10177--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10177--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10177--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10177--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10177--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10177--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10177--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10177--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10177--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10177--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10177--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10177--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10177--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10177--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10177--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10177--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10177--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10177--   Scanning root segment: 0x701a000..0x701afff (4096)
--10177--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10177--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10177--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10177--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10177--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10177--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10177--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10177--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10177--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10177--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10128== Checked 4,841,472 bytes
==10128== 
==10177== Checked 4,770,168 bytes
==10177== 
==10177== LEAK SUMMARY:
==10177==    definitely lost: 2,197 bytes in 13 blocks
==10177==    indirectly lost: 6,756 bytes in 7 blocks
==10177==      possibly lost: 0 bytes in 0 blocks
==10177==    still reachable: 3,103,131 bytes in 68,905 blocks
==10177==         suppressed: 0 bytes in 0 blocks
==10177== Rerun with --leak-check=full to see details of leaked memory
==10177== 
==10177== Use --track-origins=yes to see where uninitialised values come from
==10177== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10177== 
==10177== 1 errors in context 1 of 2:
==10177== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10177==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10177==    by 0x488CD0: stringsubst (subst.c:301)
==10177==    by 0x48801B: prefork (subst.c:77)
==10177==    by 0x42B318: execcmd (exec.c:2619)
==10177==    by 0x428CA0: execpline2 (exec.c:1697)
==10177==    by 0x427FD2: execpline (exec.c:1484)
==10177==    by 0x427756: execlist (exec.c:1267)
==10177==    by 0x42717C: execode (exec.c:1073)
==10177==    by 0x431299: runshfunc (exec.c:5040)
==10177==    by 0x430E76: doshfunc (exec.c:4920)
==10177==    by 0x4302FB: execshfunc (exec.c:4557)
==10177==    by 0x42D8C1: execcmd (exec.c:3373)
==10177== 
==10177== 
==10177== 2 errors in context 2 of 2:
==10177== Conditional jump or move depends on uninitialised value(s)
==10177==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10177==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10177==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10177==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10177==    by 0x42D8E9: execcmd (exec.c:3378)
==10177==    by 0x428CA0: execpline2 (exec.c:1697)
==10177==    by 0x427FD2: execpline (exec.c:1484)
==10177==    by 0x42779A: execlist (exec.c:1275)
==10177==    by 0x42717C: execode (exec.c:1073)
==10177==    by 0x431299: runshfunc (exec.c:5040)
==10177==    by 0x430E76: doshfunc (exec.c:4920)
==10177==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10177== 
==10177== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10128== LEAK SUMMARY:
==10128==    definitely lost: 2,221 bytes in 14 blocks
==10128==    indirectly lost: 6,796 bytes in 9 blocks
==10128==      possibly lost: 0 bytes in 0 blocks
==10128==    still reachable: 3,128,822 bytes in 69,529 blocks
==10128==         suppressed: 0 bytes in 0 blocks
==10128== Rerun with --leak-check=full to see details of leaked memory
==10128== 
==10128== Use --track-origins=yes to see where uninitialised values come from
==10128== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10128== 
==10128== 1 errors in context 1 of 2:
==10128== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10128==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10128==    by 0x488CD0: stringsubst (subst.c:301)
==10128==    by 0x48801B: prefork (subst.c:77)
==10128==    by 0x42B318: execcmd (exec.c:2619)
==10128==    by 0x428CA0: execpline2 (exec.c:1697)
==10128==    by 0x427FD2: execpline (exec.c:1484)
==10128==    by 0x427756: execlist (exec.c:1267)
==10128==    by 0x42717C: execode (exec.c:1073)
==10128==    by 0x431299: runshfunc (exec.c:5040)
==10128==    by 0x430E76: doshfunc (exec.c:4920)
==10128==    by 0x4302FB: execshfunc (exec.c:4557)
==10128==    by 0x42D8C1: execcmd (exec.c:3373)
==10128== 
==10128== 
==10128== 2 errors in context 2 of 2:
==10128== Conditional jump or move depends on uninitialised value(s)
==10128==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10128==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10128==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10128==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10128==    by 0x42D8E9: execcmd (exec.c:3378)
==10128==    by 0x428CA0: execpline2 (exec.c:1697)
==10128==    by 0x427FD2: execpline (exec.c:1484)
==10128==    by 0x42779A: execlist (exec.c:1275)
==10128==    by 0x42717C: execode (exec.c:1073)
==10128==    by 0x431299: runshfunc (exec.c:5040)
==10128==    by 0x430E76: doshfunc (exec.c:4920)
==10128==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10128== 
==10128== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10175-- Caught __NR_exit; running __libc_freeres()
--10125-- Caught __NR_exit; running __libc_freeres()
==10175== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10175-by-pythonnut-on-???
==10175== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10175-by-pythonnut-on-???
==10175== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10175-by-pythonnut-on-???
==10175== 
==10175== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10175== don't want to do, unless you know exactly what you're doing,
==10175== or are doing some strange experiment):
==10175==   /usr/lib/valgrind/../../bin/vgdb --pid=10175 ...command...
==10175== 
==10175== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10175==   /path/to/gdb ./zsh
==10175== and then give GDB the following command
==10175==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10175
==10175== --pid is optional if only one valgrind process is running
==10175== 
--10125-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10175-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10125== 
==10125== HEAP SUMMARY:
==10125==     in use at exit: 3,135,675 bytes in 69,477 blocks
==10125==   total heap usage: 1,595,110 allocs, 1,525,633 frees, 128,923,452 bytes allocated
==10125== 
==10175== 
==10175== HEAP SUMMARY:
==10175==     in use at exit: 3,112,065 bytes in 68,926 blocks
==10175==   total heap usage: 1,597,785 allocs, 1,528,859 frees, 129,022,394 bytes allocated
==10175== 
==10125== Searching for pointers to 69,477 not-freed blocks
--10125--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10125--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10125--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10125--   Scanning root segment: 0x4037000..0x403afff (16384)
--10125--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10125--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10125--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10125--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10125--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10125--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10125--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10125--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10125--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10125--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10125--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10125--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10125--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10125--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10125--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10125--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10125--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10125--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10125--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10125--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10125--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10125--   Scanning root segment: 0x701a000..0x701afff (4096)
--10125--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10125--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10125--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10125--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10125--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10125--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10125--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10125--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10125--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10125--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10175== Searching for pointers to 68,926 not-freed blocks
--10175--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10175--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10175--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10175--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10175--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10175--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10175--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10175--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10175--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10175--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10175--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10175--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10175--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10175--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10175--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10175--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10175--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10175--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10175--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10175--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10175--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10175--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10175--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10175--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10175--   Scanning root segment: 0x701a000..0x701afff (4096)
--10175--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10175--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10175--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10175--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10175--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10175--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10175--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10175--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10175--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10175--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10125== Checked 4,821,400 bytes
==10125== 
==10175== Checked 4,769,840 bytes
==10175== 
==10125== LEAK SUMMARY:
==10125==    definitely lost: 2,221 bytes in 14 blocks
==10125==    indirectly lost: 6,796 bytes in 9 blocks
==10125==      possibly lost: 0 bytes in 0 blocks
==10125==    still reachable: 3,126,658 bytes in 69,454 blocks
==10125==         suppressed: 0 bytes in 0 blocks
==10125== Rerun with --leak-check=full to see details of leaked memory
==10125== 
==10125== Use --track-origins=yes to see where uninitialised values come from
==10125== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10125== 
==10125== 1 errors in context 1 of 2:
==10125== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10125==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10125==    by 0x488CD0: stringsubst (subst.c:301)
==10125==    by 0x48801B: prefork (subst.c:77)
==10125==    by 0x42B318: execcmd (exec.c:2619)
==10125==    by 0x428CA0: execpline2 (exec.c:1697)
==10125==    by 0x427FD2: execpline (exec.c:1484)
==10125==    by 0x427756: execlist (exec.c:1267)
==10125==    by 0x42717C: execode (exec.c:1073)
==10125==    by 0x431299: runshfunc (exec.c:5040)
==10125==    by 0x430E76: doshfunc (exec.c:4920)
==10125==    by 0x4302FB: execshfunc (exec.c:4557)
==10125==    by 0x42D8C1: execcmd (exec.c:3373)
==10125== 
==10125== 
==10125== 2 errors in context 2 of 2:
==10125== Conditional jump or move depends on uninitialised value(s)
==10125==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10125==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10125==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10125==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10125==    by 0x42D8E9: execcmd (exec.c:3378)
==10125==    by 0x428CA0: execpline2 (exec.c:1697)
==10125==    by 0x427FD2: execpline (exec.c:1484)
==10125==    by 0x42779A: execlist (exec.c:1275)
==10125==    by 0x42717C: execode (exec.c:1073)
==10125==    by 0x431299: runshfunc (exec.c:5040)
==10125==    by 0x430E76: doshfunc (exec.c:4920)
==10125==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10125== 
==10125== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10175== LEAK SUMMARY:
==10175==    definitely lost: 2,197 bytes in 13 blocks
==10175==    indirectly lost: 6,756 bytes in 7 blocks
==10175==      possibly lost: 0 bytes in 0 blocks
==10175==    still reachable: 3,103,112 bytes in 68,906 blocks
==10175==         suppressed: 0 bytes in 0 blocks
==10175== Rerun with --leak-check=full to see details of leaked memory
==10175== 
==10175== Use --track-origins=yes to see where uninitialised values come from
==10175== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10175== 
==10175== 1 errors in context 1 of 2:
==10175== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10175==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10175==    by 0x488CD0: stringsubst (subst.c:301)
==10175==    by 0x48801B: prefork (subst.c:77)
==10175==    by 0x42B318: execcmd (exec.c:2619)
==10175==    by 0x428CA0: execpline2 (exec.c:1697)
==10175==    by 0x427FD2: execpline (exec.c:1484)
==10175==    by 0x427756: execlist (exec.c:1267)
==10175==    by 0x42717C: execode (exec.c:1073)
==10175==    by 0x431299: runshfunc (exec.c:5040)
==10175==    by 0x430E76: doshfunc (exec.c:4920)
==10175==    by 0x4302FB: execshfunc (exec.c:4557)
==10175==    by 0x42D8C1: execcmd (exec.c:3373)
==10175== 
==10175== 
==10175== 2 errors in context 2 of 2:
==10175== Conditional jump or move depends on uninitialised value(s)
==10175==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10175==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10175==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10175==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10175==    by 0x42D8E9: execcmd (exec.c:3378)
==10175==    by 0x428CA0: execpline2 (exec.c:1697)
==10175==    by 0x427FD2: execpline (exec.c:1484)
==10175==    by 0x42779A: execlist (exec.c:1275)
==10175==    by 0x42717C: execode (exec.c:1073)
==10175==    by 0x431299: runshfunc (exec.c:5040)
==10175==    by 0x430E76: doshfunc (exec.c:4920)
==10175==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10175== 
==10175== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10182== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10182-by-pythonnut-on-???
==10182== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10182-by-pythonnut-on-???
==10182== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10182-by-pythonnut-on-???
==10182== 
==10182== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10182== don't want to do, unless you know exactly what you're doing,
==10182== or are doing some strange experiment):
==10182==   /usr/lib/valgrind/../../bin/vgdb --pid=10182 ...command...
==10182== 
==10182== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10182==   /path/to/gdb ./zsh
==10182== and then give GDB the following command
==10182==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10182
==10182== --pid is optional if only one valgrind process is running
==10182== 
--10182-- Caught __NR_exit; running __libc_freeres()
==10181== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10181-by-pythonnut-on-???
==10181== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10181-by-pythonnut-on-???
==10181== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10181-by-pythonnut-on-???
==10181== 
==10181== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10181== don't want to do, unless you know exactly what you're doing,
==10181== or are doing some strange experiment):
==10181==   /usr/lib/valgrind/../../bin/vgdb --pid=10181 ...command...
==10181== 
==10181== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10181==   /path/to/gdb ./zsh
==10181== and then give GDB the following command
==10181==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10181
==10181== --pid is optional if only one valgrind process is running
==10181== 
==10183== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10183-by-pythonnut-on-???
==10183== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10183-by-pythonnut-on-???
==10183== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10183-by-pythonnut-on-???
==10183== 
==10183== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10183== don't want to do, unless you know exactly what you're doing,
==10183== or are doing some strange experiment):
==10183==   /usr/lib/valgrind/../../bin/vgdb --pid=10183 ...command...
==10183== 
==10183== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10183==   /path/to/gdb ./zsh
==10183== and then give GDB the following command
==10183==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10183
==10183== --pid is optional if only one valgrind process is running
==10183== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--10182-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10181-- Caught __NR_exit; running __libc_freeres()
==10182== 
==10182== HEAP SUMMARY:
==10182==     in use at exit: 3,137,416 bytes in 69,539 blocks
==10182==   total heap usage: 1,595,178 allocs, 1,525,639 frees, 128,932,119 bytes allocated
==10182== 
--10181-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10181== 
==10182== Searching for pointers to 69,539 not-freed blocks
--10182--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10182--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10182--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10182--   Scanning root segment: 0x4037000..0x403efff (32768)
--10182--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10182--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10182--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10182--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10182--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10182--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10182--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10182--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10182--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10182--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10182--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10182--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10182--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10182--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10182--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10182--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10182--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10182--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10182--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==10181== HEAP SUMMARY:
==10181==     in use at exit: 3,112,296 bytes in 68,931 blocks
==10181==   total heap usage: 1,597,796 allocs, 1,528,865 frees, 129,027,482 bytes allocated
==10181== 
--10182--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10182--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10182--   Scanning root segment: 0x701a000..0x701afff (4096)
--10182--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10182--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10182--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10182--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10182--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10182--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10182--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10182--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10182--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10182--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10181== Searching for pointers to 68,931 not-freed blocks
--10181--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10181--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10181--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10181--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10181--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10181--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10181--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10181--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10181--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10181--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10181--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10181--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10181--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10181--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10181--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10181--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10181--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10181--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10181--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10181--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10181--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10181--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10181--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10181--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10181--   Scanning root segment: 0x701a000..0x701afff (4096)
--10181--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10181--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10181--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10181--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10181--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10181--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10181--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10181--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10181--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10181--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10182== Checked 4,840,024 bytes
==10182== 
==10182== LEAK SUMMARY:
==10182==    definitely lost: 2,221 bytes in 14 blocks
==10182==    indirectly lost: 6,796 bytes in 9 blocks
==10182==      possibly lost: 0 bytes in 0 blocks
==10182==    still reachable: 3,128,399 bytes in 69,516 blocks
==10182==         suppressed: 0 bytes in 0 blocks
==10182== Rerun with --leak-check=full to see details of leaked memory
==10182== 
==10182== Use --track-origins=yes to see where uninitialised values come from
==10182== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10182== 
==10182== 1 errors in context 1 of 2:
==10182== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10182==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10182==    by 0x488CD0: stringsubst (subst.c:301)
==10182==    by 0x48801B: prefork (subst.c:77)
==10182==    by 0x42B318: execcmd (exec.c:2619)
==10182==    by 0x428CA0: execpline2 (exec.c:1697)
==10182==    by 0x427FD2: execpline (exec.c:1484)
==10182==    by 0x427756: execlist (exec.c:1267)
==10182==    by 0x42717C: execode (exec.c:1073)
==10182==    by 0x431299: runshfunc (exec.c:5040)
==10182==    by 0x430E76: doshfunc (exec.c:4920)
==10182==    by 0x4302FB: execshfunc (exec.c:4557)
==10182==    by 0x42D8C1: execcmd (exec.c:3373)
==10182== 
==10182== 
==10182== 2 errors in context 2 of 2:
==10182== Conditional jump or move depends on uninitialised value(s)
==10182==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10182==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10182==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10182==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10182==    by 0x42D8E9: execcmd (exec.c:3378)
==10182==    by 0x428CA0: execpline2 (exec.c:1697)
==10182==    by 0x427FD2: execpline (exec.c:1484)
==10182==    by 0x42779A: execlist (exec.c:1275)
==10182==    by 0x42717C: execode (exec.c:1073)
==10182==    by 0x431299: runshfunc (exec.c:5040)
==10182==    by 0x430E76: doshfunc (exec.c:4920)
==10182==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10182== 
==10182== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10180== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10180-by-pythonnut-on-???
==10180== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10180-by-pythonnut-on-???
==10180== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10180-by-pythonnut-on-???
==10180== 
==10180== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10180== don't want to do, unless you know exactly what you're doing,
==10180== or are doing some strange experiment):
==10180==   /usr/lib/valgrind/../../bin/vgdb --pid=10180 ...command...
==10180== 
==10180== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10180==   /path/to/gdb ./zsh
==10180== and then give GDB the following command
==10180==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10180
==10180== --pid is optional if only one valgrind process is running
==10180== 
--10180-- Caught __NR_exit; running __libc_freeres()
==10181== Checked 4,769,792 bytes
==10181== 
==10181== LEAK SUMMARY:
==10181==    definitely lost: 2,197 bytes in 13 blocks
==10181==    indirectly lost: 6,756 bytes in 7 blocks
==10181==      possibly lost: 0 bytes in 0 blocks
==10181==    still reachable: 3,103,343 bytes in 68,911 blocks
==10181==         suppressed: 0 bytes in 0 blocks
==10181== Rerun with --leak-check=full to see details of leaked memory
==10181== 
==10181== Use --track-origins=yes to see where uninitialised values come from
==10181== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10181== 
==10181== 1 errors in context 1 of 2:
==10181== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10181==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10181==    by 0x488CD0: stringsubst (subst.c:301)
==10181==    by 0x48801B: prefork (subst.c:77)
==10181==    by 0x42B318: execcmd (exec.c:2619)
==10181==    by 0x428CA0: execpline2 (exec.c:1697)
==10181==    by 0x427FD2: execpline (exec.c:1484)
==10181==    by 0x427756: execlist (exec.c:1267)
==10181==    by 0x42717C: execode (exec.c:1073)
==10181==    by 0x431299: runshfunc (exec.c:5040)
==10181==    by 0x430E76: doshfunc (exec.c:4920)
==10181==    by 0x4302FB: execshfunc (exec.c:4557)
==10181==    by 0x42D8C1: execcmd (exec.c:3373)
==10181== 
==10181== 
==10181== 2 errors in context 2 of 2:
==10181== Conditional jump or move depends on uninitialised value(s)
==10181==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10181==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10181==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10181==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10181==    by 0x42D8E9: execcmd (exec.c:3378)
==10181==    by 0x428CA0: execpline2 (exec.c:1697)
==10181==    by 0x427FD2: execpline (exec.c:1484)
==10181==    by 0x42779A: execlist (exec.c:1275)
==10181==    by 0x42717C: execode (exec.c:1073)
==10181==    by 0x431299: runshfunc (exec.c:5040)
==10181==    by 0x430E76: doshfunc (exec.c:4920)
==10181==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10181== 
==10181== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10180-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10180== 
==10180== HEAP SUMMARY:
==10180==     in use at exit: 3,137,352 bytes in 69,536 blocks
==10180==   total heap usage: 1,595,180 allocs, 1,525,644 frees, 128,932,663 bytes allocated
==10180== 
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
==10180== Searching for pointers to 69,536 not-freed blocks
--10180--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10180--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10180--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10180--   Scanning root segment: 0x4037000..0x403efff (32768)
--10180--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10180--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10180--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10180--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10180--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10180--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10180--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10180--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10180--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10180--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10180--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10180--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10180--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10180--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10180--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10180--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10180--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10180--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10180--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10180--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10180--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10180--   Scanning root segment: 0x701a000..0x701afff (4096)
--10180--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10180--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10180--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10180--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10180--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10180--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10180--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10180--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10180--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10180--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10187-- Caught __NR_exit; running __libc_freeres()
==10187== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10187-by-pythonnut-on-???
==10187== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10187-by-pythonnut-on-???
==10187== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10187-by-pythonnut-on-???
==10187== 
==10187== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10187== don't want to do, unless you know exactly what you're doing,
==10187== or are doing some strange experiment):
==10187==   /usr/lib/valgrind/../../bin/vgdb --pid=10187 ...command...
==10187== 
==10187== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10187==   /path/to/gdb ./zsh
==10187== and then give GDB the following command
==10187==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10187
==10187== --pid is optional if only one valgrind process is running
==10187== 
--10187-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10187== 
==10187== HEAP SUMMARY:
==10187==     in use at exit: 3,112,403 bytes in 68,935 blocks
==10187==   total heap usage: 1,597,804 allocs, 1,528,869 frees, 129,029,701 bytes allocated
==10187== 
==10187== Searching for pointers to 68,935 not-freed blocks
--10187--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10187--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10187--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10187--   Scanning root segment: 0x4037000..0x403afff (16384)
--10187--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10187--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10187--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10187--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10187--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10187--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10187--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10187--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10187--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10187--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10187--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10187--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10187--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10187--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10187--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10187--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10187--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10187--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10187--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10187--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10187--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10187--   Scanning root segment: 0x701a000..0x701afff (4096)
--10187--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10187--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10187--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10187--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10187--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10187--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10187--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10187--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10187--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10187--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10180== Checked 4,839,336 bytes
==10180== 
==10180== LEAK SUMMARY:
==10180==    definitely lost: 2,221 bytes in 14 blocks
==10180==    indirectly lost: 6,796 bytes in 9 blocks
==10180==      possibly lost: 0 bytes in 0 blocks
==10180==    still reachable: 3,128,335 bytes in 69,513 blocks
==10180==         suppressed: 0 bytes in 0 blocks
==10180== Rerun with --leak-check=full to see details of leaked memory
==10180== 
==10180== Use --track-origins=yes to see where uninitialised values come from
==10180== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10180== 
==10180== 1 errors in context 1 of 2:
==10180== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10180==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10180==    by 0x488CD0: stringsubst (subst.c:301)
==10180==    by 0x48801B: prefork (subst.c:77)
==10180==    by 0x42B318: execcmd (exec.c:2619)
==10180==    by 0x428CA0: execpline2 (exec.c:1697)
==10180==    by 0x427FD2: execpline (exec.c:1484)
==10180==    by 0x427756: execlist (exec.c:1267)
==10180==    by 0x42717C: execode (exec.c:1073)
==10180==    by 0x431299: runshfunc (exec.c:5040)
==10180==    by 0x430E76: doshfunc (exec.c:4920)
==10180==    by 0x4302FB: execshfunc (exec.c:4557)
==10180==    by 0x42D8C1: execcmd (exec.c:3373)
==10180== 
==10180== 
==10180== 2 errors in context 2 of 2:
==10180== Conditional jump or move depends on uninitialised value(s)
==10180==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10180==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10180==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10180==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10180==    by 0x42D8E9: execcmd (exec.c:3378)
==10180==    by 0x428CA0: execpline2 (exec.c:1697)
==10180==    by 0x427FD2: execpline (exec.c:1484)
==10180==    by 0x42779A: execlist (exec.c:1275)
==10180==    by 0x42717C: execode (exec.c:1073)
==10180==    by 0x431299: runshfunc (exec.c:5040)
==10180==    by 0x430E76: doshfunc (exec.c:4920)
==10180==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10180== 
==10180== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10189-by-pythonnut-on-???
==10189== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10189-by-pythonnut-on-???
==10189== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10189-by-pythonnut-on-???
==10189== 
==10189== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10189== don't want to do, unless you know exactly what you're doing,
==10189== or are doing some strange experiment):
==10189==   /usr/lib/valgrind/../../bin/vgdb --pid=10189 ...command...
==10189== 
==10189== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10189==   /path/to/gdb ./zsh
==10189== and then give GDB the following command
==10189==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10189
==10189== --pid is optional if only one valgrind process is running
==10189== 
--10189-- Caught __NR_exit; running __libc_freeres()
--10189-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10187== Checked 4,786,544 bytes
==10187== 
==10189== 
==10189== HEAP SUMMARY:
==10189==     in use at exit: 3,137,356 bytes in 69,536 blocks
==10189==   total heap usage: 1,595,197 allocs, 1,525,661 frees, 128,937,683 bytes allocated
==10189== 
==10187== LEAK SUMMARY:
==10187==    definitely lost: 2,197 bytes in 13 blocks
==10187==    indirectly lost: 6,756 bytes in 7 blocks
==10187==      possibly lost: 0 bytes in 0 blocks
==10187==    still reachable: 3,103,450 bytes in 68,915 blocks
==10187==         suppressed: 0 bytes in 0 blocks
==10187== Rerun with --leak-check=full to see details of leaked memory
==10187== 
==10187== Use --track-origins=yes to see where uninitialised values come from
==10187== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10187== 
==10187== 1 errors in context 1 of 2:
==10187== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10187==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10187==    by 0x488CD0: stringsubst (subst.c:301)
==10187==    by 0x48801B: prefork (subst.c:77)
==10187==    by 0x42B318: execcmd (exec.c:2619)
==10187==    by 0x428CA0: execpline2 (exec.c:1697)
==10187==    by 0x427FD2: execpline (exec.c:1484)
==10187==    by 0x427756: execlist (exec.c:1267)
==10187==    by 0x42717C: execode (exec.c:1073)
==10187==    by 0x431299: runshfunc (exec.c:5040)
==10187==    by 0x430E76: doshfunc (exec.c:4920)
==10187==    by 0x4302FB: execshfunc (exec.c:4557)
==10187==    by 0x42D8C1: execcmd (exec.c:3373)
==10187== 
==10187== 
==10187== 2 errors in context 2 of 2:
==10187== Conditional jump or move depends on uninitialised value(s)
==10187==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10187==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10187==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10187==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10187==    by 0x42D8E9: execcmd (exec.c:3378)
==10187==    by 0x428CA0: execpline2 (exec.c:1697)
==10187==    by 0x427FD2: execpline (exec.c:1484)
==10187==    by 0x42779A: execlist (exec.c:1275)
==10187==    by 0x42717C: execode (exec.c:1073)
==10187==    by 0x431299: runshfunc (exec.c:5040)
==10187==    by 0x430E76: doshfunc (exec.c:4920)
==10187==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10187== 
==10187== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== Searching for pointers to 69,536 not-freed blocks
--10189--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10189--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10189--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10189--   Scanning root segment: 0x4037000..0x403efff (32768)
--10189--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10189--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10189--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10189--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10189--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10189--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10189--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10189--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10189--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10189--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10189--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10189--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10189--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10189--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10189--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10189--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10189--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10190== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10190-by-pythonnut-on-???
==10190== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10190-by-pythonnut-on-???
==10190== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10190-by-pythonnut-on-???
==10190== 
==10190== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10190== don't want to do, unless you know exactly what you're doing,
==10190== or are doing some strange experiment):
==10190==   /usr/lib/valgrind/../../bin/vgdb --pid=10190 ...command...
==10190== 
==10190== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10190==   /path/to/gdb ./zsh
==10190== and then give GDB the following command
==10190==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10190
==10190== --pid is optional if only one valgrind process is running
==10190== 
--10189--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10189--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10189--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10189--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10189--   Scanning root segment: 0x701a000..0x701afff (4096)
--10189--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10189--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10189--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10189--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10189--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10189--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10189--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10189--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10189--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10189--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--10192-- Caught __NR_exit; running __libc_freeres()
==10192== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10192-by-pythonnut-on-???
==10192== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10192-by-pythonnut-on-???
==10192== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10192-by-pythonnut-on-???
==10192== 
==10192== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10192== don't want to do, unless you know exactly what you're doing,
==10192== or are doing some strange experiment):
==10192==   /usr/lib/valgrind/../../bin/vgdb --pid=10192 ...command...
==10192== 
==10192== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10192==   /path/to/gdb ./zsh
==10192== and then give GDB the following command
==10192==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10192
==10192== --pid is optional if only one valgrind process is running
==10192== 
--10192-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10189== Checked 4,839,344 bytes
==10189== 
==10192== 
==10192== HEAP SUMMARY:
==10192==     in use at exit: 3,111,710 bytes in 68,918 blocks
==10192==   total heap usage: 1,597,854 allocs, 1,528,936 frees, 129,036,602 bytes allocated
==10192== 
==10189== LEAK SUMMARY:
==10189==    definitely lost: 2,221 bytes in 14 blocks
==10189==    indirectly lost: 6,796 bytes in 9 blocks
==10189==      possibly lost: 0 bytes in 0 blocks
==10189==    still reachable: 3,128,339 bytes in 69,513 blocks
==10189==         suppressed: 0 bytes in 0 blocks
==10189== Rerun with --leak-check=full to see details of leaked memory
==10189== 
==10189== Use --track-origins=yes to see where uninitialised values come from
==10189== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10189== 
==10189== 1 errors in context 1 of 2:
==10189== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10189==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10189==    by 0x488CD0: stringsubst (subst.c:301)
==10189==    by 0x48801B: prefork (subst.c:77)
==10189==    by 0x42B318: execcmd (exec.c:2619)
==10189==    by 0x428CA0: execpline2 (exec.c:1697)
==10189==    by 0x427FD2: execpline (exec.c:1484)
==10189==    by 0x427756: execlist (exec.c:1267)
==10189==    by 0x42717C: execode (exec.c:1073)
==10189==    by 0x431299: runshfunc (exec.c:5040)
==10189==    by 0x430E76: doshfunc (exec.c:4920)
==10189==    by 0x4302FB: execshfunc (exec.c:4557)
==10189==    by 0x42D8C1: execcmd (exec.c:3373)
==10189== 
==10189== 
==10189== 2 errors in context 2 of 2:
==10189== Conditional jump or move depends on uninitialised value(s)
==10189==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10189==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10189==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10189==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10189==    by 0x42D8E9: execcmd (exec.c:3378)
==10189==    by 0x428CA0: execpline2 (exec.c:1697)
==10189==    by 0x427FD2: execpline (exec.c:1484)
==10189==    by 0x42779A: execlist (exec.c:1275)
==10189==    by 0x42717C: execode (exec.c:1073)
==10189==    by 0x431299: runshfunc (exec.c:5040)
==10189==    by 0x430E76: doshfunc (exec.c:4920)
==10189==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10189== 
==10189== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10193== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10193-by-pythonnut-on-???
==10193== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10193-by-pythonnut-on-???
==10193== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10193-by-pythonnut-on-???
==10193== 
==10193== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10193== don't want to do, unless you know exactly what you're doing,
==10193== or are doing some strange experiment):
==10193==   /usr/lib/valgrind/../../bin/vgdb --pid=10193 ...command...
==10193== 
==10193== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10193==   /path/to/gdb ./zsh
==10193== and then give GDB the following command
==10193==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10193
==10193== --pid is optional if only one valgrind process is running
==10193== 
==10192== Searching for pointers to 68,918 not-freed blocks
--10192--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10192--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10192--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10192--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10192--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10192--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10192--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10192--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10192--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10192--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10192--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10192--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10192--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10192--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10192--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10192--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10192--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10192--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10192--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10192--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10192--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10192--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10192--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10192--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10192--   Scanning root segment: 0x701a000..0x701afff (4096)
--10192--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10192--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10192--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10192--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10192--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10192--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10192--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10192--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10192--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10192--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10193-- Caught __NR_exit; running __libc_freeres()
--10193-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10193== 
==10193== HEAP SUMMARY:
==10193==     in use at exit: 3,137,355 bytes in 69,536 blocks
==10193==   total heap usage: 1,595,202 allocs, 1,525,666 frees, 128,939,796 bytes allocated
==10193== 
==10193== Searching for pointers to 69,536 not-freed blocks
--10193--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10193--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10193--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10193--   Scanning root segment: 0x4037000..0x403efff (32768)
--10193--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10193--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10193--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10193--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10193--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10193--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10193--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10193--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10193--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10193--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10193--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10193--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10193--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10193--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10193--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10193--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10193--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10193--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10193--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10193--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10193--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10193--   Scanning root segment: 0x701a000..0x701afff (4096)
--10193--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10193--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10193--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10193--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10193--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10193--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10193--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10193--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10193--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10193--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10192== Checked 4,786,720 bytes
==10192== 
==10192== LEAK SUMMARY:
==10192==    definitely lost: 2,197 bytes in 13 blocks
==10192==    indirectly lost: 6,756 bytes in 7 blocks
==10192==      possibly lost: 0 bytes in 0 blocks
==10192==    still reachable: 3,102,757 bytes in 68,898 blocks
==10192==         suppressed: 0 bytes in 0 blocks
==10192== Rerun with --leak-check=full to see details of leaked memory
==10192== 
==10192== Use --track-origins=yes to see where uninitialised values come from
==10192== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10192== 
==10192== 1 errors in context 1 of 2:
==10192== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10192==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10192==    by 0x488CD0: stringsubst (subst.c:301)
==10192==    by 0x48801B: prefork (subst.c:77)
==10192==    by 0x42B318: execcmd (exec.c:2619)
==10192==    by 0x428CA0: execpline2 (exec.c:1697)
==10192==    by 0x427FD2: execpline (exec.c:1484)
==10192==    by 0x427756: execlist (exec.c:1267)
==10192==    by 0x42717C: execode (exec.c:1073)
==10192==    by 0x431299: runshfunc (exec.c:5040)
==10192==    by 0x430E76: doshfunc (exec.c:4920)
==10192==    by 0x4302FB: execshfunc (exec.c:4557)
==10192==    by 0x42D8C1: execcmd (exec.c:3373)
==10192== 
==10192== 
==10192== 2 errors in context 2 of 2:
==10192== Conditional jump or move depends on uninitialised value(s)
==10192==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10192==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10192==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10192==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10192==    by 0x42D8E9: execcmd (exec.c:3378)
==10192==    by 0x428CA0: execpline2 (exec.c:1697)
==10192==    by 0x427FD2: execpline (exec.c:1484)
==10192==    by 0x42779A: execlist (exec.c:1275)
==10192==    by 0x42717C: execode (exec.c:1073)
==10192==    by 0x431299: runshfunc (exec.c:5040)
==10192==    by 0x430E76: doshfunc (exec.c:4920)
==10192==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10192== 
==10192== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF617C,  len 4
==10193== Checked 4,839,344 bytes
==10193== 
==10195== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10195-by-pythonnut-on-???
==10195== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10195-by-pythonnut-on-???
==10195== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10195-by-pythonnut-on-???
==10195== 
==10195== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10195== don't want to do, unless you know exactly what you're doing,
==10195== or are doing some strange experiment):
==10195==   /usr/lib/valgrind/../../bin/vgdb --pid=10195 ...command...
==10195== 
==10195== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10195==   /path/to/gdb ./zsh
==10195== and then give GDB the following command
==10195==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10195
==10195== --pid is optional if only one valgrind process is running
==10195== 
==10193== LEAK SUMMARY:
==10193==    definitely lost: 2,221 bytes in 14 blocks
==10193==    indirectly lost: 6,796 bytes in 9 blocks
==10193==      possibly lost: 0 bytes in 0 blocks
==10193==    still reachable: 3,128,338 bytes in 69,513 blocks
==10193==         suppressed: 0 bytes in 0 blocks
==10193== Rerun with --leak-check=full to see details of leaked memory
==10193== 
==10193== Use --track-origins=yes to see where uninitialised values come from
==10193== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10193== 
==10193== 1 errors in context 1 of 2:
==10193== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10193==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10193==    by 0x488CD0: stringsubst (subst.c:301)
==10193==    by 0x48801B: prefork (subst.c:77)
==10193==    by 0x42B318: execcmd (exec.c:2619)
==10193==    by 0x428CA0: execpline2 (exec.c:1697)
==10193==    by 0x427FD2: execpline (exec.c:1484)
==10193==    by 0x427756: execlist (exec.c:1267)
==10193==    by 0x42717C: execode (exec.c:1073)
==10193==    by 0x431299: runshfunc (exec.c:5040)
==10193==    by 0x430E76: doshfunc (exec.c:4920)
==10193==    by 0x4302FB: execshfunc (exec.c:4557)
==10193==    by 0x42D8C1: execcmd (exec.c:3373)
==10193== 
==10193== 
==10193== 2 errors in context 2 of 2:
==10193== Conditional jump or move depends on uninitialised value(s)
==10193==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10193==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10193==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10193==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10193==    by 0x42D8E9: execcmd (exec.c:3378)
==10193==    by 0x428CA0: execpline2 (exec.c:1697)
==10193==    by 0x427FD2: execpline (exec.c:1484)
==10193==    by 0x42779A: execlist (exec.c:1275)
==10193==    by 0x42717C: execode (exec.c:1073)
==10193==    by 0x431299: runshfunc (exec.c:5040)
==10193==    by 0x430E76: doshfunc (exec.c:4920)
==10193==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10193== 
==10193== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10197-by-pythonnut-on-???
==10197== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10197-by-pythonnut-on-???
==10197== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10197-by-pythonnut-on-???
==10197== 
==10197== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10197== don't want to do, unless you know exactly what you're doing,
==10197== or are doing some strange experiment):
==10197==   /usr/lib/valgrind/../../bin/vgdb --pid=10197 ...command...
==10197== 
==10197== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10197==   /path/to/gdb ./zsh
==10197== and then give GDB the following command
==10197==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10197
==10197== --pid is optional if only one valgrind process is running
==10197== 
==10198== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10198-by-pythonnut-on-???
==10198== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10198-by-pythonnut-on-???
==10198== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10198-by-pythonnut-on-???
==10198== 
==10198== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10198== don't want to do, unless you know exactly what you're doing,
==10198== or are doing some strange experiment):
==10198==   /usr/lib/valgrind/../../bin/vgdb --pid=10198 ...command...
==10198== 
==10198== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10198==   /path/to/gdb ./zsh
==10198== and then give GDB the following command
==10198==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10198
==10198== --pid is optional if only one valgrind process is running
==10198== 
--10198-- Caught __NR_exit; running __libc_freeres()
==10200== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10200-by-pythonnut-on-???
==10200== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10200-by-pythonnut-on-???
==10200== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10200-by-pythonnut-on-???
==10200== 
==10200== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10200== don't want to do, unless you know exactly what you're doing,
==10200== or are doing some strange experiment):
==10200==   /usr/lib/valgrind/../../bin/vgdb --pid=10200 ...command...
==10200== 
==10200== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10200==   /path/to/gdb ./zsh
==10200== and then give GDB the following command
==10200==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10200
==10200== --pid is optional if only one valgrind process is running
==10200== 
==10199== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10199-by-pythonnut-on-???
==10199== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10199-by-pythonnut-on-???
==10199== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10199-by-pythonnut-on-???
==10199== 
==10199== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10199== don't want to do, unless you know exactly what you're doing,
==10199== or are doing some strange experiment):
==10199==   /usr/lib/valgrind/../../bin/vgdb --pid=10199 ...command...
==10199== 
==10199== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10199==   /path/to/gdb ./zsh
==10199== and then give GDB the following command
==10199==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10199
==10199== --pid is optional if only one valgrind process is running
==10199== 
--10199-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
==10203== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10203-by-pythonnut-on-???
==10203== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10203-by-pythonnut-on-???
==10203== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10203-by-pythonnut-on-???
==10203== 
==10203== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10203== don't want to do, unless you know exactly what you're doing,
==10203== or are doing some strange experiment):
==10203==   /usr/lib/valgrind/../../bin/vgdb --pid=10203 ...command...
==10203== 
==10203== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10203==   /path/to/gdb ./zsh
==10203== and then give GDB the following command
==10203==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10203
==10203== --pid is optional if only one valgrind process is running
==10203== 
--10198-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--10199-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10198== 
==10198== HEAP SUMMARY:
==10198==     in use at exit: 3,137,354 bytes in 69,536 blocks
==10198==   total heap usage: 1,595,207 allocs, 1,525,671 frees, 128,941,909 bytes allocated
==10198== 
==10202== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10202-by-pythonnut-on-???
==10202== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10202-by-pythonnut-on-???
==10202== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10202-by-pythonnut-on-???
==10202== 
==10202== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10202== don't want to do, unless you know exactly what you're doing,
==10202== or are doing some strange experiment):
==10202==   /usr/lib/valgrind/../../bin/vgdb --pid=10202 ...command...
==10202== 
==10202== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10202==   /path/to/gdb ./zsh
==10202== and then give GDB the following command
==10202==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10202
==10202== --pid is optional if only one valgrind process is running
==10202== 
==10199== 
--10202-- Caught __NR_exit; running __libc_freeres()
==10199== HEAP SUMMARY:
==10199==     in use at exit: 3,112,786 bytes in 68,971 blocks
==10199==   total heap usage: 1,598,090 allocs, 1,529,119 frees, 129,059,014 bytes allocated
==10199== 
==10198== Searching for pointers to 69,536 not-freed blocks
--10198--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10198--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10198--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10198--   Scanning root segment: 0x4037000..0x403efff (32768)
--10198--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10198--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10198--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10198--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10198--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10198--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10198--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10198--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10198--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10198--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10198--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10198--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10198--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10198--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10198--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10198--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10198--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10198--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10198--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10198--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10198--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10198--   Scanning root segment: 0x701a000..0x701afff (4096)
--10198--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10198--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10198--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10198--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10198--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10198--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10198--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10198--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10198--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10198--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10199== Searching for pointers to 68,971 not-freed blocks
--10199--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10199--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10199--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10199--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10199--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10199--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10199--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10199--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10199--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10199--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10199--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10199--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10199--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10199--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10199--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10199--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10199--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10199--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10199--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10199--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10199--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10199--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10199--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10199--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10199--   Scanning root segment: 0x701a000..0x701afff (4096)
--10199--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10199--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10199--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10199--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10199--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10199--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10199--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10199--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10199--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10199--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10202-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10202== 
==10202== HEAP SUMMARY:
==10202==     in use at exit: 3,113,975 bytes in 68,960 blocks
==10202==   total heap usage: 1,598,076 allocs, 1,529,116 frees, 129,169,912 bytes allocated
==10202== 
==10202== Searching for pointers to 68,960 not-freed blocks
--10202--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10202--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10202--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10202--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10202--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10202--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10202--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10202--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10202--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10202--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10202--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10202--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10202--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10202--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10202--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10202--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10202--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10202--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10202--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10202--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10202--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10202--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10202--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10202--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10202--   Scanning root segment: 0x701a000..0x701afff (4096)
--10202--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10202--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10202--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10202--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10202--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10202--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10202--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10202--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10202--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10202--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10198== Checked 4,839,344 bytes
==10198== 
==10199== Checked 4,789,064 bytes
==10199== 
==10198== LEAK SUMMARY:
==10198==    definitely lost: 2,221 bytes in 14 blocks
==10198==    indirectly lost: 6,796 bytes in 9 blocks
==10198==      possibly lost: 0 bytes in 0 blocks
==10198==    still reachable: 3,128,337 bytes in 69,513 blocks
==10198==         suppressed: 0 bytes in 0 blocks
==10198== Rerun with --leak-check=full to see details of leaked memory
==10198== 
==10198== Use --track-origins=yes to see where uninitialised values come from
==10198== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10198== 
==10198== 1 errors in context 1 of 2:
==10198== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10198==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10198==    by 0x488CD0: stringsubst (subst.c:301)
==10198==    by 0x48801B: prefork (subst.c:77)
==10198==    by 0x42B318: execcmd (exec.c:2619)
==10198==    by 0x428CA0: execpline2 (exec.c:1697)
==10198==    by 0x427FD2: execpline (exec.c:1484)
==10198==    by 0x427756: execlist (exec.c:1267)
==10198==    by 0x42717C: execode (exec.c:1073)
==10198==    by 0x431299: runshfunc (exec.c:5040)
==10198==    by 0x430E76: doshfunc (exec.c:4920)
==10198==    by 0x4302FB: execshfunc (exec.c:4557)
==10198==    by 0x42D8C1: execcmd (exec.c:3373)
==10198== 
==10198== 
==10198== 2 errors in context 2 of 2:
==10198== Conditional jump or move depends on uninitialised value(s)
==10198==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10198==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10198==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10198==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10198==    by 0x42D8E9: execcmd (exec.c:3378)
==10198==    by 0x428CA0: execpline2 (exec.c:1697)
==10198==    by 0x427FD2: execpline (exec.c:1484)
==10198==    by 0x42779A: execlist (exec.c:1275)
==10198==    by 0x42717C: execode (exec.c:1073)
==10198==    by 0x431299: runshfunc (exec.c:5040)
==10198==    by 0x430E76: doshfunc (exec.c:4920)
==10198==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10198== 
==10198== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10206-by-pythonnut-on-???
==10206== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10206-by-pythonnut-on-???
==10206== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10206-by-pythonnut-on-???
==10206== 
==10206== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10206== don't want to do, unless you know exactly what you're doing,
==10206== or are doing some strange experiment):
==10206==   /usr/lib/valgrind/../../bin/vgdb --pid=10206 ...command...
==10206== 
==10206== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10206==   /path/to/gdb ./zsh
==10206== and then give GDB the following command
==10206==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10206
==10206== --pid is optional if only one valgrind process is running
==10206== 
==10199== LEAK SUMMARY:
==10199==    definitely lost: 2,197 bytes in 13 blocks
==10199==    indirectly lost: 6,756 bytes in 7 blocks
==10199==      possibly lost: 0 bytes in 0 blocks
==10199==    still reachable: 3,103,833 bytes in 68,951 blocks
==10199==         suppressed: 0 bytes in 0 blocks
==10199== Rerun with --leak-check=full to see details of leaked memory
==10199== 
==10199== Use --track-origins=yes to see where uninitialised values come from
==10199== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10199== 
==10199== 1 errors in context 1 of 2:
==10199== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10199==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10199==    by 0x488CD0: stringsubst (subst.c:301)
==10199==    by 0x48801B: prefork (subst.c:77)
==10199==    by 0x42B318: execcmd (exec.c:2619)
==10199==    by 0x428CA0: execpline2 (exec.c:1697)
==10199==    by 0x427FD2: execpline (exec.c:1484)
==10199==    by 0x427756: execlist (exec.c:1267)
==10199==    by 0x42717C: execode (exec.c:1073)
==10199==    by 0x431299: runshfunc (exec.c:5040)
==10199==    by 0x430E76: doshfunc (exec.c:4920)
==10199==    by 0x4302FB: execshfunc (exec.c:4557)
==10199==    by 0x42D8C1: execcmd (exec.c:3373)
==10199== 
==10199== 
==10199== 2 errors in context 2 of 2:
==10199== Conditional jump or move depends on uninitialised value(s)
==10199==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10199==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10199==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10199==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10199==    by 0x42D8E9: execcmd (exec.c:3378)
==10199==    by 0x428CA0: execpline2 (exec.c:1697)
==10199==    by 0x427FD2: execpline (exec.c:1484)
==10199==    by 0x42779A: execlist (exec.c:1275)
==10199==    by 0x42717C: execode (exec.c:1073)
==10199==    by 0x431299: runshfunc (exec.c:5040)
==10199==    by 0x430E76: doshfunc (exec.c:4920)
==10199==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10199== 
==10199== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10206-- Caught __NR_exit; running __libc_freeres()
--10196-- Caught __NR_exit; running __libc_freeres()
==10196== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10196-by-pythonnut-on-???
==10196== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10196-by-pythonnut-on-???
==10196== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10196-by-pythonnut-on-???
==10196== 
==10196== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10196== don't want to do, unless you know exactly what you're doing,
==10196== or are doing some strange experiment):
==10196==   /usr/lib/valgrind/../../bin/vgdb --pid=10196 ...command...
==10196== 
==10196== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10196==   /path/to/gdb ./zsh
==10196== and then give GDB the following command
==10196==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10196
==10196== --pid is optional if only one valgrind process is running
==10196== 
==10202== Checked 4,774,928 bytes
==10202== 
--10206-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10196-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10202== LEAK SUMMARY:
==10202==    definitely lost: 2,197 bytes in 13 blocks
==10202==    indirectly lost: 6,756 bytes in 7 blocks
==10202==      possibly lost: 0 bytes in 0 blocks
==10202==    still reachable: 3,105,022 bytes in 68,940 blocks
==10202==         suppressed: 0 bytes in 0 blocks
==10202== Rerun with --leak-check=full to see details of leaked memory
==10202== 
==10202== Use --track-origins=yes to see where uninitialised values come from
==10202== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10202== 
==10202== 1 errors in context 1 of 2:
==10202== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10202==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10202==    by 0x488CD0: stringsubst (subst.c:301)
==10202==    by 0x48801B: prefork (subst.c:77)
==10202==    by 0x42B318: execcmd (exec.c:2619)
==10202==    by 0x428CA0: execpline2 (exec.c:1697)
==10202==    by 0x427FD2: execpline (exec.c:1484)
==10202==    by 0x427756: execlist (exec.c:1267)
==10202==    by 0x42717C: execode (exec.c:1073)
==10202==    by 0x431299: runshfunc (exec.c:5040)
==10202==    by 0x430E76: doshfunc (exec.c:4920)
==10202==    by 0x4302FB: execshfunc (exec.c:4557)
==10202==    by 0x42D8C1: execcmd (exec.c:3373)
==10202== 
==10202== 
==10202== 2 errors in context 2 of 2:
==10202== Conditional jump or move depends on uninitialised value(s)
==10202==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10202==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10202==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10202==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10202==    by 0x42D8E9: execcmd (exec.c:3378)
==10202==    by 0x428CA0: execpline2 (exec.c:1697)
==10202==    by 0x427FD2: execpline (exec.c:1484)
==10202==    by 0x42779A: execlist (exec.c:1275)
==10202==    by 0x42717C: execode (exec.c:1073)
==10202==    by 0x431299: runshfunc (exec.c:5040)
==10202==    by 0x430E76: doshfunc (exec.c:4920)
==10202==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10202== 
==10202== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== 
==10196== 
==10206== HEAP SUMMARY:
==10206==     in use at exit: 3,137,353 bytes in 69,536 blocks
==10206==   total heap usage: 1,595,212 allocs, 1,525,676 frees, 128,944,022 bytes allocated
==10206== 
==10196== HEAP SUMMARY:
==10196==     in use at exit: 3,112,722 bytes in 68,968 blocks
==10196==   total heap usage: 1,598,088 allocs, 1,529,120 frees, 129,058,773 bytes allocated
==10196== 
client request: code 4d430005,  addr 0xFFEFF073C,  len 4
==10196== Searching for pointers to 68,968 not-freed blocks
--10196--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10196--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10196--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10196--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10196--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10196--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10196--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10196--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10196--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10196--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10196--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10196--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10196--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10196--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10196--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10196--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10196--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10196--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10196--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10196--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10196--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10196--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10196--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10196--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10196--   Scanning root segment: 0x701a000..0x701afff (4096)
--10196--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10196--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10196--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10196--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10196--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10196--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10196--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10196--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10196--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10196--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10206== Searching for pointers to 69,536 not-freed blocks
--10206--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10206--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10206--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10206--   Scanning root segment: 0x4037000..0x403efff (32768)
--10206--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10206--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10206--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10206--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10206--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10206--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10206--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10206--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10206--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10206--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10206--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10206--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10206--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10206--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10206--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10206--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10206--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10206--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10206--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10206--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10206--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10206--   Scanning root segment: 0x701a000..0x701afff (4096)
--10206--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10206--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10206--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10206--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10206--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10206--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10206--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10206--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10206--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10206--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10196== Checked 4,788,376 bytes
==10196== 
==10206== Checked 4,839,344 bytes
==10206== 
==10196== LEAK SUMMARY:
==10196==    definitely lost: 2,197 bytes in 13 blocks
==10196==    indirectly lost: 6,756 bytes in 7 blocks
==10196==      possibly lost: 0 bytes in 0 blocks
==10196==    still reachable: 3,103,769 bytes in 68,948 blocks
==10196==         suppressed: 0 bytes in 0 blocks
==10196== Rerun with --leak-check=full to see details of leaked memory
==10196== 
==10196== Use --track-origins=yes to see where uninitialised values come from
==10196== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10196== 
==10196== 1 errors in context 1 of 2:
==10196== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10196==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10196==    by 0x488CD0: stringsubst (subst.c:301)
==10196==    by 0x48801B: prefork (subst.c:77)
==10196==    by 0x42B318: execcmd (exec.c:2619)
==10196==    by 0x428CA0: execpline2 (exec.c:1697)
==10196==    by 0x427FD2: execpline (exec.c:1484)
==10196==    by 0x427756: execlist (exec.c:1267)
==10196==    by 0x42717C: execode (exec.c:1073)
==10196==    by 0x431299: runshfunc (exec.c:5040)
==10196==    by 0x430E76: doshfunc (exec.c:4920)
==10196==    by 0x4302FB: execshfunc (exec.c:4557)
==10196==    by 0x42D8C1: execcmd (exec.c:3373)
==10196== 
==10196== 
==10196== 2 errors in context 2 of 2:
==10196== Conditional jump or move depends on uninitialised value(s)
==10196==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10196==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10196==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10196==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10196==    by 0x42D8E9: execcmd (exec.c:3378)
==10196==    by 0x428CA0: execpline2 (exec.c:1697)
==10196==    by 0x427FD2: execpline (exec.c:1484)
==10196==    by 0x42779A: execlist (exec.c:1275)
==10196==    by 0x42717C: execode (exec.c:1073)
==10196==    by 0x431299: runshfunc (exec.c:5040)
==10196==    by 0x430E76: doshfunc (exec.c:4920)
==10196==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10196== 
==10196== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10207-- Caught __NR_exit; running __libc_freeres()
==10206== LEAK SUMMARY:
==10206==    definitely lost: 2,221 bytes in 14 blocks
==10206==    indirectly lost: 6,796 bytes in 9 blocks
==10206==      possibly lost: 0 bytes in 0 blocks
==10206==    still reachable: 3,128,336 bytes in 69,513 blocks
==10206==         suppressed: 0 bytes in 0 blocks
==10206== Rerun with --leak-check=full to see details of leaked memory
==10206== 
==10206== Use --track-origins=yes to see where uninitialised values come from
==10206== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10206== 
==10206== 1 errors in context 1 of 2:
==10206== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10206==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10206==    by 0x488CD0: stringsubst (subst.c:301)
==10206==    by 0x48801B: prefork (subst.c:77)
==10206==    by 0x42B318: execcmd (exec.c:2619)
==10206==    by 0x428CA0: execpline2 (exec.c:1697)
==10206==    by 0x427FD2: execpline (exec.c:1484)
==10206==    by 0x427756: execlist (exec.c:1267)
==10206==    by 0x42717C: execode (exec.c:1073)
==10206==    by 0x431299: runshfunc (exec.c:5040)
==10206==    by 0x430E76: doshfunc (exec.c:4920)
==10206==    by 0x4302FB: execshfunc (exec.c:4557)
==10206==    by 0x42D8C1: execcmd (exec.c:3373)
==10206== 
==10206== 
==10206== 2 errors in context 2 of 2:
==10206== Conditional jump or move depends on uninitialised value(s)
==10206==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10206==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10206==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10206==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10206==    by 0x42D8E9: execcmd (exec.c:3378)
==10206==    by 0x428CA0: execpline2 (exec.c:1697)
==10206==    by 0x427FD2: execpline (exec.c:1484)
==10206==    by 0x42779A: execlist (exec.c:1275)
==10206==    by 0x42717C: execode (exec.c:1073)
==10206==    by 0x431299: runshfunc (exec.c:5040)
==10206==    by 0x430E76: doshfunc (exec.c:4920)
==10206==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10206== 
==10206== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10207== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10207-by-pythonnut-on-???
==10207== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10207-by-pythonnut-on-???
==10207== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10207-by-pythonnut-on-???
==10207== 
==10207== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10207== don't want to do, unless you know exactly what you're doing,
==10207== or are doing some strange experiment):
==10207==   /usr/lib/valgrind/../../bin/vgdb --pid=10207 ...command...
==10207== 
==10207== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10207==   /path/to/gdb ./zsh
==10207== and then give GDB the following command
==10207==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10207
==10207== --pid is optional if only one valgrind process is running
==10207== 
--10255-- Caught __NR_exit; running __libc_freeres()
==10256== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10256-by-pythonnut-on-???
==10256== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10256-by-pythonnut-on-???
==10256== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10256-by-pythonnut-on-???
==10256== 
==10256== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10256== don't want to do, unless you know exactly what you're doing,
==10256== or are doing some strange experiment):
==10256==   /usr/lib/valgrind/../../bin/vgdb --pid=10256 ...command...
==10256== 
==10256== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10256==   /path/to/gdb ./zsh
==10256== and then give GDB the following command
==10256==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10256
==10256== --pid is optional if only one valgrind process is running
==10256== 
--10256-- Caught __NR_exit; running __libc_freeres()
==10255== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10255-by-pythonnut-on-???
==10255== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10255-by-pythonnut-on-???
==10255== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10255-by-pythonnut-on-???
==10255== 
==10255== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10255== don't want to do, unless you know exactly what you're doing,
==10255== or are doing some strange experiment):
==10255==   /usr/lib/valgrind/../../bin/vgdb --pid=10255 ...command...
==10255== 
==10255== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10255==   /path/to/gdb ./zsh
==10255== and then give GDB the following command
==10255==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10255
==10255== --pid is optional if only one valgrind process is running
==10255== 
--10207-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10207== 
==10207== HEAP SUMMARY:
==10207==     in use at exit: 3,114,366 bytes in 68,968 blocks
==10207==   total heap usage: 1,598,092 allocs, 1,529,124 frees, 129,174,023 bytes allocated
==10207== 
--10255-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10255== 
--10256-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10255== HEAP SUMMARY:
==10255==     in use at exit: 3,112,729 bytes in 68,968 blocks
==10255==   total heap usage: 1,598,103 allocs, 1,529,135 frees, 129,063,771 bytes allocated
==10255== 
==10256== 
==10256== HEAP SUMMARY:
==10256==     in use at exit: 3,137,352 bytes in 69,536 blocks
==10256==   total heap usage: 1,595,217 allocs, 1,525,681 frees, 128,946,135 bytes allocated
==10256== 
==10207== Searching for pointers to 68,968 not-freed blocks
--10207--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10207--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10207--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10207--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10207--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10207--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10207--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10207--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10207--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10207--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10207--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10207--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10207--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10207--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10207--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10207--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10207--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10207--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10207--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10207--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10207--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10207--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10207--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10207--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10207--   Scanning root segment: 0x701a000..0x701afff (4096)
--10207--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10207--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10207--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10207--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10207--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10207--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10207--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10207--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10207--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10207--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10255== Searching for pointers to 68,968 not-freed blocks
--10255--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10255--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10255--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10255--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10255--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10255--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10255--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10255--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10255--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10255--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10255--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10255--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10255--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10255--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10255--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10255--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10255--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10255--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10255--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10255--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10255--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10255--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10255--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10255--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10255--   Scanning root segment: 0x701a000..0x701afff (4096)
--10255--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10255--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10255--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10255--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10255--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10255--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10255--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10255--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10255--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10255--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10256== Searching for pointers to 69,536 not-freed blocks
--10256--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10256--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10256--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10256--   Scanning root segment: 0x4037000..0x403efff (32768)
--10256--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10256--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10256--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10256--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10256--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10256--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10256--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10256--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10256--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10256--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10256--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10256--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10256--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10256--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10256--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10256--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10256--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10256--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10256--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10256--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10256--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10256--   Scanning root segment: 0x701a000..0x701afff (4096)
--10256--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10256--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10256--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10256--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10256--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10256--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10256--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10256--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10256--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10256--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10207== Checked 4,775,032 bytes
==10207== 
==10255== Checked 4,788,512 bytes
==10255== 
==10207== LEAK SUMMARY:
==10207==    definitely lost: 2,197 bytes in 13 blocks
==10207==    indirectly lost: 6,756 bytes in 7 blocks
==10207==      possibly lost: 0 bytes in 0 blocks
==10207==    still reachable: 3,105,413 bytes in 68,948 blocks
==10207==         suppressed: 0 bytes in 0 blocks
==10207== Rerun with --leak-check=full to see details of leaked memory
==10207== 
==10207== Use --track-origins=yes to see where uninitialised values come from
==10207== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10207== 
==10207== 1 errors in context 1 of 2:
==10207== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10207==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10207==    by 0x488CD0: stringsubst (subst.c:301)
==10207==    by 0x48801B: prefork (subst.c:77)
==10207==    by 0x42B318: execcmd (exec.c:2619)
==10207==    by 0x428CA0: execpline2 (exec.c:1697)
==10207==    by 0x427FD2: execpline (exec.c:1484)
==10207==    by 0x427756: execlist (exec.c:1267)
==10207==    by 0x42717C: execode (exec.c:1073)
==10207==    by 0x431299: runshfunc (exec.c:5040)
==10207==    by 0x430E76: doshfunc (exec.c:4920)
==10207==    by 0x4302FB: execshfunc (exec.c:4557)
==10207==    by 0x42D8C1: execcmd (exec.c:3373)
==10207== 
==10207== 
==10207== 2 errors in context 2 of 2:
==10207== Conditional jump or move depends on uninitialised value(s)
==10207==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10207==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10207==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10207==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10207==    by 0x42D8E9: execcmd (exec.c:3378)
==10207==    by 0x428CA0: execpline2 (exec.c:1697)
==10207==    by 0x427FD2: execpline (exec.c:1484)
==10207==    by 0x42779A: execlist (exec.c:1275)
==10207==    by 0x42717C: execode (exec.c:1073)
==10207==    by 0x431299: runshfunc (exec.c:5040)
==10207==    by 0x430E76: doshfunc (exec.c:4920)
==10207==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10207== 
==10207== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10200-- Caught __NR_exit; running __libc_freeres()
==10256== Checked 4,839,344 bytes
==10256== 
==10255== LEAK SUMMARY:
==10255==    definitely lost: 2,197 bytes in 13 blocks
==10255==    indirectly lost: 6,756 bytes in 7 blocks
==10255==      possibly lost: 0 bytes in 0 blocks
==10255==    still reachable: 3,103,776 bytes in 68,948 blocks
==10255==         suppressed: 0 bytes in 0 blocks
==10255== Rerun with --leak-check=full to see details of leaked memory
==10255== 
==10255== Use --track-origins=yes to see where uninitialised values come from
==10255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10255== 
==10255== 1 errors in context 1 of 2:
==10255== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10255==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10255==    by 0x488CD0: stringsubst (subst.c:301)
==10255==    by 0x48801B: prefork (subst.c:77)
==10255==    by 0x42B318: execcmd (exec.c:2619)
==10255==    by 0x428CA0: execpline2 (exec.c:1697)
==10255==    by 0x427FD2: execpline (exec.c:1484)
==10255==    by 0x427756: execlist (exec.c:1267)
==10255==    by 0x42717C: execode (exec.c:1073)
==10255==    by 0x431299: runshfunc (exec.c:5040)
==10255==    by 0x430E76: doshfunc (exec.c:4920)
==10255==    by 0x4302FB: execshfunc (exec.c:4557)
==10255==    by 0x42D8C1: execcmd (exec.c:3373)
==10255== 
==10255== 
==10255== 2 errors in context 2 of 2:
==10255== Conditional jump or move depends on uninitialised value(s)
==10255==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10255==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10255==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10255==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10255==    by 0x42D8E9: execcmd (exec.c:3378)
==10255==    by 0x428CA0: execpline2 (exec.c:1697)
==10255==    by 0x427FD2: execpline (exec.c:1484)
==10255==    by 0x42779A: execlist (exec.c:1275)
==10255==    by 0x42717C: execode (exec.c:1073)
==10255==    by 0x431299: runshfunc (exec.c:5040)
==10255==    by 0x430E76: doshfunc (exec.c:4920)
==10255==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10255== 
==10255== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10200-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10256== LEAK SUMMARY:
==10256==    definitely lost: 2,221 bytes in 14 blocks
==10256==    indirectly lost: 6,796 bytes in 9 blocks
==10256==      possibly lost: 0 bytes in 0 blocks
==10256==    still reachable: 3,128,335 bytes in 69,513 blocks
==10256==         suppressed: 0 bytes in 0 blocks
==10256== Rerun with --leak-check=full to see details of leaked memory
==10256== 
==10256== Use --track-origins=yes to see where uninitialised values come from
==10256== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10256== 
==10256== 1 errors in context 1 of 2:
==10256== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10256==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10256==    by 0x488CD0: stringsubst (subst.c:301)
==10256==    by 0x48801B: prefork (subst.c:77)
==10256==    by 0x42B318: execcmd (exec.c:2619)
==10256==    by 0x428CA0: execpline2 (exec.c:1697)
==10256==    by 0x427FD2: execpline (exec.c:1484)
==10256==    by 0x427756: execlist (exec.c:1267)
==10256==    by 0x42717C: execode (exec.c:1073)
==10256==    by 0x431299: runshfunc (exec.c:5040)
==10256==    by 0x430E76: doshfunc (exec.c:4920)
==10256==    by 0x4302FB: execshfunc (exec.c:4557)
==10256==    by 0x42D8C1: execcmd (exec.c:3373)
==10256== 
==10256== 
==10256== 2 errors in context 2 of 2:
==10256== Conditional jump or move depends on uninitialised value(s)
==10256==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10256==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10256==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10256==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10256==    by 0x42D8E9: execcmd (exec.c:3378)
==10256==    by 0x428CA0: execpline2 (exec.c:1697)
==10256==    by 0x427FD2: execpline (exec.c:1484)
==10256==    by 0x42779A: execlist (exec.c:1275)
==10256==    by 0x42717C: execode (exec.c:1073)
==10256==    by 0x431299: runshfunc (exec.c:5040)
==10256==    by 0x430E76: doshfunc (exec.c:4920)
==10256==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10256== 
==10256== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10200== 
--10257-- Caught __NR_exit; running __libc_freeres()
==10200== HEAP SUMMARY:
==10200==     in use at exit: 3,113,504 bytes in 68,949 blocks
==10200==   total heap usage: 1,598,101 allocs, 1,529,152 frees, 129,176,026 bytes allocated
==10200== 
==10258== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10258-by-pythonnut-on-???
==10258== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10258-by-pythonnut-on-???
==10258== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10258-by-pythonnut-on-???
==10258== 
==10258== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10258== don't want to do, unless you know exactly what you're doing,
==10258== or are doing some strange experiment):
==10258==   /usr/lib/valgrind/../../bin/vgdb --pid=10258 ...command...
==10258== 
==10258== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10258==   /path/to/gdb ./zsh
==10258== and then give GDB the following command
==10258==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10258
==10258== --pid is optional if only one valgrind process is running
==10258== 
==10257== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10257-by-pythonnut-on-???
==10257== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10257-by-pythonnut-on-???
==10257== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10257-by-pythonnut-on-???
==10257== 
==10257== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10257== don't want to do, unless you know exactly what you're doing,
==10257== or are doing some strange experiment):
==10257==   /usr/lib/valgrind/../../bin/vgdb --pid=10257 ...command...
==10257== 
==10257== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10257==   /path/to/gdb ./zsh
==10257== and then give GDB the following command
==10257==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10257
==10257== --pid is optional if only one valgrind process is running
==10257== 
--10258-- Caught __NR_exit; running __libc_freeres()
--10257-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10200== Searching for pointers to 68,949 not-freed blocks
--10200--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10200--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10200--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10200--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10200--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10200--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10200--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10200--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10200--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10200--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10200--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10200--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10200--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10200--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10200--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10200--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10200--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10200--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10200--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10200--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10200--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10200--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10200--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10200--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10200--   Scanning root segment: 0x701a000..0x701afff (4096)
--10200--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10200--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10200--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10200--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10200--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10200--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==10257== 
--10200--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10200--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10200--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10200--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10257== HEAP SUMMARY:
==10257==     in use at exit: 3,112,889 bytes in 68,969 blocks
==10257==   total heap usage: 1,598,120 allocs, 1,529,151 frees, 129,068,622 bytes allocated
==10257== 
--10258-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10258== 
==10258== HEAP SUMMARY:
==10258==     in use at exit: 3,137,351 bytes in 69,536 blocks
==10258==   total heap usage: 1,595,225 allocs, 1,525,689 frees, 128,949,788 bytes allocated
==10258== 
==10257== Searching for pointers to 68,969 not-freed blocks
--10257--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10257--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10257--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10257--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10257--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10257--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10257--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10257--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10257--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10257--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10257--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10257--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10257--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10257--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10257--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10257--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10257--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10257--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10257--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10257--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10257--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10257--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10257--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10257--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10257--   Scanning root segment: 0x701a000..0x701afff (4096)
--10257--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10257--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10257--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10257--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10257--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10257--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10257--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10257--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10257--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10257--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10258== Searching for pointers to 69,536 not-freed blocks
--10258--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10258--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10258--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10258--   Scanning root segment: 0x4037000..0x403efff (32768)
--10258--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10258--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10258--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10258--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10258--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10258--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10258--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10258--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10258--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10258--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10258--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10258--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10258--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10258--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10258--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10258--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10258--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10258--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10258--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10258--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10258--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10258--   Scanning root segment: 0x701a000..0x701afff (4096)
--10258--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10258--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10258--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10258--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10258--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10258--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10258--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10258--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10258--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10258--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10200== Checked 4,772,416 bytes
==10200== 
==10200== LEAK SUMMARY:
==10200==    definitely lost: 2,197 bytes in 13 blocks
==10200==    indirectly lost: 6,756 bytes in 7 blocks
==10200==      possibly lost: 0 bytes in 0 blocks
==10200==    still reachable: 3,104,551 bytes in 68,929 blocks
==10200==         suppressed: 0 bytes in 0 blocks
==10200== Rerun with --leak-check=full to see details of leaked memory
==10200== 
==10200== Use --track-origins=yes to see where uninitialised values come from
==10200== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10200== 
==10200== 1 errors in context 1 of 2:
==10200== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10200==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10200==    by 0x488CD0: stringsubst (subst.c:301)
==10200==    by 0x48801B: prefork (subst.c:77)
==10200==    by 0x42B318: execcmd (exec.c:2619)
==10200==    by 0x428CA0: execpline2 (exec.c:1697)
==10200==    by 0x427FD2: execpline (exec.c:1484)
==10200==    by 0x427756: execlist (exec.c:1267)
==10200==    by 0x42717C: execode (exec.c:1073)
==10200==    by 0x431299: runshfunc (exec.c:5040)
==10200==    by 0x430E76: doshfunc (exec.c:4920)
==10200==    by 0x4302FB: execshfunc (exec.c:4557)
==10200==    by 0x42D8C1: execcmd (exec.c:3373)
==10200== 
==10200== 
==10200== 2 errors in context 2 of 2:
==10200== Conditional jump or move depends on uninitialised value(s)
==10200==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10200==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10200==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10200==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10200==    by 0x42D8E9: execcmd (exec.c:3378)
==10200==    by 0x428CA0: execpline2 (exec.c:1697)
==10200==    by 0x427FD2: execpline (exec.c:1484)
==10200==    by 0x42779A: execlist (exec.c:1275)
==10200==    by 0x42717C: execode (exec.c:1073)
==10200==    by 0x431299: runshfunc (exec.c:5040)
==10200==    by 0x430E76: doshfunc (exec.c:4920)
==10200==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10200== 
==10200== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10257== Checked 4,787,856 bytes
==10257== 
==10257== LEAK SUMMARY:
==10257==    definitely lost: 2,197 bytes in 13 blocks
==10257==    indirectly lost: 6,756 bytes in 7 blocks
==10257==      possibly lost: 0 bytes in 0 blocks
==10257==    still reachable: 3,103,936 bytes in 68,949 blocks
==10257==         suppressed: 0 bytes in 0 blocks
==10257== Rerun with --leak-check=full to see details of leaked memory
==10257== 
==10257== Use --track-origins=yes to see where uninitialised values come from
==10257== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10257== 
==10257== 1 errors in context 1 of 2:
==10257== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10257==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10257==    by 0x488CD0: stringsubst (subst.c:301)
==10257==    by 0x48801B: prefork (subst.c:77)
==10257==    by 0x42B318: execcmd (exec.c:2619)
==10257==    by 0x428CA0: execpline2 (exec.c:1697)
==10257==    by 0x427FD2: execpline (exec.c:1484)
==10257==    by 0x427756: execlist (exec.c:1267)
==10257==    by 0x42717C: execode (exec.c:1073)
==10257==    by 0x431299: runshfunc (exec.c:5040)
==10257==    by 0x430E76: doshfunc (exec.c:4920)
==10257==    by 0x4302FB: execshfunc (exec.c:4557)
==10257==    by 0x42D8C1: execcmd (exec.c:3373)
==10257== 
==10257== 
==10257== 2 errors in context 2 of 2:
==10257== Conditional jump or move depends on uninitialised value(s)
==10257==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10257==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10257==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10257==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10257==    by 0x42D8E9: execcmd (exec.c:3378)
==10258== Checked 4,839,344 bytes
==10257==    by 0x428CA0: execpline2 (exec.c:1697)
==10258== 
==10257==    by 0x427FD2: execpline (exec.c:1484)
==10257==    by 0x42779A: execlist (exec.c:1275)
==10257==    by 0x42717C: execode (exec.c:1073)
==10257==    by 0x431299: runshfunc (exec.c:5040)
==10257==    by 0x430E76: doshfunc (exec.c:4920)
==10257==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10257== 
==10257== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10260-- Caught __NR_exit; running __libc_freeres()
==10260== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10260-by-pythonnut-on-???
==10260== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10260-by-pythonnut-on-???
==10260== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10260-by-pythonnut-on-???
==10260== 
==10260== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10260== don't want to do, unless you know exactly what you're doing,
==10260== or are doing some strange experiment):
==10260==   /usr/lib/valgrind/../../bin/vgdb --pid=10260 ...command...
==10260== 
==10260== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10260==   /path/to/gdb ./zsh
==10260== and then give GDB the following command
==10260==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10260
==10260== --pid is optional if only one valgrind process is running
==10260== 
==10258== LEAK SUMMARY:
==10258==    definitely lost: 2,221 bytes in 14 blocks
==10258==    indirectly lost: 6,796 bytes in 9 blocks
==10258==      possibly lost: 0 bytes in 0 blocks
==10258==    still reachable: 3,128,334 bytes in 69,513 blocks
==10258==         suppressed: 0 bytes in 0 blocks
==10258== Rerun with --leak-check=full to see details of leaked memory
==10258== 
==10258== Use --track-origins=yes to see where uninitialised values come from
==10258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10258== 
==10258== 1 errors in context 1 of 2:
==10258== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10258==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10258==    by 0x488CD0: stringsubst (subst.c:301)
==10258==    by 0x48801B: prefork (subst.c:77)
==10258==    by 0x42B318: execcmd (exec.c:2619)
==10258==    by 0x428CA0: execpline2 (exec.c:1697)
==10258==    by 0x427FD2: execpline (exec.c:1484)
==10258==    by 0x427756: execlist (exec.c:1267)
==10258==    by 0x42717C: execode (exec.c:1073)
==10258==    by 0x431299: runshfunc (exec.c:5040)
==10258==    by 0x430E76: doshfunc (exec.c:4920)
==10258==    by 0x4302FB: execshfunc (exec.c:4557)
==10258==    by 0x42D8C1: execcmd (exec.c:3373)
==10258== 
==10258== 
==10258== 2 errors in context 2 of 2:
==10258== Conditional jump or move depends on uninitialised value(s)
==10258==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10258==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10258==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10258==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10258==    by 0x42D8E9: execcmd (exec.c:3378)
==10258==    by 0x428CA0: execpline2 (exec.c:1697)
==10258==    by 0x427FD2: execpline (exec.c:1484)
==10258==    by 0x42779A: execlist (exec.c:1275)
==10258==    by 0x42717C: execode (exec.c:1073)
==10258==    by 0x431299: runshfunc (exec.c:5040)
==10258==    by 0x430E76: doshfunc (exec.c:4920)
==10258==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10258== 
==10258== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10261== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10261-by-pythonnut-on-???
==10261== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10261-by-pythonnut-on-???
==10261== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10261-by-pythonnut-on-???
==10261== 
==10261== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10261== don't want to do, unless you know exactly what you're doing,
==10261== or are doing some strange experiment):
==10261==   /usr/lib/valgrind/../../bin/vgdb --pid=10261 ...command...
==10261== 
==10261== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10261==   /path/to/gdb ./zsh
==10261== and then give GDB the following command
==10261==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10261
==10261== --pid is optional if only one valgrind process is running
==10261== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--10260-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10263== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10263-by-pythonnut-on-???
==10263== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10263-by-pythonnut-on-???
==10263== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10263-by-pythonnut-on-???
==10263== 
==10263== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10263== don't want to do, unless you know exactly what you're doing,
==10263== or are doing some strange experiment):
==10263==   /usr/lib/valgrind/../../bin/vgdb --pid=10263 ...command...
==10263== 
==10263== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10263==   /path/to/gdb ./zsh
==10263== and then give GDB the following command
==10263==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10263
==10263== --pid is optional if only one valgrind process is running
==10263== 
--10261-- Caught __NR_exit; running __libc_freeres()
==10260== 
==10260== HEAP SUMMARY:
==10260==     in use at exit: 3,115,245 bytes in 69,011 blocks
==10260==   total heap usage: 1,598,167 allocs, 1,529,156 frees, 129,184,603 bytes allocated
==10260== 
--10263-- Caught __NR_exit; running __libc_freeres()
--10261-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10260== Searching for pointers to 69,011 not-freed blocks
--10260--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10260--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10260--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10260--   Scanning root segment: 0x4037000..0x403afff (16384)
--10260--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10260--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10260--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10260--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10260--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10260--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10260--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10260--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10260--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10260--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10260--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10260--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10260--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10260--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10260--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10260--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10260--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10260--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10260--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10260--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10260--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10260--   Scanning root segment: 0x701a000..0x701afff (4096)
--10260--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10260--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10260--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10260--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10260--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10260--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10260--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10260--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10260--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10260--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10261== 
--10263-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10261== HEAP SUMMARY:
==10261==     in use at exit: 3,113,095 bytes in 68,974 blocks
==10261==   total heap usage: 1,598,167 allocs, 1,529,193 frees, 129,077,574 bytes allocated
==10261== 
==10263== 
==10263== HEAP SUMMARY:
==10263==     in use at exit: 3,137,354 bytes in 69,536 blocks
==10263==   total heap usage: 1,595,227 allocs, 1,525,691 frees, 128,950,365 bytes allocated
==10263== 
==10261== Searching for pointers to 68,974 not-freed blocks
--10261--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10261--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10261--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10261--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10261--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10261--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10261--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10261--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10261--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10261--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10261--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10261--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10261--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10261--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10261--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10261--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10261--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10261--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10261--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10261--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10261--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10261--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10261--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
==10263== Searching for pointers to 69,536 not-freed blocks
--10261--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10263--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10261--   Scanning root segment: 0x701a000..0x701afff (4096)
--10261--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10261--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10261--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10263--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10261--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10261--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10261--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10261--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10261--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10261--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10261--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10263--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10263--   Scanning root segment: 0x4037000..0x403efff (32768)
--10263--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10263--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10263--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10263--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10263--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10263--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10263--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10263--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10263--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10263--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10263--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10263--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10263--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10263--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10263--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10263--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10263--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10263--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10263--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10263--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10263--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10263--   Scanning root segment: 0x701a000..0x701afff (4096)
--10263--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10263--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10263--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10263--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10263--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10263--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10263--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10263--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10263--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10263--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10260== Checked 4,791,024 bytes
==10260== 
==10260== LEAK SUMMARY:
==10260==    definitely lost: 2,197 bytes in 13 blocks
==10260==    indirectly lost: 6,756 bytes in 7 blocks
==10260==      possibly lost: 0 bytes in 0 blocks
==10260==    still reachable: 3,106,292 bytes in 68,991 blocks
==10260==         suppressed: 0 bytes in 0 blocks
==10260== Rerun with --leak-check=full to see details of leaked memory
==10260== 
==10260== Use --track-origins=yes to see where uninitialised values come from
==10260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10260== 
==10260== 1 errors in context 1 of 2:
==10260== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10260==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10260==    by 0x488CD0: stringsubst (subst.c:301)
==10260==    by 0x48801B: prefork (subst.c:77)
==10260==    by 0x42B318: execcmd (exec.c:2619)
==10260==    by 0x428CA0: execpline2 (exec.c:1697)
==10260==    by 0x427FD2: execpline (exec.c:1484)
==10260==    by 0x427756: execlist (exec.c:1267)
==10260==    by 0x42717C: execode (exec.c:1073)
==10260==    by 0x431299: runshfunc (exec.c:5040)
==10260==    by 0x430E76: doshfunc (exec.c:4920)
==10260==    by 0x4302FB: execshfunc (exec.c:4557)
==10260==    by 0x42D8C1: execcmd (exec.c:3373)
==10260== 
==10260== 
==10260== 2 errors in context 2 of 2:
==10260== Conditional jump or move depends on uninitialised value(s)
==10260==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10260==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10260==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10260==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10260==    by 0x42D8E9: execcmd (exec.c:3378)
==10260==    by 0x428CA0: execpline2 (exec.c:1697)
==10260==    by 0x427FD2: execpline (exec.c:1484)
==10260==    by 0x42779A: execlist (exec.c:1275)
==10260==    by 0x42717C: execode (exec.c:1073)
==10260==    by 0x431299: runshfunc (exec.c:5040)
==10260==    by 0x430E76: doshfunc (exec.c:4920)
==10260==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10260== 
==10260== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10259-- Caught __NR_exit; running __libc_freeres()
==10261== Checked 4,788,000 bytes
==10261== 
==10263== Checked 4,839,344 bytes
==10263== 
==10259== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10259-by-pythonnut-on-???
==10259== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10259-by-pythonnut-on-???
==10259== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10259-by-pythonnut-on-???
==10259== 
==10259== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10259== don't want to do, unless you know exactly what you're doing,
==10259== or are doing some strange experiment):
==10259==   /usr/lib/valgrind/../../bin/vgdb --pid=10259 ...command...
==10259== 
==10259== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10259==   /path/to/gdb ./zsh
==10259== and then give GDB the following command
==10259==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10259
==10259== --pid is optional if only one valgrind process is running
==10259== 
==10261== LEAK SUMMARY:
==10261==    definitely lost: 2,197 bytes in 13 blocks
==10261==    indirectly lost: 6,756 bytes in 7 blocks
==10261==      possibly lost: 0 bytes in 0 blocks
==10261==    still reachable: 3,104,142 bytes in 68,954 blocks
==10261==         suppressed: 0 bytes in 0 blocks
==10261== Rerun with --leak-check=full to see details of leaked memory
==10261== 
==10261== Use --track-origins=yes to see where uninitialised values come from
==10261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10261== 
==10261== 1 errors in context 1 of 2:
==10261== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10261==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10261==    by 0x488CD0: stringsubst (subst.c:301)
==10261==    by 0x48801B: prefork (subst.c:77)
==10261==    by 0x42B318: execcmd (exec.c:2619)
==10261==    by 0x428CA0: execpline2 (exec.c:1697)
==10261==    by 0x427FD2: execpline (exec.c:1484)
==10261==    by 0x427756: execlist (exec.c:1267)
==10261==    by 0x42717C: execode (exec.c:1073)
==10261==    by 0x431299: runshfunc (exec.c:5040)
==10261==    by 0x430E76: doshfunc (exec.c:4920)
==10261==    by 0x4302FB: execshfunc (exec.c:4557)
==10261==    by 0x42D8C1: execcmd (exec.c:3373)
==10261== 
==10261== 
==10261== 2 errors in context 2 of 2:
==10261== Conditional jump or move depends on uninitialised value(s)
==10261==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10261==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10261==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10261==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10261==    by 0x42D8E9: execcmd (exec.c:3378)
==10261==    by 0x428CA0: execpline2 (exec.c:1697)
==10261==    by 0x427FD2: execpline (exec.c:1484)
==10261==    by 0x42779A: execlist (exec.c:1275)
==10261==    by 0x42717C: execode (exec.c:1073)
==10261==    by 0x431299: runshfunc (exec.c:5040)
==10261==    by 0x430E76: doshfunc (exec.c:4920)
==10261==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10261== 
==10261== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10263== LEAK SUMMARY:
==10263==    definitely lost: 2,221 bytes in 14 blocks
==10263==    indirectly lost: 6,796 bytes in 9 blocks
==10263==      possibly lost: 0 bytes in 0 blocks
==10263==    still reachable: 3,128,337 bytes in 69,513 blocks
==10263==         suppressed: 0 bytes in 0 blocks
==10263== Rerun with --leak-check=full to see details of leaked memory
==10263== 
==10263== Use --track-origins=yes to see where uninitialised values come from
==10263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10263== 
==10263== 1 errors in context 1 of 2:
==10263== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10263==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10263==    by 0x488CD0: stringsubst (subst.c:301)
==10263==    by 0x48801B: prefork (subst.c:77)
==10263==    by 0x42B318: execcmd (exec.c:2619)
==10263==    by 0x428CA0: execpline2 (exec.c:1697)
==10263==    by 0x427FD2: execpline (exec.c:1484)
==10263==    by 0x427756: execlist (exec.c:1267)
==10263==    by 0x42717C: execode (exec.c:1073)
==10263==    by 0x431299: runshfunc (exec.c:5040)
==10263==    by 0x430E76: doshfunc (exec.c:4920)
==10263==    by 0x4302FB: execshfunc (exec.c:4557)
==10263==    by 0x42D8C1: execcmd (exec.c:3373)
==10263== 
==10263== 
==10263== 2 errors in context 2 of 2:
==10263== Conditional jump or move depends on uninitialised value(s)
==10263==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10263==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10263==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10263==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10263==    by 0x42D8E9: execcmd (exec.c:3378)
==10263==    by 0x428CA0: execpline2 (exec.c:1697)
==10263==    by 0x427FD2: execpline (exec.c:1484)
==10263==    by 0x42779A: execlist (exec.c:1275)
==10263==    by 0x42717C: execode (exec.c:1073)
==10263==    by 0x431299: runshfunc (exec.c:5040)
==10263==    by 0x430E76: doshfunc (exec.c:4920)
==10263==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10263== 
==10263== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10259-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10259== 
==10259== HEAP SUMMARY:
==10259==     in use at exit: 3,115,181 bytes in 69,008 blocks
==10259==   total heap usage: 1,598,169 allocs, 1,529,161 frees, 129,185,147 bytes allocated
==10259== 
==10267== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10267-by-pythonnut-on-???
==10267== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10267-by-pythonnut-on-???
==10267== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10267-by-pythonnut-on-???
==10267== 
==10267== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10267== don't want to do, unless you know exactly what you're doing,
==10267== or are doing some strange experiment):
==10267==   /usr/lib/valgrind/../../bin/vgdb --pid=10267 ...command...
==10267== 
==10267== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10267==   /path/to/gdb ./zsh
==10267== and then give GDB the following command
==10267==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10267
==10267== --pid is optional if only one valgrind process is running
==10267== 
--10268-- Caught __NR_exit; running __libc_freeres()
--10266-- Caught __NR_exit; running __libc_freeres()
==10266== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10266-by-pythonnut-on-???
==10266== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10266-by-pythonnut-on-???
==10266== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10266-by-pythonnut-on-???
==10266== 
==10266== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10266== don't want to do, unless you know exactly what you're doing,
==10266== or are doing some strange experiment):
==10266==   /usr/lib/valgrind/../../bin/vgdb --pid=10266 ...command...
==10266== 
==10266== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10266==   /path/to/gdb ./zsh
==10266== and then give GDB the following command
==10266==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10266
==10266== --pid is optional if only one valgrind process is running
==10266== 
==10268== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10268-by-pythonnut-on-???
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
==10268== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10268-by-pythonnut-on-???
==10268== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10268-by-pythonnut-on-???
==10268== 
==10268== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10268== don't want to do, unless you know exactly what you're doing,
==10268== or are doing some strange experiment):
==10268==   /usr/lib/valgrind/../../bin/vgdb --pid=10268 ...command...
==10268== 
==10268== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10268==   /path/to/gdb ./zsh
==10268== and then give GDB the following command
==10268==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10268
==10268== --pid is optional if only one valgrind process is running
==10268== 
==10259== Searching for pointers to 69,008 not-freed blocks
--10259--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10259--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10259--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10259--   Scanning root segment: 0x4037000..0x403afff (16384)
--10259--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10259--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10259--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10259--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10259--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10259--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10259--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10259--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10259--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10259--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10259--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10259--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10259--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10259--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10259--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10259--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10259--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10259--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10259--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10259--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10259--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10259--   Scanning root segment: 0x701a000..0x701afff (4096)
--10259--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10259--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10259--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10259--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10259--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10259--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10259--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10259--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10259--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10259--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10266-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10268-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10266== 
==10266== HEAP SUMMARY:
==10266==     in use at exit: 3,112,999 bytes in 68,974 blocks
==10266==   total heap usage: 1,598,147 allocs, 1,529,173 frees, 129,075,344 bytes allocated
==10266== 
==10268== 
==10268== HEAP SUMMARY:
==10268==     in use at exit: 3,137,636 bytes in 69,541 blocks
==10268==   total heap usage: 1,595,232 allocs, 1,525,691 frees, 128,953,955 bytes allocated
==10268== 
==10266== Searching for pointers to 68,974 not-freed blocks
--10266--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10266--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10266--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10266--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10266--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10266--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10266--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10266--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10266--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10266--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10266--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10266--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10266--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10266--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10266--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10266--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10266--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10266--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10266--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10266--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10266--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10266--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10266--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10266--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10266--   Scanning root segment: 0x701a000..0x701afff (4096)
--10266--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10266--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10266--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10266--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10266--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10266--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10266--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10266--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10266--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10266--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10268== Searching for pointers to 69,541 not-freed blocks
--10268--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10268--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10268--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10268--   Scanning root segment: 0x4037000..0x403efff (32768)
--10268--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10268--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10268--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10268--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10268--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10268--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10268--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10268--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10268--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10268--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10268--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10268--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10268--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10268--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10268--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10268--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10268--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10268--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10268--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10268--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10268--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10268--   Scanning root segment: 0x701a000..0x701afff (4096)
--10268--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10268--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10268--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10268--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10268--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10268--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10268--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10268--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10268--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10268--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10259== Checked 4,790,336 bytes
==10259== 
==10259== LEAK SUMMARY:
==10259==    definitely lost: 2,197 bytes in 13 blocks
==10259==    indirectly lost: 6,756 bytes in 7 blocks
==10259==      possibly lost: 0 bytes in 0 blocks
==10259==    still reachable: 3,106,228 bytes in 68,988 blocks
==10259==         suppressed: 0 bytes in 0 blocks
==10259== Rerun with --leak-check=full to see details of leaked memory
==10259== 
==10259== Use --track-origins=yes to see where uninitialised values come from
==10259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10259== 
==10259== 1 errors in context 1 of 2:
==10259== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10259==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10259==    by 0x488CD0: stringsubst (subst.c:301)
==10259==    by 0x48801B: prefork (subst.c:77)
==10259==    by 0x42B318: execcmd (exec.c:2619)
==10259==    by 0x428CA0: execpline2 (exec.c:1697)
==10259==    by 0x427FD2: execpline (exec.c:1484)
==10259==    by 0x427756: execlist (exec.c:1267)
==10259==    by 0x42717C: execode (exec.c:1073)
==10259==    by 0x431299: runshfunc (exec.c:5040)
==10259==    by 0x430E76: doshfunc (exec.c:4920)
==10259==    by 0x4302FB: execshfunc (exec.c:4557)
==10259==    by 0x42D8C1: execcmd (exec.c:3373)
==10259== 
==10259== 
==10259== 2 errors in context 2 of 2:
==10259== Conditional jump or move depends on uninitialised value(s)
==10259==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10259==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10259==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10259==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10259==    by 0x42D8E9: execcmd (exec.c:3378)
==10259==    by 0x428CA0: execpline2 (exec.c:1697)
==10259==    by 0x427FD2: execpline (exec.c:1484)
==10259==    by 0x42779A: execlist (exec.c:1275)
==10259==    by 0x42717C: execode (exec.c:1073)
==10259==    by 0x431299: runshfunc (exec.c:5040)
==10259==    by 0x430E76: doshfunc (exec.c:4920)
==10259==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10259== 
==10259== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10270== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10270-by-pythonnut-on-???
==10270== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10270-by-pythonnut-on-???
==10270== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10270-by-pythonnut-on-???
==10270== 
==10270== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10270== don't want to do, unless you know exactly what you're doing,
==10270== or are doing some strange experiment):
==10270==   /usr/lib/valgrind/../../bin/vgdb --pid=10270 ...command...
==10270== 
==10270== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10270==   /path/to/gdb ./zsh
==10270== and then give GDB the following command
==10270==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10270
==10270== --pid is optional if only one valgrind process is running
==10270== 
--10270-- Caught __NR_exit; running __libc_freeres()
==10266== Checked 4,766,904 bytes
==10266== 
--10270-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10266== LEAK SUMMARY:
==10266==    definitely lost: 2,197 bytes in 13 blocks
==10266==    indirectly lost: 6,756 bytes in 7 blocks
==10266==      possibly lost: 0 bytes in 0 blocks
==10266==    still reachable: 3,104,046 bytes in 68,954 blocks
==10266==         suppressed: 0 bytes in 0 blocks
==10266== Rerun with --leak-check=full to see details of leaked memory
==10266== 
==10266== Use --track-origins=yes to see where uninitialised values come from
==10266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10266== 
==10266== 1 errors in context 1 of 2:
==10266== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10266==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10266==    by 0x488CD0: stringsubst (subst.c:301)
==10266==    by 0x48801B: prefork (subst.c:77)
==10266==    by 0x42B318: execcmd (exec.c:2619)
==10266==    by 0x428CA0: execpline2 (exec.c:1697)
==10266==    by 0x427FD2: execpline (exec.c:1484)
==10266==    by 0x427756: execlist (exec.c:1267)
==10266==    by 0x42717C: execode (exec.c:1073)
==10266==    by 0x431299: runshfunc (exec.c:5040)
==10266==    by 0x430E76: doshfunc (exec.c:4920)
==10266==    by 0x4302FB: execshfunc (exec.c:4557)
==10266==    by 0x42D8C1: execcmd (exec.c:3373)
==10266== 
==10266== 
==10266== 2 errors in context 2 of 2:
==10266== Conditional jump or move depends on uninitialised value(s)
==10266==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10266==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10266==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10266==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10266==    by 0x42D8E9: execcmd (exec.c:3378)
==10266==    by 0x428CA0: execpline2 (exec.c:1697)
==10266==    by 0x427FD2: execpline (exec.c:1484)
==10266==    by 0x42779A: execlist (exec.c:1275)
==10266==    by 0x42717C: execode (exec.c:1073)
==10266==    by 0x431299: runshfunc (exec.c:5040)
==10266==    by 0x430E76: doshfunc (exec.c:4920)
==10266==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10266== 
==10266== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10268== Checked 4,840,240 bytes
==10268== 
==10270== 
==10270== HEAP SUMMARY:
==10270==     in use at exit: 3,115,185 bytes in 69,008 blocks
==10270==   total heap usage: 1,598,185 allocs, 1,529,177 frees, 129,190,143 bytes allocated
==10270== 
==10268== LEAK SUMMARY:
==10268==    definitely lost: 2,221 bytes in 14 blocks
==10268==    indirectly lost: 6,796 bytes in 9 blocks
==10268==      possibly lost: 0 bytes in 0 blocks
==10268==    still reachable: 3,128,619 bytes in 69,518 blocks
==10268==         suppressed: 0 bytes in 0 blocks
==10268== Rerun with --leak-check=full to see details of leaked memory
==10268== 
==10268== Use --track-origins=yes to see where uninitialised values come from
==10268== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10268== 
==10268== 1 errors in context 1 of 2:
==10268== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10268==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10268==    by 0x488CD0: stringsubst (subst.c:301)
==10268==    by 0x48801B: prefork (subst.c:77)
==10268==    by 0x42B318: execcmd (exec.c:2619)
==10268==    by 0x428CA0: execpline2 (exec.c:1697)
==10268==    by 0x427FD2: execpline (exec.c:1484)
==10268==    by 0x427756: execlist (exec.c:1267)
==10268==    by 0x42717C: execode (exec.c:1073)
==10268==    by 0x431299: runshfunc (exec.c:5040)
==10268==    by 0x430E76: doshfunc (exec.c:4920)
==10268==    by 0x4302FB: execshfunc (exec.c:4557)
==10268==    by 0x42D8C1: execcmd (exec.c:3373)
==10268== 
==10268== 
==10268== 2 errors in context 2 of 2:
==10268== Conditional jump or move depends on uninitialised value(s)
==10268==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10268==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10268==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10268==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10268==    by 0x42D8E9: execcmd (exec.c:3378)
==10268==    by 0x428CA0: execpline2 (exec.c:1697)
==10268==    by 0x427FD2: execpline (exec.c:1484)
==10268==    by 0x42779A: execlist (exec.c:1275)
==10268==    by 0x42717C: execode (exec.c:1073)
==10268==    by 0x431299: runshfunc (exec.c:5040)
==10268==    by 0x430E76: doshfunc (exec.c:4920)
==10268==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10268== 
==10268== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10267-- Caught __NR_exit; running __libc_freeres()
==10271== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10271-by-pythonnut-on-???
==10271== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10271-by-pythonnut-on-???
==10271== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10271-by-pythonnut-on-???
==10271== 
==10271== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10271== don't want to do, unless you know exactly what you're doing,
==10271== or are doing some strange experiment):
==10271==   /usr/lib/valgrind/../../bin/vgdb --pid=10271 ...command...
==10271== 
==10271== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10271==   /path/to/gdb ./zsh
==10271== and then give GDB the following command
==10271==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10271
==10271== --pid is optional if only one valgrind process is running
==10271== 
==10270== Searching for pointers to 69,008 not-freed blocks
--10270--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10270--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10270--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10270--   Scanning root segment: 0x4037000..0x403afff (16384)
--10270--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10270--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10270--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10270--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10270--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10270--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10270--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10270--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10270--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10270--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10270--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10270--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10270--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10270--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10270--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10270--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10270--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10270--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10270--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10270--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10270--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10270--   Scanning root segment: 0x701a000..0x701afff (4096)
--10270--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10270--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10270--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10270--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10270--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10270--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10270--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10270--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10270--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10270--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10271-- Caught __NR_exit; running __libc_freeres()
--10267-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10267== 
==10267== HEAP SUMMARY:
==10267==     in use at exit: 3,137,412 bytes in 69,538 blocks
==10267==   total heap usage: 1,595,235 allocs, 1,525,697 frees, 128,954,531 bytes allocated
==10267== 
--10271-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10271== 
==10271== HEAP SUMMARY:
==10271==     in use at exit: 3,113,027 bytes in 68,975 blocks
==10271==   total heap usage: 1,598,160 allocs, 1,529,185 frees, 129,078,031 bytes allocated
==10271== 
==10267== Searching for pointers to 69,538 not-freed blocks
--10267--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10267--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10267--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10267--   Scanning root segment: 0x4037000..0x403efff (32768)
--10267--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10267--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10267--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10267--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10267--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10267--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10267--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10267--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10267--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10267--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10267--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10267--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10267--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10267--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10267--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10267--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10267--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10267--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10267--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10267--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10267--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10267--   Scanning root segment: 0x701a000..0x701afff (4096)
--10267--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10267--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10267--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10267--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10267--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10267--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10267--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10267--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10267--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10267--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10271== Searching for pointers to 68,975 not-freed blocks
--10271--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10271--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10271--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10271--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10271--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10271--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10271--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10271--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10271--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10271--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10271--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10271--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10271--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10271--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10271--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10271--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10271--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10271--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10271--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10271--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10271--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10271--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10271--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10271--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10271--   Scanning root segment: 0x701a000..0x701afff (4096)
--10271--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10271--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10271--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10271--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10271--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10271--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10271--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10271--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10271--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10271--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10270== Checked 4,790,344 bytes
==10270== 
==10270== LEAK SUMMARY:
==10270==    definitely lost: 2,197 bytes in 13 blocks
==10270==    indirectly lost: 6,756 bytes in 7 blocks
==10270==      possibly lost: 0 bytes in 0 blocks
==10270==    still reachable: 3,106,232 bytes in 68,988 blocks
==10270==         suppressed: 0 bytes in 0 blocks
==10270== Rerun with --leak-check=full to see details of leaked memory
==10270== 
==10270== Use --track-origins=yes to see where uninitialised values come from
==10270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10270== 
==10270== 1 errors in context 1 of 2:
==10270== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10270==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10270==    by 0x488CD0: stringsubst (subst.c:301)
==10270==    by 0x48801B: prefork (subst.c:77)
==10270==    by 0x42B318: execcmd (exec.c:2619)
==10270==    by 0x428CA0: execpline2 (exec.c:1697)
==10270==    by 0x427FD2: execpline (exec.c:1484)
==10270==    by 0x427756: execlist (exec.c:1267)
==10270==    by 0x42717C: execode (exec.c:1073)
==10270==    by 0x431299: runshfunc (exec.c:5040)
==10270==    by 0x430E76: doshfunc (exec.c:4920)
==10270==    by 0x4302FB: execshfunc (exec.c:4557)
==10270==    by 0x42D8C1: execcmd (exec.c:3373)
==10270== 
==10270== 
==10270== 2 errors in context 2 of 2:
==10270== Conditional jump or move depends on uninitialised value(s)
==10270==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10270==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10270==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10270==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10270==    by 0x42D8E9: execcmd (exec.c:3378)
==10270==    by 0x428CA0: execpline2 (exec.c:1697)
==10270==    by 0x427FD2: execpline (exec.c:1484)
==10270==    by 0x42779A: execlist (exec.c:1275)
==10270==    by 0x42717C: execode (exec.c:1073)
==10270==    by 0x431299: runshfunc (exec.c:5040)
==10270==    by 0x430E76: doshfunc (exec.c:4920)
==10270==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10270== 
==10270== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10272-by-pythonnut-on-???
==10272== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10272-by-pythonnut-on-???
==10272== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10272-by-pythonnut-on-???
==10272== 
==10272== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10272== don't want to do, unless you know exactly what you're doing,
==10272== or are doing some strange experiment):
==10272==   /usr/lib/valgrind/../../bin/vgdb --pid=10272 ...command...
==10272== 
==10272== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10272==   /path/to/gdb ./zsh
==10272== and then give GDB the following command
==10272==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10272
==10272== --pid is optional if only one valgrind process is running
==10272== 
--10272-- Caught __NR_exit; running __libc_freeres()
==10267== Checked 4,839,384 bytes
==10267== 
--10272-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10271== Checked 4,766,424 bytes
==10271== 
==10267== LEAK SUMMARY:
==10272== 
==10267==    definitely lost: 2,221 bytes in 14 blocks
==10267==    indirectly lost: 6,796 bytes in 9 blocks
==10267==      possibly lost: 0 bytes in 0 blocks
==10267==    still reachable: 3,128,395 bytes in 69,515 blocks
==10267==         suppressed: 0 bytes in 0 blocks
==10267== Rerun with --leak-check=full to see details of leaked memory
==10267== 
==10267== Use --track-origins=yes to see where uninitialised values come from
==10267== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10267== 
==10267== 1 errors in context 1 of 2:
==10267== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10267==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10267==    by 0x488CD0: stringsubst (subst.c:301)
==10267==    by 0x48801B: prefork (subst.c:77)
==10267==    by 0x42B318: execcmd (exec.c:2619)
==10267==    by 0x428CA0: execpline2 (exec.c:1697)
==10267==    by 0x427FD2: execpline (exec.c:1484)
==10267==    by 0x427756: execlist (exec.c:1267)
==10267==    by 0x42717C: execode (exec.c:1073)
==10267==    by 0x431299: runshfunc (exec.c:5040)
==10267==    by 0x430E76: doshfunc (exec.c:4920)
==10267==    by 0x4302FB: execshfunc (exec.c:4557)
==10267==    by 0x42D8C1: execcmd (exec.c:3373)
==10267== 
==10267== 
==10267== 2 errors in context 2 of 2:
==10267== Conditional jump or move depends on uninitialised value(s)
==10267==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10267==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10267==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10267==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10267==    by 0x42D8E9: execcmd (exec.c:3378)
==10267==    by 0x428CA0: execpline2 (exec.c:1697)
==10267==    by 0x427FD2: execpline (exec.c:1484)
==10267==    by 0x42779A: execlist (exec.c:1275)
==10267==    by 0x42717C: execode (exec.c:1073)
==10267==    by 0x431299: runshfunc (exec.c:5040)
==10267==    by 0x430E76: doshfunc (exec.c:4920)
==10267==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10267== 
==10267== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== HEAP SUMMARY:
==10272==     in use at exit: 3,115,184 bytes in 69,008 blocks
==10272==   total heap usage: 1,598,190 allocs, 1,529,182 frees, 129,192,256 bytes allocated
==10272== 
--10123-- Caught __NR_exit; running __libc_freeres()
==10271== LEAK SUMMARY:
==10271==    definitely lost: 2,197 bytes in 13 blocks
==10271==    indirectly lost: 6,756 bytes in 7 blocks
==10271==      possibly lost: 0 bytes in 0 blocks
==10271==    still reachable: 3,104,074 bytes in 68,955 blocks
==10271==         suppressed: 0 bytes in 0 blocks
==10271== Rerun with --leak-check=full to see details of leaked memory
==10271== 
==10271== Use --track-origins=yes to see where uninitialised values come from
==10271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10271== 
==10271== 1 errors in context 1 of 2:
==10271== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10271==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10271==    by 0x488CD0: stringsubst (subst.c:301)
==10271==    by 0x48801B: prefork (subst.c:77)
==10271==    by 0x42B318: execcmd (exec.c:2619)
==10271==    by 0x428CA0: execpline2 (exec.c:1697)
==10271==    by 0x427FD2: execpline (exec.c:1484)
==10271==    by 0x427756: execlist (exec.c:1267)
==10271==    by 0x42717C: execode (exec.c:1073)
==10271==    by 0x431299: runshfunc (exec.c:5040)
==10271==    by 0x430E76: doshfunc (exec.c:4920)
==10271==    by 0x4302FB: execshfunc (exec.c:4557)
==10271==    by 0x42D8C1: execcmd (exec.c:3373)
==10271== 
==10271== 
==10271== 2 errors in context 2 of 2:
==10271== Conditional jump or move depends on uninitialised value(s)
==10271==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10271==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10271==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10271==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10271==    by 0x42D8E9: execcmd (exec.c:3378)
==10271==    by 0x428CA0: execpline2 (exec.c:1697)
==10271==    by 0x427FD2: execpline (exec.c:1484)
==10271==    by 0x42779A: execlist (exec.c:1275)
==10271==    by 0x42717C: execode (exec.c:1073)
==10271==    by 0x431299: runshfunc (exec.c:5040)
==10271==    by 0x430E76: doshfunc (exec.c:4920)
==10271==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10271== 
==10271== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== Searching for pointers to 69,008 not-freed blocks
--10272--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10272--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10272--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10272--   Scanning root segment: 0x4037000..0x403afff (16384)
--10272--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10272--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10272--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10272--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10272--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10272--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10272--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10272--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10272--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10272--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10272--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10272--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10272--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10272--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10272--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10272--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10272--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10272--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10272--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10272--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10272--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10272--   Scanning root segment: 0x701a000..0x701afff (4096)
--10272--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10272--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10272--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10272--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10272--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10272--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10272--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10272--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10272--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10272--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10273== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10273-by-pythonnut-on-???
==10273== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10273-by-pythonnut-on-???
==10273== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10273-by-pythonnut-on-???
==10273== 
==10273== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10273== don't want to do, unless you know exactly what you're doing,
==10273== or are doing some strange experiment):
==10273==   /usr/lib/valgrind/../../bin/vgdb --pid=10273 ...command...
==10273== 
==10273== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10273==   /path/to/gdb ./zsh
==10273== and then give GDB the following command
==10273==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10273
==10273== --pid is optional if only one valgrind process is running
==10273== 
--10123-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10273-- Caught __NR_exit; running __libc_freeres()
==10123== 
==10123== HEAP SUMMARY:
==10123==     in use at exit: 3,133,478 bytes in 69,401 blocks
==10123==   total heap usage: 1,595,176 allocs, 1,525,775 frees, 128,954,929 bytes allocated
==10123== 
--10273-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10273== 
==10273== HEAP SUMMARY:
==10273==     in use at exit: 3,111,547 bytes in 68,915 blocks
==10273==   total heap usage: 1,598,130 allocs, 1,529,215 frees, 129,081,019 bytes allocated
==10273== 
==10123== Searching for pointers to 69,401 not-freed blocks
--10123--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10123--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10123--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10123--   Scanning root segment: 0x4037000..0x403afff (16384)
--10123--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10123--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10123--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10123--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10123--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10123--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10123--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10123--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10123--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10123--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10123--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10123--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10123--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10123--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10123--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10123--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10123--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10123--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10123--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10123--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10123--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10123--   Scanning root segment: 0x701a000..0x701afff (4096)
--10123--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10123--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10123--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10123--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10123--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10123--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10123--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10123--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10123--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10123--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10273== Searching for pointers to 68,915 not-freed blocks
--10273--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10273--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10273--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10273--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10273--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10273--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10273--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10273--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10273--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10273--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10273--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10273--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10273--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10273--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10273--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10273--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10273--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10273--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10273--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10273--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10273--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10273--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10273--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10273--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10273--   Scanning root segment: 0x701a000..0x701afff (4096)
--10273--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10273--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10273--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10273--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10273--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10273--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10273--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10273--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10273--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10273--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10272== Checked 4,790,344 bytes
==10272== 
==10272== LEAK SUMMARY:
==10272==    definitely lost: 2,197 bytes in 13 blocks
==10272==    indirectly lost: 6,756 bytes in 7 blocks
==10272==      possibly lost: 0 bytes in 0 blocks
==10272==    still reachable: 3,106,231 bytes in 68,988 blocks
==10272==         suppressed: 0 bytes in 0 blocks
==10272== Rerun with --leak-check=full to see details of leaked memory
==10272== 
==10272== Use --track-origins=yes to see where uninitialised values come from
==10272== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10272== 
==10272== 1 errors in context 1 of 2:
==10272== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10272==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10272==    by 0x488CD0: stringsubst (subst.c:301)
==10272==    by 0x48801B: prefork (subst.c:77)
==10272==    by 0x42B318: execcmd (exec.c:2619)
==10272==    by 0x428CA0: execpline2 (exec.c:1697)
==10272==    by 0x427FD2: execpline (exec.c:1484)
==10272==    by 0x427756: execlist (exec.c:1267)
==10272==    by 0x42717C: execode (exec.c:1073)
==10272==    by 0x431299: runshfunc (exec.c:5040)
==10272==    by 0x430E76: doshfunc (exec.c:4920)
==10272==    by 0x4302FB: execshfunc (exec.c:4557)
==10272==    by 0x42D8C1: execcmd (exec.c:3373)
==10272== 
==10272== 
==10272== 2 errors in context 2 of 2:
==10272== Conditional jump or move depends on uninitialised value(s)
==10272==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10272==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10272==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10272==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10272==    by 0x42D8E9: execcmd (exec.c:3378)
==10272==    by 0x428CA0: execpline2 (exec.c:1697)
==10272==    by 0x427FD2: execpline (exec.c:1484)
==10272==    by 0x42779A: execlist (exec.c:1275)
==10272==    by 0x42717C: execode (exec.c:1073)
==10272==    by 0x431299: runshfunc (exec.c:5040)
==10272==    by 0x430E76: doshfunc (exec.c:4920)
==10272==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10272== 
==10272== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10274-by-pythonnut-on-???
==10274== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10274-by-pythonnut-on-???
==10274== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10274-by-pythonnut-on-???
==10274== 
==10274== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10274== don't want to do, unless you know exactly what you're doing,
==10274== or are doing some strange experiment):
==10274==   /usr/lib/valgrind/../../bin/vgdb --pid=10274 ...command...
==10274== 
==10274== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10274==   /path/to/gdb ./zsh
==10274== and then give GDB the following command
==10274==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10274
==10274== --pid is optional if only one valgrind process is running
==10274== 
--10274-- Caught __NR_exit; running __libc_freeres()
==10123== Checked 4,816,336 bytes
==10123== 
--10274-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10273== Checked 4,765,880 bytes
==10273== 
==10123== LEAK SUMMARY:
==10123==    definitely lost: 2,221 bytes in 14 blocks
==10123==    indirectly lost: 6,796 bytes in 9 blocks
==10123==      possibly lost: 0 bytes in 0 blocks
==10123==    still reachable: 3,124,461 bytes in 69,378 blocks
==10123==         suppressed: 0 bytes in 0 blocks
==10123== Rerun with --leak-check=full to see details of leaked memory
==10123== 
==10123== Use --track-origins=yes to see where uninitialised values come from
==10123== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10123== 
==10123== 1 errors in context 1 of 2:
==10123== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10123==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10123==    by 0x488CD0: stringsubst (subst.c:301)
==10123==    by 0x48801B: prefork (subst.c:77)
==10123==    by 0x42B318: execcmd (exec.c:2619)
==10123==    by 0x428CA0: execpline2 (exec.c:1697)
==10123==    by 0x427FD2: execpline (exec.c:1484)
==10123==    by 0x427756: execlist (exec.c:1267)
==10123==    by 0x42717C: execode (exec.c:1073)
==10123==    by 0x431299: runshfunc (exec.c:5040)
==10123==    by 0x430E76: doshfunc (exec.c:4920)
==10123==    by 0x4302FB: execshfunc (exec.c:4557)
==10123==    by 0x42D8C1: execcmd (exec.c:3373)
==10123== 
==10123== 
==10123== 2 errors in context 2 of 2:
==10123== Conditional jump or move depends on uninitialised value(s)
==10123==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10123==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10123==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10123==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10123==    by 0x42D8E9: execcmd (exec.c:3378)
==10123==    by 0x428CA0: execpline2 (exec.c:1697)
==10123==    by 0x427FD2: execpline (exec.c:1484)
==10123==    by 0x42779A: execlist (exec.c:1275)
==10123==    by 0x42717C: execode (exec.c:1073)
==10123==    by 0x431299: runshfunc (exec.c:5040)
==10123==    by 0x430E76: doshfunc (exec.c:4920)
==10123==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10123== 
==10123== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== 
==10274== HEAP SUMMARY:
==10274==     in use at exit: 3,115,183 bytes in 69,008 blocks
==10274==   total heap usage: 1,598,195 allocs, 1,529,187 frees, 129,194,369 bytes allocated
==10274== 
==10273== LEAK SUMMARY:
==10273==    definitely lost: 2,197 bytes in 13 blocks
==10273==    indirectly lost: 6,756 bytes in 7 blocks
==10273==      possibly lost: 0 bytes in 0 blocks
==10273==    still reachable: 3,102,594 bytes in 68,895 blocks
==10273==         suppressed: 0 bytes in 0 blocks
==10273== Rerun with --leak-check=full to see details of leaked memory
==10273== 
==10273== Use --track-origins=yes to see where uninitialised values come from
==10273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10273== 
==10273== 1 errors in context 1 of 2:
==10273== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10273==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10273==    by 0x488CD0: stringsubst (subst.c:301)
==10273==    by 0x48801B: prefork (subst.c:77)
==10273==    by 0x42B318: execcmd (exec.c:2619)
==10273==    by 0x428CA0: execpline2 (exec.c:1697)
==10273==    by 0x427FD2: execpline (exec.c:1484)
==10273==    by 0x427756: execlist (exec.c:1267)
==10273==    by 0x42717C: execode (exec.c:1073)
==10273==    by 0x431299: runshfunc (exec.c:5040)
==10273==    by 0x430E76: doshfunc (exec.c:4920)
==10273==    by 0x4302FB: execshfunc (exec.c:4557)
==10273==    by 0x42D8C1: execcmd (exec.c:3373)
==10273== 
==10273== 
==10273== 2 errors in context 2 of 2:
==10273== Conditional jump or move depends on uninitialised value(s)
==10273==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10273==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10273==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10273==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10273==    by 0x42D8E9: execcmd (exec.c:3378)
==10273==    by 0x428CA0: execpline2 (exec.c:1697)
==10273==    by 0x427FD2: execpline (exec.c:1484)
==10273==    by 0x42779A: execlist (exec.c:1275)
==10273==    by 0x42717C: execode (exec.c:1073)
==10273==    by 0x431299: runshfunc (exec.c:5040)
==10273==    by 0x430E76: doshfunc (exec.c:4920)
==10273==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10273== 
==10273== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10275== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10275-by-pythonnut-on-???
==10275== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10275-by-pythonnut-on-???
==10275== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10275-by-pythonnut-on-???
==10275== 
==10275== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10275== don't want to do, unless you know exactly what you're doing,
==10275== or are doing some strange experiment):
==10275==   /usr/lib/valgrind/../../bin/vgdb --pid=10275 ...command...
==10275== 
==10275== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10275==   /path/to/gdb ./zsh
==10275== and then give GDB the following command
==10275==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10275
==10275== --pid is optional if only one valgrind process is running
==10275== 
==10274== Searching for pointers to 69,008 not-freed blocks
--10274--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10274--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10274--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10274--   Scanning root segment: 0x4037000..0x403afff (16384)
--10274--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10274--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10274--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10274--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10274--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10274--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10274--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10274--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10274--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10274--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10274--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10274--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10274--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10274--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10274--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10274--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10274--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10274--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10274--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10274--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10274--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10274--   Scanning root segment: 0x701a000..0x701afff (4096)
--10274--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10274--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10274--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10274--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10274--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10274--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10274--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10274--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10274--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10274--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFE8AAC,  len 4
==10277== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10277-by-pythonnut-on-???
==10277== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10277-by-pythonnut-on-???
==10277== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10277-by-pythonnut-on-???
==10277== 
==10277== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10277== don't want to do, unless you know exactly what you're doing,
==10277== or are doing some strange experiment):
==10277==   /usr/lib/valgrind/../../bin/vgdb --pid=10277 ...command...
==10277== 
==10277== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10277==   /path/to/gdb ./zsh
==10277== and then give GDB the following command
==10277==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10277
==10277== --pid is optional if only one valgrind process is running
==10277== 
--10276-- Caught __NR_exit; running __libc_freeres()
==10276== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10276-by-pythonnut-on-???
==10276== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10276-by-pythonnut-on-???
==10276== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10276-by-pythonnut-on-???
==10276== 
==10276== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10276== don't want to do, unless you know exactly what you're doing,
==10276== or are doing some strange experiment):
==10276==   /usr/lib/valgrind/../../bin/vgdb --pid=10276 ...command...
==10276== 
==10276== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10276==   /path/to/gdb ./zsh
==10276== and then give GDB the following command
==10276==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10276
==10276== --pid is optional if only one valgrind process is running
==10276== 
--10276-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10279-- Caught __NR_exit; running __libc_freeres()
==10276== 
==10279== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10279-by-pythonnut-on-???
==10279== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10279-by-pythonnut-on-???
==10279== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10279-by-pythonnut-on-???
==10279== 
==10279== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10279== don't want to do, unless you know exactly what you're doing,
==10279== or are doing some strange experiment):
==10279==   /usr/lib/valgrind/../../bin/vgdb --pid=10279 ...command...
==10279== 
==10279== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10279==   /path/to/gdb ./zsh
==10279== and then give GDB the following command
==10279==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10279
==10279== --pid is optional if only one valgrind process is running
==10279== 
==10276== HEAP SUMMARY:
==10276==     in use at exit: 3,135,430 bytes in 69,472 blocks
==10276==   total heap usage: 1,595,060 allocs, 1,525,588 frees, 128,911,104 bytes allocated
==10276== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--10279-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10279== 
==10276== Searching for pointers to 69,472 not-freed blocks
--10276--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10276--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==10279== HEAP SUMMARY:
==10279==     in use at exit: 3,123,779 bytes in 69,155 blocks
==10279==   total heap usage: 1,598,522 allocs, 1,529,367 frees, 129,113,456 bytes allocated
==10279== 
--10276--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10276--   Scanning root segment: 0x4037000..0x403afff (16384)
--10276--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10276--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10276--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10276--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10276--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10276--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10276--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10276--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10276--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10276--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10276--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10276--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10276--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10276--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10276--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10276--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10276--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10276--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10276--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10276--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10276--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10276--   Scanning root segment: 0x701a000..0x701afff (4096)
--10276--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10276--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10276--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10276--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10276--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10276--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10276--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10276--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10276--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10276--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10274== Checked 4,790,344 bytes
==10274== 
==10279== Searching for pointers to 69,155 not-freed blocks
--10279--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10279--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10279--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10279--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10279--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10279--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10279--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10279--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10279--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10279--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10279--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10279--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10279--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10279--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10279--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10279--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10279--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10279--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10279--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10279--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10279--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10279--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10279--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10279--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10279--   Scanning root segment: 0x701a000..0x701afff (4096)
--10279--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10279--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10279--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10279--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10279--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10279--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10279--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10279--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10279--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10279--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10274== LEAK SUMMARY:
==10274==    definitely lost: 2,197 bytes in 13 blocks
==10274==    indirectly lost: 6,756 bytes in 7 blocks
==10274==      possibly lost: 0 bytes in 0 blocks
==10274==    still reachable: 3,106,230 bytes in 68,988 blocks
==10274==         suppressed: 0 bytes in 0 blocks
==10274== Rerun with --leak-check=full to see details of leaked memory
==10274== 
==10274== Use --track-origins=yes to see where uninitialised values come from
==10274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10274== 
==10274== 1 errors in context 1 of 2:
==10274== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10274==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10274==    by 0x488CD0: stringsubst (subst.c:301)
==10274==    by 0x48801B: prefork (subst.c:77)
==10274==    by 0x42B318: execcmd (exec.c:2619)
==10274==    by 0x428CA0: execpline2 (exec.c:1697)
==10274==    by 0x427FD2: execpline (exec.c:1484)
==10274==    by 0x427756: execlist (exec.c:1267)
==10274==    by 0x42717C: execode (exec.c:1073)
==10274==    by 0x431299: runshfunc (exec.c:5040)
==10274==    by 0x430E76: doshfunc (exec.c:4920)
==10274==    by 0x4302FB: execshfunc (exec.c:4557)
==10274==    by 0x42D8C1: execcmd (exec.c:3373)
==10274== 
==10274== 
==10274== 2 errors in context 2 of 2:
==10274== Conditional jump or move depends on uninitialised value(s)
==10274==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10274==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10274==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10274==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10274==    by 0x42D8E9: execcmd (exec.c:3378)
==10274==    by 0x428CA0: execpline2 (exec.c:1697)
==10274==    by 0x427FD2: execpline (exec.c:1484)
==10274==    by 0x42779A: execlist (exec.c:1275)
==10274==    by 0x42717C: execode (exec.c:1073)
==10274==    by 0x431299: runshfunc (exec.c:5040)
==10274==    by 0x430E76: doshfunc (exec.c:4920)
==10274==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10274== 
==10274== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10281== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10281-by-pythonnut-on-???
==10281== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10281-by-pythonnut-on-???
==10281== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10281-by-pythonnut-on-???
==10281== 
==10281== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10281== don't want to do, unless you know exactly what you're doing,
==10281== or are doing some strange experiment):
==10281==   /usr/lib/valgrind/../../bin/vgdb --pid=10281 ...command...
==10281== 
==10281== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10281==   /path/to/gdb ./zsh
==10281== and then give GDB the following command
==10281==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10281
==10281== --pid is optional if only one valgrind process is running
==10281== 
--10281-- Caught __NR_exit; running __libc_freeres()
--10281-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10281== 
==10281== HEAP SUMMARY:
==10281==     in use at exit: 3,115,182 bytes in 69,008 blocks
==10281==   total heap usage: 1,598,200 allocs, 1,529,192 frees, 129,196,482 bytes allocated
==10281== 
==10276== Checked 4,820,104 bytes
==10276== 
==10281== Searching for pointers to 69,008 not-freed blocks
--10281--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10281--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10281--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10281--   Scanning root segment: 0x4037000..0x403afff (16384)
--10281--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10281--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10281--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10281--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10281--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10281--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10281--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10281--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10281--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10281--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10281--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10281--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10281--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10281--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10281--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10281--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10281--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10281--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10281--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10281--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10281--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10281--   Scanning root segment: 0x701a000..0x701afff (4096)
--10281--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10281--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10281--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10281--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10281--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10281--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10281--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10281--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10281--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10281--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10276== LEAK SUMMARY:
==10276==    definitely lost: 2,221 bytes in 14 blocks
==10276==    indirectly lost: 6,796 bytes in 9 blocks
==10276==      possibly lost: 0 bytes in 0 blocks
==10276==    still reachable: 3,126,413 bytes in 69,449 blocks
==10276==         suppressed: 0 bytes in 0 blocks
==10276== Rerun with --leak-check=full to see details of leaked memory
==10276== 
==10276== Use --track-origins=yes to see where uninitialised values come from
==10276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10276== 
==10276== 1 errors in context 1 of 2:
==10276== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10276==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10276==    by 0x488CD0: stringsubst (subst.c:301)
==10276==    by 0x48801B: prefork (subst.c:77)
==10276==    by 0x42B318: execcmd (exec.c:2619)
==10276==    by 0x428CA0: execpline2 (exec.c:1697)
==10276==    by 0x427FD2: execpline (exec.c:1484)
==10276==    by 0x427756: execlist (exec.c:1267)
==10276==    by 0x42717C: execode (exec.c:1073)
==10276==    by 0x431299: runshfunc (exec.c:5040)
==10276==    by 0x430E76: doshfunc (exec.c:4920)
==10276==    by 0x4302FB: execshfunc (exec.c:4557)
==10276==    by 0x42D8C1: execcmd (exec.c:3373)
==10276== 
==10276== 
==10276== 2 errors in context 2 of 2:
==10276== Conditional jump or move depends on uninitialised value(s)
==10276==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10276==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10276==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10276==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10276==    by 0x42D8E9: execcmd (exec.c:3378)
==10276==    by 0x428CA0: execpline2 (exec.c:1697)
==10276==    by 0x427FD2: execpline (exec.c:1484)
==10276==    by 0x42779A: execlist (exec.c:1275)
==10276==    by 0x42717C: execode (exec.c:1073)
==10276==    by 0x431299: runshfunc (exec.c:5040)
==10276==    by 0x430E76: doshfunc (exec.c:4920)
==10276==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10276== 
==10276== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10279== Checked 4,785,128 bytes
==10279== 
==10279== LEAK SUMMARY:
==10279==    definitely lost: 2,197 bytes in 13 blocks
==10279==    indirectly lost: 6,756 bytes in 7 blocks
==10279==      possibly lost: 0 bytes in 0 blocks
==10279==    still reachable: 3,114,826 bytes in 69,135 blocks
==10279==         suppressed: 0 bytes in 0 blocks
==10279== Rerun with --leak-check=full to see details of leaked memory
==10279== 
==10279== Use --track-origins=yes to see where uninitialised values come from
==10279== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10279== 
==10279== 1 errors in context 1 of 2:
==10279== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10279==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10279==    by 0x488CD0: stringsubst (subst.c:301)
==10279==    by 0x48801B: prefork (subst.c:77)
==10279==    by 0x42B318: execcmd (exec.c:2619)
==10279==    by 0x428CA0: execpline2 (exec.c:1697)
==10279==    by 0x427FD2: execpline (exec.c:1484)
==10279==    by 0x427756: execlist (exec.c:1267)
==10279==    by 0x42717C: execode (exec.c:1073)
==10279==    by 0x431299: runshfunc (exec.c:5040)
==10279==    by 0x430E76: doshfunc (exec.c:4920)
==10279==    by 0x4302FB: execshfunc (exec.c:4557)
==10279==    by 0x42D8C1: execcmd (exec.c:3373)
==10279== 
==10279== 
==10279== 2 errors in context 2 of 2:
==10279== Conditional jump or move depends on uninitialised value(s)
==10279==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10279==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10279==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10279==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10279==    by 0x42D8E9: execcmd (exec.c:3378)
==10279==    by 0x428CA0: execpline2 (exec.c:1697)
==10279==    by 0x427FD2: execpline (exec.c:1484)
==10279==    by 0x42779A: execlist (exec.c:1275)
==10279==    by 0x42717C: execode (exec.c:1073)
==10279==    by 0x431299: runshfunc (exec.c:5040)
==10279==    by 0x430E76: doshfunc (exec.c:4920)
==10279==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10279== 
==10279== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE8F5C,  len 4
--10278-- Caught __NR_exit; running __libc_freeres()
==10278== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10278-by-pythonnut-on-???
==10278== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10278-by-pythonnut-on-???
==10278== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10278-by-pythonnut-on-???
==10278== 
==10278== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10278== don't want to do, unless you know exactly what you're doing,
==10278== or are doing some strange experiment):
==10278==   /usr/lib/valgrind/../../bin/vgdb --pid=10278 ...command...
==10278== 
==10278== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10278==   /path/to/gdb ./zsh
==10278== and then give GDB the following command
==10278==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10278
==10278== --pid is optional if only one valgrind process is running
==10278== 
--10278-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10278== 
==10278== HEAP SUMMARY:
==10278==     in use at exit: 3,123,715 bytes in 69,152 blocks
==10278==   total heap usage: 1,598,520 allocs, 1,529,368 frees, 129,113,215 bytes allocated
==10278== 
==10278== Searching for pointers to 69,152 not-freed blocks
--10278--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10278--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10278--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10278--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10278--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10278--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10278--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10278--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10278--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10278--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10278--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10278--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10278--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10278--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10278--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10278--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10278--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10278--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10278--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10278--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10278--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10278--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10278--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10278--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10278--   Scanning root segment: 0x701a000..0x701afff (4096)
--10278--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10278--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10278--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10278--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10278--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10278--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10278--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10278--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10278--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10278--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10281== Checked 4,790,344 bytes
==10281== 
==10281== LEAK SUMMARY:
==10281==    definitely lost: 2,197 bytes in 13 blocks
==10281==    indirectly lost: 6,756 bytes in 7 blocks
==10281==      possibly lost: 0 bytes in 0 blocks
==10281==    still reachable: 3,106,229 bytes in 68,988 blocks
==10281==         suppressed: 0 bytes in 0 blocks
==10281== Rerun with --leak-check=full to see details of leaked memory
==10281== 
==10281== Use --track-origins=yes to see where uninitialised values come from
==10281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10281== 
==10281== 1 errors in context 1 of 2:
==10281== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10281==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10281==    by 0x488CD0: stringsubst (subst.c:301)
==10281==    by 0x48801B: prefork (subst.c:77)
==10281==    by 0x42B318: execcmd (exec.c:2619)
==10281==    by 0x428CA0: execpline2 (exec.c:1697)
==10281==    by 0x427FD2: execpline (exec.c:1484)
==10281==    by 0x427756: execlist (exec.c:1267)
==10281==    by 0x42717C: execode (exec.c:1073)
==10281==    by 0x431299: runshfunc (exec.c:5040)
==10281==    by 0x430E76: doshfunc (exec.c:4920)
==10281==    by 0x4302FB: execshfunc (exec.c:4557)
==10281==    by 0x42D8C1: execcmd (exec.c:3373)
==10281== 
==10281== 
==10281== 2 errors in context 2 of 2:
==10281== Conditional jump or move depends on uninitialised value(s)
==10281==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10281==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10281==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10281==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10281==    by 0x42D8E9: execcmd (exec.c:3378)
==10281==    by 0x428CA0: execpline2 (exec.c:1697)
==10281==    by 0x427FD2: execpline (exec.c:1484)
==10281==    by 0x42779A: execlist (exec.c:1275)
==10281==    by 0x42717C: execode (exec.c:1073)
==10281==    by 0x431299: runshfunc (exec.c:5040)
==10281==    by 0x430E76: doshfunc (exec.c:4920)
==10281==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10281== 
==10281== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10328-by-pythonnut-on-???
==10328== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10328-by-pythonnut-on-???
==10328== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10328-by-pythonnut-on-???
==10328== 
==10328== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10328== don't want to do, unless you know exactly what you're doing,
==10328== or are doing some strange experiment):
==10328==   /usr/lib/valgrind/../../bin/vgdb --pid=10328 ...command...
==10328== 
==10328== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10328==   /path/to/gdb ./zsh
==10328== and then give GDB the following command
==10328==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10328
==10328== --pid is optional if only one valgrind process is running
==10328== 
--10328-- Caught __NR_exit; running __libc_freeres()
--10282-- Caught __NR_exit; running __libc_freeres()
==10282== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10282-by-pythonnut-on-???
==10282== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10282-by-pythonnut-on-???
==10282== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10282-by-pythonnut-on-???
==10282== 
==10282== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10282== don't want to do, unless you know exactly what you're doing,
==10282== or are doing some strange experiment):
==10282==   /usr/lib/valgrind/../../bin/vgdb --pid=10282 ...command...
==10282== 
==10282== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10282==   /path/to/gdb ./zsh
==10282== and then give GDB the following command
==10282==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10282
==10282== --pid is optional if only one valgrind process is running
==10282== 
--10328-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10328== 
==10278== Checked 4,784,448 bytes
==10278== 
==10328== HEAP SUMMARY:
==10328==     in use at exit: 3,115,181 bytes in 69,008 blocks
==10328==   total heap usage: 1,598,205 allocs, 1,529,197 frees, 129,198,595 bytes allocated
==10328== 
--10282-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10282== 
==10282== HEAP SUMMARY:
==10282==     in use at exit: 3,135,707 bytes in 69,477 blocks
==10282==   total heap usage: 1,595,073 allocs, 1,525,596 frees, 128,915,101 bytes allocated
==10282== 
==10278== LEAK SUMMARY:
==10278==    definitely lost: 2,197 bytes in 13 blocks
==10278==    indirectly lost: 6,756 bytes in 7 blocks
==10278==      possibly lost: 0 bytes in 0 blocks
==10278==    still reachable: 3,114,762 bytes in 69,132 blocks
==10278==         suppressed: 0 bytes in 0 blocks
==10278== Rerun with --leak-check=full to see details of leaked memory
==10278== 
==10278== Use --track-origins=yes to see where uninitialised values come from
==10278== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10278== 
==10278== 1 errors in context 1 of 2:
==10278== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10278==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10278==    by 0x488CD0: stringsubst (subst.c:301)
==10278==    by 0x48801B: prefork (subst.c:77)
==10278==    by 0x42B318: execcmd (exec.c:2619)
==10278==    by 0x428CA0: execpline2 (exec.c:1697)
==10278==    by 0x427FD2: execpline (exec.c:1484)
==10278==    by 0x427756: execlist (exec.c:1267)
==10278==    by 0x42717C: execode (exec.c:1073)
==10278==    by 0x431299: runshfunc (exec.c:5040)
==10278==    by 0x430E76: doshfunc (exec.c:4920)
==10278==    by 0x4302FB: execshfunc (exec.c:4557)
==10278==    by 0x42D8C1: execcmd (exec.c:3373)
==10278== 
==10278== 
==10278== 2 errors in context 2 of 2:
==10278== Conditional jump or move depends on uninitialised value(s)
==10278==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10278==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10278==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10278==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10278==    by 0x42D8E9: execcmd (exec.c:3378)
==10278==    by 0x428CA0: execpline2 (exec.c:1697)
==10278==    by 0x427FD2: execpline (exec.c:1484)
==10278==    by 0x42779A: execlist (exec.c:1275)
==10278==    by 0x42717C: execode (exec.c:1073)
==10278==    by 0x431299: runshfunc (exec.c:5040)
==10278==    by 0x430E76: doshfunc (exec.c:4920)
==10278==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10278== 
==10278== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== Searching for pointers to 69,008 not-freed blocks
--10328--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10328--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10328--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10328--   Scanning root segment: 0x4037000..0x403afff (16384)
--10328--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10328--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10328--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10328--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10328--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10328--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10328--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10328--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10328--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10328--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10328--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10328--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10328--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10328--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10328--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10328--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10328--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10328--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10328--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10328--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10328--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10328--   Scanning root segment: 0x701a000..0x701afff (4096)
--10328--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10328--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10328--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10328--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10328--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10328--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10328--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10328--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10328--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10328--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10282== Searching for pointers to 69,477 not-freed blocks
--10282--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10282--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10282--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10282--   Scanning root segment: 0x4037000..0x403efff (32768)
--10282--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10282--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10282--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10282--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10282--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10282--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10282--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10282--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10282--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10282--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10282--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10282--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10282--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10282--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10282--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10282--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10282--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10333-- Caught __NR_exit; running __libc_freeres()
--10282--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10282--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10282--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10282--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10282--   Scanning root segment: 0x701a000..0x701afff (4096)
--10282--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10282--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10282--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10282--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10282--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10282--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10282--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10282--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10282--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10282--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10333== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10333-by-pythonnut-on-???
==10333== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10333-by-pythonnut-on-???
==10333== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10333-by-pythonnut-on-???
==10333== 
==10333== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10333== don't want to do, unless you know exactly what you're doing,
==10333== or are doing some strange experiment):
==10333==   /usr/lib/valgrind/../../bin/vgdb --pid=10333 ...command...
==10333== 
==10333== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10333==   /path/to/gdb ./zsh
==10333== and then give GDB the following command
==10333==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10333
==10333== --pid is optional if only one valgrind process is running
==10333== 
--10333-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10333== 
==10333== HEAP SUMMARY:
==10333==     in use at exit: 3,123,722 bytes in 69,152 blocks
==10333==   total heap usage: 1,598,535 allocs, 1,529,383 frees, 129,118,213 bytes allocated
==10333== 
==10333== Searching for pointers to 69,152 not-freed blocks
--10333--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10333--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10333--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10333--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10333--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10333--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10333--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10333--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10333--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10333--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10333--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10333--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10333--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10333--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10333--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10333--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10333--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10333--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10333--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10333--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10333--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10333--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10333--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10333--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10333--   Scanning root segment: 0x701a000..0x701afff (4096)
--10333--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10333--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10333--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10333--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10333--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10333--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10333--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10333--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10333--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10333--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10328== Checked 4,790,344 bytes
==10328== 
==10282== Checked 4,836,472 bytes
==10282== 
==10328== LEAK SUMMARY:
==10328==    definitely lost: 2,197 bytes in 13 blocks
==10328==    indirectly lost: 6,756 bytes in 7 blocks
==10328==      possibly lost: 0 bytes in 0 blocks
==10328==    still reachable: 3,106,228 bytes in 68,988 blocks
==10328==         suppressed: 0 bytes in 0 blocks
==10328== Rerun with --leak-check=full to see details of leaked memory
==10328== 
==10328== Use --track-origins=yes to see where uninitialised values come from
==10328== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10328== 
==10328== 1 errors in context 1 of 2:
==10328== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10328==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10328==    by 0x488CD0: stringsubst (subst.c:301)
==10328==    by 0x48801B: prefork (subst.c:77)
==10328==    by 0x42B318: execcmd (exec.c:2619)
==10328==    by 0x428CA0: execpline2 (exec.c:1697)
==10328==    by 0x427FD2: execpline (exec.c:1484)
==10328==    by 0x427756: execlist (exec.c:1267)
==10328==    by 0x42717C: execode (exec.c:1073)
==10328==    by 0x431299: runshfunc (exec.c:5040)
==10328==    by 0x430E76: doshfunc (exec.c:4920)
==10328==    by 0x4302FB: execshfunc (exec.c:4557)
==10328==    by 0x42D8C1: execcmd (exec.c:3373)
==10328== 
==10328== 
==10328== 2 errors in context 2 of 2:
==10328== Conditional jump or move depends on uninitialised value(s)
==10328==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10328==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10328==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10328==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10328==    by 0x42D8E9: execcmd (exec.c:3378)
==10328==    by 0x428CA0: execpline2 (exec.c:1697)
==10328==    by 0x427FD2: execpline (exec.c:1484)
==10328==    by 0x42779A: execlist (exec.c:1275)
==10328==    by 0x42717C: execode (exec.c:1073)
==10328==    by 0x431299: runshfunc (exec.c:5040)
==10328==    by 0x430E76: doshfunc (exec.c:4920)
==10328==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10328== 
==10328== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10282== LEAK SUMMARY:
==10282==    definitely lost: 2,221 bytes in 14 blocks
==10282==    indirectly lost: 6,796 bytes in 9 blocks
==10282==      possibly lost: 0 bytes in 0 blocks
==10282==    still reachable: 3,126,690 bytes in 69,454 blocks
==10282==         suppressed: 0 bytes in 0 blocks
==10282== Rerun with --leak-check=full to see details of leaked memory
==10282== 
==10282== Use --track-origins=yes to see where uninitialised values come from
==10282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10282== 
==10282== 1 errors in context 1 of 2:
==10282== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10282==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10282==    by 0x488CD0: stringsubst (subst.c:301)
==10282==    by 0x48801B: prefork (subst.c:77)
==10282==    by 0x42B318: execcmd (exec.c:2619)
==10282==    by 0x428CA0: execpline2 (exec.c:1697)
==10282==    by 0x427FD2: execpline (exec.c:1484)
==10282==    by 0x427756: execlist (exec.c:1267)
==10282==    by 0x42717C: execode (exec.c:1073)
==10282==    by 0x431299: runshfunc (exec.c:5040)
==10282==    by 0x430E76: doshfunc (exec.c:4920)
==10282==    by 0x4302FB: execshfunc (exec.c:4557)
==10282==    by 0x42D8C1: execcmd (exec.c:3373)
==10282== 
==10282== 
==10282== 2 errors in context 2 of 2:
==10282== Conditional jump or move depends on uninitialised value(s)
==10282==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10282==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10282==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10282==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10282==    by 0x42D8E9: execcmd (exec.c:3378)
==10282==    by 0x428CA0: execpline2 (exec.c:1697)
==10282==    by 0x427FD2: execpline (exec.c:1484)
==10282==    by 0x42779A: execlist (exec.c:1275)
==10282==    by 0x42717C: execode (exec.c:1073)
==10282==    by 0x431299: runshfunc (exec.c:5040)
==10282==    by 0x430E76: doshfunc (exec.c:4920)
==10282==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10282== 
==10282== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10334-by-pythonnut-on-???
==10334== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10334-by-pythonnut-on-???
==10334== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10334-by-pythonnut-on-???
==10334== 
==10334== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10334== don't want to do, unless you know exactly what you're doing,
==10334== or are doing some strange experiment):
==10334==   /usr/lib/valgrind/../../bin/vgdb --pid=10334 ...command...
==10334== 
==10334== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10334==   /path/to/gdb ./zsh
==10334== and then give GDB the following command
==10334==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10334
==10334== --pid is optional if only one valgrind process is running
==10334== 
--10334-- Caught __NR_exit; running __libc_freeres()
--10275-- Caught __NR_exit; running __libc_freeres()
--10334-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10275-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10334== 
==10334== HEAP SUMMARY:
==10334==     in use at exit: 3,115,180 bytes in 69,008 blocks
==10334==   total heap usage: 1,598,213 allocs, 1,529,205 frees, 129,202,248 bytes allocated
==10334== 
==10275== 
==10333== Checked 4,784,584 bytes
==10333== 
==10275== HEAP SUMMARY:
==10275==     in use at exit: 3,133,543 bytes in 69,402 blocks
==10275==   total heap usage: 1,595,024 allocs, 1,525,622 frees, 128,915,712 bytes allocated
==10275== 
==10333== LEAK SUMMARY:
==10333==    definitely lost: 2,197 bytes in 13 blocks
==10333==    indirectly lost: 6,756 bytes in 7 blocks
==10333==      possibly lost: 0 bytes in 0 blocks
==10333==    still reachable: 3,114,769 bytes in 69,132 blocks
==10333==         suppressed: 0 bytes in 0 blocks
==10333== Rerun with --leak-check=full to see details of leaked memory
==10333== 
==10333== Use --track-origins=yes to see where uninitialised values come from
==10333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10333== 
==10333== 1 errors in context 1 of 2:
==10333== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10333==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10333==    by 0x488CD0: stringsubst (subst.c:301)
==10333==    by 0x48801B: prefork (subst.c:77)
==10333==    by 0x42B318: execcmd (exec.c:2619)
==10333==    by 0x428CA0: execpline2 (exec.c:1697)
==10333==    by 0x427FD2: execpline (exec.c:1484)
==10333==    by 0x427756: execlist (exec.c:1267)
==10333==    by 0x42717C: execode (exec.c:1073)
==10333==    by 0x431299: runshfunc (exec.c:5040)
==10333==    by 0x430E76: doshfunc (exec.c:4920)
==10333==    by 0x4302FB: execshfunc (exec.c:4557)
==10333==    by 0x42D8C1: execcmd (exec.c:3373)
==10333== 
==10333== 
==10333== 2 errors in context 2 of 2:
==10333== Conditional jump or move depends on uninitialised value(s)
==10333==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10333==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10333==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10333==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10333==    by 0x42D8E9: execcmd (exec.c:3378)
==10333==    by 0x428CA0: execpline2 (exec.c:1697)
==10333==    by 0x427FD2: execpline (exec.c:1484)
==10333==    by 0x42779A: execlist (exec.c:1275)
==10333==    by 0x42717C: execode (exec.c:1073)
==10333==    by 0x431299: runshfunc (exec.c:5040)
==10333==    by 0x430E76: doshfunc (exec.c:4920)
==10333==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10333== 
==10333== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== Searching for pointers to 69,008 not-freed blocks
--10334--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10334--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10334--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10334--   Scanning root segment: 0x4037000..0x403afff (16384)
--10334--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10334--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10334--   Scanning root segment: 0x4223000..0x4223fff (4096)
==10275== Searching for pointers to 69,402 not-freed blocks
--10275--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10334--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10334--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10275--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10334--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10334--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10334--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10334--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10334--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10334--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10334--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10275--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10334--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10334--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10275--   Scanning root segment: 0x4037000..0x403afff (16384)
--10275--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10334--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10334--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10334--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10275--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10275--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10275--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10275--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10275--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10275--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10275--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10275--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10275--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10275--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10275--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10275--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10275--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10334--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10275--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10334--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10275--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10275--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10334--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10334--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10334--   Scanning root segment: 0x701a000..0x701afff (4096)
--10275--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10334--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10275--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10334--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10275--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10275--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10334--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10275--   Scanning root segment: 0x701a000..0x701afff (4096)
--10275--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10334--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10275--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10334--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10275--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10334--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10275--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10334--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10275--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10334--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10275--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10275--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10275--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10334--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10334--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10275--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10275--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10335== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10335-by-pythonnut-on-???
==10335== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10335-by-pythonnut-on-???
==10335== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10335-by-pythonnut-on-???
==10335== 
==10335== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10335== don't want to do, unless you know exactly what you're doing,
==10335== or are doing some strange experiment):
==10335==   /usr/lib/valgrind/../../bin/vgdb --pid=10335 ...command...
==10335== 
==10335== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10335==   /path/to/gdb ./zsh
==10335== and then give GDB the following command
==10335==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10335
==10335== --pid is optional if only one valgrind process is running
==10335== 
--10335-- Caught __NR_exit; running __libc_freeres()
--10335-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10335== 
==10335== HEAP SUMMARY:
==10335==     in use at exit: 3,123,818 bytes in 69,152 blocks
==10335==   total heap usage: 1,598,551 allocs, 1,529,399 frees, 129,123,000 bytes allocated
==10335== 
==10335== Searching for pointers to 69,152 not-freed blocks
--10335--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10335--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10335--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10335--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10335--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10335--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10335--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10335--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10335--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10335--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10335--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10335--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10335--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10335--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10335--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10335--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10335--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10335--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10335--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10335--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10335--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10335--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10335--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10335--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10335--   Scanning root segment: 0x701a000..0x701afff (4096)
--10335--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10335--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10335--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10335--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10335--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10335--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10335--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10335--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10335--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10335--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10275== Checked 4,816,400 bytes
==10275== 
==10334== Checked 4,790,344 bytes
==10334== 
==10275== LEAK SUMMARY:
==10275==    definitely lost: 2,221 bytes in 14 blocks
==10275==    indirectly lost: 6,796 bytes in 9 blocks
==10275==      possibly lost: 0 bytes in 0 blocks
==10275==    still reachable: 3,124,526 bytes in 69,379 blocks
==10275==         suppressed: 0 bytes in 0 blocks
==10275== Rerun with --leak-check=full to see details of leaked memory
==10275== 
==10275== Use --track-origins=yes to see where uninitialised values come from
==10275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10275== 
==10275== 1 errors in context 1 of 2:
==10275== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10275==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10275==    by 0x488CD0: stringsubst (subst.c:301)
==10275==    by 0x48801B: prefork (subst.c:77)
==10275==    by 0x42B318: execcmd (exec.c:2619)
==10275==    by 0x428CA0: execpline2 (exec.c:1697)
==10275==    by 0x427FD2: execpline (exec.c:1484)
==10275==    by 0x427756: execlist (exec.c:1267)
==10275==    by 0x42717C: execode (exec.c:1073)
==10275==    by 0x431299: runshfunc (exec.c:5040)
==10275==    by 0x430E76: doshfunc (exec.c:4920)
==10275==    by 0x4302FB: execshfunc (exec.c:4557)
==10275==    by 0x42D8C1: execcmd (exec.c:3373)
==10275== 
==10275== 
==10275== 2 errors in context 2 of 2:
==10275== Conditional jump or move depends on uninitialised value(s)
==10275==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10275==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10275==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10275==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10275==    by 0x42D8E9: execcmd (exec.c:3378)
==10275==    by 0x428CA0: execpline2 (exec.c:1697)
==10275==    by 0x427FD2: execpline (exec.c:1484)
==10275==    by 0x42779A: execlist (exec.c:1275)
==10275==    by 0x42717C: execode (exec.c:1073)
==10275==    by 0x431299: runshfunc (exec.c:5040)
==10275==    by 0x430E76: doshfunc (exec.c:4920)
==10275==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10275== 
==10275== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== LEAK SUMMARY:
==10334==    definitely lost: 2,197 bytes in 13 blocks
==10334==    indirectly lost: 6,756 bytes in 7 blocks
==10334==      possibly lost: 0 bytes in 0 blocks
==10334==    still reachable: 3,106,227 bytes in 68,988 blocks
==10334==         suppressed: 0 bytes in 0 blocks
==10334== Rerun with --leak-check=full to see details of leaked memory
==10334== 
==10334== Use --track-origins=yes to see where uninitialised values come from
==10334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10334== 
==10334== 1 errors in context 1 of 2:
==10334== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10334==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10334==    by 0x488CD0: stringsubst (subst.c:301)
==10334==    by 0x48801B: prefork (subst.c:77)
==10334==    by 0x42B318: execcmd (exec.c:2619)
==10334==    by 0x428CA0: execpline2 (exec.c:1697)
==10334==    by 0x427FD2: execpline (exec.c:1484)
==10334==    by 0x427756: execlist (exec.c:1267)
==10334==    by 0x42717C: execode (exec.c:1073)
==10334==    by 0x431299: runshfunc (exec.c:5040)
==10334==    by 0x430E76: doshfunc (exec.c:4920)
==10334==    by 0x4302FB: execshfunc (exec.c:4557)
==10334==    by 0x42D8C1: execcmd (exec.c:3373)
==10334== 
==10334== 
==10334== 2 errors in context 2 of 2:
==10334== Conditional jump or move depends on uninitialised value(s)
==10334==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10334==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10334==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10334==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10334==    by 0x42D8E9: execcmd (exec.c:3378)
==10334==    by 0x428CA0: execpline2 (exec.c:1697)
==10334==    by 0x427FD2: execpline (exec.c:1484)
==10334==    by 0x42779A: execlist (exec.c:1275)
==10334==    by 0x42717C: execode (exec.c:1073)
==10334==    by 0x431299: runshfunc (exec.c:5040)
==10334==    by 0x430E76: doshfunc (exec.c:4920)
==10334==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10334== 
==10334== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10121-- Caught __NR_exit; running __libc_freeres()
==10336== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10336-by-pythonnut-on-???
==10336== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10336-by-pythonnut-on-???
==10336== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10336-by-pythonnut-on-???
==10336== 
==10336== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10336== don't want to do, unless you know exactly what you're doing,
==10336== or are doing some strange experiment):
==10336==   /usr/lib/valgrind/../../bin/vgdb --pid=10336 ...command...
==10336== 
==10336== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10336==   /path/to/gdb ./zsh
==10336== and then give GDB the following command
==10336==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10336
==10336== --pid is optional if only one valgrind process is running
==10336== 
--10336-- Caught __NR_exit; running __libc_freeres()
--10121-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10336-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10121== 
==10336== 
==10336== HEAP SUMMARY:
==10336==     in use at exit: 3,115,183 bytes in 69,008 blocks
==10336==   total heap usage: 1,598,215 allocs, 1,529,207 frees, 129,202,825 bytes allocated
==10336== 
==10121== HEAP SUMMARY:
==10121==     in use at exit: 3,131,268 bytes in 69,329 blocks
==10121==   total heap usage: 1,595,007 allocs, 1,525,678 frees, 128,911,905 bytes allocated
==10121== 
==10335== Checked 4,783,864 bytes
==10335== 
==10336== Searching for pointers to 69,008 not-freed blocks
--10336--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10336--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10336--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10336--   Scanning root segment: 0x4037000..0x403afff (16384)
--10336--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10336--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10336--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10336--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10336--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10336--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10336--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10336--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10336--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10336--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10336--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10336--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10336--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10336--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10336--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10336--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10336--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10336--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10336--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10336--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10336--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10336--   Scanning root segment: 0x701a000..0x701afff (4096)
--10336--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10336--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10336--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10336--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10336--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10336--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10336--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10336--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10336--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10336--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10121== Searching for pointers to 69,329 not-freed blocks
--10121--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10121--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10121--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10121--   Scanning root segment: 0x4037000..0x403afff (16384)
--10121--   Scanning root segment: 0x4049000..0x404cfff (16384)
==10335== LEAK SUMMARY:
==10335==    definitely lost: 2,197 bytes in 13 blocks
==10335==    indirectly lost: 6,756 bytes in 7 blocks
==10335==      possibly lost: 0 bytes in 0 blocks
==10335==    still reachable: 3,114,865 bytes in 69,132 blocks
==10335==         suppressed: 0 bytes in 0 blocks
==10335== Rerun with --leak-check=full to see details of leaked memory
==10335== 
==10335== Use --track-origins=yes to see where uninitialised values come from
==10335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10335== 
==10335== 1 errors in context 1 of 2:
==10335== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10335==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10335==    by 0x488CD0: stringsubst (subst.c:301)
==10335==    by 0x48801B: prefork (subst.c:77)
--10121--   Scanning root segment: 0x4222000..0x4222fff (4096)
==10335==    by 0x42B318: execcmd (exec.c:2619)
==10335==    by 0x428CA0: execpline2 (exec.c:1697)
==10335==    by 0x427FD2: execpline (exec.c:1484)
==10335==    by 0x427756: execlist (exec.c:1267)
--10121--   Scanning root segment: 0x4223000..0x4223fff (4096)
==10335==    by 0x42717C: execode (exec.c:1073)
==10335==    by 0x431299: runshfunc (exec.c:5040)
==10335==    by 0x430E76: doshfunc (exec.c:4920)
==10335==    by 0x4302FB: execshfunc (exec.c:4557)
==10335==    by 0x42D8C1: execcmd (exec.c:3373)
==10335== 
--10121--   Scanning root segment: 0x4224000..0x4224fff (4096)
==10335== 
==10335== 2 errors in context 2 of 2:
==10335== Conditional jump or move depends on uninitialised value(s)
--10121--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
==10335==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10335==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10335==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
--10121--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
==10335==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10335==    by 0x42D8E9: execcmd (exec.c:3378)
==10335==    by 0x428CA0: execpline2 (exec.c:1697)
==10335==    by 0x427FD2: execpline (exec.c:1484)
==10335==    by 0x42779A: execlist (exec.c:1275)
==10335==    by 0x42717C: execode (exec.c:1073)
==10335==    by 0x431299: runshfunc (exec.c:5040)
==10335==    by 0x430E76: doshfunc (exec.c:4920)
==10335==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10335== 
==10335== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10121--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10121--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10121--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10121--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10121--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10121--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10121--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10121--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10121--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10121--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10121--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10121--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10121--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10121--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10121--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10121--   Scanning root segment: 0x701a000..0x701afff (4096)
--10121--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10121--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10121--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10121--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10121--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10121--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10121--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10121--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10121--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10121--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10338== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10338-by-pythonnut-on-???
==10338== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10338-by-pythonnut-on-???
==10338== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10338-by-pythonnut-on-???
==10338== 
==10338== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10338== don't want to do, unless you know exactly what you're doing,
==10338== or are doing some strange experiment):
==10338==   /usr/lib/valgrind/../../bin/vgdb --pid=10338 ...command...
==10338== 
==10338== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10338==   /path/to/gdb ./zsh
==10338== and then give GDB the following command
==10338==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10338
==10338== --pid is optional if only one valgrind process is running
==10338== 
--10338-- Caught __NR_exit; running __libc_freeres()
==10336== Checked 4,790,344 bytes
==10336== 
==10121== Checked 4,813,744 bytes
==10121== 
==10336== LEAK SUMMARY:
==10336==    definitely lost: 2,197 bytes in 13 blocks
==10336==    indirectly lost: 6,756 bytes in 7 blocks
==10336==      possibly lost: 0 bytes in 0 blocks
==10336==    still reachable: 3,106,230 bytes in 68,988 blocks
==10336==         suppressed: 0 bytes in 0 blocks
==10336== Rerun with --leak-check=full to see details of leaked memory
==10336== 
==10336== Use --track-origins=yes to see where uninitialised values come from
==10336== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10336== 
==10336== 1 errors in context 1 of 2:
==10336== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10336==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10336==    by 0x488CD0: stringsubst (subst.c:301)
==10336==    by 0x48801B: prefork (subst.c:77)
==10336==    by 0x42B318: execcmd (exec.c:2619)
==10336==    by 0x428CA0: execpline2 (exec.c:1697)
==10336==    by 0x427FD2: execpline (exec.c:1484)
==10336==    by 0x427756: execlist (exec.c:1267)
==10336==    by 0x42717C: execode (exec.c:1073)
==10336==    by 0x431299: runshfunc (exec.c:5040)
==10336==    by 0x430E76: doshfunc (exec.c:4920)
==10336==    by 0x4302FB: execshfunc (exec.c:4557)
==10336==    by 0x42D8C1: execcmd (exec.c:3373)
==10336== 
==10336== 
==10336== 2 errors in context 2 of 2:
==10336== Conditional jump or move depends on uninitialised value(s)
==10336==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10336==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10336==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10336==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10336==    by 0x42D8E9: execcmd (exec.c:3378)
==10336==    by 0x428CA0: execpline2 (exec.c:1697)
==10336==    by 0x427FD2: execpline (exec.c:1484)
==10336==    by 0x42779A: execlist (exec.c:1275)
==10336==    by 0x42717C: execode (exec.c:1073)
==10336==    by 0x431299: runshfunc (exec.c:5040)
==10336==    by 0x430E76: doshfunc (exec.c:4920)
==10336==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10336== 
==10336== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10338-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10121== LEAK SUMMARY:
==10121==    definitely lost: 2,221 bytes in 14 blocks
==10121==    indirectly lost: 6,796 bytes in 9 blocks
==10121==      possibly lost: 0 bytes in 0 blocks
==10121==    still reachable: 3,122,251 bytes in 69,306 blocks
==10121==         suppressed: 0 bytes in 0 blocks
==10121== Rerun with --leak-check=full to see details of leaked memory
==10121== 
==10121== Use --track-origins=yes to see where uninitialised values come from
==10121== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10121== 
==10121== 1 errors in context 1 of 2:
==10121== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10121==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10121==    by 0x488CD0: stringsubst (subst.c:301)
==10121==    by 0x48801B: prefork (subst.c:77)
==10121==    by 0x42B318: execcmd (exec.c:2619)
==10121==    by 0x428CA0: execpline2 (exec.c:1697)
==10121==    by 0x427FD2: execpline (exec.c:1484)
==10121==    by 0x427756: execlist (exec.c:1267)
==10121==    by 0x42717C: execode (exec.c:1073)
==10121==    by 0x431299: runshfunc (exec.c:5040)
==10121==    by 0x430E76: doshfunc (exec.c:4920)
==10121==    by 0x4302FB: execshfunc (exec.c:4557)
==10121==    by 0x42D8C1: execcmd (exec.c:3373)
==10121== 
==10121== 
==10121== 2 errors in context 2 of 2:
==10121== Conditional jump or move depends on uninitialised value(s)
==10121==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10121==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10121==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10121==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10121==    by 0x42D8E9: execcmd (exec.c:3378)
==10121==    by 0x428CA0: execpline2 (exec.c:1697)
==10121==    by 0x427FD2: execpline (exec.c:1484)
==10121==    by 0x42779A: execlist (exec.c:1275)
==10121==    by 0x42717C: execode (exec.c:1073)
==10121==    by 0x431299: runshfunc (exec.c:5040)
==10121==    by 0x430E76: doshfunc (exec.c:4920)
==10121==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10121== 
==10121== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10338== 
==10338== HEAP SUMMARY:
==10338==     in use at exit: 3,124,092 bytes in 69,158 blocks
==10338==   total heap usage: 1,599,076 allocs, 1,529,918 frees, 129,275,030 bytes allocated
==10338== 
==10339== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10339-by-pythonnut-on-???
==10339== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10339-by-pythonnut-on-???
==10339== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10339-by-pythonnut-on-???
==10339== 
==10339== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10339== don't want to do, unless you know exactly what you're doing,
==10339== or are doing some strange experiment):
==10339==   /usr/lib/valgrind/../../bin/vgdb --pid=10339 ...command...
==10339== 
==10339== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10339==   /path/to/gdb ./zsh
==10339== and then give GDB the following command
==10339==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10339
==10339== --pid is optional if only one valgrind process is running
==10339== 
--10340-- Caught __NR_exit; running __libc_freeres()
==10340== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10340-by-pythonnut-on-???
==10340== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10340-by-pythonnut-on-???
==10340== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10340-by-pythonnut-on-???
==10340== 
==10340== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10340== don't want to do, unless you know exactly what you're doing,
==10340== or are doing some strange experiment):
==10340==   /usr/lib/valgrind/../../bin/vgdb --pid=10340 ...command...
==10340== 
==10340== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10340==   /path/to/gdb ./zsh
==10340== and then give GDB the following command
==10340==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10340
==10340== --pid is optional if only one valgrind process is running
==10340== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
==10338== Searching for pointers to 69,158 not-freed blocks
--10338--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10338--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10338--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10338--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10338--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10338--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10338--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10338--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10338--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10338--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10338--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10338--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10338--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10338--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10338--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10338--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10338--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10338--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10338--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10338--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10338--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10338--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10338--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10338--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10338--   Scanning root segment: 0x701a000..0x701afff (4096)
--10338--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10338--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10338--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10338--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10338--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10338--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10338--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10338--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10338--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10338--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10340-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10340== 
==10340== HEAP SUMMARY:
==10340==     in use at exit: 3,115,465 bytes in 69,013 blocks
==10340==   total heap usage: 1,598,221 allocs, 1,529,208 frees, 129,206,439 bytes allocated
==10340== 
==10340== Searching for pointers to 69,013 not-freed blocks
--10340--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10340--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10340--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10340--   Scanning root segment: 0x4037000..0x403afff (16384)
--10340--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10340--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10340--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10340--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10340--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10340--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10340--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10340--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10340--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10340--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10340--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10340--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10340--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10340--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10340--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10340--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10340--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10340--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10340--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10340--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10340--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10340--   Scanning root segment: 0x701a000..0x701afff (4096)
--10340--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10340--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10340--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10340--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10340--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10340--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10340--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10340--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10340--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10340--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10338== Checked 4,784,072 bytes
==10338== 
==10338== LEAK SUMMARY:
==10338==    definitely lost: 2,197 bytes in 13 blocks
==10338==    indirectly lost: 6,756 bytes in 7 blocks
==10338==      possibly lost: 0 bytes in 0 blocks
==10338==    still reachable: 3,115,139 bytes in 69,138 blocks
==10338==         suppressed: 0 bytes in 0 blocks
==10338== Rerun with --leak-check=full to see details of leaked memory
==10338== 
==10338== Use --track-origins=yes to see where uninitialised values come from
==10338== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10338== 
==10338== 1 errors in context 1 of 2:
==10338== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10338==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10338==    by 0x488CD0: stringsubst (subst.c:301)
==10338==    by 0x48801B: prefork (subst.c:77)
==10338==    by 0x42B318: execcmd (exec.c:2619)
==10338==    by 0x428CA0: execpline2 (exec.c:1697)
==10338==    by 0x427FD2: execpline (exec.c:1484)
==10338==    by 0x427756: execlist (exec.c:1267)
==10338==    by 0x42717C: execode (exec.c:1073)
==10338==    by 0x431299: runshfunc (exec.c:5040)
==10338==    by 0x430E76: doshfunc (exec.c:4920)
==10338==    by 0x4302FB: execshfunc (exec.c:4557)
==10338==    by 0x42D8C1: execcmd (exec.c:3373)
==10338== 
==10338== 
==10338== 2 errors in context 2 of 2:
==10338== Conditional jump or move depends on uninitialised value(s)
==10338==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10338==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10338==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10338==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10338==    by 0x42D8E9: execcmd (exec.c:3378)
==10338==    by 0x428CA0: execpline2 (exec.c:1697)
==10338==    by 0x427FD2: execpline (exec.c:1484)
==10338==    by 0x42779A: execlist (exec.c:1275)
==10338==    by 0x42717C: execode (exec.c:1073)
==10338==    by 0x431299: runshfunc (exec.c:5040)
==10338==    by 0x430E76: doshfunc (exec.c:4920)
==10338==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10338== 
==10338== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10342-- Caught __NR_exit; running __libc_freeres()
==10340== Checked 4,791,256 bytes
==10340== 
==10342== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10342-by-pythonnut-on-???
==10342== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10342-by-pythonnut-on-???
==10342== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10342-by-pythonnut-on-???
==10342== 
==10342== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10342== don't want to do, unless you know exactly what you're doing,
==10342== or are doing some strange experiment):
==10342==   /usr/lib/valgrind/../../bin/vgdb --pid=10342 ...command...
==10342== 
==10342== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10342==   /path/to/gdb ./zsh
==10342== and then give GDB the following command
==10342==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10342
==10342== --pid is optional if only one valgrind process is running
==10342== 
==10340== LEAK SUMMARY:
==10340==    definitely lost: 2,197 bytes in 13 blocks
==10340==    indirectly lost: 6,756 bytes in 7 blocks
==10340==      possibly lost: 0 bytes in 0 blocks
==10340==    still reachable: 3,106,512 bytes in 68,993 blocks
==10340==         suppressed: 0 bytes in 0 blocks
==10340== Rerun with --leak-check=full to see details of leaked memory
==10340== 
==10340== Use --track-origins=yes to see where uninitialised values come from
==10340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10340== 
==10340== 1 errors in context 1 of 2:
==10340== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10340==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10340==    by 0x488CD0: stringsubst (subst.c:301)
==10340==    by 0x48801B: prefork (subst.c:77)
==10340==    by 0x42B318: execcmd (exec.c:2619)
==10340==    by 0x428CA0: execpline2 (exec.c:1697)
==10340==    by 0x427FD2: execpline (exec.c:1484)
==10340==    by 0x427756: execlist (exec.c:1267)
==10340==    by 0x42717C: execode (exec.c:1073)
==10340==    by 0x431299: runshfunc (exec.c:5040)
==10340==    by 0x430E76: doshfunc (exec.c:4920)
==10340==    by 0x4302FB: execshfunc (exec.c:4557)
==10340==    by 0x42D8C1: execcmd (exec.c:3373)
==10340== 
==10340== 
==10340== 2 errors in context 2 of 2:
==10340== Conditional jump or move depends on uninitialised value(s)
==10340==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10340==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10340==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10340==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10340==    by 0x42D8E9: execcmd (exec.c:3378)
==10340==    by 0x428CA0: execpline2 (exec.c:1697)
==10340==    by 0x427FD2: execpline (exec.c:1484)
==10340==    by 0x42779A: execlist (exec.c:1275)
==10340==    by 0x42717C: execode (exec.c:1073)
==10340==    by 0x431299: runshfunc (exec.c:5040)
==10340==    by 0x430E76: doshfunc (exec.c:4920)
==10340==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10340== 
==10340== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10342-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10339-- Caught __NR_exit; running __libc_freeres()
==10342== 
==10342== HEAP SUMMARY:
==10342==     in use at exit: 3,123,996 bytes in 69,158 blocks
==10342==   total heap usage: 1,599,056 allocs, 1,529,898 frees, 129,272,800 bytes allocated
==10342== 
--10339-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10342== Searching for pointers to 69,158 not-freed blocks
--10342--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10342--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10342--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10342--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10342--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10342--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10342--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10342--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10342--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10342--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10342--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10342--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10342--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10342--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10342--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10342--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10342--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10342--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10342--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10342--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10342--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10342--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10342--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10342--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10342--   Scanning root segment: 0x701a000..0x701afff (4096)
--10342--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10342--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10342--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10342--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10342--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10342--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10342--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10342--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10342--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10342--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10339== 
==10339== HEAP SUMMARY:
==10339==     in use at exit: 3,115,241 bytes in 69,010 blocks
==10339==   total heap usage: 1,598,224 allocs, 1,529,214 frees, 129,207,015 bytes allocated
==10339== 
==10339== Searching for pointers to 69,010 not-freed blocks
--10339--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10339--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10339--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10339--   Scanning root segment: 0x4037000..0x403afff (16384)
--10339--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10339--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10339--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10339--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10339--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10339--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10339--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10339--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10339--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10339--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10339--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10339--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10339--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10339--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10339--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10339--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10339--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10339--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10339--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10339--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10339--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10339--   Scanning root segment: 0x701a000..0x701afff (4096)
--10339--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10339--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10339--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10339--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10339--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10339--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10339--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10339--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10339--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10339--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10342== Checked 4,783,976 bytes
==10342== 
==10342== LEAK SUMMARY:
==10342==    definitely lost: 2,197 bytes in 13 blocks
==10342==    indirectly lost: 6,756 bytes in 7 blocks
==10342==      possibly lost: 0 bytes in 0 blocks
==10342==    still reachable: 3,115,043 bytes in 69,138 blocks
==10342==         suppressed: 0 bytes in 0 blocks
==10342== Rerun with --leak-check=full to see details of leaked memory
==10342== 
==10342== Use --track-origins=yes to see where uninitialised values come from
==10342== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10342== 
==10342== 1 errors in context 1 of 2:
==10342== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10342==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10342==    by 0x488CD0: stringsubst (subst.c:301)
==10342==    by 0x48801B: prefork (subst.c:77)
==10342==    by 0x42B318: execcmd (exec.c:2619)
==10342==    by 0x428CA0: execpline2 (exec.c:1697)
==10342==    by 0x427FD2: execpline (exec.c:1484)
==10342==    by 0x427756: execlist (exec.c:1267)
==10342==    by 0x42717C: execode (exec.c:1073)
==10342==    by 0x431299: runshfunc (exec.c:5040)
==10342==    by 0x430E76: doshfunc (exec.c:4920)
==10342==    by 0x4302FB: execshfunc (exec.c:4557)
==10342==    by 0x42D8C1: execcmd (exec.c:3373)
==10342== 
==10342== 
==10342== 2 errors in context 2 of 2:
==10342== Conditional jump or move depends on uninitialised value(s)
==10342==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10342==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10342==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10342==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10342==    by 0x42D8E9: execcmd (exec.c:3378)
==10342==    by 0x428CA0: execpline2 (exec.c:1697)
==10342==    by 0x427FD2: execpline (exec.c:1484)
==10342==    by 0x42779A: execlist (exec.c:1275)
==10342==    by 0x42717C: execode (exec.c:1073)
==10342==    by 0x431299: runshfunc (exec.c:5040)
==10342==    by 0x430E76: doshfunc (exec.c:4920)
==10342==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10342== 
==10342== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10339== Checked 4,790,400 bytes
==10339== 
==10345== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10345-by-pythonnut-on-???
==10345== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10345-by-pythonnut-on-???
==10345== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10345-by-pythonnut-on-???
==10345== 
==10345== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10345== don't want to do, unless you know exactly what you're doing,
==10345== or are doing some strange experiment):
==10345==   /usr/lib/valgrind/../../bin/vgdb --pid=10345 ...command...
==10345== 
==10345== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10345==   /path/to/gdb ./zsh
==10345== and then give GDB the following command
==10345==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10345
==10345== --pid is optional if only one valgrind process is running
==10345== 
==10339== LEAK SUMMARY:
==10339==    definitely lost: 2,197 bytes in 13 blocks
==10339==    indirectly lost: 6,756 bytes in 7 blocks
==10339==      possibly lost: 0 bytes in 0 blocks
==10339==    still reachable: 3,106,288 bytes in 68,990 blocks
==10339==         suppressed: 0 bytes in 0 blocks
==10339== Rerun with --leak-check=full to see details of leaked memory
==10339== 
==10339== Use --track-origins=yes to see where uninitialised values come from
==10339== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10339== 
==10339== 1 errors in context 1 of 2:
==10339== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10339==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10339==    by 0x488CD0: stringsubst (subst.c:301)
==10339==    by 0x48801B: prefork (subst.c:77)
==10339==    by 0x42B318: execcmd (exec.c:2619)
==10339==    by 0x428CA0: execpline2 (exec.c:1697)
==10339==    by 0x427FD2: execpline (exec.c:1484)
==10339==    by 0x427756: execlist (exec.c:1267)
==10339==    by 0x42717C: execode (exec.c:1073)
==10339==    by 0x431299: runshfunc (exec.c:5040)
==10339==    by 0x430E76: doshfunc (exec.c:4920)
==10339==    by 0x4302FB: execshfunc (exec.c:4557)
==10339==    by 0x42D8C1: execcmd (exec.c:3373)
==10339== 
==10339== 
==10339== 2 errors in context 2 of 2:
==10339== Conditional jump or move depends on uninitialised value(s)
==10339==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10339==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10339==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10339==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10339==    by 0x42D8E9: execcmd (exec.c:3378)
==10339==    by 0x428CA0: execpline2 (exec.c:1697)
==10339==    by 0x427FD2: execpline (exec.c:1484)
==10339==    by 0x42779A: execlist (exec.c:1275)
==10339==    by 0x42717C: execode (exec.c:1073)
==10339==    by 0x431299: runshfunc (exec.c:5040)
==10339==    by 0x430E76: doshfunc (exec.c:4920)
==10339==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10339== 
==10339== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10345-- Caught __NR_exit; running __libc_freeres()
--10197-- Caught __NR_exit; running __libc_freeres()
--10345-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10197-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10345== 
==10197== 
==10345== HEAP SUMMARY:
==10345==     in use at exit: 3,124,024 bytes in 69,159 blocks
==10345==   total heap usage: 1,599,069 allocs, 1,529,910 frees, 129,275,487 bytes allocated
==10345== 
==10197== HEAP SUMMARY:
==10197==     in use at exit: 3,112,747 bytes in 68,933 blocks
==10197==   total heap usage: 1,598,223 allocs, 1,529,290 frees, 129,208,805 bytes allocated
==10197== 
==10345== Searching for pointers to 69,159 not-freed blocks
--10345--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10345--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10345--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10345--   Scanning root segment: 0x4037000..0x403afff (16384)
--10345--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10345--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10345--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10345--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10345--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10345--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10345--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10345--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10345--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10345--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10345--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10345--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10345--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10345--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10345--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10345--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10345--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10345--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10345--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10345--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10345--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10345--   Scanning root segment: 0x701a000..0x701afff (4096)
--10345--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10345--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10345--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10345--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10345--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10345--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10345--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10345--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10345--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10345--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10197== Searching for pointers to 68,933 not-freed blocks
--10197--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10197--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10197--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10197--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10197--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10197--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10197--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10197--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10197--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10197--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10197--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10197--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10197--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10197--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10197--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10197--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10197--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10197--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10197--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10197--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10197--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10197--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10197--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10197--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10197--   Scanning root segment: 0x701a000..0x701afff (4096)
--10197--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10197--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10197--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10197--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10197--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10197--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10197--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10197--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10197--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10197--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10345== Checked 4,799,872 bytes
==10345== 
==10197== Checked 4,768,544 bytes
==10197== 
==10345== LEAK SUMMARY:
==10345==    definitely lost: 2,197 bytes in 13 blocks
==10345==    indirectly lost: 6,756 bytes in 7 blocks
==10345==      possibly lost: 0 bytes in 0 blocks
==10345==    still reachable: 3,115,071 bytes in 69,139 blocks
==10345==         suppressed: 0 bytes in 0 blocks
==10345== Rerun with --leak-check=full to see details of leaked memory
==10345== 
==10345== Use --track-origins=yes to see where uninitialised values come from
==10345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10345== 
==10345== 1 errors in context 1 of 2:
==10345== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10345==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10345==    by 0x488CD0: stringsubst (subst.c:301)
==10345==    by 0x48801B: prefork (subst.c:77)
==10345==    by 0x42B318: execcmd (exec.c:2619)
==10345==    by 0x428CA0: execpline2 (exec.c:1697)
==10345==    by 0x427FD2: execpline (exec.c:1484)
==10345==    by 0x427756: execlist (exec.c:1267)
==10345==    by 0x42717C: execode (exec.c:1073)
==10345==    by 0x431299: runshfunc (exec.c:5040)
==10345==    by 0x430E76: doshfunc (exec.c:4920)
==10345==    by 0x4302FB: execshfunc (exec.c:4557)
==10345==    by 0x42D8C1: execcmd (exec.c:3373)
==10345== 
==10345== 
==10345== 2 errors in context 2 of 2:
==10345== Conditional jump or move depends on uninitialised value(s)
==10345==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10345==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10345==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10345==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10345==    by 0x42D8E9: execcmd (exec.c:3378)
==10345==    by 0x428CA0: execpline2 (exec.c:1697)
==10345==    by 0x427FD2: execpline (exec.c:1484)
==10345==    by 0x42779A: execlist (exec.c:1275)
==10345==    by 0x42717C: execode (exec.c:1073)
==10345==    by 0x431299: runshfunc (exec.c:5040)
==10345==    by 0x430E76: doshfunc (exec.c:4920)
==10345==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10345== 
==10345== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== LEAK SUMMARY:
==10197==    definitely lost: 2,197 bytes in 13 blocks
==10197==    indirectly lost: 6,756 bytes in 7 blocks
==10197==      possibly lost: 0 bytes in 0 blocks
==10197==    still reachable: 3,103,794 bytes in 68,913 blocks
==10197==         suppressed: 0 bytes in 0 blocks
==10197== Rerun with --leak-check=full to see details of leaked memory
==10197== 
==10197== Use --track-origins=yes to see where uninitialised values come from
==10197== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10197== 
==10197== 1 errors in context 1 of 2:
==10197== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10197==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10197==    by 0x488CD0: stringsubst (subst.c:301)
==10197==    by 0x48801B: prefork (subst.c:77)
==10197==    by 0x42B318: execcmd (exec.c:2619)
==10197==    by 0x428CA0: execpline2 (exec.c:1697)
==10197==    by 0x427FD2: execpline (exec.c:1484)
==10197==    by 0x427756: execlist (exec.c:1267)
==10197==    by 0x42717C: execode (exec.c:1073)
==10197==    by 0x431299: runshfunc (exec.c:5040)
==10197==    by 0x430E76: doshfunc (exec.c:4920)
==10197==    by 0x4302FB: execshfunc (exec.c:4557)
==10197==    by 0x42D8C1: execcmd (exec.c:3373)
==10197== 
==10197== 
==10197== 2 errors in context 2 of 2:
==10197== Conditional jump or move depends on uninitialised value(s)
==10197==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10197==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10197==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10197==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10197==    by 0x42D8E9: execcmd (exec.c:3378)
==10197==    by 0x428CA0: execpline2 (exec.c:1697)
==10197==    by 0x427FD2: execpline (exec.c:1484)
==10197==    by 0x42779A: execlist (exec.c:1275)
==10197==    by 0x42717C: execode (exec.c:1073)
==10197==    by 0x431299: runshfunc (exec.c:5040)
==10197==    by 0x430E76: doshfunc (exec.c:4920)
==10197==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10197== 
==10197== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10346-by-pythonnut-on-???
==10346== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10346-by-pythonnut-on-???
==10346== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10346-by-pythonnut-on-???
==10346== 
==10346== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10346== don't want to do, unless you know exactly what you're doing,
==10346== or are doing some strange experiment):
==10346==   /usr/lib/valgrind/../../bin/vgdb --pid=10346 ...command...
==10346== 
==10346== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10346==   /path/to/gdb ./zsh
==10346== and then give GDB the following command
==10346==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10346
==10346== --pid is optional if only one valgrind process is running
==10346== 
==10348== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10348-by-pythonnut-on-???
==10348== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10348-by-pythonnut-on-???
==10348== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10348-by-pythonnut-on-???
==10348== 
==10348== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10348== don't want to do, unless you know exactly what you're doing,
==10348== or are doing some strange experiment):
==10348==   /usr/lib/valgrind/../../bin/vgdb --pid=10348 ...command...
==10348== 
==10348== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10348==   /path/to/gdb ./zsh
==10348== and then give GDB the following command
==10348==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10348
==10348== --pid is optional if only one valgrind process is running
==10348== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
==10347== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10347-by-pythonnut-on-???
==10347== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10347-by-pythonnut-on-???
==10347== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10347-by-pythonnut-on-???
==10347== 
==10347== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10347== don't want to do, unless you know exactly what you're doing,
==10347== or are doing some strange experiment):
==10347==   /usr/lib/valgrind/../../bin/vgdb --pid=10347 ...command...
==10347== 
==10347== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10347==   /path/to/gdb ./zsh
==10347== and then give GDB the following command
==10347==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10347
==10347== --pid is optional if only one valgrind process is running
==10347== 
--10347-- Caught __NR_exit; running __libc_freeres()
==10349== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10349-by-pythonnut-on-???
==10349== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10349-by-pythonnut-on-???
==10349== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10349-by-pythonnut-on-???
==10349== 
==10349== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10349== don't want to do, unless you know exactly what you're doing,
==10349== or are doing some strange experiment):
==10349==   /usr/lib/valgrind/../../bin/vgdb --pid=10349 ...command...
==10349== 
==10349== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10349==   /path/to/gdb ./zsh
==10349== and then give GDB the following command
==10349==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10349
==10349== --pid is optional if only one valgrind process is running
==10349== 
--10347-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10347== 
==10347== HEAP SUMMARY:
==10347==     in use at exit: 3,113,283 bytes in 68,945 blocks
==10347==   total heap usage: 1,598,050 allocs, 1,529,105 frees, 129,163,612 bytes allocated
==10347== 
--10350-- Caught __NR_exit; running __libc_freeres()
==10350== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10350-by-pythonnut-on-???
==10350== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10350-by-pythonnut-on-???
==10350== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10350-by-pythonnut-on-???
==10350== 
==10350== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10350== don't want to do, unless you know exactly what you're doing,
==10350== or are doing some strange experiment):
==10350==   /usr/lib/valgrind/../../bin/vgdb --pid=10350 ...command...
==10350== 
==10350== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10350==   /path/to/gdb ./zsh
==10350== and then give GDB the following command
==10350==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10350
==10350== --pid is optional if only one valgrind process is running
==10350== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==10347== Searching for pointers to 68,945 not-freed blocks
--10347--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10347--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10347--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10347--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10347--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10347--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10347--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10347--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10347--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10347--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10347--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10347--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10347--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10347--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10347--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10347--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10347--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10347--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10347--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10347--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10347--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10347--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10347--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10347--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10347--   Scanning root segment: 0x701a000..0x701afff (4096)
--10347--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10347--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10347--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10347--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10347--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10347--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10347--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10347--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10347--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10347--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10350-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10350== 
==10350== HEAP SUMMARY:
==10350==     in use at exit: 3,124,497 bytes in 69,171 blocks
==10350==   total heap usage: 1,600,742 allocs, 1,531,571 frees, 129,368,399 bytes allocated
==10350== 
==10350== Searching for pointers to 69,171 not-freed blocks
--10350--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10350--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10350--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10350--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10350--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10350--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10350--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10350--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10350--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10350--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10350--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10350--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10350--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10350--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10350--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10350--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10350--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10350--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10350--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10350--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10350--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10350--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10350--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10350--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10350--   Scanning root segment: 0x701a000..0x701afff (4096)
--10350--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10350--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10350--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10350--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10350--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10350--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10350--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10350--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10350--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10350--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10347== Checked 4,771,120 bytes
==10347== 
==10347== LEAK SUMMARY:
==10347==    definitely lost: 2,197 bytes in 13 blocks
==10347==    indirectly lost: 6,756 bytes in 7 blocks
==10347==      possibly lost: 0 bytes in 0 blocks
==10347==    still reachable: 3,104,330 bytes in 68,925 blocks
==10347==         suppressed: 0 bytes in 0 blocks
==10347== Rerun with --leak-check=full to see details of leaked memory
==10347== 
==10347== Use --track-origins=yes to see where uninitialised values come from
==10347== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10347== 
==10347== 1 errors in context 1 of 2:
==10347== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10347==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10347==    by 0x488CD0: stringsubst (subst.c:301)
==10347==    by 0x48801B: prefork (subst.c:77)
==10347==    by 0x42B318: execcmd (exec.c:2619)
==10347==    by 0x428CA0: execpline2 (exec.c:1697)
==10347==    by 0x427FD2: execpline (exec.c:1484)
==10347==    by 0x427756: execlist (exec.c:1267)
==10347==    by 0x42717C: execode (exec.c:1073)
==10347==    by 0x431299: runshfunc (exec.c:5040)
==10347==    by 0x430E76: doshfunc (exec.c:4920)
==10347==    by 0x4302FB: execshfunc (exec.c:4557)
==10347==    by 0x42D8C1: execcmd (exec.c:3373)
==10347== 
==10347== 
==10347== 2 errors in context 2 of 2:
==10347== Conditional jump or move depends on uninitialised value(s)
==10347==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10347==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10347==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10347==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10347==    by 0x42D8E9: execcmd (exec.c:3378)
==10347==    by 0x428CA0: execpline2 (exec.c:1697)
==10347==    by 0x427FD2: execpline (exec.c:1484)
==10347==    by 0x42779A: execlist (exec.c:1275)
==10347==    by 0x42717C: execode (exec.c:1073)
==10347==    by 0x431299: runshfunc (exec.c:5040)
==10347==    by 0x430E76: doshfunc (exec.c:4920)
==10347==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10347== 
==10347== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2AEC,  len 4
==10350== Checked 4,785,808 bytes
==10350== 
==10350== LEAK SUMMARY:
==10350==    definitely lost: 2,205 bytes in 14 blocks
==10350==    indirectly lost: 6,756 bytes in 7 blocks
==10350==      possibly lost: 0 bytes in 0 blocks
==10350==    still reachable: 3,115,536 bytes in 69,150 blocks
==10350==         suppressed: 0 bytes in 0 blocks
==10350== Rerun with --leak-check=full to see details of leaked memory
==10350== 
==10350== Use --track-origins=yes to see where uninitialised values come from
==10350== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10350== 
==10350== 1 errors in context 1 of 2:
==10350== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10350==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10350==    by 0x488CD0: stringsubst (subst.c:301)
==10350==    by 0x48801B: prefork (subst.c:77)
==10350==    by 0x42B318: execcmd (exec.c:2619)
==10350==    by 0x428CA0: execpline2 (exec.c:1697)
==10350==    by 0x427FD2: execpline (exec.c:1484)
==10350==    by 0x427756: execlist (exec.c:1267)
==10350==    by 0x42717C: execode (exec.c:1073)
==10350==    by 0x431299: runshfunc (exec.c:5040)
==10350==    by 0x430E76: doshfunc (exec.c:4920)
==10350==    by 0x4302FB: execshfunc (exec.c:4557)
==10350==    by 0x42D8C1: execcmd (exec.c:3373)
==10350== 
==10350== 
==10350== 2 errors in context 2 of 2:
==10350== Conditional jump or move depends on uninitialised value(s)
==10350==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10350==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10350==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10350==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10350==    by 0x42D8E9: execcmd (exec.c:3378)
==10350==    by 0x428CA0: execpline2 (exec.c:1697)
==10350==    by 0x427FD2: execpline (exec.c:1484)
==10350==    by 0x42779A: execlist (exec.c:1275)
==10350==    by 0x42717C: execode (exec.c:1073)
==10350==    by 0x431299: runshfunc (exec.c:5040)
==10350==    by 0x430E76: doshfunc (exec.c:4920)
==10350==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10350== 
==10350== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10349-- Caught __NR_exit; running __libc_freeres()
--10349-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10349== 
==10349== HEAP SUMMARY:
==10349==     in use at exit: 3,124,433 bytes in 69,168 blocks
==10349==   total heap usage: 1,600,740 allocs, 1,531,572 frees, 129,368,158 bytes allocated
==10349== 
--10352-- Caught __NR_exit; running __libc_freeres()
==10349== Searching for pointers to 69,168 not-freed blocks
--10349--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10349--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10349--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10349--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10349--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10349--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10349--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10349--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10349--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10349--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10349--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10349--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10349--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10349--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10349--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10349--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10349--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10349--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10349--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10349--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10349--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10349--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10349--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10349--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10349--   Scanning root segment: 0x701a000..0x701afff (4096)
--10349--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10349--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10349--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10349--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10349--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10349--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10349--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10349--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10349--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10349--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10352== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10352-by-pythonnut-on-???
==10352== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10352-by-pythonnut-on-???
==10352== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10352-by-pythonnut-on-???
==10352== 
==10352== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10352== don't want to do, unless you know exactly what you're doing,
==10352== or are doing some strange experiment):
==10352==   /usr/lib/valgrind/../../bin/vgdb --pid=10352 ...command...
==10352== 
==10352== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10352==   /path/to/gdb ./zsh
==10352== and then give GDB the following command
==10352==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10352
==10352== --pid is optional if only one valgrind process is running
==10352== 
--10352-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10352== 
==10352== HEAP SUMMARY:
==10352==     in use at exit: 3,113,674 bytes in 68,953 blocks
==10352==   total heap usage: 1,598,066 allocs, 1,529,113 frees, 129,167,723 bytes allocated
==10352== 
==10352== Searching for pointers to 68,953 not-freed blocks
--10352--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10352--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10352--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10352--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10352--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10352--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10352--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10352--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10352--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10352--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10352--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10352--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10352--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10352--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10352--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10352--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10352--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10352--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10352--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10352--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10352--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10352--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10352--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10352--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10352--   Scanning root segment: 0x701a000..0x701afff (4096)
--10352--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10352--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10352--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10352--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10352--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10352--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10352--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10352--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10352--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10352--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10349== Checked 4,785,120 bytes
==10349== 
==10349== LEAK SUMMARY:
==10349==    definitely lost: 2,205 bytes in 14 blocks
==10349==    indirectly lost: 6,756 bytes in 7 blocks
==10349==      possibly lost: 0 bytes in 0 blocks
==10349==    still reachable: 3,115,472 bytes in 69,147 blocks
==10349==         suppressed: 0 bytes in 0 blocks
==10349== Rerun with --leak-check=full to see details of leaked memory
==10349== 
==10349== Use --track-origins=yes to see where uninitialised values come from
==10349== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10349== 
==10349== 1 errors in context 1 of 2:
==10349== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10349==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10349==    by 0x488CD0: stringsubst (subst.c:301)
==10349==    by 0x48801B: prefork (subst.c:77)
==10349==    by 0x42B318: execcmd (exec.c:2619)
==10349==    by 0x428CA0: execpline2 (exec.c:1697)
==10349==    by 0x427FD2: execpline (exec.c:1484)
==10349==    by 0x427756: execlist (exec.c:1267)
==10349==    by 0x42717C: execode (exec.c:1073)
==10349==    by 0x431299: runshfunc (exec.c:5040)
==10349==    by 0x430E76: doshfunc (exec.c:4920)
==10349==    by 0x4302FB: execshfunc (exec.c:4557)
==10349==    by 0x42D8C1: execcmd (exec.c:3373)
==10349== 
==10349== 
==10349== 2 errors in context 2 of 2:
==10349== Conditional jump or move depends on uninitialised value(s)
==10349==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10349==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10349==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10349==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10349==    by 0x42D8E9: execcmd (exec.c:3378)
==10349==    by 0x428CA0: execpline2 (exec.c:1697)
==10349==    by 0x427FD2: execpline (exec.c:1484)
==10349==    by 0x42779A: execlist (exec.c:1275)
==10349==    by 0x42717C: execode (exec.c:1073)
==10349==    by 0x431299: runshfunc (exec.c:5040)
==10349==    by 0x430E76: doshfunc (exec.c:4920)
==10349==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10349== 
==10349== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10400-- Caught __NR_exit; running __libc_freeres()
==10352== Checked 4,771,224 bytes
==10352== 
==10400== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10400-by-pythonnut-on-???
==10400== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10400-by-pythonnut-on-???
==10400== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10400-by-pythonnut-on-???
==10400== 
==10400== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10400== don't want to do, unless you know exactly what you're doing,
==10400== or are doing some strange experiment):
==10400==   /usr/lib/valgrind/../../bin/vgdb --pid=10400 ...command...
==10400== 
==10400== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10400==   /path/to/gdb ./zsh
==10400== and then give GDB the following command
==10400==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10400
==10400== --pid is optional if only one valgrind process is running
==10400== 
==10352== LEAK SUMMARY:
==10352==    definitely lost: 2,197 bytes in 13 blocks
==10352==    indirectly lost: 6,756 bytes in 7 blocks
==10352==      possibly lost: 0 bytes in 0 blocks
==10352==    still reachable: 3,104,721 bytes in 68,933 blocks
==10352==         suppressed: 0 bytes in 0 blocks
==10352== Rerun with --leak-check=full to see details of leaked memory
==10352== 
==10352== Use --track-origins=yes to see where uninitialised values come from
==10352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10352== 
==10352== 1 errors in context 1 of 2:
==10352== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10352==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10352==    by 0x488CD0: stringsubst (subst.c:301)
==10352==    by 0x48801B: prefork (subst.c:77)
==10352==    by 0x42B318: execcmd (exec.c:2619)
==10352==    by 0x428CA0: execpline2 (exec.c:1697)
==10352==    by 0x427FD2: execpline (exec.c:1484)
==10352==    by 0x427756: execlist (exec.c:1267)
==10352==    by 0x42717C: execode (exec.c:1073)
==10352==    by 0x431299: runshfunc (exec.c:5040)
==10352==    by 0x430E76: doshfunc (exec.c:4920)
==10352==    by 0x4302FB: execshfunc (exec.c:4557)
==10352==    by 0x42D8C1: execcmd (exec.c:3373)
==10352== 
==10352== 
==10352== 2 errors in context 2 of 2:
==10352== Conditional jump or move depends on uninitialised value(s)
==10352==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10352==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10352==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10352==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10352==    by 0x42D8E9: execcmd (exec.c:3378)
==10352==    by 0x428CA0: execpline2 (exec.c:1697)
==10352==    by 0x427FD2: execpline (exec.c:1484)
==10352==    by 0x42779A: execlist (exec.c:1275)
==10352==    by 0x42717C: execode (exec.c:1073)
==10352==    by 0x431299: runshfunc (exec.c:5040)
==10352==    by 0x430E76: doshfunc (exec.c:4920)
==10352==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10352== 
==10352== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10400-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10346-- Caught __NR_exit; running __libc_freeres()
==10400== 
==10400== HEAP SUMMARY:
==10400==     in use at exit: 3,124,440 bytes in 69,168 blocks
==10400==   total heap usage: 1,600,755 allocs, 1,531,587 frees, 129,373,156 bytes allocated
==10400== 
--10346-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10400== Searching for pointers to 69,168 not-freed blocks
--10400--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10400--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10400--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10400--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10400--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10400--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10400--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10400--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10400--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10400--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10400--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10400--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10400--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10400--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10400--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10400--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10400--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10400--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10400--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
==10346== 
--10400--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10400--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10400--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10400--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10400--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10400--   Scanning root segment: 0x701a000..0x701afff (4096)
--10400--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10400--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10400--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10400--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10400--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10400--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10400--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10400--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10400--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10400--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10346== HEAP SUMMARY:
==10346==     in use at exit: 3,112,812 bytes in 68,934 blocks
==10346==   total heap usage: 1,598,075 allocs, 1,529,141 frees, 129,169,726 bytes allocated
==10346== 
==10346== Searching for pointers to 68,934 not-freed blocks
--10346--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10346--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10346--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10346--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10346--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10346--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10346--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10346--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10346--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10346--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10346--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10346--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10346--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10346--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10346--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10346--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10346--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10346--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10346--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10346--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10346--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10346--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10346--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10346--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10346--   Scanning root segment: 0x701a000..0x701afff (4096)
--10346--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10346--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10346--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10346--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10346--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10346--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10346--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10346--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10346--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10346--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10400== Checked 4,785,256 bytes
==10400== 
==10400== LEAK SUMMARY:
==10400==    definitely lost: 2,205 bytes in 14 blocks
==10400==    indirectly lost: 6,756 bytes in 7 blocks
==10400==      possibly lost: 0 bytes in 0 blocks
==10400==    still reachable: 3,115,479 bytes in 69,147 blocks
==10400==         suppressed: 0 bytes in 0 blocks
==10400== Rerun with --leak-check=full to see details of leaked memory
==10400== 
==10400== Use --track-origins=yes to see where uninitialised values come from
==10400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10400== 
==10400== 1 errors in context 1 of 2:
==10400== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10400==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10400==    by 0x488CD0: stringsubst (subst.c:301)
==10400==    by 0x48801B: prefork (subst.c:77)
==10400==    by 0x42B318: execcmd (exec.c:2619)
==10400==    by 0x428CA0: execpline2 (exec.c:1697)
==10400==    by 0x427FD2: execpline (exec.c:1484)
==10400==    by 0x427756: execlist (exec.c:1267)
==10400==    by 0x42717C: execode (exec.c:1073)
==10400==    by 0x431299: runshfunc (exec.c:5040)
==10400==    by 0x430E76: doshfunc (exec.c:4920)
==10400==    by 0x4302FB: execshfunc (exec.c:4557)
==10400==    by 0x42D8C1: execcmd (exec.c:3373)
==10400== 
==10400== 
==10400== 2 errors in context 2 of 2:
==10400== Conditional jump or move depends on uninitialised value(s)
==10400==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10400==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10400==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10400==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10400==    by 0x42D8E9: execcmd (exec.c:3378)
==10400==    by 0x428CA0: execpline2 (exec.c:1697)
==10400==    by 0x427FD2: execpline (exec.c:1484)
==10400==    by 0x42779A: execlist (exec.c:1275)
==10400==    by 0x42717C: execode (exec.c:1073)
==10400==    by 0x431299: runshfunc (exec.c:5040)
==10400==    by 0x430E76: doshfunc (exec.c:4920)
==10400==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10400== 
==10400== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== Checked 4,768,608 bytes
==10346== 
==10346== LEAK SUMMARY:
==10346==    definitely lost: 2,197 bytes in 13 blocks
==10346==    indirectly lost: 6,756 bytes in 7 blocks
==10346==      possibly lost: 0 bytes in 0 blocks
==10346==    still reachable: 3,103,859 bytes in 68,914 blocks
==10346==         suppressed: 0 bytes in 0 blocks
==10346== Rerun with --leak-check=full to see details of leaked memory
==10346== 
==10346== Use --track-origins=yes to see where uninitialised values come from
==10346== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10346== 
==10346== 1 errors in context 1 of 2:
==10346== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10346==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10346==    by 0x488CD0: stringsubst (subst.c:301)
==10346==    by 0x48801B: prefork (subst.c:77)
==10346==    by 0x42B318: execcmd (exec.c:2619)
==10346==    by 0x428CA0: execpline2 (exec.c:1697)
==10346==    by 0x427FD2: execpline (exec.c:1484)
==10346==    by 0x427756: execlist (exec.c:1267)
==10346==    by 0x42717C: execode (exec.c:1073)
==10346==    by 0x431299: runshfunc (exec.c:5040)
==10346==    by 0x430E76: doshfunc (exec.c:4920)
==10346==    by 0x4302FB: execshfunc (exec.c:4557)
==10346==    by 0x42D8C1: execcmd (exec.c:3373)
==10346== 
==10346== 
==10346== 2 errors in context 2 of 2:
==10346== Conditional jump or move depends on uninitialised value(s)
==10346==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10346==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10346==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10346==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10346==    by 0x42D8E9: execcmd (exec.c:3378)
==10346==    by 0x428CA0: execpline2 (exec.c:1697)
==10346==    by 0x427FD2: execpline (exec.c:1484)
==10346==    by 0x42779A: execlist (exec.c:1275)
==10346==    by 0x42717C: execode (exec.c:1073)
==10346==    by 0x431299: runshfunc (exec.c:5040)
==10346==    by 0x430E76: doshfunc (exec.c:4920)
==10346==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10346== 
==10346== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10403-- Caught __NR_exit; running __libc_freeres()
==10403== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10403-by-pythonnut-on-???
==10403== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10403-by-pythonnut-on-???
==10403== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10403-by-pythonnut-on-???
==10403== 
==10403== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10403== don't want to do, unless you know exactly what you're doing,
==10403== or are doing some strange experiment):
==10403==   /usr/lib/valgrind/../../bin/vgdb --pid=10403 ...command...
==10403== 
==10403== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10403==   /path/to/gdb ./zsh
==10403== and then give GDB the following command
==10403==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10403
==10403== --pid is optional if only one valgrind process is running
==10403== 
--10195-- Caught __NR_exit; running __libc_freeres()
--10403-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10403== 
==10403== HEAP SUMMARY:
==10403==     in use at exit: 3,124,536 bytes in 69,168 blocks
==10403==   total heap usage: 1,600,771 allocs, 1,531,603 frees, 129,377,943 bytes allocated
==10403== 
--10195-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10195== 
==10195== HEAP SUMMARY:
==10195==     in use at exit: 3,112,015 bytes in 68,921 blocks
==10195==   total heap usage: 1,598,109 allocs, 1,529,188 frees, 129,167,101 bytes allocated
==10195== 
==10403== Searching for pointers to 69,168 not-freed blocks
--10403--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10403--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10403--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10403--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10403--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10403--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10403--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10403--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10403--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10403--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10403--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10403--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10403--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10403--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10403--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10403--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10403--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10403--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10403--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10403--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10403--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10403--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10403--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10403--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10403--   Scanning root segment: 0x701a000..0x701afff (4096)
--10403--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10403--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10403--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10403--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10403--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10403--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10403--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10403--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10403--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10403--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10195== Searching for pointers to 68,921 not-freed blocks
--10195--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10195--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10195--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10195--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10195--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10195--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10195--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10195--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10195--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10195--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10195--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10195--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10195--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10195--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10195--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10195--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10195--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10195--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10195--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10195--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10195--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10195--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10195--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10195--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10195--   Scanning root segment: 0x701a000..0x701afff (4096)
--10195--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10195--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10195--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10195--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10195--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10195--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10195--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10195--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10195--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10195--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10403== Checked 4,784,536 bytes
==10403== 
==10403== LEAK SUMMARY:
==10403==    definitely lost: 2,205 bytes in 14 blocks
==10403==    indirectly lost: 6,756 bytes in 7 blocks
==10403==      possibly lost: 0 bytes in 0 blocks
==10403==    still reachable: 3,115,575 bytes in 69,147 blocks
==10403==         suppressed: 0 bytes in 0 blocks
==10403== Rerun with --leak-check=full to see details of leaked memory
==10403== 
==10403== Use --track-origins=yes to see where uninitialised values come from
==10403== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10403== 
==10403== 1 errors in context 1 of 2:
==10403== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10403==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10403==    by 0x488CD0: stringsubst (subst.c:301)
==10403==    by 0x48801B: prefork (subst.c:77)
==10403==    by 0x42B318: execcmd (exec.c:2619)
==10403==    by 0x428CA0: execpline2 (exec.c:1697)
==10403==    by 0x427FD2: execpline (exec.c:1484)
==10403==    by 0x427756: execlist (exec.c:1267)
==10403==    by 0x42717C: execode (exec.c:1073)
==10403==    by 0x431299: runshfunc (exec.c:5040)
==10403==    by 0x430E76: doshfunc (exec.c:4920)
==10403==    by 0x4302FB: execshfunc (exec.c:4557)
==10403==    by 0x42D8C1: execcmd (exec.c:3373)
==10403== 
==10403== 
==10403== 2 errors in context 2 of 2:
==10403== Conditional jump or move depends on uninitialised value(s)
==10403==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10403==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10403==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10403==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10403==    by 0x42D8E9: execcmd (exec.c:3378)
==10403==    by 0x428CA0: execpline2 (exec.c:1697)
==10403==    by 0x427FD2: execpline (exec.c:1484)
==10403==    by 0x42779A: execlist (exec.c:1275)
==10403==    by 0x42717C: execode (exec.c:1073)
==10403==    by 0x431299: runshfunc (exec.c:5040)
==10403==    by 0x430E76: doshfunc (exec.c:4920)
==10403==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10403== 
==10403== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10195== Checked 4,767,168 bytes
==10195== 
==10195== LEAK SUMMARY:
==10195==    definitely lost: 2,197 bytes in 13 blocks
==10195==    indirectly lost: 6,756 bytes in 7 blocks
==10195==      possibly lost: 0 bytes in 0 blocks
==10195==    still reachable: 3,103,062 bytes in 68,901 blocks
==10195==         suppressed: 0 bytes in 0 blocks
==10195== Rerun with --leak-check=full to see details of leaked memory
==10195== 
==10195== Use --track-origins=yes to see where uninitialised values come from
==10195== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10195== 
==10195== 1 errors in context 1 of 2:
==10195== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10195==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10195==    by 0x488CD0: stringsubst (subst.c:301)
==10195==    by 0x48801B: prefork (subst.c:77)
==10195==    by 0x42B318: execcmd (exec.c:2619)
==10195==    by 0x428CA0: execpline2 (exec.c:1697)
==10195==    by 0x427FD2: execpline (exec.c:1484)
==10195==    by 0x427756: execlist (exec.c:1267)
==10195==    by 0x42717C: execode (exec.c:1073)
==10195==    by 0x431299: runshfunc (exec.c:5040)
==10195==    by 0x430E76: doshfunc (exec.c:4920)
==10195==    by 0x4302FB: execshfunc (exec.c:4557)
==10195==    by 0x42D8C1: execcmd (exec.c:3373)
==10195== 
==10195== 
==10195== 2 errors in context 2 of 2:
==10195== Conditional jump or move depends on uninitialised value(s)
==10195==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10195==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10195==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10195==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10195==    by 0x42D8E9: execcmd (exec.c:3378)
==10195==    by 0x428CA0: execpline2 (exec.c:1697)
==10195==    by 0x427FD2: execpline (exec.c:1484)
==10195==    by 0x42779A: execlist (exec.c:1275)
==10195==    by 0x42717C: execode (exec.c:1073)
==10195==    by 0x431299: runshfunc (exec.c:5040)
==10195==    by 0x430E76: doshfunc (exec.c:4920)
==10195==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10195== 
==10195== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10405== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10405-by-pythonnut-on-???
==10405== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10405-by-pythonnut-on-???
==10405== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10405-by-pythonnut-on-???
==10405== 
==10405== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10405== don't want to do, unless you know exactly what you're doing,
==10405== or are doing some strange experiment):
==10405==   /usr/lib/valgrind/../../bin/vgdb --pid=10405 ...command...
==10405== 
==10405== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10405==   /path/to/gdb ./zsh
==10405== and then give GDB the following command
==10405==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10405
==10405== --pid is optional if only one valgrind process is running
==10405== 
--10405-- Caught __NR_exit; running __libc_freeres()
--10405-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10405== 
==10405== HEAP SUMMARY:
==10405==     in use at exit: 3,124,814 bytes in 69,174 blocks
==10405==   total heap usage: 1,601,296 allocs, 1,532,122 frees, 129,529,981 bytes allocated
==10405== 
==10405== Searching for pointers to 69,174 not-freed blocks
--10405--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10405--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10405--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10405--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10405--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10405--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10405--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10405--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10405--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10405--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10405--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10405--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10405--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10405--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10405--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10405--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10405--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10405--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10405--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10405--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10405--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10405--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10405--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10405--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10405--   Scanning root segment: 0x701a000..0x701afff (4096)
--10405--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10405--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10405--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10405--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10405--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10405--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10405--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10405--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10405--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10405--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10405== Checked 4,784,728 bytes
==10405== 
==10405== LEAK SUMMARY:
==10405==    definitely lost: 2,205 bytes in 14 blocks
==10405==    indirectly lost: 6,756 bytes in 7 blocks
==10405==      possibly lost: 0 bytes in 0 blocks
==10405==    still reachable: 3,115,853 bytes in 69,153 blocks
==10405==         suppressed: 0 bytes in 0 blocks
==10405== Rerun with --leak-check=full to see details of leaked memory
==10405== 
==10405== Use --track-origins=yes to see where uninitialised values come from
==10405== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10405== 
==10405== 1 errors in context 1 of 2:
==10405== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10405==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10405==    by 0x488CD0: stringsubst (subst.c:301)
==10405==    by 0x48801B: prefork (subst.c:77)
==10405==    by 0x42B318: execcmd (exec.c:2619)
==10405==    by 0x428CA0: execpline2 (exec.c:1697)
==10405==    by 0x427FD2: execpline (exec.c:1484)
==10405==    by 0x427756: execlist (exec.c:1267)
==10405==    by 0x42717C: execode (exec.c:1073)
==10405==    by 0x431299: runshfunc (exec.c:5040)
==10405==    by 0x430E76: doshfunc (exec.c:4920)
==10405==    by 0x4302FB: execshfunc (exec.c:4557)
==10405==    by 0x42D8C1: execcmd (exec.c:3373)
==10405== 
==10405== 
==10405== 2 errors in context 2 of 2:
==10405== Conditional jump or move depends on uninitialised value(s)
==10405==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10405==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10405==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10405==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10405==    by 0x42D8E9: execcmd (exec.c:3378)
==10405==    by 0x428CA0: execpline2 (exec.c:1697)
==10405==    by 0x427FD2: execpline (exec.c:1484)
==10405==    by 0x42779A: execlist (exec.c:1275)
==10405==    by 0x42717C: execode (exec.c:1073)
==10405==    by 0x431299: runshfunc (exec.c:5040)
==10405==    by 0x430E76: doshfunc (exec.c:4920)
==10405==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10405== 
==10405== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10406-- Caught __NR_exit; running __libc_freeres()
==10406== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10406-by-pythonnut-on-???
==10406== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10406-by-pythonnut-on-???
==10406== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10406-by-pythonnut-on-???
==10406== 
==10406== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10406== don't want to do, unless you know exactly what you're doing,
==10406== or are doing some strange experiment):
==10406==   /usr/lib/valgrind/../../bin/vgdb --pid=10406 ...command...
==10406== 
==10406== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10406==   /path/to/gdb ./zsh
==10406== and then give GDB the following command
==10406==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10406
==10406== --pid is optional if only one valgrind process is running
==10406== 
--10406-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10406== 
==10406== HEAP SUMMARY:
==10406==     in use at exit: 3,124,718 bytes in 69,174 blocks
==10406==   total heap usage: 1,601,276 allocs, 1,532,102 frees, 129,527,751 bytes allocated
==10406== 
==10406== Searching for pointers to 69,174 not-freed blocks
--10406--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10406--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10406--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10406--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10406--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10406--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10406--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10406--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10406--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10406--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10406--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10406--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10406--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10406--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10406--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10406--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10406--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10406--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10406--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10406--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10406--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10406--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10406--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10406--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10406--   Scanning root segment: 0x701a000..0x701afff (4096)
--10406--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10406--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10406--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10406--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10406--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10406--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10406--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10406--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10406--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10406--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10406== Checked 4,784,632 bytes
==10406== 
==10406== LEAK SUMMARY:
==10406==    definitely lost: 2,205 bytes in 14 blocks
==10406==    indirectly lost: 6,756 bytes in 7 blocks
==10406==      possibly lost: 0 bytes in 0 blocks
==10406==    still reachable: 3,115,757 bytes in 69,153 blocks
==10406==         suppressed: 0 bytes in 0 blocks
==10406== Rerun with --leak-check=full to see details of leaked memory
==10406== 
==10406== Use --track-origins=yes to see where uninitialised values come from
==10406== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10406== 
==10406== 1 errors in context 1 of 2:
==10406== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10406==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10406==    by 0x488CD0: stringsubst (subst.c:301)
==10406==    by 0x48801B: prefork (subst.c:77)
==10406==    by 0x42B318: execcmd (exec.c:2619)
==10406==    by 0x428CA0: execpline2 (exec.c:1697)
==10406==    by 0x427FD2: execpline (exec.c:1484)
==10406==    by 0x427756: execlist (exec.c:1267)
==10406==    by 0x42717C: execode (exec.c:1073)
==10406==    by 0x431299: runshfunc (exec.c:5040)
==10406==    by 0x430E76: doshfunc (exec.c:4920)
==10406==    by 0x4302FB: execshfunc (exec.c:4557)
==10406==    by 0x42D8C1: execcmd (exec.c:3373)
==10406== 
==10406== 
==10406== 2 errors in context 2 of 2:
==10406== Conditional jump or move depends on uninitialised value(s)
==10406==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10406==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10406==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10406==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10406==    by 0x42D8E9: execcmd (exec.c:3378)
==10406==    by 0x428CA0: execpline2 (exec.c:1697)
==10406==    by 0x427FD2: execpline (exec.c:1484)
==10406==    by 0x42779A: execlist (exec.c:1275)
==10406==    by 0x42717C: execode (exec.c:1073)
==10406==    by 0x431299: runshfunc (exec.c:5040)
==10406==    by 0x430E76: doshfunc (exec.c:4920)
==10406==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10406== 
==10406== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10407== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10407-by-pythonnut-on-???
==10407== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10407-by-pythonnut-on-???
==10407== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10407-by-pythonnut-on-???
==10407== 
==10407== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10407== don't want to do, unless you know exactly what you're doing,
==10407== or are doing some strange experiment):
==10407==   /usr/lib/valgrind/../../bin/vgdb --pid=10407 ...command...
==10407== 
==10407== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10407==   /path/to/gdb ./zsh
==10407== and then give GDB the following command
==10407==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10407
==10407== --pid is optional if only one valgrind process is running
==10407== 
--10407-- Caught __NR_exit; running __libc_freeres()
--10407-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10407== 
==10407== HEAP SUMMARY:
==10407==     in use at exit: 3,124,746 bytes in 69,175 blocks
==10407==   total heap usage: 1,601,289 allocs, 1,532,114 frees, 129,530,438 bytes allocated
==10407== 
==10407== Searching for pointers to 69,175 not-freed blocks
--10407--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10407--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10407--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10407--   Scanning root segment: 0x4037000..0x403afff (16384)
--10407--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10407--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10407--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10407--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10407--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10407--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10407--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10407--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10407--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10407--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10407--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10407--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10407--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10407--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10407--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10407--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10407--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10407--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10407--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10407--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10407--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10407--   Scanning root segment: 0x701a000..0x701afff (4096)
--10407--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10407--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10407--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10407--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10407--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10407--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10407--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10407--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10407--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10407--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10407== Checked 4,800,528 bytes
==10407== 
==10407== LEAK SUMMARY:
==10407==    definitely lost: 2,205 bytes in 14 blocks
==10407==    indirectly lost: 6,756 bytes in 7 blocks
==10407==      possibly lost: 0 bytes in 0 blocks
==10407==    still reachable: 3,115,785 bytes in 69,154 blocks
==10407==         suppressed: 0 bytes in 0 blocks
==10407== Rerun with --leak-check=full to see details of leaked memory
==10407== 
==10407== Use --track-origins=yes to see where uninitialised values come from
==10407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10407== 
==10407== 1 errors in context 1 of 2:
==10407== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10407==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10407==    by 0x488CD0: stringsubst (subst.c:301)
==10407==    by 0x48801B: prefork (subst.c:77)
==10407==    by 0x42B318: execcmd (exec.c:2619)
==10407==    by 0x428CA0: execpline2 (exec.c:1697)
==10407==    by 0x427FD2: execpline (exec.c:1484)
==10407==    by 0x427756: execlist (exec.c:1267)
==10407==    by 0x42717C: execode (exec.c:1073)
==10407==    by 0x431299: runshfunc (exec.c:5040)
==10407==    by 0x430E76: doshfunc (exec.c:4920)
==10407==    by 0x4302FB: execshfunc (exec.c:4557)
==10407==    by 0x42D8C1: execcmd (exec.c:3373)
==10407== 
==10407== 
==10407== 2 errors in context 2 of 2:
==10407== Conditional jump or move depends on uninitialised value(s)
==10407==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10407==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10407==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10407==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10407==    by 0x42D8E9: execcmd (exec.c:3378)
==10407==    by 0x428CA0: execpline2 (exec.c:1697)
==10407==    by 0x427FD2: execpline (exec.c:1484)
==10407==    by 0x42779A: execlist (exec.c:1275)
==10407==    by 0x42717C: execode (exec.c:1073)
==10407==    by 0x431299: runshfunc (exec.c:5040)
==10407==    by 0x430E76: doshfunc (exec.c:4920)
==10407==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10407== 
==10407== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10408-- Caught __NR_exit; running __libc_freeres()
==10408== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10408-by-pythonnut-on-???
==10408== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10408-by-pythonnut-on-???
==10408== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10408-by-pythonnut-on-???
==10408== 
==10408== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10408== don't want to do, unless you know exactly what you're doing,
==10408== or are doing some strange experiment):
==10408==   /usr/lib/valgrind/../../bin/vgdb --pid=10408 ...command...
==10408== 
==10408== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10408==   /path/to/gdb ./zsh
==10408== and then give GDB the following command
==10408==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10408
==10408== --pid is optional if only one valgrind process is running
==10408== 
--10408-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10408== 
==10408== HEAP SUMMARY:
==10408==     in use at exit: 3,123,940 bytes in 69,176 blocks
==10408==   total heap usage: 1,602,617 allocs, 1,533,441 frees, 129,603,071 bytes allocated
==10408== 
==10408== Searching for pointers to 69,176 not-freed blocks
--10408--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10408--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10408--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10408--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10408--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10408--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10408--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10408--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10408--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10408--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10408--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10408--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10408--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10408--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10408--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10408--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10408--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10408--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10408--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10408--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10408--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10408--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10408--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10408--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10408--   Scanning root segment: 0x701a000..0x701afff (4096)
--10408--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10408--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10408--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10408--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10408--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10408--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10408--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10408--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10408--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10408--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10408== Checked 4,786,024 bytes
==10408== 
==10408== LEAK SUMMARY:
==10408==    definitely lost: 2,205 bytes in 14 blocks
==10408==    indirectly lost: 6,756 bytes in 7 blocks
==10408==      possibly lost: 0 bytes in 0 blocks
==10408==    still reachable: 3,114,979 bytes in 69,155 blocks
==10408==         suppressed: 0 bytes in 0 blocks
==10408== Rerun with --leak-check=full to see details of leaked memory
==10408== 
==10408== Use --track-origins=yes to see where uninitialised values come from
==10408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10408== 
==10408== 1 errors in context 1 of 2:
==10408== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10408==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10408==    by 0x488CD0: stringsubst (subst.c:301)
==10408==    by 0x48801B: prefork (subst.c:77)
==10408==    by 0x42B318: execcmd (exec.c:2619)
==10408==    by 0x428CA0: execpline2 (exec.c:1697)
==10408==    by 0x427FD2: execpline (exec.c:1484)
==10408==    by 0x427756: execlist (exec.c:1267)
==10408==    by 0x42717C: execode (exec.c:1073)
==10408==    by 0x431299: runshfunc (exec.c:5040)
==10408==    by 0x430E76: doshfunc (exec.c:4920)
==10408==    by 0x4302FB: execshfunc (exec.c:4557)
==10408==    by 0x42D8C1: execcmd (exec.c:3373)
==10408== 
==10408== 
==10408== 2 errors in context 2 of 2:
==10408== Conditional jump or move depends on uninitialised value(s)
==10408==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10408==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10408==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10408==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10408==    by 0x42D8E9: execcmd (exec.c:3378)
==10408==    by 0x428CA0: execpline2 (exec.c:1697)
==10408==    by 0x427FD2: execpline (exec.c:1484)
==10408==    by 0x42779A: execlist (exec.c:1275)
==10408==    by 0x42717C: execode (exec.c:1073)
==10408==    by 0x431299: runshfunc (exec.c:5040)
==10408==    by 0x430E76: doshfunc (exec.c:4920)
==10408==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10408== 
==10408== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10411-by-pythonnut-on-???
==10411== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10411-by-pythonnut-on-???
==10411== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10411-by-pythonnut-on-???
==10411== 
==10411== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10411== don't want to do, unless you know exactly what you're doing,
==10411== or are doing some strange experiment):
==10411==   /usr/lib/valgrind/../../bin/vgdb --pid=10411 ...command...
==10411== 
==10411== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10411==   /path/to/gdb ./zsh
==10411== and then give GDB the following command
==10411==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10411
==10411== --pid is optional if only one valgrind process is running
==10411== 
==10412== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10412-by-pythonnut-on-???
==10412== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10412-by-pythonnut-on-???
==10412== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10412-by-pythonnut-on-???
==10412== 
==10412== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10412== don't want to do, unless you know exactly what you're doing,
==10412== or are doing some strange experiment):
==10412==   /usr/lib/valgrind/../../bin/vgdb --pid=10412 ...command...
==10412== 
==10412== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10412==   /path/to/gdb ./zsh
==10412== and then give GDB the following command
==10412==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10412
==10412== --pid is optional if only one valgrind process is running
==10412== 
==10414== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10414-by-pythonnut-on-???
==10414== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10414-by-pythonnut-on-???
==10414== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10414-by-pythonnut-on-???
==10414== 
==10414== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10414== don't want to do, unless you know exactly what you're doing,
==10414== or are doing some strange experiment):
==10414==   /usr/lib/valgrind/../../bin/vgdb --pid=10414 ...command...
==10414== 
==10414== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10414==   /path/to/gdb ./zsh
==10414== and then give GDB the following command
==10414==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10414
==10414== --pid is optional if only one valgrind process is running
==10414== 
--10413-- Caught __NR_exit; running __libc_freeres()
==10416== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10416-by-pythonnut-on-???
==10416== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10416-by-pythonnut-on-???
==10416== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10416-by-pythonnut-on-???
==10416== 
==10416== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10416== don't want to do, unless you know exactly what you're doing,
==10416== or are doing some strange experiment):
==10416==   /usr/lib/valgrind/../../bin/vgdb --pid=10416 ...command...
==10416== 
==10416== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10416==   /path/to/gdb ./zsh
==10416== and then give GDB the following command
==10416==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10416
==10416== --pid is optional if only one valgrind process is running
==10416== 
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==10415== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10415-by-pythonnut-on-???
==10415== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10415-by-pythonnut-on-???
==10415== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10415-by-pythonnut-on-???
==10415== 
==10415== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10415== don't want to do, unless you know exactly what you're doing,
==10415== or are doing some strange experiment):
==10415==   /usr/lib/valgrind/../../bin/vgdb --pid=10415 ...command...
==10415== 
==10415== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10415==   /path/to/gdb ./zsh
==10415== and then give GDB the following command
==10415==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10415
==10415== --pid is optional if only one valgrind process is running
==10415== 
==10413== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10413-by-pythonnut-on-???
==10413== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10413-by-pythonnut-on-???
==10413== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10413-by-pythonnut-on-???
==10413== 
==10413== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10413== don't want to do, unless you know exactly what you're doing,
==10413== or are doing some strange experiment):
==10413==   /usr/lib/valgrind/../../bin/vgdb --pid=10413 ...command...
==10413== 
==10413== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10413==   /path/to/gdb ./zsh
==10413== and then give GDB the following command
==10413==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10413
==10413== --pid is optional if only one valgrind process is running
==10413== 
==10417== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10417-by-pythonnut-on-???
==10417== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10417-by-pythonnut-on-???
==10417== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10417-by-pythonnut-on-???
==10417== 
==10417== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10417== don't want to do, unless you know exactly what you're doing,
==10417== or are doing some strange experiment):
==10417==   /usr/lib/valgrind/../../bin/vgdb --pid=10417 ...command...
==10417== 
==10417== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10417==   /path/to/gdb ./zsh
==10417== and then give GDB the following command
==10417==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10417
==10417== --pid is optional if only one valgrind process is running
==10417== 
--10413-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10413== 
client request: code 4d430005,  addr 0xFFEFE66FC,  len 4
==10413== HEAP SUMMARY:
==10413==     in use at exit: 3,112,137 bytes in 68,933 blocks
==10413==   total heap usage: 1,602,939 allocs, 1,534,006 frees, 129,625,346 bytes allocated
==10413== 
--10417-- Caught __NR_exit; running __libc_freeres()
==10413== Searching for pointers to 68,933 not-freed blocks
--10413--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10413--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10413--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10413--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10413--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10413--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10413--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10413--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10413--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10413--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10413--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10413--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10413--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10413--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10413--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10413--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10413--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10413--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10413--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10413--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10413--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10413--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10413--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10413--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10413--   Scanning root segment: 0x701a000..0x701afff (4096)
--10413--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10413--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10413--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10413--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10413--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10413--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10413--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10413--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10413--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10413--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10417-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10417== 
==10417== HEAP SUMMARY:
==10417==     in use at exit: 3,137,594 bytes in 69,547 blocks
==10417==   total heap usage: 1,597,403 allocs, 1,527,856 frees, 129,042,259 bytes allocated
==10417== 
==10417== Searching for pointers to 69,547 not-freed blocks
--10417--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10417--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10417--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10417--   Scanning root segment: 0x4037000..0x403efff (32768)
--10417--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10417--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10417--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10417--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10417--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10417--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10417--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10417--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10417--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10417--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10417--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10417--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10417--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10417--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10417--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10417--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10417--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10417--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10417--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10417--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10417--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10417--   Scanning root segment: 0x701a000..0x701afff (4096)
--10417--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10417--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10417--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10417--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10417--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10417--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10417--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10417--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10417--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10417--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10413== Checked 4,768,320 bytes
==10413== 
==10413== LEAK SUMMARY:
==10413==    definitely lost: 2,205 bytes in 14 blocks
==10413==    indirectly lost: 6,756 bytes in 7 blocks
==10413==      possibly lost: 0 bytes in 0 blocks
==10413==    still reachable: 3,103,176 bytes in 68,912 blocks
==10413==         suppressed: 0 bytes in 0 blocks
==10413== Rerun with --leak-check=full to see details of leaked memory
==10413== 
==10413== Use --track-origins=yes to see where uninitialised values come from
==10413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10413== 
==10413== 1 errors in context 1 of 2:
==10413== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10413==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10413==    by 0x488CD0: stringsubst (subst.c:301)
==10413==    by 0x48801B: prefork (subst.c:77)
==10413==    by 0x42B318: execcmd (exec.c:2619)
==10413==    by 0x428CA0: execpline2 (exec.c:1697)
==10413==    by 0x427FD2: execpline (exec.c:1484)
==10413==    by 0x427756: execlist (exec.c:1267)
==10413==    by 0x42717C: execode (exec.c:1073)
==10413==    by 0x431299: runshfunc (exec.c:5040)
==10413==    by 0x430E76: doshfunc (exec.c:4920)
==10413==    by 0x4302FB: execshfunc (exec.c:4557)
==10413==    by 0x42D8C1: execcmd (exec.c:3373)
==10413== 
==10413== 
==10413== 2 errors in context 2 of 2:
==10413== Conditional jump or move depends on uninitialised value(s)
==10413==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10413==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10413==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10413==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10413==    by 0x42D8E9: execcmd (exec.c:3378)
==10413==    by 0x428CA0: execpline2 (exec.c:1697)
==10413==    by 0x427FD2: execpline (exec.c:1484)
==10413==    by 0x42779A: execlist (exec.c:1275)
==10413==    by 0x42717C: execode (exec.c:1073)
==10413==    by 0x431299: runshfunc (exec.c:5040)
==10413==    by 0x430E76: doshfunc (exec.c:4920)
==10413==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10413== 
==10413== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10411-- Caught __NR_exit; running __libc_freeres()
==10417== Checked 4,841,504 bytes
==10417== 
--10411-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10411== 
==10411== HEAP SUMMARY:
==10411==     in use at exit: 3,111,782 bytes in 68,923 blocks
==10411==   total heap usage: 1,602,942 allocs, 1,534,019 frees, 129,625,986 bytes allocated
==10411== 
==10417== LEAK SUMMARY:
==10417==    definitely lost: 2,221 bytes in 14 blocks
==10417==    indirectly lost: 6,796 bytes in 9 blocks
==10417==      possibly lost: 0 bytes in 0 blocks
==10417==    still reachable: 3,128,577 bytes in 69,524 blocks
==10417==         suppressed: 0 bytes in 0 blocks
==10417== Rerun with --leak-check=full to see details of leaked memory
==10417== 
==10417== Use --track-origins=yes to see where uninitialised values come from
==10417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10417== 
==10417== 1 errors in context 1 of 2:
==10417== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10417==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10417==    by 0x488CD0: stringsubst (subst.c:301)
==10417==    by 0x48801B: prefork (subst.c:77)
==10417==    by 0x42B318: execcmd (exec.c:2619)
==10417==    by 0x428CA0: execpline2 (exec.c:1697)
==10417==    by 0x427FD2: execpline (exec.c:1484)
==10417==    by 0x427756: execlist (exec.c:1267)
==10417==    by 0x42717C: execode (exec.c:1073)
==10417==    by 0x431299: runshfunc (exec.c:5040)
==10417==    by 0x430E76: doshfunc (exec.c:4920)
==10417==    by 0x4302FB: execshfunc (exec.c:4557)
==10417==    by 0x42D8C1: execcmd (exec.c:3373)
==10417== 
==10417== 
==10417== 2 errors in context 2 of 2:
==10417== Conditional jump or move depends on uninitialised value(s)
==10417==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10417==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10417==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10417==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10417==    by 0x42D8E9: execcmd (exec.c:3378)
==10417==    by 0x428CA0: execpline2 (exec.c:1697)
==10417==    by 0x427FD2: execpline (exec.c:1484)
==10417==    by 0x42779A: execlist (exec.c:1275)
==10417==    by 0x42717C: execode (exec.c:1073)
==10417==    by 0x431299: runshfunc (exec.c:5040)
==10417==    by 0x430E76: doshfunc (exec.c:4920)
==10417==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10417== 
==10417== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== Searching for pointers to 68,923 not-freed blocks
--10411--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10411--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10411--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10411--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10411--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10411--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10411--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10411--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10411--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10411--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10411--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10411--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10411--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10411--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10411--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10411--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10411--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10411--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10411--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10411--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10411--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10411--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10411--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10411--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10411--   Scanning root segment: 0x701a000..0x701afff (4096)
--10411--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10411--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10411--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10411--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10411--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10411--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10411--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10411--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10411--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10411--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFE6BAC,  len 4
==10411== Checked 4,766,008 bytes
==10411== 
==10411== LEAK SUMMARY:
==10411==    definitely lost: 2,205 bytes in 14 blocks
==10411==    indirectly lost: 6,756 bytes in 7 blocks
==10411==      possibly lost: 0 bytes in 0 blocks
==10411==    still reachable: 3,102,821 bytes in 68,902 blocks
==10411==         suppressed: 0 bytes in 0 blocks
==10411== Rerun with --leak-check=full to see details of leaked memory
==10411== 
==10411== Use --track-origins=yes to see where uninitialised values come from
==10411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10411== 
==10411== 1 errors in context 1 of 2:
==10411== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10411==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10411==    by 0x488CD0: stringsubst (subst.c:301)
==10411==    by 0x48801B: prefork (subst.c:77)
==10411==    by 0x42B318: execcmd (exec.c:2619)
==10411==    by 0x428CA0: execpline2 (exec.c:1697)
==10411==    by 0x427FD2: execpline (exec.c:1484)
==10411==    by 0x427756: execlist (exec.c:1267)
==10411==    by 0x42717C: execode (exec.c:1073)
==10411==    by 0x431299: runshfunc (exec.c:5040)
==10411==    by 0x430E76: doshfunc (exec.c:4920)
==10411==    by 0x4302FB: execshfunc (exec.c:4557)
==10411==    by 0x42D8C1: execcmd (exec.c:3373)
==10411== 
==10411== 
==10411== 2 errors in context 2 of 2:
==10411== Conditional jump or move depends on uninitialised value(s)
==10411==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10411==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10411==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10411==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10411==    by 0x42D8E9: execcmd (exec.c:3378)
==10411==    by 0x428CA0: execpline2 (exec.c:1697)
==10411==    by 0x427FD2: execpline (exec.c:1484)
==10411==    by 0x42779A: execlist (exec.c:1275)
==10411==    by 0x42717C: execode (exec.c:1073)
==10411==    by 0x431299: runshfunc (exec.c:5040)
==10411==    by 0x430E76: doshfunc (exec.c:4920)
==10411==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10411== 
==10411== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10419-- Caught __NR_exit; running __libc_freeres()
==10419== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10419-by-pythonnut-on-???
==10419== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10419-by-pythonnut-on-???
==10419== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10419-by-pythonnut-on-???
==10419== 
==10419== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10419== don't want to do, unless you know exactly what you're doing,
==10419== or are doing some strange experiment):
==10419==   /usr/lib/valgrind/../../bin/vgdb --pid=10419 ...command...
==10419== 
==10419== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10419==   /path/to/gdb ./zsh
==10419== and then give GDB the following command
==10419==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10419
==10419== --pid is optional if only one valgrind process is running
==10419== 
--10419-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10419== 
==10419== HEAP SUMMARY:
==10419==     in use at exit: 3,137,839 bytes in 69,552 blocks
==10419==   total heap usage: 1,597,415 allocs, 1,527,863 frees, 129,046,160 bytes allocated
==10419== 
--10468-- Caught __NR_exit; running __libc_freeres()
==10469== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10469-by-pythonnut-on-???
==10469== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10469-by-pythonnut-on-???
==10469== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10469-by-pythonnut-on-???
==10469== 
==10469== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10469== don't want to do, unless you know exactly what you're doing,
==10469== or are doing some strange experiment):
==10469==   /usr/lib/valgrind/../../bin/vgdb --pid=10469 ...command...
==10469== 
==10469== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10469==   /path/to/gdb ./zsh
==10469== and then give GDB the following command
==10469==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10469
==10469== --pid is optional if only one valgrind process is running
==10469== 
==10468== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10468-by-pythonnut-on-???
==10468== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10468-by-pythonnut-on-???
==10468== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10468-by-pythonnut-on-???
==10468== 
==10468== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10468== don't want to do, unless you know exactly what you're doing,
==10468== or are doing some strange experiment):
==10468==   /usr/lib/valgrind/../../bin/vgdb --pid=10468 ...command...
==10468== 
==10468== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10468==   /path/to/gdb ./zsh
==10468== and then give GDB the following command
==10468==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10468
==10468== --pid is optional if only one valgrind process is running
==10468== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
==10470== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10470-by-pythonnut-on-???
==10470== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10470-by-pythonnut-on-???
==10470== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10470-by-pythonnut-on-???
==10470== 
==10470== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10470== don't want to do, unless you know exactly what you're doing,
==10470== or are doing some strange experiment):
==10470==   /usr/lib/valgrind/../../bin/vgdb --pid=10470 ...command...
==10470== 
==10470== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10470==   /path/to/gdb ./zsh
==10470== and then give GDB the following command
==10470==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10470
==10470== --pid is optional if only one valgrind process is running
==10470== 
==10419== Searching for pointers to 69,552 not-freed blocks
--10419--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10419--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10419--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10419--   Scanning root segment: 0x4037000..0x403efff (32768)
--10419--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10419--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10419--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10419--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10419--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10419--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10419--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10419--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10419--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10419--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10419--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10419--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10419--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10419--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10419--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10419--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10419--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10419--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10419--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10419--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10419--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10419--   Scanning root segment: 0x701a000..0x701afff (4096)
--10419--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10419--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10419--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10419--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10419--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10419--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10419--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10419--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10419--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10419--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10468-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
==10468== 
==10467== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10467-by-pythonnut-on-???
==10467== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10467-by-pythonnut-on-???
==10467== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10467-by-pythonnut-on-???
==10467== 
==10467== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10467== don't want to do, unless you know exactly what you're doing,
==10467== or are doing some strange experiment):
==10467==   /usr/lib/valgrind/../../bin/vgdb --pid=10467 ...command...
==10467== 
==10467== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10467==   /path/to/gdb ./zsh
==10467== and then give GDB the following command
==10467==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10467
==10467== --pid is optional if only one valgrind process is running
==10467== 
==10468== HEAP SUMMARY:
==10468==     in use at exit: 3,112,224 bytes in 68,934 blocks
==10468==   total heap usage: 1,602,972 allocs, 1,534,038 frees, 129,638,470 bytes allocated
==10468== 
==10468== Searching for pointers to 68,934 not-freed blocks
--10468--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10468--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10468--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10468--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10468--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10468--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10468--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10468--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10468--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10468--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10468--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10468--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10468--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10468--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10468--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10468--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10468--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10468--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10468--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10468--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10468--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10468--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10468--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10468--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10468--   Scanning root segment: 0x701a000..0x701afff (4096)
--10468--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10468--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10468--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10468--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10468--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10468--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10468--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10468--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10468--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10468--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10419== Checked 4,841,472 bytes
==10419== 
==10419== LEAK SUMMARY:
==10419==    definitely lost: 2,221 bytes in 14 blocks
==10419==    indirectly lost: 6,796 bytes in 9 blocks
==10419==      possibly lost: 0 bytes in 0 blocks
==10419==    still reachable: 3,128,822 bytes in 69,529 blocks
==10419==         suppressed: 0 bytes in 0 blocks
==10419== Rerun with --leak-check=full to see details of leaked memory
==10419== 
==10419== Use --track-origins=yes to see where uninitialised values come from
==10419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10419== 
==10419== 1 errors in context 1 of 2:
==10419== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10419==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10419==    by 0x488CD0: stringsubst (subst.c:301)
==10419==    by 0x48801B: prefork (subst.c:77)
==10419==    by 0x42B318: execcmd (exec.c:2619)
==10419==    by 0x428CA0: execpline2 (exec.c:1697)
==10419==    by 0x427FD2: execpline (exec.c:1484)
==10419==    by 0x427756: execlist (exec.c:1267)
==10419==    by 0x42717C: execode (exec.c:1073)
==10419==    by 0x431299: runshfunc (exec.c:5040)
==10419==    by 0x430E76: doshfunc (exec.c:4920)
==10419==    by 0x4302FB: execshfunc (exec.c:4557)
==10419==    by 0x42D8C1: execcmd (exec.c:3373)
==10419== 
==10419== 
==10419== 2 errors in context 2 of 2:
==10419== Conditional jump or move depends on uninitialised value(s)
==10419==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10419==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10419==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10419==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10419==    by 0x42D8E9: execcmd (exec.c:3378)
==10419==    by 0x428CA0: execpline2 (exec.c:1697)
==10419==    by 0x427FD2: execpline (exec.c:1484)
==10419==    by 0x42779A: execlist (exec.c:1275)
==10419==    by 0x42717C: execode (exec.c:1073)
==10419==    by 0x431299: runshfunc (exec.c:5040)
==10419==    by 0x430E76: doshfunc (exec.c:4920)
==10419==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10419== 
==10419== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10416-- Caught __NR_exit; running __libc_freeres()
==10468== Checked 4,770,376 bytes
==10468== 
--10416-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10468== LEAK SUMMARY:
==10468==    definitely lost: 2,205 bytes in 14 blocks
==10468==    indirectly lost: 6,756 bytes in 7 blocks
==10468==      possibly lost: 0 bytes in 0 blocks
==10468==    still reachable: 3,103,263 bytes in 68,913 blocks
==10468==         suppressed: 0 bytes in 0 blocks
==10468== Rerun with --leak-check=full to see details of leaked memory
==10468== 
==10468== Use --track-origins=yes to see where uninitialised values come from
==10468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10468== 
==10468== 1 errors in context 1 of 2:
==10468== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10468==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10468==    by 0x488CD0: stringsubst (subst.c:301)
==10468==    by 0x48801B: prefork (subst.c:77)
==10468==    by 0x42B318: execcmd (exec.c:2619)
==10468==    by 0x428CA0: execpline2 (exec.c:1697)
==10468==    by 0x427FD2: execpline (exec.c:1484)
==10468==    by 0x427756: execlist (exec.c:1267)
==10468==    by 0x42717C: execode (exec.c:1073)
==10468==    by 0x431299: runshfunc (exec.c:5040)
==10468==    by 0x430E76: doshfunc (exec.c:4920)
==10468==    by 0x4302FB: execshfunc (exec.c:4557)
==10468==    by 0x42D8C1: execcmd (exec.c:3373)
==10468== 
==10468== 
==10468== 2 errors in context 2 of 2:
==10468== Conditional jump or move depends on uninitialised value(s)
==10468==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10468==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10468==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10468==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10468==    by 0x42D8E9: execcmd (exec.c:3378)
==10468==    by 0x428CA0: execpline2 (exec.c:1697)
==10468==    by 0x427FD2: execpline (exec.c:1484)
==10468==    by 0x42779A: execlist (exec.c:1275)
==10468==    by 0x42717C: execode (exec.c:1073)
==10468==    by 0x431299: runshfunc (exec.c:5040)
==10468==    by 0x430E76: doshfunc (exec.c:4920)
==10468==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10468== 
==10468== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10416== 
==10416== HEAP SUMMARY:
==10416==     in use at exit: 3,135,675 bytes in 69,477 blocks
==10416==   total heap usage: 1,597,366 allocs, 1,527,889 frees, 129,046,771 bytes allocated
==10416== 
--10467-- Caught __NR_exit; running __libc_freeres()
--10467-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10467== 
==10416== Searching for pointers to 69,477 not-freed blocks
--10416--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10416--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
==10467== HEAP SUMMARY:
==10467==     in use at exit: 3,112,192 bytes in 68,934 blocks
==10467==   total heap usage: 1,602,976 allocs, 1,534,042 frees, 129,638,006 bytes allocated
==10467== 
--10416--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10416--   Scanning root segment: 0x4037000..0x403afff (16384)
--10416--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10416--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10416--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10416--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10416--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10416--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10416--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10416--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10416--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10416--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10416--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10416--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10416--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10416--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10416--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10416--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10416--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10416--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10416--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10416--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10416--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10416--   Scanning root segment: 0x701a000..0x701afff (4096)
--10416--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10416--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10416--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10416--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10416--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10416--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10416--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10416--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10416--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10416--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10467== Searching for pointers to 68,934 not-freed blocks
--10467--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10467--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10467--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10467--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10467--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10467--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10467--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10467--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10467--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10467--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10467--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10467--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10467--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10467--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10467--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10467--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10467--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10467--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10467--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10467--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10467--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10467--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10467--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10467--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10467--   Scanning root segment: 0x701a000..0x701afff (4096)
--10467--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10467--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10467--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10467--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10467--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10467--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10467--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10467--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10467--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10467--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10416== Checked 4,821,400 bytes
==10416== 
==10416== LEAK SUMMARY:
==10416==    definitely lost: 2,221 bytes in 14 blocks
==10416==    indirectly lost: 6,796 bytes in 9 blocks
==10416==      possibly lost: 0 bytes in 0 blocks
==10416==    still reachable: 3,126,658 bytes in 69,454 blocks
==10416==         suppressed: 0 bytes in 0 blocks
==10416== Rerun with --leak-check=full to see details of leaked memory
==10416== 
==10416== Use --track-origins=yes to see where uninitialised values come from
==10416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10416== 
==10416== 1 errors in context 1 of 2:
==10416== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10416==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10416==    by 0x488CD0: stringsubst (subst.c:301)
==10416==    by 0x48801B: prefork (subst.c:77)
==10416==    by 0x42B318: execcmd (exec.c:2619)
==10416==    by 0x428CA0: execpline2 (exec.c:1697)
==10416==    by 0x427FD2: execpline (exec.c:1484)
==10416==    by 0x427756: execlist (exec.c:1267)
==10416==    by 0x42717C: execode (exec.c:1073)
==10416==    by 0x431299: runshfunc (exec.c:5040)
==10416==    by 0x430E76: doshfunc (exec.c:4920)
==10416==    by 0x4302FB: execshfunc (exec.c:4557)
==10416==    by 0x42D8C1: execcmd (exec.c:3373)
==10416== 
==10416== 
==10416== 2 errors in context 2 of 2:
==10416== Conditional jump or move depends on uninitialised value(s)
==10416==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10416==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10416==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10416==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10416==    by 0x42D8E9: execcmd (exec.c:3378)
==10416==    by 0x428CA0: execpline2 (exec.c:1697)
==10416==    by 0x427FD2: execpline (exec.c:1484)
==10416==    by 0x42779A: execlist (exec.c:1275)
==10416==    by 0x42717C: execode (exec.c:1073)
==10416==    by 0x431299: runshfunc (exec.c:5040)
==10416==    by 0x430E76: doshfunc (exec.c:4920)
==10416==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10416== 
==10416== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10467== Checked 4,770,064 bytes
==10467== 
==10472== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10472-by-pythonnut-on-???
==10472== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10472-by-pythonnut-on-???
==10472== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10472-by-pythonnut-on-???
==10472== 
==10472== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10472== don't want to do, unless you know exactly what you're doing,
==10472== or are doing some strange experiment):
==10472==   /usr/lib/valgrind/../../bin/vgdb --pid=10472 ...command...
==10472== 
==10472== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10472==   /path/to/gdb ./zsh
==10472== and then give GDB the following command
==10472==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10472
==10472== --pid is optional if only one valgrind process is running
==10472== 
--10472-- Caught __NR_exit; running __libc_freeres()
==10473== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10473-by-pythonnut-on-???
==10473== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10473-by-pythonnut-on-???
==10473== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10473-by-pythonnut-on-???
==10473== 
==10473== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10473== don't want to do, unless you know exactly what you're doing,
==10473== or are doing some strange experiment):
==10473==   /usr/lib/valgrind/../../bin/vgdb --pid=10473 ...command...
==10473== 
==10473== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10473==   /path/to/gdb ./zsh
==10473== and then give GDB the following command
==10473==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10473
==10473== --pid is optional if only one valgrind process is running
==10473== 
==10467== LEAK SUMMARY:
==10467==    definitely lost: 2,205 bytes in 14 blocks
==10467==    indirectly lost: 6,756 bytes in 7 blocks
==10467==      possibly lost: 0 bytes in 0 blocks
==10467==    still reachable: 3,103,231 bytes in 68,913 blocks
==10467==         suppressed: 0 bytes in 0 blocks
==10467== Rerun with --leak-check=full to see details of leaked memory
==10467== 
==10467== Use --track-origins=yes to see where uninitialised values come from
==10467== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10467== 
==10467== 1 errors in context 1 of 2:
==10467== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10467==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10467==    by 0x488CD0: stringsubst (subst.c:301)
==10467==    by 0x48801B: prefork (subst.c:77)
==10467==    by 0x42B318: execcmd (exec.c:2619)
==10467==    by 0x428CA0: execpline2 (exec.c:1697)
==10467==    by 0x427FD2: execpline (exec.c:1484)
==10467==    by 0x427756: execlist (exec.c:1267)
==10467==    by 0x42717C: execode (exec.c:1073)
==10467==    by 0x431299: runshfunc (exec.c:5040)
==10467==    by 0x430E76: doshfunc (exec.c:4920)
==10467==    by 0x4302FB: execshfunc (exec.c:4557)
==10467==    by 0x42D8C1: execcmd (exec.c:3373)
==10467== 
==10467== 
==10467== 2 errors in context 2 of 2:
==10467== Conditional jump or move depends on uninitialised value(s)
==10467==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10467==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10467==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10467==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10467==    by 0x42D8E9: execcmd (exec.c:3378)
==10467==    by 0x428CA0: execpline2 (exec.c:1697)
==10467==    by 0x427FD2: execpline (exec.c:1484)
==10467==    by 0x42779A: execlist (exec.c:1275)
==10467==    by 0x42717C: execode (exec.c:1073)
==10467==    by 0x431299: runshfunc (exec.c:5040)
==10467==    by 0x430E76: doshfunc (exec.c:4920)
==10467==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10467== 
==10467== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
--10472-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10472== 
==10472== HEAP SUMMARY:
==10472==     in use at exit: 3,137,448 bytes in 69,539 blocks
==10472==   total heap usage: 1,597,435 allocs, 1,527,896 frees, 129,055,534 bytes allocated
==10472== 
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--10474-- Caught __NR_exit; running __libc_freeres()
==10472== Searching for pointers to 69,539 not-freed blocks
==10474== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10474-by-pythonnut-on-???
==10474== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10474-by-pythonnut-on-???
--10472--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==10474== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10474-by-pythonnut-on-???
==10474== 
==10474== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10474== don't want to do, unless you know exactly what you're doing,
==10474== or are doing some strange experiment):
==10474==   /usr/lib/valgrind/../../bin/vgdb --pid=10474 ...command...
==10474== 
==10474== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10474==   /path/to/gdb ./zsh
==10474== and then give GDB the following command
==10474==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10474
==10474== --pid is optional if only one valgrind process is running
==10474== 
--10472--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10472--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10472--   Scanning root segment: 0x4037000..0x403efff (32768)
--10472--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10472--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10472--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10472--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10472--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10472--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10472--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10472--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10472--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10472--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10472--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10472--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10472--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10472--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10472--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10472--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10472--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10472--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10472--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10472--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10472--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10472--   Scanning root segment: 0x701a000..0x701afff (4096)
--10472--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10472--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10472--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10472--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10472--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10472--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10472--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10472--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10472--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10472--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10474-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10474== 
==10474== HEAP SUMMARY:
==10474==     in use at exit: 3,112,423 bytes in 68,939 blocks
==10474==   total heap usage: 1,602,987 allocs, 1,534,048 frees, 129,643,094 bytes allocated
==10474== 
==10474== Searching for pointers to 68,939 not-freed blocks
--10474--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10474--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10474--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10474--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10474--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10474--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10474--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10474--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10474--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10474--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10474--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10474--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10474--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10474--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10474--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10474--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10474--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10474--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10474--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10474--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10474--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10474--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10474--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10474--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10474--   Scanning root segment: 0x701a000..0x701afff (4096)
--10474--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10474--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10474--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10474--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10474--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10474--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10474--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10474--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10474--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10474--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10472== Checked 4,840,040 bytes
==10472== 
==10472== LEAK SUMMARY:
==10472==    definitely lost: 2,221 bytes in 14 blocks
==10472==    indirectly lost: 6,796 bytes in 9 blocks
==10472==      possibly lost: 0 bytes in 0 blocks
==10472==    still reachable: 3,128,431 bytes in 69,516 blocks
==10472==         suppressed: 0 bytes in 0 blocks
==10472== Rerun with --leak-check=full to see details of leaked memory
==10472== 
==10472== Use --track-origins=yes to see where uninitialised values come from
==10472== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10472== 
==10472== 1 errors in context 1 of 2:
==10472== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10472==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10472==    by 0x488CD0: stringsubst (subst.c:301)
==10472==    by 0x48801B: prefork (subst.c:77)
==10472==    by 0x42B318: execcmd (exec.c:2619)
==10472==    by 0x428CA0: execpline2 (exec.c:1697)
==10472==    by 0x427FD2: execpline (exec.c:1484)
==10472==    by 0x427756: execlist (exec.c:1267)
==10472==    by 0x42717C: execode (exec.c:1073)
==10472==    by 0x431299: runshfunc (exec.c:5040)
==10472==    by 0x430E76: doshfunc (exec.c:4920)
==10472==    by 0x4302FB: execshfunc (exec.c:4557)
==10472==    by 0x42D8C1: execcmd (exec.c:3373)
==10472== 
==10472== 
==10472== 2 errors in context 2 of 2:
==10472== Conditional jump or move depends on uninitialised value(s)
==10472==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10472==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10472==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10472==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10472==    by 0x42D8E9: execcmd (exec.c:3378)
==10472==    by 0x428CA0: execpline2 (exec.c:1697)
==10472==    by 0x427FD2: execpline (exec.c:1484)
==10472==    by 0x42779A: execlist (exec.c:1275)
==10472==    by 0x42717C: execode (exec.c:1073)
==10472==    by 0x431299: runshfunc (exec.c:5040)
==10472==    by 0x430E76: doshfunc (exec.c:4920)
==10472==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10472== 
==10472== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10471-by-pythonnut-on-???
==10471== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10471-by-pythonnut-on-???
==10471== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10471-by-pythonnut-on-???
==10471== 
==10471== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10471== don't want to do, unless you know exactly what you're doing,
==10471== or are doing some strange experiment):
==10471==   /usr/lib/valgrind/../../bin/vgdb --pid=10471 ...command...
==10471== 
==10471== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10471==   /path/to/gdb ./zsh
==10471== and then give GDB the following command
==10471==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10471
==10471== --pid is optional if only one valgrind process is running
==10471== 
--10471-- Caught __NR_exit; running __libc_freeres()
==10474== Checked 4,770,016 bytes
==10474== 
--10471-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10471== 
==10471== HEAP SUMMARY:
==10471==     in use at exit: 3,137,384 bytes in 69,536 blocks
==10471==   total heap usage: 1,597,437 allocs, 1,527,901 frees, 129,056,078 bytes allocated
==10471== 
==10474== LEAK SUMMARY:
==10474==    definitely lost: 2,205 bytes in 14 blocks
==10474==    indirectly lost: 6,756 bytes in 7 blocks
==10474==      possibly lost: 0 bytes in 0 blocks
==10474==    still reachable: 3,103,462 bytes in 68,918 blocks
==10474==         suppressed: 0 bytes in 0 blocks
==10474== Rerun with --leak-check=full to see details of leaked memory
==10474== 
==10474== Use --track-origins=yes to see where uninitialised values come from
==10474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10474== 
==10474== 1 errors in context 1 of 2:
==10474== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10474==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10474==    by 0x488CD0: stringsubst (subst.c:301)
==10474==    by 0x48801B: prefork (subst.c:77)
==10474==    by 0x42B318: execcmd (exec.c:2619)
==10474==    by 0x428CA0: execpline2 (exec.c:1697)
==10474==    by 0x427FD2: execpline (exec.c:1484)
==10474==    by 0x427756: execlist (exec.c:1267)
==10474==    by 0x42717C: execode (exec.c:1073)
==10474==    by 0x431299: runshfunc (exec.c:5040)
==10474==    by 0x430E76: doshfunc (exec.c:4920)
==10474==    by 0x4302FB: execshfunc (exec.c:4557)
==10474==    by 0x42D8C1: execcmd (exec.c:3373)
==10474== 
==10474== 
==10474== 2 errors in context 2 of 2:
==10474== Conditional jump or move depends on uninitialised value(s)
==10474==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10474==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10474==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10474==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10474==    by 0x42D8E9: execcmd (exec.c:3378)
==10474==    by 0x428CA0: execpline2 (exec.c:1697)
==10474==    by 0x427FD2: execpline (exec.c:1484)
==10474==    by 0x42779A: execlist (exec.c:1275)
==10474==    by 0x42717C: execode (exec.c:1073)
==10474==    by 0x431299: runshfunc (exec.c:5040)
==10474==    by 0x430E76: doshfunc (exec.c:4920)
==10474==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10474== 
==10474== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== Searching for pointers to 69,536 not-freed blocks
--10471--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10471--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10471--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10471--   Scanning root segment: 0x4037000..0x403efff (32768)
--10471--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10471--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10471--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10471--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10471--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10471--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10471--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10471--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10471--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10471--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10471--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10471--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10471--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10471--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10471--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10471--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10471--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10471--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10471--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10471--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10471--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10471--   Scanning root segment: 0x701a000..0x701afff (4096)
--10471--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10471--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10471--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10471--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10471--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10471--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10471--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10471--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10471--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10471--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
==10479== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10479-by-pythonnut-on-???
==10479== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10479-by-pythonnut-on-???
==10479== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10479-by-pythonnut-on-???
==10479== 
==10479== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10479== don't want to do, unless you know exactly what you're doing,
==10479== or are doing some strange experiment):
==10479==   /usr/lib/valgrind/../../bin/vgdb --pid=10479 ...command...
==10479== 
==10479== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10479==   /path/to/gdb ./zsh
==10479== and then give GDB the following command
==10479==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10479
==10479== --pid is optional if only one valgrind process is running
==10479== 
--10478-- Caught __NR_exit; running __libc_freeres()
==10478== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10478-by-pythonnut-on-???
==10478== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10478-by-pythonnut-on-???
==10478== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10478-by-pythonnut-on-???
==10478== 
==10478== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10478== don't want to do, unless you know exactly what you're doing,
==10478== or are doing some strange experiment):
==10478==   /usr/lib/valgrind/../../bin/vgdb --pid=10478 ...command...
==10478== 
==10478== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10478==   /path/to/gdb ./zsh
==10478== and then give GDB the following command
==10478==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10478
==10478== --pid is optional if only one valgrind process is running
==10478== 
--10478-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10478== 
==10478== HEAP SUMMARY:
==10478==     in use at exit: 3,112,530 bytes in 68,943 blocks
==10478==   total heap usage: 1,602,995 allocs, 1,534,052 frees, 129,645,313 bytes allocated
==10478== 
==10478== Searching for pointers to 68,943 not-freed blocks
--10478--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10478--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10478--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10478--   Scanning root segment: 0x4037000..0x403afff (16384)
--10478--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10478--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10478--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10478--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10478--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10478--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10478--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10478--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10478--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10478--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10478--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10478--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10478--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10478--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10478--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10478--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10478--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10478--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10478--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10478--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10478--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10478--   Scanning root segment: 0x701a000..0x701afff (4096)
--10478--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10478--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10478--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10478--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10478--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10478--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10478--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10478--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10478--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10478--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10471== Checked 4,839,352 bytes
==10471== 
==10471== LEAK SUMMARY:
==10471==    definitely lost: 2,221 bytes in 14 blocks
==10471==    indirectly lost: 6,796 bytes in 9 blocks
==10471==      possibly lost: 0 bytes in 0 blocks
==10471==    still reachable: 3,128,367 bytes in 69,513 blocks
==10471==         suppressed: 0 bytes in 0 blocks
==10471== Rerun with --leak-check=full to see details of leaked memory
==10471== 
==10471== Use --track-origins=yes to see where uninitialised values come from
==10471== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10471== 
==10471== 1 errors in context 1 of 2:
==10471== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10471==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10471==    by 0x488CD0: stringsubst (subst.c:301)
==10471==    by 0x48801B: prefork (subst.c:77)
==10471==    by 0x42B318: execcmd (exec.c:2619)
==10471==    by 0x428CA0: execpline2 (exec.c:1697)
==10471==    by 0x427FD2: execpline (exec.c:1484)
==10471==    by 0x427756: execlist (exec.c:1267)
==10471==    by 0x42717C: execode (exec.c:1073)
==10471==    by 0x431299: runshfunc (exec.c:5040)
==10471==    by 0x430E76: doshfunc (exec.c:4920)
==10471==    by 0x4302FB: execshfunc (exec.c:4557)
==10471==    by 0x42D8C1: execcmd (exec.c:3373)
==10471== 
==10471== 
==10471== 2 errors in context 2 of 2:
==10471== Conditional jump or move depends on uninitialised value(s)
==10471==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10471==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10471==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10471==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10471==    by 0x42D8E9: execcmd (exec.c:3378)
==10471==    by 0x428CA0: execpline2 (exec.c:1697)
==10471==    by 0x427FD2: execpline (exec.c:1484)
==10471==    by 0x42779A: execlist (exec.c:1275)
==10471==    by 0x42717C: execode (exec.c:1073)
==10471==    by 0x431299: runshfunc (exec.c:5040)
==10471==    by 0x430E76: doshfunc (exec.c:4920)
==10471==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10471== 
==10471== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10480== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10480-by-pythonnut-on-???
==10480== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10480-by-pythonnut-on-???
==10480== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10480-by-pythonnut-on-???
==10480== 
==10480== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10480== don't want to do, unless you know exactly what you're doing,
==10480== or are doing some strange experiment):
==10480==   /usr/lib/valgrind/../../bin/vgdb --pid=10480 ...command...
==10480== 
==10480== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10480==   /path/to/gdb ./zsh
==10480== and then give GDB the following command
==10480==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10480
==10480== --pid is optional if only one valgrind process is running
==10480== 
--10480-- Caught __NR_exit; running __libc_freeres()
--10480-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10480== 
==10480== HEAP SUMMARY:
==10480==     in use at exit: 3,137,388 bytes in 69,536 blocks
==10480==   total heap usage: 1,597,454 allocs, 1,527,918 frees, 129,061,098 bytes allocated
==10480== 
==10478== Checked 4,786,768 bytes
==10478== 
==10480== Searching for pointers to 69,536 not-freed blocks
--10480--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10480--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10480--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10480--   Scanning root segment: 0x4037000..0x403efff (32768)
--10480--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10480--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10480--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10480--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10480--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10480--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10480--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10480--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10480--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10480--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10480--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10480--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10480--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10480--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10480--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10480--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10480--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10480--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10480--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10480--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10480--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10480--   Scanning root segment: 0x701a000..0x701afff (4096)
--10480--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10480--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10480--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10480--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10480--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10480--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10480--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10480--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10480--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10480--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10478== LEAK SUMMARY:
==10478==    definitely lost: 2,205 bytes in 14 blocks
==10478==    indirectly lost: 6,756 bytes in 7 blocks
==10478==      possibly lost: 0 bytes in 0 blocks
==10478==    still reachable: 3,103,569 bytes in 68,922 blocks
==10478==         suppressed: 0 bytes in 0 blocks
==10478== Rerun with --leak-check=full to see details of leaked memory
==10478== 
==10478== Use --track-origins=yes to see where uninitialised values come from
==10478== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10478== 
==10478== 1 errors in context 1 of 2:
==10478== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10478==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10478==    by 0x488CD0: stringsubst (subst.c:301)
==10478==    by 0x48801B: prefork (subst.c:77)
==10478==    by 0x42B318: execcmd (exec.c:2619)
==10478==    by 0x428CA0: execpline2 (exec.c:1697)
==10478==    by 0x427FD2: execpline (exec.c:1484)
==10478==    by 0x427756: execlist (exec.c:1267)
==10478==    by 0x42717C: execode (exec.c:1073)
==10478==    by 0x431299: runshfunc (exec.c:5040)
==10478==    by 0x430E76: doshfunc (exec.c:4920)
==10478==    by 0x4302FB: execshfunc (exec.c:4557)
==10478==    by 0x42D8C1: execcmd (exec.c:3373)
==10478== 
==10478== 
==10478== 2 errors in context 2 of 2:
==10478== Conditional jump or move depends on uninitialised value(s)
==10478==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10478==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10478==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10478==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10478==    by 0x42D8E9: execcmd (exec.c:3378)
==10478==    by 0x428CA0: execpline2 (exec.c:1697)
==10478==    by 0x427FD2: execpline (exec.c:1484)
==10478==    by 0x42779A: execlist (exec.c:1275)
==10478==    by 0x42717C: execode (exec.c:1073)
==10478==    by 0x431299: runshfunc (exec.c:5040)
==10478==    by 0x430E76: doshfunc (exec.c:4920)
==10478==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10478== 
==10478== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
==10480== Checked 4,839,360 bytes
==10480== 
--10483-- Caught __NR_exit; running __libc_freeres()
==10483== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10483-by-pythonnut-on-???
==10483== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10483-by-pythonnut-on-???
==10483== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10483-by-pythonnut-on-???
==10483== 
==10483== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10483== don't want to do, unless you know exactly what you're doing,
==10483== or are doing some strange experiment):
==10483==   /usr/lib/valgrind/../../bin/vgdb --pid=10483 ...command...
==10483== 
==10483== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10483==   /path/to/gdb ./zsh
==10483== and then give GDB the following command
==10483==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10483
==10483== --pid is optional if only one valgrind process is running
==10483== 
==10480== LEAK SUMMARY:
==10480==    definitely lost: 2,221 bytes in 14 blocks
==10480==    indirectly lost: 6,796 bytes in 9 blocks
==10480==      possibly lost: 0 bytes in 0 blocks
==10480==    still reachable: 3,128,371 bytes in 69,513 blocks
==10480==         suppressed: 0 bytes in 0 blocks
==10480== Rerun with --leak-check=full to see details of leaked memory
==10480== 
==10480== Use --track-origins=yes to see where uninitialised values come from
==10480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10480== 
==10480== 1 errors in context 1 of 2:
==10480== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10480==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10480==    by 0x488CD0: stringsubst (subst.c:301)
==10480==    by 0x48801B: prefork (subst.c:77)
==10480==    by 0x42B318: execcmd (exec.c:2619)
==10480==    by 0x428CA0: execpline2 (exec.c:1697)
==10480==    by 0x427FD2: execpline (exec.c:1484)
==10480==    by 0x427756: execlist (exec.c:1267)
==10480==    by 0x42717C: execode (exec.c:1073)
==10480==    by 0x431299: runshfunc (exec.c:5040)
==10480==    by 0x430E76: doshfunc (exec.c:4920)
==10480==    by 0x4302FB: execshfunc (exec.c:4557)
==10480==    by 0x42D8C1: execcmd (exec.c:3373)
==10480== 
==10480== 
==10480== 2 errors in context 2 of 2:
==10480== Conditional jump or move depends on uninitialised value(s)
==10480==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10480==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10480==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10480==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10480==    by 0x42D8E9: execcmd (exec.c:3378)
==10480==    by 0x428CA0: execpline2 (exec.c:1697)
==10480==    by 0x427FD2: execpline (exec.c:1484)
==10480==    by 0x42779A: execlist (exec.c:1275)
==10480==    by 0x42717C: execode (exec.c:1073)
==10480==    by 0x431299: runshfunc (exec.c:5040)
==10480==    by 0x430E76: doshfunc (exec.c:4920)
==10480==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10480== 
==10480== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10483-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10484== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10484-by-pythonnut-on-???
==10484== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10484-by-pythonnut-on-???
==10484== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10484-by-pythonnut-on-???
==10484== 
==10484== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10484== don't want to do, unless you know exactly what you're doing,
==10484== or are doing some strange experiment):
==10484==   /usr/lib/valgrind/../../bin/vgdb --pid=10484 ...command...
==10484== 
==10484== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10484==   /path/to/gdb ./zsh
==10484== and then give GDB the following command
==10484==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10484
==10484== --pid is optional if only one valgrind process is running
==10484== 
--10484-- Caught __NR_exit; running __libc_freeres()
==10483== 
==10483== HEAP SUMMARY:
==10483==     in use at exit: 3,111,864 bytes in 68,928 blocks
==10483==   total heap usage: 1,603,045 allocs, 1,534,117 frees, 129,651,728 bytes allocated
==10483== 
--10484-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10483== Searching for pointers to 68,928 not-freed blocks
--10483--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10483--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10483--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10483--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10483--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10483--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10483--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10483--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10483--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10483--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10483--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10483--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10483--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10483--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10483--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10483--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10483--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10483--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10483--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10483--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10483--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10483--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10483--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10483--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10483--   Scanning root segment: 0x701a000..0x701afff (4096)
--10483--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10483--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10483--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10483--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10483--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10483--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10483--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10483--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10483--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10483--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10484== 
==10484== HEAP SUMMARY:
==10484==     in use at exit: 3,137,387 bytes in 69,536 blocks
==10484==   total heap usage: 1,597,459 allocs, 1,527,923 frees, 129,063,211 bytes allocated
==10484== 
==10484== Searching for pointers to 69,536 not-freed blocks
--10484--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10484--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10484--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10484--   Scanning root segment: 0x4037000..0x403efff (32768)
--10484--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10484--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10484--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10484--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10484--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10484--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10484--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10484--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10484--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10484--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10484--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10484--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10484--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10484--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10484--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10484--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10484--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10484--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10484--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10484--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10484--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10484--   Scanning root segment: 0x701a000..0x701afff (4096)
--10484--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10484--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10484--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10484--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10484--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10484--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10484--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10484--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10484--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10484--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10483== Checked 4,786,960 bytes
==10483== 
==10483== LEAK SUMMARY:
==10483==    definitely lost: 2,205 bytes in 14 blocks
==10483==    indirectly lost: 6,756 bytes in 7 blocks
==10483==      possibly lost: 0 bytes in 0 blocks
==10483==    still reachable: 3,102,903 bytes in 68,907 blocks
==10483==         suppressed: 0 bytes in 0 blocks
==10483== Rerun with --leak-check=full to see details of leaked memory
==10483== 
==10483== Use --track-origins=yes to see where uninitialised values come from
==10483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10483== 
==10483== 1 errors in context 1 of 2:
==10483== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10483==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10483==    by 0x488CD0: stringsubst (subst.c:301)
==10483==    by 0x48801B: prefork (subst.c:77)
==10483==    by 0x42B318: execcmd (exec.c:2619)
==10483==    by 0x428CA0: execpline2 (exec.c:1697)
==10483==    by 0x427FD2: execpline (exec.c:1484)
==10483==    by 0x427756: execlist (exec.c:1267)
==10483==    by 0x42717C: execode (exec.c:1073)
==10483==    by 0x431299: runshfunc (exec.c:5040)
==10483==    by 0x430E76: doshfunc (exec.c:4920)
==10483==    by 0x4302FB: execshfunc (exec.c:4557)
==10483==    by 0x42D8C1: execcmd (exec.c:3373)
==10483== 
==10483== 
==10483== 2 errors in context 2 of 2:
==10483== Conditional jump or move depends on uninitialised value(s)
==10483==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10483==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10483==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10483==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10483==    by 0x42D8E9: execcmd (exec.c:3378)
==10483==    by 0x428CA0: execpline2 (exec.c:1697)
==10483==    by 0x427FD2: execpline (exec.c:1484)
==10483==    by 0x42779A: execlist (exec.c:1275)
==10483==    by 0x42717C: execode (exec.c:1073)
==10483==    by 0x431299: runshfunc (exec.c:5040)
==10483==    by 0x430E76: doshfunc (exec.c:4920)
==10483==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10483== 
==10483== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10484== Checked 4,839,360 bytes
==10484== 
client request: code 4d430005,  addr 0xFFEFF617C,  len 4
==10484== LEAK SUMMARY:
==10484==    definitely lost: 2,221 bytes in 14 blocks
==10484==    indirectly lost: 6,796 bytes in 9 blocks
==10484==      possibly lost: 0 bytes in 0 blocks
==10484==    still reachable: 3,128,370 bytes in 69,513 blocks
==10484==         suppressed: 0 bytes in 0 blocks
==10484== Rerun with --leak-check=full to see details of leaked memory
==10484== 
==10484== Use --track-origins=yes to see where uninitialised values come from
==10484== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10484== 
==10484== 1 errors in context 1 of 2:
==10484== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10484==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10484==    by 0x488CD0: stringsubst (subst.c:301)
==10484==    by 0x48801B: prefork (subst.c:77)
==10484==    by 0x42B318: execcmd (exec.c:2619)
==10484==    by 0x428CA0: execpline2 (exec.c:1697)
==10484==    by 0x427FD2: execpline (exec.c:1484)
==10484==    by 0x427756: execlist (exec.c:1267)
==10484==    by 0x42717C: execode (exec.c:1073)
==10484==    by 0x431299: runshfunc (exec.c:5040)
==10484==    by 0x430E76: doshfunc (exec.c:4920)
==10484==    by 0x4302FB: execshfunc (exec.c:4557)
==10484==    by 0x42D8C1: execcmd (exec.c:3373)
==10484== 
==10484== 
==10484== 2 errors in context 2 of 2:
==10484== Conditional jump or move depends on uninitialised value(s)
==10484==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10484==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10484==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10484==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10484==    by 0x42D8E9: execcmd (exec.c:3378)
==10484==    by 0x428CA0: execpline2 (exec.c:1697)
==10484==    by 0x427FD2: execpline (exec.c:1484)
==10484==    by 0x42779A: execlist (exec.c:1275)
==10484==    by 0x42717C: execode (exec.c:1073)
==10484==    by 0x431299: runshfunc (exec.c:5040)
==10484==    by 0x430E76: doshfunc (exec.c:4920)
==10484==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10484== 
==10484== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10486== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10486-by-pythonnut-on-???
==10486== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10486-by-pythonnut-on-???
==10486== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10486-by-pythonnut-on-???
==10486== 
==10486== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10486== don't want to do, unless you know exactly what you're doing,
==10486== or are doing some strange experiment):
==10486==   /usr/lib/valgrind/../../bin/vgdb --pid=10486 ...command...
==10486== 
==10486== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10486==   /path/to/gdb ./zsh
==10486== and then give GDB the following command
==10486==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10486
==10486== --pid is optional if only one valgrind process is running
==10486== 
--10486-- Caught __NR_exit; running __libc_freeres()
==10487== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10487-by-pythonnut-on-???
==10487== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10487-by-pythonnut-on-???
==10487== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10487-by-pythonnut-on-???
==10487== 
==10487== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10487== don't want to do, unless you know exactly what you're doing,
==10487== or are doing some strange experiment):
==10487==   /usr/lib/valgrind/../../bin/vgdb --pid=10487 ...command...
==10487== 
==10487== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10487==   /path/to/gdb ./zsh
==10487== and then give GDB the following command
==10487==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10487
==10487== --pid is optional if only one valgrind process is running
==10487== 
--10486-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10486== 
==10489== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10489-by-pythonnut-on-???
==10489== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10489-by-pythonnut-on-???
==10489== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10489-by-pythonnut-on-???
==10489== 
==10489== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10489== don't want to do, unless you know exactly what you're doing,
==10489== or are doing some strange experiment):
==10489==   /usr/lib/valgrind/../../bin/vgdb --pid=10489 ...command...
==10489== 
==10489== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10489==   /path/to/gdb ./zsh
==10489== and then give GDB the following command
==10489==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10489
==10489== --pid is optional if only one valgrind process is running
==10489== 
==10486== HEAP SUMMARY:
==10486==     in use at exit: 3,137,386 bytes in 69,536 blocks
==10486==   total heap usage: 1,597,464 allocs, 1,527,928 frees, 129,065,324 bytes allocated
==10486== 
==10490== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10490-by-pythonnut-on-???
==10490== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10490-by-pythonnut-on-???
==10490== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10490-by-pythonnut-on-???
==10490== 
==10490== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10490== don't want to do, unless you know exactly what you're doing,
==10490== or are doing some strange experiment):
==10490==   /usr/lib/valgrind/../../bin/vgdb --pid=10490 ...command...
==10490== 
==10490== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10490==   /path/to/gdb ./zsh
==10490== and then give GDB the following command
==10490==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10490
==10490== --pid is optional if only one valgrind process is running
==10490== 
--10491-- Caught __NR_exit; running __libc_freeres()
==10486== Searching for pointers to 69,536 not-freed blocks
--10486--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10486--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10486--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10486--   Scanning root segment: 0x4037000..0x403efff (32768)
--10486--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10486--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10486--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10486--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10486--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10486--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10486--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10486--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10486--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10486--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10486--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10486--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10486--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10486--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10486--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10486--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10486--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10491== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10491-by-pythonnut-on-???
--10486--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
==10491== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10491-by-pythonnut-on-???
==10491== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10491-by-pythonnut-on-???
==10491== 
==10491== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10491== don't want to do, unless you know exactly what you're doing,
==10491== or are doing some strange experiment):
==10491==   /usr/lib/valgrind/../../bin/vgdb --pid=10491 ...command...
==10491== 
==10491== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10491==   /path/to/gdb ./zsh
==10491== and then give GDB the following command
==10491==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10491
--10486--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
==10491== --pid is optional if only one valgrind process is running
==10491== 
--10486--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10486--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10486--   Scanning root segment: 0x701a000..0x701afff (4096)
--10486--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10486--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10486--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10486--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10486--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10486--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10486--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10486--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10486--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10486--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF493C,  len 4
client request: code 4d430005,  addr 0xFFEFF028C,  len 4
--10491-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10493-- Caught __NR_exit; running __libc_freeres()
==10491== 
==10491== HEAP SUMMARY:
==10491==     in use at exit: 3,113,243 bytes in 68,982 blocks
==10491==   total heap usage: 1,603,281 allocs, 1,534,299 frees, 129,674,131 bytes allocated
==10491== 
==10493== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10493-by-pythonnut-on-???
==10493== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10493-by-pythonnut-on-???
==10493== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10493-by-pythonnut-on-???
==10493== 
==10493== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10493== don't want to do, unless you know exactly what you're doing,
==10493== or are doing some strange experiment):
==10493==   /usr/lib/valgrind/../../bin/vgdb --pid=10493 ...command...
==10493== 
==10493== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10493==   /path/to/gdb ./zsh
==10493== and then give GDB the following command
==10493==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10493
==10493== --pid is optional if only one valgrind process is running
==10493== 
--10493-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10491== Searching for pointers to 68,982 not-freed blocks
--10491--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10491--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10491--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10491--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10491--   Scanning root segment: 0x4222000..0x4222fff (4096)
==10493== 
--10491--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10491--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10491--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10491--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10491--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10491--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10491--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10491--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10491--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10491--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10491--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10491--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10491--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10491--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10491--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10491--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10491--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10491--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10491--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10491--   Scanning root segment: 0x701a000..0x701afff (4096)
--10491--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10491--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10491--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10491--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10491--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10491--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10491--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10491--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10491--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10491--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10493== HEAP SUMMARY:
==10493==     in use at exit: 3,114,432 bytes in 68,971 blocks
==10493==   total heap usage: 1,603,267 allocs, 1,534,296 frees, 129,785,031 bytes allocated
==10493== 
==10493== Searching for pointers to 68,971 not-freed blocks
--10493--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10493--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10493--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10493--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10493--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10493--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10493--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10493--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10493--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10493--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10493--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10493--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10493--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10493--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10493--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10493--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10493--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10493--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10493--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10493--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10493--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10493--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10493--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10493--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10493--   Scanning root segment: 0x701a000..0x701afff (4096)
--10493--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10493--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10493--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10493--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10493--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10493--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10493--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10493--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10493--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10493--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10486== Checked 4,839,360 bytes
==10486== 
==10486== LEAK SUMMARY:
==10486==    definitely lost: 2,221 bytes in 14 blocks
==10486==    indirectly lost: 6,796 bytes in 9 blocks
==10486==      possibly lost: 0 bytes in 0 blocks
==10486==    still reachable: 3,128,369 bytes in 69,513 blocks
==10486==         suppressed: 0 bytes in 0 blocks
==10486== Rerun with --leak-check=full to see details of leaked memory
==10486== 
==10486== Use --track-origins=yes to see where uninitialised values come from
==10486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10486== 
==10486== 1 errors in context 1 of 2:
==10486== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10486==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10486==    by 0x488CD0: stringsubst (subst.c:301)
==10486==    by 0x48801B: prefork (subst.c:77)
==10486==    by 0x42B318: execcmd (exec.c:2619)
==10486==    by 0x428CA0: execpline2 (exec.c:1697)
==10486==    by 0x427FD2: execpline (exec.c:1484)
==10486==    by 0x427756: execlist (exec.c:1267)
==10486==    by 0x42717C: execode (exec.c:1073)
==10486==    by 0x431299: runshfunc (exec.c:5040)
==10486==    by 0x430E76: doshfunc (exec.c:4920)
==10486==    by 0x4302FB: execshfunc (exec.c:4557)
==10486==    by 0x42D8C1: execcmd (exec.c:3373)
==10486== 
==10486== 
==10486== 2 errors in context 2 of 2:
==10486== Conditional jump or move depends on uninitialised value(s)
==10486==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10486==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10486==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10486==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10486==    by 0x42D8E9: execcmd (exec.c:3378)
==10486==    by 0x428CA0: execpline2 (exec.c:1697)
==10486==    by 0x427FD2: execpline (exec.c:1484)
==10486==    by 0x42779A: execlist (exec.c:1275)
==10486==    by 0x42717C: execode (exec.c:1073)
==10486==    by 0x431299: runshfunc (exec.c:5040)
==10486==    by 0x430E76: doshfunc (exec.c:4920)
==10486==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10486== 
==10486== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10495== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10495-by-pythonnut-on-???
==10495== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10495-by-pythonnut-on-???
==10495== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10495-by-pythonnut-on-???
==10495== 
==10495== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10495== don't want to do, unless you know exactly what you're doing,
==10495== or are doing some strange experiment):
==10495==   /usr/lib/valgrind/../../bin/vgdb --pid=10495 ...command...
==10495== 
==10495== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10495==   /path/to/gdb ./zsh
==10495== and then give GDB the following command
==10495==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10495
==10495== --pid is optional if only one valgrind process is running
==10495== 
--10495-- Caught __NR_exit; running __libc_freeres()
==10491== Checked 4,789,608 bytes
==10491== 
==10491== LEAK SUMMARY:
==10491==    definitely lost: 2,205 bytes in 14 blocks
==10491==    indirectly lost: 6,756 bytes in 7 blocks
==10491==      possibly lost: 0 bytes in 0 blocks
==10491==    still reachable: 3,104,282 bytes in 68,961 blocks
==10491==         suppressed: 0 bytes in 0 blocks
==10491== Rerun with --leak-check=full to see details of leaked memory
==10491== 
==10491== Use --track-origins=yes to see where uninitialised values come from
==10491== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10491== 
==10491== 1 errors in context 1 of 2:
==10491== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10491==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10491==    by 0x488CD0: stringsubst (subst.c:301)
==10491==    by 0x48801B: prefork (subst.c:77)
==10491==    by 0x42B318: execcmd (exec.c:2619)
==10491==    by 0x428CA0: execpline2 (exec.c:1697)
==10491==    by 0x427FD2: execpline (exec.c:1484)
==10491==    by 0x427756: execlist (exec.c:1267)
==10491==    by 0x42717C: execode (exec.c:1073)
==10491==    by 0x431299: runshfunc (exec.c:5040)
==10491==    by 0x430E76: doshfunc (exec.c:4920)
==10491==    by 0x4302FB: execshfunc (exec.c:4557)
==10491==    by 0x42D8C1: execcmd (exec.c:3373)
==10491== 
==10491== 
==10491== 2 errors in context 2 of 2:
==10491== Conditional jump or move depends on uninitialised value(s)
==10491==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10491==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10491==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10491==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10491==    by 0x42D8E9: execcmd (exec.c:3378)
==10491==    by 0x428CA0: execpline2 (exec.c:1697)
==10491==    by 0x427FD2: execpline (exec.c:1484)
==10491==    by 0x42779A: execlist (exec.c:1275)
==10491==    by 0x42717C: execode (exec.c:1073)
==10491==    by 0x431299: runshfunc (exec.c:5040)
==10491==    by 0x430E76: doshfunc (exec.c:4920)
==10491==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10491== 
==10491== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10495-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10488-- Caught __NR_exit; running __libc_freeres()
==10495== 
==10493== Checked 4,775,464 bytes
==10493== 
==10495== HEAP SUMMARY:
==10495==     in use at exit: 3,137,385 bytes in 69,536 blocks
==10495==   total heap usage: 1,597,469 allocs, 1,527,933 frees, 129,067,437 bytes allocated
==10495== 
==10488== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10488-by-pythonnut-on-???
==10488== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10488-by-pythonnut-on-???
==10488== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10488-by-pythonnut-on-???
==10488== 
==10488== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10488== don't want to do, unless you know exactly what you're doing,
==10488== or are doing some strange experiment):
==10488==   /usr/lib/valgrind/../../bin/vgdb --pid=10488 ...command...
==10488== 
==10488== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10488==   /path/to/gdb ./zsh
==10488== and then give GDB the following command
==10488==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10488
==10488== --pid is optional if only one valgrind process is running
==10488== 
--10488-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10493== LEAK SUMMARY:
==10493==    definitely lost: 2,205 bytes in 14 blocks
==10493==    indirectly lost: 6,756 bytes in 7 blocks
==10493==      possibly lost: 0 bytes in 0 blocks
==10493==    still reachable: 3,105,471 bytes in 68,950 blocks
==10493==         suppressed: 0 bytes in 0 blocks
==10493== Rerun with --leak-check=full to see details of leaked memory
==10493== 
==10493== Use --track-origins=yes to see where uninitialised values come from
==10493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10493== 
==10493== 1 errors in context 1 of 2:
==10493== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10493==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10493==    by 0x488CD0: stringsubst (subst.c:301)
==10493==    by 0x48801B: prefork (subst.c:77)
==10493==    by 0x42B318: execcmd (exec.c:2619)
==10493==    by 0x428CA0: execpline2 (exec.c:1697)
==10493==    by 0x427FD2: execpline (exec.c:1484)
==10493==    by 0x427756: execlist (exec.c:1267)
==10493==    by 0x42717C: execode (exec.c:1073)
==10493==    by 0x431299: runshfunc (exec.c:5040)
==10493==    by 0x430E76: doshfunc (exec.c:4920)
==10493==    by 0x4302FB: execshfunc (exec.c:4557)
==10493==    by 0x42D8C1: execcmd (exec.c:3373)
==10493== 
==10493== 
==10493== 2 errors in context 2 of 2:
==10493== Conditional jump or move depends on uninitialised value(s)
==10493==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10493==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10493==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10493==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10493==    by 0x42D8E9: execcmd (exec.c:3378)
==10493==    by 0x428CA0: execpline2 (exec.c:1697)
==10493==    by 0x427FD2: execpline (exec.c:1484)
==10493==    by 0x42779A: execlist (exec.c:1275)
==10493==    by 0x42717C: execode (exec.c:1073)
==10493==    by 0x431299: runshfunc (exec.c:5040)
==10493==    by 0x430E76: doshfunc (exec.c:4920)
==10493==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10493== 
==10493== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10488== 
==10488== HEAP SUMMARY:
==10488==     in use at exit: 3,113,179 bytes in 68,979 blocks
==10488==   total heap usage: 1,603,279 allocs, 1,534,300 frees, 129,673,890 bytes allocated
==10488== 
==10495== Searching for pointers to 69,536 not-freed blocks
--10495--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10495--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10495--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10495--   Scanning root segment: 0x4037000..0x403efff (32768)
--10495--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10495--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10495--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10495--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10495--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10495--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10495--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10495--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10495--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10495--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10495--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10495--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10495--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10495--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10495--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10495--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10495--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10495--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10495--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10495--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10495--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10495--   Scanning root segment: 0x701a000..0x701afff (4096)
--10495--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10495--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10495--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10495--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10495--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10495--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10495--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10495--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10495--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10495--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF073C,  len 4
==10488== Searching for pointers to 68,979 not-freed blocks
--10488--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10488--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10488--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10488--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10488--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10488--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10488--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10488--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10488--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10488--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10488--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10488--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10488--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10488--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10488--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10488--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10488--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10488--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10488--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10488--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10488--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10488--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10488--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10488--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10488--   Scanning root segment: 0x701a000..0x701afff (4096)
--10488--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10488--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10488--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10488--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10488--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10488--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10488--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10488--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10488--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10488--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10495== Checked 4,839,360 bytes
==10495== 
==10488== Checked 4,788,920 bytes
==10488== 
==10495== LEAK SUMMARY:
==10495==    definitely lost: 2,221 bytes in 14 blocks
==10495==    indirectly lost: 6,796 bytes in 9 blocks
==10495==      possibly lost: 0 bytes in 0 blocks
==10495==    still reachable: 3,128,368 bytes in 69,513 blocks
==10495==         suppressed: 0 bytes in 0 blocks
==10495== Rerun with --leak-check=full to see details of leaked memory
==10495== 
==10495== Use --track-origins=yes to see where uninitialised values come from
==10495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10495== 
==10495== 1 errors in context 1 of 2:
==10495== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10495==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10495==    by 0x488CD0: stringsubst (subst.c:301)
==10495==    by 0x48801B: prefork (subst.c:77)
==10495==    by 0x42B318: execcmd (exec.c:2619)
==10495==    by 0x428CA0: execpline2 (exec.c:1697)
==10495==    by 0x427FD2: execpline (exec.c:1484)
==10495==    by 0x427756: execlist (exec.c:1267)
==10495==    by 0x42717C: execode (exec.c:1073)
==10495==    by 0x431299: runshfunc (exec.c:5040)
==10495==    by 0x430E76: doshfunc (exec.c:4920)
==10495==    by 0x4302FB: execshfunc (exec.c:4557)
==10495==    by 0x42D8C1: execcmd (exec.c:3373)
==10495== 
==10495== 
==10495== 2 errors in context 2 of 2:
==10495== Conditional jump or move depends on uninitialised value(s)
==10495==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10495==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10495==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10495==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10495==    by 0x42D8E9: execcmd (exec.c:3378)
==10495==    by 0x428CA0: execpline2 (exec.c:1697)
==10495==    by 0x427FD2: execpline (exec.c:1484)
==10495==    by 0x42779A: execlist (exec.c:1275)
==10495==    by 0x42717C: execode (exec.c:1073)
==10495==    by 0x431299: runshfunc (exec.c:5040)
==10495==    by 0x430E76: doshfunc (exec.c:4920)
==10495==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10495== 
==10495== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10536== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10536-by-pythonnut-on-???
==10536== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10536-by-pythonnut-on-???
==10536== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10536-by-pythonnut-on-???
==10536== 
==10536== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10536== don't want to do, unless you know exactly what you're doing,
==10536== or are doing some strange experiment):
==10536==   /usr/lib/valgrind/../../bin/vgdb --pid=10536 ...command...
==10536== 
==10536== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10536==   /path/to/gdb ./zsh
==10536== and then give GDB the following command
==10536==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10536
==10536== --pid is optional if only one valgrind process is running
==10536== 
--10536-- Caught __NR_exit; running __libc_freeres()
==10488== LEAK SUMMARY:
==10488==    definitely lost: 2,205 bytes in 14 blocks
==10488==    indirectly lost: 6,756 bytes in 7 blocks
==10488==      possibly lost: 0 bytes in 0 blocks
==10488==    still reachable: 3,104,218 bytes in 68,958 blocks
==10488==         suppressed: 0 bytes in 0 blocks
==10488== Rerun with --leak-check=full to see details of leaked memory
==10488== 
==10488== Use --track-origins=yes to see where uninitialised values come from
==10488== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10488== 
==10488== 1 errors in context 1 of 2:
==10488== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10488==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10488==    by 0x488CD0: stringsubst (subst.c:301)
==10488==    by 0x48801B: prefork (subst.c:77)
==10488==    by 0x42B318: execcmd (exec.c:2619)
==10488==    by 0x428CA0: execpline2 (exec.c:1697)
==10488==    by 0x427FD2: execpline (exec.c:1484)
==10488==    by 0x427756: execlist (exec.c:1267)
==10488==    by 0x42717C: execode (exec.c:1073)
==10488==    by 0x431299: runshfunc (exec.c:5040)
==10488==    by 0x430E76: doshfunc (exec.c:4920)
==10488==    by 0x4302FB: execshfunc (exec.c:4557)
==10488==    by 0x42D8C1: execcmd (exec.c:3373)
==10488== 
==10488== 
==10488== 2 errors in context 2 of 2:
==10488== Conditional jump or move depends on uninitialised value(s)
==10488==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10488==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10488==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10488==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10488==    by 0x42D8E9: execcmd (exec.c:3378)
==10488==    by 0x428CA0: execpline2 (exec.c:1697)
==10488==    by 0x427FD2: execpline (exec.c:1484)
==10488==    by 0x42779A: execlist (exec.c:1275)
==10488==    by 0x42717C: execode (exec.c:1073)
==10488==    by 0x431299: runshfunc (exec.c:5040)
==10488==    by 0x430E76: doshfunc (exec.c:4920)
==10488==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10488== 
==10488== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10547== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10547-by-pythonnut-on-???
==10547== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10547-by-pythonnut-on-???
==10547== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10547-by-pythonnut-on-???
==10547== 
==10547== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10547== don't want to do, unless you know exactly what you're doing,
==10547== or are doing some strange experiment):
==10547==   /usr/lib/valgrind/../../bin/vgdb --pid=10547 ...command...
==10547== 
==10547== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10547==   /path/to/gdb ./zsh
==10547== and then give GDB the following command
==10547==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10547
==10547== --pid is optional if only one valgrind process is running
==10547== 
--10547-- Caught __NR_exit; running __libc_freeres()
--10496-- Caught __NR_exit; running __libc_freeres()
--10536-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10536== 
==10536== HEAP SUMMARY:
==10536==     in use at exit: 3,137,384 bytes in 69,536 blocks
==10536==   total heap usage: 1,597,474 allocs, 1,527,938 frees, 129,069,550 bytes allocated
==10536== 
==10496== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10496-by-pythonnut-on-???
==10496== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10496-by-pythonnut-on-???
==10496== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10496-by-pythonnut-on-???
==10496== 
==10496== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10496== don't want to do, unless you know exactly what you're doing,
==10496== or are doing some strange experiment):
==10496==   /usr/lib/valgrind/../../bin/vgdb --pid=10496 ...command...
==10496== 
==10496== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10496==   /path/to/gdb ./zsh
==10496== and then give GDB the following command
==10496==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10496
==10496== --pid is optional if only one valgrind process is running
==10496== 
--10547-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10496-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10547== 
==10496== 
==10547== HEAP SUMMARY:
==10547==     in use at exit: 3,113,186 bytes in 68,979 blocks
==10547==   total heap usage: 1,603,294 allocs, 1,534,315 frees, 129,678,888 bytes allocated
==10547== 
==10496== HEAP SUMMARY:
==10496==     in use at exit: 3,114,823 bytes in 68,979 blocks
==10496==   total heap usage: 1,603,283 allocs, 1,534,304 frees, 129,789,142 bytes allocated
==10496== 
==10536== Searching for pointers to 69,536 not-freed blocks
--10536--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10536--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10536--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10536--   Scanning root segment: 0x4037000..0x403efff (32768)
--10536--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10536--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10536--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10536--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10536--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10536--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10536--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10536--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10536--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10536--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10536--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10536--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10536--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10536--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10536--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10536--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10536--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10536--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10536--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10536--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10536--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10536--   Scanning root segment: 0x701a000..0x701afff (4096)
--10536--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10536--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10536--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10536--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10536--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10536--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10536--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10536--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10536--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10536--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10496== Searching for pointers to 68,979 not-freed blocks
==10547== Searching for pointers to 68,979 not-freed blocks
--10496--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10547--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10496--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10547--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10496--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10547--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10547--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10496--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10547--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10496--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10547--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10496--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10547--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10496--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10547--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10496--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10547--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10547--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10496--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10547--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10496--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10547--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10496--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10547--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10547--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10496--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10547--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10547--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10496--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10547--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10496--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10496--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10547--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10496--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10547--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10496--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10547--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10496--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10496--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10496--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10547--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10547--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10547--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10547--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10496--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10547--   Scanning root segment: 0x701a000..0x701afff (4096)
--10496--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10547--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10496--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10496--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10547--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10547--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10496--   Scanning root segment: 0x701a000..0x701afff (4096)
--10496--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10496--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10547--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10496--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10547--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10496--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10547--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10496--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10547--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10496--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10547--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10496--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10496--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10547--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10547--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10496--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10496--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10536== Checked 4,839,360 bytes
==10536== 
==10496== Checked 4,775,568 bytes
==10547== Checked 4,789,056 bytes
==10496== 
==10547== 
==10536== LEAK SUMMARY:
==10536==    definitely lost: 2,221 bytes in 14 blocks
==10536==    indirectly lost: 6,796 bytes in 9 blocks
==10536==      possibly lost: 0 bytes in 0 blocks
==10536==    still reachable: 3,128,367 bytes in 69,513 blocks
==10536==         suppressed: 0 bytes in 0 blocks
==10536== Rerun with --leak-check=full to see details of leaked memory
==10536== 
==10536== Use --track-origins=yes to see where uninitialised values come from
==10536== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10536== 
==10536== 1 errors in context 1 of 2:
==10536== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10536==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10536==    by 0x488CD0: stringsubst (subst.c:301)
==10536==    by 0x48801B: prefork (subst.c:77)
==10536==    by 0x42B318: execcmd (exec.c:2619)
==10536==    by 0x428CA0: execpline2 (exec.c:1697)
==10536==    by 0x427FD2: execpline (exec.c:1484)
==10536==    by 0x427756: execlist (exec.c:1267)
==10536==    by 0x42717C: execode (exec.c:1073)
==10536==    by 0x431299: runshfunc (exec.c:5040)
==10536==    by 0x430E76: doshfunc (exec.c:4920)
==10536==    by 0x4302FB: execshfunc (exec.c:4557)
==10536==    by 0x42D8C1: execcmd (exec.c:3373)
==10536== 
==10536== 
==10536== 2 errors in context 2 of 2:
==10536== Conditional jump or move depends on uninitialised value(s)
==10536==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10536==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10536==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10536==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10536==    by 0x42D8E9: execcmd (exec.c:3378)
==10536==    by 0x428CA0: execpline2 (exec.c:1697)
==10536==    by 0x427FD2: execpline (exec.c:1484)
==10536==    by 0x42779A: execlist (exec.c:1275)
==10536==    by 0x42717C: execode (exec.c:1073)
==10536==    by 0x431299: runshfunc (exec.c:5040)
==10536==    by 0x430E76: doshfunc (exec.c:4920)
==10536==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10536== 
==10536== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10548-by-pythonnut-on-???
==10548== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10548-by-pythonnut-on-???
==10548== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10548-by-pythonnut-on-???
==10548== 
==10548== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10548== don't want to do, unless you know exactly what you're doing,
==10548== or are doing some strange experiment):
==10548==   /usr/lib/valgrind/../../bin/vgdb --pid=10548 ...command...
==10548== 
==10548== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10548==   /path/to/gdb ./zsh
==10548== and then give GDB the following command
==10548==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10548
==10548== --pid is optional if only one valgrind process is running
==10548== 
==10496== LEAK SUMMARY:
==10547== LEAK SUMMARY:
==10496==    definitely lost: 2,205 bytes in 14 blocks
==10547==    definitely lost: 2,205 bytes in 14 blocks
==10496==    indirectly lost: 6,756 bytes in 7 blocks
==10547==    indirectly lost: 6,756 bytes in 7 blocks
==10496==      possibly lost: 0 bytes in 0 blocks
==10547==      possibly lost: 0 bytes in 0 blocks
==10496==    still reachable: 3,105,862 bytes in 68,958 blocks
==10547==    still reachable: 3,104,225 bytes in 68,958 blocks
==10496==         suppressed: 0 bytes in 0 blocks
==10547==         suppressed: 0 bytes in 0 blocks
==10496== Rerun with --leak-check=full to see details of leaked memory
==10547== Rerun with --leak-check=full to see details of leaked memory
==10496== 
==10547== 
==10496== Use --track-origins=yes to see where uninitialised values come from
==10496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10496== 
==10496== 1 errors in context 1 of 2:
==10496== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10547== Use --track-origins=yes to see where uninitialised values come from
==10547== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10547== 
==10547== 1 errors in context 1 of 2:
==10547== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10496==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10547==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10496==    by 0x488CD0: stringsubst (subst.c:301)
==10547==    by 0x488CD0: stringsubst (subst.c:301)
==10496==    by 0x48801B: prefork (subst.c:77)
==10547==    by 0x48801B: prefork (subst.c:77)
==10547==    by 0x42B318: execcmd (exec.c:2619)
==10496==    by 0x42B318: execcmd (exec.c:2619)
==10547==    by 0x428CA0: execpline2 (exec.c:1697)
==10496==    by 0x428CA0: execpline2 (exec.c:1697)
==10547==    by 0x427FD2: execpline (exec.c:1484)
==10496==    by 0x427FD2: execpline (exec.c:1484)
==10547==    by 0x427756: execlist (exec.c:1267)
==10496==    by 0x427756: execlist (exec.c:1267)
==10547==    by 0x42717C: execode (exec.c:1073)
==10496==    by 0x42717C: execode (exec.c:1073)
==10547==    by 0x431299: runshfunc (exec.c:5040)
==10496==    by 0x431299: runshfunc (exec.c:5040)
==10547==    by 0x430E76: doshfunc (exec.c:4920)
==10496==    by 0x430E76: doshfunc (exec.c:4920)
==10547==    by 0x4302FB: execshfunc (exec.c:4557)
==10496==    by 0x4302FB: execshfunc (exec.c:4557)
==10547==    by 0x42D8C1: execcmd (exec.c:3373)
==10496==    by 0x42D8C1: execcmd (exec.c:3373)
==10547== 
==10496== 
==10547== 
==10496== 
==10547== 2 errors in context 2 of 2:
==10496== 2 errors in context 2 of 2:
==10547== Conditional jump or move depends on uninitialised value(s)
==10496== Conditional jump or move depends on uninitialised value(s)
==10547==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10496==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10547==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10496==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10547==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10496==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10547==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10496==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10547==    by 0x42D8E9: execcmd (exec.c:3378)
==10496==    by 0x42D8E9: execcmd (exec.c:3378)
==10547==    by 0x428CA0: execpline2 (exec.c:1697)
==10496==    by 0x428CA0: execpline2 (exec.c:1697)
==10547==    by 0x427FD2: execpline (exec.c:1484)
==10496==    by 0x427FD2: execpline (exec.c:1484)
==10547==    by 0x42779A: execlist (exec.c:1275)
==10496==    by 0x42779A: execlist (exec.c:1275)
==10547==    by 0x42717C: execode (exec.c:1073)
==10496==    by 0x42717C: execode (exec.c:1073)
==10547==    by 0x431299: runshfunc (exec.c:5040)
==10496==    by 0x431299: runshfunc (exec.c:5040)
==10547==    by 0x430E76: doshfunc (exec.c:4920)
==10496==    by 0x430E76: doshfunc (exec.c:4920)
==10547==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10496==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10547== 
==10496== 
==10547== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10496== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10548-- Caught __NR_exit; running __libc_freeres()
--10490-- Caught __NR_exit; running __libc_freeres()
--10549-- Caught __NR_exit; running __libc_freeres()
--10548-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10490-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10549== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10549-by-pythonnut-on-???
==10549== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10549-by-pythonnut-on-???
==10549== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10549-by-pythonnut-on-???
==10549== 
==10549== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10549== don't want to do, unless you know exactly what you're doing,
==10549== or are doing some strange experiment):
==10549==   /usr/lib/valgrind/../../bin/vgdb --pid=10549 ...command...
==10549== 
==10549== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10549==   /path/to/gdb ./zsh
==10549== and then give GDB the following command
==10549==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10549
==10549== --pid is optional if only one valgrind process is running
==10549== 
==10548== 
==10548== HEAP SUMMARY:
==10548==     in use at exit: 3,137,383 bytes in 69,536 blocks
==10548==   total heap usage: 1,597,482 allocs, 1,527,946 frees, 129,073,203 bytes allocated
==10548== 
==10490== 
==10490== HEAP SUMMARY:
==10490==     in use at exit: 3,113,961 bytes in 68,960 blocks
==10490==   total heap usage: 1,603,292 allocs, 1,534,332 frees, 129,791,145 bytes allocated
==10490== 
--10549-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10549== 
==10549== HEAP SUMMARY:
==10549==     in use at exit: 3,113,346 bytes in 68,980 blocks
==10549==   total heap usage: 1,603,311 allocs, 1,534,331 frees, 129,683,739 bytes allocated
==10549== 
==10548== Searching for pointers to 69,536 not-freed blocks
--10548--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10548--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10548--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10548--   Scanning root segment: 0x4037000..0x403efff (32768)
--10548--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10548--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10548--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10548--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10548--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10548--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10548--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10548--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10548--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10548--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10548--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10548--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10548--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10548--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10548--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10548--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10548--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10548--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10548--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10548--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10548--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10548--   Scanning root segment: 0x701a000..0x701afff (4096)
--10548--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10548--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10548--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10548--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10548--   Scanning root segment: 0xb268000..0xb268fff (4096)
==10490== Searching for pointers to 68,960 not-freed blocks
--10490--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10548--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10548--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10548--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10548--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10490--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10548--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10490--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10490--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10490--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10490--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10490--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10490--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10490--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10490--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10490--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10490--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10490--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10490--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10490--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10490--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10490--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10490--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10490--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10490--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10490--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10490--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10490--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10490--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10490--   Scanning root segment: 0x701a000..0x701afff (4096)
--10490--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10490--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10490--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10490--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10490--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10490--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10490--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10490--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10490--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10490--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10549== Searching for pointers to 68,980 not-freed blocks
--10549--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10549--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10549--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10549--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10549--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10549--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10549--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10549--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10549--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10549--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10549--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10549--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10549--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10549--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10549--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10549--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10549--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10549--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10549--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10549--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10549--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10549--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10549--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10549--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10549--   Scanning root segment: 0x701a000..0x701afff (4096)
--10549--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10549--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10549--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10549--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10549--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10549--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10549--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10549--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10549--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10549--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10490== Checked 4,772,952 bytes
==10490== 
==10548== Checked 4,839,360 bytes
==10548== 
==10549== Checked 4,788,400 bytes
==10549== 
==10490== LEAK SUMMARY:
==10490==    definitely lost: 2,205 bytes in 14 blocks
==10490==    indirectly lost: 6,756 bytes in 7 blocks
==10490==      possibly lost: 0 bytes in 0 blocks
==10490==    still reachable: 3,105,000 bytes in 68,939 blocks
==10490==         suppressed: 0 bytes in 0 blocks
==10490== Rerun with --leak-check=full to see details of leaked memory
==10490== 
==10490== Use --track-origins=yes to see where uninitialised values come from
==10490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10490== 
==10490== 1 errors in context 1 of 2:
==10490== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10490==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10490==    by 0x488CD0: stringsubst (subst.c:301)
==10490==    by 0x48801B: prefork (subst.c:77)
==10490==    by 0x42B318: execcmd (exec.c:2619)
==10490==    by 0x428CA0: execpline2 (exec.c:1697)
==10490==    by 0x427FD2: execpline (exec.c:1484)
==10490==    by 0x427756: execlist (exec.c:1267)
==10490==    by 0x42717C: execode (exec.c:1073)
==10490==    by 0x431299: runshfunc (exec.c:5040)
==10490==    by 0x430E76: doshfunc (exec.c:4920)
==10490==    by 0x4302FB: execshfunc (exec.c:4557)
==10490==    by 0x42D8C1: execcmd (exec.c:3373)
==10490== 
==10490== 
==10490== 2 errors in context 2 of 2:
==10490== Conditional jump or move depends on uninitialised value(s)
==10490==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10490==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10490==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10490==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10490==    by 0x42D8E9: execcmd (exec.c:3378)
==10490==    by 0x428CA0: execpline2 (exec.c:1697)
==10490==    by 0x427FD2: execpline (exec.c:1484)
==10490==    by 0x42779A: execlist (exec.c:1275)
==10490==    by 0x42717C: execode (exec.c:1073)
==10490==    by 0x431299: runshfunc (exec.c:5040)
==10490==    by 0x430E76: doshfunc (exec.c:4920)
==10490==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10490== 
==10490== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== LEAK SUMMARY:
==10548==    definitely lost: 2,221 bytes in 14 blocks
==10548==    indirectly lost: 6,796 bytes in 9 blocks
==10548==      possibly lost: 0 bytes in 0 blocks
==10548==    still reachable: 3,128,366 bytes in 69,513 blocks
==10548==         suppressed: 0 bytes in 0 blocks
==10548== Rerun with --leak-check=full to see details of leaked memory
==10548== 
==10548== Use --track-origins=yes to see where uninitialised values come from
==10548== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10548== 
==10548== 1 errors in context 1 of 2:
==10548== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10548==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10548==    by 0x488CD0: stringsubst (subst.c:301)
==10548==    by 0x48801B: prefork (subst.c:77)
==10548==    by 0x42B318: execcmd (exec.c:2619)
==10548==    by 0x428CA0: execpline2 (exec.c:1697)
==10548==    by 0x427FD2: execpline (exec.c:1484)
==10548==    by 0x427756: execlist (exec.c:1267)
==10548==    by 0x42717C: execode (exec.c:1073)
==10548==    by 0x431299: runshfunc (exec.c:5040)
==10548==    by 0x430E76: doshfunc (exec.c:4920)
==10548==    by 0x4302FB: execshfunc (exec.c:4557)
==10548==    by 0x42D8C1: execcmd (exec.c:3373)
==10548== 
==10548== 
==10548== 2 errors in context 2 of 2:
==10548== Conditional jump or move depends on uninitialised value(s)
==10548==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10548==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10548==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10548==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10548==    by 0x42D8E9: execcmd (exec.c:3378)
==10548==    by 0x428CA0: execpline2 (exec.c:1697)
==10548==    by 0x427FD2: execpline (exec.c:1484)
==10548==    by 0x42779A: execlist (exec.c:1275)
==10548==    by 0x42717C: execode (exec.c:1073)
==10548==    by 0x431299: runshfunc (exec.c:5040)
==10548==    by 0x430E76: doshfunc (exec.c:4920)
==10548==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10548== 
==10548== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10549== LEAK SUMMARY:
==10549==    definitely lost: 2,205 bytes in 14 blocks
==10549==    indirectly lost: 6,756 bytes in 7 blocks
==10549==      possibly lost: 0 bytes in 0 blocks
==10549==    still reachable: 3,104,385 bytes in 68,959 blocks
==10549==         suppressed: 0 bytes in 0 blocks
==10549== Rerun with --leak-check=full to see details of leaked memory
==10549== 
==10549== Use --track-origins=yes to see where uninitialised values come from
==10549== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10549== 
==10549== 1 errors in context 1 of 2:
==10549== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10549==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10549==    by 0x488CD0: stringsubst (subst.c:301)
==10549==    by 0x48801B: prefork (subst.c:77)
==10549==    by 0x42B318: execcmd (exec.c:2619)
==10549==    by 0x428CA0: execpline2 (exec.c:1697)
==10549==    by 0x427FD2: execpline (exec.c:1484)
==10549==    by 0x427756: execlist (exec.c:1267)
==10549==    by 0x42717C: execode (exec.c:1073)
==10549==    by 0x431299: runshfunc (exec.c:5040)
==10549==    by 0x430E76: doshfunc (exec.c:4920)
==10549==    by 0x4302FB: execshfunc (exec.c:4557)
==10549==    by 0x42D8C1: execcmd (exec.c:3373)
==10549== 
==10549== 
==10549== 2 errors in context 2 of 2:
==10549== Conditional jump or move depends on uninitialised value(s)
==10549==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10549==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10549==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10549==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10549==    by 0x42D8E9: execcmd (exec.c:3378)
==10549==    by 0x428CA0: execpline2 (exec.c:1697)
==10549==    by 0x427FD2: execpline (exec.c:1484)
==10549==    by 0x42779A: execlist (exec.c:1275)
==10549==    by 0x42717C: execode (exec.c:1073)
==10549==    by 0x431299: runshfunc (exec.c:5040)
==10549==    by 0x430E76: doshfunc (exec.c:4920)
==10549==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10549== 
==10549== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10551-by-pythonnut-on-???
==10551== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10551-by-pythonnut-on-???
==10551== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10551-by-pythonnut-on-???
==10551== 
==10551== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10551== don't want to do, unless you know exactly what you're doing,
==10551== or are doing some strange experiment):
==10551==   /usr/lib/valgrind/../../bin/vgdb --pid=10551 ...command...
==10551== 
==10551== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10551==   /path/to/gdb ./zsh
==10551== and then give GDB the following command
==10551==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10551
==10551== --pid is optional if only one valgrind process is running
==10551== 
--10551-- Caught __NR_exit; running __libc_freeres()
--10552-- Caught __NR_exit; running __libc_freeres()
==10552== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10552-by-pythonnut-on-???
==10553== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10553-by-pythonnut-on-???
==10552== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10552-by-pythonnut-on-???
==10553== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10553-by-pythonnut-on-???
==10552== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10552-by-pythonnut-on-???
==10553== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10553-by-pythonnut-on-???
==10552== 
==10553== 
==10552== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10552== don't want to do, unless you know exactly what you're doing,
==10552== or are doing some strange experiment):
==10552==   /usr/lib/valgrind/../../bin/vgdb --pid=10552 ...command...
==10553== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10553== don't want to do, unless you know exactly what you're doing,
==10553== or are doing some strange experiment):
==10553==   /usr/lib/valgrind/../../bin/vgdb --pid=10553 ...command...
==10552== 
==10553== 
==10552== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10552==   /path/to/gdb ./zsh
==10552== and then give GDB the following command
==10552==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10552
==10553== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10553==   /path/to/gdb ./zsh
==10553== and then give GDB the following command
==10553==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10553
==10552== --pid is optional if only one valgrind process is running
==10553== --pid is optional if only one valgrind process is running
==10552== 
==10553== 
==10554== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10554-by-pythonnut-on-???
--10553-- Caught __NR_exit; running __libc_freeres()
==10554== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10554-by-pythonnut-on-???
==10554== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10554-by-pythonnut-on-???
==10554== 
==10554== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10554== don't want to do, unless you know exactly what you're doing,
==10554== or are doing some strange experiment):
==10554==   /usr/lib/valgrind/../../bin/vgdb --pid=10554 ...command...
==10554== 
==10554== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10554==   /path/to/gdb ./zsh
==10554== and then give GDB the following command
==10554==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10554
==10554== --pid is optional if only one valgrind process is running
==10554== 
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
--10552-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10551-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10552== 
--10553-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10551== 
==10552== HEAP SUMMARY:
==10552==     in use at exit: 3,115,702 bytes in 69,022 blocks
==10552==   total heap usage: 1,603,358 allocs, 1,534,336 frees, 129,799,722 bytes allocated
==10552== 
==10551== HEAP SUMMARY:
==10551==     in use at exit: 3,137,386 bytes in 69,536 blocks
==10551==   total heap usage: 1,597,484 allocs, 1,527,948 frees, 129,073,780 bytes allocated
==10551== 
==10553== 
==10553== HEAP SUMMARY:
==10553==     in use at exit: 3,113,552 bytes in 68,985 blocks
==10553==   total heap usage: 1,603,358 allocs, 1,534,373 frees, 129,692,691 bytes allocated
==10553== 
==10551== Searching for pointers to 69,536 not-freed blocks
==10552== Searching for pointers to 69,022 not-freed blocks
--10551--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10552--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10551--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10552--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10552--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10551--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10552--   Scanning root segment: 0x4037000..0x403afff (16384)
--10551--   Scanning root segment: 0x4037000..0x403efff (32768)
--10552--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10552--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10552--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10552--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10551--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10552--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10552--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10551--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10552--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10551--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10552--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10552--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10551--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10552--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10551--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10552--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10551--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10552--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10552--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10551--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10551--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10552--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10551--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10551--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10551--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10551--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10552--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10552--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10551--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10552--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10551--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10551--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10551--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10551--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10552--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10551--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10552--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10551--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10552--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10551--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10552--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10551--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10552--   Scanning root segment: 0x701a000..0x701afff (4096)
--10551--   Scanning root segment: 0x701a000..0x701afff (4096)
--10551--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10552--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10551--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10552--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10552--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10551--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10552--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10551--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10551--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10552--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10551--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10552--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10551--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10552--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10551--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10552--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10551--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10551--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10552--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10552--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10553== Searching for pointers to 68,985 not-freed blocks
--10553--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10553--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10553--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10553--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10553--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10553--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10553--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10553--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10553--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10553--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10553--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10553--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10553--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10553--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10553--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10553--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10553--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10553--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10553--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10553--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10553--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10553--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10553--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10553--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10553--   Scanning root segment: 0x701a000..0x701afff (4096)
--10553--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10553--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10553--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10553--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10553--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10553--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10553--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10553--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10553--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10553--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10552== Checked 4,791,560 bytes
==10552== 
==10551== Checked 4,839,360 bytes
==10551== 
==10553== Checked 4,767,560 bytes
==10553== 
==10552== LEAK SUMMARY:
==10551== LEAK SUMMARY:
==10552==    definitely lost: 2,205 bytes in 14 blocks
==10551==    definitely lost: 2,221 bytes in 14 blocks
==10552==    indirectly lost: 6,756 bytes in 7 blocks
==10551==    indirectly lost: 6,796 bytes in 9 blocks
==10552==      possibly lost: 0 bytes in 0 blocks
==10551==      possibly lost: 0 bytes in 0 blocks
==10552==    still reachable: 3,106,741 bytes in 69,001 blocks
==10551==    still reachable: 3,128,369 bytes in 69,513 blocks
==10552==         suppressed: 0 bytes in 0 blocks
==10551==         suppressed: 0 bytes in 0 blocks
==10552== Rerun with --leak-check=full to see details of leaked memory
==10551== Rerun with --leak-check=full to see details of leaked memory
==10552== 
==10551== 
==10552== Use --track-origins=yes to see where uninitialised values come from
==10551== Use --track-origins=yes to see where uninitialised values come from
==10552== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10552== 
==10551== 
==10552== 1 errors in context 1 of 2:
==10551== 1 errors in context 1 of 2:
==10552== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10551== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10552==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10551==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10552==    by 0x488CD0: stringsubst (subst.c:301)
==10551==    by 0x488CD0: stringsubst (subst.c:301)
==10552==    by 0x48801B: prefork (subst.c:77)
==10551==    by 0x48801B: prefork (subst.c:77)
==10552==    by 0x42B318: execcmd (exec.c:2619)
==10551==    by 0x42B318: execcmd (exec.c:2619)
==10552==    by 0x428CA0: execpline2 (exec.c:1697)
==10551==    by 0x428CA0: execpline2 (exec.c:1697)
==10552==    by 0x427FD2: execpline (exec.c:1484)
==10551==    by 0x427FD2: execpline (exec.c:1484)
==10552==    by 0x427756: execlist (exec.c:1267)
==10551==    by 0x427756: execlist (exec.c:1267)
==10552==    by 0x42717C: execode (exec.c:1073)
==10551==    by 0x42717C: execode (exec.c:1073)
==10552==    by 0x431299: runshfunc (exec.c:5040)
==10551==    by 0x431299: runshfunc (exec.c:5040)
==10552==    by 0x430E76: doshfunc (exec.c:4920)
==10551==    by 0x430E76: doshfunc (exec.c:4920)
==10552==    by 0x4302FB: execshfunc (exec.c:4557)
==10551==    by 0x4302FB: execshfunc (exec.c:4557)
==10552==    by 0x42D8C1: execcmd (exec.c:3373)
==10551==    by 0x42D8C1: execcmd (exec.c:3373)
==10552== 
==10551== 
==10552== 
==10551== 
==10552== 2 errors in context 2 of 2:
==10551== 2 errors in context 2 of 2:
==10552== Conditional jump or move depends on uninitialised value(s)
==10551== Conditional jump or move depends on uninitialised value(s)
==10552==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10551==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10552==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10551==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10552==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10551==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10552==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10551==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10552==    by 0x42D8E9: execcmd (exec.c:3378)
==10551==    by 0x42D8E9: execcmd (exec.c:3378)
==10552==    by 0x428CA0: execpline2 (exec.c:1697)
==10551==    by 0x428CA0: execpline2 (exec.c:1697)
==10552==    by 0x427FD2: execpline (exec.c:1484)
==10551==    by 0x427FD2: execpline (exec.c:1484)
==10552==    by 0x42779A: execlist (exec.c:1275)
==10551==    by 0x42779A: execlist (exec.c:1275)
==10552==    by 0x42717C: execode (exec.c:1073)
==10551==    by 0x42717C: execode (exec.c:1073)
==10552==    by 0x431299: runshfunc (exec.c:5040)
==10551==    by 0x431299: runshfunc (exec.c:5040)
==10552==    by 0x430E76: doshfunc (exec.c:4920)
==10551==    by 0x430E76: doshfunc (exec.c:4920)
==10552==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10551==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10552== 
==10551== 
==10552== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10551== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10553== LEAK SUMMARY:
==10553==    definitely lost: 2,205 bytes in 14 blocks
==10553==    indirectly lost: 6,756 bytes in 7 blocks
==10553==      possibly lost: 0 bytes in 0 blocks
==10553==    still reachable: 3,104,591 bytes in 68,964 blocks
==10553==         suppressed: 0 bytes in 0 blocks
==10553== Rerun with --leak-check=full to see details of leaked memory
==10553== 
==10553== Use --track-origins=yes to see where uninitialised values come from
==10553== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10553== 
==10553== 1 errors in context 1 of 2:
==10553== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10553==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10553==    by 0x488CD0: stringsubst (subst.c:301)
==10553==    by 0x48801B: prefork (subst.c:77)
==10553==    by 0x42B318: execcmd (exec.c:2619)
==10553==    by 0x428CA0: execpline2 (exec.c:1697)
==10553==    by 0x427FD2: execpline (exec.c:1484)
==10553==    by 0x427756: execlist (exec.c:1267)
==10553==    by 0x42717C: execode (exec.c:1073)
==10553==    by 0x431299: runshfunc (exec.c:5040)
==10553==    by 0x430E76: doshfunc (exec.c:4920)
==10553==    by 0x4302FB: execshfunc (exec.c:4557)
==10553==    by 0x42D8C1: execcmd (exec.c:3373)
==10553== 
==10553== 
==10553== 2 errors in context 2 of 2:
==10553== Conditional jump or move depends on uninitialised value(s)
==10553==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10553==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10553==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10553==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10553==    by 0x42D8E9: execcmd (exec.c:3378)
==10553==    by 0x428CA0: execpline2 (exec.c:1697)
==10553==    by 0x427FD2: execpline (exec.c:1484)
==10553==    by 0x42779A: execlist (exec.c:1275)
==10553==    by 0x42717C: execode (exec.c:1073)
==10553==    by 0x431299: runshfunc (exec.c:5040)
==10553==    by 0x430E76: doshfunc (exec.c:4920)
==10553==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10553== 
==10553== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10550== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10550-by-pythonnut-on-???
==10550== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10550-by-pythonnut-on-???
==10550== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10550-by-pythonnut-on-???
==10550== 
==10550== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10550== don't want to do, unless you know exactly what you're doing,
==10550== or are doing some strange experiment):
==10550==   /usr/lib/valgrind/../../bin/vgdb --pid=10550 ...command...
==10550== 
==10550== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10550==   /path/to/gdb ./zsh
==10550== and then give GDB the following command
==10550==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10550
==10550== --pid is optional if only one valgrind process is running
==10550== 
--10550-- Caught __NR_exit; running __libc_freeres()
==10556== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10556-by-pythonnut-on-???
==10556== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10556-by-pythonnut-on-???
==10556== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10556-by-pythonnut-on-???
==10556== 
==10556== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10556== don't want to do, unless you know exactly what you're doing,
==10556== or are doing some strange experiment):
==10556==   /usr/lib/valgrind/../../bin/vgdb --pid=10556 ...command...
==10556== 
==10556== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10556==   /path/to/gdb ./zsh
==10556== and then give GDB the following command
==10556==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10556
==10556== --pid is optional if only one valgrind process is running
==10556== 
--10557-- Caught __NR_exit; running __libc_freeres()
--10555-- Caught __NR_exit; running __libc_freeres()
--10550-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10555== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10555-by-pythonnut-on-???
==10555== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10555-by-pythonnut-on-???
==10555== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10555-by-pythonnut-on-???
==10555== 
==10555== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10555== don't want to do, unless you know exactly what you're doing,
==10555== or are doing some strange experiment):
==10555==   /usr/lib/valgrind/../../bin/vgdb --pid=10555 ...command...
==10555== 
==10555== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10555==   /path/to/gdb ./zsh
==10555== and then give GDB the following command
==10555==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10555
==10555== --pid is optional if only one valgrind process is running
==10555== 
==10557== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10557-by-pythonnut-on-???
==10557== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10557-by-pythonnut-on-???
==10557== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10557-by-pythonnut-on-???
==10557== 
==10557== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10557== don't want to do, unless you know exactly what you're doing,
==10557== or are doing some strange experiment):
==10557==   /usr/lib/valgrind/../../bin/vgdb --pid=10557 ...command...
==10557== 
==10557== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10557==   /path/to/gdb ./zsh
==10557== and then give GDB the following command
==10557==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10557
==10557== --pid is optional if only one valgrind process is running
==10557== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
==10550== 
==10550== HEAP SUMMARY:
==10550==     in use at exit: 3,115,638 bytes in 69,019 blocks
==10550==   total heap usage: 1,603,360 allocs, 1,534,341 frees, 129,800,266 bytes allocated
==10550== 
--10555-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10557-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10555== 
==10555== HEAP SUMMARY:
==10555==     in use at exit: 3,113,456 bytes in 68,985 blocks
==10555==   total heap usage: 1,603,338 allocs, 1,534,353 frees, 129,690,461 bytes allocated
==10555== 
==10557== 
==10557== HEAP SUMMARY:
==10557==     in use at exit: 3,137,636 bytes in 69,541 blocks
==10557==   total heap usage: 1,597,489 allocs, 1,527,948 frees, 129,077,370 bytes allocated
==10557== 
==10550== Searching for pointers to 69,019 not-freed blocks
--10550--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10550--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10550--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10550--   Scanning root segment: 0x4037000..0x403afff (16384)
--10550--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10550--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10550--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10550--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10550--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10550--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10550--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10550--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10550--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10550--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10550--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10550--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10550--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10550--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10550--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10550--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10550--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10550--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10550--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10550--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10550--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10550--   Scanning root segment: 0x701a000..0x701afff (4096)
--10550--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10550--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10550--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10550--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10550--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10550--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10550--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10550--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10550--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10550--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10555== Searching for pointers to 68,985 not-freed blocks
--10555--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10555--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10555--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10555--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10555--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10555--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10555--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10555--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10555--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10555--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10555--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10555--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10555--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10555--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10555--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10555--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10555--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10555--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10555--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10555--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10555--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10555--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10555--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10555--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10555--   Scanning root segment: 0x701a000..0x701afff (4096)
--10555--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10555--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10555--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10555--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10555--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10555--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10555--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10555--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10555--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10555--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10557== Searching for pointers to 69,541 not-freed blocks
--10557--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10557--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10557--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10557--   Scanning root segment: 0x4037000..0x403efff (32768)
--10557--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10557--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10557--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10557--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10557--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10557--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10557--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10557--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10557--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10557--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10557--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10557--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10557--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10557--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10557--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10557--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10557--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10557--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10557--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10557--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10557--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10557--   Scanning root segment: 0x701a000..0x701afff (4096)
--10557--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10557--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10557--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10557--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10557--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10557--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10557--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10557--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10557--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10557--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10550== Checked 4,790,872 bytes
==10550== 
==10555== Checked 4,788,432 bytes
==10555== 
==10550== LEAK SUMMARY:
==10550==    definitely lost: 2,205 bytes in 14 blocks
==10550==    indirectly lost: 6,756 bytes in 7 blocks
==10550==      possibly lost: 0 bytes in 0 blocks
==10550==    still reachable: 3,106,677 bytes in 68,998 blocks
==10550==         suppressed: 0 bytes in 0 blocks
==10550== Rerun with --leak-check=full to see details of leaked memory
==10550== 
==10550== Use --track-origins=yes to see where uninitialised values come from
==10550== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10550== 
==10550== 1 errors in context 1 of 2:
==10550== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10550==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10550==    by 0x488CD0: stringsubst (subst.c:301)
==10550==    by 0x48801B: prefork (subst.c:77)
==10550==    by 0x42B318: execcmd (exec.c:2619)
==10550==    by 0x428CA0: execpline2 (exec.c:1697)
==10550==    by 0x427FD2: execpline (exec.c:1484)
==10550==    by 0x427756: execlist (exec.c:1267)
==10550==    by 0x42717C: execode (exec.c:1073)
==10550==    by 0x431299: runshfunc (exec.c:5040)
==10550==    by 0x430E76: doshfunc (exec.c:4920)
==10550==    by 0x4302FB: execshfunc (exec.c:4557)
==10550==    by 0x42D8C1: execcmd (exec.c:3373)
==10550== 
==10550== 
==10550== 2 errors in context 2 of 2:
==10550== Conditional jump or move depends on uninitialised value(s)
==10550==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10550==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10550==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10550==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10550==    by 0x42D8E9: execcmd (exec.c:3378)
==10550==    by 0x428CA0: execpline2 (exec.c:1697)
==10550==    by 0x427FD2: execpline (exec.c:1484)
==10550==    by 0x42779A: execlist (exec.c:1275)
==10550==    by 0x42717C: execode (exec.c:1073)
==10550==    by 0x431299: runshfunc (exec.c:5040)
==10550==    by 0x430E76: doshfunc (exec.c:4920)
==10550==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10550== 
==10550== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10557== Checked 4,840,240 bytes
==10557== 
==10555== LEAK SUMMARY:
==10555==    definitely lost: 2,205 bytes in 14 blocks
==10555==    indirectly lost: 6,756 bytes in 7 blocks
==10555==      possibly lost: 0 bytes in 0 blocks
==10555==    still reachable: 3,104,495 bytes in 68,964 blocks
==10555==         suppressed: 0 bytes in 0 blocks
==10555== Rerun with --leak-check=full to see details of leaked memory
==10555== 
==10555== Use --track-origins=yes to see where uninitialised values come from
==10555== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10555== 
==10555== 1 errors in context 1 of 2:
==10555== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10555==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10555==    by 0x488CD0: stringsubst (subst.c:301)
==10555==    by 0x48801B: prefork (subst.c:77)
==10555==    by 0x42B318: execcmd (exec.c:2619)
==10555==    by 0x428CA0: execpline2 (exec.c:1697)
==10555==    by 0x427FD2: execpline (exec.c:1484)
==10555==    by 0x427756: execlist (exec.c:1267)
==10555==    by 0x42717C: execode (exec.c:1073)
==10555==    by 0x431299: runshfunc (exec.c:5040)
==10555==    by 0x430E76: doshfunc (exec.c:4920)
==10555==    by 0x4302FB: execshfunc (exec.c:4557)
==10555==    by 0x42D8C1: execcmd (exec.c:3373)
==10555== 
==10555== 
==10555== 2 errors in context 2 of 2:
==10555== Conditional jump or move depends on uninitialised value(s)
==10555==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10555==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10555==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10555==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10555==    by 0x42D8E9: execcmd (exec.c:3378)
==10555==    by 0x428CA0: execpline2 (exec.c:1697)
==10555==    by 0x427FD2: execpline (exec.c:1484)
==10555==    by 0x42779A: execlist (exec.c:1275)
==10555==    by 0x42717C: execode (exec.c:1073)
==10555==    by 0x431299: runshfunc (exec.c:5040)
==10555==    by 0x430E76: doshfunc (exec.c:4920)
==10555==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10555== 
==10555== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10559== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10559-by-pythonnut-on-???
==10559== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10559-by-pythonnut-on-???
==10559== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10559-by-pythonnut-on-???
==10559== 
==10559== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10559== don't want to do, unless you know exactly what you're doing,
==10559== or are doing some strange experiment):
==10559==   /usr/lib/valgrind/../../bin/vgdb --pid=10559 ...command...
==10559== 
==10559== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10559==   /path/to/gdb ./zsh
==10559== and then give GDB the following command
==10559==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10559
==10559== --pid is optional if only one valgrind process is running
==10559== 
--10559-- Caught __NR_exit; running __libc_freeres()
==10557== LEAK SUMMARY:
==10557==    definitely lost: 2,221 bytes in 14 blocks
==10557==    indirectly lost: 6,796 bytes in 9 blocks
==10557==      possibly lost: 0 bytes in 0 blocks
==10557==    still reachable: 3,128,619 bytes in 69,518 blocks
==10557==         suppressed: 0 bytes in 0 blocks
==10557== Rerun with --leak-check=full to see details of leaked memory
==10557== 
==10557== Use --track-origins=yes to see where uninitialised values come from
==10557== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10557== 
==10557== 1 errors in context 1 of 2:
==10557== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10557==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10557==    by 0x488CD0: stringsubst (subst.c:301)
==10557==    by 0x48801B: prefork (subst.c:77)
==10557==    by 0x42B318: execcmd (exec.c:2619)
==10557==    by 0x428CA0: execpline2 (exec.c:1697)
==10557==    by 0x427FD2: execpline (exec.c:1484)
==10557==    by 0x427756: execlist (exec.c:1267)
==10557==    by 0x42717C: execode (exec.c:1073)
==10557==    by 0x431299: runshfunc (exec.c:5040)
==10557==    by 0x430E76: doshfunc (exec.c:4920)
==10557==    by 0x4302FB: execshfunc (exec.c:4557)
==10557==    by 0x42D8C1: execcmd (exec.c:3373)
==10557== 
==10557== 
==10557== 2 errors in context 2 of 2:
==10557== Conditional jump or move depends on uninitialised value(s)
==10557==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10557==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10557==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10557==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10557==    by 0x42D8E9: execcmd (exec.c:3378)
==10557==    by 0x428CA0: execpline2 (exec.c:1697)
==10557==    by 0x427FD2: execpline (exec.c:1484)
==10557==    by 0x42779A: execlist (exec.c:1275)
==10557==    by 0x42717C: execode (exec.c:1073)
==10557==    by 0x431299: runshfunc (exec.c:5040)
==10557==    by 0x430E76: doshfunc (exec.c:4920)
==10557==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10557== 
==10557== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10556-- Caught __NR_exit; running __libc_freeres()
==10560== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10560-by-pythonnut-on-???
==10560== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10560-by-pythonnut-on-???
==10560== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10560-by-pythonnut-on-???
==10560== 
==10560== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10560== don't want to do, unless you know exactly what you're doing,
==10560== or are doing some strange experiment):
==10560==   /usr/lib/valgrind/../../bin/vgdb --pid=10560 ...command...
==10560== 
==10560== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10560==   /path/to/gdb ./zsh
==10560== and then give GDB the following command
==10560==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10560
==10560== --pid is optional if only one valgrind process is running
==10560== 
--10559-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10559== 
--10560-- Caught __NR_exit; running __libc_freeres()
==10559== HEAP SUMMARY:
==10559==     in use at exit: 3,115,642 bytes in 69,019 blocks
==10559==   total heap usage: 1,603,376 allocs, 1,534,357 frees, 129,805,262 bytes allocated
==10559== 
--10556-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10556== 
==10556== HEAP SUMMARY:
==10556==     in use at exit: 3,137,412 bytes in 69,538 blocks
==10556==   total heap usage: 1,597,492 allocs, 1,527,954 frees, 129,077,946 bytes allocated
==10556== 
--10560-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10559== Searching for pointers to 69,019 not-freed blocks
--10559--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10559--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10559--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10559--   Scanning root segment: 0x4037000..0x403afff (16384)
--10559--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10559--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10559--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10559--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10559--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10559--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10559--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10559--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10559--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10559--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10559--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10559--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10559--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10559--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10559--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10559--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10559--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10559--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10559--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10559--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10559--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10559--   Scanning root segment: 0x701a000..0x701afff (4096)
--10559--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10559--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10559--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10559--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10559--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10559--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10559--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10559--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10559--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10559--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10560== 
==10560== HEAP SUMMARY:
==10560==     in use at exit: 3,113,484 bytes in 68,986 blocks
==10560==   total heap usage: 1,603,351 allocs, 1,534,365 frees, 129,693,148 bytes allocated
==10560== 
==10556== Searching for pointers to 69,538 not-freed blocks
--10556--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10556--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10556--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10556--   Scanning root segment: 0x4037000..0x403efff (32768)
--10556--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10556--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10556--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10556--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10556--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10556--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10556--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10556--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10556--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10556--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10556--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10556--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10556--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10556--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10556--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10556--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10556--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10556--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10556--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10556--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10556--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10556--   Scanning root segment: 0x701a000..0x701afff (4096)
--10556--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10556--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10556--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10556--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10556--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10556--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10556--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10556--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10556--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10556--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10560== Searching for pointers to 68,986 not-freed blocks
--10560--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10560--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10560--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10560--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10560--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10560--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10560--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10560--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10560--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10560--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10560--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10560--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10560--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10560--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10560--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10560--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10560--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10560--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10560--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10560--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10560--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10560--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10560--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10560--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10560--   Scanning root segment: 0x701a000..0x701afff (4096)
--10560--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10560--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10560--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10560--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10560--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10560--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10560--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10560--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10560--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10560--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10559== Checked 4,790,880 bytes
==10559== 
==10556== Checked 4,839,384 bytes
==10556== 
==10559== LEAK SUMMARY:
==10559==    definitely lost: 2,205 bytes in 14 blocks
==10559==    indirectly lost: 6,756 bytes in 7 blocks
==10559==      possibly lost: 0 bytes in 0 blocks
==10559==    still reachable: 3,106,681 bytes in 68,998 blocks
==10559==         suppressed: 0 bytes in 0 blocks
==10559== Rerun with --leak-check=full to see details of leaked memory
==10559== 
==10559== Use --track-origins=yes to see where uninitialised values come from
==10559== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10559== 
==10559== 1 errors in context 1 of 2:
==10559== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10559==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10559==    by 0x488CD0: stringsubst (subst.c:301)
==10559==    by 0x48801B: prefork (subst.c:77)
==10559==    by 0x42B318: execcmd (exec.c:2619)
==10559==    by 0x428CA0: execpline2 (exec.c:1697)
==10559==    by 0x427FD2: execpline (exec.c:1484)
==10559==    by 0x427756: execlist (exec.c:1267)
==10559==    by 0x42717C: execode (exec.c:1073)
==10559==    by 0x431299: runshfunc (exec.c:5040)
==10559==    by 0x430E76: doshfunc (exec.c:4920)
==10559==    by 0x4302FB: execshfunc (exec.c:4557)
==10559==    by 0x42D8C1: execcmd (exec.c:3373)
==10559== 
==10559== 
==10559== 2 errors in context 2 of 2:
==10559== Conditional jump or move depends on uninitialised value(s)
==10559==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10559==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10559==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10559==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10559==    by 0x42D8E9: execcmd (exec.c:3378)
==10559==    by 0x428CA0: execpline2 (exec.c:1697)
==10559==    by 0x427FD2: execpline (exec.c:1484)
==10559==    by 0x42779A: execlist (exec.c:1275)
==10559==    by 0x42717C: execode (exec.c:1073)
==10559==    by 0x431299: runshfunc (exec.c:5040)
==10559==    by 0x430E76: doshfunc (exec.c:4920)
==10559==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10559== 
==10559== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10563== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10563-by-pythonnut-on-???
==10563== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10563-by-pythonnut-on-???
==10563== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10563-by-pythonnut-on-???
==10563== 
==10563== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10563== don't want to do, unless you know exactly what you're doing,
==10563== or are doing some strange experiment):
==10563==   /usr/lib/valgrind/../../bin/vgdb --pid=10563 ...command...
==10563== 
==10563== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10563==   /path/to/gdb ./zsh
==10563== and then give GDB the following command
==10563==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10563
==10563== --pid is optional if only one valgrind process is running
==10563== 
==10560== Checked 4,787,944 bytes
==10560== 
==10556== LEAK SUMMARY:
==10556==    definitely lost: 2,221 bytes in 14 blocks
==10556==    indirectly lost: 6,796 bytes in 9 blocks
==10556==      possibly lost: 0 bytes in 0 blocks
==10556==    still reachable: 3,128,395 bytes in 69,515 blocks
==10556==         suppressed: 0 bytes in 0 blocks
==10556== Rerun with --leak-check=full to see details of leaked memory
==10556== 
==10556== Use --track-origins=yes to see where uninitialised values come from
==10556== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10556== 
==10556== 1 errors in context 1 of 2:
==10556== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10556==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10556==    by 0x488CD0: stringsubst (subst.c:301)
==10556==    by 0x48801B: prefork (subst.c:77)
==10556==    by 0x42B318: execcmd (exec.c:2619)
==10556==    by 0x428CA0: execpline2 (exec.c:1697)
==10556==    by 0x427FD2: execpline (exec.c:1484)
==10556==    by 0x427756: execlist (exec.c:1267)
==10556==    by 0x42717C: execode (exec.c:1073)
==10556==    by 0x431299: runshfunc (exec.c:5040)
==10556==    by 0x430E76: doshfunc (exec.c:4920)
==10556==    by 0x4302FB: execshfunc (exec.c:4557)
==10556==    by 0x42D8C1: execcmd (exec.c:3373)
==10556== 
==10556== 
==10556== 2 errors in context 2 of 2:
==10556== Conditional jump or move depends on uninitialised value(s)
==10556==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10556==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10556==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10556==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10556==    by 0x42D8E9: execcmd (exec.c:3378)
==10556==    by 0x428CA0: execpline2 (exec.c:1697)
==10556==    by 0x427FD2: execpline (exec.c:1484)
==10556==    by 0x42779A: execlist (exec.c:1275)
==10556==    by 0x42717C: execode (exec.c:1073)
==10556==    by 0x431299: runshfunc (exec.c:5040)
==10556==    by 0x430E76: doshfunc (exec.c:4920)
==10556==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10556== 
==10556== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10563-- Caught __NR_exit; running __libc_freeres()
--10414-- Caught __NR_exit; running __libc_freeres()
==10560== LEAK SUMMARY:
==10560==    definitely lost: 2,205 bytes in 14 blocks
==10560==    indirectly lost: 6,756 bytes in 7 blocks
==10560==      possibly lost: 0 bytes in 0 blocks
==10560==    still reachable: 3,104,523 bytes in 68,965 blocks
==10560==         suppressed: 0 bytes in 0 blocks
==10560== Rerun with --leak-check=full to see details of leaked memory
==10560== 
==10560== Use --track-origins=yes to see where uninitialised values come from
==10560== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10560== 
==10560== 1 errors in context 1 of 2:
==10560== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10560==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10560==    by 0x488CD0: stringsubst (subst.c:301)
==10560==    by 0x48801B: prefork (subst.c:77)
==10560==    by 0x42B318: execcmd (exec.c:2619)
==10560==    by 0x428CA0: execpline2 (exec.c:1697)
==10560==    by 0x427FD2: execpline (exec.c:1484)
==10560==    by 0x427756: execlist (exec.c:1267)
==10560==    by 0x42717C: execode (exec.c:1073)
==10560==    by 0x431299: runshfunc (exec.c:5040)
==10560==    by 0x430E76: doshfunc (exec.c:4920)
==10560==    by 0x4302FB: execshfunc (exec.c:4557)
==10560==    by 0x42D8C1: execcmd (exec.c:3373)
==10560== 
==10560== 
==10560== 2 errors in context 2 of 2:
==10560== Conditional jump or move depends on uninitialised value(s)
==10560==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10560==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10560==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10560==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10560==    by 0x42D8E9: execcmd (exec.c:3378)
==10560==    by 0x428CA0: execpline2 (exec.c:1697)
==10560==    by 0x427FD2: execpline (exec.c:1484)
==10560==    by 0x42779A: execlist (exec.c:1275)
==10560==    by 0x42717C: execode (exec.c:1073)
==10560==    by 0x431299: runshfunc (exec.c:5040)
==10560==    by 0x430E76: doshfunc (exec.c:4920)
==10560==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10560== 
==10560== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10563-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10563== 
==10563== HEAP SUMMARY:
==10563==     in use at exit: 3,115,641 bytes in 69,019 blocks
==10563==   total heap usage: 1,603,381 allocs, 1,534,362 frees, 129,807,375 bytes allocated
==10563== 
--10414-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10564-by-pythonnut-on-???
==10564== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10564-by-pythonnut-on-???
==10564== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10564-by-pythonnut-on-???
==10564== 
==10564== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10564== don't want to do, unless you know exactly what you're doing,
==10564== or are doing some strange experiment):
==10564==   /usr/lib/valgrind/../../bin/vgdb --pid=10564 ...command...
==10564== 
==10564== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10564==   /path/to/gdb ./zsh
==10564== and then give GDB the following command
==10564==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10564
==10564== --pid is optional if only one valgrind process is running
==10564== 
--10564-- Caught __NR_exit; running __libc_freeres()
==10414== 
==10563== Searching for pointers to 69,019 not-freed blocks
--10563--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
==10414== HEAP SUMMARY:
==10414==     in use at exit: 3,133,478 bytes in 69,401 blocks
==10414==   total heap usage: 1,597,433 allocs, 1,528,032 frees, 129,078,344 bytes allocated
==10414== 
--10563--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10563--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10563--   Scanning root segment: 0x4037000..0x403afff (16384)
--10563--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10563--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10563--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10563--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10563--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10563--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10563--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10563--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10563--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10563--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10563--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10563--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10563--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10563--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10563--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10563--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10563--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10563--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10563--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10563--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10563--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10563--   Scanning root segment: 0x701a000..0x701afff (4096)
--10563--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10563--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10563--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10563--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10563--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10563--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10563--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10563--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10563--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10563--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10564-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== 
==10564== HEAP SUMMARY:
==10564==     in use at exit: 3,112,005 bytes in 68,926 blocks
==10564==   total heap usage: 1,603,321 allocs, 1,534,395 frees, 129,696,134 bytes allocated
==10564== 
==10414== Searching for pointers to 69,401 not-freed blocks
--10414--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10414--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10414--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10414--   Scanning root segment: 0x4037000..0x403afff (16384)
--10414--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10414--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10414--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10414--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10414--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10414--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10414--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10414--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10414--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10414--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10414--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10414--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10414--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10414--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10414--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10414--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10414--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10414--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10414--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10414--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10414--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10414--   Scanning root segment: 0x701a000..0x701afff (4096)
--10414--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10414--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10414--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10414--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10414--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10414--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10414--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10414--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10414--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10414--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10564== Searching for pointers to 68,926 not-freed blocks
--10564--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10564--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10564--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10564--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10564--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10564--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10564--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10564--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10564--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10564--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10564--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10564--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10564--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10564--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10564--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10564--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10564--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10564--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10564--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10564--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10564--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10564--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10564--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10564--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10564--   Scanning root segment: 0x701a000..0x701afff (4096)
--10564--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10564--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10564--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10564--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10564--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10564--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10564--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10564--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10564--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10564--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10563== Checked 4,790,880 bytes
==10563== 
==10563== LEAK SUMMARY:
==10563==    definitely lost: 2,205 bytes in 14 blocks
==10563==    indirectly lost: 6,756 bytes in 7 blocks
==10563==      possibly lost: 0 bytes in 0 blocks
==10563==    still reachable: 3,106,680 bytes in 68,998 blocks
==10563==         suppressed: 0 bytes in 0 blocks
==10563== Rerun with --leak-check=full to see details of leaked memory
==10563== 
==10563== Use --track-origins=yes to see where uninitialised values come from
==10563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10563== 
==10563== 1 errors in context 1 of 2:
==10563== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10563==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10563==    by 0x488CD0: stringsubst (subst.c:301)
==10563==    by 0x48801B: prefork (subst.c:77)
==10563==    by 0x42B318: execcmd (exec.c:2619)
==10563==    by 0x428CA0: execpline2 (exec.c:1697)
==10563==    by 0x427FD2: execpline (exec.c:1484)
==10563==    by 0x427756: execlist (exec.c:1267)
==10563==    by 0x42717C: execode (exec.c:1073)
==10563==    by 0x431299: runshfunc (exec.c:5040)
==10563==    by 0x430E76: doshfunc (exec.c:4920)
==10563==    by 0x4302FB: execshfunc (exec.c:4557)
==10563==    by 0x42D8C1: execcmd (exec.c:3373)
==10563== 
==10563== 
==10563== 2 errors in context 2 of 2:
==10563== Conditional jump or move depends on uninitialised value(s)
==10563==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10563==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10563==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10563==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10563==    by 0x42D8E9: execcmd (exec.c:3378)
==10563==    by 0x428CA0: execpline2 (exec.c:1697)
==10563==    by 0x427FD2: execpline (exec.c:1484)
==10563==    by 0x42779A: execlist (exec.c:1275)
==10563==    by 0x42717C: execode (exec.c:1073)
==10563==    by 0x431299: runshfunc (exec.c:5040)
==10563==    by 0x430E76: doshfunc (exec.c:4920)
==10563==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10414== Checked 4,816,336 bytes
==10563== 
==10414== 
==10563== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10565-by-pythonnut-on-???
==10565== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10565-by-pythonnut-on-???
==10565== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10565-by-pythonnut-on-???
==10565== 
==10565== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10565== don't want to do, unless you know exactly what you're doing,
==10565== or are doing some strange experiment):
==10565==   /usr/lib/valgrind/../../bin/vgdb --pid=10565 ...command...
==10565== 
==10565== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10565==   /path/to/gdb ./zsh
==10565== and then give GDB the following command
==10565==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10565
==10565== --pid is optional if only one valgrind process is running
==10565== 
--10565-- Caught __NR_exit; running __libc_freeres()
==10414== LEAK SUMMARY:
==10414==    definitely lost: 2,221 bytes in 14 blocks
==10414==    indirectly lost: 6,796 bytes in 9 blocks
==10414==      possibly lost: 0 bytes in 0 blocks
==10414==    still reachable: 3,124,461 bytes in 69,378 blocks
==10414==         suppressed: 0 bytes in 0 blocks
==10414== Rerun with --leak-check=full to see details of leaked memory
==10414== 
==10414== Use --track-origins=yes to see where uninitialised values come from
==10414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10414== 
==10414== 1 errors in context 1 of 2:
==10414== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10414==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10414==    by 0x488CD0: stringsubst (subst.c:301)
==10414==    by 0x48801B: prefork (subst.c:77)
==10414==    by 0x42B318: execcmd (exec.c:2619)
==10414==    by 0x428CA0: execpline2 (exec.c:1697)
==10414==    by 0x427FD2: execpline (exec.c:1484)
==10414==    by 0x427756: execlist (exec.c:1267)
==10414==    by 0x42717C: execode (exec.c:1073)
==10414==    by 0x431299: runshfunc (exec.c:5040)
==10414==    by 0x430E76: doshfunc (exec.c:4920)
==10414==    by 0x4302FB: execshfunc (exec.c:4557)
==10414==    by 0x42D8C1: execcmd (exec.c:3373)
==10414== 
==10414== 
==10414== 2 errors in context 2 of 2:
==10414== Conditional jump or move depends on uninitialised value(s)
==10414==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10414==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10414==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10414==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10414==    by 0x42D8E9: execcmd (exec.c:3378)
==10414==    by 0x428CA0: execpline2 (exec.c:1697)
==10414==    by 0x427FD2: execpline (exec.c:1484)
==10414==    by 0x42779A: execlist (exec.c:1275)
==10414==    by 0x42717C: execode (exec.c:1073)
==10414==    by 0x431299: runshfunc (exec.c:5040)
==10414==    by 0x430E76: doshfunc (exec.c:4920)
==10414==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10414== 
==10414== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10564== Checked 4,787,408 bytes
==10564== 
==10566== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10566-by-pythonnut-on-???
==10566== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10566-by-pythonnut-on-???
==10566== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10566-by-pythonnut-on-???
==10566== 
==10566== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10566== don't want to do, unless you know exactly what you're doing,
==10566== or are doing some strange experiment):
==10566==   /usr/lib/valgrind/../../bin/vgdb --pid=10566 ...command...
==10566== 
==10566== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10566==   /path/to/gdb ./zsh
==10566== and then give GDB the following command
==10566==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10566
==10566== --pid is optional if only one valgrind process is running
==10566== 
--10565-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10564== LEAK SUMMARY:
==10564==    definitely lost: 2,205 bytes in 14 blocks
==10564==    indirectly lost: 6,756 bytes in 7 blocks
==10564==      possibly lost: 0 bytes in 0 blocks
==10564==    still reachable: 3,103,044 bytes in 68,905 blocks
==10564==         suppressed: 0 bytes in 0 blocks
==10564== Rerun with --leak-check=full to see details of leaked memory
==10564== 
==10564== Use --track-origins=yes to see where uninitialised values come from
==10564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10564== 
==10564== 1 errors in context 1 of 2:
==10564== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10564==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10564==    by 0x488CD0: stringsubst (subst.c:301)
==10564==    by 0x48801B: prefork (subst.c:77)
==10564==    by 0x42B318: execcmd (exec.c:2619)
==10564==    by 0x428CA0: execpline2 (exec.c:1697)
==10564==    by 0x427FD2: execpline (exec.c:1484)
==10564==    by 0x427756: execlist (exec.c:1267)
==10564==    by 0x42717C: execode (exec.c:1073)
==10564==    by 0x431299: runshfunc (exec.c:5040)
==10564==    by 0x430E76: doshfunc (exec.c:4920)
==10564==    by 0x4302FB: execshfunc (exec.c:4557)
==10564==    by 0x42D8C1: execcmd (exec.c:3373)
==10564== 
==10564== 
==10564== 2 errors in context 2 of 2:
==10564== Conditional jump or move depends on uninitialised value(s)
==10564==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10564==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10564==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10564==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10564==    by 0x42D8E9: execcmd (exec.c:3378)
==10564==    by 0x428CA0: execpline2 (exec.c:1697)
==10564==    by 0x427FD2: execpline (exec.c:1484)
==10564==    by 0x42779A: execlist (exec.c:1275)
==10564==    by 0x42717C: execode (exec.c:1073)
==10564==    by 0x431299: runshfunc (exec.c:5040)
==10564==    by 0x430E76: doshfunc (exec.c:4920)
==10564==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10564== 
==10564== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== 
==10565== HEAP SUMMARY:
==10565==     in use at exit: 3,115,640 bytes in 69,019 blocks
==10565==   total heap usage: 1,603,386 allocs, 1,534,367 frees, 129,809,488 bytes allocated
==10565== 
client request: code 4d430005,  addr 0xFFEFE8AAC,  len 4
==10568== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10568-by-pythonnut-on-???
==10568== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10568-by-pythonnut-on-???
==10568== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10568-by-pythonnut-on-???
==10568== 
==10568== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10568== don't want to do, unless you know exactly what you're doing,
==10568== or are doing some strange experiment):
==10568==   /usr/lib/valgrind/../../bin/vgdb --pid=10568 ...command...
==10568== 
==10568== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10568==   /path/to/gdb ./zsh
==10568== and then give GDB the following command
==10568==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10568
==10568== --pid is optional if only one valgrind process is running
==10568== 
==10565== Searching for pointers to 69,019 not-freed blocks
--10565--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10565--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10565--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10565--   Scanning root segment: 0x4037000..0x403afff (16384)
--10565--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10565--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10565--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10565--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10565--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10565--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10565--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10565--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10565--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10565--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10565--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10565--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10565--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10565--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10567-- Caught __NR_exit; running __libc_freeres()
--10565--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10565--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10565--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10565--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10565--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10565--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10565--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10565--   Scanning root segment: 0x701a000..0x701afff (4096)
--10565--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10565--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10565--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10565--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10565--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10565--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10565--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10565--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10565--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10565--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10567== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10567-by-pythonnut-on-???
==10567== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10567-by-pythonnut-on-???
==10567== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10567-by-pythonnut-on-???
==10567== 
==10567== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10567== don't want to do, unless you know exactly what you're doing,
==10567== or are doing some strange experiment):
==10567==   /usr/lib/valgrind/../../bin/vgdb --pid=10567 ...command...
==10567== 
==10567== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10567==   /path/to/gdb ./zsh
==10567== and then give GDB the following command
==10567==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10567
==10567== --pid is optional if only one valgrind process is running
==10567== 
--10570-- Caught __NR_exit; running __libc_freeres()
--10567-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10570== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10570-by-pythonnut-on-???
==10570== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10570-by-pythonnut-on-???
==10570== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10570-by-pythonnut-on-???
==10570== 
==10570== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10570== don't want to do, unless you know exactly what you're doing,
==10570== or are doing some strange experiment):
==10570==   /usr/lib/valgrind/../../bin/vgdb --pid=10570 ...command...
==10570== 
==10570== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10570==   /path/to/gdb ./zsh
==10570== and then give GDB the following command
==10570==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10570
==10570== --pid is optional if only one valgrind process is running
==10570== 
==10567== 
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
==10567== HEAP SUMMARY:
==10567==     in use at exit: 3,135,462 bytes in 69,472 blocks
==10567==   total heap usage: 1,597,317 allocs, 1,527,845 frees, 129,034,519 bytes allocated
==10567== 
--10570-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10570== 
==10570== HEAP SUMMARY:
==10570==     in use at exit: 3,124,237 bytes in 69,166 blocks
==10570==   total heap usage: 1,603,713 allocs, 1,534,547 frees, 129,728,569 bytes allocated
==10570== 
==10567== Searching for pointers to 69,472 not-freed blocks
--10567--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10567--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10567--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10567--   Scanning root segment: 0x4037000..0x403afff (16384)
--10567--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10567--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10567--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10567--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10567--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10567--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10567--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10567--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10567--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10567--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10567--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10567--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10567--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10567--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10567--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10567--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10567--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10567--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10567--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10567--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10567--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10567--   Scanning root segment: 0x701a000..0x701afff (4096)
--10567--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10567--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10567--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10567--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10567--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10567--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10567--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10567--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10567--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10567--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10570== Searching for pointers to 69,166 not-freed blocks
--10570--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10570--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10570--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10570--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10570--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10570--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10570--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10570--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10570--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10570--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10570--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10570--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10570--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10570--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10570--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10570--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10570--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10570--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10570--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10570--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10570--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10570--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10570--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10570--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10570--   Scanning root segment: 0x701a000..0x701afff (4096)
--10570--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10570--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10570--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10570--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10570--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10570--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10570--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10570--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10570--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10570--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10565== Checked 4,790,880 bytes
==10565== 
==10565== LEAK SUMMARY:
==10565==    definitely lost: 2,205 bytes in 14 blocks
==10565==    indirectly lost: 6,756 bytes in 7 blocks
==10565==      possibly lost: 0 bytes in 0 blocks
==10565==    still reachable: 3,106,679 bytes in 68,998 blocks
==10565==         suppressed: 0 bytes in 0 blocks
==10565== Rerun with --leak-check=full to see details of leaked memory
==10565== 
==10565== Use --track-origins=yes to see where uninitialised values come from
==10565== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10565== 
==10565== 1 errors in context 1 of 2:
==10565== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10565==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10565==    by 0x488CD0: stringsubst (subst.c:301)
==10565==    by 0x48801B: prefork (subst.c:77)
==10565==    by 0x42B318: execcmd (exec.c:2619)
==10565==    by 0x428CA0: execpline2 (exec.c:1697)
==10565==    by 0x427FD2: execpline (exec.c:1484)
==10565==    by 0x427756: execlist (exec.c:1267)
==10565==    by 0x42717C: execode (exec.c:1073)
==10565==    by 0x431299: runshfunc (exec.c:5040)
==10565==    by 0x430E76: doshfunc (exec.c:4920)
==10565==    by 0x4302FB: execshfunc (exec.c:4557)
==10565==    by 0x42D8C1: execcmd (exec.c:3373)
==10565== 
==10565== 
==10565== 2 errors in context 2 of 2:
==10565== Conditional jump or move depends on uninitialised value(s)
==10565==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10565==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10565==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10565==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10565==    by 0x42D8E9: execcmd (exec.c:3378)
==10565==    by 0x428CA0: execpline2 (exec.c:1697)
==10565==    by 0x427FD2: execpline (exec.c:1484)
==10565==    by 0x42779A: execlist (exec.c:1275)
==10565==    by 0x42717C: execode (exec.c:1073)
==10565==    by 0x431299: runshfunc (exec.c:5040)
==10565==    by 0x430E76: doshfunc (exec.c:4920)
==10565==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10565== 
==10565== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10572-by-pythonnut-on-???
==10572== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10572-by-pythonnut-on-???
==10572== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10572-by-pythonnut-on-???
==10572== 
==10572== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10572== don't want to do, unless you know exactly what you're doing,
==10572== or are doing some strange experiment):
==10572==   /usr/lib/valgrind/../../bin/vgdb --pid=10572 ...command...
==10572== 
==10572== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10572==   /path/to/gdb ./zsh
==10572== and then give GDB the following command
==10572==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10572
==10572== --pid is optional if only one valgrind process is running
==10572== 
--10572-- Caught __NR_exit; running __libc_freeres()
--10572-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10567== Checked 4,820,120 bytes
==10567== 
==10572== 
==10572== HEAP SUMMARY:
==10572==     in use at exit: 3,115,639 bytes in 69,019 blocks
==10572==   total heap usage: 1,603,391 allocs, 1,534,372 frees, 129,811,601 bytes allocated
==10572== 
==10570== Checked 4,785,672 bytes
==10570== 
==10567== LEAK SUMMARY:
==10567==    definitely lost: 2,221 bytes in 14 blocks
==10567==    indirectly lost: 6,796 bytes in 9 blocks
==10567==      possibly lost: 0 bytes in 0 blocks
==10567==    still reachable: 3,126,445 bytes in 69,449 blocks
==10567==         suppressed: 0 bytes in 0 blocks
==10567== Rerun with --leak-check=full to see details of leaked memory
==10567== 
==10567== Use --track-origins=yes to see where uninitialised values come from
==10567== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10567== 
==10567== 1 errors in context 1 of 2:
==10567== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10567==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10567==    by 0x488CD0: stringsubst (subst.c:301)
==10567==    by 0x48801B: prefork (subst.c:77)
==10567==    by 0x42B318: execcmd (exec.c:2619)
==10567==    by 0x428CA0: execpline2 (exec.c:1697)
==10567==    by 0x427FD2: execpline (exec.c:1484)
==10567==    by 0x427756: execlist (exec.c:1267)
==10567==    by 0x42717C: execode (exec.c:1073)
==10567==    by 0x431299: runshfunc (exec.c:5040)
==10567==    by 0x430E76: doshfunc (exec.c:4920)
==10567==    by 0x4302FB: execshfunc (exec.c:4557)
==10567==    by 0x42D8C1: execcmd (exec.c:3373)
==10567== 
==10567== 
==10567== 2 errors in context 2 of 2:
==10567== Conditional jump or move depends on uninitialised value(s)
==10567==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10567==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10567==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10567==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10567==    by 0x42D8E9: execcmd (exec.c:3378)
==10567==    by 0x428CA0: execpline2 (exec.c:1697)
==10567==    by 0x427FD2: execpline (exec.c:1484)
==10567==    by 0x42779A: execlist (exec.c:1275)
==10567==    by 0x42717C: execode (exec.c:1073)
==10567==    by 0x431299: runshfunc (exec.c:5040)
==10567==    by 0x430E76: doshfunc (exec.c:4920)
==10567==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10567== 
==10567== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== Searching for pointers to 69,019 not-freed blocks
--10572--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10572--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10572--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10572--   Scanning root segment: 0x4037000..0x403afff (16384)
--10572--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10572--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10572--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10572--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10572--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10572--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10572--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10572--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10572--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10572--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10572--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10572--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10572--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10572--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10572--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10572--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10572--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10572--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10572--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10572--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10572--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10572--   Scanning root segment: 0x701a000..0x701afff (4096)
--10572--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
==10570== LEAK SUMMARY:
--10572--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
==10570==    definitely lost: 2,205 bytes in 14 blocks
==10570==    indirectly lost: 6,756 bytes in 7 blocks
==10570==      possibly lost: 0 bytes in 0 blocks
==10570==    still reachable: 3,115,276 bytes in 69,145 blocks
--10572--   Scanning root segment: 0xae51000..0xae52fff (8192)
==10570==         suppressed: 0 bytes in 0 blocks
==10570== Rerun with --leak-check=full to see details of leaked memory
==10570== 
==10570== Use --track-origins=yes to see where uninitialised values come from
==10570== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10570== 
==10570== 1 errors in context 1 of 2:
==10570== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
--10572--   Scanning root segment: 0xb054000..0xb054fff (4096)
==10570==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10570==    by 0x488CD0: stringsubst (subst.c:301)
==10570==    by 0x48801B: prefork (subst.c:77)
==10570==    by 0x42B318: execcmd (exec.c:2619)
--10572--   Scanning root segment: 0xb268000..0xb268fff (4096)
==10570==    by 0x428CA0: execpline2 (exec.c:1697)
==10570==    by 0x427FD2: execpline (exec.c:1484)
==10570==    by 0x427756: execlist (exec.c:1267)
==10570==    by 0x42717C: execode (exec.c:1073)
==10570==    by 0x431299: runshfunc (exec.c:5040)
==10570==    by 0x430E76: doshfunc (exec.c:4920)
==10570==    by 0x4302FB: execshfunc (exec.c:4557)
--10572--   Scanning root segment: 0xb46a000..0xb46afff (4096)
==10570==    by 0x42D8C1: execcmd (exec.c:3373)
==10570== 
==10570== 
==10570== 2 errors in context 2 of 2:
==10570== Conditional jump or move depends on uninitialised value(s)
==10570==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
--10572--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
==10570==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10570==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10570==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10570==    by 0x42D8E9: execcmd (exec.c:3378)
==10570==    by 0x428CA0: execpline2 (exec.c:1697)
==10570==    by 0x427FD2: execpline (exec.c:1484)
--10572--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
==10570==    by 0x42779A: execlist (exec.c:1275)
==10570==    by 0x42717C: execode (exec.c:1073)
==10570==    by 0x431299: runshfunc (exec.c:5040)
==10570==    by 0x430E76: doshfunc (exec.c:4920)
==10570==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10570== 
==10570== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10572--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10572--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10569-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFE8F5C,  len 4
==10569== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10569-by-pythonnut-on-???
==10569== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10569-by-pythonnut-on-???
==10569== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10569-by-pythonnut-on-???
==10569== 
==10569== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10569== don't want to do, unless you know exactly what you're doing,
==10569== or are doing some strange experiment):
==10569==   /usr/lib/valgrind/../../bin/vgdb --pid=10569 ...command...
==10569== 
==10569== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10569==   /path/to/gdb ./zsh
==10569== and then give GDB the following command
==10569==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10569
==10569== --pid is optional if only one valgrind process is running
==10569== 
--10569-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10569== 
==10569== HEAP SUMMARY:
==10569==     in use at exit: 3,124,173 bytes in 69,163 blocks
==10569==   total heap usage: 1,603,711 allocs, 1,534,548 frees, 129,728,328 bytes allocated
==10569== 
==10569== Searching for pointers to 69,163 not-freed blocks
--10569--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10569--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10569--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10569--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10569--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10569--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10569--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10569--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10569--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10569--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10569--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10569--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10569--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10569--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10569--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10569--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10569--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10569--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10569--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10569--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10569--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10569--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10569--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10569--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10569--   Scanning root segment: 0x701a000..0x701afff (4096)
--10569--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10569--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10569--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10569--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10569--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10569--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10569--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10569--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10569--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10569--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10572== Checked 4,790,880 bytes
==10572== 
==10572== LEAK SUMMARY:
==10572==    definitely lost: 2,205 bytes in 14 blocks
==10572==    indirectly lost: 6,756 bytes in 7 blocks
==10572==      possibly lost: 0 bytes in 0 blocks
==10572==    still reachable: 3,106,678 bytes in 68,998 blocks
==10572==         suppressed: 0 bytes in 0 blocks
==10572== Rerun with --leak-check=full to see details of leaked memory
==10572== 
==10572== Use --track-origins=yes to see where uninitialised values come from
==10572== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10572== 
==10572== 1 errors in context 1 of 2:
==10572== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10572==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10572==    by 0x488CD0: stringsubst (subst.c:301)
==10572==    by 0x48801B: prefork (subst.c:77)
==10572==    by 0x42B318: execcmd (exec.c:2619)
==10572==    by 0x428CA0: execpline2 (exec.c:1697)
==10572==    by 0x427FD2: execpline (exec.c:1484)
==10572==    by 0x427756: execlist (exec.c:1267)
==10572==    by 0x42717C: execode (exec.c:1073)
==10572==    by 0x431299: runshfunc (exec.c:5040)
==10572==    by 0x430E76: doshfunc (exec.c:4920)
==10572==    by 0x4302FB: execshfunc (exec.c:4557)
==10572==    by 0x42D8C1: execcmd (exec.c:3373)
==10572== 
==10572== 
==10572== 2 errors in context 2 of 2:
==10572== Conditional jump or move depends on uninitialised value(s)
==10572==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10572==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10572==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10572==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10572==    by 0x42D8E9: execcmd (exec.c:3378)
==10572==    by 0x428CA0: execpline2 (exec.c:1697)
==10572==    by 0x427FD2: execpline (exec.c:1484)
==10572==    by 0x42779A: execlist (exec.c:1275)
==10572==    by 0x42717C: execode (exec.c:1073)
==10572==    by 0x431299: runshfunc (exec.c:5040)
==10572==    by 0x430E76: doshfunc (exec.c:4920)
==10572==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10572== 
==10572== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10621-by-pythonnut-on-???
==10621== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10621-by-pythonnut-on-???
==10621== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10621-by-pythonnut-on-???
==10621== 
==10621== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10621== don't want to do, unless you know exactly what you're doing,
==10621== or are doing some strange experiment):
==10621==   /usr/lib/valgrind/../../bin/vgdb --pid=10621 ...command...
==10621== 
==10621== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10621==   /path/to/gdb ./zsh
==10621== and then give GDB the following command
==10621==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10621
==10621== --pid is optional if only one valgrind process is running
==10621== 
--10621-- Caught __NR_exit; running __libc_freeres()
--10573-- Caught __NR_exit; running __libc_freeres()
==10573== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10573-by-pythonnut-on-???
==10573== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10573-by-pythonnut-on-???
==10573== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10573-by-pythonnut-on-???
==10573== 
==10573== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10573== don't want to do, unless you know exactly what you're doing,
==10573== or are doing some strange experiment):
==10573==   /usr/lib/valgrind/../../bin/vgdb --pid=10573 ...command...
==10573== 
==10573== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10573==   /path/to/gdb ./zsh
==10573== and then give GDB the following command
==10573==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10573
==10573== --pid is optional if only one valgrind process is running
==10573== 
==10569== Checked 4,784,992 bytes
==10569== 
--10621-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10621== 
--10573-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10621== HEAP SUMMARY:
==10621==     in use at exit: 3,115,638 bytes in 69,019 blocks
==10621==   total heap usage: 1,603,396 allocs, 1,534,377 frees, 129,813,714 bytes allocated
==10621== 
==10573== 
==10573== HEAP SUMMARY:
==10573==     in use at exit: 3,135,707 bytes in 69,477 blocks
==10573==   total heap usage: 1,597,329 allocs, 1,527,852 frees, 129,038,420 bytes allocated
==10573== 
==10569== LEAK SUMMARY:
==10569==    definitely lost: 2,205 bytes in 14 blocks
==10569==    indirectly lost: 6,756 bytes in 7 blocks
==10569==      possibly lost: 0 bytes in 0 blocks
==10569==    still reachable: 3,115,212 bytes in 69,142 blocks
==10569==         suppressed: 0 bytes in 0 blocks
==10569== Rerun with --leak-check=full to see details of leaked memory
==10569== 
==10569== Use --track-origins=yes to see where uninitialised values come from
==10569== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10569== 
==10569== 1 errors in context 1 of 2:
==10569== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10569==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10569==    by 0x488CD0: stringsubst (subst.c:301)
==10569==    by 0x48801B: prefork (subst.c:77)
==10569==    by 0x42B318: execcmd (exec.c:2619)
==10569==    by 0x428CA0: execpline2 (exec.c:1697)
==10569==    by 0x427FD2: execpline (exec.c:1484)
==10569==    by 0x427756: execlist (exec.c:1267)
==10569==    by 0x42717C: execode (exec.c:1073)
==10569==    by 0x431299: runshfunc (exec.c:5040)
==10569==    by 0x430E76: doshfunc (exec.c:4920)
==10569==    by 0x4302FB: execshfunc (exec.c:4557)
==10569==    by 0x42D8C1: execcmd (exec.c:3373)
==10569== 
==10569== 
==10569== 2 errors in context 2 of 2:
==10569== Conditional jump or move depends on uninitialised value(s)
==10569==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10569==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10569==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10569==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10569==    by 0x42D8E9: execcmd (exec.c:3378)
==10569==    by 0x428CA0: execpline2 (exec.c:1697)
==10569==    by 0x427FD2: execpline (exec.c:1484)
==10569==    by 0x42779A: execlist (exec.c:1275)
==10569==    by 0x42717C: execode (exec.c:1073)
==10569==    by 0x431299: runshfunc (exec.c:5040)
==10569==    by 0x430E76: doshfunc (exec.c:4920)
==10569==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10569== 
==10569== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== Searching for pointers to 69,019 not-freed blocks
--10621--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10621--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10621--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10621--   Scanning root segment: 0x4037000..0x403afff (16384)
--10621--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10621--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10621--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10621--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10621--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10621--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10621--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10621--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10621--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10621--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10621--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10621--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10621--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10621--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10621--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10621--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10621--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10621--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10621--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10621--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10621--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10621--   Scanning root segment: 0x701a000..0x701afff (4096)
--10621--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10621--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10621--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10621--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10621--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10621--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10621--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10621--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10621--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10621--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10622-- Caught __NR_exit; running __libc_freeres()
==10573== Searching for pointers to 69,477 not-freed blocks
--10573--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10573--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10573--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10573--   Scanning root segment: 0x4037000..0x403efff (32768)
--10573--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10573--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10573--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10573--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10573--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10573--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10573--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10573--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10573--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10573--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10573--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10573--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10573--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10573--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10573--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10573--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10573--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10573--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10573--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10573--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10573--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10573--   Scanning root segment: 0x701a000..0x701afff (4096)
--10573--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10573--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10573--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10573--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10573--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10573--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10573--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10573--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10573--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10573--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10622== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10622-by-pythonnut-on-???
==10622== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10622-by-pythonnut-on-???
==10622== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10622-by-pythonnut-on-???
==10622== 
==10622== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10622== don't want to do, unless you know exactly what you're doing,
==10622== or are doing some strange experiment):
==10622==   /usr/lib/valgrind/../../bin/vgdb --pid=10622 ...command...
==10622== 
==10622== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10622==   /path/to/gdb ./zsh
==10622== and then give GDB the following command
==10622==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10622
==10622== --pid is optional if only one valgrind process is running
==10622== 
--10622-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10622== 
==10622== HEAP SUMMARY:
==10622==     in use at exit: 3,124,180 bytes in 69,163 blocks
==10622==   total heap usage: 1,603,726 allocs, 1,534,563 frees, 129,733,326 bytes allocated
==10622== 
==10622== Searching for pointers to 69,163 not-freed blocks
--10622--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10622--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10622--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10622--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10622--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10622--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10622--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10622--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10622--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10622--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10622--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10622--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10622--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10622--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10622--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10622--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10622--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10622--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10622--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10622--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10622--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10622--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10622--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10622--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10622--   Scanning root segment: 0x701a000..0x701afff (4096)
--10622--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10622--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10622--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10622--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10622--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10622--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10622--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10622--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10622--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10622--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10621== Checked 4,790,880 bytes
==10621== 
==10573== Checked 4,836,472 bytes
==10573== 
==10621== LEAK SUMMARY:
==10621==    definitely lost: 2,205 bytes in 14 blocks
==10621==    indirectly lost: 6,756 bytes in 7 blocks
==10621==      possibly lost: 0 bytes in 0 blocks
==10621==    still reachable: 3,106,677 bytes in 68,998 blocks
==10621==         suppressed: 0 bytes in 0 blocks
==10621== Rerun with --leak-check=full to see details of leaked memory
==10621== 
==10621== Use --track-origins=yes to see where uninitialised values come from
==10621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10621== 
==10621== 1 errors in context 1 of 2:
==10621== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10621==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10621==    by 0x488CD0: stringsubst (subst.c:301)
==10621==    by 0x48801B: prefork (subst.c:77)
==10621==    by 0x42B318: execcmd (exec.c:2619)
==10621==    by 0x428CA0: execpline2 (exec.c:1697)
==10621==    by 0x427FD2: execpline (exec.c:1484)
==10621==    by 0x427756: execlist (exec.c:1267)
==10621==    by 0x42717C: execode (exec.c:1073)
==10621==    by 0x431299: runshfunc (exec.c:5040)
==10621==    by 0x430E76: doshfunc (exec.c:4920)
==10621==    by 0x4302FB: execshfunc (exec.c:4557)
==10621==    by 0x42D8C1: execcmd (exec.c:3373)
==10621== 
==10621== 
==10621== 2 errors in context 2 of 2:
==10621== Conditional jump or move depends on uninitialised value(s)
==10621==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10621==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10621==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10621==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10621==    by 0x42D8E9: execcmd (exec.c:3378)
==10621==    by 0x428CA0: execpline2 (exec.c:1697)
==10621==    by 0x427FD2: execpline (exec.c:1484)
==10621==    by 0x42779A: execlist (exec.c:1275)
==10621==    by 0x42717C: execode (exec.c:1073)
==10621==    by 0x431299: runshfunc (exec.c:5040)
==10621==    by 0x430E76: doshfunc (exec.c:4920)
==10621==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10621== 
==10621== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10573== LEAK SUMMARY:
==10573==    definitely lost: 2,221 bytes in 14 blocks
==10573==    indirectly lost: 6,796 bytes in 9 blocks
==10573==      possibly lost: 0 bytes in 0 blocks
==10573==    still reachable: 3,126,690 bytes in 69,454 blocks
==10573==         suppressed: 0 bytes in 0 blocks
==10573== Rerun with --leak-check=full to see details of leaked memory
==10573== 
==10573== Use --track-origins=yes to see where uninitialised values come from
==10573== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10573== 
==10573== 1 errors in context 1 of 2:
==10573== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10573==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10573==    by 0x488CD0: stringsubst (subst.c:301)
==10573==    by 0x48801B: prefork (subst.c:77)
==10573==    by 0x42B318: execcmd (exec.c:2619)
==10573==    by 0x428CA0: execpline2 (exec.c:1697)
==10573==    by 0x427FD2: execpline (exec.c:1484)
==10573==    by 0x427756: execlist (exec.c:1267)
==10573==    by 0x42717C: execode (exec.c:1073)
==10573==    by 0x431299: runshfunc (exec.c:5040)
==10573==    by 0x430E76: doshfunc (exec.c:4920)
==10573==    by 0x4302FB: execshfunc (exec.c:4557)
==10573==    by 0x42D8C1: execcmd (exec.c:3373)
==10573== 
==10573== 
==10573== 2 errors in context 2 of 2:
==10573== Conditional jump or move depends on uninitialised value(s)
==10573==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10573==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10573==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10573==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10573==    by 0x42D8E9: execcmd (exec.c:3378)
==10573==    by 0x428CA0: execpline2 (exec.c:1697)
==10573==    by 0x427FD2: execpline (exec.c:1484)
==10573==    by 0x42779A: execlist (exec.c:1275)
==10573==    by 0x42717C: execode (exec.c:1073)
==10573==    by 0x431299: runshfunc (exec.c:5040)
==10573==    by 0x430E76: doshfunc (exec.c:4920)
==10573==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10573== 
==10573== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10623-by-pythonnut-on-???
==10623== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10623-by-pythonnut-on-???
==10623== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10623-by-pythonnut-on-???
==10623== 
==10623== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10623== don't want to do, unless you know exactly what you're doing,
==10623== or are doing some strange experiment):
==10623==   /usr/lib/valgrind/../../bin/vgdb --pid=10623 ...command...
==10623== 
==10623== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10623==   /path/to/gdb ./zsh
==10623== and then give GDB the following command
==10623==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10623
==10623== --pid is optional if only one valgrind process is running
==10623== 
--10623-- Caught __NR_exit; running __libc_freeres()
--10566-- Caught __NR_exit; running __libc_freeres()
--10623-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10566-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10622== Checked 4,785,128 bytes
==10622== 
==10623== 
==10566== 
==10623== HEAP SUMMARY:
==10623==     in use at exit: 3,115,637 bytes in 69,019 blocks
==10623==   total heap usage: 1,603,404 allocs, 1,534,385 frees, 129,817,367 bytes allocated
==10623== 
==10566== HEAP SUMMARY:
==10566==     in use at exit: 3,133,543 bytes in 69,402 blocks
==10566==   total heap usage: 1,597,280 allocs, 1,527,878 frees, 129,039,031 bytes allocated
==10566== 
==10622== LEAK SUMMARY:
==10622==    definitely lost: 2,205 bytes in 14 blocks
==10622==    indirectly lost: 6,756 bytes in 7 blocks
==10622==      possibly lost: 0 bytes in 0 blocks
==10622==    still reachable: 3,115,219 bytes in 69,142 blocks
==10622==         suppressed: 0 bytes in 0 blocks
==10622== Rerun with --leak-check=full to see details of leaked memory
==10622== 
==10622== Use --track-origins=yes to see where uninitialised values come from
==10622== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10622== 
==10622== 1 errors in context 1 of 2:
==10622== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10622==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10622==    by 0x488CD0: stringsubst (subst.c:301)
==10622==    by 0x48801B: prefork (subst.c:77)
==10622==    by 0x42B318: execcmd (exec.c:2619)
==10622==    by 0x428CA0: execpline2 (exec.c:1697)
==10622==    by 0x427FD2: execpline (exec.c:1484)
==10622==    by 0x427756: execlist (exec.c:1267)
==10622==    by 0x42717C: execode (exec.c:1073)
==10622==    by 0x431299: runshfunc (exec.c:5040)
==10622==    by 0x430E76: doshfunc (exec.c:4920)
==10622==    by 0x4302FB: execshfunc (exec.c:4557)
==10622==    by 0x42D8C1: execcmd (exec.c:3373)
==10622== 
==10622== 
==10622== 2 errors in context 2 of 2:
==10622== Conditional jump or move depends on uninitialised value(s)
==10622==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10622==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10622==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10622==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10622==    by 0x42D8E9: execcmd (exec.c:3378)
==10622==    by 0x428CA0: execpline2 (exec.c:1697)
==10622==    by 0x427FD2: execpline (exec.c:1484)
==10622==    by 0x42779A: execlist (exec.c:1275)
==10622==    by 0x42717C: execode (exec.c:1073)
==10622==    by 0x431299: runshfunc (exec.c:5040)
==10622==    by 0x430E76: doshfunc (exec.c:4920)
==10622==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10622== 
==10622== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== Searching for pointers to 69,019 not-freed blocks
--10623--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10623--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10623--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10623--   Scanning root segment: 0x4037000..0x403afff (16384)
--10623--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10623--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10623--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10623--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10623--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10623--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10623--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10623--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10623--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10623--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10623--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10623--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10623--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10623--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10623--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10623--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10623--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10566== Searching for pointers to 69,402 not-freed blocks
--10566--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10623--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10623--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10566--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10623--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10623--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10623--   Scanning root segment: 0x701a000..0x701afff (4096)
--10566--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10623--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10623--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10566--   Scanning root segment: 0x4037000..0x403afff (16384)
--10623--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10566--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10623--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10566--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10623--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10566--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10623--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10566--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10566--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10623--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10566--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10623--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10566--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10566--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10566--   Scanning root segment: 0x54ac000..0x54acfff (4096)
==10624== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10624-by-pythonnut-on-???
--10566--   Scanning root segment: 0x54ad000..0x54adfff (4096)
==10624== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10624-by-pythonnut-on-???
--10623--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
==10624== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10624-by-pythonnut-on-???
==10624== 
==10624== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10624== don't want to do, unless you know exactly what you're doing,
==10624== or are doing some strange experiment):
==10624==   /usr/lib/valgrind/../../bin/vgdb --pid=10624 ...command...
==10624== 
--10566--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
==10624== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10624==   /path/to/gdb ./zsh
==10624== and then give GDB the following command
==10624==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10624
==10624== --pid is optional if only one valgrind process is running
==10624== 
--10566--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10623--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10566--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10566--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10566--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10566--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10566--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10566--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10566--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10566--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10566--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10566--   Scanning root segment: 0x701a000..0x701afff (4096)
--10566--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10566--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10566--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10566--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10566--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10566--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10566--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10566--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10566--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10566--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10624-- Caught __NR_exit; running __libc_freeres()
--10624-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10624== 
==10624== HEAP SUMMARY:
==10624==     in use at exit: 3,124,276 bytes in 69,163 blocks
==10624==   total heap usage: 1,603,742 allocs, 1,534,579 frees, 129,738,113 bytes allocated
==10624== 
==10624== Searching for pointers to 69,163 not-freed blocks
--10624--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10624--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10624--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10624--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10624--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10624--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10624--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10624--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10624--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10624--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10624--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10624--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10624--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10624--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10624--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10624--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10624--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10624--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10624--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10624--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10624--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10624--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10624--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10624--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10624--   Scanning root segment: 0x701a000..0x701afff (4096)
--10624--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10624--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10624--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10624--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10624--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10624--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10624--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10624--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10624--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10624--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10623== Checked 4,790,880 bytes
==10623== 
==10566== Checked 4,816,400 bytes
==10566== 
==10623== LEAK SUMMARY:
==10623==    definitely lost: 2,205 bytes in 14 blocks
==10623==    indirectly lost: 6,756 bytes in 7 blocks
==10623==      possibly lost: 0 bytes in 0 blocks
==10623==    still reachable: 3,106,676 bytes in 68,998 blocks
==10623==         suppressed: 0 bytes in 0 blocks
==10623== Rerun with --leak-check=full to see details of leaked memory
==10623== 
==10623== Use --track-origins=yes to see where uninitialised values come from
==10623== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10623== 
==10623== 1 errors in context 1 of 2:
==10623== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10623==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10623==    by 0x488CD0: stringsubst (subst.c:301)
==10623==    by 0x48801B: prefork (subst.c:77)
==10623==    by 0x42B318: execcmd (exec.c:2619)
==10623==    by 0x428CA0: execpline2 (exec.c:1697)
==10623==    by 0x427FD2: execpline (exec.c:1484)
==10623==    by 0x427756: execlist (exec.c:1267)
==10623==    by 0x42717C: execode (exec.c:1073)
==10623==    by 0x431299: runshfunc (exec.c:5040)
==10623==    by 0x430E76: doshfunc (exec.c:4920)
==10623==    by 0x4302FB: execshfunc (exec.c:4557)
==10623==    by 0x42D8C1: execcmd (exec.c:3373)
==10623== 
==10623== 
==10623== 2 errors in context 2 of 2:
==10623== Conditional jump or move depends on uninitialised value(s)
==10623==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10623==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10623==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10623==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10623==    by 0x42D8E9: execcmd (exec.c:3378)
==10623==    by 0x428CA0: execpline2 (exec.c:1697)
==10623==    by 0x427FD2: execpline (exec.c:1484)
==10623==    by 0x42779A: execlist (exec.c:1275)
==10623==    by 0x42717C: execode (exec.c:1073)
==10623==    by 0x431299: runshfunc (exec.c:5040)
==10623==    by 0x430E76: doshfunc (exec.c:4920)
==10623==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10623== 
==10623== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10566== LEAK SUMMARY:
==10566==    definitely lost: 2,221 bytes in 14 blocks
==10566==    indirectly lost: 6,796 bytes in 9 blocks
==10566==      possibly lost: 0 bytes in 0 blocks
==10566==    still reachable: 3,124,526 bytes in 69,379 blocks
==10566==         suppressed: 0 bytes in 0 blocks
==10566== Rerun with --leak-check=full to see details of leaked memory
==10566== 
==10566== Use --track-origins=yes to see where uninitialised values come from
==10566== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10566== 
==10566== 1 errors in context 1 of 2:
==10566== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10566==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10566==    by 0x488CD0: stringsubst (subst.c:301)
==10566==    by 0x48801B: prefork (subst.c:77)
==10566==    by 0x42B318: execcmd (exec.c:2619)
==10566==    by 0x428CA0: execpline2 (exec.c:1697)
==10566==    by 0x427FD2: execpline (exec.c:1484)
==10566==    by 0x427756: execlist (exec.c:1267)
==10566==    by 0x42717C: execode (exec.c:1073)
==10566==    by 0x431299: runshfunc (exec.c:5040)
==10566==    by 0x430E76: doshfunc (exec.c:4920)
==10566==    by 0x4302FB: execshfunc (exec.c:4557)
==10566==    by 0x42D8C1: execcmd (exec.c:3373)
==10566== 
==10566== 
==10566== 2 errors in context 2 of 2:
==10566== Conditional jump or move depends on uninitialised value(s)
==10566==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10566==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10566==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10566==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10566==    by 0x42D8E9: execcmd (exec.c:3378)
==10566==    by 0x428CA0: execpline2 (exec.c:1697)
==10566==    by 0x427FD2: execpline (exec.c:1484)
==10566==    by 0x42779A: execlist (exec.c:1275)
==10566==    by 0x42717C: execode (exec.c:1073)
==10566==    by 0x431299: runshfunc (exec.c:5040)
==10566==    by 0x430E76: doshfunc (exec.c:4920)
==10566==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10566== 
==10566== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10627-by-pythonnut-on-???
==10627== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10627-by-pythonnut-on-???
==10627== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10627-by-pythonnut-on-???
==10627== 
==10627== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10627== don't want to do, unless you know exactly what you're doing,
==10627== or are doing some strange experiment):
==10627==   /usr/lib/valgrind/../../bin/vgdb --pid=10627 ...command...
==10627== 
==10627== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10627==   /path/to/gdb ./zsh
==10627== and then give GDB the following command
==10627==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10627
==10627== --pid is optional if only one valgrind process is running
==10627== 
--10627-- Caught __NR_exit; running __libc_freeres()
--10412-- Caught __NR_exit; running __libc_freeres()
--10627-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== 
--10412-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== HEAP SUMMARY:
==10627==     in use at exit: 3,115,640 bytes in 69,019 blocks
==10627==   total heap usage: 1,603,406 allocs, 1,534,387 frees, 129,817,944 bytes allocated
==10627== 
==10624== Checked 4,784,408 bytes
==10624== 
==10412== 
==10412== HEAP SUMMARY:
==10412==     in use at exit: 3,131,300 bytes in 69,329 blocks
==10412==   total heap usage: 1,597,264 allocs, 1,527,935 frees, 129,035,320 bytes allocated
==10412== 
==10624== LEAK SUMMARY:
==10624==    definitely lost: 2,205 bytes in 14 blocks
==10624==    indirectly lost: 6,756 bytes in 7 blocks
==10624==      possibly lost: 0 bytes in 0 blocks
==10624==    still reachable: 3,115,315 bytes in 69,142 blocks
==10624==         suppressed: 0 bytes in 0 blocks
==10624== Rerun with --leak-check=full to see details of leaked memory
==10624== 
==10624== Use --track-origins=yes to see where uninitialised values come from
==10624== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10624== 
==10624== 1 errors in context 1 of 2:
==10624== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10624==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10624==    by 0x488CD0: stringsubst (subst.c:301)
==10624==    by 0x48801B: prefork (subst.c:77)
==10624==    by 0x42B318: execcmd (exec.c:2619)
==10624==    by 0x428CA0: execpline2 (exec.c:1697)
==10624==    by 0x427FD2: execpline (exec.c:1484)
==10624==    by 0x427756: execlist (exec.c:1267)
==10624==    by 0x42717C: execode (exec.c:1073)
==10624==    by 0x431299: runshfunc (exec.c:5040)
==10624==    by 0x430E76: doshfunc (exec.c:4920)
==10624==    by 0x4302FB: execshfunc (exec.c:4557)
==10624==    by 0x42D8C1: execcmd (exec.c:3373)
==10624== 
==10624== 
==10624== 2 errors in context 2 of 2:
==10624== Conditional jump or move depends on uninitialised value(s)
==10624==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10624==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10624==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10624==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10624==    by 0x42D8E9: execcmd (exec.c:3378)
==10624==    by 0x428CA0: execpline2 (exec.c:1697)
==10624==    by 0x427FD2: execpline (exec.c:1484)
==10624==    by 0x42779A: execlist (exec.c:1275)
==10624==    by 0x42717C: execode (exec.c:1073)
==10624==    by 0x431299: runshfunc (exec.c:5040)
==10624==    by 0x430E76: doshfunc (exec.c:4920)
==10624==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10624== 
==10624== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== Searching for pointers to 69,019 not-freed blocks
--10627--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10627--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10627--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10627--   Scanning root segment: 0x4037000..0x403afff (16384)
--10627--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10627--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10627--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10627--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10627--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10627--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10627--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10627--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10627--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10627--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10627--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10627--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10627--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10627--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10627--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10627--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10627--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10627--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10627--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10627--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10627--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10627--   Scanning root segment: 0x701a000..0x701afff (4096)
--10627--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10627--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10627--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10627--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10627--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10627--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10627--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10627--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10627--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10627--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10412== Searching for pointers to 69,329 not-freed blocks
--10412--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10412--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10412--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10412--   Scanning root segment: 0x4037000..0x403afff (16384)
--10412--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10412--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10412--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10412--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10412--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10412--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10412--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10412--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10412--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10412--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10412--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10412--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10412--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10412--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10412--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10412--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10412--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10412--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10412--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10412--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10412--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10412--   Scanning root segment: 0x701a000..0x701afff (4096)
--10412--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10412--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10412--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10412--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10412--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10412--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10412--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10412--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10412--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10412--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFEC7DC,  len 4
==10629== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10629-by-pythonnut-on-???
==10629== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10629-by-pythonnut-on-???
==10629== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10629-by-pythonnut-on-???
==10629== 
==10629== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10629== don't want to do, unless you know exactly what you're doing,
==10629== or are doing some strange experiment):
==10629==   /usr/lib/valgrind/../../bin/vgdb --pid=10629 ...command...
==10629== 
==10629== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10629==   /path/to/gdb ./zsh
==10629== and then give GDB the following command
==10629==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10629
==10629== --pid is optional if only one valgrind process is running
==10629== 
--10629-- Caught __NR_exit; running __libc_freeres()
==10627== Checked 4,790,880 bytes
==10627== 
==10412== Checked 4,813,760 bytes
==10412== 
--10629-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10627== LEAK SUMMARY:
==10627==    definitely lost: 2,205 bytes in 14 blocks
==10627==    indirectly lost: 6,756 bytes in 7 blocks
==10627==      possibly lost: 0 bytes in 0 blocks
==10627==    still reachable: 3,106,679 bytes in 68,998 blocks
==10627==         suppressed: 0 bytes in 0 blocks
==10627== Rerun with --leak-check=full to see details of leaked memory
==10627== 
==10627== Use --track-origins=yes to see where uninitialised values come from
==10627== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10627== 
==10627== 1 errors in context 1 of 2:
==10627== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10627==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10627==    by 0x488CD0: stringsubst (subst.c:301)
==10627==    by 0x48801B: prefork (subst.c:77)
==10627==    by 0x42B318: execcmd (exec.c:2619)
==10627==    by 0x428CA0: execpline2 (exec.c:1697)
==10627==    by 0x427FD2: execpline (exec.c:1484)
==10627==    by 0x427756: execlist (exec.c:1267)
==10627==    by 0x42717C: execode (exec.c:1073)
==10627==    by 0x431299: runshfunc (exec.c:5040)
==10627==    by 0x430E76: doshfunc (exec.c:4920)
==10627==    by 0x4302FB: execshfunc (exec.c:4557)
==10627==    by 0x42D8C1: execcmd (exec.c:3373)
==10627== 
==10627== 
==10627== 2 errors in context 2 of 2:
==10627== Conditional jump or move depends on uninitialised value(s)
==10627==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10627==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10627==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10627==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10627==    by 0x42D8E9: execcmd (exec.c:3378)
==10627==    by 0x428CA0: execpline2 (exec.c:1697)
==10627==    by 0x427FD2: execpline (exec.c:1484)
==10627==    by 0x42779A: execlist (exec.c:1275)
==10627==    by 0x42717C: execode (exec.c:1073)
==10627==    by 0x431299: runshfunc (exec.c:5040)
==10627==    by 0x430E76: doshfunc (exec.c:4920)
==10627==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10627== 
==10627== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10629== 
==10629== HEAP SUMMARY:
==10629==     in use at exit: 3,124,550 bytes in 69,169 blocks
==10629==   total heap usage: 1,604,267 allocs, 1,535,098 frees, 129,890,142 bytes allocated
==10629== 
==10412== LEAK SUMMARY:
==10412==    definitely lost: 2,221 bytes in 14 blocks
==10412==    indirectly lost: 6,796 bytes in 9 blocks
==10412==      possibly lost: 0 bytes in 0 blocks
==10412==    still reachable: 3,122,283 bytes in 69,306 blocks
==10412==         suppressed: 0 bytes in 0 blocks
==10412== Rerun with --leak-check=full to see details of leaked memory
==10412== 
==10412== Use --track-origins=yes to see where uninitialised values come from
==10412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10412== 
==10412== 1 errors in context 1 of 2:
==10412== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10412==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10412==    by 0x488CD0: stringsubst (subst.c:301)
==10412==    by 0x48801B: prefork (subst.c:77)
==10412==    by 0x42B318: execcmd (exec.c:2619)
==10412==    by 0x428CA0: execpline2 (exec.c:1697)
==10412==    by 0x427FD2: execpline (exec.c:1484)
==10412==    by 0x427756: execlist (exec.c:1267)
==10412==    by 0x42717C: execode (exec.c:1073)
==10412==    by 0x431299: runshfunc (exec.c:5040)
==10412==    by 0x430E76: doshfunc (exec.c:4920)
==10412==    by 0x4302FB: execshfunc (exec.c:4557)
==10412==    by 0x42D8C1: execcmd (exec.c:3373)
==10412== 
==10412== 
==10412== 2 errors in context 2 of 2:
==10412== Conditional jump or move depends on uninitialised value(s)
==10412==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10412==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10412==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10412==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10412==    by 0x42D8E9: execcmd (exec.c:3378)
==10412==    by 0x428CA0: execpline2 (exec.c:1697)
==10412==    by 0x427FD2: execpline (exec.c:1484)
==10412==    by 0x42779A: execlist (exec.c:1275)
==10412==    by 0x42717C: execode (exec.c:1073)
==10412==    by 0x431299: runshfunc (exec.c:5040)
==10412==    by 0x430E76: doshfunc (exec.c:4920)
==10412==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10412== 
==10412== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10630== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10630-by-pythonnut-on-???
==10630== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10630-by-pythonnut-on-???
==10630== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10630-by-pythonnut-on-???
==10630== 
==10630== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10630== don't want to do, unless you know exactly what you're doing,
==10630== or are doing some strange experiment):
==10630==   /usr/lib/valgrind/../../bin/vgdb --pid=10630 ...command...
==10630== 
==10630== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10630==   /path/to/gdb ./zsh
==10630== and then give GDB the following command
==10630==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10630
==10630== --pid is optional if only one valgrind process is running
==10630== 
==10629== Searching for pointers to 69,169 not-freed blocks
--10631-- Caught __NR_exit; running __libc_freeres()
--10629--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10629--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10629--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10629--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10629--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10629--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10629--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10629--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10629--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10629--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10629--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10629--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10629--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10629--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10629--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10629--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10629--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10629--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10629--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10629--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10629--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10629--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10629--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10629--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10629--   Scanning root segment: 0x701a000..0x701afff (4096)
--10629--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10629--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10629--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10629--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10629--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10629--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10629--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10629--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10629--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10629--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF1ADC,  len 4
==10631== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10631-by-pythonnut-on-???
==10631== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10631-by-pythonnut-on-???
==10631== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10631-by-pythonnut-on-???
==10631== 
==10631== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10631== don't want to do, unless you know exactly what you're doing,
==10631== or are doing some strange experiment):
==10631==   /usr/lib/valgrind/../../bin/vgdb --pid=10631 ...command...
==10631== 
==10631== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10631==   /path/to/gdb ./zsh
==10631== and then give GDB the following command
==10631==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10631
==10631== --pid is optional if only one valgrind process is running
==10631== 
--10631-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10631== 
==10631== HEAP SUMMARY:
==10631==     in use at exit: 3,115,922 bytes in 69,024 blocks
==10631==   total heap usage: 1,603,412 allocs, 1,534,388 frees, 129,821,558 bytes allocated
==10631== 
==10631== Searching for pointers to 69,024 not-freed blocks
--10631--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10631--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10631--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10631--   Scanning root segment: 0x4037000..0x403afff (16384)
--10631--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10631--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10631--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10631--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10631--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10631--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10631--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10631--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10631--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10631--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10631--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10631--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10631--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10631--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10631--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10631--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10631--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10631--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10631--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10631--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10631--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10631--   Scanning root segment: 0x701a000..0x701afff (4096)
--10631--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10631--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10631--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10631--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10631--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10631--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10631--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10631--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10631--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10631--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10629== Checked 4,784,616 bytes
==10629== 
==10629== LEAK SUMMARY:
==10629==    definitely lost: 2,205 bytes in 14 blocks
==10629==    indirectly lost: 6,756 bytes in 7 blocks
==10629==      possibly lost: 0 bytes in 0 blocks
==10629==    still reachable: 3,115,589 bytes in 69,148 blocks
==10629==         suppressed: 0 bytes in 0 blocks
==10629== Rerun with --leak-check=full to see details of leaked memory
==10629== 
==10629== Use --track-origins=yes to see where uninitialised values come from
==10629== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10629== 
==10629== 1 errors in context 1 of 2:
==10629== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10629==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10629==    by 0x488CD0: stringsubst (subst.c:301)
==10629==    by 0x48801B: prefork (subst.c:77)
==10629==    by 0x42B318: execcmd (exec.c:2619)
==10629==    by 0x428CA0: execpline2 (exec.c:1697)
==10629==    by 0x427FD2: execpline (exec.c:1484)
==10629==    by 0x427756: execlist (exec.c:1267)
==10629==    by 0x42717C: execode (exec.c:1073)
==10629==    by 0x431299: runshfunc (exec.c:5040)
==10629==    by 0x430E76: doshfunc (exec.c:4920)
==10629==    by 0x4302FB: execshfunc (exec.c:4557)
==10629==    by 0x42D8C1: execcmd (exec.c:3373)
==10629== 
==10629== 
==10629== 2 errors in context 2 of 2:
==10629== Conditional jump or move depends on uninitialised value(s)
==10629==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10629==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10629==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10629==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10629==    by 0x42D8E9: execcmd (exec.c:3378)
==10629==    by 0x428CA0: execpline2 (exec.c:1697)
==10629==    by 0x427FD2: execpline (exec.c:1484)
==10629==    by 0x42779A: execlist (exec.c:1275)
==10629==    by 0x42717C: execode (exec.c:1073)
==10629==    by 0x431299: runshfunc (exec.c:5040)
==10629==    by 0x430E76: doshfunc (exec.c:4920)
==10629==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10629== 
==10629== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10633-- Caught __NR_exit; running __libc_freeres()
==10633== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10633-by-pythonnut-on-???
==10633== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10633-by-pythonnut-on-???
==10633== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10633-by-pythonnut-on-???
==10633== 
==10633== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10633== don't want to do, unless you know exactly what you're doing,
==10633== or are doing some strange experiment):
==10633==   /usr/lib/valgrind/../../bin/vgdb --pid=10633 ...command...
==10633== 
==10633== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10633==   /path/to/gdb ./zsh
==10633== and then give GDB the following command
==10633==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10633
==10633== --pid is optional if only one valgrind process is running
==10633== 
==10631== Checked 4,791,792 bytes
==10631== 
--10633-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10633== 
==10633== HEAP SUMMARY:
==10633==     in use at exit: 3,124,454 bytes in 69,169 blocks
==10633==   total heap usage: 1,604,247 allocs, 1,535,078 frees, 129,887,912 bytes allocated
==10633== 
==10631== LEAK SUMMARY:
==10631==    definitely lost: 2,205 bytes in 14 blocks
==10631==    indirectly lost: 6,756 bytes in 7 blocks
==10631==      possibly lost: 0 bytes in 0 blocks
==10631==    still reachable: 3,106,961 bytes in 69,003 blocks
==10631==         suppressed: 0 bytes in 0 blocks
==10631== Rerun with --leak-check=full to see details of leaked memory
==10631== 
==10631== Use --track-origins=yes to see where uninitialised values come from
==10631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10631== 
==10631== 1 errors in context 1 of 2:
==10631== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10631==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10631==    by 0x488CD0: stringsubst (subst.c:301)
==10631==    by 0x48801B: prefork (subst.c:77)
==10631==    by 0x42B318: execcmd (exec.c:2619)
==10631==    by 0x428CA0: execpline2 (exec.c:1697)
==10631==    by 0x427FD2: execpline (exec.c:1484)
==10631==    by 0x427756: execlist (exec.c:1267)
==10631==    by 0x42717C: execode (exec.c:1073)
==10631==    by 0x431299: runshfunc (exec.c:5040)
==10631==    by 0x430E76: doshfunc (exec.c:4920)
==10631==    by 0x4302FB: execshfunc (exec.c:4557)
==10631==    by 0x42D8C1: execcmd (exec.c:3373)
==10631== 
==10631== 
==10631== 2 errors in context 2 of 2:
==10631== Conditional jump or move depends on uninitialised value(s)
==10631==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10631==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10631==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10631==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10631==    by 0x42D8E9: execcmd (exec.c:3378)
==10631==    by 0x428CA0: execpline2 (exec.c:1697)
==10631==    by 0x427FD2: execpline (exec.c:1484)
==10631==    by 0x42779A: execlist (exec.c:1275)
==10631==    by 0x42717C: execode (exec.c:1073)
==10631==    by 0x431299: runshfunc (exec.c:5040)
==10631==    by 0x430E76: doshfunc (exec.c:4920)
==10631==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10631== 
==10631== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10630-- Caught __NR_exit; running __libc_freeres()
==10633== Searching for pointers to 69,169 not-freed blocks
--10633--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10633--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10633--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10633--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10633--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10633--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10633--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10633--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10633--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10633--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10633--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10633--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10633--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10633--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10633--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10633--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10633--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10633--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10633--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10633--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10633--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10633--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10633--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10633--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10633--   Scanning root segment: 0x701a000..0x701afff (4096)
--10633--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10633--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10633--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10633--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10633--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10633--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10633--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10633--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10633--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10633--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10630-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10630== 
==10630== HEAP SUMMARY:
==10630==     in use at exit: 3,115,698 bytes in 69,021 blocks
==10630==   total heap usage: 1,603,415 allocs, 1,534,394 frees, 129,822,134 bytes allocated
==10630== 
==10630== Searching for pointers to 69,021 not-freed blocks
--10630--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10630--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10630--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10630--   Scanning root segment: 0x4037000..0x403afff (16384)
--10630--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10630--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10630--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10630--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10630--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10630--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10630--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10630--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10630--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10630--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10630--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10630--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10630--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10630--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10630--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10630--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10630--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10630--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10630--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10630--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10630--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10630--   Scanning root segment: 0x701a000..0x701afff (4096)
--10630--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10630--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10630--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10630--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10630--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10630--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10630--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10630--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10630--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10630--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10633== Checked 4,784,520 bytes
==10633== 
==10633== LEAK SUMMARY:
==10633==    definitely lost: 2,205 bytes in 14 blocks
==10633==    indirectly lost: 6,756 bytes in 7 blocks
==10633==      possibly lost: 0 bytes in 0 blocks
==10633==    still reachable: 3,115,493 bytes in 69,148 blocks
==10633==         suppressed: 0 bytes in 0 blocks
==10633== Rerun with --leak-check=full to see details of leaked memory
==10633== 
==10633== Use --track-origins=yes to see where uninitialised values come from
==10633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10633== 
==10633== 1 errors in context 1 of 2:
==10633== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10633==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10633==    by 0x488CD0: stringsubst (subst.c:301)
==10633==    by 0x48801B: prefork (subst.c:77)
==10633==    by 0x42B318: execcmd (exec.c:2619)
==10633==    by 0x428CA0: execpline2 (exec.c:1697)
==10633==    by 0x427FD2: execpline (exec.c:1484)
==10633==    by 0x427756: execlist (exec.c:1267)
==10633==    by 0x42717C: execode (exec.c:1073)
==10633==    by 0x431299: runshfunc (exec.c:5040)
==10633==    by 0x430E76: doshfunc (exec.c:4920)
==10633==    by 0x4302FB: execshfunc (exec.c:4557)
==10633==    by 0x42D8C1: execcmd (exec.c:3373)
==10633== 
==10633== 
==10633== 2 errors in context 2 of 2:
==10633== Conditional jump or move depends on uninitialised value(s)
==10633==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10633==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10633==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10633==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10633==    by 0x42D8E9: execcmd (exec.c:3378)
==10633==    by 0x428CA0: execpline2 (exec.c:1697)
==10633==    by 0x427FD2: execpline (exec.c:1484)
==10633==    by 0x42779A: execlist (exec.c:1275)
==10633==    by 0x42717C: execode (exec.c:1073)
==10633==    by 0x431299: runshfunc (exec.c:5040)
==10633==    by 0x430E76: doshfunc (exec.c:4920)
==10633==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10633== 
==10633== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10634== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10634-by-pythonnut-on-???
==10634== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10634-by-pythonnut-on-???
==10634== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10634-by-pythonnut-on-???
==10634== 
==10634== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10634== don't want to do, unless you know exactly what you're doing,
==10634== or are doing some strange experiment):
==10634==   /usr/lib/valgrind/../../bin/vgdb --pid=10634 ...command...
==10634== 
==10634== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10634==   /path/to/gdb ./zsh
==10634== and then give GDB the following command
==10634==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10634
==10634== --pid is optional if only one valgrind process is running
==10634== 
==10630== Checked 4,790,936 bytes
==10630== 
--10634-- Caught __NR_exit; running __libc_freeres()
==10630== LEAK SUMMARY:
==10630==    definitely lost: 2,205 bytes in 14 blocks
==10630==    indirectly lost: 6,756 bytes in 7 blocks
==10630==      possibly lost: 0 bytes in 0 blocks
==10630==    still reachable: 3,106,737 bytes in 69,000 blocks
==10630==         suppressed: 0 bytes in 0 blocks
==10630== Rerun with --leak-check=full to see details of leaked memory
==10630== 
==10630== Use --track-origins=yes to see where uninitialised values come from
==10630== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10630== 
==10630== 1 errors in context 1 of 2:
==10630== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10630==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10630==    by 0x488CD0: stringsubst (subst.c:301)
==10630==    by 0x48801B: prefork (subst.c:77)
==10630==    by 0x42B318: execcmd (exec.c:2619)
==10630==    by 0x428CA0: execpline2 (exec.c:1697)
==10630==    by 0x427FD2: execpline (exec.c:1484)
==10630==    by 0x427756: execlist (exec.c:1267)
==10630==    by 0x42717C: execode (exec.c:1073)
==10630==    by 0x431299: runshfunc (exec.c:5040)
==10630==    by 0x430E76: doshfunc (exec.c:4920)
==10630==    by 0x4302FB: execshfunc (exec.c:4557)
==10630==    by 0x42D8C1: execcmd (exec.c:3373)
==10630== 
==10630== 
==10630== 2 errors in context 2 of 2:
==10630== Conditional jump or move depends on uninitialised value(s)
==10630==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10630==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10630==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10630==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10630==    by 0x42D8E9: execcmd (exec.c:3378)
==10630==    by 0x428CA0: execpline2 (exec.c:1697)
==10630==    by 0x427FD2: execpline (exec.c:1484)
==10630==    by 0x42779A: execlist (exec.c:1275)
==10630==    by 0x42717C: execode (exec.c:1073)
==10630==    by 0x431299: runshfunc (exec.c:5040)
==10630==    by 0x430E76: doshfunc (exec.c:4920)
==10630==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10630== 
==10630== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10489-- Caught __NR_exit; running __libc_freeres()
--10634-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10634== 
==10634== HEAP SUMMARY:
==10634==     in use at exit: 3,124,482 bytes in 69,170 blocks
==10634==   total heap usage: 1,604,260 allocs, 1,535,090 frees, 129,890,599 bytes allocated
==10634== 
--10489-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10489== 
==10489== HEAP SUMMARY:
==10489==     in use at exit: 3,113,204 bytes in 68,944 blocks
==10489==   total heap usage: 1,603,414 allocs, 1,534,470 frees, 129,823,924 bytes allocated
==10489== 
==10634== Searching for pointers to 69,170 not-freed blocks
--10634--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10634--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10634--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10634--   Scanning root segment: 0x4037000..0x403afff (16384)
--10634--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10634--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10634--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10634--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10634--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10634--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10634--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10634--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10634--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10634--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10634--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10634--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10634--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10634--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10634--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10634--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10634--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10634--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10634--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10634--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10634--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10634--   Scanning root segment: 0x701a000..0x701afff (4096)
--10634--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10634--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10634--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10634--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10634--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10634--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10634--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10634--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10634--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10634--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10489== Searching for pointers to 68,944 not-freed blocks
--10489--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10489--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10489--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10489--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10489--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10489--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10489--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10489--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10489--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10489--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10489--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10489--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10489--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10489--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10489--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10489--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10489--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10489--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10489--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10489--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10489--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10489--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10489--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10489--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10489--   Scanning root segment: 0x701a000..0x701afff (4096)
--10489--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10489--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10489--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10489--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10489--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10489--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10489--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10489--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10489--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10489--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10634== Checked 4,800,416 bytes
==10634== 
==10634== LEAK SUMMARY:
==10634==    definitely lost: 2,205 bytes in 14 blocks
==10634==    indirectly lost: 6,756 bytes in 7 blocks
==10634==      possibly lost: 0 bytes in 0 blocks
==10634==    still reachable: 3,115,521 bytes in 69,149 blocks
==10634==         suppressed: 0 bytes in 0 blocks
==10634== Rerun with --leak-check=full to see details of leaked memory
==10634== 
==10634== Use --track-origins=yes to see where uninitialised values come from
==10634== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10634== 
==10634== 1 errors in context 1 of 2:
==10634== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10634==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10634==    by 0x488CD0: stringsubst (subst.c:301)
==10634==    by 0x48801B: prefork (subst.c:77)
==10634==    by 0x42B318: execcmd (exec.c:2619)
==10634==    by 0x428CA0: execpline2 (exec.c:1697)
==10634==    by 0x427FD2: execpline (exec.c:1484)
==10634==    by 0x427756: execlist (exec.c:1267)
==10634==    by 0x42717C: execode (exec.c:1073)
==10634==    by 0x431299: runshfunc (exec.c:5040)
==10634==    by 0x430E76: doshfunc (exec.c:4920)
==10634==    by 0x4302FB: execshfunc (exec.c:4557)
==10634==    by 0x42D8C1: execcmd (exec.c:3373)
==10634== 
==10634== 
==10634== 2 errors in context 2 of 2:
==10634== Conditional jump or move depends on uninitialised value(s)
==10634==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10634==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10634==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10634==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10634==    by 0x42D8E9: execcmd (exec.c:3378)
==10634==    by 0x428CA0: execpline2 (exec.c:1697)
==10634==    by 0x427FD2: execpline (exec.c:1484)
==10634==    by 0x42779A: execlist (exec.c:1275)
==10634==    by 0x42717C: execode (exec.c:1073)
==10634==    by 0x431299: runshfunc (exec.c:5040)
==10634==    by 0x430E76: doshfunc (exec.c:4920)
==10634==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10634== 
==10634== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10489== Checked 4,769,080 bytes
==10489== 
==10489== LEAK SUMMARY:
==10489==    definitely lost: 2,205 bytes in 14 blocks
==10489==    indirectly lost: 6,756 bytes in 7 blocks
==10489==      possibly lost: 0 bytes in 0 blocks
==10489==    still reachable: 3,104,243 bytes in 68,923 blocks
==10489==         suppressed: 0 bytes in 0 blocks
==10489== Rerun with --leak-check=full to see details of leaked memory
==10489== 
==10489== Use --track-origins=yes to see where uninitialised values come from
==10489== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10489== 
==10489== 1 errors in context 1 of 2:
==10489== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10489==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10489==    by 0x488CD0: stringsubst (subst.c:301)
==10489==    by 0x48801B: prefork (subst.c:77)
==10489==    by 0x42B318: execcmd (exec.c:2619)
==10489==    by 0x428CA0: execpline2 (exec.c:1697)
==10489==    by 0x427FD2: execpline (exec.c:1484)
==10489==    by 0x427756: execlist (exec.c:1267)
==10489==    by 0x42717C: execode (exec.c:1073)
==10489==    by 0x431299: runshfunc (exec.c:5040)
==10489==    by 0x430E76: doshfunc (exec.c:4920)
==10489==    by 0x4302FB: execshfunc (exec.c:4557)
==10489==    by 0x42D8C1: execcmd (exec.c:3373)
==10489== 
==10489== 
==10489== 2 errors in context 2 of 2:
==10489== Conditional jump or move depends on uninitialised value(s)
==10489==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10489==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10489==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10489==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10489==    by 0x42D8E9: execcmd (exec.c:3378)
==10489==    by 0x428CA0: execpline2 (exec.c:1697)
==10489==    by 0x427FD2: execpline (exec.c:1484)
==10489==    by 0x42779A: execlist (exec.c:1275)
==10489==    by 0x42717C: execode (exec.c:1073)
==10489==    by 0x431299: runshfunc (exec.c:5040)
==10489==    by 0x430E76: doshfunc (exec.c:4920)
==10489==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10489== 
==10489== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10635== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10635-by-pythonnut-on-???
==10635== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10635-by-pythonnut-on-???
==10635== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10635-by-pythonnut-on-???
==10635== 
==10635== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10635== don't want to do, unless you know exactly what you're doing,
==10635== or are doing some strange experiment):
==10635==   /usr/lib/valgrind/../../bin/vgdb --pid=10635 ...command...
==10635== 
==10635== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10635==   /path/to/gdb ./zsh
==10635== and then give GDB the following command
==10635==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10635
==10635== --pid is optional if only one valgrind process is running
==10635== 
client request: code 4d430005,  addr 0xFFEFF263C,  len 4
--10636-- Caught __NR_exit; running __libc_freeres()
==10636== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10636-by-pythonnut-on-???
==10636== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10636-by-pythonnut-on-???
==10636== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10636-by-pythonnut-on-???
==10636== 
==10636== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10636== don't want to do, unless you know exactly what you're doing,
==10636== or are doing some strange experiment):
==10636==   /usr/lib/valgrind/../../bin/vgdb --pid=10636 ...command...
==10636== 
==10636== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10636==   /path/to/gdb ./zsh
==10636== and then give GDB the following command
==10636==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10636
==10636== --pid is optional if only one valgrind process is running
==10636== 
--10636-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10636== 
==10636== HEAP SUMMARY:
==10636==     in use at exit: 3,113,740 bytes in 68,956 blocks
==10636==   total heap usage: 1,603,241 allocs, 1,534,285 frees, 129,778,731 bytes allocated
==10636== 
==10636== Searching for pointers to 68,956 not-freed blocks
--10636--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10636--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10636--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10636--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10636--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10636--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10636--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10636--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10636--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10636--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10636--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10636--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10636--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10636--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10636--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10636--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10636--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10636--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10636--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10636--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10636--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10636--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10636--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10636--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10636--   Scanning root segment: 0x701a000..0x701afff (4096)
--10636--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10636--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10636--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10636--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10636--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10636--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10636--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10636--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10636--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10636--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10636== Checked 4,771,656 bytes
==10636== 
==10636== LEAK SUMMARY:
==10636==    definitely lost: 2,205 bytes in 14 blocks
==10636==    indirectly lost: 6,756 bytes in 7 blocks
==10636==      possibly lost: 0 bytes in 0 blocks
==10636==    still reachable: 3,104,779 bytes in 68,935 blocks
==10636==         suppressed: 0 bytes in 0 blocks
==10636== Rerun with --leak-check=full to see details of leaked memory
==10636== 
==10636== Use --track-origins=yes to see where uninitialised values come from
==10636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10636== 
==10636== 1 errors in context 1 of 2:
==10636== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10636==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10636==    by 0x488CD0: stringsubst (subst.c:301)
==10636==    by 0x48801B: prefork (subst.c:77)
==10636==    by 0x42B318: execcmd (exec.c:2619)
==10636==    by 0x428CA0: execpline2 (exec.c:1697)
==10636==    by 0x427FD2: execpline (exec.c:1484)
==10636==    by 0x427756: execlist (exec.c:1267)
==10636==    by 0x42717C: execode (exec.c:1073)
==10636==    by 0x431299: runshfunc (exec.c:5040)
==10636==    by 0x430E76: doshfunc (exec.c:4920)
==10636==    by 0x4302FB: execshfunc (exec.c:4557)
==10636==    by 0x42D8C1: execcmd (exec.c:3373)
==10636== 
==10636== 
==10636== 2 errors in context 2 of 2:
==10636== Conditional jump or move depends on uninitialised value(s)
==10636==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10636==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10636==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10636==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10636==    by 0x42D8E9: execcmd (exec.c:3378)
==10636==    by 0x428CA0: execpline2 (exec.c:1697)
==10636==    by 0x427FD2: execpline (exec.c:1484)
==10636==    by 0x42779A: execlist (exec.c:1275)
==10636==    by 0x42717C: execode (exec.c:1073)
==10636==    by 0x431299: runshfunc (exec.c:5040)
==10636==    by 0x430E76: doshfunc (exec.c:4920)
==10636==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10636== 
==10636== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF2AEC,  len 4
--10638-- Caught __NR_exit; running __libc_freeres()
==10638== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10638-by-pythonnut-on-???
==10638== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10638-by-pythonnut-on-???
==10638== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10638-by-pythonnut-on-???
==10638== 
==10638== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10638== don't want to do, unless you know exactly what you're doing,
==10638== or are doing some strange experiment):
==10638==   /usr/lib/valgrind/../../bin/vgdb --pid=10638 ...command...
==10638== 
==10638== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10638==   /path/to/gdb ./zsh
==10638== and then give GDB the following command
==10638==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10638
==10638== --pid is optional if only one valgrind process is running
==10638== 
--10638-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10638== 
==10638== HEAP SUMMARY:
==10638==     in use at exit: 3,114,131 bytes in 68,964 blocks
==10638==   total heap usage: 1,603,257 allocs, 1,534,293 frees, 129,782,842 bytes allocated
==10638== 
==10638== Searching for pointers to 68,964 not-freed blocks
--10638--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10638--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10638--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10638--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10638--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10638--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10638--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10638--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10638--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10638--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10638--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10638--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10638--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10638--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10638--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10638--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10638--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10638--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10638--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10638--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10638--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10638--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10638--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10638--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10638--   Scanning root segment: 0x701a000..0x701afff (4096)
--10638--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10638--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10638--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10638--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10638--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10638--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10638--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10638--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10638--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10638--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10638== Checked 4,771,760 bytes
==10638== 
==10638== LEAK SUMMARY:
==10638==    definitely lost: 2,205 bytes in 14 blocks
==10638==    indirectly lost: 6,756 bytes in 7 blocks
==10638==      possibly lost: 0 bytes in 0 blocks
==10638==    still reachable: 3,105,170 bytes in 68,943 blocks
==10638==         suppressed: 0 bytes in 0 blocks
==10638== Rerun with --leak-check=full to see details of leaked memory
==10638== 
==10638== Use --track-origins=yes to see where uninitialised values come from
==10638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10638== 
==10638== 1 errors in context 1 of 2:
==10638== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10638==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10638==    by 0x488CD0: stringsubst (subst.c:301)
==10638==    by 0x48801B: prefork (subst.c:77)
==10638==    by 0x42B318: execcmd (exec.c:2619)
==10638==    by 0x428CA0: execpline2 (exec.c:1697)
==10638==    by 0x427FD2: execpline (exec.c:1484)
==10638==    by 0x427756: execlist (exec.c:1267)
==10638==    by 0x42717C: execode (exec.c:1073)
==10638==    by 0x431299: runshfunc (exec.c:5040)
==10638==    by 0x430E76: doshfunc (exec.c:4920)
==10638==    by 0x4302FB: execshfunc (exec.c:4557)
==10638==    by 0x42D8C1: execcmd (exec.c:3373)
==10638== 
==10638== 
==10638== 2 errors in context 2 of 2:
==10638== Conditional jump or move depends on uninitialised value(s)
==10638==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10638==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10638==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10638==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10638==    by 0x42D8E9: execcmd (exec.c:3378)
==10638==    by 0x428CA0: execpline2 (exec.c:1697)
==10638==    by 0x427FD2: execpline (exec.c:1484)
==10638==    by 0x42779A: execlist (exec.c:1275)
==10638==    by 0x42717C: execode (exec.c:1073)
==10638==    by 0x431299: runshfunc (exec.c:5040)
==10638==    by 0x430E76: doshfunc (exec.c:4920)
==10638==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10638== 
==10638== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10635-- Caught __NR_exit; running __libc_freeres()
--10635-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10635== 
==10635== HEAP SUMMARY:
==10635==     in use at exit: 3,113,269 bytes in 68,945 blocks
==10635==   total heap usage: 1,603,266 allocs, 1,534,321 frees, 129,784,845 bytes allocated
==10635== 
==10635== Searching for pointers to 68,945 not-freed blocks
--10635--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10635--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10635--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10635--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10635--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10635--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10635--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10635--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10635--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10635--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10635--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10635--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10635--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10635--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10635--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10635--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10635--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10635--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10635--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10635--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10635--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10635--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10635--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10635--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10635--   Scanning root segment: 0x701a000..0x701afff (4096)
--10635--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10635--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10635--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10635--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10635--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10635--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10635--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10635--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10635--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10635--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10635== Checked 4,769,144 bytes
==10635== 
==10635== LEAK SUMMARY:
==10635==    definitely lost: 2,205 bytes in 14 blocks
==10635==    indirectly lost: 6,756 bytes in 7 blocks
==10635==      possibly lost: 0 bytes in 0 blocks
==10635==    still reachable: 3,104,308 bytes in 68,924 blocks
==10635==         suppressed: 0 bytes in 0 blocks
==10635== Rerun with --leak-check=full to see details of leaked memory
==10635== 
==10635== Use --track-origins=yes to see where uninitialised values come from
==10635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10635== 
==10635== 1 errors in context 1 of 2:
==10635== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10635==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10635==    by 0x488CD0: stringsubst (subst.c:301)
==10635==    by 0x48801B: prefork (subst.c:77)
==10635==    by 0x42B318: execcmd (exec.c:2619)
==10635==    by 0x428CA0: execpline2 (exec.c:1697)
==10635==    by 0x427FD2: execpline (exec.c:1484)
==10635==    by 0x427756: execlist (exec.c:1267)
==10635==    by 0x42717C: execode (exec.c:1073)
==10635==    by 0x431299: runshfunc (exec.c:5040)
==10635==    by 0x430E76: doshfunc (exec.c:4920)
==10635==    by 0x4302FB: execshfunc (exec.c:4557)
==10635==    by 0x42D8C1: execcmd (exec.c:3373)
==10635== 
==10635== 
==10635== 2 errors in context 2 of 2:
==10635== Conditional jump or move depends on uninitialised value(s)
==10635==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10635==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10635==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10635==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10635==    by 0x42D8E9: execcmd (exec.c:3378)
==10635==    by 0x428CA0: execpline2 (exec.c:1697)
==10635==    by 0x427FD2: execpline (exec.c:1484)
==10635==    by 0x42779A: execlist (exec.c:1275)
==10635==    by 0x42717C: execode (exec.c:1073)
==10635==    by 0x431299: runshfunc (exec.c:5040)
==10635==    by 0x430E76: doshfunc (exec.c:4920)
==10635==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10635== 
==10635== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10487-- Caught __NR_exit; running __libc_freeres()
--10487-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10487== 
==10487== HEAP SUMMARY:
==10487==     in use at exit: 3,112,472 bytes in 68,932 blocks
==10487==   total heap usage: 1,603,300 allocs, 1,534,368 frees, 129,782,220 bytes allocated
==10487== 
client request: code 4d430005,  addr 0xFFEFE4DAC,  len 4
==10487== Searching for pointers to 68,932 not-freed blocks
--10487--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10487--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10487--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10487--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10487--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10487--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10487--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10487--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10487--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10487--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10487--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10487--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10487--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10487--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10487--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10487--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10487--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10487--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10487--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10487--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10487--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10487--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10487--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10487--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10487--   Scanning root segment: 0x701a000..0x701afff (4096)
--10487--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10487--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10487--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10487--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10487--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10487--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10487--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10487--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10487--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10487--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10487== Checked 4,767,704 bytes
==10487== 
==10487== LEAK SUMMARY:
==10487==    definitely lost: 2,205 bytes in 14 blocks
==10487==    indirectly lost: 6,756 bytes in 7 blocks
==10487==      possibly lost: 0 bytes in 0 blocks
==10487==    still reachable: 3,103,511 bytes in 68,911 blocks
==10487==         suppressed: 0 bytes in 0 blocks
==10487== Rerun with --leak-check=full to see details of leaked memory
==10487== 
==10487== Use --track-origins=yes to see where uninitialised values come from
==10487== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10487== 
==10487== 1 errors in context 1 of 2:
==10487== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10487==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10487==    by 0x488CD0: stringsubst (subst.c:301)
==10487==    by 0x48801B: prefork (subst.c:77)
==10487==    by 0x42B318: execcmd (exec.c:2619)
==10487==    by 0x428CA0: execpline2 (exec.c:1697)
==10487==    by 0x427FD2: execpline (exec.c:1484)
==10487==    by 0x427756: execlist (exec.c:1267)
==10487==    by 0x42717C: execode (exec.c:1073)
==10487==    by 0x431299: runshfunc (exec.c:5040)
==10487==    by 0x430E76: doshfunc (exec.c:4920)
==10487==    by 0x4302FB: execshfunc (exec.c:4557)
==10487==    by 0x42D8C1: execcmd (exec.c:3373)
==10487== 
==10487== 
==10487== 2 errors in context 2 of 2:
==10487== Conditional jump or move depends on uninitialised value(s)
==10487==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10487==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10487==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10487==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10487==    by 0x42D8E9: execcmd (exec.c:3378)
==10487==    by 0x428CA0: execpline2 (exec.c:1697)
==10487==    by 0x427FD2: execpline (exec.c:1484)
==10487==    by 0x42779A: execlist (exec.c:1275)
==10487==    by 0x42717C: execode (exec.c:1073)
==10487==    by 0x431299: runshfunc (exec.c:5040)
==10487==    by 0x430E76: doshfunc (exec.c:4920)
==10487==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10487== 
==10487== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10695== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10695-by-pythonnut-on-???
==10695== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10695-by-pythonnut-on-???
==10695== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10695-by-pythonnut-on-???
==10695== 
==10695== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10695== don't want to do, unless you know exactly what you're doing,
==10695== or are doing some strange experiment):
==10695==   /usr/lib/valgrind/../../bin/vgdb --pid=10695 ...command...
==10695== 
==10695== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10695==   /path/to/gdb ./zsh
==10695== and then give GDB the following command
==10695==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10695
==10695== --pid is optional if only one valgrind process is running
==10695== 
--10695-- Caught __NR_exit; running __libc_freeres()
--10695-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10695== 
==10695== HEAP SUMMARY:
==10695==     in use at exit: 3,167,657 bytes in 69,836 blocks
==10695==   total heap usage: 1,700,417 allocs, 1,630,581 frees, 136,800,567 bytes allocated
==10695== 
==10695== Searching for pointers to 69,836 not-freed blocks
--10695--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10695--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10695--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10695--   Scanning root segment: 0x4037000..0x403afff (16384)
--10695--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10695--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10695--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10695--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10695--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10695--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10695--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10695--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10695--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10695--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10695--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10695--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10695--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10695--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10695--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10695--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10695--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10695--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10695--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10695--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10695--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10695--   Scanning root segment: 0x701a000..0x701afff (4096)
--10695--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10695--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10695--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10695--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10695--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10695--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10695--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10695--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10695--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10695--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10695== Checked 4,855,312 bytes
==10695== 
==10695== LEAK SUMMARY:
==10695==    definitely lost: 2,205 bytes in 14 blocks
==10695==    indirectly lost: 6,756 bytes in 7 blocks
==10695==      possibly lost: 0 bytes in 0 blocks
==10695==    still reachable: 3,158,696 bytes in 69,815 blocks
==10695==         suppressed: 0 bytes in 0 blocks
==10695== Rerun with --leak-check=full to see details of leaked memory
==10695== 
==10695== Use --track-origins=yes to see where uninitialised values come from
==10695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10695== 
==10695== 1 errors in context 1 of 2:
==10695== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10695==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10695==    by 0x488CD0: stringsubst (subst.c:301)
==10695==    by 0x48801B: prefork (subst.c:77)
==10695==    by 0x42B318: execcmd (exec.c:2619)
==10695==    by 0x428CA0: execpline2 (exec.c:1697)
==10695==    by 0x427FD2: execpline (exec.c:1484)
==10695==    by 0x427756: execlist (exec.c:1267)
==10695==    by 0x42717C: execode (exec.c:1073)
==10695==    by 0x431299: runshfunc (exec.c:5040)
==10695==    by 0x430E76: doshfunc (exec.c:4920)
==10695==    by 0x4302FB: execshfunc (exec.c:4557)
==10695==    by 0x42D8C1: execcmd (exec.c:3373)
==10695== 
==10695== 
==10695== 2 errors in context 2 of 2:
==10695== Conditional jump or move depends on uninitialised value(s)
==10695==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10695==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10695==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10695==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10695==    by 0x42D8E9: execcmd (exec.c:3378)
==10695==    by 0x428CA0: execpline2 (exec.c:1697)
==10695==    by 0x427FD2: execpline (exec.c:1484)
==10695==    by 0x42779A: execlist (exec.c:1275)
==10695==    by 0x42717C: execode (exec.c:1073)
==10695==    by 0x431299: runshfunc (exec.c:5040)
==10695==    by 0x430E76: doshfunc (exec.c:4920)
==10695==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10695== 
==10695== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10906== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10906-by-pythonnut-on-???
==10906== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10906-by-pythonnut-on-???
==10906== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10906-by-pythonnut-on-???
==10906== 
==10906== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10906== don't want to do, unless you know exactly what you're doing,
==10906== or are doing some strange experiment):
==10906==   /usr/lib/valgrind/../../bin/vgdb --pid=10906 ...command...
==10906== 
==10906== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10906==   /path/to/gdb ./zsh
==10906== and then give GDB the following command
==10906==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10906
==10906== --pid is optional if only one valgrind process is running
==10906== 
--10906-- Caught __NR_exit; running __libc_freeres()
--10906-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10906== 
==10906== HEAP SUMMARY:
==10906==     in use at exit: 3,134,024 bytes in 69,387 blocks
==10906==   total heap usage: 1,736,245 allocs, 1,666,858 frees, 139,848,575 bytes allocated
==10906== 
==10906== Searching for pointers to 69,387 not-freed blocks
--10906--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10906--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10906--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10906--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10906--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10906--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10906--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10906--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10906--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10906--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10906--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10906--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10906--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10906--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10906--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10906--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10906--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10906--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10906--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10906--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10906--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10906--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10906--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10906--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10906--   Scanning root segment: 0x701a000..0x701afff (4096)
--10906--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10906--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10906--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10906--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10906--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10906--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10906--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10906--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10906--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10906--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10906== Checked 4,795,128 bytes
==10906== 
==10906== LEAK SUMMARY:
==10906==    definitely lost: 3,173 bytes in 18 blocks
==10906==    indirectly lost: 6,756 bytes in 7 blocks
==10906==      possibly lost: 0 bytes in 0 blocks
==10906==    still reachable: 3,124,095 bytes in 69,362 blocks
==10906==         suppressed: 0 bytes in 0 blocks
==10906== Rerun with --leak-check=full to see details of leaked memory
==10906== 
==10906== Use --track-origins=yes to see where uninitialised values come from
==10906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10906== 
==10906== 1 errors in context 1 of 2:
==10906== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10906==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10906==    by 0x488CD0: stringsubst (subst.c:301)
==10906==    by 0x48801B: prefork (subst.c:77)
==10906==    by 0x42B318: execcmd (exec.c:2619)
==10906==    by 0x428CA0: execpline2 (exec.c:1697)
==10906==    by 0x427FD2: execpline (exec.c:1484)
==10906==    by 0x427756: execlist (exec.c:1267)
==10906==    by 0x42717C: execode (exec.c:1073)
==10906==    by 0x431299: runshfunc (exec.c:5040)
==10906==    by 0x430E76: doshfunc (exec.c:4920)
==10906==    by 0x4302FB: execshfunc (exec.c:4557)
==10906==    by 0x42D8C1: execcmd (exec.c:3373)
==10906== 
==10906== 
==10906== 2 errors in context 2 of 2:
==10906== Conditional jump or move depends on uninitialised value(s)
==10906==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10906==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10906==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10906==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10906==    by 0x42D8E9: execcmd (exec.c:3378)
==10906==    by 0x428CA0: execpline2 (exec.c:1697)
==10906==    by 0x427FD2: execpline (exec.c:1484)
==10906==    by 0x42779A: execlist (exec.c:1275)
==10906==    by 0x42717C: execode (exec.c:1073)
==10906==    by 0x431299: runshfunc (exec.c:5040)
==10906==    by 0x430E76: doshfunc (exec.c:4920)
==10906==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10906== 
==10906== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10909== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10909-by-pythonnut-on-???
==10909== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10909-by-pythonnut-on-???
==10909== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10909-by-pythonnut-on-???
==10909== 
==10909== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10909== don't want to do, unless you know exactly what you're doing,
==10909== or are doing some strange experiment):
==10909==   /usr/lib/valgrind/../../bin/vgdb --pid=10909 ...command...
==10909== 
==10909== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10909==   /path/to/gdb ./zsh
==10909== and then give GDB the following command
==10909==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10909
==10909== --pid is optional if only one valgrind process is running
==10909== 
--10909-- Caught __NR_exit; running __libc_freeres()
--10909-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10909== 
==10909== HEAP SUMMARY:
==10909==     in use at exit: 3,134,115 bytes in 69,387 blocks
==10909==   total heap usage: 1,736,252 allocs, 1,666,865 frees, 139,851,607 bytes allocated
==10909== 
==10909== Searching for pointers to 69,387 not-freed blocks
--10909--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10909--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10909--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10909--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10909--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10909--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10909--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10909--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10909--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10909--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10909--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10909--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10909--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10909--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10909--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10909--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10909--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10909--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10909--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10909--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10909--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10909--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10909--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10909--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10909--   Scanning root segment: 0x701a000..0x701afff (4096)
--10909--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10909--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10909--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10909--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10909--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10909--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10909--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10909--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10909--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10909--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10909== Checked 4,796,568 bytes
==10909== 
==10909== LEAK SUMMARY:
==10909==    definitely lost: 3,173 bytes in 18 blocks
==10909==    indirectly lost: 6,756 bytes in 7 blocks
==10909==      possibly lost: 0 bytes in 0 blocks
==10909==    still reachable: 3,124,186 bytes in 69,362 blocks
==10909==         suppressed: 0 bytes in 0 blocks
==10909== Rerun with --leak-check=full to see details of leaked memory
==10909== 
==10909== Use --track-origins=yes to see where uninitialised values come from
==10909== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10909== 
==10909== 1 errors in context 1 of 2:
==10909== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10909==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10909==    by 0x488CD0: stringsubst (subst.c:301)
==10909==    by 0x48801B: prefork (subst.c:77)
==10909==    by 0x42B318: execcmd (exec.c:2619)
==10909==    by 0x428CA0: execpline2 (exec.c:1697)
==10909==    by 0x427FD2: execpline (exec.c:1484)
==10909==    by 0x427756: execlist (exec.c:1267)
==10909==    by 0x42717C: execode (exec.c:1073)
==10909==    by 0x431299: runshfunc (exec.c:5040)
==10909==    by 0x430E76: doshfunc (exec.c:4920)
==10909==    by 0x4302FB: execshfunc (exec.c:4557)
==10909==    by 0x42D8C1: execcmd (exec.c:3373)
==10909== 
==10909== 
==10909== 2 errors in context 2 of 2:
==10909== Conditional jump or move depends on uninitialised value(s)
==10909==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10909==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10909==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10909==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10909==    by 0x42D8E9: execcmd (exec.c:3378)
==10909==    by 0x428CA0: execpline2 (exec.c:1697)
==10909==    by 0x427FD2: execpline (exec.c:1484)
==10909==    by 0x42779A: execlist (exec.c:1275)
==10909==    by 0x42717C: execode (exec.c:1073)
==10909==    by 0x431299: runshfunc (exec.c:5040)
==10909==    by 0x430E76: doshfunc (exec.c:4920)
==10909==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10909== 
==10909== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10911== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10911-by-pythonnut-on-???
==10911== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10911-by-pythonnut-on-???
==10911== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10911-by-pythonnut-on-???
==10911== 
==10911== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10911== don't want to do, unless you know exactly what you're doing,
==10911== or are doing some strange experiment):
==10911==   /usr/lib/valgrind/../../bin/vgdb --pid=10911 ...command...
==10911== 
==10911== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10911==   /path/to/gdb ./zsh
==10911== and then give GDB the following command
==10911==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10911
==10911== --pid is optional if only one valgrind process is running
==10911== 
--10911-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFEE9BC,  len 4
--10911-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10911== 
==10911== HEAP SUMMARY:
==10911==     in use at exit: 3,131,314 bytes in 69,317 blocks
==10911==   total heap usage: 1,736,483 allocs, 1,667,166 frees, 139,877,271 bytes allocated
==10911== 
==10911== Searching for pointers to 69,317 not-freed blocks
--10911--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10911--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10911--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10911--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10911--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10911--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10911--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10911--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10911--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10911--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10911--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10911--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10911--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10911--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10911--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10911--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10911--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10911--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10911--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10911--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10911--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10911--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10911--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10911--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10911--   Scanning root segment: 0x701a000..0x701afff (4096)
--10911--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10911--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10911--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10911--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10911--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10911--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10911--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10911--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10911--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10911--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10911== Checked 4,789,832 bytes
==10911== 
==10911== LEAK SUMMARY:
==10911==    definitely lost: 3,173 bytes in 18 blocks
==10911==    indirectly lost: 6,756 bytes in 7 blocks
==10911==      possibly lost: 0 bytes in 0 blocks
==10911==    still reachable: 3,121,385 bytes in 69,292 blocks
==10911==         suppressed: 0 bytes in 0 blocks
==10911== Rerun with --leak-check=full to see details of leaked memory
==10911== 
==10911== Use --track-origins=yes to see where uninitialised values come from
==10911== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10911== 
==10911== 1 errors in context 1 of 2:
==10911== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10911==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10911==    by 0x488CD0: stringsubst (subst.c:301)
==10911==    by 0x48801B: prefork (subst.c:77)
==10911==    by 0x42B318: execcmd (exec.c:2619)
==10911==    by 0x428CA0: execpline2 (exec.c:1697)
==10911==    by 0x427FD2: execpline (exec.c:1484)
==10911==    by 0x427756: execlist (exec.c:1267)
==10911==    by 0x42717C: execode (exec.c:1073)
==10911==    by 0x431299: runshfunc (exec.c:5040)
==10911==    by 0x430E76: doshfunc (exec.c:4920)
==10911==    by 0x4302FB: execshfunc (exec.c:4557)
==10911==    by 0x42D8C1: execcmd (exec.c:3373)
==10911== 
==10911== 
==10911== 2 errors in context 2 of 2:
==10911== Conditional jump or move depends on uninitialised value(s)
==10911==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10911==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10911==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10911==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10911==    by 0x42D8E9: execcmd (exec.c:3378)
==10911==    by 0x428CA0: execpline2 (exec.c:1697)
==10911==    by 0x427FD2: execpline (exec.c:1484)
==10911==    by 0x42779A: execlist (exec.c:1275)
==10911==    by 0x42717C: execode (exec.c:1073)
==10911==    by 0x431299: runshfunc (exec.c:5040)
==10911==    by 0x430E76: doshfunc (exec.c:4920)
==10911==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10911== 
==10911== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10910-- Caught __NR_exit; running __libc_freeres()
==10910== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10910-by-pythonnut-on-???
==10910== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10910-by-pythonnut-on-???
==10910== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10910-by-pythonnut-on-???
==10910== 
==10910== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10910== don't want to do, unless you know exactly what you're doing,
==10910== or are doing some strange experiment):
==10910==   /usr/lib/valgrind/../../bin/vgdb --pid=10910 ...command...
==10910== 
==10910== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10910==   /path/to/gdb ./zsh
==10910== and then give GDB the following command
==10910==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10910
==10910== --pid is optional if only one valgrind process is running
==10910== 
--10910-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10910== 
==10910== HEAP SUMMARY:
==10910==     in use at exit: 3,131,250 bytes in 69,314 blocks
==10910==   total heap usage: 1,736,481 allocs, 1,667,167 frees, 139,877,030 bytes allocated
==10910== 
==10910== Searching for pointers to 69,314 not-freed blocks
--10910--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10910--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10910--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10910--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10910--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10910--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10910--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10910--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10910--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10910--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10910--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10910--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10910--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10910--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10910--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10910--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10910--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10910--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10910--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10910--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10910--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10910--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10910--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10910--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10910--   Scanning root segment: 0x701a000..0x701afff (4096)
--10910--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10910--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10910--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10910--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10910--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10910--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10910--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10910--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10910--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10910--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10910== Checked 4,789,144 bytes
==10910== 
==10910== LEAK SUMMARY:
==10910==    definitely lost: 3,173 bytes in 18 blocks
==10910==    indirectly lost: 6,756 bytes in 7 blocks
==10910==      possibly lost: 0 bytes in 0 blocks
==10910==    still reachable: 3,121,321 bytes in 69,289 blocks
==10910==         suppressed: 0 bytes in 0 blocks
==10910== Rerun with --leak-check=full to see details of leaked memory
==10910== 
==10910== Use --track-origins=yes to see where uninitialised values come from
==10910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10910== 
==10910== 1 errors in context 1 of 2:
==10910== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10910==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10910==    by 0x488CD0: stringsubst (subst.c:301)
==10910==    by 0x48801B: prefork (subst.c:77)
==10910==    by 0x42B318: execcmd (exec.c:2619)
==10910==    by 0x428CA0: execpline2 (exec.c:1697)
==10910==    by 0x427FD2: execpline (exec.c:1484)
==10910==    by 0x427756: execlist (exec.c:1267)
==10910==    by 0x42717C: execode (exec.c:1073)
==10910==    by 0x431299: runshfunc (exec.c:5040)
==10910==    by 0x430E76: doshfunc (exec.c:4920)
==10910==    by 0x4302FB: execshfunc (exec.c:4557)
==10910==    by 0x42D8C1: execcmd (exec.c:3373)
==10910== 
==10910== 
==10910== 2 errors in context 2 of 2:
==10910== Conditional jump or move depends on uninitialised value(s)
==10910==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10910==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10910==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10910==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10910==    by 0x42D8E9: execcmd (exec.c:3378)
==10910==    by 0x428CA0: execpline2 (exec.c:1697)
==10910==    by 0x427FD2: execpline (exec.c:1484)
==10910==    by 0x42779A: execlist (exec.c:1275)
==10910==    by 0x42717C: execode (exec.c:1073)
==10910==    by 0x431299: runshfunc (exec.c:5040)
==10910==    by 0x430E76: doshfunc (exec.c:4920)
==10910==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10910== 
==10910== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10913-- Caught __NR_exit; running __libc_freeres()
==10913== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10913-by-pythonnut-on-???
==10913== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10913-by-pythonnut-on-???
==10913== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10913-by-pythonnut-on-???
==10913== 
==10913== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10913== don't want to do, unless you know exactly what you're doing,
==10913== or are doing some strange experiment):
==10913==   /usr/lib/valgrind/../../bin/vgdb --pid=10913 ...command...
==10913== 
==10913== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10913==   /path/to/gdb ./zsh
==10913== and then give GDB the following command
==10913==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10913
==10913== --pid is optional if only one valgrind process is running
==10913== 
--10913-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10913== 
==10913== HEAP SUMMARY:
==10913==     in use at exit: 3,131,257 bytes in 69,314 blocks
==10913==   total heap usage: 1,736,496 allocs, 1,667,182 frees, 139,882,028 bytes allocated
==10913== 
==10913== Searching for pointers to 69,314 not-freed blocks
--10913--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10913--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10913--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10913--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10913--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10913--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10913--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10913--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10913--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10913--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10913--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10913--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10913--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10913--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10913--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10913--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10913--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10913--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10913--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10913--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10913--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10913--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10913--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10913--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10913--   Scanning root segment: 0x701a000..0x701afff (4096)
--10913--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10913--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10913--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10913--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10913--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10913--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10913--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10913--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10913--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10913--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10913== Checked 4,789,280 bytes
==10913== 
==10913== LEAK SUMMARY:
==10913==    definitely lost: 3,173 bytes in 18 blocks
==10913==    indirectly lost: 6,756 bytes in 7 blocks
==10913==      possibly lost: 0 bytes in 0 blocks
==10913==    still reachable: 3,121,328 bytes in 69,289 blocks
==10913==         suppressed: 0 bytes in 0 blocks
==10913== Rerun with --leak-check=full to see details of leaked memory
==10913== 
==10913== Use --track-origins=yes to see where uninitialised values come from
==10913== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10913== 
==10913== 1 errors in context 1 of 2:
==10913== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10913==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10913==    by 0x488CD0: stringsubst (subst.c:301)
==10913==    by 0x48801B: prefork (subst.c:77)
==10913==    by 0x42B318: execcmd (exec.c:2619)
==10913==    by 0x428CA0: execpline2 (exec.c:1697)
==10913==    by 0x427FD2: execpline (exec.c:1484)
==10913==    by 0x427756: execlist (exec.c:1267)
==10913==    by 0x42717C: execode (exec.c:1073)
==10913==    by 0x431299: runshfunc (exec.c:5040)
==10913==    by 0x430E76: doshfunc (exec.c:4920)
==10913==    by 0x4302FB: execshfunc (exec.c:4557)
==10913==    by 0x42D8C1: execcmd (exec.c:3373)
==10913== 
==10913== 
==10913== 2 errors in context 2 of 2:
==10913== Conditional jump or move depends on uninitialised value(s)
==10913==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10913==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10913==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10913==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10913==    by 0x42D8E9: execcmd (exec.c:3378)
==10913==    by 0x428CA0: execpline2 (exec.c:1697)
==10913==    by 0x427FD2: execpline (exec.c:1484)
==10913==    by 0x42779A: execlist (exec.c:1275)
==10913==    by 0x42717C: execode (exec.c:1073)
==10913==    by 0x431299: runshfunc (exec.c:5040)
==10913==    by 0x430E76: doshfunc (exec.c:4920)
==10913==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10913== 
==10913== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10914-- Caught __NR_exit; running __libc_freeres()
==10914== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10914-by-pythonnut-on-???
==10914== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10914-by-pythonnut-on-???
==10914== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10914-by-pythonnut-on-???
==10914== 
==10914== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10914== don't want to do, unless you know exactly what you're doing,
==10914== or are doing some strange experiment):
==10914==   /usr/lib/valgrind/../../bin/vgdb --pid=10914 ...command...
==10914== 
==10914== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10914==   /path/to/gdb ./zsh
==10914== and then give GDB the following command
==10914==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10914
==10914== --pid is optional if only one valgrind process is running
==10914== 
--10914-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10914== 
==10914== HEAP SUMMARY:
==10914==     in use at exit: 3,131,353 bytes in 69,314 blocks
==10914==   total heap usage: 1,736,512 allocs, 1,667,198 frees, 139,886,815 bytes allocated
==10914== 
==10914== Searching for pointers to 69,314 not-freed blocks
--10914--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10914--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10914--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10914--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10914--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10914--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10914--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10914--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10914--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10914--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10914--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10914--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10914--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10914--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10914--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10914--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10914--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10914--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10914--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10914--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10914--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10914--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10914--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10914--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10914--   Scanning root segment: 0x701a000..0x701afff (4096)
--10914--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10914--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10914--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10914--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10914--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10914--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10914--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10914--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10914--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10914--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10914== Checked 4,788,560 bytes
==10914== 
==10914== LEAK SUMMARY:
==10914==    definitely lost: 3,173 bytes in 18 blocks
==10914==    indirectly lost: 6,756 bytes in 7 blocks
==10914==      possibly lost: 0 bytes in 0 blocks
==10914==    still reachable: 3,121,424 bytes in 69,289 blocks
==10914==         suppressed: 0 bytes in 0 blocks
==10914== Rerun with --leak-check=full to see details of leaked memory
==10914== 
==10914== Use --track-origins=yes to see where uninitialised values come from
==10914== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10914== 
==10914== 1 errors in context 1 of 2:
==10914== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10914==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10914==    by 0x488CD0: stringsubst (subst.c:301)
==10914==    by 0x48801B: prefork (subst.c:77)
==10914==    by 0x42B318: execcmd (exec.c:2619)
==10914==    by 0x428CA0: execpline2 (exec.c:1697)
==10914==    by 0x427FD2: execpline (exec.c:1484)
==10914==    by 0x427756: execlist (exec.c:1267)
==10914==    by 0x42717C: execode (exec.c:1073)
==10914==    by 0x431299: runshfunc (exec.c:5040)
==10914==    by 0x430E76: doshfunc (exec.c:4920)
==10914==    by 0x4302FB: execshfunc (exec.c:4557)
==10914==    by 0x42D8C1: execcmd (exec.c:3373)
==10914== 
==10914== 
==10914== 2 errors in context 2 of 2:
==10914== Conditional jump or move depends on uninitialised value(s)
==10914==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10914==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10914==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10914==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10914==    by 0x42D8E9: execcmd (exec.c:3378)
==10914==    by 0x428CA0: execpline2 (exec.c:1697)
==10914==    by 0x427FD2: execpline (exec.c:1484)
==10914==    by 0x42779A: execlist (exec.c:1275)
==10914==    by 0x42717C: execode (exec.c:1073)
==10914==    by 0x431299: runshfunc (exec.c:5040)
==10914==    by 0x430E76: doshfunc (exec.c:4920)
==10914==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10914== 
==10914== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10917== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10917-by-pythonnut-on-???
==10917== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10917-by-pythonnut-on-???
==10917== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10917-by-pythonnut-on-???
==10917== 
==10917== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10917== don't want to do, unless you know exactly what you're doing,
==10917== or are doing some strange experiment):
==10917==   /usr/lib/valgrind/../../bin/vgdb --pid=10917 ...command...
==10917== 
==10917== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10917==   /path/to/gdb ./zsh
==10917== and then give GDB the following command
==10917==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10917
==10917== --pid is optional if only one valgrind process is running
==10917== 
--10917-- Caught __NR_exit; running __libc_freeres()
--10917-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10917== 
==10917== HEAP SUMMARY:
==10917==     in use at exit: 3,131,599 bytes in 69,320 blocks
==10917==   total heap usage: 1,736,560 allocs, 1,667,240 frees, 139,895,839 bytes allocated
==10917== 
==10917== Searching for pointers to 69,320 not-freed blocks
--10917--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10917--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10917--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10917--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10917--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10917--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10917--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10917--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10917--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10917--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10917--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10917--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10917--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10917--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10917--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10917--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10917--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10917--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10917--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10917--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10917--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10917--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10917--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10917--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10917--   Scanning root segment: 0x701a000..0x701afff (4096)
--10917--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10917--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10917--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10917--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10917--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10917--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10917--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10917--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10917--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10917--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10917== Checked 4,788,736 bytes
==10917== 
==10917== LEAK SUMMARY:
==10917==    definitely lost: 3,173 bytes in 18 blocks
==10917==    indirectly lost: 6,756 bytes in 7 blocks
==10917==      possibly lost: 0 bytes in 0 blocks
==10917==    still reachable: 3,121,670 bytes in 69,295 blocks
==10917==         suppressed: 0 bytes in 0 blocks
==10917== Rerun with --leak-check=full to see details of leaked memory
==10917== 
==10917== Use --track-origins=yes to see where uninitialised values come from
==10917== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10917== 
==10917== 1 errors in context 1 of 2:
==10917== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10917==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10917==    by 0x488CD0: stringsubst (subst.c:301)
==10917==    by 0x48801B: prefork (subst.c:77)
==10917==    by 0x42B318: execcmd (exec.c:2619)
==10917==    by 0x428CA0: execpline2 (exec.c:1697)
==10917==    by 0x427FD2: execpline (exec.c:1484)
==10917==    by 0x427756: execlist (exec.c:1267)
==10917==    by 0x42717C: execode (exec.c:1073)
==10917==    by 0x431299: runshfunc (exec.c:5040)
==10917==    by 0x430E76: doshfunc (exec.c:4920)
==10917==    by 0x4302FB: execshfunc (exec.c:4557)
==10917==    by 0x42D8C1: execcmd (exec.c:3373)
==10917== 
==10917== 
==10917== 2 errors in context 2 of 2:
==10917== Conditional jump or move depends on uninitialised value(s)
==10917==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10917==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10917==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10917==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10917==    by 0x42D8E9: execcmd (exec.c:3378)
==10917==    by 0x428CA0: execpline2 (exec.c:1697)
==10917==    by 0x427FD2: execpline (exec.c:1484)
==10917==    by 0x42779A: execlist (exec.c:1275)
==10917==    by 0x42717C: execode (exec.c:1073)
==10917==    by 0x431299: runshfunc (exec.c:5040)
==10917==    by 0x430E76: doshfunc (exec.c:4920)
==10917==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10917== 
==10917== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10918-- Caught __NR_exit; running __libc_freeres()
==10918== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10918-by-pythonnut-on-???
==10918== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10918-by-pythonnut-on-???
==10918== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10918-by-pythonnut-on-???
==10918== 
==10918== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10918== don't want to do, unless you know exactly what you're doing,
==10918== or are doing some strange experiment):
==10918==   /usr/lib/valgrind/../../bin/vgdb --pid=10918 ...command...
==10918== 
==10918== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10918==   /path/to/gdb ./zsh
==10918== and then give GDB the following command
==10918==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10918
==10918== --pid is optional if only one valgrind process is running
==10918== 
--10918-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10918== 
==10918== HEAP SUMMARY:
==10918==     in use at exit: 3,131,535 bytes in 69,320 blocks
==10918==   total heap usage: 1,736,540 allocs, 1,667,220 frees, 139,893,609 bytes allocated
==10918== 
==10918== Searching for pointers to 69,320 not-freed blocks
--10918--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10918--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10918--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10918--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10918--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10918--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10918--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10918--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10918--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10918--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10918--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10918--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10918--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10918--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10918--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10918--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10918--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10918--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10918--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10918--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10918--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10918--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10918--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10918--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10918--   Scanning root segment: 0x701a000..0x701afff (4096)
--10918--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10918--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10918--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10918--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10918--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10918--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10918--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10918--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10918--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10918--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10918== Checked 4,788,656 bytes
==10918== 
==10918== LEAK SUMMARY:
==10918==    definitely lost: 3,173 bytes in 18 blocks
==10918==    indirectly lost: 6,756 bytes in 7 blocks
==10918==      possibly lost: 0 bytes in 0 blocks
==10918==    still reachable: 3,121,606 bytes in 69,295 blocks
==10918==         suppressed: 0 bytes in 0 blocks
==10918== Rerun with --leak-check=full to see details of leaked memory
==10918== 
==10918== Use --track-origins=yes to see where uninitialised values come from
==10918== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10918== 
==10918== 1 errors in context 1 of 2:
==10918== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10918==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10918==    by 0x488CD0: stringsubst (subst.c:301)
==10918==    by 0x48801B: prefork (subst.c:77)
==10918==    by 0x42B318: execcmd (exec.c:2619)
==10918==    by 0x428CA0: execpline2 (exec.c:1697)
==10918==    by 0x427FD2: execpline (exec.c:1484)
==10918==    by 0x427756: execlist (exec.c:1267)
==10918==    by 0x42717C: execode (exec.c:1073)
==10918==    by 0x431299: runshfunc (exec.c:5040)
==10918==    by 0x430E76: doshfunc (exec.c:4920)
==10918==    by 0x4302FB: execshfunc (exec.c:4557)
==10918==    by 0x42D8C1: execcmd (exec.c:3373)
==10918== 
==10918== 
==10918== 2 errors in context 2 of 2:
==10918== Conditional jump or move depends on uninitialised value(s)
==10918==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10918==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10918==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10918==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10918==    by 0x42D8E9: execcmd (exec.c:3378)
==10918==    by 0x428CA0: execpline2 (exec.c:1697)
==10918==    by 0x427FD2: execpline (exec.c:1484)
==10918==    by 0x42779A: execlist (exec.c:1275)
==10918==    by 0x42717C: execode (exec.c:1073)
==10918==    by 0x431299: runshfunc (exec.c:5040)
==10918==    by 0x430E76: doshfunc (exec.c:4920)
==10918==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10918== 
==10918== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10919== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10919-by-pythonnut-on-???
==10919== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10919-by-pythonnut-on-???
==10919== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10919-by-pythonnut-on-???
==10919== 
==10919== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10919== don't want to do, unless you know exactly what you're doing,
==10919== or are doing some strange experiment):
==10919==   /usr/lib/valgrind/../../bin/vgdb --pid=10919 ...command...
==10919== 
==10919== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10919==   /path/to/gdb ./zsh
==10919== and then give GDB the following command
==10919==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10919
==10919== --pid is optional if only one valgrind process is running
==10919== 
--10919-- Caught __NR_exit; running __libc_freeres()
--10919-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10919== 
==10919== HEAP SUMMARY:
==10919==     in use at exit: 3,131,563 bytes in 69,321 blocks
==10919==   total heap usage: 1,736,553 allocs, 1,667,232 frees, 139,896,296 bytes allocated
==10919== 
==10919== Searching for pointers to 69,321 not-freed blocks
--10919--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10919--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10919--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10919--   Scanning root segment: 0x4037000..0x403afff (16384)
--10919--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10919--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10919--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10919--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10919--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10919--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10919--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10919--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10919--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10919--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10919--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10919--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10919--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10919--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10919--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10919--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10919--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10919--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10919--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10919--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10919--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10919--   Scanning root segment: 0x701a000..0x701afff (4096)
--10919--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10919--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10919--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10919--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10919--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10919--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10919--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10919--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10919--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10919--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10919== Checked 4,804,552 bytes
==10919== 
==10919== LEAK SUMMARY:
==10919==    definitely lost: 3,173 bytes in 18 blocks
==10919==    indirectly lost: 6,756 bytes in 7 blocks
==10919==      possibly lost: 0 bytes in 0 blocks
==10919==    still reachable: 3,121,634 bytes in 69,296 blocks
==10919==         suppressed: 0 bytes in 0 blocks
==10919== Rerun with --leak-check=full to see details of leaked memory
==10919== 
==10919== Use --track-origins=yes to see where uninitialised values come from
==10919== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10919== 
==10919== 1 errors in context 1 of 2:
==10919== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10919==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10919==    by 0x488CD0: stringsubst (subst.c:301)
==10919==    by 0x48801B: prefork (subst.c:77)
==10919==    by 0x42B318: execcmd (exec.c:2619)
==10919==    by 0x428CA0: execpline2 (exec.c:1697)
==10919==    by 0x427FD2: execpline (exec.c:1484)
==10919==    by 0x427756: execlist (exec.c:1267)
==10919==    by 0x42717C: execode (exec.c:1073)
==10919==    by 0x431299: runshfunc (exec.c:5040)
==10919==    by 0x430E76: doshfunc (exec.c:4920)
==10919==    by 0x4302FB: execshfunc (exec.c:4557)
==10919==    by 0x42D8C1: execcmd (exec.c:3373)
==10919== 
==10919== 
==10919== 2 errors in context 2 of 2:
==10919== Conditional jump or move depends on uninitialised value(s)
==10919==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10919==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10919==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10919==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10919==    by 0x42D8E9: execcmd (exec.c:3378)
==10919==    by 0x428CA0: execpline2 (exec.c:1697)
==10919==    by 0x427FD2: execpline (exec.c:1484)
==10919==    by 0x42779A: execlist (exec.c:1275)
==10919==    by 0x42717C: execode (exec.c:1073)
==10919==    by 0x431299: runshfunc (exec.c:5040)
==10919==    by 0x430E76: doshfunc (exec.c:4920)
==10919==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10919== 
==10919== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10920-- Caught __NR_exit; running __libc_freeres()
==10920== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10920-by-pythonnut-on-???
==10920== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10920-by-pythonnut-on-???
==10920== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10920-by-pythonnut-on-???
==10920== 
==10920== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10920== don't want to do, unless you know exactly what you're doing,
==10920== or are doing some strange experiment):
==10920==   /usr/lib/valgrind/../../bin/vgdb --pid=10920 ...command...
==10920== 
==10920== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10920==   /path/to/gdb ./zsh
==10920== and then give GDB the following command
==10920==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10920
==10920== --pid is optional if only one valgrind process is running
==10920== 
--10920-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10920== 
==10920== HEAP SUMMARY:
==10920==     in use at exit: 3,131,620 bytes in 69,319 blocks
==10920==   total heap usage: 1,736,988 allocs, 1,667,669 frees, 139,939,428 bytes allocated
==10920== 
==10920== Searching for pointers to 69,319 not-freed blocks
--10920--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10920--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10920--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10920--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10920--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10920--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10920--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10920--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10920--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10920--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10920--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10920--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10920--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10920--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10920--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10920--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10920--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10920--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10920--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10920--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10920--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10920--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10920--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10920--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10920--   Scanning root segment: 0x701a000..0x701afff (4096)
--10920--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10920--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10920--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10920--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10920--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10920--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10920--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10920--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10920--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10920--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10920== Checked 4,789,864 bytes
==10920== 
==10920== LEAK SUMMARY:
==10920==    definitely lost: 3,173 bytes in 18 blocks
==10920==    indirectly lost: 6,756 bytes in 7 blocks
==10920==      possibly lost: 0 bytes in 0 blocks
==10920==    still reachable: 3,121,691 bytes in 69,294 blocks
==10920==         suppressed: 0 bytes in 0 blocks
==10920== Rerun with --leak-check=full to see details of leaked memory
==10920== 
==10920== Use --track-origins=yes to see where uninitialised values come from
==10920== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10920== 
==10920== 1 errors in context 1 of 2:
==10920== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10920==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10920==    by 0x488CD0: stringsubst (subst.c:301)
==10920==    by 0x48801B: prefork (subst.c:77)
==10920==    by 0x42B318: execcmd (exec.c:2619)
==10920==    by 0x428CA0: execpline2 (exec.c:1697)
==10920==    by 0x427FD2: execpline (exec.c:1484)
==10920==    by 0x427756: execlist (exec.c:1267)
==10920==    by 0x42717C: execode (exec.c:1073)
==10920==    by 0x431299: runshfunc (exec.c:5040)
==10920==    by 0x430E76: doshfunc (exec.c:4920)
==10920==    by 0x4302FB: execshfunc (exec.c:4557)
==10920==    by 0x42D8C1: execcmd (exec.c:3373)
==10920== 
==10920== 
==10920== 2 errors in context 2 of 2:
==10920== Conditional jump or move depends on uninitialised value(s)
==10920==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10920==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10920==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10920==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10920==    by 0x42D8E9: execcmd (exec.c:3378)
==10920==    by 0x428CA0: execpline2 (exec.c:1697)
==10920==    by 0x427FD2: execpline (exec.c:1484)
==10920==    by 0x42779A: execlist (exec.c:1275)
==10920==    by 0x42717C: execode (exec.c:1073)
==10920==    by 0x431299: runshfunc (exec.c:5040)
==10920==    by 0x430E76: doshfunc (exec.c:4920)
==10920==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10920== 
==10920== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10921== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10921-by-pythonnut-on-???
==10921== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10921-by-pythonnut-on-???
==10921== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10921-by-pythonnut-on-???
==10921== 
==10921== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10921== don't want to do, unless you know exactly what you're doing,
==10921== or are doing some strange experiment):
==10921==   /usr/lib/valgrind/../../bin/vgdb --pid=10921 ...command...
==10921== 
==10921== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10921==   /path/to/gdb ./zsh
==10921== and then give GDB the following command
==10921==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10921
==10921== --pid is optional if only one valgrind process is running
==10921== 
--10921-- Caught __NR_exit; running __libc_freeres()
--10921-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10921== 
==10921== HEAP SUMMARY:
==10921==     in use at exit: 3,138,594 bytes in 69,516 blocks
==10921==   total heap usage: 1,737,268 allocs, 1,667,752 frees, 139,957,438 bytes allocated
==10921== 
==10921== Searching for pointers to 69,516 not-freed blocks
--10921--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10921--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10921--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10921--   Scanning root segment: 0x4037000..0x403afff (16384)
--10921--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10921--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10921--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10921--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10921--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10921--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10921--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10921--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10921--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10921--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10921--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10921--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10921--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10921--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10921--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10921--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10921--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10921--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10921--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10921--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10921--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10921--   Scanning root segment: 0x701a000..0x701afff (4096)
--10921--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10921--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10921--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10921--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10921--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10921--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10921--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10921--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10921--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10921--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10921== Checked 4,820,752 bytes
==10921== 
==10921== LEAK SUMMARY:
==10921==    definitely lost: 3,173 bytes in 18 blocks
==10921==    indirectly lost: 6,756 bytes in 7 blocks
==10921==      possibly lost: 0 bytes in 0 blocks
==10921==    still reachable: 3,128,665 bytes in 69,491 blocks
==10921==         suppressed: 0 bytes in 0 blocks
==10921== Rerun with --leak-check=full to see details of leaked memory
==10921== 
==10921== Use --track-origins=yes to see where uninitialised values come from
==10921== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10921== 
==10921== 1 errors in context 1 of 2:
==10921== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10921==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10921==    by 0x488CD0: stringsubst (subst.c:301)
==10921==    by 0x48801B: prefork (subst.c:77)
==10921==    by 0x42B318: execcmd (exec.c:2619)
==10921==    by 0x428CA0: execpline2 (exec.c:1697)
==10921==    by 0x427FD2: execpline (exec.c:1484)
==10921==    by 0x427756: execlist (exec.c:1267)
==10921==    by 0x42717C: execode (exec.c:1073)
==10921==    by 0x431299: runshfunc (exec.c:5040)
==10921==    by 0x430E76: doshfunc (exec.c:4920)
==10921==    by 0x4302FB: execshfunc (exec.c:4557)
==10921==    by 0x42D8C1: execcmd (exec.c:3373)
==10921== 
==10921== 
==10921== 2 errors in context 2 of 2:
==10921== Conditional jump or move depends on uninitialised value(s)
==10921==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10921==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10921==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10921==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10921==    by 0x42D8E9: execcmd (exec.c:3378)
==10921==    by 0x428CA0: execpline2 (exec.c:1697)
==10921==    by 0x427FD2: execpline (exec.c:1484)
==10921==    by 0x42779A: execlist (exec.c:1275)
==10921==    by 0x42717C: execode (exec.c:1073)
==10921==    by 0x431299: runshfunc (exec.c:5040)
==10921==    by 0x430E76: doshfunc (exec.c:4920)
==10921==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10921== 
==10921== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10922== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10922-by-pythonnut-on-???
==10922== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10922-by-pythonnut-on-???
==10922== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10922-by-pythonnut-on-???
==10922== 
==10922== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10922== don't want to do, unless you know exactly what you're doing,
==10922== or are doing some strange experiment):
==10922==   /usr/lib/valgrind/../../bin/vgdb --pid=10922 ...command...
==10922== 
==10922== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10922==   /path/to/gdb ./zsh
==10922== and then give GDB the following command
==10922==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10922
==10922== --pid is optional if only one valgrind process is running
==10922== 
--10922-- Caught __NR_exit; running __libc_freeres()
--10922-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10922== 
==10922== HEAP SUMMARY:
==10922==     in use at exit: 3,138,737 bytes in 69,516 blocks
==10922==   total heap usage: 1,737,276 allocs, 1,667,760 frees, 139,960,494 bytes allocated
==10922== 
==10922== Searching for pointers to 69,516 not-freed blocks
--10922--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10922--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10922--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10922--   Scanning root segment: 0x4037000..0x403afff (16384)
--10922--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10922--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10922--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10922--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10922--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10922--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10922--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10922--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10922--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10922--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10922--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10922--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10922--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10922--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10922--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10922--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10922--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10922--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10922--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10922--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10922--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10922--   Scanning root segment: 0x701a000..0x701afff (4096)
--10922--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10922--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10922--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10922--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10922--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10922--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10922--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10922--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10922--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10922--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10922== Checked 4,822,248 bytes
==10922== 
==10922== LEAK SUMMARY:
==10922==    definitely lost: 3,173 bytes in 18 blocks
==10922==    indirectly lost: 6,756 bytes in 7 blocks
==10922==      possibly lost: 0 bytes in 0 blocks
==10922==    still reachable: 3,128,808 bytes in 69,491 blocks
==10922==         suppressed: 0 bytes in 0 blocks
==10922== Rerun with --leak-check=full to see details of leaked memory
==10922== 
==10922== Use --track-origins=yes to see where uninitialised values come from
==10922== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10922== 
==10922== 1 errors in context 1 of 2:
==10922== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10922==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10922==    by 0x488CD0: stringsubst (subst.c:301)
==10922==    by 0x48801B: prefork (subst.c:77)
==10922==    by 0x42B318: execcmd (exec.c:2619)
==10922==    by 0x428CA0: execpline2 (exec.c:1697)
==10922==    by 0x427FD2: execpline (exec.c:1484)
==10922==    by 0x427756: execlist (exec.c:1267)
==10922==    by 0x42717C: execode (exec.c:1073)
==10922==    by 0x431299: runshfunc (exec.c:5040)
==10922==    by 0x430E76: doshfunc (exec.c:4920)
==10922==    by 0x4302FB: execshfunc (exec.c:4557)
==10922==    by 0x42D8C1: execcmd (exec.c:3373)
==10922== 
==10922== 
==10922== 2 errors in context 2 of 2:
==10922== Conditional jump or move depends on uninitialised value(s)
==10922==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10922==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10922==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10922==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10922==    by 0x42D8E9: execcmd (exec.c:3378)
==10922==    by 0x428CA0: execpline2 (exec.c:1697)
==10922==    by 0x427FD2: execpline (exec.c:1484)
==10922==    by 0x42779A: execlist (exec.c:1275)
==10922==    by 0x42717C: execode (exec.c:1073)
==10922==    by 0x431299: runshfunc (exec.c:5040)
==10922==    by 0x430E76: doshfunc (exec.c:4920)
==10922==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10922== 
==10922== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10925== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10925-by-pythonnut-on-???
==10925== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10925-by-pythonnut-on-???
==10925== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10925-by-pythonnut-on-???
==10925== 
==10925== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10925== don't want to do, unless you know exactly what you're doing,
==10925== or are doing some strange experiment):
==10925==   /usr/lib/valgrind/../../bin/vgdb --pid=10925 ...command...
==10925== 
==10925== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10925==   /path/to/gdb ./zsh
==10925== and then give GDB the following command
==10925==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10925
==10925== --pid is optional if only one valgrind process is running
==10925== 
--10925-- Caught __NR_exit; running __libc_freeres()
--10925-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10925== 
==10925== HEAP SUMMARY:
==10925==     in use at exit: 3,138,613 bytes in 69,516 blocks
==10925==   total heap usage: 1,737,762 allocs, 1,668,246 frees, 140,002,599 bytes allocated
==10925== 
==10925== Searching for pointers to 69,516 not-freed blocks
--10925--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10925--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10925--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10925--   Scanning root segment: 0x4037000..0x403afff (16384)
--10925--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10925--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10925--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10925--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10925--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10925--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10925--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10925--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10925--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10925--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10925--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10925--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10925--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10925--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10925--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10925--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10925--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10925--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10925--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10925--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10925--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10925--   Scanning root segment: 0x701a000..0x701afff (4096)
--10925--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10925--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10925--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10925--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10925--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10925--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10925--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10925--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10925--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10925--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10925== Checked 4,820,768 bytes
==10925== 
==10925== LEAK SUMMARY:
==10925==    definitely lost: 3,173 bytes in 18 blocks
==10925==    indirectly lost: 6,756 bytes in 7 blocks
==10925==      possibly lost: 0 bytes in 0 blocks
==10925==    still reachable: 3,128,684 bytes in 69,491 blocks
==10925==         suppressed: 0 bytes in 0 blocks
==10925== Rerun with --leak-check=full to see details of leaked memory
==10925== 
==10925== Use --track-origins=yes to see where uninitialised values come from
==10925== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10925== 
==10925== 1 errors in context 1 of 2:
==10925== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10925==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10925==    by 0x488CD0: stringsubst (subst.c:301)
==10925==    by 0x48801B: prefork (subst.c:77)
==10925==    by 0x42B318: execcmd (exec.c:2619)
==10925==    by 0x428CA0: execpline2 (exec.c:1697)
==10925==    by 0x427FD2: execpline (exec.c:1484)
==10925==    by 0x427756: execlist (exec.c:1267)
==10925==    by 0x42717C: execode (exec.c:1073)
==10925==    by 0x431299: runshfunc (exec.c:5040)
==10925==    by 0x430E76: doshfunc (exec.c:4920)
==10925==    by 0x4302FB: execshfunc (exec.c:4557)
==10925==    by 0x42D8C1: execcmd (exec.c:3373)
==10925== 
==10925== 
==10925== 2 errors in context 2 of 2:
==10925== Conditional jump or move depends on uninitialised value(s)
==10925==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10925==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10925==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10925==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10925==    by 0x42D8E9: execcmd (exec.c:3378)
==10925==    by 0x428CA0: execpline2 (exec.c:1697)
==10925==    by 0x427FD2: execpline (exec.c:1484)
==10925==    by 0x42779A: execlist (exec.c:1275)
==10925==    by 0x42717C: execode (exec.c:1073)
==10925==    by 0x431299: runshfunc (exec.c:5040)
==10925==    by 0x430E76: doshfunc (exec.c:4920)
==10925==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10925== 
==10925== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10926== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10926-by-pythonnut-on-???
==10926== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10926-by-pythonnut-on-???
==10926== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10926-by-pythonnut-on-???
==10926== 
==10926== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10926== don't want to do, unless you know exactly what you're doing,
==10926== or are doing some strange experiment):
==10926==   /usr/lib/valgrind/../../bin/vgdb --pid=10926 ...command...
==10926== 
==10926== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10926==   /path/to/gdb ./zsh
==10926== and then give GDB the following command
==10926==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10926
==10926== --pid is optional if only one valgrind process is running
==10926== 
--10926-- Caught __NR_exit; running __libc_freeres()
--10926-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10926== 
==10926== HEAP SUMMARY:
==10926==     in use at exit: 3,138,756 bytes in 69,516 blocks
==10926==   total heap usage: 1,737,770 allocs, 1,668,254 frees, 140,005,655 bytes allocated
==10926== 
==10926== Searching for pointers to 69,516 not-freed blocks
--10926--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10926--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10926--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10926--   Scanning root segment: 0x4037000..0x403afff (16384)
--10926--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10926--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10926--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10926--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10926--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10926--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10926--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10926--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10926--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10926--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10926--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10926--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10926--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10926--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10926--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10926--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10926--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10926--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10926--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10926--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10926--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10926--   Scanning root segment: 0x701a000..0x701afff (4096)
--10926--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10926--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10926--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10926--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10926--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10926--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10926--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10926--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10926--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10926--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10926== Checked 4,822,264 bytes
==10926== 
==10926== LEAK SUMMARY:
==10926==    definitely lost: 3,173 bytes in 18 blocks
==10926==    indirectly lost: 6,756 bytes in 7 blocks
==10926==      possibly lost: 0 bytes in 0 blocks
==10926==    still reachable: 3,128,827 bytes in 69,491 blocks
==10926==         suppressed: 0 bytes in 0 blocks
==10926== Rerun with --leak-check=full to see details of leaked memory
==10926== 
==10926== Use --track-origins=yes to see where uninitialised values come from
==10926== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10926== 
==10926== 1 errors in context 1 of 2:
==10926== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10926==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10926==    by 0x488CD0: stringsubst (subst.c:301)
==10926==    by 0x48801B: prefork (subst.c:77)
==10926==    by 0x42B318: execcmd (exec.c:2619)
==10926==    by 0x428CA0: execpline2 (exec.c:1697)
==10926==    by 0x427FD2: execpline (exec.c:1484)
==10926==    by 0x427756: execlist (exec.c:1267)
==10926==    by 0x42717C: execode (exec.c:1073)
==10926==    by 0x431299: runshfunc (exec.c:5040)
==10926==    by 0x430E76: doshfunc (exec.c:4920)
==10926==    by 0x4302FB: execshfunc (exec.c:4557)
==10926==    by 0x42D8C1: execcmd (exec.c:3373)
==10926== 
==10926== 
==10926== 2 errors in context 2 of 2:
==10926== Conditional jump or move depends on uninitialised value(s)
==10926==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10926==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10926==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10926==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10926==    by 0x42D8E9: execcmd (exec.c:3378)
==10926==    by 0x428CA0: execpline2 (exec.c:1697)
==10926==    by 0x427FD2: execpline (exec.c:1484)
==10926==    by 0x42779A: execlist (exec.c:1275)
==10926==    by 0x42717C: execode (exec.c:1073)
==10926==    by 0x431299: runshfunc (exec.c:5040)
==10926==    by 0x430E76: doshfunc (exec.c:4920)
==10926==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10926== 
==10926== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10927== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10927-by-pythonnut-on-???
==10927== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10927-by-pythonnut-on-???
==10927== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10927-by-pythonnut-on-???
==10927== 
==10927== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10927== don't want to do, unless you know exactly what you're doing,
==10927== or are doing some strange experiment):
==10927==   /usr/lib/valgrind/../../bin/vgdb --pid=10927 ...command...
==10927== 
==10927== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10927==   /path/to/gdb ./zsh
==10927== and then give GDB the following command
==10927==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10927
==10927== --pid is optional if only one valgrind process is running
==10927== 
==10928== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10928-by-pythonnut-on-???
==10928== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10928-by-pythonnut-on-???
==10928== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10928-by-pythonnut-on-???
==10928== 
==10928== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10928== don't want to do, unless you know exactly what you're doing,
==10928== or are doing some strange experiment):
==10928==   /usr/lib/valgrind/../../bin/vgdb --pid=10928 ...command...
==10928== 
==10928== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10928==   /path/to/gdb ./zsh
==10928== and then give GDB the following command
==10928==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10928
==10928== --pid is optional if only one valgrind process is running
==10928== 
==10930== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10930-by-pythonnut-on-???
==10930== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10930-by-pythonnut-on-???
==10930== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10930-by-pythonnut-on-???
==10930== 
==10930== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10930== don't want to do, unless you know exactly what you're doing,
==10930== or are doing some strange experiment):
==10930==   /usr/lib/valgrind/../../bin/vgdb --pid=10930 ...command...
==10930== 
==10930== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10930==   /path/to/gdb ./zsh
==10930== and then give GDB the following command
==10930==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10930
==10930== --pid is optional if only one valgrind process is running
==10930== 
--10929-- Caught __NR_exit; running __libc_freeres()
client request: code 4d430005,  addr 0xFFEFF3EAC,  len 4
==10929== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10929-by-pythonnut-on-???
==10931== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10931-by-pythonnut-on-???
==10929== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10929-by-pythonnut-on-???
==10931== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10931-by-pythonnut-on-???
==10929== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10929-by-pythonnut-on-???
==10931== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10931-by-pythonnut-on-???
==10929== 
==10931== 
==10929== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10929== don't want to do, unless you know exactly what you're doing,
==10929== or are doing some strange experiment):
==10929==   /usr/lib/valgrind/../../bin/vgdb --pid=10929 ...command...
==10929== 
==10931== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10931== don't want to do, unless you know exactly what you're doing,
==10931== or are doing some strange experiment):
==10931==   /usr/lib/valgrind/../../bin/vgdb --pid=10931 ...command...
==10929== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10929==   /path/to/gdb ./zsh
==10929== and then give GDB the following command
==10929==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10929
==10931== 
==10929== --pid is optional if only one valgrind process is running
==10929== 
==10931== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10931==   /path/to/gdb ./zsh
==10931== and then give GDB the following command
==10931==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10931
==10931== --pid is optional if only one valgrind process is running
==10931== 
==10932== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10932-by-pythonnut-on-???
==10932== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10932-by-pythonnut-on-???
==10932== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10932-by-pythonnut-on-???
==10932== 
==10932== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10932== don't want to do, unless you know exactly what you're doing,
==10932== or are doing some strange experiment):
==10932==   /usr/lib/valgrind/../../bin/vgdb --pid=10932 ...command...
==10932== 
==10932== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10932==   /path/to/gdb ./zsh
==10932== and then give GDB the following command
==10932==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10932
==10932== --pid is optional if only one valgrind process is running
==10932== 
--10929-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10933== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10933-by-pythonnut-on-???
==10933== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10933-by-pythonnut-on-???
==10933== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10933-by-pythonnut-on-???
==10933== 
==10933== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10933== don't want to do, unless you know exactly what you're doing,
==10933== or are doing some strange experiment):
==10933==   /usr/lib/valgrind/../../bin/vgdb --pid=10933 ...command...
==10933== 
==10933== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10933==   /path/to/gdb ./zsh
==10933== and then give GDB the following command
==10933==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10933
==10933== --pid is optional if only one valgrind process is running
==10933== 
==10929== 
==10929== HEAP SUMMARY:
==10929==     in use at exit: 3,113,529 bytes in 68,956 blocks
==10929==   total heap usage: 1,738,007 allocs, 1,669,051 frees, 140,036,781 bytes allocated
==10929== 
client request: code 4d430005,  addr 0xFFEFE66FC,  len 4
--10933-- Caught __NR_exit; running __libc_freeres()
==10929== Searching for pointers to 68,956 not-freed blocks
--10929--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10929--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10929--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10929--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10929--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10929--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10929--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10929--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10929--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10929--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10929--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10929--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10929--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10929--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10929--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10929--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10929--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10929--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10929--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10929--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10929--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10929--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10929--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10929--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10929--   Scanning root segment: 0x701a000..0x701afff (4096)
--10929--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10929--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10929--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10929--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10929--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10929--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10929--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10929--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10929--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10929--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10933-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10933== 
==10933== HEAP SUMMARY:
==10933==     in use at exit: 3,137,594 bytes in 69,547 blocks
==10933==   total heap usage: 1,599,659 allocs, 1,530,112 frees, 129,165,578 bytes allocated
==10933== 
==10933== Searching for pointers to 69,547 not-freed blocks
--10933--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10933--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10933--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10933--   Scanning root segment: 0x4037000..0x403efff (32768)
--10933--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10933--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10933--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10933--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10933--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10933--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10933--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10933--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10933--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10933--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10933--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10933--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10933--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10933--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10933--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10933--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10933--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10933--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10933--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10933--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10933--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10933--   Scanning root segment: 0x701a000..0x701afff (4096)
--10933--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10933--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10933--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10933--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10933--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10933--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10933--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10933--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10933--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10933--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10929== Checked 4,769,864 bytes
==10929== 
==10929== LEAK SUMMARY:
==10929==    definitely lost: 3,173 bytes in 18 blocks
==10929==    indirectly lost: 6,756 bytes in 7 blocks
==10929==      possibly lost: 0 bytes in 0 blocks
==10929==    still reachable: 3,103,600 bytes in 68,931 blocks
==10929==         suppressed: 0 bytes in 0 blocks
==10929== Rerun with --leak-check=full to see details of leaked memory
==10929== 
==10929== Use --track-origins=yes to see where uninitialised values come from
==10929== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10929== 
==10929== 1 errors in context 1 of 2:
==10929== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10929==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10929==    by 0x488CD0: stringsubst (subst.c:301)
==10929==    by 0x48801B: prefork (subst.c:77)
==10929==    by 0x42B318: execcmd (exec.c:2619)
==10929==    by 0x428CA0: execpline2 (exec.c:1697)
==10929==    by 0x427FD2: execpline (exec.c:1484)
==10929==    by 0x427756: execlist (exec.c:1267)
==10929==    by 0x42717C: execode (exec.c:1073)
==10929==    by 0x431299: runshfunc (exec.c:5040)
==10929==    by 0x430E76: doshfunc (exec.c:4920)
==10929==    by 0x4302FB: execshfunc (exec.c:4557)
==10929==    by 0x42D8C1: execcmd (exec.c:3373)
==10929== 
==10929== 
==10929== 2 errors in context 2 of 2:
==10929== Conditional jump or move depends on uninitialised value(s)
==10929==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10929==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10933== Checked 4,841,504 bytes
==10929==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10933== 
==10929==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10929==    by 0x42D8E9: execcmd (exec.c:3378)
==10929==    by 0x428CA0: execpline2 (exec.c:1697)
==10929==    by 0x427FD2: execpline (exec.c:1484)
==10929==    by 0x42779A: execlist (exec.c:1275)
==10929==    by 0x42717C: execode (exec.c:1073)
==10929==    by 0x431299: runshfunc (exec.c:5040)
==10929==    by 0x430E76: doshfunc (exec.c:4920)
==10929==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10929== 
==10929== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10927-- Caught __NR_exit; running __libc_freeres()
==10933== LEAK SUMMARY:
==10933==    definitely lost: 2,221 bytes in 14 blocks
==10933==    indirectly lost: 6,796 bytes in 9 blocks
==10933==      possibly lost: 0 bytes in 0 blocks
==10933==    still reachable: 3,128,577 bytes in 69,524 blocks
==10933==         suppressed: 0 bytes in 0 blocks
==10933== Rerun with --leak-check=full to see details of leaked memory
==10933== 
==10933== Use --track-origins=yes to see where uninitialised values come from
==10933== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10933== 
==10933== 1 errors in context 1 of 2:
==10933== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10933==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10933==    by 0x488CD0: stringsubst (subst.c:301)
==10933==    by 0x48801B: prefork (subst.c:77)
==10933==    by 0x42B318: execcmd (exec.c:2619)
==10933==    by 0x428CA0: execpline2 (exec.c:1697)
==10933==    by 0x427FD2: execpline (exec.c:1484)
==10933==    by 0x427756: execlist (exec.c:1267)
==10933==    by 0x42717C: execode (exec.c:1073)
==10933==    by 0x431299: runshfunc (exec.c:5040)
==10933==    by 0x430E76: doshfunc (exec.c:4920)
==10933==    by 0x4302FB: execshfunc (exec.c:4557)
==10933==    by 0x42D8C1: execcmd (exec.c:3373)
==10933== 
==10933== 
==10933== 2 errors in context 2 of 2:
==10933== Conditional jump or move depends on uninitialised value(s)
==10933==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10933==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10933==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10933==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10933==    by 0x42D8E9: execcmd (exec.c:3378)
==10933==    by 0x428CA0: execpline2 (exec.c:1697)
==10933==    by 0x427FD2: execpline (exec.c:1484)
==10933==    by 0x42779A: execlist (exec.c:1275)
==10933==    by 0x42717C: execode (exec.c:1073)
==10933==    by 0x431299: runshfunc (exec.c:5040)
==10933==    by 0x430E76: doshfunc (exec.c:4920)
==10933==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10933== 
==10933== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10927-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10927== 
==10927== HEAP SUMMARY:
==10927==     in use at exit: 3,113,138 bytes in 68,946 blocks
==10927==   total heap usage: 1,738,009 allocs, 1,669,063 frees, 140,037,325 bytes allocated
==10927== 
client request: code 4d430005,  addr 0xFFEFE6BAC,  len 4
==10927== Searching for pointers to 68,946 not-freed blocks
--10927--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10927--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10927--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10927--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10927--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10927--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10927--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10927--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10927--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10927--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10927--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10927--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10927--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10927--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10927--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10927--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10927--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10927--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10927--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10927--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10927--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10927--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10927--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10927--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10927--   Scanning root segment: 0x701a000..0x701afff (4096)
--10927--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10927--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10927--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10927--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10927--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10927--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10927--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10927--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10927--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10927--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10927== Checked 4,767,520 bytes
==10927== 
--10935-- Caught __NR_exit; running __libc_freeres()
==10927== LEAK SUMMARY:
==10927==    definitely lost: 3,173 bytes in 18 blocks
==10927==    indirectly lost: 6,756 bytes in 7 blocks
==10927==      possibly lost: 0 bytes in 0 blocks
==10927==    still reachable: 3,103,209 bytes in 68,921 blocks
==10927==         suppressed: 0 bytes in 0 blocks
==10927== Rerun with --leak-check=full to see details of leaked memory
==10927== 
==10927== Use --track-origins=yes to see where uninitialised values come from
==10927== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10927== 
==10927== 1 errors in context 1 of 2:
==10927== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10927==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10927==    by 0x488CD0: stringsubst (subst.c:301)
==10927==    by 0x48801B: prefork (subst.c:77)
==10927==    by 0x42B318: execcmd (exec.c:2619)
==10927==    by 0x428CA0: execpline2 (exec.c:1697)
==10927==    by 0x427FD2: execpline (exec.c:1484)
==10927==    by 0x427756: execlist (exec.c:1267)
==10927==    by 0x42717C: execode (exec.c:1073)
==10927==    by 0x431299: runshfunc (exec.c:5040)
==10927==    by 0x430E76: doshfunc (exec.c:4920)
==10927==    by 0x4302FB: execshfunc (exec.c:4557)
==10927==    by 0x42D8C1: execcmd (exec.c:3373)
==10927== 
==10927== 
==10927== 2 errors in context 2 of 2:
==10927== Conditional jump or move depends on uninitialised value(s)
==10927==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10927==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10927==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10927==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10927==    by 0x42D8E9: execcmd (exec.c:3378)
==10927==    by 0x428CA0: execpline2 (exec.c:1697)
==10927==    by 0x427FD2: execpline (exec.c:1484)
==10927==    by 0x42779A: execlist (exec.c:1275)
==10927==    by 0x42717C: execode (exec.c:1073)
==10927==    by 0x431299: runshfunc (exec.c:5040)
==10927==    by 0x430E76: doshfunc (exec.c:4920)
==10927==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10927== 
==10927== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10935== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10935-by-pythonnut-on-???
==10935== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10935-by-pythonnut-on-???
==10935== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10935-by-pythonnut-on-???
==10935== 
==10935== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10935== don't want to do, unless you know exactly what you're doing,
==10935== or are doing some strange experiment):
==10935==   /usr/lib/valgrind/../../bin/vgdb --pid=10935 ...command...
==10935== 
==10935== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10935==   /path/to/gdb ./zsh
==10935== and then give GDB the following command
==10935==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10935
==10935== --pid is optional if only one valgrind process is running
==10935== 
--10935-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10935== 
==10935== HEAP SUMMARY:
==10935==     in use at exit: 3,137,839 bytes in 69,552 blocks
==10935==   total heap usage: 1,599,671 allocs, 1,530,119 frees, 129,169,479 bytes allocated
==10935== 
--10984-- Caught __NR_exit; running __libc_freeres()
==10984== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10984-by-pythonnut-on-???
==10985== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10985-by-pythonnut-on-???
==10984== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10984-by-pythonnut-on-???
==10985== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10985-by-pythonnut-on-???
==10984== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10984-by-pythonnut-on-???
==10985== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10985-by-pythonnut-on-???
==10984== 
==10985== 
==10984== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10984== don't want to do, unless you know exactly what you're doing,
==10984== or are doing some strange experiment):
==10984==   /usr/lib/valgrind/../../bin/vgdb --pid=10984 ...command...
==10985== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10985== don't want to do, unless you know exactly what you're doing,
==10985== or are doing some strange experiment):
==10985==   /usr/lib/valgrind/../../bin/vgdb --pid=10985 ...command...
==10984== 
==10985== 
==10984== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10984==   /path/to/gdb ./zsh
==10984== and then give GDB the following command
==10984==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10984
==10985== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10985==   /path/to/gdb ./zsh
==10985== and then give GDB the following command
==10985==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10985
==10984== --pid is optional if only one valgrind process is running
==10985== --pid is optional if only one valgrind process is running
==10984== 
==10985== 
client request: code 4d430005,  addr 0xFFEFF268C,  len 4
==10988== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10988-by-pythonnut-on-???
==10988== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10988-by-pythonnut-on-???
==10988== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10988-by-pythonnut-on-???
==10988== 
==10988== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10988== don't want to do, unless you know exactly what you're doing,
==10988== or are doing some strange experiment):
==10988==   /usr/lib/valgrind/../../bin/vgdb --pid=10988 ...command...
==10988== 
==10988== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10988==   /path/to/gdb ./zsh
==10988== and then give GDB the following command
==10988==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10988
==10988== --pid is optional if only one valgrind process is running
==10988== 
--10984-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10935== Searching for pointers to 69,552 not-freed blocks
--10935--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
client request: code 4d430005,  addr 0xFFEFF25EC,  len 4
--10935--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10935--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10935--   Scanning root segment: 0x4037000..0x403efff (32768)
--10935--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10935--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10935--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10935--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10935--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10935--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10935--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10935--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10935--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10935--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10935--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10935--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10935--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10935--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10935--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10935--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10935--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10935--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10935--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10935--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10935--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10935--   Scanning root segment: 0x701a000..0x701afff (4096)
--10935--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10935--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10935--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10935--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10935--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10935--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10935--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10935--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10935--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10935--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10984== 
==10984== HEAP SUMMARY:
==10984==     in use at exit: 3,113,614 bytes in 68,957 blocks
==10984==   total heap usage: 1,738,040 allocs, 1,669,083 frees, 140,049,905 bytes allocated
==10984== 
==10983== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10983-by-pythonnut-on-???
==10983== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10983-by-pythonnut-on-???
==10983== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10983-by-pythonnut-on-???
==10983== 
==10983== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10983== don't want to do, unless you know exactly what you're doing,
==10983== or are doing some strange experiment):
==10983==   /usr/lib/valgrind/../../bin/vgdb --pid=10983 ...command...
==10983== 
==10983== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10983==   /path/to/gdb ./zsh
==10983== and then give GDB the following command
==10983==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10983
==10983== --pid is optional if only one valgrind process is running
==10983== 
==10984== Searching for pointers to 68,957 not-freed blocks
--10984--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10984--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10984--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10984--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10984--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10984--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10984--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10984--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10984--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10984--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10984--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10984--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10984--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10984--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10984--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10984--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10984--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10984--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10984--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10984--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10984--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10984--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10984--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10984--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10984--   Scanning root segment: 0x701a000..0x701afff (4096)
--10984--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10984--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10984--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10984--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10984--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10984--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10984--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10984--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10984--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10984--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10935== Checked 4,841,472 bytes
==10935== 
==10935== LEAK SUMMARY:
==10935==    definitely lost: 2,221 bytes in 14 blocks
==10935==    indirectly lost: 6,796 bytes in 9 blocks
==10935==      possibly lost: 0 bytes in 0 blocks
==10935==    still reachable: 3,128,822 bytes in 69,529 blocks
==10935==         suppressed: 0 bytes in 0 blocks
==10935== Rerun with --leak-check=full to see details of leaked memory
==10935== 
==10935== Use --track-origins=yes to see where uninitialised values come from
==10935== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10935== 
==10935== 1 errors in context 1 of 2:
==10935== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10935==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10935==    by 0x488CD0: stringsubst (subst.c:301)
==10935==    by 0x48801B: prefork (subst.c:77)
==10935==    by 0x42B318: execcmd (exec.c:2619)
==10935==    by 0x428CA0: execpline2 (exec.c:1697)
==10935==    by 0x427FD2: execpline (exec.c:1484)
==10935==    by 0x427756: execlist (exec.c:1267)
==10935==    by 0x42717C: execode (exec.c:1073)
==10935==    by 0x431299: runshfunc (exec.c:5040)
==10935==    by 0x430E76: doshfunc (exec.c:4920)
==10935==    by 0x4302FB: execshfunc (exec.c:4557)
==10935==    by 0x42D8C1: execcmd (exec.c:3373)
==10935== 
==10935== 
==10935== 2 errors in context 2 of 2:
==10935== Conditional jump or move depends on uninitialised value(s)
==10935==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10935==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10935==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10935==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10935==    by 0x42D8E9: execcmd (exec.c:3378)
==10935==    by 0x428CA0: execpline2 (exec.c:1697)
==10935==    by 0x427FD2: execpline (exec.c:1484)
==10935==    by 0x42779A: execlist (exec.c:1275)
==10935==    by 0x42717C: execode (exec.c:1073)
==10935==    by 0x431299: runshfunc (exec.c:5040)
==10935==    by 0x430E76: doshfunc (exec.c:4920)
==10935==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10935== 
==10935== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10984== Checked 4,770,648 bytes
==10984== 
--10932-- Caught __NR_exit; running __libc_freeres()
==10984== LEAK SUMMARY:
==10984==    definitely lost: 3,173 bytes in 18 blocks
==10984==    indirectly lost: 6,756 bytes in 7 blocks
==10984==      possibly lost: 0 bytes in 0 blocks
==10984==    still reachable: 3,103,685 bytes in 68,932 blocks
==10984==         suppressed: 0 bytes in 0 blocks
==10984== Rerun with --leak-check=full to see details of leaked memory
==10984== 
==10984== Use --track-origins=yes to see where uninitialised values come from
==10984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10984== 
==10984== 1 errors in context 1 of 2:
==10984== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10984==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10984==    by 0x488CD0: stringsubst (subst.c:301)
==10984==    by 0x48801B: prefork (subst.c:77)
==10984==    by 0x42B318: execcmd (exec.c:2619)
==10984==    by 0x428CA0: execpline2 (exec.c:1697)
==10984==    by 0x427FD2: execpline (exec.c:1484)
==10984==    by 0x427756: execlist (exec.c:1267)
==10984==    by 0x42717C: execode (exec.c:1073)
==10984==    by 0x431299: runshfunc (exec.c:5040)
==10984==    by 0x430E76: doshfunc (exec.c:4920)
==10984==    by 0x4302FB: execshfunc (exec.c:4557)
==10984==    by 0x42D8C1: execcmd (exec.c:3373)
==10984== 
==10984== 
==10984== 2 errors in context 2 of 2:
==10984== Conditional jump or move depends on uninitialised value(s)
==10984==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10984==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10984==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10984==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10984==    by 0x42D8E9: execcmd (exec.c:3378)
==10984==    by 0x428CA0: execpline2 (exec.c:1697)
==10984==    by 0x427FD2: execpline (exec.c:1484)
==10984==    by 0x42779A: execlist (exec.c:1275)
==10984==    by 0x42717C: execode (exec.c:1073)
==10984==    by 0x431299: runshfunc (exec.c:5040)
==10984==    by 0x430E76: doshfunc (exec.c:4920)
==10984==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10984== 
==10984== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--10983-- Caught __NR_exit; running __libc_freeres()
--10932-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10932== 
==10932== HEAP SUMMARY:
==10932==     in use at exit: 3,135,675 bytes in 69,477 blocks
==10932==   total heap usage: 1,599,622 allocs, 1,530,145 frees, 129,170,090 bytes allocated
==10932== 
--10983-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10983== 
==10983== HEAP SUMMARY:
==10983==     in use at exit: 3,113,550 bytes in 68,957 blocks
==10983==   total heap usage: 1,738,044 allocs, 1,669,087 frees, 140,049,441 bytes allocated
==10983== 
==10932== Searching for pointers to 69,477 not-freed blocks
--10932--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10932--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10932--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10932--   Scanning root segment: 0x4037000..0x403afff (16384)
--10932--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10932--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10932--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10932--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10932--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10932--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10932--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10932--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10932--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10932--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10932--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10932--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10932--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10932--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10932--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10932--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10932--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10932--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10932--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10932--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10932--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10932--   Scanning root segment: 0x701a000..0x701afff (4096)
--10932--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10932--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10932--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10932--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10932--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10932--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10932--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10932--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10932--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10932--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10983== Searching for pointers to 68,957 not-freed blocks
--10983--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10983--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10983--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10983--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10983--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10983--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10983--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10983--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10983--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10983--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10983--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10983--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10983--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10983--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10983--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10983--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10983--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10983--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10983--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10983--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10983--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10983--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10983--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10983--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10983--   Scanning root segment: 0x701a000..0x701afff (4096)
--10983--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10983--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10983--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10983--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10983--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10983--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10983--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10983--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10983--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10983--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10932== Checked 4,821,400 bytes
==10932== 
==10983== Checked 4,770,280 bytes
==10983== 
==10932== LEAK SUMMARY:
==10932==    definitely lost: 2,221 bytes in 14 blocks
==10932==    indirectly lost: 6,796 bytes in 9 blocks
==10932==      possibly lost: 0 bytes in 0 blocks
==10932==    still reachable: 3,126,658 bytes in 69,454 blocks
==10932==         suppressed: 0 bytes in 0 blocks
==10932== Rerun with --leak-check=full to see details of leaked memory
==10932== 
==10932== Use --track-origins=yes to see where uninitialised values come from
==10932== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10932== 
==10932== 1 errors in context 1 of 2:
==10932== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10932==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10932==    by 0x488CD0: stringsubst (subst.c:301)
==10932==    by 0x48801B: prefork (subst.c:77)
==10932==    by 0x42B318: execcmd (exec.c:2619)
==10932==    by 0x428CA0: execpline2 (exec.c:1697)
==10932==    by 0x427FD2: execpline (exec.c:1484)
==10932==    by 0x427756: execlist (exec.c:1267)
==10932==    by 0x42717C: execode (exec.c:1073)
==10932==    by 0x431299: runshfunc (exec.c:5040)
==10932==    by 0x430E76: doshfunc (exec.c:4920)
==10932==    by 0x4302FB: execshfunc (exec.c:4557)
==10932==    by 0x42D8C1: execcmd (exec.c:3373)
==10932== 
==10932== 
==10932== 2 errors in context 2 of 2:
==10932== Conditional jump or move depends on uninitialised value(s)
==10932==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10932==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10932==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10932==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10932==    by 0x42D8E9: execcmd (exec.c:3378)
==10932==    by 0x428CA0: execpline2 (exec.c:1697)
==10932==    by 0x427FD2: execpline (exec.c:1484)
==10932==    by 0x42779A: execlist (exec.c:1275)
==10932==    by 0x42717C: execode (exec.c:1073)
==10932==    by 0x431299: runshfunc (exec.c:5040)
==10932==    by 0x430E76: doshfunc (exec.c:4920)
==10932==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10932== 
==10932== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10983== LEAK SUMMARY:
==10983==    definitely lost: 3,173 bytes in 18 blocks
==10983==    indirectly lost: 6,756 bytes in 7 blocks
==10983==      possibly lost: 0 bytes in 0 blocks
==10983==    still reachable: 3,103,621 bytes in 68,932 blocks
==10983==         suppressed: 0 bytes in 0 blocks
==10983== Rerun with --leak-check=full to see details of leaked memory
==10983== 
==10983== Use --track-origins=yes to see where uninitialised values come from
==10983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10983== 
==10983== 1 errors in context 1 of 2:
==10983== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10983==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10983==    by 0x488CD0: stringsubst (subst.c:301)
==10983==    by 0x48801B: prefork (subst.c:77)
==10983==    by 0x42B318: execcmd (exec.c:2619)
==10983==    by 0x428CA0: execpline2 (exec.c:1697)
==10983==    by 0x427FD2: execpline (exec.c:1484)
==10983==    by 0x427756: execlist (exec.c:1267)
==10983==    by 0x42717C: execode (exec.c:1073)
==10983==    by 0x431299: runshfunc (exec.c:5040)
==10983==    by 0x430E76: doshfunc (exec.c:4920)
==10983==    by 0x4302FB: execshfunc (exec.c:4557)
==10983==    by 0x42D8C1: execcmd (exec.c:3373)
==10983== 
==10983== 
==10983== 2 errors in context 2 of 2:
==10983== Conditional jump or move depends on uninitialised value(s)
==10983==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10983==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10983==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10983==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10983==    by 0x42D8E9: execcmd (exec.c:3378)
==10983==    by 0x428CA0: execpline2 (exec.c:1697)
==10983==    by 0x427FD2: execpline (exec.c:1484)
==10983==    by 0x42779A: execlist (exec.c:1275)
==10983==    by 0x42717C: execode (exec.c:1073)
==10983==    by 0x431299: runshfunc (exec.c:5040)
==10983==    by 0x430E76: doshfunc (exec.c:4920)
==10983==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10983== 
==10983== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10991== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10991-by-pythonnut-on-???
==10991== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10991-by-pythonnut-on-???
==10991== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10991-by-pythonnut-on-???
==10991== 
==10991== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10991== don't want to do, unless you know exactly what you're doing,
==10991== or are doing some strange experiment):
==10991==   /usr/lib/valgrind/../../bin/vgdb --pid=10991 ...command...
==10991== 
==10991== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10991==   /path/to/gdb ./zsh
==10991== and then give GDB the following command
==10991==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10991
==10991== --pid is optional if only one valgrind process is running
==10991== 
--10991-- Caught __NR_exit; running __libc_freeres()
==10992== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10992-by-pythonnut-on-???
==10992== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10992-by-pythonnut-on-???
==10992== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10992-by-pythonnut-on-???
==10992== 
==10992== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10992== don't want to do, unless you know exactly what you're doing,
==10992== or are doing some strange experiment):
==10992==   /usr/lib/valgrind/../../bin/vgdb --pid=10992 ...command...
==10992== 
==10992== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10992==   /path/to/gdb ./zsh
==10992== and then give GDB the following command
==10992==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10992
==10992== --pid is optional if only one valgrind process is running
==10992== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
client request: code 4d430005,  addr 0xFFEFF2BDC,  len 4
--10990-- Caught __NR_exit; running __libc_freeres()
--10991-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10991== 
==10990== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10990-by-pythonnut-on-???
==10990== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10990-by-pythonnut-on-???
==10990== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10990-by-pythonnut-on-???
==10990== 
==10990== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10990== don't want to do, unless you know exactly what you're doing,
==10990== or are doing some strange experiment):
==10990==   /usr/lib/valgrind/../../bin/vgdb --pid=10990 ...command...
==10990== 
==10990== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10990==   /path/to/gdb ./zsh
==10990== and then give GDB the following command
==10990==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10990
==10990== --pid is optional if only one valgrind process is running
==10990== 
==10991== HEAP SUMMARY:
==10991==     in use at exit: 3,137,448 bytes in 69,539 blocks
==10991==   total heap usage: 1,599,691 allocs, 1,530,152 frees, 129,178,853 bytes allocated
==10991== 
--10990-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10990== 
==10990== HEAP SUMMARY:
==10990==     in use at exit: 3,113,813 bytes in 68,962 blocks
==10990==   total heap usage: 1,738,055 allocs, 1,669,093 frees, 140,054,529 bytes allocated
==10990== 
==10991== Searching for pointers to 69,539 not-freed blocks
--10991--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10991--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10991--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10991--   Scanning root segment: 0x4037000..0x403efff (32768)
--10991--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10991--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10991--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10991--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10991--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10991--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10991--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10991--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10991--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10991--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10991--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10991--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10991--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10991--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10991--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10991--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10991--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10991--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10991--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10991--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10991--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10991--   Scanning root segment: 0x701a000..0x701afff (4096)
--10991--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10991--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10991--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10991--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10991--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10991--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10991--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10991--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10991--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10991--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10990== Searching for pointers to 68,962 not-freed blocks
--10990--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10990--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10990--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10990--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10990--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10990--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10990--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10990--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10990--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10990--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10990--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10990--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10990--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10990--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10990--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10990--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10990--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10990--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10990--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10990--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10990--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10990--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10990--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10990--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10990--   Scanning root segment: 0x701a000..0x701afff (4096)
--10990--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10990--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10990--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10990--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10990--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10990--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10990--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10990--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10990--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10990--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10991== Checked 4,840,040 bytes
==10991== 
==10991== LEAK SUMMARY:
==10991==    definitely lost: 2,221 bytes in 14 blocks
==10991==    indirectly lost: 6,796 bytes in 9 blocks
==10991==      possibly lost: 0 bytes in 0 blocks
==10991==    still reachable: 3,128,431 bytes in 69,516 blocks
==10991==         suppressed: 0 bytes in 0 blocks
==10991== Rerun with --leak-check=full to see details of leaked memory
==10991== 
==10991== Use --track-origins=yes to see where uninitialised values come from
==10991== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10991== 
==10991== 1 errors in context 1 of 2:
==10991== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10991==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10991==    by 0x488CD0: stringsubst (subst.c:301)
==10991==    by 0x48801B: prefork (subst.c:77)
==10991==    by 0x42B318: execcmd (exec.c:2619)
==10991==    by 0x428CA0: execpline2 (exec.c:1697)
==10991==    by 0x427FD2: execpline (exec.c:1484)
==10991==    by 0x427756: execlist (exec.c:1267)
==10991==    by 0x42717C: execode (exec.c:1073)
==10991==    by 0x431299: runshfunc (exec.c:5040)
==10991==    by 0x430E76: doshfunc (exec.c:4920)
==10991==    by 0x4302FB: execshfunc (exec.c:4557)
==10991==    by 0x42D8C1: execcmd (exec.c:3373)
==10991== 
==10991== 
==10991== 2 errors in context 2 of 2:
==10991== Conditional jump or move depends on uninitialised value(s)
==10991==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10991==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10991==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10991==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10991==    by 0x42D8E9: execcmd (exec.c:3378)
==10991==    by 0x428CA0: execpline2 (exec.c:1697)
==10991==    by 0x427FD2: execpline (exec.c:1484)
==10991==    by 0x42779A: execlist (exec.c:1275)
==10991==    by 0x42717C: execode (exec.c:1073)
==10991==    by 0x431299: runshfunc (exec.c:5040)
==10991==    by 0x430E76: doshfunc (exec.c:4920)
==10991==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10991== 
==10991== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10989-by-pythonnut-on-???
==10989== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10989-by-pythonnut-on-???
==10989== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10989-by-pythonnut-on-???
==10989== 
==10989== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10989== don't want to do, unless you know exactly what you're doing,
==10989== or are doing some strange experiment):
==10989==   /usr/lib/valgrind/../../bin/vgdb --pid=10989 ...command...
==10989== 
==10989== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10989==   /path/to/gdb ./zsh
==10989== and then give GDB the following command
==10989==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10989
==10989== --pid is optional if only one valgrind process is running
==10989== 
--10989-- Caught __NR_exit; running __libc_freeres()
==10990== Checked 4,770,264 bytes
==10990== 
--10989-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10990== LEAK SUMMARY:
==10990==    definitely lost: 3,173 bytes in 18 blocks
==10990==    indirectly lost: 6,756 bytes in 7 blocks
==10990==      possibly lost: 0 bytes in 0 blocks
==10990==    still reachable: 3,103,884 bytes in 68,937 blocks
==10990==         suppressed: 0 bytes in 0 blocks
==10990== Rerun with --leak-check=full to see details of leaked memory
==10990== 
==10990== Use --track-origins=yes to see where uninitialised values come from
==10990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10990== 
==10990== 1 errors in context 1 of 2:
==10990== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10990==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10990==    by 0x488CD0: stringsubst (subst.c:301)
==10990==    by 0x48801B: prefork (subst.c:77)
==10990==    by 0x42B318: execcmd (exec.c:2619)
==10990==    by 0x428CA0: execpline2 (exec.c:1697)
==10990==    by 0x427FD2: execpline (exec.c:1484)
==10990==    by 0x427756: execlist (exec.c:1267)
==10990==    by 0x42717C: execode (exec.c:1073)
==10990==    by 0x431299: runshfunc (exec.c:5040)
==10990==    by 0x430E76: doshfunc (exec.c:4920)
==10990==    by 0x4302FB: execshfunc (exec.c:4557)
==10990==    by 0x42D8C1: execcmd (exec.c:3373)
==10990== 
==10990== 
==10990== 2 errors in context 2 of 2:
==10990== Conditional jump or move depends on uninitialised value(s)
==10990==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10990==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10990==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10990==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10990==    by 0x42D8E9: execcmd (exec.c:3378)
==10990==    by 0x428CA0: execpline2 (exec.c:1697)
==10990==    by 0x427FD2: execpline (exec.c:1484)
==10990==    by 0x42779A: execlist (exec.c:1275)
==10990==    by 0x42717C: execode (exec.c:1073)
==10990==    by 0x431299: runshfunc (exec.c:5040)
==10990==    by 0x430E76: doshfunc (exec.c:4920)
==10990==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10990== 
==10990== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== 
==10989== HEAP SUMMARY:
==10989==     in use at exit: 3,137,384 bytes in 69,536 blocks
==10989==   total heap usage: 1,599,693 allocs, 1,530,157 frees, 129,179,397 bytes allocated
==10989== 
==10989== Searching for pointers to 69,536 not-freed blocks
--10989--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10989--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10989--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10989--   Scanning root segment: 0x4037000..0x403efff (32768)
--10989--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10989--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10989--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10989--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10989--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10989--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10989--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10989--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10989--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10989--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10989--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10989--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10989--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10989--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10989--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10989--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10989--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10989--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10989--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10989--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10989--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10989--   Scanning root segment: 0x701a000..0x701afff (4096)
--10989--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10989--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10989--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10989--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10989--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10989--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10989--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10989--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10989--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10989--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF272C,  len 4
==10995== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10995-by-pythonnut-on-???
==10995== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10995-by-pythonnut-on-???
==10995== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10995-by-pythonnut-on-???
==10995== 
==10995== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10995== don't want to do, unless you know exactly what you're doing,
==10995== or are doing some strange experiment):
==10995==   /usr/lib/valgrind/../../bin/vgdb --pid=10995 ...command...
==10995== 
==10995== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10995==   /path/to/gdb ./zsh
==10995== and then give GDB the following command
==10995==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10995
==10995== --pid is optional if only one valgrind process is running
==10995== 
--10994-- Caught __NR_exit; running __libc_freeres()
==10994== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10994-by-pythonnut-on-???
==10994== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10994-by-pythonnut-on-???
==10994== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10994-by-pythonnut-on-???
==10994== 
==10994== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10994== don't want to do, unless you know exactly what you're doing,
==10994== or are doing some strange experiment):
==10994==   /usr/lib/valgrind/../../bin/vgdb --pid=10994 ...command...
==10994== 
==10994== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10994==   /path/to/gdb ./zsh
==10994== and then give GDB the following command
==10994==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10994
==10994== --pid is optional if only one valgrind process is running
==10994== 
--10994-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10994== 
==10994== HEAP SUMMARY:
==10994==     in use at exit: 3,113,920 bytes in 68,966 blocks
==10994==   total heap usage: 1,738,063 allocs, 1,669,097 frees, 140,056,748 bytes allocated
==10994== 
==10994== Searching for pointers to 68,966 not-freed blocks
--10994--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10994--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10994--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10994--   Scanning root segment: 0x4037000..0x403afff (16384)
--10994--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10994--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10994--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10994--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10994--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10994--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10994--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10994--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10994--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10994--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10994--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10994--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10994--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10994--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10994--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10994--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10994--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10994--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10994--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10994--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10994--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10994--   Scanning root segment: 0x701a000..0x701afff (4096)
--10994--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10994--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10994--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10994--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10994--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10994--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10994--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10994--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10994--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10994--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10989== Checked 4,839,352 bytes
==10989== 
==10989== LEAK SUMMARY:
==10989==    definitely lost: 2,221 bytes in 14 blocks
==10989==    indirectly lost: 6,796 bytes in 9 blocks
==10989==      possibly lost: 0 bytes in 0 blocks
==10989==    still reachable: 3,128,367 bytes in 69,513 blocks
==10989==         suppressed: 0 bytes in 0 blocks
==10989== Rerun with --leak-check=full to see details of leaked memory
==10989== 
==10989== Use --track-origins=yes to see where uninitialised values come from
==10989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10989== 
==10989== 1 errors in context 1 of 2:
==10989== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10989==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10989==    by 0x488CD0: stringsubst (subst.c:301)
==10989==    by 0x48801B: prefork (subst.c:77)
==10989==    by 0x42B318: execcmd (exec.c:2619)
==10989==    by 0x428CA0: execpline2 (exec.c:1697)
==10989==    by 0x427FD2: execpline (exec.c:1484)
==10989==    by 0x427756: execlist (exec.c:1267)
==10989==    by 0x42717C: execode (exec.c:1073)
==10989==    by 0x431299: runshfunc (exec.c:5040)
==10989==    by 0x430E76: doshfunc (exec.c:4920)
==10989==    by 0x4302FB: execshfunc (exec.c:4557)
==10989==    by 0x42D8C1: execcmd (exec.c:3373)
==10989== 
==10989== 
==10989== 2 errors in context 2 of 2:
==10989== Conditional jump or move depends on uninitialised value(s)
==10989==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10989==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10989==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10989==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10989==    by 0x42D8E9: execcmd (exec.c:3378)
==10989==    by 0x428CA0: execpline2 (exec.c:1697)
==10989==    by 0x427FD2: execpline (exec.c:1484)
==10989==    by 0x42779A: execlist (exec.c:1275)
==10989==    by 0x42717C: execode (exec.c:1073)
==10989==    by 0x431299: runshfunc (exec.c:5040)
==10989==    by 0x430E76: doshfunc (exec.c:4920)
==10989==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10989== 
==10989== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10996-by-pythonnut-on-???
==10996== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10996-by-pythonnut-on-???
==10996== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10996-by-pythonnut-on-???
==10996== 
==10996== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10996== don't want to do, unless you know exactly what you're doing,
==10996== or are doing some strange experiment):
==10996==   /usr/lib/valgrind/../../bin/vgdb --pid=10996 ...command...
==10996== 
==10996== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10996==   /path/to/gdb ./zsh
==10996== and then give GDB the following command
==10996==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10996
==10996== --pid is optional if only one valgrind process is running
==10996== 
--10996-- Caught __NR_exit; running __libc_freeres()
--10996-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10996== 
==10996== HEAP SUMMARY:
==10996==     in use at exit: 3,137,388 bytes in 69,536 blocks
==10996==   total heap usage: 1,599,710 allocs, 1,530,174 frees, 129,184,417 bytes allocated
==10996== 
==10994== Checked 4,787,016 bytes
==10994== 
==10994== LEAK SUMMARY:
==10994==    definitely lost: 3,173 bytes in 18 blocks
==10994==    indirectly lost: 6,756 bytes in 7 blocks
==10994==      possibly lost: 0 bytes in 0 blocks
==10994==    still reachable: 3,103,991 bytes in 68,941 blocks
==10994==         suppressed: 0 bytes in 0 blocks
==10994== Rerun with --leak-check=full to see details of leaked memory
==10994== 
==10994== Use --track-origins=yes to see where uninitialised values come from
==10994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10994== 
==10994== 1 errors in context 1 of 2:
==10994== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10994==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10994==    by 0x488CD0: stringsubst (subst.c:301)
==10994==    by 0x48801B: prefork (subst.c:77)
==10994==    by 0x42B318: execcmd (exec.c:2619)
==10994==    by 0x428CA0: execpline2 (exec.c:1697)
==10994==    by 0x427FD2: execpline (exec.c:1484)
==10994==    by 0x427756: execlist (exec.c:1267)
==10994==    by 0x42717C: execode (exec.c:1073)
==10994==    by 0x431299: runshfunc (exec.c:5040)
==10994==    by 0x430E76: doshfunc (exec.c:4920)
==10994==    by 0x4302FB: execshfunc (exec.c:4557)
==10994==    by 0x42D8C1: execcmd (exec.c:3373)
==10994== 
==10994== 
==10994== 2 errors in context 2 of 2:
==10994== Conditional jump or move depends on uninitialised value(s)
==10994==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10994==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10994==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10994==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10994==    by 0x42D8E9: execcmd (exec.c:3378)
==10994==    by 0x428CA0: execpline2 (exec.c:1697)
==10994==    by 0x427FD2: execpline (exec.c:1484)
==10994==    by 0x42779A: execlist (exec.c:1275)
==10994==    by 0x42717C: execode (exec.c:1073)
==10994==    by 0x431299: runshfunc (exec.c:5040)
==10994==    by 0x430E76: doshfunc (exec.c:4920)
==10994==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10994== 
==10994== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== Searching for pointers to 69,536 not-freed blocks
--10996--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10996--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10996--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10996--   Scanning root segment: 0x4037000..0x403efff (32768)
--10996--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10996--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10996--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10996--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10996--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10996--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10996--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10996--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10996--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10996--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10996--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10996--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10996--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10996--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10996--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10996--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10996--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10996--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10996--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10996--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10996--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10996--   Scanning root segment: 0x701a000..0x701afff (4096)
--10996--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10996--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10996--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10996--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10996--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10996--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10996--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10996--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10996--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10996--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
client request: code 4d430005,  addr 0xFFEFF30AC,  len 4
client request: code 4d430005,  addr 0xFFEFF2A2C,  len 4
--10999-- Caught __NR_exit; running __libc_freeres()
==10996== Checked 4,839,360 bytes
==10996== 
==10999== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-10999-by-pythonnut-on-???
==10999== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-10999-by-pythonnut-on-???
==10999== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-10999-by-pythonnut-on-???
==10999== 
==10999== TO CONTROL THIS PROCESS USING vgdb (which you probably
==10999== don't want to do, unless you know exactly what you're doing,
==10999== or are doing some strange experiment):
==10999==   /usr/lib/valgrind/../../bin/vgdb --pid=10999 ...command...
==10999== 
==10999== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==10999==   /path/to/gdb ./zsh
==10999== and then give GDB the following command
==10999==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=10999
==10999== --pid is optional if only one valgrind process is running
==10999== 
--10999-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==10996== LEAK SUMMARY:
==10996==    definitely lost: 2,221 bytes in 14 blocks
==10996==    indirectly lost: 6,796 bytes in 9 blocks
==10996==      possibly lost: 0 bytes in 0 blocks
==10996==    still reachable: 3,128,371 bytes in 69,513 blocks
==10996==         suppressed: 0 bytes in 0 blocks
==10996== Rerun with --leak-check=full to see details of leaked memory
==10996== 
==10996== Use --track-origins=yes to see where uninitialised values come from
==10996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10996== 
==10996== 1 errors in context 1 of 2:
==10996== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10996==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10996==    by 0x488CD0: stringsubst (subst.c:301)
==10996==    by 0x48801B: prefork (subst.c:77)
==10996==    by 0x42B318: execcmd (exec.c:2619)
==10996==    by 0x428CA0: execpline2 (exec.c:1697)
==10996==    by 0x427FD2: execpline (exec.c:1484)
==10996==    by 0x427756: execlist (exec.c:1267)
==10996==    by 0x42717C: execode (exec.c:1073)
==10996==    by 0x431299: runshfunc (exec.c:5040)
==10996==    by 0x430E76: doshfunc (exec.c:4920)
==10996==    by 0x4302FB: execshfunc (exec.c:4557)
==10996==    by 0x42D8C1: execcmd (exec.c:3373)
==10996== 
==10996== 
==10996== 2 errors in context 2 of 2:
==10996== Conditional jump or move depends on uninitialised value(s)
==10996==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10996==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10996==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10996==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10996==    by 0x42D8E9: execcmd (exec.c:3378)
==10996==    by 0x428CA0: execpline2 (exec.c:1697)
==10996==    by 0x427FD2: execpline (exec.c:1484)
==10996==    by 0x42779A: execlist (exec.c:1275)
==10996==    by 0x42717C: execode (exec.c:1073)
==10996==    by 0x431299: runshfunc (exec.c:5040)
==10996==    by 0x430E76: doshfunc (exec.c:4920)
==10996==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10996== 
==10996== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10999== 
==10999== HEAP SUMMARY:
==10999==     in use at exit: 3,113,247 bytes in 68,951 blocks
==10999==   total heap usage: 1,738,113 allocs, 1,669,162 frees, 140,063,175 bytes allocated
==10999== 
==11000== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11000-by-pythonnut-on-???
==11000== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11000-by-pythonnut-on-???
==11000== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11000-by-pythonnut-on-???
==11000== 
==11000== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11000== don't want to do, unless you know exactly what you're doing,
==11000== or are doing some strange experiment):
==11000==   /usr/lib/valgrind/../../bin/vgdb --pid=11000 ...command...
==11000== 
==11000== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11000==   /path/to/gdb ./zsh
==11000== and then give GDB the following command
==11000==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11000
==11000== --pid is optional if only one valgrind process is running
==11000== 
--11000-- Caught __NR_exit; running __libc_freeres()
==10999== Searching for pointers to 68,951 not-freed blocks
--10999--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10999--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10999--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10999--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10999--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10999--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10999--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10999--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10999--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10999--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10999--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10999--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10999--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10999--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10999--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10999--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10999--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10999--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10999--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10999--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10999--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10999--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10999--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10999--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10999--   Scanning root segment: 0x701a000..0x701afff (4096)
--10999--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10999--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10999--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10999--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10999--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10999--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10999--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10999--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10999--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10999--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--11000-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11000== 
==11000== HEAP SUMMARY:
==11000==     in use at exit: 3,137,387 bytes in 69,536 blocks
==11000==   total heap usage: 1,599,715 allocs, 1,530,179 frees, 129,186,530 bytes allocated
==11000== 
==11000== Searching for pointers to 69,536 not-freed blocks
--11000--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11000--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11000--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11000--   Scanning root segment: 0x4037000..0x403efff (32768)
--11000--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11000--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11000--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11000--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11000--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11000--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11000--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11000--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11000--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11000--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11000--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11000--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11000--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11000--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11000--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11000--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11000--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11000--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11000--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11000--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11000--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11000--   Scanning root segment: 0x701a000..0x701afff (4096)
--11000--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11000--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11000--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11000--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11000--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11000--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11000--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11000--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11000--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11000--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==10999== Checked 4,787,208 bytes
==10999== 
==10999== LEAK SUMMARY:
==10999==    definitely lost: 3,173 bytes in 18 blocks
==10999==    indirectly lost: 6,756 bytes in 7 blocks
==10999==      possibly lost: 0 bytes in 0 blocks
==10999==    still reachable: 3,103,318 bytes in 68,926 blocks
==10999==         suppressed: 0 bytes in 0 blocks
==10999== Rerun with --leak-check=full to see details of leaked memory
==10999== 
==10999== Use --track-origins=yes to see where uninitialised values come from
==10999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10999== 
==10999== 1 errors in context 1 of 2:
==10999== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10999==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10999==    by 0x488CD0: stringsubst (subst.c:301)
==10999==    by 0x48801B: prefork (subst.c:77)
==10999==    by 0x42B318: execcmd (exec.c:2619)
==10999==    by 0x428CA0: execpline2 (exec.c:1697)
==10999==    by 0x427FD2: execpline (exec.c:1484)
==10999==    by 0x427756: execlist (exec.c:1267)
==10999==    by 0x42717C: execode (exec.c:1073)
==10999==    by 0x431299: runshfunc (exec.c:5040)
==10999==    by 0x430E76: doshfunc (exec.c:4920)
==10999==    by 0x4302FB: execshfunc (exec.c:4557)
==10999==    by 0x42D8C1: execcmd (exec.c:3373)
==10999== 
==10999== 
==10999== 2 errors in context 2 of 2:
==10999== Conditional jump or move depends on uninitialised value(s)
==10999==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10999==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10999==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10999==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10999==    by 0x42D8E9: execcmd (exec.c:3378)
==10999==    by 0x428CA0: execpline2 (exec.c:1697)
==10999==    by 0x427FD2: execpline (exec.c:1484)
==10999==    by 0x42779A: execlist (exec.c:1275)
==10999==    by 0x42717C: execode (exec.c:1073)
==10999==    by 0x431299: runshfunc (exec.c:5040)
==10999==    by 0x430E76: doshfunc (exec.c:4920)
==10999==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10999== 
==10999== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11000== Checked 4,839,360 bytes
==11000== 
--11003-- Caught __NR_exit; running __libc_freeres()
==11003== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11003-by-pythonnut-on-???
==11003== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11003-by-pythonnut-on-???
==11003== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11003-by-pythonnut-on-???
==11003== 
==11003== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11003== don't want to do, unless you know exactly what you're doing,
==11003== or are doing some strange experiment):
==11003==   /usr/lib/valgrind/../../bin/vgdb --pid=11003 ...command...
==11003== 
==11003== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11003==   /path/to/gdb ./zsh
==11003== and then give GDB the following command
==11003==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11003
==11003== --pid is optional if only one valgrind process is running
==11003== 
==11000== LEAK SUMMARY:
==11000==    definitely lost: 2,221 bytes in 14 blocks
==11000==    indirectly lost: 6,796 bytes in 9 blocks
==11000==      possibly lost: 0 bytes in 0 blocks
==11000==    still reachable: 3,128,370 bytes in 69,513 blocks
==11000==         suppressed: 0 bytes in 0 blocks
==11000== Rerun with --leak-check=full to see details of leaked memory
==11000== 
==11000== Use --track-origins=yes to see where uninitialised values come from
==11000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11000== 
==11000== 1 errors in context 1 of 2:
==11000== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11000==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11000==    by 0x488CD0: stringsubst (subst.c:301)
==11000==    by 0x48801B: prefork (subst.c:77)
==11000==    by 0x42B318: execcmd (exec.c:2619)
==11000==    by 0x428CA0: execpline2 (exec.c:1697)
==11000==    by 0x427FD2: execpline (exec.c:1484)
==11000==    by 0x427756: execlist (exec.c:1267)
==11000==    by 0x42717C: execode (exec.c:1073)
==11000==    by 0x431299: runshfunc (exec.c:5040)
==11000==    by 0x430E76: doshfunc (exec.c:4920)
==11000==    by 0x4302FB: execshfunc (exec.c:4557)
==11000==    by 0x42D8C1: execcmd (exec.c:3373)
==11000== 
==11000== 
==11000== 2 errors in context 2 of 2:
==11000== Conditional jump or move depends on uninitialised value(s)
==11000==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11000==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11000==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11000==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11000==    by 0x42D8E9: execcmd (exec.c:3378)
==11000==    by 0x428CA0: execpline2 (exec.c:1697)
==11000==    by 0x427FD2: execpline (exec.c:1484)
==11000==    by 0x42779A: execlist (exec.c:1275)
==11000==    by 0x42717C: execode (exec.c:1073)
==11000==    by 0x431299: runshfunc (exec.c:5040)
==11000==    by 0x430E76: doshfunc (exec.c:4920)
==11000==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11000== 
==11000== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
--11003-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11004== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11004-by-pythonnut-on-???
==11004== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11004-by-pythonnut-on-???
==11004== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11004-by-pythonnut-on-???
==11004== 
==11004== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11004== don't want to do, unless you know exactly what you're doing,
==11004== or are doing some strange experiment):
==11004==   /usr/lib/valgrind/../../bin/vgdb --pid=11004 ...command...
==11004== 
==11004== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11004==   /path/to/gdb ./zsh
==11004== and then give GDB the following command
==11004==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11004
==11004== --pid is optional if only one valgrind process is running
==11004== 
--11004-- Caught __NR_exit; running __libc_freeres()
==11003== 
==11003== HEAP SUMMARY:
==11003==     in use at exit: 3,115,003 bytes in 69,006 blocks
==11003==   total heap usage: 1,738,209 allocs, 1,669,203 frees, 140,071,029 bytes allocated
==11003== 
--11004-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11003== Searching for pointers to 69,006 not-freed blocks
--11003--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11003--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11003--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11003--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11003--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11003--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11003--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11003--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11003--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11003--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11003--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11003--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11003--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11003--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11003--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11003--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11003--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11003--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11003--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11003--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11003--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11003--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11003--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11003--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11003--   Scanning root segment: 0x701a000..0x701afff (4096)
--11003--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11003--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11003--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11003--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11003--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11003--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11003--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11003--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11003--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11003--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11004== 
==11004== HEAP SUMMARY:
==11004==     in use at exit: 3,137,386 bytes in 69,536 blocks
==11004==   total heap usage: 1,599,720 allocs, 1,530,184 frees, 129,188,643 bytes allocated
==11004== 
==11004== Searching for pointers to 69,536 not-freed blocks
--11004--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11004--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11004--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11004--   Scanning root segment: 0x4037000..0x403efff (32768)
--11004--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11004--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11004--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11004--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11004--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11004--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11004--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11004--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11004--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11004--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11004--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11004--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11004--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11004--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11004--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11004--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11004--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11004--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11004--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11004--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11004--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11004--   Scanning root segment: 0x701a000..0x701afff (4096)
--11004--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11004--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11004--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11004--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11004--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11004--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11004--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11004--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11004--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11004--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11003== Checked 4,789,472 bytes
==11003== 
==11003== LEAK SUMMARY:
==11003==    definitely lost: 3,197 bytes in 19 blocks
==11003==    indirectly lost: 6,812 bytes in 10 blocks
==11003==      possibly lost: 0 bytes in 0 blocks
==11003==    still reachable: 3,104,994 bytes in 68,977 blocks
==11003==         suppressed: 0 bytes in 0 blocks
==11003== Rerun with --leak-check=full to see details of leaked memory
==11003== 
==11003== Use --track-origins=yes to see where uninitialised values come from
==11003== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11003== 
==11003== 1 errors in context 1 of 2:
==11003== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11003==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11003==    by 0x488CD0: stringsubst (subst.c:301)
==11003==    by 0x48801B: prefork (subst.c:77)
==11003==    by 0x42B318: execcmd (exec.c:2619)
==11003==    by 0x428CA0: execpline2 (exec.c:1697)
==11003==    by 0x427FD2: execpline (exec.c:1484)
==11003==    by 0x427756: execlist (exec.c:1267)
==11003==    by 0x42717C: execode (exec.c:1073)
==11003==    by 0x431299: runshfunc (exec.c:5040)
==11003==    by 0x430E76: doshfunc (exec.c:4920)
==11003==    by 0x4302FB: execshfunc (exec.c:4557)
==11003==    by 0x42D8C1: execcmd (exec.c:3373)
==11003== 
==11003== 
==11003== 2 errors in context 2 of 2:
==11003== Conditional jump or move depends on uninitialised value(s)
==11003==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11003==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11003==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11003==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11003==    by 0x42D8E9: execcmd (exec.c:3378)
==11003==    by 0x428CA0: execpline2 (exec.c:1697)
==11003==    by 0x427FD2: execpline (exec.c:1484)
==11003==    by 0x42779A: execlist (exec.c:1275)
==11003==    by 0x42717C: execode (exec.c:1073)
==11003==    by 0x431299: runshfunc (exec.c:5040)
==11003==    by 0x430E76: doshfunc (exec.c:4920)
==11003==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11003== 
==11003== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11004== Checked 4,839,360 bytes
==11004== 
==11004== LEAK SUMMARY:
==11004==    definitely lost: 2,221 bytes in 14 blocks
==11004==    indirectly lost: 6,796 bytes in 9 blocks
==11004==      possibly lost: 0 bytes in 0 blocks
==11004==    still reachable: 3,128,369 bytes in 69,513 blocks
==11004==         suppressed: 0 bytes in 0 blocks
==11004== Rerun with --leak-check=full to see details of leaked memory
==11004== 
==11004== Use --track-origins=yes to see where uninitialised values come from
==11004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11004== 
==11004== 1 errors in context 1 of 2:
==11004== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11004==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11004==    by 0x488CD0: stringsubst (subst.c:301)
==11004==    by 0x48801B: prefork (subst.c:77)
==11004==    by 0x42B318: execcmd (exec.c:2619)
==11004==    by 0x428CA0: execpline2 (exec.c:1697)
==11004==    by 0x427FD2: execpline (exec.c:1484)
==11004==    by 0x427756: execlist (exec.c:1267)
==11004==    by 0x42717C: execode (exec.c:1073)
==11004==    by 0x431299: runshfunc (exec.c:5040)
==11004==    by 0x430E76: doshfunc (exec.c:4920)
==11004==    by 0x4302FB: execshfunc (exec.c:4557)
==11004==    by 0x42D8C1: execcmd (exec.c:3373)
==11004== 
==11004== 
==11004== 2 errors in context 2 of 2:
==11004== Conditional jump or move depends on uninitialised value(s)
==11004==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11004==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11004==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11004==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11004==    by 0x42D8E9: execcmd (exec.c:3378)
==11004==    by 0x428CA0: execpline2 (exec.c:1697)
==11004==    by 0x427FD2: execpline (exec.c:1484)
==11004==    by 0x42779A: execlist (exec.c:1275)
==11004==    by 0x42717C: execode (exec.c:1073)
==11004==    by 0x431299: runshfunc (exec.c:5040)
==11004==    by 0x430E76: doshfunc (exec.c:4920)
==11004==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11004== 
==11004== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF4ACC,  len 4
==11007== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11007-by-pythonnut-on-???
==11007== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11007-by-pythonnut-on-???
==11007== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11007-by-pythonnut-on-???
==11007== 
==11007== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11007== don't want to do, unless you know exactly what you're doing,
==11007== or are doing some strange experiment):
==11007==   /usr/lib/valgrind/../../bin/vgdb --pid=11007 ...command...
==11007== 
==11007== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11007==   /path/to/gdb ./zsh
==11007== and then give GDB the following command
==11007==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11007
==11007== --pid is optional if only one valgrind process is running
==11007== 
--11007-- Caught __NR_exit; running __libc_freeres()
--11005-- Caught __NR_exit; running __libc_freeres()
==11005== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11005-by-pythonnut-on-???
==11005== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11005-by-pythonnut-on-???
==11005== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11005-by-pythonnut-on-???
==11005== 
==11005== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11005== don't want to do, unless you know exactly what you're doing,
==11005== or are doing some strange experiment):
==11005==   /usr/lib/valgrind/../../bin/vgdb --pid=11005 ...command...
==11005== 
==11005== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11005==   /path/to/gdb ./zsh
==11005== and then give GDB the following command
==11005==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11005
==11005== --pid is optional if only one valgrind process is running
==11005== 
--11007-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--11005-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11007== 
==11007== HEAP SUMMARY:
==11007==     in use at exit: 3,137,385 bytes in 69,536 blocks
==11007==   total heap usage: 1,599,725 allocs, 1,530,189 frees, 129,190,756 bytes allocated
==11007== 
==11005== 
==11005== HEAP SUMMARY:
==11005==     in use at exit: 3,114,963 bytes in 69,005 blocks
==11005==   total heap usage: 1,738,217 allocs, 1,669,212 frees, 140,073,141 bytes allocated
==11005== 
==11007== Searching for pointers to 69,536 not-freed blocks
--11007--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11007--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11007--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11007--   Scanning root segment: 0x4037000..0x403efff (32768)
--11007--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11007--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11007--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11007--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11007--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11007--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11007--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11007--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11007--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11007--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11007--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11007--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11007--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11007--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11007--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11007--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11007--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11007--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11007--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11007--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11007--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11007--   Scanning root segment: 0x701a000..0x701afff (4096)
--11007--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11007--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11007--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11007--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11007--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11007--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11007--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11007--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11007--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11007--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11005== Searching for pointers to 69,005 not-freed blocks
--11005--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11005--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11005--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11005--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11005--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11005--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11005--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11005--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11005--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11005--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11005--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11005--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11005--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11005--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11005--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11005--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11005--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11005--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11005--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11005--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11005--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11005--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11005--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11005--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11005--   Scanning root segment: 0x701a000..0x701afff (4096)
--11005--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11005--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11005--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11005--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11005--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11005--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11005--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11005--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11005--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11005--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11005== Checked 4,789,120 bytes
==11005== 
==11007== Checked 4,839,360 bytes
==11007== 
==11005== LEAK SUMMARY:
==11005==    definitely lost: 3,189 bytes in 19 blocks
==11005==    indirectly lost: 6,756 bytes in 7 blocks
==11005==      possibly lost: 0 bytes in 0 blocks
==11005==    still reachable: 3,105,018 bytes in 68,979 blocks
==11005==         suppressed: 0 bytes in 0 blocks
==11005== Rerun with --leak-check=full to see details of leaked memory
==11005== 
==11005== Use --track-origins=yes to see where uninitialised values come from
==11005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11005== 
==11005== 1 errors in context 1 of 2:
==11005== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11005==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11005==    by 0x488CD0: stringsubst (subst.c:301)
==11005==    by 0x48801B: prefork (subst.c:77)
==11005==    by 0x42B318: execcmd (exec.c:2619)
==11005==    by 0x428CA0: execpline2 (exec.c:1697)
==11005==    by 0x427FD2: execpline (exec.c:1484)
==11005==    by 0x427756: execlist (exec.c:1267)
==11005==    by 0x42717C: execode (exec.c:1073)
==11005==    by 0x431299: runshfunc (exec.c:5040)
==11005==    by 0x430E76: doshfunc (exec.c:4920)
==11005==    by 0x4302FB: execshfunc (exec.c:4557)
==11005==    by 0x42D8C1: execcmd (exec.c:3373)
==11005== 
==11005== 
==11005== 2 errors in context 2 of 2:
==11005== Conditional jump or move depends on uninitialised value(s)
==11005==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11005==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11005==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11005==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11005==    by 0x42D8E9: execcmd (exec.c:3378)
==11005==    by 0x428CA0: execpline2 (exec.c:1697)
==11005==    by 0x427FD2: execpline (exec.c:1484)
==11005==    by 0x42779A: execlist (exec.c:1275)
==11005==    by 0x42717C: execode (exec.c:1073)
==11005==    by 0x431299: runshfunc (exec.c:5040)
==11005==    by 0x430E76: doshfunc (exec.c:4920)
==11005==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11005== 
==11005== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11007== LEAK SUMMARY:
==11007==    definitely lost: 2,221 bytes in 14 blocks
==11007==    indirectly lost: 6,796 bytes in 9 blocks
==11007==      possibly lost: 0 bytes in 0 blocks
==11007==    still reachable: 3,128,368 bytes in 69,513 blocks
==11007==         suppressed: 0 bytes in 0 blocks
==11007== Rerun with --leak-check=full to see details of leaked memory
==11007== 
==11007== Use --track-origins=yes to see where uninitialised values come from
==11007== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11007== 
==11007== 1 errors in context 1 of 2:
==11007== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11007==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11007==    by 0x488CD0: stringsubst (subst.c:301)
==11007==    by 0x48801B: prefork (subst.c:77)
==11007==    by 0x42B318: execcmd (exec.c:2619)
==11007==    by 0x428CA0: execpline2 (exec.c:1697)
==11007==    by 0x427FD2: execpline (exec.c:1484)
==11007==    by 0x427756: execlist (exec.c:1267)
==11007==    by 0x42717C: execode (exec.c:1073)
==11007==    by 0x431299: runshfunc (exec.c:5040)
==11007==    by 0x430E76: doshfunc (exec.c:4920)
==11007==    by 0x4302FB: execshfunc (exec.c:4557)
==11007==    by 0x42D8C1: execcmd (exec.c:3373)
==11007== 
==11007== 
==11007== 2 errors in context 2 of 2:
==11007== Conditional jump or move depends on uninitialised value(s)
==11007==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11007==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11007==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11007==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11007==    by 0x42D8E9: execcmd (exec.c:3378)
==11007==    by 0x428CA0: execpline2 (exec.c:1697)
==11007==    by 0x427FD2: execpline (exec.c:1484)
==11007==    by 0x42779A: execlist (exec.c:1275)
==11007==    by 0x42717C: execode (exec.c:1073)
==11007==    by 0x431299: runshfunc (exec.c:5040)
==11007==    by 0x430E76: doshfunc (exec.c:4920)
==11007==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11007== 
==11007== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11009== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11009-by-pythonnut-on-???
==11009== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11009-by-pythonnut-on-???
==11009== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11009-by-pythonnut-on-???
==11009== 
==11009== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11009== don't want to do, unless you know exactly what you're doing,
==11009== or are doing some strange experiment):
==11009==   /usr/lib/valgrind/../../bin/vgdb --pid=11009 ...command...
==11009== 
==11009== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11009==   /path/to/gdb ./zsh
==11009== and then give GDB the following command
==11009==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11009
==11009== --pid is optional if only one valgrind process is running
==11009== 
--11009-- Caught __NR_exit; running __libc_freeres()
==11008== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11008-by-pythonnut-on-???
==11008== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11008-by-pythonnut-on-???
==11008== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11008-by-pythonnut-on-???
==11008== 
==11008== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11008== don't want to do, unless you know exactly what you're doing,
==11008== or are doing some strange experiment):
==11008==   /usr/lib/valgrind/../../bin/vgdb --pid=11008 ...command...
==11008== 
==11008== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11008==   /path/to/gdb ./zsh
==11008== and then give GDB the following command
==11008==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11008
==11008== --pid is optional if only one valgrind process is running
==11008== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
--11009-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11009== 
==11009== HEAP SUMMARY:
==11009==     in use at exit: 3,137,384 bytes in 69,536 blocks
==11009==   total heap usage: 1,599,730 allocs, 1,530,194 frees, 129,192,869 bytes allocated
==11009== 
==11009== Searching for pointers to 69,536 not-freed blocks
--11009--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11009--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11009--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11009--   Scanning root segment: 0x4037000..0x403efff (32768)
--11009--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11009--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11009--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11009--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11009--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11009--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11009--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11009--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11009--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11009--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11009--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11009--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11009--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11009--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11009--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11009--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11009--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11009--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11009--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11009--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11009--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11009--   Scanning root segment: 0x701a000..0x701afff (4096)
--11009--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11009--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11009--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11009--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11009--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11009--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11009--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11009--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11009--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11009--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11009== Checked 4,839,360 bytes
==11009== 
==11009== LEAK SUMMARY:
==11009==    definitely lost: 2,221 bytes in 14 blocks
==11009==    indirectly lost: 6,796 bytes in 9 blocks
==11009==      possibly lost: 0 bytes in 0 blocks
==11009==    still reachable: 3,128,367 bytes in 69,513 blocks
==11009==         suppressed: 0 bytes in 0 blocks
==11009== Rerun with --leak-check=full to see details of leaked memory
==11009== 
==11009== Use --track-origins=yes to see where uninitialised values come from
==11009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11009== 
==11009== 1 errors in context 1 of 2:
==11009== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11009==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11009==    by 0x488CD0: stringsubst (subst.c:301)
==11009==    by 0x48801B: prefork (subst.c:77)
==11009==    by 0x42B318: execcmd (exec.c:2619)
==11009==    by 0x428CA0: execpline2 (exec.c:1697)
==11009==    by 0x427FD2: execpline (exec.c:1484)
==11009==    by 0x427756: execlist (exec.c:1267)
==11009==    by 0x42717C: execode (exec.c:1073)
==11009==    by 0x431299: runshfunc (exec.c:5040)
==11009==    by 0x430E76: doshfunc (exec.c:4920)
==11009==    by 0x4302FB: execshfunc (exec.c:4557)
==11009==    by 0x42D8C1: execcmd (exec.c:3373)
==11009== 
==11009== 
==11009== 2 errors in context 2 of 2:
==11009== Conditional jump or move depends on uninitialised value(s)
==11009==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11009==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11009==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11009==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11009==    by 0x42D8E9: execcmd (exec.c:3378)
==11009==    by 0x428CA0: execpline2 (exec.c:1697)
==11009==    by 0x427FD2: execpline (exec.c:1484)
==11009==    by 0x42779A: execlist (exec.c:1275)
==11009==    by 0x42717C: execode (exec.c:1073)
==11009==    by 0x431299: runshfunc (exec.c:5040)
==11009==    by 0x430E76: doshfunc (exec.c:4920)
==11009==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11009== 
==11009== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11010== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11010-by-pythonnut-on-???
==11010== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11010-by-pythonnut-on-???
==11010== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11010-by-pythonnut-on-???
==11010== 
==11010== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11010== don't want to do, unless you know exactly what you're doing,
==11010== or are doing some strange experiment):
==11010==   /usr/lib/valgrind/../../bin/vgdb --pid=11010 ...command...
==11010== 
==11010== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11010==   /path/to/gdb ./zsh
==11010== and then give GDB the following command
==11010==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11010
==11010== --pid is optional if only one valgrind process is running
==11010== 
--11010-- Caught __NR_exit; running __libc_freeres()
--11010-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11010== 
==11010== HEAP SUMMARY:
==11010==     in use at exit: 3,137,383 bytes in 69,536 blocks
==11010==   total heap usage: 1,599,738 allocs, 1,530,202 frees, 129,196,522 bytes allocated
==11010== 
==11010== Searching for pointers to 69,536 not-freed blocks
--11010--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11010--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11010--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11010--   Scanning root segment: 0x4037000..0x403efff (32768)
--11010--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11010--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11010--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11010--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11010--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11010--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11010--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11010--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11010--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11010--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11010--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11010--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11010--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11010--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11010--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11010--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11010--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11010--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11010--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11010--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11010--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11010--   Scanning root segment: 0x701a000..0x701afff (4096)
--11010--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11010--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11010--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11010--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11010--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11010--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11010--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11010--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11010--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11010--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11010== Checked 4,839,360 bytes
==11010== 
==11010== LEAK SUMMARY:
==11010==    definitely lost: 2,221 bytes in 14 blocks
==11010==    indirectly lost: 6,796 bytes in 9 blocks
==11010==      possibly lost: 0 bytes in 0 blocks
==11010==    still reachable: 3,128,366 bytes in 69,513 blocks
==11010==         suppressed: 0 bytes in 0 blocks
==11010== Rerun with --leak-check=full to see details of leaked memory
==11010== 
==11010== Use --track-origins=yes to see where uninitialised values come from
==11010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11010== 
==11010== 1 errors in context 1 of 2:
==11010== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11010==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11010==    by 0x488CD0: stringsubst (subst.c:301)
==11010==    by 0x48801B: prefork (subst.c:77)
==11010==    by 0x42B318: execcmd (exec.c:2619)
==11010==    by 0x428CA0: execpline2 (exec.c:1697)
==11010==    by 0x427FD2: execpline (exec.c:1484)
==11010==    by 0x427756: execlist (exec.c:1267)
==11010==    by 0x42717C: execode (exec.c:1073)
==11010==    by 0x431299: runshfunc (exec.c:5040)
==11010==    by 0x430E76: doshfunc (exec.c:4920)
==11010==    by 0x4302FB: execshfunc (exec.c:4557)
==11010==    by 0x42D8C1: execcmd (exec.c:3373)
==11010== 
==11010== 
==11010== 2 errors in context 2 of 2:
==11010== Conditional jump or move depends on uninitialised value(s)
==11010==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11010==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11010==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11010==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11010==    by 0x42D8E9: execcmd (exec.c:3378)
==11010==    by 0x428CA0: execpline2 (exec.c:1697)
==11010==    by 0x427FD2: execpline (exec.c:1484)
==11010==    by 0x42779A: execlist (exec.c:1275)
==11010==    by 0x42717C: execode (exec.c:1073)
==11010==    by 0x431299: runshfunc (exec.c:5040)
==11010==    by 0x430E76: doshfunc (exec.c:4920)
==11010==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11010== 
==11010== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11011== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11011-by-pythonnut-on-???
==11011== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11011-by-pythonnut-on-???
==11011== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11011-by-pythonnut-on-???
==11011== 
==11011== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11011== don't want to do, unless you know exactly what you're doing,
==11011== or are doing some strange experiment):
==11011==   /usr/lib/valgrind/../../bin/vgdb --pid=11011 ...command...
==11011== 
==11011== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11011==   /path/to/gdb ./zsh
==11011== and then give GDB the following command
==11011==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11011
==11011== --pid is optional if only one valgrind process is running
==11011== 
--11011-- Caught __NR_exit; running __libc_freeres()
--11011-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11011== 
==11011== HEAP SUMMARY:
==11011==     in use at exit: 3,137,386 bytes in 69,536 blocks
==11011==   total heap usage: 1,599,740 allocs, 1,530,204 frees, 129,197,099 bytes allocated
==11011== 
==11011== Searching for pointers to 69,536 not-freed blocks
--11011--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11011--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11011--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11011--   Scanning root segment: 0x4037000..0x403efff (32768)
--11011--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11011--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11011--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11011--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11011--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11011--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11011--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11011--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11011--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11011--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11011--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11011--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11011--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11011--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11011--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11011--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11011--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11011--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11011--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11011--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11011--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11011--   Scanning root segment: 0x701a000..0x701afff (4096)
--11011--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11011--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11011--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11011--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11011--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11011--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11011--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11011--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11011--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11011--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11011== Checked 4,839,360 bytes
==11011== 
==11011== LEAK SUMMARY:
==11011==    definitely lost: 2,221 bytes in 14 blocks
==11011==    indirectly lost: 6,796 bytes in 9 blocks
==11011==      possibly lost: 0 bytes in 0 blocks
==11011==    still reachable: 3,128,369 bytes in 69,513 blocks
==11011==         suppressed: 0 bytes in 0 blocks
==11011== Rerun with --leak-check=full to see details of leaked memory
==11011== 
==11011== Use --track-origins=yes to see where uninitialised values come from
==11011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11011== 
==11011== 1 errors in context 1 of 2:
==11011== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11011==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11011==    by 0x488CD0: stringsubst (subst.c:301)
==11011==    by 0x48801B: prefork (subst.c:77)
==11011==    by 0x42B318: execcmd (exec.c:2619)
==11011==    by 0x428CA0: execpline2 (exec.c:1697)
==11011==    by 0x427FD2: execpline (exec.c:1484)
==11011==    by 0x427756: execlist (exec.c:1267)
==11011==    by 0x42717C: execode (exec.c:1073)
==11011==    by 0x431299: runshfunc (exec.c:5040)
==11011==    by 0x430E76: doshfunc (exec.c:4920)
==11011==    by 0x4302FB: execshfunc (exec.c:4557)
==11011==    by 0x42D8C1: execcmd (exec.c:3373)
==11011== 
==11011== 
==11011== 2 errors in context 2 of 2:
==11011== Conditional jump or move depends on uninitialised value(s)
==11011==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11011==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11011==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11011==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11011==    by 0x42D8E9: execcmd (exec.c:3378)
==11011==    by 0x428CA0: execpline2 (exec.c:1697)
==11011==    by 0x427FD2: execpline (exec.c:1484)
==11011==    by 0x42779A: execlist (exec.c:1275)
==11011==    by 0x42717C: execode (exec.c:1073)
==11011==    by 0x431299: runshfunc (exec.c:5040)
==11011==    by 0x430E76: doshfunc (exec.c:4920)
==11011==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11011== 
==11011== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11012== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11012-by-pythonnut-on-???
==11012== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11012-by-pythonnut-on-???
==11012== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11012-by-pythonnut-on-???
==11012== 
==11012== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11012== don't want to do, unless you know exactly what you're doing,
==11012== or are doing some strange experiment):
==11012==   /usr/lib/valgrind/../../bin/vgdb --pid=11012 ...command...
==11012== 
==11012== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11012==   /path/to/gdb ./zsh
==11012== and then give GDB the following command
==11012==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11012
==11012== --pid is optional if only one valgrind process is running
==11012== 
--11013-- Caught __NR_exit; running __libc_freeres()
==11013== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11013-by-pythonnut-on-???
==11013== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11013-by-pythonnut-on-???
==11013== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11013-by-pythonnut-on-???
==11013== 
==11013== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11013== don't want to do, unless you know exactly what you're doing,
==11013== or are doing some strange experiment):
==11013==   /usr/lib/valgrind/../../bin/vgdb --pid=11013 ...command...
==11013== 
==11013== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11013==   /path/to/gdb ./zsh
==11013== and then give GDB the following command
==11013==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11013
==11013== --pid is optional if only one valgrind process is running
==11013== 
client request: code 4d430005,  addr 0xFFEFE7F4C,  len 4
--11013-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11013== 
==11013== HEAP SUMMARY:
==11013==     in use at exit: 3,137,636 bytes in 69,541 blocks
==11013==   total heap usage: 1,599,745 allocs, 1,530,204 frees, 129,200,689 bytes allocated
==11013== 
==11013== Searching for pointers to 69,541 not-freed blocks
--11013--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11013--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11013--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11013--   Scanning root segment: 0x4037000..0x403efff (32768)
--11013--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11013--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11013--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11013--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11013--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11013--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11013--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11013--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11013--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11013--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11013--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11013--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11013--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11013--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11013--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11013--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11013--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11013--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11013--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11013--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11013--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11013--   Scanning root segment: 0x701a000..0x701afff (4096)
--11013--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11013--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11013--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11013--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11013--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11013--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11013--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11013--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11013--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11013--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11017== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11017-by-pythonnut-on-???
==11017== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11017-by-pythonnut-on-???
==11017== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11017-by-pythonnut-on-???
==11017== 
==11017== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11017== don't want to do, unless you know exactly what you're doing,
==11017== or are doing some strange experiment):
==11017==   /usr/lib/valgrind/../../bin/vgdb --pid=11017 ...command...
==11017== 
==11017== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11017==   /path/to/gdb ./zsh
==11017== and then give GDB the following command
==11017==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11017
==11017== --pid is optional if only one valgrind process is running
==11017== 
client request: code 4d430005,  addr 0xFFEFF4F9C,  len 4
==11012== 
==11012== Process terminating with default action of signal 15 (SIGTERM)
==10928== 
==10928== Process terminating with default action of signal 15 (SIGTERM)
==10074== 
==10074== Process terminating with default action of signal 15 (SIGTERM)
==10074==    at 0x59EED90: sigprocmask (in /usr/lib/libc-2.20.so)
==10074==    by 0x484CF4: signal_block (signals.c:212)
==10074==    by 0x42841B: execpline (exec.c:1561)
==10074==    by 0x427756: execlist (exec.c:1267)
==10074==    by 0x4564F1: execwhile (loop.c:420)
==10074==    by 0x42D731: execcmd (exec.c:3336)
==10074==    by 0x428CA0: execpline2 (exec.c:1697)
==10074==    by 0x428F63: execpline2 (exec.c:1758)
==10074==    by 0x427FD2: execpline (exec.c:1484)
==10074==    by 0x427756: execlist (exec.c:1267)
==10074==    by 0x45689D: execif (loop.c:525)
==10074==    by 0x42D731: execcmd (exec.c:3336)
--10074-- Caught __NR_exit; running __libc_freeres()
==10928==    at 0x5A9677E: __read_nocancel (in /usr/lib/libc-2.20.so)
==10928==    by 0x5A308CF: _IO_file_underflow@@GLIBC_2.2.5 (in /usr/lib/libc-2.20.so)
==10928==    by 0x5A317CD: _IO_default_uflow (in /usr/lib/libc-2.20.so)
==10928==    by 0x5A2CF17: getc (in /usr/lib/libc-2.20.so)
==10928==    by 0x42EC76: readoutput (exec.c:3894)
==10928==    by 0x42EA40: getoutput (exec.c:3859)
==10928==    by 0x488C77: stringsubst (subst.c:293)
==10928==    by 0x48801B: prefork (subst.c:77)
==10928==    by 0x42A2EA: addvars (exec.c:2239)
==10928==    by 0x4272AB: execsimple (exec.c:1116)
==10928==    by 0x42761D: execlist (exec.c:1238)
==10928==    by 0x42717C: execode (exec.c:1073)
--10928-- Caught __NR_exit; running __libc_freeres()
==10930== 
==10930== Process terminating with default action of signal 15 (SIGTERM)
==10930==    at 0x5A9677E: __read_nocancel (in /usr/lib/libc-2.20.so)
==10930==    by 0x5A308CF: _IO_file_underflow@@GLIBC_2.2.5 (in /usr/lib/libc-2.20.so)
==10930==    by 0x5A317CD: _IO_default_uflow (in /usr/lib/libc-2.20.so)
==10930==    by 0x5A2CF17: getc (in /usr/lib/libc-2.20.so)
==10930==    by 0x42EC76: readoutput (exec.c:3894)
==10930==    by 0x42EA40: getoutput (exec.c:3859)
==11012==    at 0x59EEE46: sigsuspend (in /usr/lib/libc-2.20.so)
==10930==    by 0x488C77: stringsubst (subst.c:293)
==10930==    by 0x48801B: prefork (subst.c:77)
==10930==    by 0x42A2EA: addvars (exec.c:2239)
==11012==    by 0x484F59: signal_suspend (signals.c:375)
==10930==    by 0x4272AB: execsimple (exec.c:1116)
==11012==    by 0x44D409: zwaitjob (jobs.c:1454)
==10930==    by 0x42761D: execlist (exec.c:1238)
==11012==    by 0x44D68B: waitjobs (jobs.c:1499)
==10930==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x4283AC: execpline (exec.c:1560)
==11012==    by 0x427756: execlist (exec.c:1267)
==11012==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x42EB38: getoutput (exec.c:3871)
==11012==    by 0x488C77: stringsubst (subst.c:293)
==11012==    by 0x48801B: prefork (subst.c:77)
--10930-- Caught __NR_exit; running __libc_freeres()
==11012==    by 0x42A2EA: addvars (exec.c:2239)
==11012==    by 0x4272AB: execsimple (exec.c:1116)
--11012-- Caught __NR_exit; running __libc_freeres()
==11018== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11018-by-pythonnut-on-???
==11018== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11018-by-pythonnut-on-???
==11018== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11018-by-pythonnut-on-???
==11018== 
==11018== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11018== don't want to do, unless you know exactly what you're doing,
==11018== or are doing some strange experiment):
==11018==   /usr/lib/valgrind/../../bin/vgdb --pid=11018 ...command...
==11018== 
==11018== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11018==   /path/to/gdb ./zsh
==11018== and then give GDB the following command
==11018==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11018
==11018== --pid is optional if only one valgrind process is running
==11018== 
--11018-- Caught __NR_exit; running __libc_freeres()
--11012-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10074-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10928-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
--10930-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11012== 
==10928== 
==10074== 
==11013== Checked 4,840,240 bytes
==11013== 
==10928== HEAP SUMMARY:
==10928==     in use at exit: 3,132,504 bytes in 69,342 blocks
==10928==   total heap usage: 1,599,432 allocs, 1,530,090 frees, 129,149,408 bytes allocated
==10928== 
==11012== HEAP SUMMARY:
==11012==     in use at exit: 3,137,980 bytes in 69,541 blocks
==11012==   total heap usage: 1,599,748 allocs, 1,530,207 frees, 129,201,265 bytes allocated
==11012== 
==10074== HEAP SUMMARY:
==10074==     in use at exit: 3,129,214 bytes in 69,252 blocks
==10074==   total heap usage: 1,605,341 allocs, 1,536,089 frees, 129,494,873 bytes allocated
==10074== 
==10930== 
==10930== HEAP SUMMARY:
==10930==     in use at exit: 3,136,604 bytes in 69,479 blocks
==10930==   total heap usage: 1,599,682 allocs, 1,530,203 frees, 129,199,561 bytes allocated
==10930== 
--11018-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11018== 
==11013== LEAK SUMMARY:
==11013==    definitely lost: 2,221 bytes in 14 blocks
==11013==    indirectly lost: 6,796 bytes in 9 blocks
==11013==      possibly lost: 0 bytes in 0 blocks
==11013==    still reachable: 3,128,619 bytes in 69,518 blocks
==11013==         suppressed: 0 bytes in 0 blocks
==11013== Rerun with --leak-check=full to see details of leaked memory
==11013== 
==11013== Use --track-origins=yes to see where uninitialised values come from
==11013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11013== 
==11013== 1 errors in context 1 of 2:
==11013== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11013==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11013==    by 0x488CD0: stringsubst (subst.c:301)
==11013==    by 0x48801B: prefork (subst.c:77)
==11013==    by 0x42B318: execcmd (exec.c:2619)
==11013==    by 0x428CA0: execpline2 (exec.c:1697)
==11013==    by 0x427FD2: execpline (exec.c:1484)
==11013==    by 0x427756: execlist (exec.c:1267)
==11013==    by 0x42717C: execode (exec.c:1073)
==11013==    by 0x431299: runshfunc (exec.c:5040)
==11013==    by 0x430E76: doshfunc (exec.c:4920)
==11013==    by 0x4302FB: execshfunc (exec.c:4557)
==11013==    by 0x42D8C1: execcmd (exec.c:3373)
==11013== 
==11013== 
==11013== 2 errors in context 2 of 2:
==11013== Conditional jump or move depends on uninitialised value(s)
==11013==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11013==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11013==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11013==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11013==    by 0x42D8E9: execcmd (exec.c:3378)
==11013==    by 0x428CA0: execpline2 (exec.c:1697)
==11013==    by 0x427FD2: execpline (exec.c:1484)
==11013==    by 0x42779A: execlist (exec.c:1275)
==11013==    by 0x42717C: execode (exec.c:1073)
==11013==    by 0x431299: runshfunc (exec.c:5040)
==11013==    by 0x430E76: doshfunc (exec.c:4920)
==11013==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11013== 
==11013== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== HEAP SUMMARY:
==11018==     in use at exit: 3,115,586 bytes in 69,011 blocks
==11018==   total heap usage: 1,776,833 allocs, 1,707,822 frees, 141,630,595 bytes allocated
==11018== 
==11012== Searching for pointers to 69,541 not-freed blocks
--11012--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11012--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11012--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11012--   Scanning root segment: 0x4037000..0x403efff (32768)
--11012--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11012--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11012--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11012--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11012--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11012--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11012--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11012--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11012--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11012--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11012--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11012--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11012--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11012--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11012--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11012--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11012--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
==10928== Searching for pointers to 69,342 not-freed blocks
--10928--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10928--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11012--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11012--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11012--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11012--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10928--   Scanning root segment: 0x4022000..0x4027fff (24576)
--11012--   Scanning root segment: 0x701a000..0x701afff (4096)
--11012--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11012--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10928--   Scanning root segment: 0x4037000..0x403afff (16384)
--11012--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11012--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10928--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11012--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11012--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10928--   Scanning root segment: 0x4222000..0x4222fff (4096)
==10930== Searching for pointers to 69,479 not-freed blocks
--10930--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10928--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11012--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10928--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11012--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10928--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10928--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11012--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10928--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11012--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10928--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10928--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10930--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10928--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10928--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10928--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10928--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10928--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10928--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10928--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10930--   Scanning root segment: 0x4022000..0x4027fff (24576)
--10928--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10930--   Scanning root segment: 0x4037000..0x403efff (32768)
--10930--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10928--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10930--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10930--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10928--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10930--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10930--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10928--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10930--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10930--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10928--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10930--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10930--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10928--   Scanning root segment: 0x701a000..0x701afff (4096)
--10928--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10930--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10930--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10928--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10930--   Scanning root segment: 0x59ba000..0x59bafff (4096)
==10074== Searching for pointers to 69,252 not-freed blocks
--10928--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10074--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--10930--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10928--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10930--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10928--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10930--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10930--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10928--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--10928--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10928--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10928--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10928--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10074--   Scanning root segment: 0x4022000..0x4026fff (20480)
--10930--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10074--   Scanning root segment: 0x4037000..0x403afff (16384)
--10074--   Scanning root segment: 0x4049000..0x404cfff (16384)
--10930--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10930--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10074--   Scanning root segment: 0x4222000..0x4222fff (4096)
--10074--   Scanning root segment: 0x4223000..0x4223fff (4096)
--10074--   Scanning root segment: 0x4224000..0x4224fff (4096)
--10930--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10074--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--10074--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--10930--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10074--   Scanning root segment: 0x5041000..0x5041fff (4096)
--10074--   Scanning root segment: 0x5245000..0x5245fff (4096)
--10074--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--10930--   Scanning root segment: 0x701a000..0x701afff (4096)
--10074--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--10930--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10074--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--10930--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10074--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--10074--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--10930--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10074--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--10930--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10930--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10074--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--10930--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--10930--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10930--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10074--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--10930--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10930--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
--10074--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--10074--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--10074--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--10074--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--10074--   Scanning root segment: 0x701a000..0x701afff (4096)
--10074--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--10074--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--10074--   Scanning root segment: 0xae51000..0xae52fff (8192)
--10074--   Scanning root segment: 0xb054000..0xb054fff (4096)
--10074--   Scanning root segment: 0xb268000..0xb268fff (4096)
--10074--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--10074--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--10074--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--10074--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--10074--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11018== Searching for pointers to 69,011 not-freed blocks
--11018--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11018--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11018--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11018--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11018--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11018--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11018--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11018--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11018--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11018--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11018--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11018--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11018--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11018--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11018--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11018--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11018--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11018--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11018--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11018--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11018--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11018--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11018--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11018--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11018--   Scanning root segment: 0x701a000..0x701afff (4096)
--11018--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11018--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11018--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11018--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11018--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11018--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11018--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11018--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11018--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11018--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11012== Checked 4,840,360 bytes
==11012== 
==10930== Checked 4,842,720 bytes
==10930== 
==10928== Checked 4,819,488 bytes
==10928== 
==10074== Checked 4,809,608 bytes
==10074== 
==11012== LEAK SUMMARY:
==11012==    definitely lost: 2,221 bytes in 14 blocks
==11012==    indirectly lost: 6,796 bytes in 9 blocks
==11012==      possibly lost: 0 bytes in 0 blocks
==11012==    still reachable: 3,128,963 bytes in 69,518 blocks
==11012==         suppressed: 0 bytes in 0 blocks
==11012== Rerun with --leak-check=full to see details of leaked memory
==11012== 
==11012== Use --track-origins=yes to see where uninitialised values come from
==11012== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11012== 
==11012== 1 errors in context 1 of 2:
==11012== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11012==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11012==    by 0x488CD0: stringsubst (subst.c:301)
==11012==    by 0x48801B: prefork (subst.c:77)
==11012==    by 0x42B318: execcmd (exec.c:2619)
==11012==    by 0x428CA0: execpline2 (exec.c:1697)
==11012==    by 0x427FD2: execpline (exec.c:1484)
==11012==    by 0x427756: execlist (exec.c:1267)
==11012==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x431299: runshfunc (exec.c:5040)
==11012==    by 0x430E76: doshfunc (exec.c:4920)
==11012==    by 0x4302FB: execshfunc (exec.c:4557)
==11012==    by 0x42D8C1: execcmd (exec.c:3373)
==11012== 
==11012== 
==11012== 2 errors in context 2 of 2:
==11012== Conditional jump or move depends on uninitialised value(s)
==11012==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11012==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11012==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11012==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11012==    by 0x42D8E9: execcmd (exec.c:3378)
==11012==    by 0x428CA0: execpline2 (exec.c:1697)
==11012==    by 0x427FD2: execpline (exec.c:1484)
==11012==    by 0x42779A: execlist (exec.c:1275)
==11012==    by 0x42717C: execode (exec.c:1073)
==11012==    by 0x431299: runshfunc (exec.c:5040)
==11012==    by 0x430E76: doshfunc (exec.c:4920)
==11012==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11012== 
==11012== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10928== LEAK SUMMARY:
==10928==    definitely lost: 2,221 bytes in 14 blocks
==10928==    indirectly lost: 6,796 bytes in 9 blocks
==10928==      possibly lost: 0 bytes in 0 blocks
==10928==    still reachable: 3,123,487 bytes in 69,319 blocks
==10928==         suppressed: 0 bytes in 0 blocks
==10928== Rerun with --leak-check=full to see details of leaked memory
==10928== 
==10928== Use --track-origins=yes to see where uninitialised values come from
==10928== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10928== 
==10928== 1 errors in context 1 of 2:
==10928== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10928==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10928==    by 0x488CD0: stringsubst (subst.c:301)
==10928==    by 0x48801B: prefork (subst.c:77)
==10928==    by 0x42B318: execcmd (exec.c:2619)
==10928==    by 0x428CA0: execpline2 (exec.c:1697)
==10928==    by 0x427FD2: execpline (exec.c:1484)
==10928==    by 0x427756: execlist (exec.c:1267)
==10928==    by 0x42717C: execode (exec.c:1073)
==10928==    by 0x431299: runshfunc (exec.c:5040)
==10928==    by 0x430E76: doshfunc (exec.c:4920)
==10928==    by 0x4302FB: execshfunc (exec.c:4557)
==10928==    by 0x42D8C1: execcmd (exec.c:3373)
==10928== 
==10928== 
==10928== 2 errors in context 2 of 2:
==10928== Conditional jump or move depends on uninitialised value(s)
==10928==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10928==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10928==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10928==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10928==    by 0x42D8E9: execcmd (exec.c:3378)
==10928==    by 0x428CA0: execpline2 (exec.c:1697)
==10928==    by 0x427FD2: execpline (exec.c:1484)
==10928==    by 0x42779A: execlist (exec.c:1275)
==10928==    by 0x42717C: execode (exec.c:1073)
==10928==    by 0x431299: runshfunc (exec.c:5040)
==10928==    by 0x430E76: doshfunc (exec.c:4920)
==10928==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10928== 
==10928== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10930== LEAK SUMMARY:
==10930==    definitely lost: 2,221 bytes in 14 blocks
==10930==    indirectly lost: 6,796 bytes in 9 blocks
==10930==      possibly lost: 0 bytes in 0 blocks
==10930==    still reachable: 3,127,587 bytes in 69,456 blocks
==10930==         suppressed: 0 bytes in 0 blocks
==10930== Rerun with --leak-check=full to see details of leaked memory
==10930== 
==10930== Use --track-origins=yes to see where uninitialised values come from
==10930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10930== 
==10930== 1 errors in context 1 of 2:
==10930== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10930==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10930==    by 0x488CD0: stringsubst (subst.c:301)
==10930==    by 0x48801B: prefork (subst.c:77)
==10930==    by 0x42B318: execcmd (exec.c:2619)
==10930==    by 0x428CA0: execpline2 (exec.c:1697)
==10930==    by 0x427FD2: execpline (exec.c:1484)
==10930==    by 0x427756: execlist (exec.c:1267)
==10930==    by 0x42717C: execode (exec.c:1073)
==10930==    by 0x431299: runshfunc (exec.c:5040)
==10930==    by 0x430E76: doshfunc (exec.c:4920)
==10930==    by 0x4302FB: execshfunc (exec.c:4557)
==10930==    by 0x42D8C1: execcmd (exec.c:3373)
==10930== 
==10930== 
==10930== 2 errors in context 2 of 2:
==10930== Conditional jump or move depends on uninitialised value(s)
==10930==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10930==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10930==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10930==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10930==    by 0x42D8E9: execcmd (exec.c:3378)
==10930==    by 0x428CA0: execpline2 (exec.c:1697)
==10930==    by 0x427FD2: execpline (exec.c:1484)
==10930==    by 0x42779A: execlist (exec.c:1275)
==10930==    by 0x42717C: execode (exec.c:1073)
==10930==    by 0x431299: runshfunc (exec.c:5040)
==10930==    by 0x430E76: doshfunc (exec.c:4920)
==10930==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10930== 
==10930== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== Checked 4,789,280 bytes
==11018== 
==10074== LEAK SUMMARY:
==10074==    definitely lost: 2,197 bytes in 13 blocks
==10074==    indirectly lost: 6,756 bytes in 7 blocks
==10074==      possibly lost: 0 bytes in 0 blocks
==10074==    still reachable: 3,120,261 bytes in 69,232 blocks
==10074==         suppressed: 0 bytes in 0 blocks
==10074== Rerun with --leak-check=full to see details of leaked memory
==10074== 
==10074== Use --track-origins=yes to see where uninitialised values come from
==10074== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==10074== 
==10074== 1 errors in context 1 of 2:
==10074== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==10074==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==10074==    by 0x488CD0: stringsubst (subst.c:301)
==10074==    by 0x48801B: prefork (subst.c:77)
==10074==    by 0x42B318: execcmd (exec.c:2619)
==10074==    by 0x428CA0: execpline2 (exec.c:1697)
==10074==    by 0x427FD2: execpline (exec.c:1484)
==10074==    by 0x427756: execlist (exec.c:1267)
==10074==    by 0x42717C: execode (exec.c:1073)
==10074==    by 0x431299: runshfunc (exec.c:5040)
==10074==    by 0x430E76: doshfunc (exec.c:4920)
==10074==    by 0x4302FB: execshfunc (exec.c:4557)
==10074==    by 0x42D8C1: execcmd (exec.c:3373)
==10074== 
==10074== 
==10074== 2 errors in context 2 of 2:
==10074== Conditional jump or move depends on uninitialised value(s)
==10074==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==10074==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==10074==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==10074==    by 0x40EFC2: execbuiltin (builtin.c:450)
==10074==    by 0x42D8E9: execcmd (exec.c:3378)
==10074==    by 0x428CA0: execpline2 (exec.c:1697)
==10074==    by 0x427FD2: execpline (exec.c:1484)
==10074==    by 0x42779A: execlist (exec.c:1275)
==10074==    by 0x42717C: execode (exec.c:1073)
==10074==    by 0x431299: runshfunc (exec.c:5040)
==10074==    by 0x430E76: doshfunc (exec.c:4920)
==10074==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==10074== 
==10074== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== LEAK SUMMARY:
==11018==    definitely lost: 3,213 bytes in 20 blocks
==11018==    indirectly lost: 6,812 bytes in 10 blocks
==11018==      possibly lost: 0 bytes in 0 blocks
==11018==    still reachable: 3,105,561 bytes in 68,981 blocks
==11018==         suppressed: 0 bytes in 0 blocks
==11018== Rerun with --leak-check=full to see details of leaked memory
==11018== 
==11018== Use --track-origins=yes to see where uninitialised values come from
==11018== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11018== 
==11018== 1 errors in context 1 of 2:
==11018== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11018==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11018==    by 0x488CD0: stringsubst (subst.c:301)
==11018==    by 0x48801B: prefork (subst.c:77)
==11018==    by 0x42B318: execcmd (exec.c:2619)
==11018==    by 0x428CA0: execpline2 (exec.c:1697)
==11018==    by 0x427FD2: execpline (exec.c:1484)
==11018==    by 0x427756: execlist (exec.c:1267)
==11018==    by 0x42717C: execode (exec.c:1073)
==11018==    by 0x431299: runshfunc (exec.c:5040)
==11018==    by 0x430E76: doshfunc (exec.c:4920)
==11018==    by 0x4302FB: execshfunc (exec.c:4557)
==11018==    by 0x42D8C1: execcmd (exec.c:3373)
==11018== 
==11018== 
==11018== 2 errors in context 2 of 2:
==11018== Conditional jump or move depends on uninitialised value(s)
==11018==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11018==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11018==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11018==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11018==    by 0x42D8E9: execcmd (exec.c:3378)
==11018==    by 0x428CA0: execpline2 (exec.c:1697)
==11018==    by 0x427FD2: execpline (exec.c:1484)
==11018==    by 0x42779A: execlist (exec.c:1275)
==11018==    by 0x42717C: execode (exec.c:1073)
==11018==    by 0x431299: runshfunc (exec.c:5040)
==11018==    by 0x430E76: doshfunc (exec.c:4920)
==11018==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11018== 
==11018== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF514C,  len 4
--11019-- Caught __NR_exit; running __libc_freeres()
==11019== embedded gdbserver: reading from /tmp/vgdb-pipe-from-vgdb-to-11019-by-pythonnut-on-???
==11019== embedded gdbserver: writing to   /tmp/vgdb-pipe-to-vgdb-from-11019-by-pythonnut-on-???
==11019== embedded gdbserver: shared mem   /tmp/vgdb-pipe-shared-mem-vgdb-11019-by-pythonnut-on-???
==11019== 
==11019== TO CONTROL THIS PROCESS USING vgdb (which you probably
==11019== don't want to do, unless you know exactly what you're doing,
==11019== or are doing some strange experiment):
==11019==   /usr/lib/valgrind/../../bin/vgdb --pid=11019 ...command...
==11019== 
==11019== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==11019==   /path/to/gdb ./zsh
==11019== and then give GDB the following command
==11019==   target remote | /usr/lib/valgrind/../../bin/vgdb --pid=11019
==11019== --pid is optional if only one valgrind process is running
==11019== 
--11019-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==11019== 
==11019== HEAP SUMMARY:
==11019==     in use at exit: 3,115,442 bytes in 69,007 blocks
==11019==   total heap usage: 1,776,839 allocs, 1,707,832 frees, 141,632,619 bytes allocated
==11019== 
==11019== Searching for pointers to 69,007 not-freed blocks
--11019--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--11019--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--11019--   Scanning root segment: 0x4022000..0x4026fff (20480)
--11019--   Scanning root segment: 0x4049000..0x404cfff (16384)
--11019--   Scanning root segment: 0x4222000..0x4222fff (4096)
--11019--   Scanning root segment: 0x4223000..0x4223fff (4096)
--11019--   Scanning root segment: 0x4224000..0x4224fff (4096)
--11019--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--11019--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--11019--   Scanning root segment: 0x5041000..0x5041fff (4096)
--11019--   Scanning root segment: 0x5245000..0x5245fff (4096)
--11019--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--11019--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--11019--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--11019--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--11019--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--11019--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--11019--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--11019--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--11019--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--11019--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--11019--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--11019--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--11019--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--11019--   Scanning root segment: 0x701a000..0x701afff (4096)
--11019--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--11019--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--11019--   Scanning root segment: 0xae51000..0xae52fff (8192)
--11019--   Scanning root segment: 0xb054000..0xb054fff (4096)
--11019--   Scanning root segment: 0xb268000..0xb268fff (4096)
--11019--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--11019--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--11019--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--11019--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--11019--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==11019== Checked 4,788,816 bytes
==11019== 
==11019== LEAK SUMMARY:
==11019==    definitely lost: 3,205 bytes in 20 blocks
==11019==    indirectly lost: 6,756 bytes in 7 blocks
==11019==      possibly lost: 0 bytes in 0 blocks
==11019==    still reachable: 3,105,481 bytes in 68,980 blocks
==11019==         suppressed: 0 bytes in 0 blocks
==11019== Rerun with --leak-check=full to see details of leaked memory
==11019== 
==11019== Use --track-origins=yes to see where uninitialised values come from
==11019== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==11019== 
==11019== 1 errors in context 1 of 2:
==11019== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==11019==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==11019==    by 0x488CD0: stringsubst (subst.c:301)
==11019==    by 0x48801B: prefork (subst.c:77)
==11019==    by 0x42B318: execcmd (exec.c:2619)
==11019==    by 0x428CA0: execpline2 (exec.c:1697)
==11019==    by 0x427FD2: execpline (exec.c:1484)
==11019==    by 0x427756: execlist (exec.c:1267)
==11019==    by 0x42717C: execode (exec.c:1073)
==11019==    by 0x431299: runshfunc (exec.c:5040)
==11019==    by 0x430E76: doshfunc (exec.c:4920)
==11019==    by 0x4302FB: execshfunc (exec.c:4557)
==11019==    by 0x42D8C1: execcmd (exec.c:3373)
==11019== 
==11019== 
==11019== 2 errors in context 2 of 2:
==11019== Conditional jump or move depends on uninitialised value(s)
==11019==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==11019==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==11019==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==11019==    by 0x40EFC2: execbuiltin (builtin.c:450)
==11019==    by 0x42D8E9: execcmd (exec.c:3378)
==11019==    by 0x428CA0: execpline2 (exec.c:1697)
==11019==    by 0x427FD2: execpline (exec.c:1484)
==11019==    by 0x42779A: execlist (exec.c:1275)
==11019==    by 0x42717C: execode (exec.c:1073)
==11019==    by 0x431299: runshfunc (exec.c:5040)
==11019==    by 0x430E76: doshfunc (exec.c:4920)
==11019==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==11019== 
==11019== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
client request: code 4d430005,  addr 0xFFEFF561C,  len 4
--7806-- Caught __NR_exit; running __libc_freeres()
--7806-- Discarding syms at 0x637c290-0x6382d03 in /usr/lib/libnss_files-2.20.so due to munmap()
==7806== 
==7806== HEAP SUMMARY:
==7806==     in use at exit: 3,113,959 bytes in 68,947 blocks
==7806==   total heap usage: 1,776,798 allocs, 1,707,851 frees, 141,637,222 bytes allocated
==7806== 
==7806== Searching for pointers to 68,947 not-freed blocks
--7806--   Scanning root segment: 0x6bd000..0x6c3fff (28672)
--7806--   Scanning root segment: 0x6c4000..0x6d7fff (81920)
--7806--   Scanning root segment: 0x4022000..0x4026fff (20480)
--7806--   Scanning root segment: 0x4049000..0x404cfff (16384)
--7806--   Scanning root segment: 0x4222000..0x4222fff (4096)
--7806--   Scanning root segment: 0x4223000..0x4223fff (4096)
--7806--   Scanning root segment: 0x4224000..0x4224fff (4096)
--7806--   Scanning root segment: 0x4c25000..0x4c25fff (4096)
--7806--   Scanning root segment: 0x4e35000..0x4e35fff (4096)
--7806--   Scanning root segment: 0x5041000..0x5041fff (4096)
--7806--   Scanning root segment: 0x5245000..0x5245fff (4096)
--7806--   Scanning root segment: 0x54ac000..0x54acfff (4096)
--7806--   Scanning root segment: 0x54ad000..0x54adfff (4096)
--7806--   Scanning root segment: 0x56b5000..0x56b5fff (4096)
--7806--   Scanning root segment: 0x59ba000..0x59bafff (4096)
--7806--   Scanning root segment: 0x5d58000..0x5d59fff (8192)
--7806--   Scanning root segment: 0x5d5a000..0x5d5dfff (16384)
--7806--   Scanning root segment: 0x5f75000..0x5f75fff (4096)
--7806--   Scanning root segment: 0x5f76000..0x5f79fff (16384)
--7806--   Scanning root segment: 0x67d0000..0x67d7fff (32768)
--7806--   Scanning root segment: 0x67d8000..0x67d8fff (4096)
--7806--   Scanning root segment: 0x6a01000..0x6a02fff (8192)
--7806--   Scanning root segment: 0x6c0b000..0x6c0bfff (4096)
--7806--   Scanning root segment: 0x6e15000..0x6e16fff (8192)
--7806--   Scanning root segment: 0x701a000..0x701afff (4096)
--7806--   Scanning root segment: 0xaa4a000..0xaa4afff (4096)
--7806--   Scanning root segment: 0xac4d000..0xac4dfff (4096)
--7806--   Scanning root segment: 0xae51000..0xae52fff (8192)
--7806--   Scanning root segment: 0xb054000..0xb054fff (4096)
--7806--   Scanning root segment: 0xb268000..0xb268fff (4096)
--7806--   Scanning root segment: 0xb46a000..0xb46afff (4096)
--7806--   Scanning root segment: 0xba6f000..0xba6ffff (4096)
--7806--   Scanning root segment: 0xbc82000..0xbc83fff (8192)
--7806--   Scanning root segment: 0xbe85000..0xbe85fff (4096)
--7806--   Scanning root segment: 0xffefdb000..0xfff000fff (155648)
==7806== Checked 4,786,664 bytes
==7806== 
==7806== LEAK SUMMARY:
==7806==    definitely lost: 3,205 bytes in 20 blocks
==7806==    indirectly lost: 6,756 bytes in 7 blocks
==7806==      possibly lost: 0 bytes in 0 blocks
==7806==    still reachable: 3,103,998 bytes in 68,920 blocks
==7806==         suppressed: 0 bytes in 0 blocks
==7806== Rerun with --leak-check=full to see details of leaked memory
==7806== 
==7806== Use --track-origins=yes to see where uninitialised values come from
==7806== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)
==7806== 
==7806== 1 errors in context 1 of 2:
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806==    by 0x488CD0: stringsubst (subst.c:301)
==7806==    by 0x48801B: prefork (subst.c:77)
==7806==    by 0x42B318: execcmd (exec.c:2619)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x427756: execlist (exec.c:1267)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x4302FB: execshfunc (exec.c:4557)
==7806==    by 0x42D8C1: execcmd (exec.c:3373)
==7806== 
==7806== 
==7806== 2 errors in context 2 of 2:
==7806== Conditional jump or move depends on uninitialised value(s)
==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==7806==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==7806==    by 0x40EFC2: execbuiltin (builtin.c:450)
==7806==    by 0x42D8E9: execcmd (exec.c:3378)
==7806==    by 0x428CA0: execpline2 (exec.c:1697)
==7806==    by 0x427FD2: execpline (exec.c:1484)
==7806==    by 0x42779A: execlist (exec.c:1275)
==7806==    by 0x42717C: execode (exec.c:1073)
==7806==    by 0x431299: runshfunc (exec.c:5040)
==7806==    by 0x430E76: doshfunc (exec.c:4920)
==7806==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==7806== 
==7806== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-15 21:20         ` Jonathan H
@ 2014-12-15 23:39           ` Bart Schaefer
  2014-12-16 20:58             ` Peter Stephenson
  2014-12-17 17:18             ` Jonathan H
  0 siblings, 2 replies; 14+ messages in thread
From: Bart Schaefer @ 2014-12-15 23:39 UTC (permalink / raw)
  To: zsh-workers

On Dec 15,  1:20pm, Jonathan H wrote:
}
} It usually is, but for some reason I can't get it to crash in
} valgrind.

That'll happen sometimes if the error is related to a signal being
handled or something like that.  Zsh isn't internally "multi-threaded"
so the only source of race conditions is signals (including child
process exits).

} Anyway, here's the STDERR from "valgrind -v -v".

That's probably more detail than is useful -- in fact, just "valgrind -q"
would probably suffice if you're going to run it for a long time.

} It shows some errors
} or something so maybe it's still of use. I'll post if I can get it to
} crash though.

==7806== 1 errors in context 1 of 2:
==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==7806==    at 0x4C2D766: __GI_strcpy (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7806==    by 0x488CD0: stringsubst (subst.c:301)

We can fix that one:

diff --git a/Src/subst.c b/Src/subst.c
index 43932c2..4100803 100644
--- a/Src/subst.c
+++ b/Src/subst.c
@@ -298,7 +298,7 @@ stringsubst(LinkList list, LinkNode node, int pf_flags, int asssub)
 	    if (endchar == Outpar)
 		str2--;
 	    if (!(s = (char *) ugetnode(pl))) {
-		str = strcpy(str2, str);
+		str = (char *)memmove(str2, str, strlen(str)+1);
 		continue;
 	    }
 	    if (!qt && (pf_flags & PREFORK_SINGLE) && isset(GLOBSUBST))


==7806== 2 errors in context 2 of 2:
==7806== Conditional jump or move depends on uninitialised value(s)
==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)

I have no idea what to do with that one; that line is:

	Shfunc shf = (Shfunc) shfunctab->getnode(shfunctab, w->u.fnnam);



^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-15 23:39           ` Bart Schaefer
@ 2014-12-16 20:58             ` Peter Stephenson
  2014-12-17 17:18             ` Jonathan H
  1 sibling, 0 replies; 14+ messages in thread
From: Peter Stephenson @ 2014-12-16 20:58 UTC (permalink / raw)
  To: zsh-workers

On Mon, 15 Dec 2014 15:39:36 -0800
Bart Schaefer <schaefer@brasslantern.com> wrote:
> On Dec 15,  1:20pm, Jonathan H wrote:
> }
> } It usually is, but for some reason I can't get it to crash in
> } valgrind.
> 
> That'll happen sometimes if the error is related to a signal being
> handled or something like that.  Zsh isn't internally "multi-threaded"
> so the only source of race conditions is signals (including child
> process exits).

I'm not sure we've really identified a solid strategy for this problem.

Maybe this suggests there's something to do with region highlighting
that's particular sensitive.  I didn't see anything of that kind --- I
don't know why it would be different in terms of memory management from
any other array stored by length --- though I did see a couple of
instances of somewhat incautious programming.  I can't believe the new
debug test will pick up anything.
 
> ==7806== 2 errors in context 2 of 2:
> ==7806== Conditional jump or move depends on uninitialised value(s)
> ==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
> ==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
> 
> I have no idea what to do with that one; that line is:
> 
> 	Shfunc shf = (Shfunc) shfunctab->getnode(shfunctab, w->u.fnnam);

You'd expect use of shf to fall over horribly if there was really
something nasty in that line, which presumably it doesn't.

pws

diff --git a/Src/Zle/zle_refresh.c b/Src/Zle/zle_refresh.c
index 467629d..415fee6 100644
--- a/Src/Zle/zle_refresh.c
+++ b/Src/Zle/zle_refresh.c
@@ -396,8 +396,9 @@ get_region_highlight(UNUSED(Param pm))
     struct region_highlight *rhp;
 
     /* region_highlights may not have been set yet */
-    if (arrsize)
-	arrsize -= N_SPECIAL_HIGHLIGHTS;
+    if (!arrsize)
+	return hmkarray(NULL);
+    arrsize -= N_SPECIAL_HIGHLIGHTS;
     arrp = retarr = (char **)zhalloc((arrsize+1)*sizeof(char *));
 
     /* ignore special highlighting */
@@ -1028,6 +1029,8 @@ zrefresh(void)
     /* this will create region_highlights if it's still NULL */
     zle_set_highlight();
 
+    DPUTS(!region_highlight, "region_highlight not created");
+
     /* check for region between point ($CURSOR) and mark ($MARK) */
     if (region_active) {
 	if (zlecs <= mark) {
diff --git a/Src/Zle/zle_utils.c b/Src/Zle/zle_utils.c
index de91182..e361e5e 100644
--- a/Src/Zle/zle_utils.c
+++ b/Src/Zle/zle_utils.c
@@ -675,35 +675,42 @@ zle_restore_positions(void)
 	zlell = oldpos->ll;
     }
 
-    /* Count number of regions and see if the array needs resizing */
-    for (nreg = 0, oldrhp = oldpos->regions;
-	 oldrhp;
-	 nreg++, oldrhp = oldrhp->next)
-	;
-    if (nreg + N_SPECIAL_HIGHLIGHTS != n_region_highlights) {
-	n_region_highlights = nreg + N_SPECIAL_HIGHLIGHTS;
-	region_highlights = (struct region_highlight *)
-	    zrealloc(region_highlights,
-		     sizeof(struct region_highlight) * n_region_highlights);
-    }
-    oldrhp = oldpos->regions;
-    rhp = region_highlights + N_SPECIAL_HIGHLIGHTS;
-    while (oldrhp) {
-	struct zle_region *nextrhp = oldrhp->next;
-
-	rhp->atr = oldrhp->atr;
-	rhp->flags = oldrhp->flags;
-	if (zlemetaline) {
-	    rhp->start_meta = oldrhp->start;
-	    rhp->end_meta = oldrhp->end;
-	} else {
-	    rhp->start = oldrhp->start;
-	    rhp->end = oldrhp->end;
+    if (oldpos->regions) {
+	/* Count number of regions and see if the array needs resizing */
+	for (nreg = 0, oldrhp = oldpos->regions;
+	     oldrhp;
+	     nreg++, oldrhp = oldrhp->next)
+	    ;
+	if (nreg + N_SPECIAL_HIGHLIGHTS != n_region_highlights) {
+	    n_region_highlights = nreg + N_SPECIAL_HIGHLIGHTS;
+	    region_highlights = (struct region_highlight *)
+		zrealloc(region_highlights,
+			 sizeof(struct region_highlight) * n_region_highlights);
 	}
+	oldrhp = oldpos->regions;
+	rhp = region_highlights + N_SPECIAL_HIGHLIGHTS;
+	while (oldrhp) {
+	    struct zle_region *nextrhp = oldrhp->next;
 
-	zfree(oldrhp, sizeof(*oldrhp));
-	oldrhp = nextrhp;
-	rhp++;
+	    rhp->atr = oldrhp->atr;
+	    rhp->flags = oldrhp->flags;
+	    if (zlemetaline) {
+		rhp->start_meta = oldrhp->start;
+		rhp->end_meta = oldrhp->end;
+	    } else {
+		rhp->start = oldrhp->start;
+		rhp->end = oldrhp->end;
+	    }
+
+	    zfree(oldrhp, sizeof(*oldrhp));
+	    oldrhp = nextrhp;
+	    rhp++;
+	}
+    } else if (region_highlights) {
+	zfree(region_highlights, sizeof(struct region_highlight) *
+	      n_region_highlights);
+	region_highlights  = NULL;
+	n_region_highlights = 0;
     }
 
     zfree(oldpos, sizeof(*oldpos));

pws


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-15 23:39           ` Bart Schaefer
  2014-12-16 20:58             ` Peter Stephenson
@ 2014-12-17 17:18             ` Jonathan H
  2014-12-18  6:14               ` Bart Schaefer
  1 sibling, 1 reply; 14+ messages in thread
From: Jonathan H @ 2014-12-17 17:18 UTC (permalink / raw)
  To: Bart Schaefer; +Cc: zsh-workers

[-- Attachment #1: Type: text/plain, Size: 2367 bytes --]

Hello everyone,

So, I ran ZSH for over 48 hours, and it finally crashed. I don't know
if it was the normal crashes I'm seeing because valgrind seems to have
rendered all of my tests useless. (Also, it gobbled up all of my RAM,
so I can't tell if that's why it crashed).

Attached is the STDERR from "valgrind -q --trace-children=yes
--track-origins=yes"

A lot of errors seem to have cropped up.





On Mon, Dec 15, 2014 at 3:39 PM, Bart Schaefer
<schaefer@brasslantern.com> wrote:
> On Dec 15,  1:20pm, Jonathan H wrote:
> }
> } It usually is, but for some reason I can't get it to crash in
> } valgrind.
>
> That'll happen sometimes if the error is related to a signal being
> handled or something like that.  Zsh isn't internally "multi-threaded"
> so the only source of race conditions is signals (including child
> process exits).
>
> } Anyway, here's the STDERR from "valgrind -v -v".
>
> That's probably more detail than is useful -- in fact, just "valgrind -q"
> would probably suffice if you're going to run it for a long time.
>
> } It shows some errors
> } or something so maybe it's still of use. I'll post if I can get it to
> } crash though.
>
> ==7806== 1 errors in context 1 of 2:
> ==7806== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
> ==7806==    at 0x4C2D766: __GI_strcpy (in
> /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
> ==7806==    by 0x488CD0: stringsubst (subst.c:301)
>
> We can fix that one:
>
> diff --git a/Src/subst.c b/Src/subst.c
> index 43932c2..4100803 100644
> --- a/Src/subst.c
> +++ b/Src/subst.c
> @@ -298,7 +298,7 @@ stringsubst(LinkList list, LinkNode node, int pf_flags, int asssub)
>             if (endchar == Outpar)
>                 str2--;
>             if (!(s = (char *) ugetnode(pl))) {
> -               str = strcpy(str2, str);
> +               str = (char *)memmove(str2, str, strlen(str)+1);
>                 continue;
>             }
>             if (!qt && (pf_flags & PREFORK_SINGLE) && isset(GLOBSUBST))
>
>
> ==7806== 2 errors in context 2 of 2:
> ==7806== Conditional jump or move depends on uninitialised value(s)
> ==7806==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
> ==7806==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
>
> I have no idea what to do with that one; that line is:
>
>         Shfunc shf = (Shfunc) shfunctab->getnode(shfunctab, w->u.fnnam);
>
>

[-- Attachment #2: zsh_valgrind2.log --]
[-- Type: application/octet-stream, Size: 43569 bytes --]

==1705== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==1705==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x488CD0: stringsubst (subst.c:301)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x431299: runshfunc (exec.c:5040)
==1705==    by 0x430E76: doshfunc (exec.c:4920)
==1705==    by 0x4302FB: execshfunc (exec.c:4557)
==1705==    by 0x42D8C1: execcmd (exec.c:3373)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65A79E7: execzlefunc (zle_main.c:1360)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x42779A: execlist (exec.c:1275)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x431299: runshfunc (exec.c:5040)
==1705==    by 0x430E76: doshfunc (exec.c:4920)
==1705==    by 0x65A7EE7: execzlefunc (zle_main.c:1422)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C29F90: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C446: zalloc (mem.c:896)
==1705==    by 0x65A4781: init_keymaps (zle_keymap.c:1194)
==1705==    by 0x65AA047: setup_ (zle_main.c:2056)
==1705==    by 0x45F29A: dyn_setup_module (module.c:1787)
==1705==    by 0x45F4AC: setup_module (module.c:1869)
==1705==    by 0x460881: load_module (module.c:2274)
==1705==    by 0x460510: load_module (module.c:2253)
==1705==    by 0x460510: load_module (module.c:2253)
==1705==    by 0x460DE0: require_module (module.c:2335)
==1705==    by 0x463C14: ensurefeature (module.c:3407)
==1705==    by 0x42A8A5: resolvebuiltin (exec.c:2379)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29AD: spaceinline (zle_utils.c:771)
==1705==    by 0x65C1746: zleaddtoline (zle_utils.c:104)
==1705==    by 0x65A9DD0: zle_main_entry (zle_main.c:1955)
==1705==    by 0x44857C: zleentry (init.c:1482)
==1705==    by 0x43D5AE: iaddtoline (hist.c:275)
==1705==    by 0x43D6DA: ihgetc (hist.c:315)
==1705==    by 0x4520E9: gettok (lex.c:720)
==1705==    by 0x451898: zshlex (lex.c:401)
==1705==    by 0x451AA0: ctxtlex (lex.c:447)
==1705==    by 0x65C0E48: doexpandhist (zle_tricky.c:2780)
==1705==    by 0x65BA221: docomplete (zle_tricky.c:629)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46A507: assignstrvalue (params.c:2400)
==1705==    by 0x46B90D: assignsparam (params.c:2769)
==1705==    by 0x42A524: addvars (exec.c:2285)
==1705==    by 0x4272AB: execsimple (exec.c:1116)
==1705==    by 0x42761D: execlist (exec.c:1238)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x431299: runshfunc (exec.c:5040)
==1705==    by 0x430E76: doshfunc (exec.c:4920)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2255: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65C0F51: doexpandhist (zle_tricky.c:2812)
==1705==    by 0x65BA221: docomplete (zle_tricky.c:629)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46A507: assignstrvalue (params.c:2400)
==1705==    by 0x46B90D: assignsparam (params.c:2769)
==1705==    by 0x42A524: addvars (exec.c:2285)
==1705==    by 0x4272AB: execsimple (exec.c:1116)
==1705==    by 0x42761D: execlist (exec.c:1238)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x431299: runshfunc (exec.c:5040)
==1705==    by 0x430E76: doshfunc (exec.c:4920)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C226E: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65C0F51: doexpandhist (zle_tricky.c:2812)
==1705==    by 0x65BA221: docomplete (zle_tricky.c:629)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46A507: assignstrvalue (params.c:2400)
==1705==    by 0x46B90D: assignsparam (params.c:2769)
==1705==    by 0x42A524: addvars (exec.c:2285)
==1705==    by 0x4272AB: execsimple (exec.c:1116)
==1705==    by 0x42761D: execlist (exec.c:1238)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x431299: runshfunc (exec.c:5040)
==1705==    by 0x430E76: doshfunc (exec.c:4920)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29D9: spaceinline (zle_utils.c:774)
==1705==    by 0x65C1746: zleaddtoline (zle_utils.c:104)
==1705==    by 0x65A9DD0: zle_main_entry (zle_main.c:1955)
==1705==    by 0x44857C: zleentry (init.c:1482)
==1705==    by 0x43D5AE: iaddtoline (hist.c:275)
==1705==    by 0x43D6DA: ihgetc (hist.c:315)
==1705==    by 0x4520E9: gettok (lex.c:720)
==1705==    by 0x451898: zshlex (lex.c:401)
==1705==    by 0x451AA0: ctxtlex (lex.c:447)
==1705==    by 0x65C0E48: doexpandhist (zle_tricky.c:2780)
==1705==    by 0x65BA221: docomplete (zle_tricky.c:629)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C229F: stringaszleline (zle_utils.c:499)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65C0F51: doexpandhist (zle_tricky.c:2812)
==1705==    by 0x65BA221: docomplete (zle_tricky.c:629)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C22B8: stringaszleline (zle_utils.c:499)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65C0F51: doexpandhist (zle_tricky.c:2812)
==1705==    by 0x65BA221: docomplete (zle_tricky.c:629)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C19C0: zlelineasstring (zle_utils.c:223)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65BA23E: docomplete (zle_tricky.c:634)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C1BAA: zlelineasstring (zle_utils.c:256)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65BA23E: docomplete (zle_tricky.c:634)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CE6: shiftchars (zle_utils.c:841)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67FA371: do_single (compresult.c:993)
==1705==    by 0x67E5DFB: do_completion (compcore.c:418)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CFC: shiftchars (zle_utils.c:842)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67FA371: do_single (compresult.c:993)
==1705==    by 0x67E5DFB: do_completion (compcore.c:418)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29D9: spaceinline (zle_utils.c:774)
==1705==    by 0x65BF1C9: inststrlen (zle_tricky.c:2151)
==1705==    by 0x67F912B: instmatch (compresult.c:607)
==1705==    by 0x67FA3AC: do_single (compresult.c:1001)
==1705==    by 0x67E5DFB: do_completion (compcore.c:418)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29D9: spaceinline (zle_utils.c:774)
==1705==    by 0x65BF1C9: inststrlen (zle_tricky.c:2151)
==1705==    by 0x67FAD29: do_single (compresult.c:1157)
==1705==    by 0x67E5DFB: do_completion (compcore.c:418)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C229F: stringaszleline (zle_utils.c:499)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65BB0F6: docomplete (zle_tricky.c:875)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C22B8: stringaszleline (zle_utils.c:499)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65BB0F6: docomplete (zle_tricky.c:875)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
==1705==    by 0x46AC9B: setarrvalue (params.c:2546)
==1705==    by 0x46C167: assignaparam (params.c:2857)
==1705==    by 0x42A673: addvars (exec.c:2310)
==1705==    by 0x42B627: execcmd (exec.c:2683)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x42717C: execode (exec.c:1073)
==1705==    by 0x41F8D5: eval (builtin.c:5034)
==1705== 
8: zle_thingy.c:660: line metafied
95: BUG: bad operand in patmatch.
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C198F: zlelineasstring (zle_utils.c:220)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65BA23E: docomplete (zle_tricky.c:634)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C1B8A: zlelineasstring (zle_utils.c:254)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65BA23E: docomplete (zle_tricky.c:634)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2255: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65B1E3C: zrefresh (zle_refresh.c:1002)
==1705==    by 0x65A9A05: trashzle (zle_main.c:1887)
==1705==    by 0x65C3DFE: showmsg (zle_utils.c:1266)
==1705==    by 0x65B7F32: bin_zle_mesg (zle_thingy.c:459)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C226E: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65B1E3C: zrefresh (zle_refresh.c:1002)
==1705==    by 0x65A9A05: trashzle (zle_main.c:1887)
==1705==    by 0x65C3DFE: showmsg (zle_utils.c:1266)
==1705==    by 0x65B7F32: bin_zle_mesg (zle_thingy.c:459)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65B27BE: zrefresh (zle_refresh.c:1198)
==1705==    by 0x65A9A05: trashzle (zle_main.c:1887)
==1705==    by 0x65C3DFE: showmsg (zle_utils.c:1266)
==1705==    by 0x65B7F32: bin_zle_mesg (zle_thingy.c:459)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x45689D: execif (loop.c:525)
==1705==    by 0x42D731: execcmd (exec.c:3336)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C198F: zlelineasstring (zle_utils.c:220)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65B42AB: zrefresh (zle_refresh.c:1739)
==1705==    by 0x65A9A05: trashzle (zle_main.c:1887)
==1705==    by 0x65C3DFE: showmsg (zle_utils.c:1266)
==1705==    by 0x65B7F32: bin_zle_mesg (zle_thingy.c:459)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C1B8A: zlelineasstring (zle_utils.c:254)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65B42AB: zrefresh (zle_refresh.c:1739)
==1705==    by 0x65A9A05: trashzle (zle_main.c:1887)
==1705==    by 0x65C3DFE: showmsg (zle_utils.c:1266)
==1705==    by 0x65B7F32: bin_zle_mesg (zle_thingy.c:459)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2255: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65B1E3C: zrefresh (zle_refresh.c:1002)
==1705==    by 0x65B7F45: bin_zle_mesg (zle_thingy.c:461)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x45689D: execif (loop.c:525)
==1705==    by 0x42D731: execcmd (exec.c:3336)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C226E: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65B1E3C: zrefresh (zle_refresh.c:1002)
==1705==    by 0x65B7F45: bin_zle_mesg (zle_thingy.c:461)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x45689D: execif (loop.c:525)
==1705==    by 0x42D731: execcmd (exec.c:3336)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65B27BE: zrefresh (zle_refresh.c:1198)
==1705==    by 0x65B7F45: bin_zle_mesg (zle_thingy.c:461)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x45689D: execif (loop.c:525)
==1705==    by 0x42D731: execcmd (exec.c:3336)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C198F: zlelineasstring (zle_utils.c:220)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65B42AB: zrefresh (zle_refresh.c:1739)
==1705==    by 0x65B7F45: bin_zle_mesg (zle_thingy.c:461)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x45689D: execif (loop.c:525)
==1705==    by 0x42D731: execcmd (exec.c:3336)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C1B8A: zlelineasstring (zle_utils.c:254)
==1705==    by 0x65BB566: metafy_line (zle_tricky.c:965)
==1705==    by 0x65B42AB: zrefresh (zle_refresh.c:1739)
==1705==    by 0x65B7F45: bin_zle_mesg (zle_thingy.c:461)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705==    by 0x427756: execlist (exec.c:1267)
==1705==    by 0x45689D: execif (loop.c:525)
==1705==    by 0x42D731: execcmd (exec.c:3336)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29AD: spaceinline (zle_utils.c:771)
==1705==    by 0x65BF1C9: inststrlen (zle_tricky.c:2151)
==1705==    by 0x67F7C20: cline_str (compresult.c:224)
==1705==    by 0x67F8DA5: unambig_data (compresult.c:535)
==1705==    by 0x67E44A0: get_unambig (complete.c:1295)
==1705==    by 0x4692BE: getstrvalue (params.c:1997)
==1705==    by 0x465830: scanparamvals (params.c:578)
==1705==    by 0x43B21D: scanmatchtable (hashtable.c:428)
==1705==    by 0x43B293: scanhashtable (hashtable.c:444)
==1705==    by 0x46599A: paramvalarr (params.c:602)
==1705==    by 0x465A6A: getvaluearr (params.c:620)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CA2: shiftchars (zle_utils.c:835)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67F8B84: cline_str (compresult.c:472)
==1705==    by 0x67F8DA5: unambig_data (compresult.c:535)
==1705==    by 0x67E44A0: get_unambig (complete.c:1295)
==1705==    by 0x4692BE: getstrvalue (params.c:1997)
==1705==    by 0x465830: scanparamvals (params.c:578)
==1705==    by 0x43B21D: scanmatchtable (hashtable.c:428)
==1705==    by 0x43B293: scanhashtable (hashtable.c:444)
==1705==    by 0x46599A: paramvalarr (params.c:602)
==1705==    by 0x465A6A: getvaluearr (params.c:620)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CB8: shiftchars (zle_utils.c:836)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67F8B84: cline_str (compresult.c:472)
==1705==    by 0x67F8DA5: unambig_data (compresult.c:535)
==1705==    by 0x67E44A0: get_unambig (complete.c:1295)
==1705==    by 0x4692BE: getstrvalue (params.c:1997)
==1705==    by 0x465830: scanparamvals (params.c:578)
==1705==    by 0x43B21D: scanmatchtable (hashtable.c:428)
==1705==    by 0x43B293: scanhashtable (hashtable.c:444)
==1705==    by 0x46599A: paramvalarr (params.c:602)
==1705==    by 0x465A6A: getvaluearr (params.c:620)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29AD: spaceinline (zle_utils.c:771)
==1705==    by 0x65BF1C9: inststrlen (zle_tricky.c:2151)
==1705==    by 0x67F7C20: cline_str (compresult.c:224)
==1705==    by 0x67F8E4F: unambig_data (compresult.c:546)
==1705==    by 0x67E44A0: get_unambig (complete.c:1295)
==1705==    by 0x4692BE: getstrvalue (params.c:1997)
==1705==    by 0x465830: scanparamvals (params.c:578)
==1705==    by 0x43B21D: scanmatchtable (hashtable.c:428)
==1705==    by 0x43B293: scanhashtable (hashtable.c:444)
==1705==    by 0x46599A: paramvalarr (params.c:602)
==1705==    by 0x465A6A: getvaluearr (params.c:620)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CA2: shiftchars (zle_utils.c:835)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67F8B84: cline_str (compresult.c:472)
==1705==    by 0x67F8E4F: unambig_data (compresult.c:546)
==1705==    by 0x67E44A0: get_unambig (complete.c:1295)
==1705==    by 0x4692BE: getstrvalue (params.c:1997)
==1705==    by 0x465830: scanparamvals (params.c:578)
==1705==    by 0x43B21D: scanmatchtable (hashtable.c:428)
==1705==    by 0x43B293: scanhashtable (hashtable.c:444)
==1705==    by 0x46599A: paramvalarr (params.c:602)
==1705==    by 0x465A6A: getvaluearr (params.c:620)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CB8: shiftchars (zle_utils.c:836)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67F8B84: cline_str (compresult.c:472)
==1705==    by 0x67F8E4F: unambig_data (compresult.c:546)
==1705==    by 0x67E44A0: get_unambig (complete.c:1295)
==1705==    by 0x4692BE: getstrvalue (params.c:1997)
==1705==    by 0x465830: scanparamvals (params.c:578)
==1705==    by 0x43B21D: scanmatchtable (hashtable.c:428)
==1705==    by 0x43B293: scanhashtable (hashtable.c:444)
==1705==    by 0x46599A: paramvalarr (params.c:602)
==1705==    by 0x465A6A: getvaluearr (params.c:620)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CA2: shiftchars (zle_utils.c:835)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67E5EF9: do_completion (compcore.c:437)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2CB8: shiftchars (zle_utils.c:836)
==1705==    by 0x65C385F: foredel (zle_utils.c:1066)
==1705==    by 0x67E5EF9: do_completion (compcore.c:437)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C29AD: spaceinline (zle_utils.c:771)
==1705==    by 0x65BF1C9: inststrlen (zle_tricky.c:2151)
==1705==    by 0x67E5F15: do_completion (compcore.c:438)
==1705==    by 0x45E109: runhookdef (module.c:996)
==1705==    by 0x65BF686: docompletion (zle_tricky.c:2260)
==1705==    by 0x65BB0A9: docomplete (zle_tricky.c:864)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C2255: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65BB0F6: docomplete (zle_tricky.c:875)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x65C226E: stringaszleline (zle_utils.c:495)
==1705==    by 0x65BB61C: unmetafy_line (zle_tricky.c:984)
==1705==    by 0x65BB0F6: docomplete (zle_tricky.c:875)
==1705==    by 0x65B9563: completeword (zle_tricky.c:232)
==1705==    by 0x65B9444: completecall (zle_tricky.c:208)
==1705==    by 0x65A7B42: execzlefunc (zle_main.c:1381)
==1705==    by 0x65B8B2C: bin_zle_call (zle_thingy.c:711)
==1705==    by 0x65B7BE1: bin_zle (zle_thingy.c:382)
==1705==    by 0x40EFC2: execbuiltin (builtin.c:450)
==1705==    by 0x42D8E9: execcmd (exec.c:3378)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x5A04B81: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
==1705==    by 0x465A16: getvaluearr (params.c:618)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705==    by 0x48CEB0: paramsubst (subst.c:2401)
==1705==    by 0x4889EA: stringsubst (subst.c:236)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Use of uninitialised value of size 8
==1705==    at 0x59FFACB: _itoa_word (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A044B7: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
==1705==    by 0x465A16: getvaluearr (params.c:618)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705==    by 0x48CEB0: paramsubst (subst.c:2401)
==1705==    by 0x4889EA: stringsubst (subst.c:236)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x59FFAD5: _itoa_word (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A044B7: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
==1705==    by 0x465A16: getvaluearr (params.c:618)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705==    by 0x48CEB0: paramsubst (subst.c:2401)
==1705==    by 0x4889EA: stringsubst (subst.c:236)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x5A04528: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
==1705==    by 0x465A16: getvaluearr (params.c:618)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705==    by 0x48CEB0: paramsubst (subst.c:2401)
==1705==    by 0x4889EA: stringsubst (subst.c:236)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x5A04253: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
==1705==    by 0x465A16: getvaluearr (params.c:618)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705==    by 0x48CEB0: paramsubst (subst.c:2401)
==1705==    by 0x4889EA: stringsubst (subst.c:236)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x5A042E3: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
==1705==    by 0x465A16: getvaluearr (params.c:618)
==1705==    by 0x469A1C: getarrvalue (params.c:2175)
==1705==    by 0x48CEB0: paramsubst (subst.c:2401)
==1705==    by 0x4889EA: stringsubst (subst.c:236)
==1705==    by 0x48801B: prefork (subst.c:77)
==1705==    by 0x42B318: execcmd (exec.c:2619)
==1705==    by 0x428CA0: execpline2 (exec.c:1697)
==1705==    by 0x427FD2: execpline (exec.c:1484)
==1705== 
8: zle_thingy.c:660: line metafied
95: BUG: bad operand in patmatch.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-17 17:18             ` Jonathan H
@ 2014-12-18  6:14               ` Bart Schaefer
  2014-12-18 19:09                 ` Peter Stephenson
  0 siblings, 1 reply; 14+ messages in thread
From: Bart Schaefer @ 2014-12-18  6:14 UTC (permalink / raw)
  To: zsh-workers; +Cc: Jonathan H

On Dec 17,  9:18am, Jonathan H wrote:
} Subject: Re: Complex config triggering Segfault in pattern matching code.
}
} So, I ran ZSH for over 48 hours, and it finally crashed. I don't know
} if it was the normal crashes I'm seeing because valgrind seems to have
} rendered all of my tests useless. (Also, it gobbled up all of my RAM,
} so I can't tell if that's why it crashed).
} 
} Attached is the STDERR from "valgrind -q --trace-children=yes
} --track-origins=yes"

Thanks.  If you do this again I think you can avoid --trace-children.

} A lot of errors seem to have cropped up.

Yeah, but the vast majority of them are the same error repeating.

Already fixed this one:

==1705== Source and destination overlap in strcpy(0x402bd24, 0x402bd51)
==1705==    at 0x4C2D766: __GI_strcpy (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x488CD0: stringsubst (subst.c:301)

This one seems obvious:

==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C29F90: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C446: zalloc (mem.c:896)
==1705==    by 0x65A4781: init_keymaps (zle_keymap.c:1194)


diff --git a/Src/Zle/zle_keymap.c b/Src/Zle/zle_keymap.c
index be02f3a..cfef882 100644
--- a/Src/Zle/zle_keymap.c
+++ b/Src/Zle/zle_keymap.c
@@ -1201,7 +1201,7 @@ init_keymaps(void)
 {
     createkeymapnamtab();
     default_bindings();
-    keybuf = (char *)zalloc(keybufsz);
+    keybuf = (char *)zshcalloc(keybufsz);
     lastnamed = refthingy(t_undefinedkey);
 }


This is the one that repeats a lot:

==1705==  Uninitialised value was created by a heap allocation
==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==1705==    by 0x45C798: zrealloc (mem.c:938)
==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)

It would appear that the loop at zle_refresh.c:461 needs to assign
values to rhp->start_meta and rhp->end_meta at the same time that it
calculates rhp->start and rhp->end.  However, I'm not familiar enough
with the region_highlight algorithm to be sure how to initialize those.

It's possible that fixing this will fix the next one as a side-effect.

Finally this one repeats a few times:

==1705== Conditional jump or move depends on uninitialised value(s)
==1705==    at 0x5A04253: vfprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)

That's this:

	sprintf(digbuf1, "%d", rhp->start);
	sprintf(digbuf2, "%d", rhp->end);

I'm confused about that one because I can't see where rhp->start might
be coming from without getting initialized.  It LOOKS like the loop in
set_region_highlight() always either initializes those, or truncates
the array to be no more than N_SPECIAL_HIGHLIGHTS elements long.  In
the latter case the loop containing those sprintf's should never make
a circuit.  There is a potential problem in that the loop test is just
(arrsize--) which could go on infinitely if arrsize is negative when
the loop begins, but there isn't enough log output for this to be an
infinite loop.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-18  6:14               ` Bart Schaefer
@ 2014-12-18 19:09                 ` Peter Stephenson
  2014-12-18 19:34                   ` Peter Stephenson
  2014-12-29  0:57                   ` Daniel Shahaf
  0 siblings, 2 replies; 14+ messages in thread
From: Peter Stephenson @ 2014-12-18 19:09 UTC (permalink / raw)
  To: zsh-workers

On Wed, 17 Dec 2014 22:14:00 -0800
Bart Schaefer <schaefer@brasslantern.com> wrote:
> This is the one that repeats a lot:
> 
> ==1705==  Uninitialised value was created by a heap allocation
> ==1705==    at 0x4C2C29E: realloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
> ==1705==    by 0x45C798: zrealloc (mem.c:938)
> ==1705==    by 0x65B0D18: set_region_highlight (zle_refresh.c:454)
> 
> It would appear that the loop at zle_refresh.c:461 needs to assign
> values to rhp->start_meta and rhp->end_meta at the same time that it
> calculates rhp->start and rhp->end.  However, I'm not familiar enough
> with the region_highlight algorithm to be sure how to initialize those.

Zeroing at the realloc should stop this.  Watch carefully in case I've
got the sums wrong.
 
> It's possible that fixing this will fix the next one as a side-effect.
> 
> Finally this one repeats a few times:
> 
> ==1705== Conditional jump or move depends on uninitialised value(s)
> ==1705==    at 0x5A04253: vfprintf (in /usr/lib/libc-2.20.so)
> ==1705==    by 0x5A278FA: vsprintf (in /usr/lib/libc-2.20.so)
> ==1705==    by 0x5A0ACD6: sprintf (in /usr/lib/libc-2.20.so)
> ==1705==    by 0x65B0B66: get_region_highlight (zle_refresh.c:410)
> 
> That's this:
> 
> 	sprintf(digbuf1, "%d", rhp->start);
> 	sprintf(digbuf2, "%d", rhp->end);
> 
> I'm confused about that one because I can't see where rhp->start might
> be coming from without getting initialized.  It LOOKS like the loop in
> set_region_highlight() always either initializes those, or truncates
> the array to be no more than N_SPECIAL_HIGHLIGHTS elements long.  In
> the latter case the loop containing those sprintf's should never make
> a circuit.  There is a potential problem in that the loop test is just
> (arrsize--) which could go on infinitely if arrsize is negative when
> the loop begins, but there isn't enough log output for this to be an
> infinite loop.

I don't see how arrsize could be negative, but here's a debug test.

diff --git a/Src/Zle/zle_refresh.c b/Src/Zle/zle_refresh.c
index 9f80753..d63f9b8 100644
--- a/Src/Zle/zle_refresh.c
+++ b/Src/Zle/zle_refresh.c
@@ -399,6 +399,7 @@ get_region_highlight(UNUSED(Param pm))
     if (!arrsize)
 	return hmkarray(NULL);
     arrsize -= N_SPECIAL_HIGHLIGHTS;
+    DPUTS(arrsize < 0, "arrsize is negative from n_region_highlights");
     arrp = retarr = (char **)zhalloc((arrsize+1)*sizeof(char *));
 
     /* ignore special highlighting */
@@ -450,10 +451,15 @@ set_region_highlight(UNUSED(Param pm), char **aval)
     len = aval ? arrlen(aval) : 0;
     if (n_region_highlights != len + N_SPECIAL_HIGHLIGHTS) {
 	/* no null termination, but include special highlighting at start */
-	n_region_highlights = len + N_SPECIAL_HIGHLIGHTS;
+	int newsize = len + N_SPECIAL_HIGHLIGHTS
+	int diffsize = newsize - n_region_highlights;
 	region_highlights = (struct region_highlight *)
 	    zrealloc(region_highlights,
-		     sizeof(struct region_highlight) * n_region_highlights);
+		     sizeof(struct region_highlight) * newsize);
+	if (diffsize > 0)
+	    memset(region_highlights + newsize, 0,
+		   sizeof(struct region_highlight) * diffsize);
+	n_region_highlights = newsize;
     }
 
     if (!aval)

-- 
Peter Stephenson <p.w.stephenson@ntlworld.com>
Web page now at http://homepage.ntlworld.com/p.w.stephenson/


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-18 19:09                 ` Peter Stephenson
@ 2014-12-18 19:34                   ` Peter Stephenson
  2014-12-29  0:57                   ` Daniel Shahaf
  1 sibling, 0 replies; 14+ messages in thread
From: Peter Stephenson @ 2014-12-18 19:34 UTC (permalink / raw)
  To: zsh-workers

Peter Stephenson wrote:
> Zeroing at the realloc should stop this.  Watch carefully in case I've
> got the sums wrong.

Or the number of semicolons.  There will be an embarrassing pause while
the following is corrected.

> +	int newsize = len + N_SPECIAL_HIGHLIGHTS

I think that's the only mistake, but goodness knows what was happening
when I thought I was compiling it.

pws


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Complex config triggering Segfault in pattern matching code.
  2014-12-18 19:09                 ` Peter Stephenson
  2014-12-18 19:34                   ` Peter Stephenson
@ 2014-12-29  0:57                   ` Daniel Shahaf
  1 sibling, 0 replies; 14+ messages in thread
From: Daniel Shahaf @ 2014-12-29  0:57 UTC (permalink / raw)
  To: Peter Stephenson; +Cc: zsh-workers

Peter Stephenson wrote on Thu, Dec 18, 2014 at 19:09:24 +0000:
> @@ -450,10 +451,15 @@ set_region_highlight(UNUSED(Param pm), char **aval)
>      len = aval ? arrlen(aval) : 0;
>      if (n_region_highlights != len + N_SPECIAL_HIGHLIGHTS) {
>  	/* no null termination, but include special highlighting at start */
> -	n_region_highlights = len + N_SPECIAL_HIGHLIGHTS;
> +	int newsize = len + N_SPECIAL_HIGHLIGHTS
> +	int diffsize = newsize - n_region_highlights;
>  	region_highlights = (struct region_highlight *)
>  	    zrealloc(region_highlights,
> -		     sizeof(struct region_highlight) * n_region_highlights);
> +		     sizeof(struct region_highlight) * newsize);
> +	if (diffsize > 0)
> +	    memset(region_highlights + newsize, 0,
> +		   sizeof(struct region_highlight) * diffsize);
> +	n_region_highlights = newsize;
>      }
>  

The arguments to memset() are wrong:

diff --git a/Src/Zle/zle_refresh.c b/Src/Zle/zle_refresh.c
index c146e46..fe33799 100644
--- a/Src/Zle/zle_refresh.c
+++ b/Src/Zle/zle_refresh.c
@@ -457,7 +457,7 @@ set_region_highlight(UNUSED(Param pm), char **aval)
 	    zrealloc(region_highlights,
 		     sizeof(struct region_highlight) * newsize);
 	if (diffsize > 0)
-	    memset(region_highlights + newsize, 0,
+	    memset(region_highlights + newsize - diffsize, 0,
 		   sizeof(struct region_highlight) * diffsize);
 	n_region_highlights = newsize;
     }

(Found via glibc's "glibc detected memory corruption" runtime check.)

Cheers,

Daniel

>      if (!aval)
> 
> -- 
> Peter Stephenson <p.w.stephenson@ntlworld.com>
> Web page now at http://homepage.ntlworld.com/p.w.stephenson/


^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2014-12-29  0:57 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-12-13 19:49 Complex config triggering Segfault in pattern matching code Jonathan H
2014-12-13 23:28 ` Bart Schaefer
2014-12-13 23:36   ` Jonathan H
2014-12-14  4:40     ` Bart Schaefer
2014-12-14 18:20       ` Peter Stephenson
2014-12-14 18:43         ` Bart Schaefer
2014-12-15 21:20         ` Jonathan H
2014-12-15 23:39           ` Bart Schaefer
2014-12-16 20:58             ` Peter Stephenson
2014-12-17 17:18             ` Jonathan H
2014-12-18  6:14               ` Bart Schaefer
2014-12-18 19:09                 ` Peter Stephenson
2014-12-18 19:34                   ` Peter Stephenson
2014-12-29  0:57                   ` Daniel Shahaf

Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/zsh/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).